Module 2: IoT Access Technologies and Protocols
2.1 IoT Access Technologies
RFID and NFC (Near-Field Communication):
● RFID (Radio-Frequency Identification):
○ Overview: RFID uses electromagnetic fields to automatically identify and track
tags attached to objects. An RFID system consists of a tag (attached to an
object) and a reader (that communicates with the tag).
○ Operation: RFID tags can be passive (without batteries) or active
(battery-powered). The reader sends a signal to the tag, which responds by
transmitting stored information.
○ Applications: Supply chain management, asset tracking, inventory control, and
identification systems.
● NFC (Near-Field Communication):
○ Overview: NFC is a subset of RFID, operating at a short range (usually a few
centimeters). It allows communication between two devices, often between a
device and a tag.
○ Operation: NFC operates in three modes: reader/writer mode, peer-to-peer
mode, and card emulation mode.
○ Applications: Mobile payments, contactless cards, and secure access systems.
IEEE 802.15.4 (Zigbee):
● Physical and MAC Layers:
○ Physical Layer: Deals with the transmission and reception of data over wireless
channels. IEEE 802.15.4 operates in the 2.4 GHz, 868 MHz, and 915 MHz
frequency bands.
○ MAC (Media Access Control) Layer: Responsible for managing data access
and ensuring collision avoidance. It uses mechanisms like CSMA/CA (Carrier
Sense Multiple Access with Collision Avoidance).
○ Topology: Supports star, mesh, and tree topologies. Mesh networks are most
common in IoT as they allow devices to route data through multiple nodes.
○ Security: IEEE 802.15.4 includes encryption (AES-128) for data confidentiality
and integrity, along with key management systems.
IEEE 802.11ah (Wi-Fi HaLow):
● Overview: A low-power, long-range extension of Wi-Fi designed for IoT applications.
○ Physical and MAC Layers: Operates in sub-1 GHz frequency bands, enabling
longer range and lower power consumption.
○ Topology: Supports star topology, common in IoT environments.
○ Security: Offers WPA2-based encryption for secure communication.
LoRaWAN (Long Range Wide Area Network):
● Overview: LoRaWAN is a low-power, wide-area networking protocol designed for IoT
applications that require long-range connectivity.
○ Physical Layer: LoRa uses chirp spread spectrum modulation, which allows it to
operate over long distances with minimal power consumption.
○ Topology: LoRaWAN uses a star-of-stars topology, where devices communicate
with gateways that then connect to a central server.
○ Security: Includes end-to-end encryption and authentication mechanisms,
making it secure for large-scale IoT deployments.
2.2 Network Layer
IP Versions:
● IPv4 and IPv6:
○ IPv4: Internet Protocol version 4, the standard used in most networks today. It
has a 32-bit address space, allowing for around 4.3 billion unique addresses.
○ IPv6: Designed to address IPv4's limitations, it has a 128-bit address space,
allowing for an almost unlimited number of unique addresses. IPv6 is critical for
IoT as it allows every device to have a unique address.
○ Benefits for IoT: IPv6 provides better auto-configuration, enhanced security
features, and support for constrained devices through the use of lightweight
header fields.
Constrained Nodes and Constrained Networks:
● Constrained Nodes: IoT devices that have limited processing power, memory, and
energy (e.g., sensors). They must use lightweight communication protocols to conserve
resources.
● Constrained Networks: Networks with limited bandwidth, higher latency, and potential
reliability issues (e.g., low-power and lossy networks, LLNs). These networks are used
for IoT systems where full-scale, high-speed internet connectivity is not feasible.
6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks):
● Overview: 6LoWPAN allows IPv6 packets to be transmitted over IEEE 802.15.4
networks (used in Zigbee). It provides a framework for transmitting small, efficient
packets suitable for low-power, lossy networks.
● Operation: 6LoWPAN compresses IPv6 headers and optimizes the transmission of
packets over low-power networks.
● Advantages: It allows seamless integration of IoT devices into the broader internet
using standard IP protocols, providing scalability and interoperability.
2.3 Application Layer Protocols
CoAP (Constrained Application Protocol):
● Overview: CoAP is a lightweight protocol designed for constrained devices and
low-power networks. It is based on the REST architecture, similar to HTTP, but with a
reduced overhead.
● Operation: CoAP uses a client-server model and allows devices to request or send
information over a network using methods like GET, POST, PUT, and DELETE.
● Advantages: CoAP is optimized for low-bandwidth, low-power IoT environments. It
supports multicast communication and can operate over UDP, making it efficient for
small data exchanges.
MQTT (Message Queuing Telemetry Transport):
● Overview: MQTT is a lightweight messaging protocol designed for IoT. It follows a
publish-subscribe model, where devices publish data to topics, and other devices
(subscribers) receive the information.
● Operation:
○ Broker: A central server (broker) manages the distribution of messages between
publishers and subscribers.
○ QoS Levels: MQTT provides three Quality of Service levels (QoS 0, QoS 1, QoS
2), allowing for flexible control over message delivery.
● Advantages: MQTT is optimized for low-bandwidth, high-latency, and unreliable
networks. It is widely used in IoT for applications like remote monitoring and control.
STOMP (Simple Text Oriented Messaging Protocol):
● Overview: STOMP is a simple, text-based messaging protocol used for connecting
clients to message brokers.
● Operation: STOMP allows a client to send and receive messages to/from a message
broker over TCP, making it suitable for real-time communication.
● Advantages: It's lightweight and works well in environments that do not require complex
interactions or QoS control. However, it's not as popular in IoT as MQTT.
AMQP (Advanced Message Queuing Protocol):
● Overview: AMQP is a message-oriented protocol that provides reliable, secure
messaging with detailed controls over message delivery.
● Operation: AMQP ensures messages are delivered, acknowledged, and can be
retrieved in case of failure. It operates using queues, exchanges, and bindings, ensuring
secure and robust communication.
● Advantages: AMQP is robust and secure, making it suitable for critical IoT systems like
financial transactions or healthcare monitoring.
Comparison of Protocols:
● CoAP vs MQTT:
○ CoAP: Uses request/response model (similar to HTTP) and is lightweight for
small devices and networks.
○ MQTT: Uses a publish/subscribe model, ideal for environments with large
numbers of devices requiring asynchronous communication.
● STOMP vs MQTT:
○ STOMP: Text-based, simpler to implement but lacks the QoS features of MQTT.
○ MQTT: More reliable and provides better QoS levels for message delivery.
● AMQP vs MQTT:
○ AMQP: More complex with advanced message routing and delivery guarantees.
Best for secure and high-reliability applications.
○ MQTT: Lightweight and optimized for constrained environments. Easier to
implement for simpler IoT use cases.