KEMBAR78
Module 2 - IoT Access Technologies and Protocols | PDF | Computer Network | Radio Frequency Identification
0% found this document useful (0 votes)
20 views4 pages

Module 2 - IoT Access Technologies and Protocols

Module 2 covers various IoT access technologies and protocols, including RFID, NFC, Zigbee, Wi-Fi HaLow, and LoRaWAN, highlighting their operational mechanisms and applications. It also discusses network layers, focusing on IPv4, IPv6, constrained nodes, and the 6LoWPAN protocol for efficient communication in low-power networks. Additionally, the module outlines application layer protocols like CoAP, MQTT, STOMP, and AMQP, comparing their features and suitability for different IoT scenarios.

Uploaded by

rockstar060101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views4 pages

Module 2 - IoT Access Technologies and Protocols

Module 2 covers various IoT access technologies and protocols, including RFID, NFC, Zigbee, Wi-Fi HaLow, and LoRaWAN, highlighting their operational mechanisms and applications. It also discusses network layers, focusing on IPv4, IPv6, constrained nodes, and the 6LoWPAN protocol for efficient communication in low-power networks. Additionally, the module outlines application layer protocols like CoAP, MQTT, STOMP, and AMQP, comparing their features and suitability for different IoT scenarios.

Uploaded by

rockstar060101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Module 2: IoT Access Technologies and Protocols

2.1 IoT Access Technologies

RFID and NFC (Near-Field Communication):

● RFID (Radio-Frequency Identification):


○ Overview: RFID uses electromagnetic fields to automatically identify and track
tags attached to objects. An RFID system consists of a tag (attached to an
object) and a reader (that communicates with the tag).
○ Operation: RFID tags can be passive (without batteries) or active
(battery-powered). The reader sends a signal to the tag, which responds by
transmitting stored information.
○ Applications: Supply chain management, asset tracking, inventory control, and
identification systems.
● NFC (Near-Field Communication):
○ Overview: NFC is a subset of RFID, operating at a short range (usually a few
centimeters). It allows communication between two devices, often between a
device and a tag.
○ Operation: NFC operates in three modes: reader/writer mode, peer-to-peer
mode, and card emulation mode.
○ Applications: Mobile payments, contactless cards, and secure access systems.

IEEE 802.15.4 (Zigbee):

● Physical and MAC Layers:


○ Physical Layer: Deals with the transmission and reception of data over wireless
channels. IEEE 802.15.4 operates in the 2.4 GHz, 868 MHz, and 915 MHz
frequency bands.
○ MAC (Media Access Control) Layer: Responsible for managing data access
and ensuring collision avoidance. It uses mechanisms like CSMA/CA (Carrier
Sense Multiple Access with Collision Avoidance).
○ Topology: Supports star, mesh, and tree topologies. Mesh networks are most
common in IoT as they allow devices to route data through multiple nodes.
○ Security: IEEE 802.15.4 includes encryption (AES-128) for data confidentiality
and integrity, along with key management systems.

IEEE 802.11ah (Wi-Fi HaLow):

● Overview: A low-power, long-range extension of Wi-Fi designed for IoT applications.


○ Physical and MAC Layers: Operates in sub-1 GHz frequency bands, enabling
longer range and lower power consumption.
○ Topology: Supports star topology, common in IoT environments.
○ Security: Offers WPA2-based encryption for secure communication.
LoRaWAN (Long Range Wide Area Network):

● Overview: LoRaWAN is a low-power, wide-area networking protocol designed for IoT


applications that require long-range connectivity.
○ Physical Layer: LoRa uses chirp spread spectrum modulation, which allows it to
operate over long distances with minimal power consumption.
○ Topology: LoRaWAN uses a star-of-stars topology, where devices communicate
with gateways that then connect to a central server.
○ Security: Includes end-to-end encryption and authentication mechanisms,
making it secure for large-scale IoT deployments.

2.2 Network Layer

IP Versions:

● IPv4 and IPv6:


○ IPv4: Internet Protocol version 4, the standard used in most networks today. It
has a 32-bit address space, allowing for around 4.3 billion unique addresses.
○ IPv6: Designed to address IPv4's limitations, it has a 128-bit address space,
allowing for an almost unlimited number of unique addresses. IPv6 is critical for
IoT as it allows every device to have a unique address.
○ Benefits for IoT: IPv6 provides better auto-configuration, enhanced security
features, and support for constrained devices through the use of lightweight
header fields.

Constrained Nodes and Constrained Networks:

● Constrained Nodes: IoT devices that have limited processing power, memory, and
energy (e.g., sensors). They must use lightweight communication protocols to conserve
resources.
● Constrained Networks: Networks with limited bandwidth, higher latency, and potential
reliability issues (e.g., low-power and lossy networks, LLNs). These networks are used
for IoT systems where full-scale, high-speed internet connectivity is not feasible.

6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks):

● Overview: 6LoWPAN allows IPv6 packets to be transmitted over IEEE 802.15.4


networks (used in Zigbee). It provides a framework for transmitting small, efficient
packets suitable for low-power, lossy networks.
● Operation: 6LoWPAN compresses IPv6 headers and optimizes the transmission of
packets over low-power networks.
● Advantages: It allows seamless integration of IoT devices into the broader internet
using standard IP protocols, providing scalability and interoperability.

2.3 Application Layer Protocols


CoAP (Constrained Application Protocol):

● Overview: CoAP is a lightweight protocol designed for constrained devices and


low-power networks. It is based on the REST architecture, similar to HTTP, but with a
reduced overhead.
● Operation: CoAP uses a client-server model and allows devices to request or send
information over a network using methods like GET, POST, PUT, and DELETE.
● Advantages: CoAP is optimized for low-bandwidth, low-power IoT environments. It
supports multicast communication and can operate over UDP, making it efficient for
small data exchanges.

MQTT (Message Queuing Telemetry Transport):

● Overview: MQTT is a lightweight messaging protocol designed for IoT. It follows a


publish-subscribe model, where devices publish data to topics, and other devices
(subscribers) receive the information.
● Operation:
○ Broker: A central server (broker) manages the distribution of messages between
publishers and subscribers.
○ QoS Levels: MQTT provides three Quality of Service levels (QoS 0, QoS 1, QoS
2), allowing for flexible control over message delivery.
● Advantages: MQTT is optimized for low-bandwidth, high-latency, and unreliable
networks. It is widely used in IoT for applications like remote monitoring and control.

STOMP (Simple Text Oriented Messaging Protocol):

● Overview: STOMP is a simple, text-based messaging protocol used for connecting


clients to message brokers.
● Operation: STOMP allows a client to send and receive messages to/from a message
broker over TCP, making it suitable for real-time communication.
● Advantages: It's lightweight and works well in environments that do not require complex
interactions or QoS control. However, it's not as popular in IoT as MQTT.

AMQP (Advanced Message Queuing Protocol):

● Overview: AMQP is a message-oriented protocol that provides reliable, secure


messaging with detailed controls over message delivery.
● Operation: AMQP ensures messages are delivered, acknowledged, and can be
retrieved in case of failure. It operates using queues, exchanges, and bindings, ensuring
secure and robust communication.
● Advantages: AMQP is robust and secure, making it suitable for critical IoT systems like
financial transactions or healthcare monitoring.

Comparison of Protocols:

● CoAP vs MQTT:
○ CoAP: Uses request/response model (similar to HTTP) and is lightweight for
small devices and networks.
○ MQTT: Uses a publish/subscribe model, ideal for environments with large
numbers of devices requiring asynchronous communication.
● STOMP vs MQTT:
○ STOMP: Text-based, simpler to implement but lacks the QoS features of MQTT.
○ MQTT: More reliable and provides better QoS levels for message delivery.
● AMQP vs MQTT:
○ AMQP: More complex with advanced message routing and delivery guarantees.
Best for secure and high-reliability applications.
○ MQTT: Lightweight and optimized for constrained environments. Easier to
implement for simpler IoT use cases.

You might also like