IoT Networking Technologies 1 .Pptx[1]
IoT Networking Technologies 1 .Pptx[1]
Technologies
Md. Sazzadur Rahman, Ph.D
Professor
IIT-JU
1
Acknowledgements
Wireless
Networks
Infrastructure-based wireless networks
Wireless
Networks
(cont.)
Infrastructure-based wireless networks
Wireless
Networks
(cont.)
Wireless ad hoc network
• Nearby users directly communicate not only to exchange their own data
but also to relay the traffic of other network nodes that cannot directly
communicate
• Mobile ad hoc network is used when
• Mesh network
Wireless • Sensor network
• Vehicular network
Networks • Opportunistic network
(cont.)
Mesh network is a network topology in which the infrastructure nodes
connect directly, dynamically and non-hierarchically to as many other nodes
as possible and cooperate with one another to efficiently route data
Wireless
Networks
(cont.)
https://turbofuture.com/internet
Sensor networks consist of spatially distributed devices communicating
through wireless radio and cooperatively sensing physical or environmental
conditions
Wireless
Networks
(cont.)
• Vehicular ad hoc network is a multihop ad hoc network made up of
vehicles
• Opportunistic mobile social networks are a form of mobile ad hoc networks
that exploit the human social characteristics, such as similarities, daily
routines, mobility patterns, and interests to perform the message routing
and data sharing
Wireless
Networks
(cont.)
Wireless
Networks
(cont.)
https://blog-gn.dronacharya.info/index.php/iot-communication-protocols/
Wireless
Networks
(cont.)
https://www.bluetooth.com/blog/wireless-connectivity-options-for-iot-applicat
ions/
Wireless Bluetooth Technology
Networks
(cont.)
• Bluetooth is a wireless LAN technology used for exchanging data
between fixed and mobile devices over short distances
https://www.bluetooth.com/wp-content/uploads/2018/04/2019-Bluetooth-Market-Upda
te.pdf
https://www.bluetooth.com/wp-content/uploads/2018/04/2019-Bluetooth-Market-Upda
te.pdf
https://www.bluetooth.com/wp-content/uploads/2018/04/2019-Bluetooth-Market-Upda
te.pdf
Bluetooth is meeting market demand for
Bluetooth ⚬ Piconet
Technology ⚬ Scatternet
(cont.)
• A Bluetooth network is called a Piconet
(cont.)
• Piconets can be combined to form what is called a Scatternet
⚬ The radio layer is roughly equivalent to the physical layer of the Internet model
⚬ The radio module in a Bluetooth device is responsible for modulation and
demodulation of data into RF signals
⚬ Bluetooth devices operate at 2.4 GHz in the license-free, globally available ISM
Bluetooth radio band
Technology ■ The advantage of operating in this band is worldwide availability and
compatibility
(cont.) ■ A potential disadvantage is that Bluetooth devices must share this band
with many other RF emitters such as ZigBee and WiFi
⚬ Physical range of 10 m
■ Bluetooth 5.0
• 40–400 m
Bluetooth uses the frequency-hopping spread spectrum (FHSS) method in the physical
layer to avoid interference from other devices or networks.
⚬ Class 1
■ Laptops and desktops
■ Range 100 meters
Bluetooth ■ Power 100mW (20dBm)
⚬ Class 2
Technology
■ Phones and headsets
(cont.) ■ Range 20~50 meters
■ Power 2.5mW (4 dBm)
⚬ Class 3
■ Extremely low power devices
■ Range 1~10 meters
■ Power 1mW (0 dBm)
Baseband layer
• The baseband layer is roughly equivalent to the MAC sublayer in LANs
• Bluetooth uses a form of TDMA
Time division duplex TDMA
• The primary and secondary communicate using time slots
Bluetooth
Technology
(cont.)
• Single-Secondary Communication
⚬ The time is divided into slots of 625 μs
⚬ The primary uses even numbered slots and secondary uses odd-numbered
slots
Baseband layer
⚬ Multiple-Secondary Communication
■ The primary uses the even-numbered slots
■ All secondary units listen on even-numbered slots, but only one
secondary sends in any odd-numbered slot
Bluetooth
Connection Inquiry Scan
• A device periodically listens for inquiry packets at a single frequency –
(cont.) chosen out of 6 frequencies
• Device stays in the state long enough for a inquiring device to cover 16
frequencies
• It will re-enter inquiry scan state even after responding to an inquire
Inquiry Response
• When a device receives inquire, it will wait between 0 and 0.32 seconds
before sending an FHS packet as a response
Bluetooth This is done to avoid collision with another device that also wants to send
an FHS packet
Connection • FHS Packet contains
(cont.) Device ID
Clock
• After inquiring procedure, inquiring device knows all discoverable devices
within range
Paging procedure
⚬ A unit that establishes a connection will carry out a page procedure and
will automatically be the master of the connection
⚬ Connection process involves a 6 steps of communication between the
master and the slave
Bluetooth
Connection
(cont.)
• Step 1
⚬ A source device broadcasts a PAGE message to destination device
⚬ Once page response is received, source device stops paging
Bluetooth
Connection
(cont.)
Step 2
• The destination node sends response to master or source device
• The response includes destination or slave ID
Step 3
• Master sends an FHS packet to destination or slave node
Bluetooth
Connection
(cont.)
• Step 4
⚬ The destination sends a final response to the master
⚬ Using the data from the FHS packet, the slave or destination node adopts
the master’s frequency hopping pattern and synchronizes to its clock
Bluetooth
Connection
(cont.)
• Step 5
⚬ When the master receives the packet, it jumps back to its frequency
hopping pattern and assigns the slave an Active Member Address (AMA)
for the piconet
⚬ Master sends out a poll packet to ensure that the slave is on its frequency
hopping pattern
Bluetooth
Connection
(cont.)
Step 6
• Once the slave receives the poll packet, the slave replies with any kind of
packet to ensure that it is on the right channel
• A new synchronized connection is established between the master and the
slave at the end of step 6
Bluetooth
Connection
(cont.)
• A device in connection state can be in following modes
Bluetooth
Technology
(cont.)
https://medium.com/jaycon-systems
Version Year Major Improvements
24 Mbps peak data rates using Wi-Fi PHY + Bluetooth PHY for l
3.0 2009
ower rates
Wireless
Networks
(cont.)
• IEEE 802 is a family of Institute of Electrical and
Electronics Engineers (IEEE) standards for local
area networks (LAN), personal area network
(PAN), and metropolitan area networks (MAN)
• In 1990, IEEE 802 Committee formed a new
working group, IEEE 802.11, specifically devoted
Bluetooth to wireless LANs, with a charter to develop a
MAC protocol and physical medium specification
IEEE 802.11
Architecture
and Services
Key IEEE
802.11
Standards
• Wi-Fi is a family of wireless network protocols, based on the IEEE
802.11 family of standards
• Wi-Fi is a brand name created by a marketing firm
Wi-Fi
• There is always a concern whether products from different vendors will
successfully interoperate
• Wireless Ethernet Compatibility Alliance (WECA)
Wi-Fi ⚬ Industry consortium formed in 1999
Alliance • Renamed the Wi-Fi Alliance
⚬ Created a test suite to certify interoperability for 802.11 products
The smallest building block is a basic service set (BSS)
802.11
Architecture
802.11
Architecture
IEEE 802.11
Operating
Modes
IEEE 802.11
Terminology
IEEE 802.11 defines nine services that need to be provided by WLAN
IEEE 802.11
Services
Distribution of Messages Within a DS
Services involved with the distribution of messages within a DS
• Distribution service requires information about stations within the
ESS that is provided by the association-related services
• Station must be associated before DS can deliver data to or accept
data from it
SIFS (short IFS): The shortest IFS, used for all immediate response actions, as
Priority IFS explained in the following discussion
Values
PIFS (point coordination function IFS): A midlength IFS, used by the centralized
(cont.)
controller in the PCF scheme when issuing polls
DIFS (distributed coordination function IFS): The longest IFS, used as a minimum
delay for asynchronous frames contending for access
Any station using SIFS to determine transmission opportunity has the
highest priority, because it will always gain access in preference to a station
waiting an amount of time equal to PIFS or DIFS
IEEE 802.11
MAC Timing
The next longest IFS interval is the PIFS. This is used by the centralized
controller in issuing polls and takes precedence over normal contention traffic.
However, those frames transmitted using SIFS have precedence over a PCF poll.
Finally, the DIFS interval is used for all ordinary asynchronous traffic.
SIFS
(cont.)
• Point coordination function (PCF) resides in a point coordinator also known as
Point Access Point , to coordinate the communication within the network
Coordination • The AP waits for PIFS duration rather than DIFS duration to grasp the channel
• Channel access in PCF mode is centralized
Function ⚬ Access to the medium is restricted by the point coordinator
(PCF) ⚬ Associated stations can transmit data only when they are allowed to do so by the
point coordinator
• The polling list
⚬ Stations get on the polling list when they associate with the AP
⚬ Polls any associated stations on a polling list for data transmissions
PCF
⚬ Each CF-Poll is a license to transmit one frame
Operation ⚬ Multiple frames can be transmitted only if the access point sends
multiple poll requests
Figure 13.8 shows the format of IEEE 802.11
frame, also known as the MAC protocol
data unit (MPDU). This general format is used for
all data and control frames,
but not all fields are used in all contexts. The field
are as follows:
CTS duration
The receiver of a CTS frame is the transmitter of the previous RTS frame, so the MAC copies the
transmitter address of the RTS frame into the receiver address of the CTS frame
• Data frames carry higher-level protocol data in the frame body
⚬ Data
■ Simplest data frame
⚬ Data + CF-Ack
Data ■ Carries data and acknowledges previously received data
frames ⚬ Data + CF-Poll
■ It is used by point coordinator to deliver data and also to request that the
mobile station send a data frame that it may have buffered
⚬ Data + CF-Ack + CF-Poll
■ Combines Data + CF-Ack and Data + CF-Poll
Data
Frame
There are eight data frame subtypes, organized into two groups. The first four subtypes define frames that
carry upper-level data from the source station to the destination station. The four data-carrying frames are
as follows:
• Data: This is the simplest data frame. It may be used in both a contention period and a contention-free
period.
• Data + CF-Ack: May only be sent during a contention-free period. In addition to carrying data, this
• Management frames are used to manage communications between stations
and Aps
• Functions covered include management of associations
⚬ Request, response, reassociation, dissociation, and authentication
Beacon
• announce the existence of a network
Management • transmitted at regular intervals to allow mobile stations to find and identify a
network, as well as match parameters for joining the network
frames Probe Request
• Mobile stations use Probe Request frames to scan an area for existing 802.11
networks
• Include SSID and the rates supported by the mobile station
• Stations that receive Probe Requests use the information to determine whether the
mobile station can join the network
Probe Response
Management • Disassociation and Deauthentication
• Association Request
frames(cont.) • Authentication
It contains the value indicating
the time period for which the
medium is occupied
The number and function of
the address fields depends on
context
In the case of an IBSS, no access points are used, and no distribution system is present
IEEE 802.11
Physical
Layer
Standards
• Extension of 802.11 DSSS scheme
⚬ Data rates of 5.5 and 11 Mbps
IEEE 802.11b ⚬ Complementary Code Keying (CCK) modulation
gives higher data rate with same bandwidth and
chipping rate
• Makes use of the frequency band called Universal
Networking Information Infrastructure (UNNI)
⚬ UNNI-1 band (5.15 to 5.25 GHz) for indoor use
⚬ UNNI-2 band (5.25 to 5.35GHz) for indoor or
outdoor
⚬ UNNI-3 band (5.725 to 5.825 GHz) for outdoor
IEEE 802.11a
IEEE 802.11ac
• Support of MU-MIMO transmissions in the downlink
⚬ Multiple simultaneous transmissions from the AP to different stations
⚬ Each antenna of a MU-MIMO AP can simultaneously communicate
with a different single-antenna device, such as a smart phone or
tablet
⚬ AP can be equipped with a maximum of eight antennas
IEEE 802.11ac • Allows the transmission of several MPDUs aggregated in a single
(cont.) A-MPDU
⚬ To acknowledge each MPDU individually a Block ACK packet is
used, which contains a bitmap to indicate the correct reception of all
included MPDUs.
• IEEE 802.11ax aims to provide at least a four-fold capacity increase compared to
IEEE 802.11ac
• Support multi-user transmission strategies by further developing MU-MIMO and
Orthogonal Frequency Division Multiple Access (OFDMA) capabilities in both
downlink and uplink
• A fast handoff between APs in the same administration domain
• Device-to-device communication
IEEE 802.11ax
• Open challenges are related to EDCA extensions
⚬ To support a large number of STAs
⚬ Improve traffic differentiation capabilities
⚬ Improve the energy consumption
⚬ Provide mechanisms to fairly co-exist with neighboring wireless
networks
• Developed to include new features and additional mechanisms to improve the
performance of real-time multimedia content delivery
• Groupcast communication mechanisms
IEEE 802.11aa ⚬ In most audio-video streaming applications a group of clients must receive
the same stream simultaneously
⚬ A multicast protocol is necessary to avoid that the same content is replicated
throughout the network
■ Traditional approach is to use Direct Multicast Service that converts
multicast streams into unicast streams
• The IEEE 802.11e amendment only allows traffic differentiation between four
different access categories: voice, video, best-effort, and background.
• Variety of streaming services, ranging from simple videoconferencing to HD
streaming over IPTV systems, have different QoS requirements
IEEE 802.11aa
(cont.)
• IEEE 802.11ah aims to provide WLANs with the ability to both manage a large
number of heterogeneous STAs within a single BSS, and minimize the energy
consumption of the sensor-type battery-powered STAs
⚬ support of up to 8192 STAs associated with a single AP
⚬ minimum data rate of 100 kbps
⚬ a coverage up to 1 km in outdoor areas
⚬ Channel widths of 1 MHz and 2 MHz
IIEEE 802.11ah
• A version of 802.11 operating in the 60-GHz frequency band
• Offers the potential for much wider channel bandwidth than the 5-GHz band
• Few devices operate in the 60-GHz which means communications would
IEEE 802.11ad experience less interference than in the other bands used by 802.11
• Designed for single-antenna operation
• Huge channel bandwidth of 2160 MHz
• 802.11ad is operating in the millimeter range, which has some undesirable
propagation characteristics:
⚬ Losses are much higher in this range than in the ranges used for traditional
IEEE 802.11ad microwave systems
(cont.) ⚬ Multipath losses can be quite high
⚬ Millimeter-wave signals generally don’t penetrate solid objects
IEEE 802.11
Physical Layer
Standards
Low Power Wide Area
THANK YOU Networks
19
• LoRaWAN, https://www.lora-alliance.org
Low Power Wide • SIGFOX, http://www.sigfox.com/
Area Networks
https://lora-developers.semtech.com/library/tech-papers-and-guides/lora-and-lorawan/
Low Power Wide
Area Networks
https://lora-developers.semtech.com/library/tech-papers-and-guides/lora-and-lorawan/
• LoRaWAN
⚬ LoRa only defines the lower-level layers of the network
stack, and LoRaWAN defines the upper layers of the stack
⚬ The LoRaWAN protocols are defined by the LoRa
Low Power Wide Alliance
⚬ LoRaWAN operates in unlicensed radio spectrum
Area Networks
Network
Architecture
• End device is a sensor or an actuator which is wirelessly connected to a
LoRaWAN network through radio gateways
⚬ LoRa-based devices are assigned several unique identifiers
• Gateway receives messages from any end device in range and forwards these
messages to network server, which is connected through an IP backbone
⚬ There is no fixed association between an end device and a specific gateway.
Low Power Wide Same sensor can be served by multiple gateways in the area
Area Networks ⚬ IP traffic from a gateway to the network server can be backhauled via Wi-Fi
or Cellular connection
⚬ Gateways operate entirely at physical layer
■ They are just LoRa radio message forwarders
■ They only check the data integrity of each incoming LoRa RF message.
If error, message will be dropped otherwise will be forwarded to
network server
Network server manages entire network
• Route messages from end devices to right applications and back
• Device address checking
Low Power Wide • Frame authentication
• Acknowledgements of received messages
Area Networks
• Adapting data rates
• Queuing of downlink payloads coming from any Application Server to any de
Application servers are responsible for securely handling, managing and interpreting
sensor application data and generate all the application-layer downlink payloads to
connected end devices
• Device Classes
⚬ The device classes trade off network downlink communication latency
versus battery lifetime
https://www.mdpi.com/1424-8220/17/10/2364
ANY QUESTION
THANK YOU