0% found this document useful (0 votes)
7 views18 pages

IoT Unit 3

Wireless Sensor Networks (WSNs) are self-configured networks that monitor environmental conditions through sensor nodes, transmitting data to a base station for analysis. WSNs can utilize various topologies, including star, mesh, and hybrid networks, each with distinct advantages and disadvantages. Additionally, the document discusses communication protocols like IEEE 802.15.4, Zigbee, 6LoWPAN, and Bluetooth, which are essential for IoT applications.

Uploaded by

shreya.d2829
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views18 pages

IoT Unit 3

Wireless Sensor Networks (WSNs) are self-configured networks that monitor environmental conditions through sensor nodes, transmitting data to a base station for analysis. WSNs can utilize various topologies, including star, mesh, and hybrid networks, each with distinct advantages and disadvantages. Additionally, the document discusses communication protocols like IEEE 802.15.4, Zigbee, 6LoWPAN, and Bluetooth, which are essential for IoT applications.

Uploaded by

shreya.d2829
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

3.

1 Overview of Wireless Sensor Networks

What is a Wireless Sensor Network?

 Definition: Wireless Sensor Networks (WSNs) are self-configured,


infrastructure-less wireless networks designed to monitor physical or
environmental conditions, such as:

o Temperature

o Pressure

o Motion

o Sound

o Vibration

o Pollutants

 Functionality: WSNs collect data through sensor nodes and transmit this
information to a central point known as a sink or base station, where data
is analyzed and observed.

 Base Station Role:

o Acts as an interface between users and the network.

o Can retrieve information by sending queries and collecting results.

 Network Composition:

o Typically consists of thousands of sensor nodes.

o Nodes communicate using radio signals.

 Node Characteristics:

o Equipped with sensors, radio transceivers, computing devices, and


power components.

o Resource-constrained with limited processing speed, storage


capacity, and communication bandwidth.

 Self-Organization: After installation, sensor nodes self-organize to create


a network, often using multi-hop communication.

3.2 Structure of Wireless Sensor Network

The structure of WSNs includes different types of topologies for radio


communication networks:
1. Star Network

 Description: A single base station communicates with multiple remote


nodes.

 Communication: Remote nodes cannot send messages to each other.

 Advantages:

o Simple structure.

o Minimal power consumption for remote nodes.

o Low latency communications.

 Disadvantages:

o Base station must be within range of all nodes.

o Less robust due to dependency on a single base station.

2. Mesh Network

 Description: Nodes can transmit data directly to other nodes within radio
range.

 Multi-Hop Communication: Allows communication to nodes outside


direct range using intermediate nodes.

 Advantages:

o High redundancy and scalability.

o If one node fails, communication can continue via other nodes.

 Network Expansion: Easily extended by adding more nodes.

3. Hybrid Star Network

 Description: Combines features of star and mesh networks.

 Power Management: Low-power nodes do not forward messages to


conserve energy.

 Multi-Hop Capability: Other nodes can forward messages, enhancing


network communication while maintaining low power consumption.

3.3 IEEE 802.11 Standards

 Overview: IEEE 802.11 standards govern Wireless Local Area Networks


(WLANs).
 Service Type: Provides time-bounded and asynchronous services for
various download/upload speeds.

 Global Standard: The most popular specification for wireless LAN,


covering physical and data link layers.

 Protocol Families:

o 802.11: Used for Wi-Fi.

o 802.15: Used for Bluetooth.

o 802.16: Used for Wi-Max.

IoT Communication Protocols

The following communication protocols are crucial for consumer and


industrial Internet of Things (IoT) applications:

1. IEEE 802.15.4

2. Zigbee

3. 6LoWPAN

4. Bluetooth

IEEE 802.15.4

Features:

 Standard for WPAN: Designed for low data-rate wireless personal


area networks (WPANs).

 Low Power Consumption: Ideal for low-data-rate monitoring and


control applications.

 Layer Support: Utilizes the physical (PHY) and medium access


control (MAC) layers, along with logical link control (LLC) and
service-specific convergence sub-layer (SSCS).

 Modulation:

o DSSS: Direct sequence spread spectrum modulation for noise


tolerance.

o BPSK/O-QPSK: Low-speed uses Binary Phase Shift Keying


(BPSK); high-speed uses offset-quadrature phase-shift keying
(O-QPSK).
 Access Method: Carrier sense multiple access with collision
avoidance (CSMA-CA).

 Topologies Supported: Star and mesh.

Network Nodes:

1. Full Function Device (FFD)

o Communicates with all device types.

o Supports full protocol functionality.

2. Reduced Function Device (RFD)

o Communicates only with FFDs.

o Designed for lower power consumption and minimal resource


requirements.

Zigbee

Features:

 Enhancement of IEEE 802.15.4: Most widely deployed protocol


for low-power, low-data-rate applications.

 Layer Structure: Operates on layers 3 and 4 for communication


enhancements, including:

o Security: Authentication and encryption.

o Mesh Networking: Data routing and forwarding capabilities.

Components:

 ZigBee Device Object (ZDO): Manages device functionality and


security.

 Application Support Sub-layer (APS): Bridges the network with


other layers and provides control services.

ZigBee Device Types:

1. ZigBee Coordinator (ZC):

o Root of the ZigBee network tree, managing network initiation


and security.
2. ZigBee Router (ZR):

o Runs applications and relays information between connected


nodes.

3. ZigBee End Device (ZED):

o Communicates with the parent node but cannot relay


messages; designed for energy efficiency.

Applications:

 Building automation

 Remote control (RF4CE)

 Smart energy monitoring

 Health care and fitness tracking

 Home automation

 LED lighting control

 Telecom services

6LoWPAN

Overview:

 IPv6 for Low-Power Wireless Networks: Designed to enable


small devices with limited processing power to communicate
wirelessly using Internet protocols.

 IETF Standards: Defined by RFC 5933 and RFC 4919.

Features:

 Addressing: Supports both 64-bit globally unique addresses and


16-bit PAN-specific addresses.

 Packet Compression: IPv6 packets are compressed to fit within


the IEEE 802.15.4 packet format.

 Network Range: Up to 200 meters outdoors with a maximum data


rate of 200 kbps.

 Node Capacity: Supports approximately 100 nodes.


Routing:

 Mesh Routing: Within PAN space and between IPv6 and PAN
domains.

 Routing Protocols:

o LOADng: Manages route requests and replies.

o RPL: A distance vector IPv6 routing protocol for lossy and low-
power networks.

Bluetooth

Overview:

 Short-Range Wireless Technology: Designed for data exchange


between devices over short distances, facilitating personal area
networks (PANs).

 Cable Replacement: Intended to replace physical cables


connecting portable devices.

Features:

 ISM Band Operation: Operates in the 2.4 to 2.485 GHz range.

 Data Rates:

o 1 Mbps for version 1.2

o 3 Mbps for version 2.0

 Connection Ranges:

o Class 3: Up to 1 meter

o Class 2: Up to 10 meters (common in mobile devices)

o Class 1: Up to 100 meters (industrial applications)

Connection Establishment:

 Inquiry: Discover nearby devices.

 Paging: Establish connection between two Bluetooth devices.

 Piconets: Configurations of Bluetooth devices acting as masters or


slaves, enabling dynamic role switching.
Applications:

 Audio players

 Home automation

 Smartphones

 Toys

 Hands-free headphones

 Sensor networks

Data Messaging Protocols

MQTT (Message Queue Telemetry Transport)

Overview

 Type: Publish-subscribe-based lightweight messaging protocol.

 Purpose: Designed for connectivity (primarily embedded) between


applications and middleware, as well as networks and
communications.

 Control: A message broker manages the publish-subscribe


messaging pattern.

Key Features

 Topic-Based Communication: Clients subscribe to topics, and the


broker distributes messages to those topics.

 Designed For:

o Remote connections

o Limited bandwidth

o Small code footprint

Components

1. Publishers:

o Lightweight sensors that send data.

2. Subscribers:

o Applications interested in receiving sensor data.


3. Brokers:

o Connect publishers and subscribers, classifying sensor data


into topics.

 Publish/Subscribe Architecture:

 MQTT employs a publish/subscribe architecture, contrasting with


HTTP's request/response paradigm. This structure is designed for
efficient message distribution.

 Event-Driven Messaging:

 The publish/subscribe mechanism is event-driven, allowing


messages to be pushed to clients as they occur, rather than clients
needing to request them actively.

 Role of the MQTT Broker:

 The MQTT broker acts as the central communication point. It is


responsible for dispatching messages between publishers (senders)
and subscribers (receivers).

 Topic-Based Routing:

 When a client publishes a message, it includes a topic. This topic


serves as routing information, enabling the broker to direct the
message to the appropriate subscribers.

 Clients interested in receiving messages subscribe to specific topics.


The broker ensures that all messages corresponding to those topics
are delivered to the subscribers.

 Decoupled Communication:

 Clients do not need to be aware of each other's identities or


connections; they interact solely through the topics. This decoupling
allows for greater flexibility in communication.

 Scalability:

 The architecture supports highly scalable solutions, enabling


numerous data producers and consumers to operate independently
without direct dependencies on one another

Applications

 Messaging:
o Used by Facebook Messenger for online chat.

 Cloud Services:

o Employed by Amazon Web Services (AWS) IoT.

 IoT Platforms:

o Microsoft Azure IoT Hub utilizes MQTT for telemetry messages.

o EVRYTHNG IoT platform uses MQTT for machine-to-machine


(M2M) communication.

 IoT Experimentation:

o Adafruit IO provides a free MQTT cloud service for IoT


experimenters.

Constrained Application Protocol (CoAP)

 Overview:

o CoAP stands for Constrained Application Protocol, a web


transfer protocol tailored for constrained nodes and networks.
It is specifically designed for Machine-to-Machine (M2M)
applications, such as smart energy systems and building
automation.

 Architecture:

o CoAP operates on a request-response model, facilitating


asynchronous client-server interactions over a datagram-
oriented transport protocol, typically UDP (User Datagram
Protocol). This choice enhances efficiency, especially for low-
power devices.

 Lightweight RESTful Interface:

o CoAP offers a lightweight RESTful interface, drawing


inspiration from the Representational State Transfer (REST)
standard used in HTTP. This design is crucial for minimizing
overhead and power consumption in IoT applications.

 Power Efficiency:

o The protocol is optimized for low-power sensors, allowing


them to effectively use RESTful services without significant
power drains.
 Messaging Sub-Layers:

o CoAP is structured into two main sub-layers:

 Messaging Layer: Responsible for reliability and


ensuring message duplication.

 Request/Response Layer: Manages the


communication between clients and servers.

 Messaging Modes:

o CoAP supports four messaging modes:

 Confirmable: Ensures reliable transmission; the sender


awaits acknowledgment.

 Non-confirmable: Used for unreliable transmissions; no


acknowledgment is expected.

 Piggyback: Allows the server to send its response


immediately within the acknowledgment message.

 Separate: The server’s response is sent in a separate


message after the acknowledgment, which may take
additional time.

 Request Methods:

o Similar to HTTP, CoAP employs standard methods for


operations:

 GET: Retrieve data.

 PUT: Create or update a resource.

 POST: Create a resource.

 DELETE: Remove a resource.

Overview of Wireless Modems

1. RF (Radio Frequency) Modems

 Description:

o RF Modems enable wireless data transmission using radio


signals. They employ digital signal processing, modulation,
demodulation, forward error correction, and other advanced
functions.
 Functionality:

o RF signals are generated by an antenna in the transmitting


device and received by an antenna in the receiving device.
The received signals are demodulated to decode the payload
data.

 Common Uses:

o RF communication is used in various technologies, including


Bluetooth, Wi-Fi, and LoRaWAN.

 Advantages:

o Low Power Consumption: Efficient for battery-powered


devices.

o Good Operating Range: Can operate over varying


distances.

o High Data Transmission Rate: Supports fast data transfer.

o Penetration: RF signals can penetrate walls and do not


require a line of sight

GSM Overview

 Definition: GSM, or Global System for Mobile Communications, is a


standard for mobile communications widely recognized as 2G or
Second Generation technology. It supports voice, text messaging,
and data services, ensuring interoperability and seamless roaming
across different countries.

 Frequency Bands:

o GSM operates on four frequency bands:

 850 MHz

 900 MHz

 1800 MHz

 1900 MHz

 Access Techniques:

o It employs a combination of Frequency Division Multiple


Access (FDMA) and Time Division Multiple Access
(TDMA) to manage communication channels.
 Standards:

o Various GSM standards exist based on RF carrier frequency


bands, including GSM900, EGSM900, GSM1800, and GSM1900.

Architecture of GSM

The GSM network consists of three main subsystems:

1. Mobile Station (MS):

o The mobile device used for communication, which includes:

 DSP: Digital Signal Processor

 RF Chip: Radio Frequency Chip

 SIM: Subscriber Identity Module, containing subscriber


information and network data.

2. Base Station Subsystem (BSS):

o Manages traffic and signaling between mobile phones and the


network.

o Divides regions into cells (size ranges from 100 meters to 35


kilometers).

o Components:

 BTS (Base Transceiver Station): Facilitates wireless


communication between user equipment and the
network.

 BSC (Base Station Controller): Controls multiple


BTSs, managing radio frequency assignments and
handovers between BTSs.

3. Network and Switching Subsystem (NSS):

o Interfaces between the GSM cellular system and circuit-


switched telephone networks (PSTN).

o Handles call processing, switching, and maintenance.

o Components:

 VLR (Visitor Location Register): Contains location


information of mobile subscribers in the service area.
 HLR (Home Location Register): Stores subscriber
data and permissions for using the GSM network.

 AUC (Authentication Center): Authenticates mobile


subscribers seeking to connect to the network.

 EIR (Equipment Identity Register): Maintains records


of allowed and banned devices within the network.

Key Components of GSM Architecture

1. Mobile Switching Center (MSC)

 Definition: The MSC is a crucial component responsible for


communication switching functions within the GSM network.

 Functions:

o Call Setup: Establishes connections between callers.

o Call Release: Ends calls and releases resources.

o Routing: Directs calls to the appropriate destinations.

o Call Tracing and Forwarding: Manages features such as call


forwarding and tracking for billing and operational purposes.

 Components:

o VLR (Visitor Location Register): Temporarily stores


information about subscribers currently within the MSC's
service area.

o HLR (Home Location Register): Stores permanent


subscriber data and status.

o AUC (Authentication Center): Provides security by


authenticating users.

o EIR (Equipment Identity Register): Maintains a database


of mobile equipment identities to prevent fraud.

o Connection to PSTN: Links the GSM network to the


traditional telephone network.

2. Public Switched Telephone Network (PSTN)

 Definition: PSTN is the traditional circuit-switched telephone


network that connects calls using physical lines.
 Characteristics:

o Initially comprised of analog fixed-line systems but is now


predominantly digital.

o Includes both mobile and fixed telephone networks.

o Provides connectivity for landline phones in homes and


businesses.

3. Operating Subsystem (OSS)

 Definition: OSS refers to the systems that enable network


operators to monitor, control, and maintain the GSM network.

 Purpose: Supports cost-effective maintenance and operational


management of GSM services.

 Components:

o OMC (Operation Maintenance Center): Responsible for


monitoring and maintaining the performance of Mobile
Stations (MS), Base Station Controllers (BSC), and Mobile
Switching Centers (MSC).

Interfaces Connecting the Subsystems

The GSM architecture includes three key interfaces that facilitate


communication between different subsystems:

1. Air Interface (UM Interface):

o Description: Also known as the UM interface, it connects the


Mobile Station (MS) to the Base Transceiver Station (BTS).

o Analogy: Similar to the U interface of ISDN (Integrated


Services Digital Network), which facilitates digital
communication.

2. Abis Interface:

o Description: An internal interface within the Base Station


Subsystem (BSS) that links the BTS to the Base Station
Controller (BSC).

o Function: Facilitates communication and control between the


BTS and BSC, handling signaling and data traffic.
3. A Interface:

o Description: This interface provides communication between


the Base Station Subsystem (BSS) and the Mobile Switching
Center (MSC).

o Function: Supports call processing, mobility management,


and overall network operation.

GSM System Specifications

1. Access Method

 Techniques Used:

o TDMA (Time Division Multiple Access): Divides the


frequency into time slots to allow multiple users to share the
same frequency channel.

o FDMA (Frequency Division Multiple Access): Allocates


separate frequency bands to different users, allowing
simultaneous communication.

2. Frequency Bands

 Uplink Frequency Band:

o Range: 890 to 915 MHz

o Purpose: Used for communication from the mobile device to


the base station.

 Downlink Frequency Band:

o Range: 935 to 960 MHz

o Purpose: Used for communication from the base station to


the mobile device.

3. System Specifications

 System Bandwidth:

o Total: 200 KHz

o Implication: Bandwidth allocated per channel supports the


transmission of voice and data.

 Number of Frequency Channels (ARFCN):


o Total Channels: 124

o Function: Each channel corresponds to an Absolute Radio


Frequency Channel Number, allowing multiple simultaneous
calls.

 Users per Channel:

o Capacity: 8

o Explanation: Each channel can accommodate up to 8 users


through TDMA.

 Frame Duration:

o Duration: 4.615 ms

o Context: Time duration for one frame in the TDMA structure.

 Spectral Efficiency:

o Value: 1.35 b/s/Hz

o Significance: Measure of how effectively the bandwidth is


utilized.

 Data Rate per User:

o Rate: 33.6 kbps

o Gross Data Rate: 270.833 kbps for 8 users sharing the


channel.

4. Applications of GSM

GSM technology supports a wide range of applications, including:

 Mobile Telephony: Primary use for voice communication.

 VoIP Integration: Facilitates voice over IP services for internet


calling.

 SMS (Short Message Service): Enables text messaging between


mobile devices.

 Mobile Banking: Supports financial transactions via mobile


devices.

 Smart Home Systems: Connects and manages devices in smart


homes.
 Telemedicine: Allows remote medical consultations and
monitoring.

 Surveillance Systems: Used for security and monitoring


applications.

 Alarm Systems: Provides alerts and notifications for security


breaches.

 Cell Broadcasting: Distributes messages to multiple users in a


specific area.

Wi-Fi - Wireless Fidelity Overview

Wi-Fi is a widely used wireless networking technology that enables devices


to connect to networks or communicate with each other without physical
cables. Below are the key features and operational aspects of Wi-Fi:

Key Features of Wi-Fi:

 Wireless Connectivity: Wi-Fi allows devices such as computers,


smartphones, and tablets to connect wirelessly to a local network or
the internet, facilitating seamless data exchange without the need
for wired connections.

 Wireless Local Area Network (WLAN): Wi-Fi operates as a WLAN,


following the IEEE 802.11 standards for wireless communication,
which define the protocols for wireless networking.

 Physical Data Link Layer (PDLL): Wi-Fi functions at the Physical


and Data Link layers of the OSI model, enabling reliable data
transmission by encoding and transmitting data packets over radio
waves.

 Network Interface Controller (NIC): To connect to a Wi-Fi


network, devices require a network interface controller (NIC), which
is integrated into most modern devices such as laptops,
smartphones, digital cameras, and smart TVs.

 Access Points and Client Connections: Wi-Fi networks consist of


access points (or base stations) that facilitate connections between
clients and the network. Clients can also communicate with each
other within the network limits.

 Frequency Bands: Wi-Fi currently operates on two main frequency


bands:
o 2.4 GHz: Offers a longer range but is more susceptible to
interference from other devices.

o 5 GHz: Provides higher data rates with a shorter range, ideal


for high-speed applications.

Range and Coverage:

 Indoor and Outdoor Range:

o Indoor Range: An access point typically covers about 20


meters (66 feet) indoors, but this can vary based on
obstacles like walls and furniture.

o Outdoor Range: Modern access points can achieve ranges of


up to 150 meters (492 feet) outdoors, given a clear line of
sight.

Applications of Wi-Fi:

Wi-Fi technology is widely used in various applications, including:

 Home networking

 Public hotspots (e.g., cafes, airports)

 IoT devices (smart home systems)

 Business environments for office connectivity

Conclusion

Wi-Fi is a vital technology that enhances connectivity in various


environments, providing flexibility and convenience for users. Its ability to
support multiple devices and applications makes it an essential
component of modern communication infrastructure.

You might also like