Nordic Semiconductor Ebook Wireless Connectivity
Nordic Semiconductor Ebook Wireless Connectivity
Nordic Semiconductor Ebook Wireless Connectivity
WIRELESS
CONNECTIVITY
FOR TECH DUMMIES
Your guide to connectivity products
Get connected: Wireless Connectivity for Tech Dummies
INTRODUCTION
Manufacturers are rushing to join the Internet of Things (IoT) goldrush by creating new kinds
of products, systems, and devices to make our lives more efficient, more entertaining, and
more comfortable.
From health and wellness monitoring to smart energy meters, from automated logistics to
self-piloting drones, the world around us is fast becoming hyper-connected.
As IoT becomes commonplace in almost every aspect of our life, more and more businesses
need to adapt, or face disruption.
An IoT device consists of three elements: Hardware, software, and connectivity. The
hardware element will contain sensors such as temperature, sound, moisture, movement,
and so on. The application element will generally be hosted elsewhere, commonly on a
smartphone or tablet. Cloud services may also be utilized.
Connectivity is the critical third piece of the puzzle, linking hardware elements with each
other, and with the application. Without connectivity, there is no Internet of Things, just
things.
The aim of this eBook is to give you an introduction to how to use the
various connectivity protocols relevant for IoT. We will also present some
examples so you can begin to understand how the various protocols can
be used individually, and in combination.
Nordic Semiconductor 2
Get connected: Wireless Connectivity for Tech Dummies
TABLE OF CONTENTS
INTRODUCTION
02. TECHNOLOGIES
a. Wi-Fi
b. Bluetooth low energy
c. RFID
d. NFC
e. Cellular
f. Z-Wave
g. ZigBee
a. Over-the-air updates
b. Security concerns
c. Standards
d. The move to IPv6
Nordic Semiconductor 3
Get connected: Wireless Connectivity for Tech Dummies
“Know your
architecture!”
IoT solutions require secure, bidirectional communication between devices, which could
number anywhere between two and several million. A back-end solution that provides
functions such as management, monitoring, analysis, automation is also required.
The communication device may be connected to a local gateway through a short range
network such as WiFi, Zigbee or Bluetooth, or directly to a wide area network such as the
mobile cellular network.
Nordic Semiconductor 4
Get connected: Wireless Connectivity for Tech Dummies
b. APPLICATION BACK-END
The data processing required by the IoT solution most likely takes place in the cloud. The
back-end application:
• Receives huge quantities of data from devices via the gateway solutions
• Processes and stores the data
• Enables you to send data / instructions back to the device
• Controls registration of devices able to connect to the application
• Provides monitoring of all the devices
c. PRESENTATION / ANALYTICS
The business intelligence layer allows business users to interact with the IoT solution through
dashboards and reports. Depending on the solution, you will be able to check the individual
status of any device connected to the network, view real-time and historical data, and run
reports. This layer also allows for integration of the IoT solution into other business systems.
Nordic Semiconductor 5
Get connected: Wireless Connectivity for Tech Dummies
02. TECHNOLOGIES
There are many different connectivity options for an IoT solution.
Many are used in combination because of the different features and
benefits of each one.
Take a look at your smartphone, which has cellular, Wi-Fi and Bluetooth all built in as
standard.
Wi-Fi and cellular are popular choices for when a device needs to be connected directly to
the Internet, while Bluetooth Low Energy is a great choice for connecting devices to each
other and to a gateway device such as a smartphone.
The correct choice for your circumstances will depend on many factors, including:
We will now take a look at each of the major connectivity protocols in turn.
Nordic Semiconductor 6
Get connected: Wireless Connectivity for Tech Dummies
a. WI-FI
Along with cellular technology, Wi-Fi is the best known connectivity protocol and is present
in almost every home in the western world. Wherever you are, your smartphone will likely
pick up at least one available Wi-Fi network. In densely populated cities, that number can
run into the thousands.
As an established, mature technology, Wi-Fi can be used to easily link together IoT devices,
as well as connecting them to wireless access points that in turn connect to cloud-based
systems.
Instead of trying to handle the complexity of developing their own wireless systems, many
manufacturers instead choose to use pre-certified fully integrated Wi-Fi connectivity
solutions. Created specifically to help designers meet these new challenges, these
embedded modules and software provide a cost-effective way for IoT developers to get
their product to market with less time, less cost and less risk.
Modules should support all existing standards, including IEEE 802.11b/g/n standards at data
rates of up to 20 Mbps. In addition to basic 802.11 capabilities, the firmware should also
include support for advanced Wi-Fi features plus the full range of security options, including
WPS 2.0, WEP, and WPA/WPA2.
To speed up the design process, choose Wi-Fi modules that are equipped with internal flash
and integrated antenna. If you have global aspirations for your product, it is important to
look for pre-certified solutions, which will dramatically shorten the time to market.
Nordic Semiconductor 7
Get connected: Wireless Connectivity for Tech Dummies
CONNECTING TO WI-FI
An important aspect to consider when evaluating Wi-Fi for your product is how the user will
connect.
Currently, most devices that connect to a Wi-Fi network require an SSID and a pass phrase,
which is generally longer than a password. Most equipment manufacturers now program
in unique SSIDs and pass phrases that are printed on a sticker on the hardware. When the
router is turned on, users must use the ”Join Network” functionality on their computer or
smart device to connect. Up until recently, most consumer devices come with displays,
keyboards, or touch screens to make it straightforward to enter this information. Things
however get a little more complex when it comes to IoT devices.
The vast majority of IoT devices, whether wearables, smart home sensors or others, do not
have a display or the capacity to enter data directly to the device. To connect these to a
Wi-Fi network, the user must use an additional device.
A Wi-Fi enabled espresso machine required the SSID and password in order to connect to the
network, but without a keyboard, entering the information is difficult. There are a couple of
options for manufacturers who want to put Wi-Fi capability in a coffee maker.
One approach is to include a “Wi-Fi Protected Setup” (WPS) button on the machine, which
should be pressed along with the equivalent button on the user’s router. However, this makes
the assumption that the user’s wireless router will have a WPS button, which is by no means
certain. Even if the router does have the button, how will you deal with support requests if the
machine is not connecting?
An alternative option is to have the espresso machine appear as an access point with its
own SSID and pass phrase. When the machine is activated, the SSID is broadcast. The user
connects wirelessly to the coffee maker, and navigates to an area to enter the SSID and
network pass phrase, which configures the device as a client on the user’s network. While
effective, this method assumes a reasonable level of technical ability on behalf of the user, and
will likely lead to a large volume of support requests and frustration.
Nordic Semiconductor 8
Get connected: Wireless Connectivity for Tech Dummies
THE FUTURE
Currently it is very easy for a typical home router to become overloaded with devices, and
for range to become an issue even inside an average home.
The Wi-Fi Alliance (the organization that advances Wi-Fi standards) promises to double the
range of standard 2.4GHz Wi-Fi connections, while also doing a better job of penetrating
walls and other obstacles, in the next iteration of the protocol called Wi-Fi HaLow, due out
in 2018.
However, in an industry where time to market is a critical success factor, waiting around for a
connectivity protocol currently under development is never a good strategy.
Nordic Semiconductor 9
Get connected: Wireless Connectivity for Tech Dummies
The Bluetooth standard was created on Ericsson research, with the aim to create a standard
for personal area networks, allowing short range, but using power. Bluetooth uses a radio
technology called Frequency Hopping Spread Spectrum (FHSS), which combined with fast
acknowledgements make the connection extremely robust and avoids channel interference
and multipath distortion.
The technology is managed and overseen by the non-profit Bluetooth Special Interest
Group, which has more than 20,000 member companies. Nordic Semiconductor is one of 11
board members.
Bluetooth’s fourth generation implementation in 2010 was introduced to meet the IoT
requirements for ultra-low power. Typical implementations of Bluetooth low energy, formerly
known as Bluetooth Smart, include fitness trackers and a wireless mouse connected to a PC.
An ideal BLE chip is small and fits nicely into an esthetically-pleasing wearable that is
convenient for the user to wear. A line-of-sight range of up to 100 meters is possible. Using BLE
requires your device to be paired with a host, most usually a cellphone with an app activated.
Making a product with Bluetooth low energy technology has become easy. Everything
you need from the chip to the protocol stack and examples of use is provided by the chip
vendor. And even if the technology is advanced, it is easy to use through standardized
profiles and API’s.
Firstly, it allows small packets of only 27 bytes. It has short transmit and receive windows
and there is always a race to idle. It turns on the radio as seldom as possible, and off as soon
as possible, retaining a quick connection speed. These features allow the device to run for
years, powered by a simple coin-cell battery.
Equipment manufacturer Adidas are a well-known consumer brand in fashion as well as sport.
Recently they took their knowledge from the development and launch of a smart watch and
applied it to what they know best: sport.
With the Adidas miCoach SMART BALL and app, users can track and analyse different kinds
of kicks, with the aim of improving their game. It might not be the first market you think of for
Internet of Things disruption, but as the most popular participation sport in the world, football
has the potential to be an incredibly lucrative IoT market.
The ball itself contains a battery that lasts for approximately one week or 2,000 kicks before
it needs to be rested on a charging base that plugs into a mains connection. The ball connects
to the smartphone app (iPhone and Android) via Bluetooth low energy, whenever the ball is
kicked. Data sent includes speed, spin, and the flight path of the ball. The app then crunches
the numbers to bring the user tips on how to improve their style.
Nordic Semiconductor 10
Get connected: Wireless Connectivity for Tech Dummies
c. RFID
Though Radio-frequency identification (RFID) technology has been around for decades, the
emergence of IoT promises to introduce it to a whole new set of industries. The dominant
application of RFID remains inventory management, but other uses are emerging.
RFID tags are essentially intelligent bar codes that can talk to a networked system to track
every product to which they are attached. RFID tags are an improvement over bar codes
because the tags are not static information. They have read and write capabilities, so the
data stored on RFID tags can be changed, updated and locked.
Many manufacturers use RFID tags to track the location of each product they make from
the moment of manufacture to the moment of purchase. In addition to retail, RFID tags are
also tracking airline passengers, Alzheimer’s patients, children, pets and vehicles.
As they can store data cheaply and efficiently, RFID tags can calculate the cost of highway
tolls and public transit fares, automatically deducting the cost from the user’s account
balance. Rather than waiting to pay, passengers can use credit-card like passes with RFID
tags embedded inside.
Newer innovations in the RFID industry include active, semi-active and passive RFID tags.
These tags can store up to 2 kilobytes of data and are composed of a microchip, antenna
and, in the case of active and semi-passive tags, a battery. The tag’s components are
enclosed within plastic, silicon or sometimes glass.
Active, semi-passive and passive RFID tags are making RFID technology more accessible.
These tags are less expensive to produce, and can be manufactured small enough to fit
inside almost any product.
Active and semi-passive RFID tags use internal batteries to power their circuits, while
passive RFID tags rely entirely on the reader and built-in induction loops as their power
source. Because these tags contain more hardware than passive RFID tags, they are more
expensive and therefore reserved for costly items that require bigger distances to function.
Airplanes will have active RFID tags, whereas a jar of pickles would have a passive tag.
Major retail chains use RFID alongside automated intelligent software to manage their
inventory, while retail payments are on the verge of transforming thanks to systems that use
Near Field Communication (NFC), a form of RFID.
Nordic Semiconductor 11
Get connected: Wireless Connectivity for Tech Dummies
d. NFC
While RFID has been around for a while, NFC is a promising technology. Known as the credit
card of the future, NFC powers many of the emerging payment systems of today including
contactless credit cards and digital wallets.
NFC devices can read passive RFID tags and extract the information stored in them. The
application stores credit card information under multiple layers of security and allows for
quick payments by tapping a card at an NFC terminal.
The technology is already used in advertising, whereby a user can tap an NFC-enabled
phone against a poster to obtain a discount code, for example. Such smart posters can add
a new level of engagement with customers. Passive RFID tags are so cheap to produce that
their use can make economic sense even just as a method of attracting and engaging with
potential customers.
It looks certain that NFC and RFID technologies have a future in the retail ad payments
space, although security remains a valid concern. With no form of user validation such as a
signature or PIN number required, NFC payments could be at risk from a hacked reader or
other device intercepting the signal.
Nordic Semiconductor 12
Get connected: Wireless Connectivity for Tech Dummies
e. CELLULAR
Through cellular connectivity, smart cities can be filled with street light automation, tunnel
navigation services, vehicle and bicycle sharing services, smart parking solutions, electronic
toll collection services and of course, the connected car.
The concept of a connected vehicle is not new. The industry has been debating it ever since
GM launched their OnStar service back in the mid-1990s. Since then, the rate of improvement
in vehicle technology has been astonishing.
The connected car concept no longer just includes sensors and warning signs, but the Internet
connectivity to add interaction and even a local area network for devices within the car.
This is an unstoppable momentum, as the percentage of cars produced with connectivity is set
to increase from 7.5 percent in 2015 to 75 percent by 2020.
Cellular services are ideally suited to provide connectivity to the connected car vehicle market
because of the mobility requirements and real-time communication needs. As 4G rollout
continues and 5G networks are introduced, cellular connectivity will continue to enhance the
capabilities of the connected car. Soon, they will even drive themselves.
Once bandwidth and data costs are less of an issue, the collection of millions of data points
throughout the year could help dealers to predict issues before they occur. Entertainment
options including full streaming services for back-seat passengers and remote services such as
pre-warming the car will be commonplace.
There are some issues to overcome with cellular technologies. Many of the IoT solutions
already deployed will need to be migrated as 2G (and eventually 3G) networks become
obsolete, but the future for cellular connectivity looks bright.
Plans for 5th generation mobile networks (5G) are focused on adding capacity and reducing
latency, further enhancing the reliability of the solution.
Nordic Semiconductor 13
Get connected: Wireless Connectivity for Tech Dummies
f. Z-WAVE
Devices can communicate to one another by using intermediate nodes to actively route
around and circumvent household obstacles or radio dead spots that might occur in a
house. A message from node A to node C can be successfully delivered even if the two
nodes are not within range, providing that a third node B can communicate with nodes A
and C. If the preferred route is unavailable, the message originator will attempt other routes
until a path is found to the C node. Therefore, a Z-Wave network can span much farther than
the radio range of a single unit, albeit with a slight delay.
g. ZIGBEE
The most common implementation is within home automation, such as entertainment, safety
and control devices, but ZigBee is also suited to industrial control, wireless sensor networks,
medical data collection and building automation.
The technology defined by the ZigBee specification is intended to be simpler and less
expensive than other wireless personal area networks such as Bluetooth or Wi-Fi.
Its low power consumption limits transmission distances to 10–100 meters line-of-sight,
depending on power output and environmental characteristics. ZigBee devices can transmit
data over long distances by passing data through a mesh network of intermediate devices
to reach more distant ones. ZigBee is typically used in low data rate applications that require
long battery life and secure networking, such as lighting networks and building automation.
ZigBee protocols are intended for embedded applications requiring low power consumption
and tolerating low data rates. The resulting network will use very small amounts of power,
and indeed, individual devices must have a battery life of at least two years to pass ZigBee
certification.
Nordic Semiconductor 14
Get connected: Wireless Connectivity for Tech Dummies
To fully appreciate the potential benefits of incorporating OTA-DFU into your product,
consider the case of an automotive recall announcement in 2014.
Both Tesla Motors and GM released recall notices related to a safety problem that could
cause fires. GM owners had to return their car to a dealership, causing an administrative
headache for the company and an inconvenient frustration for the owner. On the other
hand, Tesla issued an update via OTA-DFU technology and saved millions by avoiding the
need for customers to return their cars to a dealership.
Nordic Semiconductor 15
Get connected: Wireless Connectivity for Tech Dummies
With IoT devices flooding the market, how long will your product realistically be used and
loved by its users before a better product comes along?
If you are planning a recurring revenue business model, then this is a potential business killer.
Building in the ability to update the firmware on the fly extends the life of your product, thus
extending the cash flow.
But that is not the only benefit. OTA-DFU can drastically reduce the time to market as
products do not have to be 100% finished to be released.
Release the product when it’s 90% complete to early adopters, who often
have a higher tolerance for teething problems, and by the time you have
momentum in the market, your product will be fully-ready and all the
existing devices currently in use can be updated.
b. SECURITY CONCERNS
IoT is fundamentally changing how the world sees data security and privacy. Every end
point device or gateway device and connection that gathers, transmits, stores or processes
sensitive data is a potential risk.
Security rests on fundamentals. The management of encryption and authentication are the
foundation of resilient security, but there is no need for you to reinvent the wheel. Some
open source libraries perform encryption to a very high standard and are well suited even
for the resource constraints of an IoT device.
A study by HP found that 70 percent of the most commonly used IoT devices contain
security vulnerabilities, including:
Nordic Semiconductor 16
Get connected: Wireless Connectivity for Tech Dummies
c. STANDARDS
Several groups are working to create an open standard that would allow interoperability
among the various products. Among them are the AllSeen Alliance, whose members include
Qualcomm, LG, Microsoft, Panasonic and Sony; and the Open Interconnect Consortium,
which includes Intel, Cisco, GE, Samsung and HP.
It is not yet clear how the open standards battle will conclude, although many believe we will
end up with three to four different standards rather than a single winner, and most likely a
number of proprietary environments, such as Apple.
In the meantime, one way consumers can get around the problem is by purchasing a hub
that supports multiple wireless technologies, such as the SmartThings hub from Samsung.
The SmartThings Hub from Samsung is the heart of your smart home. It connects wirelessly
with hundreds of compatible smart devices, allowing you to monitor, control, and secure your
home from anywhere. It works with products from Samsung, Belkin, GE, Bose, Schlage, Yale,
Cree, Osram Lightify, Honeywell, First Alert, and many other brands.
A key benefit of the SmartThings Hub is the compatibility with both ZigBee Home Automation
and Z-Wave protocols, along with IP-accessible devices.
Nordic Semiconductor 17
Get connected: Wireless Connectivity for Tech Dummies
Every device on the Internet is assigned an IP address for identification and location
definition. With the rapid growth of the Internet over the past two decades, it quickly
became evident that far more addresses would be required than were originally available
under the IPv4 protocol.
IPv4 uses 32-bit addresses and provides 4,294,967,296 of them, but the 128-bit system of
IPv6 will provide an astonishing number of addresses: 340,282,366,920,938,463,463,374,
607,431,768,211,456 to be precise.
The two protocols are not designed to be interoperable, which complicates the transition to
IPv6. Compatibility with IPv6 networking is mainly a software or firmware issue, but in reality
much of the older hardware is likely to be replaced.
For an IoT product manufacturer, the key issue to consider when it comes to IPv6 is security.
Although IPv6 has been discussed for years, there is still a lack of understanding within the
IT security industry.
All modern operating systems are compatible with IPv6 and it is enabled by default in the
majority. The reality is that most organizations will need to run IPv6 alongside its existing
IPv4 infrastructures for a longer period of time than first anticipated.
Complications such as this, especially involving legacy systems accessing cloud and mobile
services, open up all manner of security problems.
The greatest concern is that most current firewalls, detection and prevention technology
was built for IPv4. Although the vulnerabilities are theoretical, it is important to spend some
time understanding the potential threats and mitigating the risk to your IoT solution.
We recommend:
Nordic Semiconductor 18
Get connected: Wireless Connectivity for Tech Dummies
Once you get clear on the priorities for your product, your wireless communication options
become a lot clearer.
Nordic Semiconductor 19
Get connected: Wireless Connectivity for Tech Dummies
Bluetooth
Wi-Fi low ener- RFID NFC Cellular Z-Wave ZigBee
gy
Bandwith >1 Gbit <1 Mbit - 100-400 kbit <300 Mbit 40 kbit <250 kbit
NA/High NA/High
Suitable for Re-
No Coin cells reader reader No Coin cells
Battery power 1 chargeable
current current
Global
Yes Yes Yes Yes 3
No Yes
frequency
Star (Mesh
Network Point to Point to Point to
Star in develop- Mesh Mesh
topography point point base station
ment)
Open
Yes Yes Yes Yes Yes No Yes
standard
Service provider
No No No No Yes No No
needed
Nordic Semiconductor 20
Telephone: +47 22 51 10 50
Postal address:
Nordic Semiconductor ASA
P.O. Box 436, Skøyen
0213 Oslo
Norway
www.nordicsemi.com