IOT

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

Introduction

 WirelessHART is the latest release of Highway Addressable Remote Transducer (HART) Protocol.
 HART standard was developed for networked smart field devices.
 The wireless protocol makes the implementation of HART cheaper and easier.
 HART encompasses the most number of field devices incorporated in any field network.

 Wireless HART enables device placements more accessible and cheaper– such as the top of a reaction
tank, inside a pipe, or at widely separated warehouses.
 Main difference between wired and unwired versions is in the physical, data link and network layers.
 Wired HART lacks a network layer.

HART
Physical
Data Link
Network
Transport
Application

HART Physical Layer


 Derived from IEEE 802.15.4 protocol.
 It operates only in the 2.4 GHz ISM band.
 Employs and exploits 15 channels of the band to increase
reliability.

HART Data Link Layer


 Collision free and deterministic communication achieved by means
of super‐frames and TDMA.
 Super‐frames consist of grouped 10ms wide timeslots.
 Super‐frames control the timing of transmission to ensure collision
free and reliable communication.
 This layer incorporates channel hopping and channel blacklisting to
increase reliability and security.
 Channel blacklisting identifies channels consistently affected by
interference and removes them from use.

HART Network & Transport Layers


 Cooperatively handle various types of traffic, routing, session
creation, and security.
 WirelessHART relies on Mesh networking for its communication,
and each device is primed to forward packets from every other
devices.
 Each device is armed with an updated network graph (i.e., updated topology) to
handle routing.
 Network layer (HART)=Network+ Transport+ Session layers (OSI) HART
Application Layer
 Handles communication between gateways and devices via a series of command
and response messages.
 Responsible for extracting commands from a message, executing it and
generating responses.
 This layer is seamless and does not differentiate between wireless and wired
versions of HART.

HART Congestion Control


 Restricted to 2.4Ghz ISM band with channel 26 removed, due to its
restricted usage in certain areas.
 Interference‐prone channels avoided by using channel switching post every
transmission.
 Transmissions synchronized using 10ms slots.
 During each slot, all available channels can be utilized by the various nodes in the
network allowing for the propagation of 15 packets through the network at a time,
which also minimizes the risk of collisions.

WirelessHART Network Manager


 The network manager supervises each node in the network and
guides them on when and where to send packets.
 Allows for collision‐free and timely delivery of packets between asource and
destination.
 The network manager updates information about neighbors, signal strength, and
information needing delivery or receipt.

 Handles code ‐based network security and prevents unauthorized nodes from
 Decides who will send, who will listen, and at what frequency is each time‐slot.

joining the network.

WirelessHART vs. ZigBee

 A WirelessHART node hops after every message, changing channels every time it
sends a packet. ZigBee does not feature hopping at all, and only hops when the
entire network hops.
 At the MAC layer, WirelessHART utilizes time division multiple access (TDMA),
allotting individual time slots for each transmission. ZigBee applies carrier sense
multiple access with collision detection (CSMA/CD).
 WirelessHART represents a true mesh network, where each node is capable of
serving as a router so that, if one node goes down, another can replace it, ensuring
packet delivery.
ZigBee utilizes a tree topology, which makes nodes along the trunk critical.
 WirelessHART devices are all back compatible, allowing for the integration of
legacy devices as well as new ones. ZigBeedevices share the same basis for their
physical layers, but ZigBee, ZigBee Pro, ZigBee RF4CE, and ZigBee IP are otherwise
incompatible with each other
NFC

Introduction
 Near field communication, or NFC for short, is an offshoot of radio‐frequency
identification(RFID).
 NFC is designed for use by devices within close proximity to each other.
 All NFC types are similar but communicate in slightly different ways.
 FeliCa is commonly found in Japan.

NFC Types
 Passive devices contain information which is readable by other devices, however it
cannot read information itself.
 NFC tags found in supermarket products are examples of passive NFC.
 Active devices are able to collect as well as transmit information.
 Smartphones are a good example of active devices.

Working Principle
 Works on the principle of magnetic induction.
 A reader emits a small electric current which creates a magnetic field that in turn
bridges the physical space between the devices.
 The generated field is received by a similar coil in the client device where it is
turned back into electrical impulses to communicate data such as identification
number status information or any other information.
 ‘Passive’ NFC tags use the energy from the reader to encode their response while
‘active’ or ‘peer‐to‐peer’ tags have their own power source.

NFC Specifications
 NFC's data‐transmission frequency is 13.56MHz.
 NFC can transmit data at a rate of either 106, 212 or 424 Kbps (kilobits per
second).
 Tags typically store between 96 and 512 bytes of data.
 Communication range is less than 20cms.

NFC Applications
 Smartphone based payments.
 Parcel tracking.
 Information tags in posters and advertisements.
 Computer game synchronized toys.
 Low‐power home automation systems.

BLUETOOTH
Introduction
 Bluetooth wireless technology is a short range communications technology.
 Intended for replacing cables connecting portable units
 Maintains high levels of security.
 Bluetooth technology is based on Ad‐hoc technology also known as Ad‐hoc
Piconets.

Features
 Bluetooth technology operates in the unlicensed industrial, scientific and
medical (ISM) band at 2.4 to 2.485 GHZ.
 Uses spread spectrum hopping, full‐duplex signal at a nominal rate of 1600
hops/sec.
 Bluetooth supports 1Mbps data rate for version 1.2 and 3Mbps data rate for
Version 2.0 combined with Error Data Rate.
 Bluetooth operating range depends on the device:
 Class 3 radios have a range of up to 1 meter or 3 feet
 Class 2 radios are most commonly found in mobile devices have a range of
10 meters or 30 feet
 Class 1 radios are used primarily in industrial use cases have a range of
100 meters or 300 feet.
Baseband
 Physical layer of the Bluetooth.
 Manages physical channels and links.
 Other services include:
 Error correction
 Data whitening
 Hop selection
 Bluetooth security
 Manages asynchronous and synchronous links.
 Handles packets, paging and inquiry.

L2CAP
 The Logical Link Control and Adaptation Protocol (L2CAP).
 Layered over the Baseband Protocol and resides in the data link layer.
 Used to multiplex multiple logical connections between two devices.
 Provides connection‐oriented and connectionless data services to upper layer
protocols.
 Provides:
 Protocol multiplexing capability
 Segmentation and reassembly operation
 Group abstractions

RFComm
 Radio Frequency Communications (RFCOMM).
 It is a cable replacement protocol used for generating a virtual serial data stream.
 RFCOMM provides for binary data transport .
 Emulates EIA‐232 (formerly RS‐232) control signals over the Bluetooth baseband
layer, i.e. it is a serial port emulation.
 RFCOMM provides a simple reliable data stream to the user, similar to TCP.
 Supports up to 60 simultaneous connections between two BTdevices.

Service Discovery Protocol (SDP)


 Enables applications to discover available services and their features.
 Addresses the unique characteristics of the Bluetooth environment such as,
dynamic changes in the quality of services in RF proximity of devices in motion.
 Can function over a reliable packet transfer protocol.
 Uses a request/response model.

Piconets
 Bluetooth enabled electronic devices connect and communicate wirelessly
through short range networks known as Piconets.
 Bluetooth devices exist in small ad‐hoc configurations with the ability to act either
as master or slave.
 Provisions are in place, which allow for a master and a slave to switch their roles.
 The simplest configuration is a point to point configuration with one master and
one slave.
 When more than two Bluetooth devices communicate with one another, it is called
a PICONET.
 A Piconet can contain up to seven slaves clustered around a single master.
 The device that initializes establishment of the Piconet becomes the master.
 The master is responsible for transmission control by dividing the network into a
series of time slots amongst the network members, as a part of time division
multiplexing scheme.
Features of Piconet
 Within a Piconet, the clock and unique 48‐bit address of master determines the
timing of various devices and the frequency
hopping sequence of individual devices.
 Each Piconet device supports 7 simultaneous connections to other devices.
 Each device can communicate with several piconets simultaneously.
 Piconets are established dynamically and automatically as Bluetooth enabled
devices enter and leave piconets.
 There is no direct connection between the slaves.
 All connections are either master‐to‐slave or slave‐to‐master.
 Slaves are allowed to transmit once these have been polled by the master.
 Transmission starts in the slave‐to‐master time slot immediately following a
polling packet from the master.
 A device can be a member of two or more Piconets.
 A device can be a slave in one Piconet and master in another.
It however cannot be a master in more than once Piconets.
 Devices in adjacent Piconets provide a bridge to support inner‐Piconet
connections, allowing assemblies of linked
Piconets to form a physically extensible communication infrastructure known as
Scatternet.

Applications
 Audio players
 Home automation
 Smartphones
 Toys
 Hands free headphones
 Sensor networks
ZWAVE
Introduction
 Zwave (or Z wave or Z‐wave) is a protocol for communication among devices used
for home automation.
 It uses RF for signaling and control.
 Operating frequency is 908.42 MHz in the US & 868.42 MHz in Europe.
 Mesh network topology is the main mode of operation, and can support 232 nodes
in a network.

 Zwave utilizes GFSK modulation and Manchester channel encoding.


 A central network controller device sets‐up and manages a Zwave network.
 Each logical Zwave network has 1 Home (Network) ID and multiple node IDs for
the devices in it.
 Nodes with different Home IDs cannot communicate with each other.
 Network ID length=4 Bytes, Node ID length=1 Byte.

GFSK
 Gaussian Frequency Shift Keying.

 Filtering operation smoothens the pulses consisting of streams of ‐1 and 1, and is


 Baseband pulses are passed through a Gaussian filter prior to modulation.

known as Pulse shaping.


 Pulse shaping limits the modulated spectrum width.
 Uses source routed network mesh topology using 1 primary controller.
 Devices communicate with one another when in range.
 When devices are not in range, messages are routed though different nodes to
bypass obstructions created by household appliances or layout.
 This process of bypassing radio dead‐spots is done using a message called
Healing.
 As Zwave uses a source routed static network, mobile devices are excluded from
the network and only static devices are considered.

You might also like