Unit 3-I M
Unit 3-I M
Unit 3-I M
======================================================================
Unit III
IoT Data Link Layer & Network Layer Protocols: PHY/MAC Layer(3GPP MTC, IEEE 802.11, IEEE
802.15), Wireless HART,ZWave,Bluetooth Low Energy, Zigbee Smart Energy, DASH7 - Network
Layer-IPv4,IPv6, 6LoWPAN, 6TiSCH,ND, DHCP, ICMP, RPL, CORPL, CARP
Several Communication Protocols are used in Internet of Things (IoT) to provide service to the network
layer.
As we know IoT is based on networking of things where smart devices communicate with each other by
sending and receiving data. So for that several network protocols (Communication protocols) are used to
connect the IoT enabled devices and to establish the communication.
Bluetooth
Bluetooth is a short-range wireless communication network over a radio frequency. Bluetooth is mostly
integrated into smartphones and mobile devices. The Bluetooth communication network works within 2.4
ISM band frequencies with data rate up to 3Mbps.
1. Bluetooth Classic
2. Bluetooth Low Energy
3. Bluetooth SmartReady
The features of Bluetooth 5.0 version is introduced as Bluetooth 5 which have been developed entirely for
the Internet of Things.
Z-Wave
Z-Wave
Wave is a wireless communication protocol with the frequency of 900MHz. The ranges of Z-Wave
Z lies
between 30 meters to 100 meters with the data transfer rate of 100kbps so that it is suitable for small
messages in IoT applications
ions for home automation. This communication protocol operates on mesh
network architecture with one and several secondary controllers.
• Standard: Z-Wave
Wave Alliance ZAD12837 / ITU
ITU-T G.9959
• Frequency: 908.42GHz
• Range: 30-100m
• Data transfer rate: 100kbps
ZigBee is a low power, low data rate wireless personal area network communication protocol. It is mostly
used in home automation and industrial settings. Since ZigBee is a low power communication protocol,
the IoT power devices used with ZigBee technol
technology.
ogy. The ZigBee communication protocol is based on the
IEEE 802.15.4 standard operating at the 2.4GHz frequency. The ZigBee protocol supports star, cluster or
wireless mesh technology topology.
o Zigbee Coordinator
o Zigbee End Device
o Zigbee Router
DASH7
DASH7 is an “instant-on,” long-range, low power wireless communications standard for applications
requiring modest bandwidth like text messages, sensor readings, or location-based advertising
coordinates.
DASH7 is an open source RFID-standard for wireless sensor networking, which operates in the 433 MHz
unlicensed ISM band/SRD band. DASH7 provides multi-year battery life, range of up to 2 km, indoor
location with 1 meter accuracy, low latency for connecting with moving things, a very small open source
protocol stack, AES 128-bit shared key encryption support, and data transfer of up to 200 kbit/s.
Wireless HART
https://instrumentationtools.com/wireless-hart-communication-protocol-overview/
https://www.pepperl-fuchs.com/india/hi/10028.htm
The network layer is divided into two sublayers: routing layer which handles the transfer of packets from
source to destination, and an encapsulation layer that forms the packets.
RPL Protocol
RPL stands for Routing Protocol for Low-Power and Lossy Network. It is a distance-vector protocol that
supports a varity of Data Link Protocols. RPL builds a Destination Oriented Directed Acyclic Graph
(DODAG) which has only one route from each leaf node to the root. All the traffic in this DODAG is routed
through the root. Initially, each node sends a DODAG Information Object (DIO) announcing them self as a
root. This information travels in the network, and complete DODAG is gradually built. When a new node
wants to join the network, it sends a DODAG Information Solicitation (DIS) request and root responds
back with a DAO Acknowledgment (DAO-ACK) confirming the join.
CORPL
CORPL protocol is the extension of the RPL protocol, which is termed as cognitive RPL. This network
protocol is designed for cognitive networks and uses DODAG topology. CORPL protocol makes two new
modifications in the RPL protocol. It uses opportunistic forwarding to forward a packet between the
nodes. Each node of CORPL protocol keeps the information of forwarding set rather than parents only
maintaining it. Each node updates its changes to its neighbor using DIO messages. On the basis of this
updated message, each node frequently updates its neighbor for constant forwarder set.
CARP Protocol
CARP (Channel-Aware Routing Protocol) is a distributed routing protocol. It is designed for underwater
communication. It has lightweight packets so that it can be used for Internet of Things (IoT). It performs
two different functionalities: network initialization and data forwarding. CARP protocol does not support
previously collected data. Hence, it is not beneficial for those IoT or other application where data is
changed frequently. The upgradation of CARP is done in E-CARP which overcomes the limitation of
CARP. The E-CARP allows the sink node to save previously received sensory data.
6LoWPAN
The 6LoWPAN protocol refers to IPv6 Low Power Personal Area Network which uses a lightweight
IP-based communication to travel over low data rate networks. It has limited processing ability to transfer
information wirelessly using an internet protocol. So, it is mainly used for home and building automation.
The 6LoWPAN protocol operates only within the 2.4 GHz frequency range with 250 kbps transfer rate. It
has a maximum length of 128-bit header packets.
6LowPAN Security Measure
Security is a major issue for 6LowPAN communication Protocol. There are several attacks issues at the
security level of 6LoWPAN which aim is to direct destruction of the network. Since it is the combination of
two systems, so, there is a possibility of attack from two sides that targets all the layer of the 6LoWPAN
stack (Physical layer, Data link layer, Adaptation layer, Network layer, Transport layer, Application layer).
• Standard: RFC6282
• Frequency: Used over a variety of other networking media including Bluetooth Smart (2.4GHz)
or ZigBee or low-power RF (sub-1GHz)
• Range: NA
• Data Rates: NA
IP version 4 (IPv4) –
IPv4 is still the widely used network layer protocol used for networking computers. IPv4 addresses are
expressed as dotted decimal numbers. The address consist of four octets (32-bit number) divided into two
parts – network address to uniquely identify a TCP-IP or IOT network and host address to identify host
within the identified network. A subnet mask is used along with the 32-bit IP address to uniquely identify a
host (computer or IOT device). The subnet mask is also a 32-bit number. The subnet mask helps in
identifying the exact location of the host device. The routers extract the network address from the IPv4
address and compare it with a route table to identify the network and the data packet is first delivered to
the target network. Then, the subnet mask is used to uniquely identify the host and deliver the data
packet to the host device.
In the standard, there are five IPv4 classes – A, B, C, D and E. The class of an IPv4 address is identified
by the first octet of the IP address. The classes A, B and C are most commonly used. The class D is
reserved for multi-casting and Class E for experimental purposes.
In class A IPv4 address, first octet is used to identify network and remaining three octet are used to
identify the host. This addressing class is generally used in networks having large number of host
devices. The first bit of the first octet is always set to 0, so, the first octet can have a decimal value in
range from 1 to 127. The value of 127 for first octet in class A address remains reserved for loopback IP
address or localhost, so values only from 1 to 126 remains available. The default subnet mask for class A
is 255.0.0.0. With this addressing scheme, maximum 126 networks and maximum 16777214 host devices
in each network can be uniquely identified.
In class B IPv4 address, first two octet are used to identify network and last two octet are used to identify
host device. The first two bits in first octet of Class B address is always set to 10, so the network address
can range from 128.0.X.X to 191.255.X.X. The default subnet mask for class B address is 255.255.0.0.
With this addressing scheme, maximum 16384 networks and maximum 65534 host devices in each
network can be uniquely identified.
In class C IPv4 address, first three octet are used to identify network and last octet is used to identify host
device. The first three bits in first octet of Class C address is always set to 110, so its value can range
from 192 to 223. The network address can range from 192.0.0.X to 223.255.255.X. The default subnet
mask for class B address is 255.255.255.0. With this addressing scheme, maximum 2097152 networks
and maximum 254 host devices in each network can be uniquely identified.
Suppose, a class C IPv4 address be 192.168.8.1 and a subnet mask be 255.255.255.0. The subnet mask
in binary converts to 11111111.11111111.11111111.00000000, which implies that first three octet are the
network address and the last octet is the host address. So, in the IP address 192.168.8.1, 192.168.8.0
will be the network address and 000.000.000.1 will be the host address.
There is only address space for 4,294,967,296 addresses in IPv4 standard. This address space has
already exhausted and is not scalable to accommodate the billions of IOT devices. So, IPv6 has been
introduced to expand address space for the IOT.
IP version 6 (IPv6) –
IP Version 6 is an interoperable successor of IPv4. The address space in IPv4 is limited to roughly 4.3
billion devices. There will be 20 billion IOT devices alone by the year 2020. So, an IP addressing standard
that would be scalable to cater to the future IOT infrastructure was the need of the time.
Compared to 32-bit addresses in IPv4, there are 128-bit addresses in IPv6. The address is divided into
eight 16-bit blocks where each block can be represented by a 4-digit hexadecimal number. each block in
the IPv6 address is separated by a semi-colon. So, a typical IPv6 address would look like
77AD:45DF:A23D:8:2D:76DF:245:AF. There are eight blocks in the address – 77AD, 45DF, A23D, 8, 2D,
76DF, 245 and AF.
6TiSCH –
Developed by IETF, 6TiSCH is a IPv6 standard for 802.15.4 MAC layer protocols. The standard allows
IPv6 addresses to pass through Time-Slotted Channel Hopping (TSCH) mode of IEEE 802.15.4e MAC
layer, so that the IPv6 adaption layer can be used for industrial automation and Low Power Lossy
Networks (LLN).
What is DHCP?
The Internet Control Message Protocol (ICMP) is a network layer protocol used by network devices to
diagnose network communication issues. ICMP is mainly used to determine whether or not data is
reaching its intended destination in a timely manner. Commonly, the ICMP protocol is used on network
devices, such as routers. ICMP is crucial for error reporting and testing, but it can also be used
in distributed denial-of-service (DDoS) attacks.
The primary purpose of ICMP is for error reporting. When two devices connect over the Internet, the
ICMP generates errors to share with the sending device in the event that any of the data did not get to its
intended destination. For example, if a packet of data is too large for a router, the router will drop the
packet and send an ICMP message back to the original source for the data.
The medium access control (MAC) is a sublayer of the data link layer of the open system interconnections
(OSI) reference model for data transmission. It is responsible for flow control and multiplexing for
transmission medium. It controls the transmission of data packets via remotely shared channels. It sends
data over the network interface card.
The Open System Interconnections (OSI) model is a layered networking framework that conceptualizes
how communications should be done between heterogeneous systems. The data link layer is the second
lowest layer. It is divided into two sublayers −
MAC Addresses
MAC address or media access control address is a unique identifier allotted to a network interface
controller (NIC) of a device. It is used as a network address for data transmission within a network
segment like Ethernet, Wi-Fi, and Bluetooth.
MAC address is assigned to a network adapter at the time of manufacturing. It is hardwired or hard-coded
in the network interface card (NIC). A MAC address comprises of six groups of two hexadecimal digits,
separated by hyphens, colons, or no separators. An example of a MAC address is 00:0A:89:5B:F0:11.
Most network protocols use the concept of layers to separate different components and functions into
independent modules that developers can assemble in different ways.
The PHY layer defines the physical and electrical characteristics of the network. It is responsible for
managing the hardware that modulates and demodulates the RF bits.
The MAC layer is responsible for sending and receiving RF frames. As part of each packet, there is a
MAC layer data header that has addressing information as well as packet options. This layer implements
packet acknowledgments (ACKs), packet tracking to eliminate duplicates, and so forth.
The XBee/XBee-PRO SX RF Module uses a patented method for scanning and finding a transmission.
When a device transmits, it sends out a repeated preamble pattern, a MAC header, optionally a network
header, followed by packet data. A receiving device is able to scan all the channels to find a transmission
during the preamble, then once it has locked into that channel it attempts to receive the whole packet.
The following table shows the AT commands related to the MAC/PHY layers.
AT
command Function
CM The Channel Mask is a user-defined list of channels that the device operates on.
For additional information, see CM (Channel Mask).
HP Change HP (Preamble ID) to make it so a group of devices will not interfere with another
group of devices in the same vicinity. The advantage of changing this parameter is that a
receiving device will not lock into a transmission of a transmitting device that does not have
the same Preamble ID.
ID Change ID (Network ID) to further keep devices from interfering with each other. The device
matches this ID after it matches the preamble pattern and after it receives the MAC header.
A unique network identifier distinguishes each network. For devices to communicate, they
must be configured with the same network identifier. The ID parameter allows multiple
networks to co-exist on the same physical channel.
PL Sets the transmit (TX) power level. You can reduce the power level from the maximum to
reduce current consumption or for testing. This comes at the expense of reduced radio range.
RR Specifies the number of times a sending device attempts to get an ACK from a destination
device when it sends a unicast packet.
MT Specifies the number of times that a device repeatedly transmits a broadcast packet. This
adds redundancy, which improves reliability.
3GPP MTC
A MTC Device might also communicate locally (wirelessly, possibly through a PAN, or hardwired)
with other entities which provide the MTC Device “raw data” for processing and communication to the
MTC Server(s) and/or other MTC Device(s). Local communication between MTC Device(s) and other
entities is out of scope of this technical specification.
Machine-type communication (MTC) is a form of data communication which involves one or more
entities that do not necessarily need human interaction.
MTC Device: A MTC Device is a User Equipped (UE) for Machine Type Communication, which
communicates through a PLMN with MTC Server(s) and/or other MTC Device(s).
MTC Feature: MTC Features are network functions to optimise the network for use by M2M applications.
MTC Group: A MTC Group is a group of MTC Devices that share one or more MTC Features and that
belong to the same MTC Subscriber.
MTC Server: A MTC Server is a server, which communicates to the PLMN itself, and to MTC Devices
through the PLMN. The MTC Server can also have an interface which can be accessed by the MTC User.
The MTC Server can:
• Provides services for other servers (e.g. The MTC Server is a Services Capability Server for an
Application Server), and/or
• Provides services for applications and can host the application (e.g. The MTC Server is an
Application Server).
MTC User: A MTC User uses the service provided by the MTC Server.
MTC Subscriber: A MTC Subscriber is a legal entity having a contractual relationship with the network
operator to provide service to one or more MTC Devices.
What does IEEE 802.11 mean?
IEEE 802.11 refers to the set of standards that define communication for wireless LANs (wireless local
area networks, or WLANs). The technology behind 802.11 is branded to consumers as Wi-Fi.
As the name implies, IEEE 802.11 is overseen by the IEEE, specifically the IEEE LAN/MAN Standards
Committee (IEEE 802). The current version of the standard is IEEE 802.11-2007.
IEEE 802.15
IEEE 802.15 is the IEEE working group for Wireless Personal Area Networks (WPANs). The working
group is developing standards for short- range communicatons of devices within a personal operating
space. A personal wireless network consists of mobile devices such as a handheld or pocket computer,
PDA, mobile phone and wireless microphone.