Вы находитесь на странице: 1из 69

Machine-to-Machine/IoT Systems

Mohsen Sarraf

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Agenda 1

What is M2M
Benefits and challenges
Components
Generic framework
Example applications
Standards
ETSI
Eclipse
ITU-T
Weightless
TIA, etc.
Architecture
General
ETSI
M2M in 3GPP
M2M security ETSI and others
Enabling Core Communication Technologies
Backbone
Wired
Wireless
Access
Wired
Wireless

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Agenda 2

Enabling core communication technologies Access Wireless


WiFi
Bluetooth
ZigBee
UWB
Z-Wave
DASH7
LoRA
IrDA
Cellular (e.g., GPRS, WCDMA, LTE, WiMAX, LTE-A, etc.)
Other wireless technologies:
LMDS
Satellite (e.g., VSAT, LEO, MEO, GEO)
Tactical (tactical radios, traditional tactical telemetry, INET, etc.)

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
What is M2M 1

A broad term that does not specify a particular wired or wireless


networking or communications technology
It simply refers to systems and technologies that provide for wired
or wireless communication between devices of the same type in
myriad of conditions, distances, etc.
It is also known as the Internet of Things (IoT)
Recently ETSI and others have provided a standard for many
applications that fall in these categories
Every day, more and more such systems are being deployed hence the
need for standardization
M2M typically includes
Collection of data
Transmission of selected data through a communication network
Assessment and/or processing of the data
Response to the collected data and/or information derived from them
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
What is M2M 2

Some pertinent markets


Healthcare: Remote patient monitoring, tele-health,
hospital inventory, etc.
Automotive
Industrial: Inventory, tracking, surveillance, etc.
Commercial: Inventory, tracking, real-time pricing, coupon
updates, surveillance, etc.
Consumer: Home monitoring, connected consumer,
surveillance, etc.
Military: All of the above and then some
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Benefits of M2M
Operational efficiency Cost-effective preventive
New opportunities maintenance
Compliance Improved Quality of Service
Customer satisfaction Fast response through
Sustainability outsourcing troubleshooting
Stay connected with any of your Centralized service support and
systems data management
Monitoring On-going revenues throughout
product lifecycle
Automate processes
Increased revenues from
Optimize processes minimized downtime
Identify critical situations in a Remote diagnostics
timely manner
Real-time statistics
There are, of course, more benefits
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Challenges in M2M

Large number of
communication protocols used in today's industries used
to send this data to a server in the Cloud
Industrial protocols used to collect temperature data on a
sensor, the communication protocols, the device
management protocols; too many protocols to master for
building an end-to-end M2M solution.

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Overcoming challenges: The way forward

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Components of an M2M System

Typically an M2M system is made up of several components, such as:


Device(s) or sensor(s) for collection of data and/or monitoring
Application(s) and/or database(s) to process the collected data
Central server(s) to send and/or receive data transmitted by the
device(s) or sensor(s)
Communication network(s) (wired or wireless) to connect the
devices or sensors to a central server
Modems and possibly codecs to allow data exchange between the
device(s) or sensor(s) and the central server
A security methodology for
Data integrity and/or data theft
Authentication
Protection against cyber attacks such as denial-of-service, etc.

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Components of an ETSI compliant M2M System

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Generic framework for uploading data (as per
ETSIs viewpoint)

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Generic framework for downloading data (as per
ETSIs viewpoint)

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
High level ETSI viewpoint of remote control of home
appliances

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
M2M Applications

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
An application example: Inventory management

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Standards 1
ETSI now has a comprehensive set of standards as shown below
Standard Description
TS 102 921 M2M; mIa, dIa and mId interfaces

TR 101 584 M2M; Study on Semantic support for M2M Data

TS 102 690 M2M; Functional architecture

TR 102 732 M2M; Use Cases of M2M applications for eHealth

TR 102 857 M2M; Use Cases of M2M applications for Connected Consumer

TS 102 689 M2M; M2M service requirements

TR 102 725 M2M; Definitions

TS 103 104 M2M; Interoperability Test Specification for CoAP Binding of ETSI M2M Primitives

TR 102 898 M2M; Use cases of Automotive Applications in M2M capable networks

TS 103 093 M2M; BBF TR-069 compatible Management Objects for ETSI M2M

TS 103 092 M2M; OMA DM compatible Management Objects for ETSI M2M

TR 102 935 M2M; Applicability of M2M architecture to Smart Grid Networks; Impact of Smart Grids on M2M platform

TR 103 167 M2M; Threat analysis and counter measures to M2M service layer

TR 102 691 M2M; Smart Metering Use CasesP. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Standards 2

Eclipse M2M
Open Source implementations of standard M2M protocols
The M2M Industry Working Group is supporting lightweight protocols for two-way
communications between devices and server
Currently focusing on providing first-class Open Source implementations for the MQTT
messaging protocol, and the OMA-DA device management protocol
Message Queuing Telemetry Transport (MQTT) is a protocol designed to connect the physical world
devices and networks, with applications and middleware used in IT and Web development, making it
an ideal connectivity protocol for M2M and Internet of Things
OMA-DM is a standard communication protocol widely used in the telecommunications industry to
monitor and synchronize the state of communications devices such as mobile phones or the kind of
radio modules that can be found in M2M solutions
ITU-T: FG M2M
FG M2M will identify a minimum set of common requirements of vertical markets, focusing
initially on the health-care market and application programming interfaces (APIs) and
protocols supporting e-health applications and services, and draft technical reports in these
areas
Weightless
primarily dealing with PHY, MAC and security issues
proprietary open wireless protocol
Mainly from UK (mostly from Neul and CSR companies in Cambridge)
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Standards 3

BiTXml
TIA: TR-50
M2MXML: An XML based protocol for M2M
communications. The M2MXML project includes a
Java API for parsing M2MXML, but is intended to be
language agnostic
Others

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Architecture General

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
High level architecture ETSI

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
ETSI M2M functional architecture Intra
Service Provider

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
ETSI M2M functional architecture Inter-
M2M Service Provider

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
ETSI architecture: Mapping of reference points to different
deployment scenarios

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Security in M2M

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

32 |
ETSI TC M2M Secure connection (mId Interface)

One or more of the following methods are used

Relying on a trusted access network (i.e., lower-layer) for security


This is the case where no Kmc is derived

Using channel security (PSK AES 128)


HTTP: TLS/TCP, TLS 1.2 CBC SHA or TLS 1.1 CCM
CoAP: DTLS/UDP , DTLS 1.2 CCM(_8)

Using object security (lacks interoperable flexibility in current releases)


XML-DSIG and XML-ENC (v 1.1), using Kmc

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

33 |
Encryption / Decryption
Encryption/decryption is a security mechanism in which cipher algorithm are
applied together with a secret key to encrypt data to make it unreadable if
intercepted.
There are different types of encryption/decryption mechanisms
However, the network performance (capacity and/or delay) may be degraded
due to overhead

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

| 34
Common Encryption/Decryption Methods
Symmetric Key: Between two parties. Examples are DES, Triple-DES, AES, and
CBC (Cypher Block Chaining)
Public/Private Key: Example are Diffie-Hellman Key Exchange and RSA public
key encryption.
The public key is published and made available to receive encrypted
data.
Private key can be used to encrypt, authenticate and for digital
signatures
Public private key (Diffie-Hellman) can be used to establish symmetric
key, e.g., DES for symmetric key exchange.
Private Key: Private Keys are only known to specific key users in the enterprise
for encryption/decryption.
Public Key Infrastructure (PKI) is a security infrastructure that uses one or more
trusted Certification Authorities (CA) for managing, distributing, publishing the
keys and authenticating the key holders.
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

| 35
Diffie-Hellman Algorithm
Used to set up a shared session secret, from which cryptographic
keys are derived
Used to set up a security association (SA) in the IPsec protocol
suite

Note:
Alice picks a, g, and a large prime p; g need not be large, in practice it is usually either 2
or 5.
Alice derives A as in the figure. Keeping a private, Alice sends g, p, A to Bob.
Bob picks a b which is private to Bob and computes B and K as in the figure using g, b,
p and A. Bob then sends B to Alice.
Alice computes K using B it received, and P. 2/3a |and p.
01/01/11 2011 Stevens Institute of Technology

K.is then the shared key they use for encrypting and decrypting.
| 36
Diffie-Hellman Example
Alice and Bob agree to use a prime number p=23 and base g=5.

Alice chooses a secret integer a=6, then sends Bob A = ga mod p


A = 56 mod 23 = 8.

Bob chooses a secret integer b=15, then sends Alice B = gb mod p


B = 515 mod 23 = 19.

Alice computes s = B a mod p


196 mod 23 = 2.

Bob computes s = A b mod p


815 mod 23 = 2.

2 is used by both Alice and Bob as encryption key

Red denotes secret


P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

| 37
RSA Public and Private Key
1. Choose two distinct prime numbers p and q (preferably at random and of similar bit-
length)
2. Compute n = p * q
3. Compute = (p 1) * (q 1)
4. Choose an integer e such that 1 < e < and gcd(e, ) = 1: Then (n,e) is the Public
Key released.
5. Find d = e-1 mod(); i.e., d is multiplicative inverse of e, i.e., ed mod() = 1. Then (n,d)
is the Private Key
Encryption:
Alice sends public key (n, e) to Bob and keeps d secret
Bob want to send a message to Alice; Bob converts the message into an integer m where
0< m<n
using padding for extra security
Bob computes c = me mod(n) and transmits c to Alice
Decryption:
Alice computes m = cd mod(n) from which she can get the original message m.

Example:
P = 61, q = 53 => n = 3233 and = 3120. Choose e = 17 => d = 2753
Say the message after padding is 01000001 => m = 65:
Sender sends c = 6517 mod (3233) = 2790
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

Receiver calculates 27902753 mod (3233) = 65


| 38
Enabling Core Communication Technologies

LAN Network
MAN Network
WAN Backbone network
Cellular systems: LTE,LTE-A, WiMAX, etc.
VPN

Verizon Verizon Wireless


P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Enabling Wired Access Technologies

xDSL
Fiber
Verizon
Coax
Proprietary

Typically speaking wired access technologies are


expensive and cumbersome for deployment

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Enabling Wireless Access Technologies

WiFi
Bluetooth
ZigBee
UWB
Z-Wave
DASH7
6LoWPAN
IrDA
Cellular (e.g., GPRS, WCDMA, LTE, WiMAX, LTE-A, etc.)
Other wireless technologies:
LMDS: Typically expensive and not easy to deploy, only used for very specific
applications
Satellite (e.g., VSAT, LEO, MEO, GEO): Typically expensive and not easy to deploy, only
used for very specific applications
Tactical (tactical radios, traditional tactical telemetry, INET, etc.): Not relevant here

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
IrDA
Industry standard since 1993 comprising about 50 companies
Used in portable devices such as cell phones laptops, cameras, etc.
Provides physically secure wireless data transfer with low bit error rate
Standard and solutions provide PHY to Session Layer specifications (and higher)
Achievable data rates vary as per specific PHY used (all baseband transmissions)
SIR: 9.6 115.2 kbps
MIR: 576 kbps 1.152 Mbps
FIR: 16 Mbps
UFIR: 96 Mbps partially meets our requirements
GigaIR: 512 Mbps 1 Gbps fully meets our requirements
5/10GigaIR: Newest standard version:
Requires Line-of-Sight (LOS)
A minimum cone 15 angle can be an implementation/ease-of-use impediment!
In practice scintillation causes interruptions in service especially over longer distances
Effects of environment temperature, humidity, body temperature and sweating have not been fully tested
for short distances
Effects of extreme body motions (e.g., rolling on ground) must be considered/studied as well

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
IrDA: 5/10GigaIR
Simultaneous send/receive
Range of a few centimeters to many meters, Beaming: to 50 cm, Spotting: to 3m or more; wider
angles available Least susceptibility to LPI and LPD
new compatibility stacks (e.g., IrUSB, IrHDMI, etc.)
830-1550 nm wavelengths, eye-safe
power consumption of <5 mW to 1 W
BER < 10^-9
Provisioned versions of MIMO: Multiple two-way, and Shower: multiple receivers (e.g., warfighters
in proximity) possible

Many bidirectional high speed links


Delivers 10 Gb/s to each user Delivers 10 Gb/s across many users
Beams track user movement Each user can have separate channel
Mobile indoor communication Receivers can be2011
wide-angle tolerant
Stevens Institute of Technology
P. 2/3 | 01/01/11

|
WiFi: IEEE 802.11 network standards

Other IEEE 802.11 standards exist and deal with other issues such as security, etc.
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
WiFi and IEEE 802.11ac
IEEE 802.11ac is known as the 5th generation of WiFi

The standard was developed from 2011 through 2013 with approval and publication in 2014
Released in two steps: Wave-1 and Wave-2
Although the project title specifies enhancements for very high throughput for operation in
bands below 6 GHz but currently only operational in 5 GHz band
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
IEEE 802.11ac available frequency bands
Max EIRP Max EIRP
23 dBm; UNII-1 UNII-2
30 dBm;
Indoor only Power Control if > 27 dBm

US: Weather radar


Temporarily Not
Available

UNII-2 extended

Summary:
UNII-1,2: 5150-5350 MHz
UNII-3 UNII-2ext: 5470-5725 MHZ
UNII3: 5725-5825 MHz
Max EIRP
P. 2/3 | 01/01/11 36 dBm 2011 Stevens Institute of Technology

|
IEEE 802.11ac

IEEE 802.11ac provides many PHY layer advances that increases the data
rate considerably to 1.3 Gbps in wave 1 currently available commercially; it
provides
Higher bit rate up to 6.93 Gbps (wave 2) (Also available now but not with 8
antennas yet)
Up to 8 data streams using MIMO; APs up to 8 antennas
Multi-User-MIMO (MU-MIMO) on the downlink
Beamforming
20, 40, 80, 160 and 80+80 MHz bandwidths
An enhanced encryption technique for high bit rate real-time applications
Little change made to MAC layer which already is well-established
A change to RTS/CTS technique provides for dynamic channel allocation
IEEE 802.11ac provides a maximum of 866.7 Mbps (over 160 MHz) with
one antenna; using two antennas increases this rate to 1.733 Gbps

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
IEEE 802.11ac sample data rates

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Bluetooth Basics 1
Standardized short range wireless technology operating in the 2.4 GHz ISM band (2400 MHz
2483.5 MHz)
Standardized as IEEE 802.15.1, with backing from Ericsson, IBM, Intel, Toshiba and Nokia; V2.0 released
in 2004; V3.0 in 2009; V4.0 in June 2010
Patent licenses are required for implementation
Managed by Bluetooth Special Interest Group (SIG) with more than 19000 members
Versions and data rates
Ver1.2: 1 Mbps
Ver2.0+EDR (Enhanced Data Rate): 2 or 3 Mbps
Ver3.0+HS (High Speed): uses other air interfaces (IEEE 802.11; UWB dropped in 2009; others being
studied) to achieve 24 Mbps (only initiates sessions, a.k.a, AMP: Alternative MAC/PHY); Also includes
Core Specification Addendum 1
Ver4.0: Bluetooth Smart superset of Bluetooth Low Energy (BLE) previously known as WiBree
Range, depends on environment (multipath, etc.) and class of devices
Class 1: Max Tx power of 100 mW about a 100 m range; Min power 0 dBm
Class 2: Max Tx power of 2.5mW about a 10 m range; Min power -6 dBm
Class 3: MaxTx power 1 mW about a 1 m range; Min power N/A
An optional 1 W minimum Tx power is possible for all classes
Many chip manufacturers have Bluetooth chips in various forms, including Qualcomm,
Broadcom, TI, LS Research, Infineon, Nordic Semiconductor, NXP, Hitachi, etc.
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Bluetooth Basics 2
Uses frequency-hopping spread spectrum
Each channel is 1 MHz wide
Hopping over 79 channels (from 2402 MHz to 2480 MHz) at 1600 hops/sec
AFH (Adaptive Frequency Hopping): Avoids bad frequencies
Modulation scheme:
Ver1.2: 1 Mbps, GFSK, Modulation index = 0.321%, BT = 0.5
Ver2.0 and later: /4-Shifted-DQPSK (2 Mbps) and 8DPSK (3 Mbps)
Packet-based protocol (based on IEEE 802.3) with a Master-Slave
structure
One master can communicate with up to 7 slaves (a piconet)
Master/slave can switch roles
A device can be master in one piconet and slave in another to form a
scatternet, formed by bridging two or more piconets:
Bluetooth Profiles: Definitions of possible applications and general
specification of behaviors. Settings of parameters, etc. to save time for
setting up bidirectional links
Many useful profiles already defined in three categories: Generic Attribute
(GATT) profiles, BR/EDR ProfilesP. 2/3
and| 01/01/11
BE/EDR Protocols 2011 Stevens Institute of Technology

|
Bluetooth Basics Pairing and Bonding
Pairing used to join two devices together (e.g., for the first time) established
by
A users explicit request dedicated
Automatically generated general
During pairing the devices create a shared secret known as Link Key upon
successful exchange of which a bond is formed
Link key can be deleted by any device without the other(s) knowing
Bonded devices can authenticate the identity of each other and may encrypt
the data exchanged between each other
Pairing mechanisms
Legacy: V2.0 and before; Each device must enter PIN code
Secure Simple Pairing (SSP): V2.1 and above; can use PIN code for pairing with legacy
devices; Uses Public Key Cryptography and can guard against Man-in-the-middle
attacks
May work without user input
May use external links to establish pairing, such as NFC
With V2.1 and above encryption is required for all connections other than
Service Discovery Protocol
Prior versions had a weak security scheme
Encryption key is refreshed before expiration (not done in prior versions)
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Bluetooth Basics Partial list of profiles
Below are some example useful profiles
Profile Full Profile Name Description

BLP Blood Pressure Profile Enables a device to connect and interact with a Blood
Pressure Sensor device for use in consumer and
professional health care applications.

HRP Heart Rate Profile Enables a Collector device to connect and interact with a
Heart Rate Sensor for use in fitness applications.

VDP Video Distribution Profile Defines how a Bluetooth enabled device streams video
over Bluetooth wireless technology.

AVCTP Audio/Video Control Transport Protocol Describes the transport mechanisms to exchange messages
for controlling A/V devices.
AVDTP Audio/Video Distribution Transport Protocol Defines A/V stream negotiation, establishment and
transmission procedures
RFCOMM RFCOMM with TS 07.10
emulates the serial cable line settings and status of an RS-
232 serial port and is used for providing serial data transfer.

PXP Proximity Profile enables proximity monitoring between two devices.

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
DASH7
Open source wireless sensing standard originally funded by US DoD; in
March 2009 DASH7 Alliance was formed and has more than 50
participants in 23 countries
Follows the ISO 18000-7 for the license-free 433 MHz ISM band which
is available internationally; contends with proprietary standards like
ZigBee
Provides for multi-year battery life
Range: up to 2 Km; depends on Tx power and data rate; nominally
250 m at 1 mW transmit power and 100 kbps data rate
Indoor location accuracy of 1 meter
AES 128 shared key encryption
Data rate: up to 200 kbps
Designed primarily for BLAST applications: Bursty, Light-data,
ASynchronous, Transitive Fine for ancillary data but NOT for media
applications
Packet sizes are limited to 256 Bytes with multiple packet allowed but
discouraged
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Various Capabilities from DASH7 Viewpoint

ZigBee

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Z-Wave
Developed by Danish start-up Zen-Sys and acquired by Sigma
Designs in 2008
Supported by over 250 manufacturers worldwide
Examples: GE/Jasco, Ingersol-Rand,Sigma Design, and more
Low-power wireless technology optimized for reliable, low-latency
communication of small data packets
Specifically designed for home and light commercial environment
automation, e.g., appliances, home electronics, access control, etc.
Operates in the 900 MHz band (908.42 MHz in US)
Competes with cordless phones
Avoids WiFi, Bluetooth and other 2.4 GHz ISM band devices
Bandwidth: 9.6 or 40 kbps
Range: ~ 100 ft, possibly less indoors depending on
building material
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Z-Wave Contd.

Z-Wave uses a mesh network architecture


Can bypass obstacles though relaying
Devices can be added at any time by a process called
pairing
There is a concept of Network ID (32 bits) and Node
ID (8 bits)
A network can have up to 232 devices
Use network bridging if more nodes are required
Later versions of Z-Wave use explorer frames to
heal broken links
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
ZigBee

Specification for a suite of high level communication


protocols for Personal Area Networks (PAN)
The alliance now has more than 400 members and more
than 600 certified products
Based on IEEE 802.15.4
PHY and MAC layer specs for wireless PANs (WPAN)
Intended for low-cost, low-speed ubiquitous communication
with very little or no underlying infrastructure
Typically has a 10 meter range (up to 1600 meters depending
on output power and environment) and 250 kbps data rate;
although 20, 40 and 100 kbps is also possible
Lower data rates for yet lower power consumption
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
IEEE 802.15.4 Contd.

Three bands possible:


868.0 868.6 MHz
902 928 MHz (in North America, up to 30 channels)
2400 2483.5 MHz (worldwide, up to 16 channels)
Uses Direct Sequence Spread Spectrum (DSSS)(just as in CDMA)
2 versions:
In 868/915 MHz bands at 20 and 40 kbps, later revision adding 100 kbps
and 250 kbps
In 2450 MHz band at 250 kbps
Other modulation techniques added in later versions
Some other bands for China and Japan have been considered
Standard Ethernet frames are NOT used
Frames of only up to 127 bytes are supported
Use fragmentation for larger packets
P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
IEEE 802.15.4 Contd.

Two types of nodes:


Full-Function Device (FFD)
Reduced-Function Device (RFD), can only communicate
with FFDs
Topologies
Star
Peer-to-peer
Ad hoc
No specific routing defined

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Various ZigBee Specs.

ZigBee: core specification defines ZigBee's smart, cost-effective and


energy-efficient mesh network. It's an innovative, self-configuring, self-
healing system of redundant, low-cost, very low-power and even battery-
free nodes that enable ZigBee's unique flexibility, mobility and ease of use
ZigBee PRO: the most widely used specification, is optimized for low
power consumption and to support large networks with thousands of
devices
ZigBee IP specification: the first open standard for an IPv6-based full
wireless mesh networking solution and provides seamless Internet
connections to control low-power, low-cost devices. It connects dozens of
the different devices into a single control network
ZigBee RF4CE specification: designed for simple, two-way device-to-
device control applications that do not require the full-featured mesh
networking capabilities offered by the ZigBee specification. ZigBee RF4CE
offers lower memory size requirements thereby enabling lower cost
implementations

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
A Prototypical ZigBee System Diagram

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
ZigBee on Amazon

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
6LoWPAN

6LoWPAN: IPv6 over Low-power Wireless Personal


Area Networks; RFC 6282
Concept: IP should be available for the smallest
devices with limited processing power to enable
Internet-of-Things (i.e., M2M)
Defines encapsulation and header compression
mechanisms for IPv6 packets over IEEE 802.15.4

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Ultra-Wideband (UWB)
Radio technologies using a bandwidth of the lesser of 500
MHz or 20% of the center frequency
FCC now allows unlicensed use of UWB in the 3.1 GHz to
10.6 GHz range of spectrum provided that the emitted
power spectral density is at or below 41.3 dBm/MHz
this translates to an output power limit of about 74 pico-Watts per
MHz
This translates to about 37 micro-Watts of total output power over 500
MHz!!

So, range is limited BUT there is a LOT of


bandwidth available

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
UWB Cont.d

Two major contending technologies available to take


advantage of the spectrum available; all using ~ 500
MHz channels
Short time pulses: Technology provided mainly by Time
Domain a Huntsville, AL company
OFDM-based: ECMA-368 High Rate Ultra Wideband PHY
and MAC standard; technology provided by Starix
Technology and Alereon among others

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
UWB Cont.d

ECMA-368 offers an OFDM-based multi-band UWB


solution using 528 MHz channels (14 such channels are
available in the 3.1 to 10.6 GHz band of interest) with
Range of about 10 meters
Data rates of 53.3, 80, 106.6, 160, 200, 320, 400 and 480 Mbps!!
we are now talking streaming video!
AES-128 used for data encryption
Three security modes defined in ECMA-368: Non-secure (Mode 0),
Hybrid (Mode 1) and totally secure (Mode 2)
Key exchange is well defined in the standard
A decentralized MAC solution making addition and removal of
nodes easy and seamless

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

|
Other Technologies
Many other wireless technologies exist that can be used
for M2M communications. However, most of these
technologies are more bulky, expensive or power
consuming and are used only in specific circumstances
for niche applications, such as satellite for very remote
locations in commercial or tactical applications.
Examples of these technologies are:
LMDS
MMDS
TV White Space
Satellite

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

67 | 11/9/2017
Other Technologies 2
LMDS: Local Multipoint Distribution Service is a broadband
wireless access technology conceived as a fixed wireless, point-to-
multipoint technology for the last mile. It commonly operates 9.4" x 9.4" x 5.25"
on frequencies across the 26 GHz and 29 GHz bands. In USA, frequencies
from 31.0 GHz through 31.3 GHz are also used. The device shown provides
full-duplex Ethernet up to 630 Mbps.
MMDS: Multichannel Multipoint Distribution Service (a.k.a., AWS)
another wireless technology most commonly used in sparsely
populated areas, where laying cables is not economically viable. It
uses licensed frequencies from 2.5 GHz to 2.7 GHz. In US there are 31
channels each 6 MHz wide with throughputs of up to 38 Mbps

Satellite: Many options; e.g., LEO, MEO, GSO; Iridium, etc.

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

68 | 11/9/2017
PRACTICE PROBLEMS

P. 2/3 | 01/01/11 2011 Stevens Institute of Technology

69 | 11/9/2017

Вам также может понравиться