Unit 2 Studylib
Unit 2 Studylib
IOT PROTOCOLS - Protocol Standardization for IoT – Efforts – M2M and WSN Protocols –
SCADA and RFID Protocols – Issues with IoT Standardization – Unified Data Standards –
Protocols – IEEE802.15.4–BACNet Protocol– Modbus – KNX – Zigbee– Network layer – APS
layer Security
However, IoT does not come without risks and challenges. While concerns over security and data
privacy continue to rise, the lack of IoT standards remains one of the biggest hurdles. The
increasing number of legacy, single-vendor, and proprietary solutions cause problems with
disparate systems, data silos and security gaps. As IoT successes become more dependent on
seamless interoperability and data-sharing among different systems, we want to avoid the scenario
of a fragmented market with numerous solutions that simply don’t work with each other.
Simply put, a standard is a published document that specifies a product’s functionality and verifies
its quality. It establishes a transparent, consistent and universal understanding of a technology by
eliminating inefficient variety in the marketplace. Standards, therefore, enhance compatibility and
interoperability in product development, fuel global adoption, and production, and accelerate time-
to-market.
To better illustrate the importance of standards, let’s look at light bulbs as a simple example.
Nowadays, you can easily go to any store and buy any brand of light bulb, assuming that it is
compatible with your lamp as the bulb base and threads have been standardized. This greatly boosts
user demand, allowing manufacturers to ramp up their production and reduce costs leveraging
economies of scale.
Even before IoT becomes a worldwide phenomenon, there have been a number of standardized
wireless technologies that are widely acknowledged and adopted on a global scale. The most
successful examples include Wi-Fi (based on IEEE 802.11a/b/g/n specifications for wireless local
area networks), Zigbee (based on IEEE 802.15.4 specification for low-rate wireless personal
networks) and GSM/UMTS/LTE (based on 2G/3G/4G mobile broadband standards developed by
3GPP).
However, these previously existing standards, are not optimized for a majority of large-scale IoT
deployments that require interconnection of huge amounts of battery operated sensors (end nodes).
Limited range and coverage, low penetration capability, power-hungry transmissions and high
costs are factors that hamper their applicability in many use cases. By exactly filling these gaps,
the arising group of low power wide area (LPWA) technologies are now taking over the IoT stage.
The problem is, most existing LPWA networks – typically the ones operating in the license-free
spectrum – are proprietary solutions that do not implement a recognized industry-standard
protocol. By making their technical specifications publicly available on a royalty-basis, many
LPWAN providers are attempting to claim their technologies as “open standards.” Nevertheless,
this is not really the case.
Strictly speaking, a standard – or let’s say an industry standard – must undergo a stringent
evaluation process by an established Standards Development Organization (SDO). This guarantees
the quality and credibility of the technology. Key global SDO examples include ETSI, IEEE, IETF,
3GPP, etc. So far, technologies that actually implement rigorous LPWA standards published by
SDOs have been Narrowband-IoT/LTE-M/EC-GSM (standardized by 3GPP) and mioty (based on
Low Throughput Networks – TS 103 357 specifications by ETSI).
• Guaranteed Quality and Credibility – IoT standards ensure that products and solutions
are fit for their intended purposes. In other words, communication technologies that adhere
to rigorous standards deliver high Quality-of-Service, robustness against interferences and
industry-grade security to ensure reliable and secure transmission of massive IoT sensor
data at the edge.
• Interoperability and Innovation Flexibility – Standardized communication protocols can
be programmed on various commodity, off-the-shelf hardware (i.e. chipsets, gateways) to
support multi-vendor solutions and the interconnection of heterogeneous devices. Beside
promoting interoperability in the long run, this helps end users avoid commercial risks of
vendor lock-in, whereby a single supplier retains total control over functionality design and
future product/technology innovation.
• Global Scalability – Industrial users with worldwide operations want to adopt IoT
connectivity that can be implemented across their global facilities. Standardized solutions
function universally and help minimize installation complexity, thereby safeguarding long-
term investment.
With a vast assortment of IoT connectivity solutions available on the market, choosing the right
technology can determine the success of your digital transformation. By opting for an industry-
standard IoT solution, you can secure the longevity and ROI of your IoT architecture by making
it quality-assured, vendor-independent and scalable worldwide.
One of the new technologies that’s part of the Internet of Things is Machine-to-Machine (M2M)
communications. M2M, though not well-defined, is a set of methods and protocols to allow devices
to communicate and interact over the Internet (or other network) without human intervention.
M2M is sometimes considered to be low-overhead short-range wireless communication between
machines, utilizing protocols with much less overhead than full-blown TCP/IP. Many M2M
applications involve low power wireless devices with limited computing power and narrowly-
defined functionality. Low-overhead protocols have been devised for them, including Message
Queue Telemetry Transport (MQTT), Constrained Application Protocol (CoAP), and Open
Mobile Alliance Light Weight M2M (OMA LWM2M). CoAP is actually a specialized web
transfer protocol designed for applications such as smart energy and building automation. There
is, of course, no reason why IoT devices cannot use high-powered CPUs and wide bandwidth, and
in many applications this is clearly necessary, such as smart cars interacting with external servers.
So IoT spans a huge range from very simple low-powered specialized devices and sensors with
low bandwidth needs to complex, high-powered devices in large high-bandwidth environments.
WSNs: Wireless Sensor Networks
IoT configurations often involve sensors, which can be connected by wireless networks. Such
sensor networks are termed “Wireless Sensor Networks” or WSNs. A WSN comprises spatially
distributed autonomous devices equipped with sensors, connected through a wireless network to
some type of gateway. The sensors typically monitor physical or environmental conditions. The
gateway communicates with another set of devices that can act on the information from the sensors.
Application examples include patient monitoring; environmental monitoring of air, water, and soil;
structural monitoring for buildings and bridges; industrial machine monitoring; and process
monitoring. The wireless network could be WiFi or Bluetooth, and the protocol one of the three
listed above.
The boundaries between these networks are not clearly drawn, and in practice they overlap
considerably. Figure 3 shows the relationship schematically:
Goals of IoT
In the short term, at least, the goals of IoT are straightforward, as illustrated in Figure 4:
Figure 4. Goals of IoT
The objectives revolve around efforts to reduce costs and save time. But they also promise to make
new things possible that are not feasible now, such as devices for improved patient monitoring and
improved transportation systems utilizing autonomous vehicles and other modes.
There are many technologies that support IoT and make possible its steady advance. A partial list
includes the following:
• Cheap and ubiquitous telecommunications
• Smart software
• Smart devices
• Cheap memory
• Cheap and extremely powerful microprocessors
• Cloud Computing
• Big data, event stream processing, real-time analytics
• Machine Learning
• Wireless sensor networks
• Low power short-range and wide area wireless networks
• Embedded systems
• Automation and control Systems
• Existing and emerging telecom technologies: Li-Fi, LPWAN, LTE-Advanced, 5G, WiFi-
Direct, BLE, ZigBee, Z-Wave, Thread, HaLow, …
SCADA (Supervisory Control and Data Acquisition) and RFID (Radio Frequency Identification)
protocols are two critical technologies that have transformed various industries. SCADA systems
allow for remote monitoring and control of industrial processes in the oil and gas, energy, and
manufacturing industries. These systems collect data from sensors and deliver it in real-time to
human operators, allowing them to monitor and adjust the process as needed.
On the other hand, RFID is a wireless technology that communicates with tags attached to objects
via radio waves. These tags contain one-of-a-kind identification codes that allow the system to
track the object’s location, movements, and other data. RFID has a wide range of applications,
including supply chain management, inventory control, and security and access control.
SCADA and RFID technologies have significantly improved industrial processes, making them
more efficient, safe, and secure. We can expect even more advancements and opportunities in the
future as these technologies continue to evolve.
Understanding SCADA Protocols: Communication and Control Systems
SCADA (Supervisory Control and Data Acquisition) protocols are used in industrial processes to
enable communication and control. Sensors, controllers, and communication devices are among
the components of a SCADA system. The SCADA protocols used to control and communicate
with these components are critical for ensuring that industrial processes run efficiently and safely.
SCADA communication protocols are used to transfer data between SCADA system components.
Modbus, DNP3 (Distributed Network Protocol), and IEC 60870-5 are the most common
communication protocols used in SCADA systems. These protocols define the structure of the data
being transmitted, the type of data, and the method of data transfer.
Control protocols are used to manage the various components of a SCADA system. OPC (OLE
for Process Control), BACnet (Building Automation and Control Networks), and SNMP are the
most common control protocols used in SCADA systems (Simple Network Management
Protocol). These protocols are used to configure devices, set and adjust system parameters, and
manage alarms and events.
SCADA systems allow for remote monitoring and control of industrial processes while providing
real-time data to human operators. These systems are used in various industries, including energy
and water treatment, manufacturing, and transportation. SCADA protocols allow these systems to
operate seamlessly, ensuring the process’s efficiency and safety.
Understanding SCADA protocols is critical for ensuring that industrial processes run efficiently
and safely. Properly selecting and implementing communication and control protocols are critical
for a SCADA system’s integrity. SCADA systems are poised to continue revolutionizing industries
and providing critical support for industrial processes as new protocols, and technological
advancements emerge.
The most common RFID protocols are low-frequency (LF), high-frequency (HF), and ultra-high-
frequency (UHF). LF RFID operates at a frequency of 125-134 kHz and is used for short-range
communication, typically up to 10 cm. HF RFID operates at a frequency of 13.56 MHz and is used
for short- to medium-range communication (up to 1 meter). UHF RFID operates at a frequency
range of 860-960 MHz and is used for long-range communication up to several meters.
Aside from these, several RFID standards are used for identification and tracking. The most widely
used standards for HF RFID are ISO 14443 and ISO 15693, and ISO 18000-6c for UHF RFID.
These standards specify the RFID system’s frequency, data rate, and encoding. They also define
the RFID tag’s data structure, including the identification number, manufacturer code, and other
pertinent information.
RFID protocol and standard implementation vary depending on the application. For example, LF
RFID is commonly used in animal identification, whereas HF RFID is used in access control,
payment systems, and inventory management. UHF RFID is used in supply chain management,
asset tracking, and other applications that require long-range communication.
RFID protocols and standards are critical in identifying and tracking objects across industries. The
appropriate protocol and standard are chosen based on the specific application requirements. RFID
is poised to continue revolutionizing industries and enabling a new level of visibility and control
as technology advances, and new standards emerge.
The lack of standardization is a problem for the Internet of Things (IoT) because it makes it
difficult for different devices and systems to communicate and work together seamlessly. IoT
devices are made by many different manufacturers and can use a wide variety of communication
protocols and data formats, making it challenging to develop a unified standard that works across
all devices.
Lack of standardization
The lack of standardization creates interoperability issues, which can lead to compatibility
problems and limited functionality.
For example, if two IoT devices cannot communicate with each other because they use different
protocols or data formats, they cannot work together to achieve a common goal.
The absence of standardization can also cause security risks, as it can be easier for hackers to
exploit vulnerabilities in systems that are not using standard security protocols.
In addition, it can hinder the development of new applications and services that could bring value
to businesses and consumers.
Overall, the lack of standardization in the IoT industry can lead to reduced efficiency, increased
costs, and a slower rate of innovation. Therefore, there is a need for standardized communication
protocols, data formats, and security measures to ensure that the IoT can reach its full potential.
Compatibility Issues
Compatibility problems can be a common issue with IoT (Internet of Things) devices. There are
several reasons why compatibility issues can arise in IoT, including:
• Protocol incompatibility: IoT devices use different communication protocols, which can
lead to incompatibility issues between devices from different manufacturers.
• Security protocols: IoT devices have different security protocols, which can also lead to
incompatibility issues. For example, if one device uses a more secure encryption protocol
than another, they may not be able to communicate with each other.
• Firmware updates: IoT devices often receive firmware updates, which can sometimes cause
compatibility issues if one device's firmware is updated while the other remains on an older
version.
• Power requirements: IoT devices have different power requirements, which can lead to
compatibility issues. For example, if one device requires more power than another, they
may not be able to communicate with each other.
Introduction to Unified Data
Unified data is when a company merges its many fragmented data sources into one, single
central view. Unified data provides a more complete and accurate picture of a company’s data,
but unifying the data is far from simple. To tie data sources together, companies need a system to
unite them, such as an analytics platform.
IEEE 802.15.4 is a member of the IEEE 802.15 standards for Wireless Personal Area Networks,
which includes protocols such as IEEE 802.15.1 (Bluetooth), and IEEE 802.15.3 (UWB Wireless).
IEEE 802.15.4 specifies the MAC and PHY Layers for Low-Rate Wireless Personal Area
Networks (LR-WPAN).
IEEE 802.15.4 is currently used as a medium for a wide variety of network protocols, including
ZigBee, 6lowPAN and TinyOS.
History
IEEE 802.15.4 was published by task group 4 (TG4) in 2003, and following the formation of IEEE
802.15 TG4b, has since gone into hibernation. TG4b was formed to revise and improve upon the
original IEEE 802.15.4 specification, their enhancements were approved and published in June
2006 as IEEE 802.15.4-2006.
In March 2005, an extension to the IEEE 802.15.4 specification, IEEE 802.15.4a was released,
specifying two additional optional PHYs with improved precision in ranging and locating.
BACnet Protocol : Architecture, Working, Types, Objects & Its Applications
The secondary part describes messages that can be transmitted across a network of
computers to check and manage such equipment. The final part describes a set of
suitable LANs which are used for conveying BACnet communications.
It also specifies how data is signified on the network as well as the services that are
utilized to transmit data from one node of BACnet to another node. It also has messages
that recognize network & data nodes.
BACnet is used as a tool by owners of buildings & system specifiers for the
specification of the interoperable system. This protocol does not change the need for
indicating what a consumer needs. So, it provides simply some consistent tools to assist
the creation & specification of systems that can interoperate.
BACnet protocol is used in all types of automated building systems. So, there are
interoperable products available within different categories like security, fire, lighting,
elevators, HVAC, etc. This protocol simply addresses the interoperability goal through
simply defining a general working model of automation devices, a technique used for
defining the data that they include, & also a technique used for explaining protocols
that a single device can utilize to inquire one more device to execute some preferred
action.
The above architecture is the BACnet protocol stack which includes different layers as
shown in the diagram. This protocol is a collapsed version of the OSI stack. The
transport and session layers are not used. The application layer takes on the functions
of these two layers.
Application Layer
BACnet does not separate presentation as well as application layers. So it takes care of
reliability & sequencing or segmentation mechanisms generally connected with both
the session & transport layers. BACnet includes devices like objects to exchange service
primitives which are described with ASN.1 syntax & serialized with ASN.1 BER.
• To the control system of the elevator to send all elevators to the ground floor
immediately.
• To the paging system of the building to transmit an audible voice signal to inform
occupants of the building wherever the blaze was detected & how to go out from
the building.
• From the audio or visual systems of the building to flash messages on TV
displays within the conference rooms.
• To an interface of phone system for sending alerts through text message to the
facilities & engineering teams of the building.
With BACnet protocol, all the data is signified in terms of an object. So each object
signifies data regarding a device or component. Signifying information like an object
simply provides the benefit that the latest objects can be formed otherwise existing
objects can be modified based on the requirements of the user.
BACnet Object
BACnet object is a concept that allows the communication as well as a group of data
related to i/ps, o/ps, software & calculations to be executed. The BACnet Object can
visible itself in different ways like Single Points, Logical Groups, Program Logic,
Schedules & Historical Data.
The BACnet objects are both physical & non-physical. For instance, a thermostat is
considered a physical concept & the HVAC system is considered the output device. The
best example of a non-physical concept is the maintenance schedule of an HVAC in the
software form.
All BACnet objects include different properties of information exchange & commands.
These properties represented in a tabular format with two columns. The first column
includes the name of the property & the second column provides the value of the
property. In the second column, the Information can exist in a write-enable/read-only
format.
The BACnet object example for a binary input of a sensor within a building is shown
below.
In the above table, the first four properties are necessary by the BACnet standard
whereas the last two properties are simply considered optional. So, these optional
objects are frequently necessary by a developer, however, those objects should match
the standard of BACnet. The example will show simply a few of the properties of an
object. In real life, particularly in a building automation setting, different properties
would be there within the object. Most experts & sources specify there are 23 standard
BACnet objects utilized in building automation systems. So, standard objects operate
in the BACnet standard.
The 23 standard BACnet objects are Binary i/p, Binary o/p, Binary value, Analog i/p,
Analog o/p, Analog value, Averaging, LifeSafety Zone, LifeSafety Point, Multi-State
i/p, Multi-State o/p, Multi-State value, Loop, Calendar, Notification Class, Command,
File, Program, Schedule, Trend Log, Group, Event Enrollment & Device.
Once a set of objects executes a specific function then it is known as a BACnet device.
All these objects should include an identifier, data type & additional information like
read-only, modified through other devices, and many more.
Different Types
The different types of BACnet protocols are discussed below.
BACnet/IP
This is normally used with existing VLAN & WAN networks. So the devices can
connect directly to hubs or Ethernet switches. This LAN is a high-performance & fast
type, but very costly. BACnet/IP utilizes UDP/IP for compatibility through existing IP
infrastructure. Once BACnet/IP is utilized with several IP subnets, then extra device
functionality known as BBMDs (BACnet Broadcast Management Devices) is necessary
to handle broadcast messages of inter-subnet BACnet.
BACnet MS/TP
This kind of LAN uses EIA-485 twisted pair for signaling up to 4k feet. So it is a very
famous type of BACnet LAN which is used for unitary as well as application-specific
controllers. This BACnet MS/TP is not expensive.
BACnet Point-to-Point
This BACnet Point-to-Point is simply used over the networks of dial-up telephones.
Generally, thus direct EIA-232 connection is no longer used for a direct Ethernet
connection.
• It includes a front panel that has LED for indication of quick diagnostic
• Windows-based configuration utility.
• It supports up to 100 BACnet devices interface to TCP Master/Slave or Modbus
RTU.
• It has the capacity for interfacing up to 5K mapping points.
• It supports the COV bit packing feature.