a) With the exponential growth of the internet and its related technology presently the Internet of Things (IoT) is considered as one of the most important fields in computing. The IoT can be defined as a world-wide network of connected objects through the internet which are operated with the help of the actuators, sensors and RFID devices.
IoT empowers the connected (through internet) objects to communicate as well as coordinate between them in order to make decisions for different type of application that includes home automation, industry automation, healthcare, and so on. The connected objects interact intelligently with other things by producing and receiving information with the help of smart algorithms on Internet. In addition to that, IPv6 (Internet Protocol Version 6) is utilized in orderto uniquely identify the objects.
It is expected that this network of IoT is going to expand with more applications in the future. According to one of the biggest tech giants Cisco, it is expected that by the year 2020, there will be almost 50 billion things connected to the internet.
The following report consist of discussion about the used communication protocol by the IoT devices, type of wireless connections used, contrast and comparison between the Sigfox and other network that can be used for Internet of Things.
b) IEEE 802.15.4: This protocol specifies the media access control and physical layer for LR-WPANs (low-rate wireless personal area networks) in which the IoT devices operate. This protocol is maintained by IEEE 802.15 working group (Khalil et al. 2014). Based on this protocol other IoT protocols like WirelessHART, ZigBee, ISA100.11a, , and MiWi specifications are developed.
Bluetooth: This protocols works inside 2.4 GHz ISM band. It uses frequency hopping technique for data transmission. This protocol provides data rate up to 3 Mbps with the maximum range 100m (Adelantado et al. 2017). Each of the application type using the Bluetooth consist of its own profile.
Weightless: it is a proprietary open wireless standard for which helps in the exchange of data among a base station with the numerous IoT devices surrounding it. This protocols uses wavelength radio transmissions in the unoccupied transmission channels while maintaining high level of security for the transmitted data.
c) As mentioned above there will be 30-50 billion IoT objects by the year 2020, therefore it is important to address each of this things or objects by some unique address. With the use of the IPv4, there were only 4.3 billion addresses were created with IPv4 which are presently exhausted. In case of using the IPv6, it provides and expands the digital address space to 3.4×1038(340 undecillion) (Vejlgaard et al. 2017). Even though technically there are less address spaces will be available than that as some of the address combinations are reserved.
Therefore, it can be said that, IPv4 addresses are unable to meet the demand for IoT objects whereas IPv6 gives IoT objects an efficient platform on which the objects can operate on for longer period of time. Therefore, the main advantages of using the IPv6 can be listed as
Resolving the NAT issues: Due to the lack of addresses provided by the IPv4, the stopgap solution NAT or Network Address Translation is adopted to accommodate the address space requirements (Liu et al. 2017). In this solution, the users share and borrow a single public address.
While this adopted solution enables single users to mount vast applications, it turns out to be totally impossible if a similar end-points or addresses are utilized by a wide range of users of the address; this problem would happen in an IoT network where similar sensors are to be utilized by numerous and independent users (Lauridsen et al. 2017). In addition to that this solution cannot be utilized to reach out a particular end-point (or device inside a network) from the Internet. With the larger address space for the IoT devices it will be easy to reach a particular end point in any network.
Improved security: The IPv6 provides end to end encryption for the transmitted data between the two nodes. In case of the IPv4, encryption of data as well as integrity-checking used in the virtual private networks (VPNs), on the contrary these are the compulsory components for IPv6. 1
RFID: Radio Frequency Identification or the RFID tags are able to store data which are usually attached to the devices and communicates with the reader devices through internet. Typically, the range of this devices are less than a meter. This tags can be passive, active, or assisted passive.
NFC: Near field communication (NFC) is useful in case of small range communication mainly used for the check-in system in an industry or at home which can be controlled remotely (Ya’acob et al. 2014). 2
For LoRaWAN it uses the physical layer chip which enable the networking of the transmitted data from the Io devices.
SigFox uses the slow modulation rate to reach the devices at a longer range.
On the other hand, the RPMA uses the silicon technology.
Application for the devices
LoRaWAN: Mostly used for the devices that used in the applications which require low battery solutions and less frequent communication between them.
Sigfox: The Sigfox is used for smart dustbins, water meters or as parking sensors in the parking area.
RPMA: The RPMA is best for the IoT devices that are used in the pedestrian traffic, environmental monitoring, air quality etc.
LoRaWAN : The range for is 2-5kms in the urban areas and 15km in the rural area (Lauridsen et al. 2017).
SigFox: In case of the Sigfox it ranges from 30-50 km in rural area and 3-10km in Urban areas.
RPMA: For RPMA, the range is 500 Kms.
For LoRaWAN , This networks should not be used in case of the applications where low latency and bounded jitter in the network is required.
SigFox: Its Downlink competency is limited. In addition to that the it has issue with signal interference by other mediums.
Compared to the above two networks there are no such issues are identified till now. 4
Conclusion
Presently the field of IoT is at its emerging stage. With the development in the field of the internet the core infrastructure layers are presenting the signs of maturity from the aspects of performance and security. However, a lot of development is going to happen in this area of IoT communication technologies and applications. In addition to that the use of the IPv6 technology is discussed in this paper which can be described as a technology that delivers numerous features, such as end-to-end security and most importantly a larger address space which can be beneficial in the context of integrating multiple IoT devices in house or industry automation. In this paper we also discussed compared and contrasted the LoRaWAN, SigFox, RPMA networks for connecting the IoT devices. The comparison is done respectively from the aspects like features, applications, range etc. Each of this technologies are running at its best wherever applicable. It is considered as very hard to go with a single technology for all IoT applications. With the acceptance of the IPv6 and related IoT technologies the selection of the different networks for specific applications can be segregated in future. 2
References
Adelantado, F., Vilajosana, X., Tuset-Peiro, P., Martinez, B., Melia-Segui, J. and Watteyne, T., 2017. Understanding the limits of LoRaWAN. IEEE Communications Magazine, 55(9), pp.34-40.
Khalil, N., Abid, M.R., Benhaddou, D. and Gerndt, M., 2014, April. Wireless sensors networks for Internet of Things. In Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference on (pp. 1-6). IEEE.
Lauridsen, M., Vejlgaard, B., Kovács, I.Z., Nguyen, H. and Mogensen, P., 2017, March. Interference measurements in the European 868 MHz ISM band with focus on LoRa and SigFox. In Wireless Communications and Networking Conference (WCNC), 2017 IEEE (pp. 1-6). IEEE.
Liu, X., Zhao, M., Li, S., Zhang, F. and Trappe, W., 2017. A Security Framework for the Internet of Things in the Future Internet Architecture. Future Internet, 9(3), p.27.
Vejlgaard, B., Lauridsen, M., Nguyen, H., Kovács, I., Mogensen, P. and Sørensen, M., 2017. Coverage and Capacity Analysis of Sigfox, LoRa, GPRS, and NB-IoT. In Vehicular Technology Conference. IEEE.
Ya’acob, N., Goon, M.M.M.E., Noor, M.Z.H., Yusof, A.L. and Idris, A., 2014, September. RFID (NFC) application employment on inventory tracking to improve security. In Wireless Technology and Applications (ISWTA), 2014 IEEE Symposium on (pp. 176-181). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download