8 hours 10 minutes
Hi, I'm Matthew Clark, and this is less than 3.5 I o t communications Part one.
There are a lot of communication protocols when it comes to I O. T.
And over the next two lessons, we're going to discuss these 10 I ot communication protocols.
We'll focus on the bolted pink ones in part one and the white ones in Part two.
Now put these in a specific order. Let's see if you can figure out what that order is by the end of our second lesson,
and I have most likely left off your favorite protocol. So my apologies in advance.
Well, let's get started
when planning for communication within the i o T ecosystem. There are many things to consider, like frequency of transmission and range data rate application requirements,
existing communication protocols that may already be in use,
ease of use for the consumer, the cost involved or and, of course, security considerations.
And there are many different protocols communication types that can address all of these concerns.
So let's start our discussion with near field communications.
This is a low speed network protocol used to connect electronic devices at really small distances.
It uses a tag in a reader. The NFC tag could be either active or passive,
but the reader is always an active mode.
The NFC devices operate and half duplex mode, and so one device transmits while the other receives. Uh, this is also known as listen before talk.
It's used in contact with payment systems. It could be used in identity documents and key cards.
Bluetooth pairing for joining WiFi
Water metering appliance sights set up,
uh, the specs It operates at a frequency of 13.56 megahertz.
The range is 10 to 20 centimeters. Data rates could be as low as 106 or his highest 424 kilobytes per second.
So for each one of these will use smiles and frowns instead of pros and cons, because sometimes of something that it could be a smile can also be around. Um um, it's used in payment systems. That's the smile. It's generally more secure than credit card magnetic strips
on and can be used with the pin.
It takes advantage of mobile wallet, so Google and Apple mobile wallets that could be used with that
it doesn't require a search and pair procedure like Bluetooth. Um,
and there's no special software that's needed doesn't require Emmanuel configurations or settings. It's compatible with existing R F I D networks. Another great smiles. It requires less power than Bluetooth.
Um, so some of the frowns it's considered to be an expensive technology for large scale deployments.
And there are some security concerns, not necessarily with the protocol itself, but how the protocols used or in the applications that typically use the protocol, like thes wallets from Google or Apple.
And it's talking about the kind of the amount of data and the type of data that's stored on the device within those wallets and what happens when the device gets stolen. And again, not very big frowns in my book related to the protocol itself, because really, those air application issues,
so let's talk about Bluetooth low energy.
Um, this is a wireless personal area network protocol. It's designed by the Bluetooth sig or the special interest group. It's used for a short range communication.
Bluetooth works in the 2.4 gigahertz pan and use frequency hopping
as a data rate of 1 to 2 megabits per second and a maximum range of about 20 m,
and that's for class to class. One could go up to 100 m, a serious battery implications. And, quite frankly, that's probably not gonna be used in I O T
So Bluetooth low energy is formally known as Blue. Too smart.
The use case is for compact battery operated applications like a fitness watch. You see this used a lot in the wearables market. Blood pressure monitors, fitness tracker smartwatches, wearable panic buttons, things like that. We can also see it in the industrial monitoring
sensors, which may need to run on batteries for longer periods of time, like months or even years.
Uh, you might see this also in public transportation, APS
and so smiles and frowns smiles here. It's really good low power communication protocol.
The radio itself has turned off a much as possible.
It's in small chunks of data at really low transfer speeds.
Bluetooth low energy is not really designed for file transfer. It's more suitable for small chunks of data.
There's a low cost to use this, the modules and chips or relatively inexpensive when compared to other similar technologies.
There's no cost to access the specifications. That's That's always a great thing. You don't have toe by a license or join the club in order to get the specs,
Um, and it's in use right now. This isn't something that just might take off one day. In fact, it's heavily used, making it a pretty good, pretty safe protocol choice if you had to choose one.
And so let's take a look at the frowns here. The frowns, our course data throughput. But that's also what makes it a smile When it comes to battery life.
Eso you have take the good with the bad.
The range here is 2.4 gigahertz. So when you're going through walls like wood versus break or metal water, all these three things that can affect the range
and the so can the antenna and the enclosure design that can impact range as well.
So even the way that you hold some really poorly designed I O. T devices like the devices orientation. If I held it here, there, it can impact range as well.
Eso the thing. One of the things with Gateway of Bluetooth low energy is that it requires the gateway. If you need to communicate out to the Internet, you're gonna have to convert that from a wireless, uh, personal area network protocol out to an Internet protocol.
Let's talk about Z Wave. Next. It's Ah, low power R F technology, mostly used in home automation products
like smart thermostats, lighting locks, sensors,
the targets. Reliable, low Leighton See communication. A small data packets. It's considered a secure protocol. It uses 128 bit A s symmetric encryption.
The specs on Z Wave
um, include frequency of about 900 megahertz. The range is about 30 m are 100 ft
Z wave documentation state 100 m or 328 ft in the open air on building materials they say will reduce that range. But since it's usually mostly used indoors, we're going to go with a lower range here
of about 30 m. Data rates that operates about 100 kilobits per second,
so smiles and frowns smiles. It's a standardized protocol. All devices speak the same language.
It helps with compatibility and communication between devices. It's scalable. Um, it can have high note counts. In fact, it can have 232 devices on bond but it could only use four hubs,
so it supports a full mesh without the need for a coordinator node, either. So frowns. Um, it's a premium technology at a premium price, so it's gonna cost to implement this.
You can't directly connect your phone to this because your phone doesn't have a Z wave antenna s, so it requires a smart hub, which increases three complexity of the overall solution.
It is battery intensive. It consumes more power compared to other similar products. Eso You may have to replace the battery more often, and it is considered a closed system, right?
Eso software patches can only be done by Zewe. For example.
Our last communication protocol will be WiFi. We're all pretty familiar with this one. It's a wireless land technology that's based on a 2 2011,
and it's a pretty common connectivity choices for lots of I O T devices with hardy infrastructures it doesn't require hubs and devices can connect directly to the Internet as quick data rates to take a look at the smiles and frowns. The smiles are quick data rates. It could handle large amounts of volume.
It's a range is about 30 m indoors and operates on the 2.4 and five gigahertz bands for frowns. If I does tend to consume except a lot of power
in this lesson, we discussed coyote communication protocols, including NSC, which is used mainly with payment systems. Bluetooth, Ellie or Low Energy
Z Wave, which is used mostly with home automation and WiFi.
I'll see you next time.
Amazon Web Services (AWS)
AWS Test helps to effectively assess the skills of the AWS developers consisting knowledge of ...
ISACA CISM - Certified Information Security Manager
The ISACA Certified Information Security Manager (CISM) practice test from CyberVista helps students to prepare ...