Getting connected in your Domain: IoT Communication Protocols—Network Protocols, Why does it “MATTER”
The rise of smart appliances as a staple in modern homes and IT infrastructure as well as interconnecting sensors all around us creates the need to understand IoT. A well-designed mesh network can help users extend Wi-Fi coverage at a relatively low cost, scale their connected spaces, and gain from emerging use cases in IoT. Internet of Things
Protocols allow nodes to have a structured way to interact between them. Since the needs and use cases of IoT devices have quickly evolved over the last few years, so have the protocols. All in all, there are mainly two types of protocols: network and data. This classification comes from the OSI (open systems interconnection) model, widely used in IT communication networks.
Matter, formerly known as Project Connected Home over IP (Project CHIP), is an open-source, royalty-free connectivity standard developed by the Connectivity Standards Alliance (CSA). Matter is designed to enable interoperability among smart home and IoT devices. The primary goal is to create a unified standard that allows devices from different manufacturers to work seamlessly together. Here are some key points about the Matter IoT protocol:
- Interoperability:
- Matter aims to create a standard for interoperability among IoT devices, irrespective of their manufacturer. This means that devices certified with the Matter standard should be able to communicate and work together seamlessly.
- Supported Communication Technologies:
- Matter is built on existing, proven communication technologies, including IP (Internet Protocol), Wi-Fi, Ethernet, and Thread. This choice of technologies allows for both wired and wireless connectivity options.
- Device Types:
- Matter is designed to be versatile and support various device types commonly found in smart homes, such as lights, door locks, thermostats, and more. It is suitable for both battery-powered devices and devices that are continuously powered.
- Security:
- Security is a fundamental aspect of the Matter protocol. It includes end-to-end encryption, secure device onboarding, and a strong focus on protecting user privacy. The protocol leverages modern security best practices to ensure a secure and trustworthy ecosystem.
- Open Source:
- Matter is an open-source project, allowing developers to contribute to its development and review its source code. This transparency promotes community collaboration and helps ensure the protocol’s robustness.
- Backed by Industry Leaders:
- Matter is backed by major industry players, including Apple, Google, Amazon, and other members of the Connectivity Standards Alliance (formerly known as the Zigbee Alliance). This broad industry support is crucial for the widespread adoption of the standard.
- Certification Program:
- The Connectivity Standards Alliance provides a certification program to ensure that devices claiming Matter compatibility adhere to the standard’s specifications. This certification program helps guarantee a consistent and reliable user experience across devices.
- Application Layer:
- Matter defines a common application layer protocol that devices can use to communicate. This application layer is crucial for enabling interoperability while allowing manufacturers flexibility in implementing their devices.
- Integration with Existing Ecosystems:
- Matter is designed to integrate with existing smart home ecosystems. This means that devices built with Matter should be compatible with popular smart home platforms and applications.
Matter represents a collaborative effort within the industry to address the challenges of interoperability in the smart home and IoT space. Its open nature, strong security features, and support from key industry players position it as a promising standard for creating a more connected and user-friendly IoT ecosystem.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers. These layers, often referred to as the OSI layers, help in understanding and designing network architectures. Each layer is responsible for specific tasks, and communication between layers is well-defined. Here’s an overview of the seven layers of the OSI model:
- Physical Layer (Layer 1):
- Function: Transmits raw binary data over a physical medium (e.g., cables, wireless signals).
- Responsibilities: Defines the physical characteristics of the transmission medium, such as voltage levels, data rates, and connectors.
- Data Link Layer (Layer 2):
- Function: Transmits frames of data over a physical link.
- Responsibilities:
- Logical Link Control (LLC): Manages flow control, error checking, and framing.
- Media Access Control (MAC): Controls access to the physical medium, including addressing and error detection.
- Network Layer (Layer 3):
- Function: Manages routing and addressing, facilitating end-to-end communication between devices across different networks.
- Responsibilities: Determines the optimal path for data to travel through the network, using logical addresses (IP addresses).
- Transport Layer (Layer 4):
- Function: Ensures reliable and error-free data transfer between devices.
- Responsibilities:
- Segmentation and Reassembly: Breaks down larger messages into smaller segments for transmission and reassembles them at the destination.
- Flow Control: Manages the flow of data to prevent congestion.
- Error Detection and Correction: Detects and, if possible, corrects errors in data transmission.
- Session Layer (Layer 5):
- Function: Establishes, maintains, and terminates communication sessions between applications.
- Responsibilities: Manages dialog control, allowing communication to be structured and synchronized.
- Presentation Layer (Layer 6):
- Function: Translates data between the application layer and the lower layers, ensuring compatibility between different systems.
- Responsibilities: Handles data encryption/decryption, data compression/decompression, and character set conversions.
- Application Layer (Layer 7):
- Function: Provides network services directly to end-users or applications.
- Responsibilities: Supports application-specific functions such as file transfers, email, and network management. It serves as the interface between the network and the user’s software.
The OSI model is a reference framework, and in practice, not all layers are implemented separately in every networking technology. For example, the Internet often uses a simplified four-layer model known as the TCP/IP model, where some of the OSI layers are combined. However, the OSI model remains a useful tool for understanding the functions and interactions within a network architecture.
Due to the variety of data types and applications, different communication and network protocols are needed.
In the realm of IoT (Internet of Things), various communication protocols play crucial roles in enabling devices to communicate with each other and with central systems. These protocols operate at different layers of the OSI (Open Systems Interconnection) model. Here are some key IoT network protocols:
- MQTT (Message Queuing Telemetry Transport):
- Layer: Application Layer (Layer 7)
- Overview: Lightweight and efficient publish/subscribe messaging protocol. It is designed for constrained devices and low-bandwidth, high-latency, or unreliable networks. MQTT is widely used in IoT for real-time communication.
- CoAP (Constrained Application Protocol):
- Layer: Application Layer (Layer 7)
- Overview: Designed for constrained devices and networks. CoAP is a lightweight, RESTful protocol that facilitates communication between devices and is particularly suitable for IoT applications. It runs over UDP, making it efficient for resource-constrained devices.
- HTTP/HTTPS (Hypertext Transfer Protocol/Secure):
- Layer: Application Layer (Layer 7)
- Overview: Commonly used for communication between IoT devices and cloud-based platforms. While traditional HTTP is widely used, HTTPS adds a layer of security with SSL/TLS encryption. Both protocols are essential for web-based interactions in IoT.
- DDS (Data Distribution Service):
- Layer: Middleware Layer
- Overview: A standardized middleware that enables data-centric communication between devices. DDS is often used in industrial IoT (IIoT) applications where real-time and reliable data exchange is crucial. It supports a publish/subscribe model.
- AMQP (Advanced Message Queuing Protocol):
- Layer: Application Layer (Layer 7)
- Overview: A messaging protocol that enables communication between devices and applications. AMQP is designed for message-oriented middleware and supports message queuing, routing, and reliability. It is often used in scenarios where message order and reliability are important.
- LoRaWAN (Long Range Wide Area Network):
- Layer: Data Link Layer (Layer 2) and Network Layer (Layer 3)
- Overview: A protocol for wide-area networks designed for low-power, long-range communication. LoRaWAN is commonly used in IoT applications that require long-range coverage, such as smart cities, agriculture, and industrial monitoring.
- NB-IoT (Narrowband IoT):
- Layer: Physical and Data Link Layers (Layer 1 and Layer 2)
- Overview: A cellular communication standard designed for low-power, wide-area IoT applications. NB-IoT operates on licensed spectrum bands and is suitable for devices that require reliable, long-range connectivity.
- Thread:
- Layer: Network Layer (Layer 3)
- Overview: A low-power, wireless IoT protocol designed for home automation and connected devices. Thread is based on IEEE 802.15.4 and provides secure and scalable mesh networking for IoT applications.
- 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks):
- Layer: Network Layer (Layer 3)
- Overview: Allows IPv6 communication over low-power wireless networks. 6LoWPAN enables devices with limited resources to participate in IP-based communication, making it suitable for IoT applications.
- Thread:
- Layer: Network Layer (Layer 3)
- Overview: A low-power, wireless IoT protocol designed for home automation and connected devices. Thread is based on IEEE 802.15.4 and provides secure and scalable mesh networking for IoT applications.
Protocols:
Choosing the right IoT communication protocol depends on various factors, including the specific use case, device constraints, security requirements, and scalability needs. It’s common to see a combination of these protocols used within an IoT ecosystem to address different communication challenges.
Near field communications (NFC): NFC works in the frequency band of 13.56 MHz and the range is a few centimeters. This type of communication is used to extend close-contact communications. In NFC there is an active node (such as a smartphone) generating an RF field that energizes a tag. It works in the frequency band of 13.56 MHz and the range is a few centimeters.
Sigfox: Sigfox uses a technology-based ultra-narrow band (UNB) and it works in the ISM bands, requiring a dedicated infrastructure. It means that it can be globally used but a local operator is needed.
Wi-FI: Working in the frequency of 2.4 GHz and 5 GHz, Wi-Fi connectivity is widely chosen because of its pervasiveness and high data rates. Its main drawback is its high power consumption, so it is not frequently used in battery-powered applications.
Wi-Sun: Wi-Sun is a field area network (FAN) protocol created by the Wi-Sun Alliance and designed to have a low power consumption and latency. It operates in the sub GHz frequency bands as well as in the 2.4 GHz band through a mesh topology.
ZigBee: This communication protocol works in the 2.4 GHz band, for short-range (<100 m) in restricted areas. ZigBee is made for transmitting small amounts of information, namely where really low latency is needed and is widely used in the industry and consumer applications. The ZigBee RF4CE was made to replace IR remote controls (e.g., TVs and DVD systems) and remove the need of having a line of sight between the remote control and the device.
Z-wave: intended for home automation applications (Figure 5), working in ISM frequency bands and with a rate up to 100 Kbps.
1. Wi-Fi mesh network
A wireless mesh network (WMN) is a framework that offers limited mobility within a radio range at a low cost.WMN is a technology that consists of a router system with no cabling between the endpoints. It is made up of radio nodes that do not have to be connected to a wired harbor, unlike traditional wireless access points. The quickest hops are anticipated to transfer data over long distances. Nodes between the input and output act as forwarding nodes, collaborating to make route predictions based on configuration and forward information.
Compared to other system topologies, wireless mesh networks provide more consistency than node insertion or removal in the network. The data sent and received in a connectivity mesh network is done through an entry point, whereas the remainder is done through node pairs.
2. Wired mesh network
Wired mesh networks require cabling to be installed before the network can function. You can deploy a wireless mesh network using a separate switch or a wired network that utilizes a switch and slave routers. All nodes need an Ethernet port to set up a wired mesh network. The primary node will be the router you install, and you can then configure all the nodes by name and assign them a ‘mesh name.’
Moreover, wired mesh systems require additional equipment in addition to a modem. An outdoor or rooftop router will serve as a bridge between the different nodes. While separate routers may seem redundant, they do not have the disadvantages of running Commotion. They should also be placed outside the public realm to provide a wireless connection for users in the area. The cost of the mesh system depends on the number of nodes required.
3. Full mesh topology network
A network with a complete mesh topology is one in which each node is directly linked to the other using a purpose-built network topology. The connection between nodes can be either local or over the internet. Full mesh topology networks have multiple benefits, including eliminating single points of failure. However, they can be more complicated to implement when some endpoints are behind NAT. Fortunately, there is a solution to this problem since NAT devices can solve them.
4. Partial mesh topology network
When planning to use a wireless network, you may be wondering how to set up a partial mesh topology network. The main benefit of this technology is that it can handle high-volume data transmission without any problem.
This network also allows you to add new devices and scale them up quickly. Furthermore, you can add more than one device without disrupting the message transmission. In addition, mesh topology requires less infrastructure and management effort. A partial mesh topology network is functional when you want to extend the range of a network. This is because mesh network nodes act as repeaters to route data. This increases the network’s resilience.
5. Hybrid mesh network
A hybrid mesh network is a wireless and wired communications system combining two different types of networks. The hybrid mesh node covers a larger area using a wired interface. It is a type of wireless network that uses the Ethernet interface. There are no lags in connectivity, unlike Wi-Fi networks, as each node can communicate with other devices via the wireless interface.
6. Infrastructure mesh architecture network
The infrastructure-mesh architecture network is a powerful method for improving the efficiency and reliability of a distributed computing system. Its advantages include high-performance computing, low latency, and no centralized server. If the network device and the mesh access point operate within the same communication range, the mesh network can quickly connect with the mesh modem. If the radio ranges vary, the nodes interact with the core network, connecting to the mesh routers via Ethernet.
7. Client-based mesh architecture network
The client-based mesh architecture connects client nodes from peer to peer. To send data, each node can serve as a data transmission node. In this type of computer network, the client acts as a mesh router by sending packets.
10 applications of mesh networks in 2022:
1. Public service communications
A mesh network enhances and increases the communications capabilities of law enforcement, fire, and other public services. Mesh networks contribute to meeting the needs of public-sector clients. Many firefighters, military operations, local law enforcement, and search and rescue teams were still relying on big, heavy, over-engineered, and expensive solutions that had not been modified much in years. Mesh networks immediately form a network that can stretch over huge distances, making them ideal for off-grid communication systems.
2. Environmental monitoring
Using numerous temperature, humidity, pollution, and other sensors, the conditions in any location can be swiftly observed and monitored. Even monitoring water bodies, individual trees, farmlands, and other vulnerable areas are possible. Thanks to the developed mechanisms, sensors can communicate in infrastructure and mesh modes.
The system enables each sensor node to act as a relay, increasing system failure resistance and scalability. The pairwise key-based authentication mechanism was used for urban environmental monitoring, allowing for the management of individual system operational phases such as adding new nodes, unauthorized node migration from one network segment to another, and so on.
3. Medical monitoring
Mesh networks make patient surveillance simpler and more dependable and help expand capacity. The mesh node is typically a computer that assists the duty doctor in observing the hospital’s wards. This ensures that the patient’s health condition is observed even when the nurse is absent.
The Internet of Things (IoT) consists of always-connected gadgets communicating messages across the network. In healthcare, specific IoT devices are more significant than others, and businesses must develop networking solutions that focus on patient monitoring signals.
4. Industrial monitoring and control
Embedded sensors in a mesh may offer information on any procedure or manufacturing technique. For feedback connection in control systems, wireless may be used. Examination of machine conditions may provide maintenance information. Wireless mesh facilitates installations while reducing wire costs. Mines and railroads are two examples of unexpected applications.
Wireless sensor networking products can include chips, pre-certified modules, and mesh networking software, allowing sensors to interact in harsh industrial IoT environments. If each node has a different data reporting rate, the network management will automatically synchronize individual paired connections to route traffic effectively.
5. Security systems
Inexpensive sensor nodes can monitor virtually every point of entry or strategy to an institution. To name a few, network surveillance cameras, emergency response systems, video management software, and license plate recognition systems are riding the “wave” of mesh networking.
When they work together, they generate so much value that cities are finding more and more financial resources to invest in these systems. These wireless mesh systems are most commonly deployed along roadways, which frequently define city limits. This allows the coverage area to be divided into zones corresponding to different investment and rollout phases.
6. Automotive monitoring
More electronic fittings, upgrades, and networking connections are added to automobiles each year. A wireless mesh eradicates wiring and gives a better way of tracking and regulating a vehicle’s hundreds of functions. When the first driverless cars hit the road, the term “automated car” may appear misleading. Yes, Automated vehicles must be capable of independence. They perform far better when connected to a cloud computing system and one another.
Automated cars can scan the road and adjacent vehicles when operating with complete autonomy. Still, they are unaware of what lies ahead and what the adjacent vehicles plan to do next. On the other hand, a connected car can process many factors, from travel time to road conditions reported by other vehicles.
7. Military communications and reconnaissance
A mesh network improves the reliability and range of soldier-to-soldier communication systems. The Combat Service Support Automated Information Systems Interface mesh network has empowered the Army to equip logistics and sustainment specialists who support combat operations and other forward-positioned forces with high-speed, high-capacity communications capabilities.
Response teams can use satellite terminals and the network to connect back over satellite communications, giving them access to the best and most up-to-date information. The network facilitates radio interconnectivity and expands military and commercial systems around and into affected sites.
8. Home monitoring and control
Using a smart home system powered by a mesh network, it is simple to turn lights on and off and dim them with air conditioning and other functions. One or more access points can control a whole house. Home automation systems contain numerous components, and it is critical to ensure that everything continues to function correctly even though, at one point, the network fails.
This type of situation, common in larger homes or offices, is ideal for a mesh network. Because every device communicates with every other device, signals always have a path to take. This guarantees that just about everything always works as intended.
9. Broadband wireless access
Constructing a Wi-Fi mesh network to deliver superior internet connections and other broadband connections in places without cable television or internet cables is possible. Several such networks exist already, with more on the way. The reliability and network coverage improve as more nodes are added.
Wireless mesh networks are a viable option for last-mile broadband internet access. Like ad hoc networks, each user node acts as both a host and a router; user packets are transmitted through an internet-connected gateway in a multi-path manner. The meshed configuration offers high reliability and comprehensive market coverage, among others, but should be secured using firewall hardware.
10. Automatic meter reading
Reading all-electric and gas meters is a considerable task. It is now financially feasible to implement using low-cost mesh nodes, as mesh network systems are being used to read power consumption meters immediately.
The system comprises measurement meters, wireless sensor nodes, data collectors, a management center, and wireless communications systems. The information is transmitted from the sensor nodes to the data collector via a comprehensive communication system. The process utilizes Ethernet to transfer information from the data collector to the management station. The data collector serves as a gateway with wireless mesh network connection frameworks.
Definitions:
IoT, or the Internet of Things, refers to the network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and connectivity capabilities, allowing them to collect and exchange data over the internet. The concept of IoT revolves around the idea of creating a smart and interconnected environment where devices can communicate with each other and with central systems to enhance efficiency, provide valuable insights, and enable new applications and services.
Key characteristics and components of IoT include:
- Sensors and Actuators: IoT devices are equipped with sensors to collect data from their surroundings. These sensors can measure various parameters such as temperature, humidity, light, motion, and more. Actuators enable devices to perform actions based on the collected data.
- Connectivity: IoT devices use various communication protocols to transmit data over networks, including the internet. Common connectivity options include Wi-Fi, Bluetooth, Zigbee, cellular networks, and Low-Power Wide-Area Networks (LPWAN).
- Data Processing: Collected data is processed locally on the device or sent to cloud-based platforms for analysis. This analysis may involve extracting meaningful insights, detecting patterns, or triggering specific actions based on predefined rules.
- Cloud Computing: Cloud platforms play a crucial role in IoT by providing storage, processing power, and analytics capabilities. Cloud services allow for scalable and centralized management of IoT data, making it accessible from anywhere.
- Edge Computing: In addition to cloud computing, IoT devices often leverage edge computing. Edge computing involves processing data closer to the source (on the device or at the edge of the network) to reduce latency, increase responsiveness, and enhance privacy.
- Security: Security is a significant concern in IoT, given the vast amount of sensitive data being transmitted. IoT systems incorporate encryption, authentication, and other security measures to protect data and ensure the integrity and confidentiality of communications.
- Interoperability: IoT devices from different manufacturers should ideally be able to work together seamlessly. Standardization efforts, such as communication protocols and frameworks like Matter (formerly Project CHIP), aim to improve interoperability in the IoT ecosystem.
- Applications: IoT has diverse applications across various industries. Common use cases include smart homes, industrial automation, healthcare, agriculture, smart cities, and transportation. Examples include smart thermostats, wearable health devices, industrial sensors, and connected vehicles.
- Scalability: IoT is highly scalable, allowing the deployment of a vast number of devices across different environments. This scalability is essential for accommodating the growing number of connected devices in the IoT ecosystem.
The Internet of Things has the potential to revolutionize how we interact with the physical world, automate processes, and gather insights for better decision-making. As technology continues to advance, the scope and impact of IoT applications are expected to expand across various domains, shaping the future of interconnected smart systems.