technology

George is a security professional working for iTech Solution. He was tasked with securely transferring sensitive data of the organization between industrial systems. In this process, he used a short-range communication protocol based on the IEEE 203.15.4 standard. This protocol is used in devices that transfer data infrequently at a low rate in a restricted area, within a range of 10-100m. What is the short-range wireless communication technology George employed in the above scenario?

George is a security professional working for iTech Solution. He was tasked with securely transferring sensitive data of the organization between industrial systems. In this process, he used a short-range communication protocol based on the IEEE 203.15.4 standard. This protocol is used in devices that transfer data infrequently at a low rate in a restricted area, within a range of 10-100m. What is the short-range wireless communication technology George employed in the above scenario?

Option 1 : Zigbee
Option 2 : LPWAN
Option 3 : NB-IoT
Option 4 : MQTT

1. Zigbee

Zigbee could be a wireless technology developed as associate open international normal to deal with the unique desires of affordable, low-power wireless IoT networks. The Zigbee normal operates on the IEEE 802.15.4 physical radio specification and operates in unauthorised bands as well as a pair of.4 GHz, 900 MHz and 868 MHz.

The 802.15.4 specification upon that the Zigbee stack operates gained confirmation by the Institute of Electrical and physical science Engineers (IEEE) in 2003. The specification could be a packet-based radio protocol supposed for affordable, battery-operated devices. The protocol permits devices to speak in an exceedingly kind of network topologies and may have battery life lasting many years.

The Zigbee three.0 Protocol

The Zigbee protocol has been created and ratified by member corporations of the Zigbee Alliance.Over three hundred leading semiconductor makers, technology corporations, OEMs and repair corporations comprise the Zigbee Alliance membership. The Zigbee protocol was designed to supply associate easy-to-use wireless information answer characterised by secure, reliable wireless network architectures.

THE ZIGBEE ADVANTAGE

The Zigbee 3.0 protocol is intended to speak information through rip-roaring RF environments that area unit common in business and industrial applications. Version 3.0 builds on the prevailing Zigbee normal however unifies the market-specific application profiles to permit all devices to be wirelessly connected within the same network, no matter their market designation and performance. what is more, a Zigbee 3.0 certification theme ensures the ability of product from completely different makers. Connecting Zigbee three.0 networks to the information science domain unveil observance and management from devices like smartphones and tablets on a local area network or WAN, as well as the web, and brings verity net of Things to fruition.

Zigbee protocol options include:
  • Support for multiple network topologies like point-to-point, point-to-multipoint and mesh networks
  • Low duty cycle – provides long battery life
  • Low latency
  • Direct Sequence unfold Spectrum (DSSS)
  • Up to 65,000 nodes per network
  • 128-bit AES encryption for secure information connections
  • Collision avoidance, retries and acknowledgements
2. LPWAN

Low-power WAN (LPWAN) could be a wireless wide space network technology that interconnects low-bandwidth, powered devices with low bit rates over long ranges.

Created for machine-to-machine (M2M) and net of things (IoT) networks, LPWANs operate at a lower value with bigger power potency than ancient mobile networks. they’re additionally ready to support a greater range of connected devices over a bigger space.

LPWANs will accommodate packet sizes from ten to 1,000 bytes at transmission speeds up to two hundred Kbps. LPWAN’s long vary varies from a pair of kilometre to one,000 km, counting on the technology.

Most LPWANs have a star wherever, like Wi-Fi, every end point connects on to common central access points.

Types of LPWANs

LPWAN isn’t one technology, however a bunch of assorted low-power, wide space network technologies that take several shapes and forms. LPWANs will use licenced or unauthorised frequencies and embody proprietary or open normal choices.

The proprietary, unauthorised Sigfox is one among the foremost wide deployed LPWANs these days. Running over a public network within the 868 MHz or 902 MHz bands, the ultra-narrowband technology solely permits one operator per country. whereas it will deliver messages over distances of 30-50 kilometre in rural areas, 3-10 kilometre in urban settings and up to one,000 kilometre in line-of-site applications, its packet size is restricted to a hundred and fifty messages of twelve bytes per day. Downlink packets area unit smaller, restricted to four messages of eight bytes per day. causation information back to endpoints may also be vulnerable to interference.

Random part multiple access, or RPMA, could be a proprietary LPWAN from Ingenu INC. tho’ it’s a shorter vary (up to fifty kilometre line of sight and with 5-10 kilometre nonline of sight), it offers higher duplex communication than Sigfox. However, as a result of it runs within the a pair of.4 gigahertz spectrum, it’s vulnerable to interference from Wi-Fi, Bluetooth and physical structures. It additionally usually has higher power consumption than different LPWAN choices.

The unauthorised LoRa, nominative and backed by the LoRa Alliance, transmits in many sub-gigahertz frequencies, creating it less vulnerable to interference. A spinoff of chirp unfold spectrum (CSS) modulation, LoRa permits users to outline packet size. whereas open supply, the underlying transceiver chip accustomed implement LoRa is barely offered from Semtech Corporation, the corporate behind the technology. LoRaWAN is that the media access management (MAC) layer protocol that manages communication between LPWAN devices and gateways.

Weightless SIG has developed 3 LPWAN standards: The unifacial weightless-N, duplex Weightless-P and Weightless-W, that is additionally duplex and runs off of unused TV spectrum. Weightless-N and Weightless-P area unit usually a lot of in style choices because of Weightless-W’s shorter battery life. Weightless-N and Weightless-P run within the sub-1 gigahertz unauthorised spectrum however additionally support licenced spectrum operation mistreatment twelve.5 kilohertz narrowband technology.

Narrowband-IoT (NB-IoT) and LTE-M area unit each third Generation Partnership Project (3GPP) standards that treat the licenced spectrum. whereas they need similar performance to different standards, they treat existing cellular infrastructure, permitting service suppliers to quickly add cellular IoT property to their service portfolios.

NB-IoT, additionally referred to as CAT-NB1, operates on existing LTE and international System for Mobile (GSM) infrastructure. It offers transmission and downlink rates of around two hundred Kbps, mistreatment solely two hundred kilohertz of accessible information measure.

LTE-M, additionally referred to as CAT-M1, offers higher information measure than NB-IoT, and therefore the highest information measure of any LPWAN technology.

Some vendors, as well as Orange and SK medium, area unit deploying each licenced and unauthorised technologies to capture each markets.

Other LPWAN technologies include:
  • GreenOFDM from GreenWaves Technologies
  • DASH7 from hayrick Technologies INC.
  • Symphony Link from Link Labs INC.
  • ThingPark Wireless from Actility
  • Ultra slim Band from numerous corporations as well as Telensa, Nwave and Sigfox
  • WAVIoT
3. NB-IoT

Narrowband IoT (NB IoT) may be a Low Power Wide area (LPWA) technology that works nearly anyplace. several potential “connected things” area unit placed in remote or laborious to achieve areas, at long distances from succeeding cellular base station, or in secure areas, like deep among buildings or underground structures.

When there’s coverage underneath the same circumstance, it is commonly poor and needs the device transmitter to operate at high power, exhausting the battery. to boot, cellular networks don’t seem to be optimized for applications that solely transmit tiny amounts of occasional information. moreover, the present cellular standards don’t support the extent of power saving capabilities that NB-IoT will, that makes these standards unsuitable for cheap devices that need battery lives of many years.

NB IoT has the flexibility to attach more devices to the web of Things and create several new applications a reality. it’s optimized for applications that require to speak tiny amounts of knowledge over long periods of your time. Since it operates in commissioned spectrum, it’s secure and reliable, providing bonded quality of service.

Using different cellular air interfaces for a typical NB IoT application would be too costly, as NB IoT applications don’t want all their capabilities. NB IoT applications concentrate on low speed, sturdy information transfer, associate degreed an applicable level of reliableness. The low device value and long lifecycle cuts operative expenses and reduces the chance of thievery.

NB-IoT provides:
  • very low power consumption
  • excellent extended home in buildings and underground
  • easy preparation into existing cellular spec
  • network security & reliableness
  • lower part price
4. MQTT

While there are presently variety of competitive IIoT technologies and protocols live, the very light-weight overhead (2-byte header), publish/subscribe model, and two-way capabilities of MQTT area unit unambiguously suited to satisfy the strain of business management systems.

The newest version, MQTT Version three.1.1, is associate degree OASIS commonplace that’s open and royalty-free. (OASIS is that the Organization for the Advancement of Structured data Standards, a global association that promotes the adoption of product-independent standards for data formats.)

What area unit the benefits of MQTT?

The MQTT protocol permits your SCADA system to access IIoT information. MQTT brings several powerful edges to your process:

  • Distribute data a lot of expeditiously
  • Increase quantifiability
  • Reduce network information measure consumption dramatically
  • Reduce update rates to seconds
  • Very well-suited for remote sensing and management
  • Maximize accessible information measure
  • Extremely light-weight overhead
  • Very secure with permission-based security
  • Used by the oil-and-gas trade, Amazon, Facebook, and different major businesses
  • Saves development time
  • Publish/subscribe protocol collects a lot of information with less information measure compared to polling protocols
Why Was MQTT Created?

MQTT was created with the goal of collection information from several devices and so transporting that information to the IT infrastructure. it’s light-weight, and thus ideal for remote observance, particularly in M2M connections that need atiny low code footprint or wherever network information measure is proscribed.

MQTT was fabricated in 1999 by Dr. Andy Stanford-Clark and Arlen Nipper. Co-inventor Arlen Nipper is that the president of Cirrus Link Solutions, the corporate that developed the Cirrus Link MQTT Modules for Ignition.

MQTT may be a publish/subscribe protocol that permits edge-of-network devices to publish to a broker. shoppers hook up with this broker, that then mediates communication between the 2 devices. every device will subscribe, or register, to specific topics. once another shopper publishes a message on a signed topic, the broker forwards the message to any shopper that has signed.

MQTT is two-way, and maintains stateful session awareness. If associate degree edge-of-network device loses property, all signed shoppers are going to be notified with the “Last can and Testament” feature of the MQTT server so any licensed shopper within the system will publish a brand new worth back to the edge-of-network device, maintaining two-way property.

The lightweightness and potency of MQTT makes it attainable to considerably increase the quantity of knowledge being monitored or controlled. before the invention of MQTT, some eightieth of knowledge was being left at remote locations, albeit numerous lines of business might have used this information to form smarter selections. currently MQTT makes it attainable to gather, transmit, and analyze a lot of of the info being collected.

Unlike the standard poll/response model of the many protocols, that tend to unnecessarily saturate information connections with unchanging information, MQTT’s publish/subscribe model maximizes the accessible information measure.

Who Uses MQTT?

MQTT was originally developed for the low-bandwidth, high-latency information links employed in the oil and gas trade. However, MQTT is currently employed in several applications on the far side oil and gas — from dominant good lighting systems to the Facebook traveler application. Amazon net Services recently proclaimed that Amazon web of Things (IoT) is predicated on MQTT, as well. Overall, MQTT seems to be the protocol best suited to the management systems employed by industrial organizations, and that we will expect that its speedy rate of adoption can solely increase within the future.

Learn CEH & Think like hacker


This Blog Article is posted by

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com

https://g.co/kgs/ttqPpZ

Leave a Comment