Wireless Networks
Module 2: WPAN
Dr. Ranjan bala jain
Professor
Department of EXTC
VESIT
Module 2
● WPAN: Bluetooth (802.15.1): Radio Specifications, Protocol
Stack, Link Types, Security, Topologies, Applications.
● ZigBee (802.15.4): Radio Specifications, Components,
Topologies, Protocol Stack, Applications.
● RFID: Radio Specifications, Architecture, Types and
applications.
● Near Field Communication & UWB (802.15.3 a): Introduction
and working.
● LoWPAN: Features, Architecture, protocol stack and
applications ©RBJ VESIT
©RBJ VESIT
Radio-Frequency Identification (RFID)
● Radio-Frequency Identification
(RFID) is a technology that
uses radio waves to identify,
track, and manage objects,
people, or animals.
● It consists of two main
components: The RFID tag
and the RFID reader.
● RFID is also called dedicated
short range
communication(DSRC).
©RBJ VESIT
RFID tags
● RFID tags are fundamental components of RFID technology.
● They consist of a microchip and an antenna, which work together to
store and transmit data wirelessly.
● They are also known as transponders. Chip-based RFID tags contain
silicon chips and antennas.
Types of RFID Tags:
Passive RFID Tags: ( Without Battery)
Active RFID Tags: (Watch Sized Battery)
Semi-passive RFID Tags
©RBJ VESIT
Types of RFID Tags:
Passive RFID Tags: ( Without Battery)
● These tags do not have their own power source and rely on the energy emitted by
RFID readers to operate.
● They are activated when they come into the proximity of a reader's radio waves.
Passive tags are smaller, less expensive, and suitable for applications where the
read range is relatively short.
Active RFID Tags: (Watch Sized Battery)
● Active tags have their own power source, usually a battery, which enables them to
transmit signals over longer distances and in environments with high interference.
● Active tags are larger, more expensive, and capable of storing more data
compared to passive tags. They are often used in applications where real-time
tracking and monitoring are required.
©RBJ VESIT
Types of RFID Tags:
● Semi-passive RFID Tags: (varies from less than 1 square inch to
many square inches) Dependent on power and frequency (13.56
MHz, 433 MHz, 900MHz, 2.4 GHz with power from 1 mW to 1 W)
● Also known as battery-assisted passive (BAP) tags, these tags have
a small battery that powers the microchip and enables longer read
ranges compared to passive tags. However, they still rely on RFID
readers to transmit data.
©RBJ VESIT
Comparison between various Tags
©RBJ VESIT
RFID Readers
● RFID readers, also known as interrogators, are devices used to communicate with
RFID tags wirelessly.
● They emit radio waves to activate RFID tags within their range and capture the
data stored on those tags.
● Reader: Receive data, Validate data, Send data to tag
Types of RFID Readers:
● Fixed RFID Readers
● Handheld RFID Readers
● Integrated RFID Readers
● Mobile RFID Readers
©RBJ VESIT
Types of RFID Readers:
● Fixed RFID Readers: These readers are installed in a fixed location, such as
doorways, gates, or conveyor belts, and are used for continuous monitoring and
tracking of RFID-tagged items as they pass by.
● Handheld RFID Readers: These readers are portable and can be carried by users
to read RFID tags at different locations. They are commonly used for inventory
management, asset tracking, and field operations.
● Integrated RFID Readers: These readers are integrated into other devices or
systems, such as smartphones, tablets, kiosks, or industrial equipment, to enable
RFID functionality in existing solutions.
● Mobile RFID Readers: These readers are designed for mobile applications and
are often integrated with mobile computing devices such as smartphones or tablets.
They enable on-the-go scanning and data collection in various environments.
©RBJ VESIT
RFID Specifications
Key point Specification
Range 0-100m
Frequency 2.4GHz, 2.5GHz(UHF), ISM
Modulation GFSK
Power 12-18 micro ampere, 3V
Anticollision 100 tags are read simultaneously
Operation Read only
Battery 4yeras
Dimensions Card, 85.5mmX 54mmX4mm
©RBJ VESIT
RFID Architecture
©RBJ VESIT
RFID Architecture
● Antennas: Antennas are used by both RFID tags and readers to
transmit and receive radio signals. The size and design of the
antenna impact the read range and performance of the RFID system.
● Middleware: Middleware is software that acts as a bridge between
RFID readers and enterprise systems (such as databases, inventory
management software, or enterprise resource planning systems).
● Backend Systems: Backend systems consist of databases,
applications, and enterprise software that store and manage data
collected from RFID tags.
©RBJ VESIT
RFID architecture
● The RFID systems basically consist of three elements: 1. tag/transponder 2.reader 3. middleware
deployed at a host computer.
● The RFID tag is a data carrier part of the RFID system which is placed on the objects to be
uniquely identified.
● The RFID reader is a device that transmits and receives data through radio waves using the
connected antennas. Its functions include powering the tag, and reading/writing data to the tag.
● As shown Fig., the signals sent by the reader‘s antennas form an interrogation zone made up
of an electromagnetic field. When a tag enters this zone, it gets activated to exchange data with
the reader
● Later, the identification data read by the RFID reader is processed by the software system,
known as the RFID middleware. The RFID middleware manages readers, as well as filters and
formats the RFID raw tag data so that they can be accessed by the various interested enterprise
applications.
● Hence, the middleware is a key component for managing the flow of information between tag
readers and enterprise applications.
©RBJ VESIT
Working
• The transponder (RFID Tags) emits messages with an identification number that is retrieved from
a database and acted upon accordingly.
• The writable memory is used to transmit information among RFID readers in different locations.
• an antenna packaged with a transceiver and decoder, emits a signal activating the RFID tag so it
can read and write data to it.
• When an RFID tag passes through the electromagnetic zone, it detects the reader’s activation
signal.
• The reader decodes the data encoded in the tag’s integrated circuit (silicon chip) and the data is
passed to the host computer.
©RBJ VESIT
RFID working
©RBJ VESIT
Key Features
● No line-of-sight. RFID tags do not need to be visible to read or
write.
● Robust. they can be encased within rugged material protecting them from
the environment.
● Read speed. Tags can be read from significant distances and can also be
read very quickly — for example, on a conveyor.
● Reading multiple items. A number of tagged items can be read at the
same time within an RF field. This cannot be done easily with visual
identifiers.
● Security. Because tags can be enclosed, they are much more difficult to
tamper with. ©RBJ VESIT
Key Features
• RFID systems can be used just about anywhere, from clothing tags to missiles to pet
tags to food — anywhere that a unique identification system is needed.
• RFID tags are often envisioned as a replacement for bar codes, having a number of
important advantages over bar code technology.
• One of the key differences between RFID and bar code technology is RFID eliminates
the need of line-of-sight reading that bar coding depends on.
• RFID scanning can be done at greater distances than bar code scanning.
• High frequency RFID systems (850–950 MHz, 2.4–2.5 GHz) offer transmission ranges
more than 90 feet
©RBJ VESIT
Applications
• pet and livestock tracking.
• inventory management.
• asset tracking and equipment tracking.
• inventory control.
• cargo and supply chain logistics.
• vehicle tracking.
• customer service and loss control.
• improved visibility and distribution in the supply chain
©RBJ VESIT
Instead of Thinking…
I am afraid, I’ll fail at this,
Think…
I am willing and excited
to learn.
©RBJ VESIT
Near Field Communication
Near-field communication (NFC) is a short-range wireless connectivity technology
that uses magnetic field induction to enable communication between devices when
they're touched together or brought within a few centimeters of each other.
This includes authenticating credit cards, enabling physical access, transferring small
files and jumpstarting more capable wireless links.
Broadly speaking, it builds on and extends the work of existing ecosystems and standards
around radio frequency ID tags (RFID).
It was originally intended to be used to transfer files between phones using Android
Beam. Modern services, such as Google Nearby Share, employ NFC to configure wireless
services across faster networks like Bluetooth or Wi-Fi direct.
©RBJ VESIT
Near Field Communication
NFC is limited to short-range communication, which has important implications for
physical access security.
A user must be within 3.5 inches (10 cm) of an NFC terminal to process a payment
or open a door.
Another important aspect is that no power is required for the basic mechanics of
listening to and responding to NFC requests. This makes it possible to implement in items
that lack a battery, such as credit cards.
Its most significant advantage is that it is the easiest wireless technology for setting
up a connection, which makes it useful for IoT devices. However, it is not as good at
maintaining a connection over distances or for long periods.
©RBJ VESIT
6LoWPAN(IPv6 over Low-Power Wireless
Personal Area Networks)
• 6LoWPAN, is a low power wireless mesh network where every
node has its own IPv6 address.
• This allows the node to connect directly with the Internet
using open standards.
• 6LoWPAN was a working group of the Internet Engineering
Task Force (IETF).
• It was created with the intention of applying the Internet
Protocol (IP) even to the smallest devices, enabling low-power
devices with limited processing capabilities to participate in
the Internet of Things.
©RBJ VESIT
6LoWPAN(IPv6 over Low-Power Wireless Personal Area Networks
• The base specification developed by the 6LoWPAN IETF group
is RFC 4944.
• The targets for IPv6 networking for low-power radio
communication are devices that need wireless connectivity to
many other devices at lower data rates for devices with very
limited power consumption.
• Applications: individual room heating controllers, smart
grid enabling smart meters
©RBJ VESIT
Characteristics
• Small packet size
• 16-bit short or IEEE 64-bit extended media access control addresses
• Low bandwidth. (250/40/20 kbps)
• Topologies include star and mesh
• Low power, typically battery operated
• Relatively low cost
• Networks are ad hoc & devices have limited accessibility and user
interfaces
• Inherently unreliable due to nature of devices in the wireless medium
©RBJ VESIT
Architecture
A LoWPAN is the collection of 6LoWPAN nodes, which share a common
IPv6 address prefix (the first 64-bits of an IPv6 address). LoWPAN
nodes may play the role of host or router, along with one or more
edge routers, as seen in Fig.
There are 3 types of LoWPANs
A Simple LoWPAN is connected through one LoWPAN Edge
Router to another IP network.
An Extended LoWPAN consists of multiple edge routers along
with a backbone link to interconnect them.
An Ad hoc LoWPAN is not connected to the Internet and
operates without an infrastructure.
©RBJ VESIT
Architecture
Each WSN node serves as an IP router.
As border routers forward datagrams at network layer, they
don’t maintain any application layer state.
Peers communicate in terms of the capabilities provided by
the layer below.
Link must allow network to achieve high “best-effort”
datagram delivery to achieve reliable transport.
LoWPANs are stub networks.
©RBJ VESIT
©RBJ VESIT
• Ad-hoc LoWPAN: No
route outside the
LoWPAN
• Simple LoWPAN: Single
Edge Router
• Extended LoWPAN:
Multiple Edge Routers
with common backbone
link
• Edge router • Device types
• Runs special protocols • H Host
• Simplifies operation • R Router
• Shared database: Whiteboard • ER Edge router
©RBJ VESIT
6LoW PAN addressing scheme
● 128-bit IPv6 address Interface ID (IID)== 64-bit prefix + 64-bit IID
● The 64-bit prefix is hierarchical • Identifies the network you are on
and where it is globally.
● The 64-bit IID identifies the network interface .
● Must be unique for that network .
● Typically is formed statelessly from the interface MAC address called
Stateless Address Auto configuration (RFC4862)
● Stateless address autoconfiguration is the process that IPv6 nodes
(hosts or routers) use to automatically configure IPv6 addresses for
interfaces.
©RBJ VESIT
Protocol stack TSP Protocol: Tunnel Set Up Protocol
©RBJ VESIT
Protocol stack
● Figure shows the IPv6 protocol stack with 6LoWPAN
compared to IP protocol stack.
● It is almost identical to a normal IPv6 implementation with
the following two differences:
● 6LoWPAN only supports IPv6, for which a small adaptation
layer (LoWPAN) has been defined to optimize IPv6 over link
layers.
● Although 6LoWPAN is not bound to the IEEE 802.15.4
standard, it is designed to utilize it.
©RBJ VESIT
6LoW PAN addressing scheme
©RBJ VESIT
Applicatioons
● Home building automation
● Health care
● Industrial automation
● Vehicular automation
● Environmental monitoring
©RBJ VESIT