DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations

Trending

  • [DZone Survey] Share Your Expertise for Our Database Research, 2023 Edition
  • Which Is Better for IoT: Azure RTOS or FreeRTOS?
  • A Data-Driven Approach to Application Modernization
  • How To Scan and Validate Image Uploads in Java
  1. DZone
  2. Data Engineering
  3. Data
  4. IoT Solutions and Short-Range Radio Signals

IoT Solutions and Short-Range Radio Signals

For distances of 30 meters, your IoT solution is probably going to be Bluetooth (or BLE) or RFID. Here are breakdowns of each radio solution.

Jordan Eller user avatar by
Jordan Eller
·
Nov. 30, 17 · Tutorial
Like (3)
Save
Tweet
Share
6.25K Views

Join the DZone community and get the full member experience.

Join For Free

Unlike Long and Medium range radio solutions, we define "short range" as solutions with a signal range of less than 30m. The most common technologies in use include Bluetooth (or its evolution Bluetooth LE) and RFID.

Bluetooth

Bluetooth has become common in computing and consumer product markets. The Bluetooth standard is generally intended as a “cable replacement” technology. It is used for transferring medium amounts of data over a relatively short distance (30m). Bluetooth is widely accepted in audio applications, such as cell phone headsets and wireless speakers.

Adapted from the Bluetooth standard, Bluetooth Low-Energy (BLE) (marketed as Bluetooth Smart) is the new hot topic. It will be key for wearable products, likely through connection to a smartphone. Different from the original Bluetooth, BLE sends small amounts of data, requiring very little energy. Surprisingly, it is not backward-compatible with the original Bluetooth standard.

BLE’s range is similar to the traditional Bluetooth’s range. However, it offers improvements in latency, power consumption, and data robustness. These improvements come at the cost of reduced effective data rates, maxing out at several hundred kbps. Despite this, BLE has the potential to support many IoT applications.

Bluetooth is already integrated into smartphones and many other personal, mobile devices. This is a major advantage Bluetooth has over many competing technologies. By 2018, most Bluetooth-enabled smartphones (iOS, Android, and Windows-based models), should be ‘Smart Ready.’

Devices that employ Bluetooth Smart features incorporate the Bluetooth Core Specification Version 4.0 (or higher) with a combined low-data-rate and low-energy core configuration. Version 4.2’s Internet Protocol Support Profile allows Bluetooth Smart sensors to access the Internet directly via 6LoWPAN connectivity. This IP connectivity makes it possible to use existing IP infrastructure to manage Bluetooth Smart ‘edge’ devices.

Other enhancements will also enable enterprises to use Bluetooth beacons for indoor location applications. BLE has a mechanism allowing devices to broadcast information about identity and capability. This enables coordination between devices. Google’s Physical Web concept uses BLE beacons. BLE allows the broadcasting of rich data, like location information, URLs, and multimedia files.

Lacking a mesh network protocol and having a short range are two limitations for Bluetooth. In fact, not having a mesh network is one factor keeping Bluetooth out of larger distributed sensor networks. Although a mesh solution is in development, it is significantly behind others.

Bluetooth Key Features:

  • Covers all the layers of the primary reference model. The Bluetooth SIG defines the radio interface, software stack, and specifications for how a device works in an
  • Operates in the unlicensed 2.4 GHz
  • Uses frequency hopping spread spectrum (HPSS) to improve communications in noisy channels and to avoid BLE adds robustness through use of CRC and a Message Integrity Check (MIC).
  • Allows for three different types of radio powers: Class 1 = 100mW (20 dBm), Class 2 = 2.5mW (4 dBm), and Class 3 = 1mW (0 dBm).
  • The max output power for BLE is 10mW (10dBm).
  • Range is <30m (Smart/BLE)
  • Data Rates: up to 2 Mbps (Bluetooth), 270kbps (BLE). Note BLE is mainly intended to be a very low data rate solution (e.g. transfer state knowledge or simple telemetry)
  • Provides security through 128 bit AES
  • Both Bluetooth and BLE have a defined certification process through the Bluetooth SIG

Bluetooth version 5 will include one-to-many messaging capabilities. It will also offer greater range, speed, and interoperability.

RFID

*Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. Passive tags collect energy from a nearby RFID reader’s interrogating radio waves. Active tags have a local power source (such as a battery) and may operate hundreds of meters from the RFID reader. Unlike a barcode, the tag need not be within the line of sight of the reader, so it may be embedded in the tracked object. RFID is a method for Automatic Identification and Data Capture (AIDC).

RFID tags are used in many industries, for example, an RFID tag attached to an automobile during production can be used to track its progress through the assembly line; RFID-tagged pharmaceuticals can be tracked through warehouses; and implanting RFID microchips in livestock and pets allows for positive identification of animals.

Since RFID tags can be attached to cash, clothing, and possessions, or implanted in animals and people, the possibility of reading personally-linked information without consent has raised serious privacy concerns. These concerns resulted in standard specifications development addressing privacy and security issues. ISO/IEC 18000 and ISO/IEC 29167 use on-chip cryptography methods for untraceability, tag and reader authentication, and over-the-air privacy. ISO/IEC 20248 specifies a digital signature data structure for RFID and barcodes providing data, source and read method authenticity. This work is done within ISO/IEC JTC 1/SC 31 Automatic identification and data capture techniques. Tags can also be used in shops to expedite checkout and to prevent theft by customers and employees.

Short range radio signal solutions are some of the most popular technologies for IoT systems. They offer both stability and accessibility and have been adopted internationally by developers.

IoT Signal Data (computing)

Published at DZone with permission of Jordan Eller, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Trending

  • [DZone Survey] Share Your Expertise for Our Database Research, 2023 Edition
  • Which Is Better for IoT: Azure RTOS or FreeRTOS?
  • A Data-Driven Approach to Application Modernization
  • How To Scan and Validate Image Uploads in Java

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: