please read subject materials (attached files) to answer the questions
Question 1
. a) Explain the differences between WiFi and Zigbee.
. b) Discuss several major applications of Zigbee.
Question 2
. a) What is an RFID tag and how it works? Present an RFID application.
b) Investigate “LoRa Network Protocol” and its applications in the IT world.
2 WSN Applications Source ANTS & Source: Y. C. Tseng PERSONAL HEALTH CARE ZigBee LOW DATA-RATE RADIO DEVICES HOME AUTOMATIO N CONSUMER ELECTRONIC S TV VCR DVD/CD Remote control security HVAC lighting closures PC & PERIPHERAL S consoles portables educational TOYS & GAMES INDUSTRIAL & COMMERCIAL monitors sensors automation control mouse keyboard joystick monitors diagnostics sensors What is ZigBee? ZigBee relies upon the robust IEEE 802.15.4 PHY/MAC to provide reliable data transfer in noisy, interference-rich environments ZigBee layers on top of IEEE 802.15.4 with Mesh Networking, Security, and Applications control Infrequent, low rate and small packet data Supports peer-to-peer, star and mesh networks Security systems, smoke alarms ZigBee Alliance: Consortium of >150 companies. An organization with a mission to define reliable, cost effective, low-power, wirelessly networked, monitoring and control products based on an open global standard The alliance provides interoperability, certification testing, and branding. ZigBee/802.15.4 Technology: General Characteristics Data rates of 250 kbps , 20 kbps and 40kpbs. Star or Peer-to-Peer or Mesh operations. Support for low latency devices. CSMA-CA channel access. Dynamic device addressing. Low power consumption. Using Direct Sequence Spread Spectrum CDMA 16 channels in the 2.4GHz ISM band, 10 channels in the 915MHz ISM band and one channel in the European 868MHz band. CDMA - DSSS: Direct sequence spread spectrum User data Chipping sequence Spread spectrum signal XOR tb tc c b t tsfactorspreading = Where Does ZigBee Fit? Range Pe ak D at a R at e Closer Farther Sl ow e r Fa st er UWB Wireless Data Applications Sources: WRH + Co Matt Maupin Wireless Video Applications IrDA 802.11g 802.11b 802.11a 2.5G/3G Bluetooth™ ZigBee™ Wireless Sensors Wireless Networking Wi-Fi® Protocol Stack Features ZigBee Based upon the international IEEE 802.15.4 standard IEEE STD 802.15.4® Designed by Motorola, Philips and other companies PHY LAYER MAC LAYER NETWORK/SECURTIY LAYERS APPLICATION FRAMEWORK APPLICATION/PROFILES IEEE ZigBee Alliance Platform Application ZigBee Platform Stack Silicon ZigBee ZigBee Functional Layer Architecture and Protocol Stack Physical (PHY) layer Medium Access Control (MAC) layer Network (NWK) layer Application Sub layer (APS) AP Object 1 AP Object 240 Application Framework ZigBee Device Object (ZDO) Application Layer (APL) ZigBee Alliance IEEE 802.15.4 8 9 ZigBee End Device (RFD or FFD) ZigBee Router (FFD) ZigBee Coordinator (FFD) Mesh Link ZigBee Network Model (Source: Matt Maupin) RFID: Radio Frequency Identification ❑µ-chip is produced by Hitachi ❑The smallest size (0.4 x 0.4 x 0.06mm3) on the market ❑It can store 128 bit preset unique ID (read only) RFID: Radio Frequency Identification RFID is an extremely compact, asymmetric, low-power, low-data-rate communications technology with a multitude of industrial and commercial applications Tags can be attached to almost anything: pallets or cases of product vehicles company assets or personnel items such as apparel, luggage, laundry people, livestock, or pets high value electronics such as computers, TVs, camcorders Types of RFID ❑ Active Tag transmits radio signal Battery powered memory, radio & circuitry High Read Range ( max 1Km) ❑ Passive Tag reflects radio signal from reader Reader powered Shorter Read Range (10 cm – 5 m) Radio Frequency Identification (RFID) Source: Scientific American ❑ Tags can be read-only or read-write ❑ Tag memory can be factory or field programmed ❑ Bytes left unlocked can be rewritten over more than 100,000 times RFID Operation 1. Reader issues Commands 2. Carrier signal generated by the reader 3. Carrier signal sent out through the antennas via RF signal 4. Carrier signal hits tag(s) 5. Tag receives and modifies carrier signal “sends back” modulated signal 6. Antennas receive the modulated signal and send them to the Reader 7. Reader decodes the data Results returned to the host application References Jochen Schiller. Mobile Communications, chapter 3.1, 7.2, 7.3, 7.5, pages 70–72, 205– 239, 269–293. Addison Wesley, 2nd edition, 2003. Enterprise Solution Architecture BlackBerry Mobile Data System (MDS) supports MS Exchange, Lotus Domino, Novell GroupWire, and RIM’s own MDS systems for messaging applications Mobile Computing Components: Devices Handheld Mobile Phones Tablets Smartcards Smart Sensors Mobile Handsets Smartcards Integrated circuit cards (ICCs) are small pocket-size cards with electronic circuits embedded in them. Contact Smartcards have small gold-coated pins on the chip that provide contact with the electronics circuits of the card reader when the card is inserted in it. Example: telephone cards in public phones. Contactless cards communicate with the card readers using the RF induction technology The chip embedded in a smartcard includes a computer, memory, and transceivers. Smartcards can communicate with the host after appropriate interchanges for authentication. A card has a fabrication key (to identify a card uniquely), personalisation key (activate and program the card) and utilization lock (server to lock/unlock the card) embedded in it JavaCard is used to program smartcards. (Credit cards or ATM/debit cards.) Store personal ID (photo) and personal information Medical health records Employees to open security locks, workplace, log in Students to borrow books from their library Mobile Computing Components: Architecture, OS, Protocol Mobile Computing Architectural Layers Operating Systems Middleware for Mobile Systems Protocols: Communications & Application Mobile computing architecture in an automobile Client Applications Communication APIs (Internet, SMS, security, communication protocol APIs for GUI and real time display Speech system APIs Middleware components: Traffic control services, portal services discovery, news, weather, stock reports, network database Operating System Device hardware: display panel, speech processor, text to speech keypad, RAM, flash, embedded processor, media processor, GPS receiver , network bus interface GPS satellite interface, WAP gateway Network Mobile Computing Components: Communications and Networks Cellular Networks: GSM, GPRS, EDGE, 3G, 4G (CDMA2000, W-CDMA or UMTS, LTE, LTE- Advanced) Wireless Local Area Networks (WLANs): 802.11 Wireless Metropolitan Area Networks 802.16 - WiMAX Wireless Personal Area Networks (PANs): Bluetooth, Hiperlan, Zigbee RFID Operating Systems (popular ones) Google Android Platform Apple IOS Linux Window 10 Symbian OS Blackberry OS The Android Platform Apple iOS iPhone OS was first released in June 2007. The Apple mobile operating systems for iPhone, but also supports iPod touch, iPad, and Apple TV. In June 2010 licensed the trademark iOS (From Cisco IOS) Now goes all the way up to iOS 7 for iPhone4, iPhone 5, iPad 2, iPad Mini, iPod Touch iPhone SDK is divided into functional sets: Cocoa Touch: touch events and controls, accelerometer, view, camera Media: audio mixing and recording, video player, image formats, animation. Core Services: network, SQLLite embedded database, GeoLocation, and Thread Operating System X Core: TCP/IP stack, sockets, power management, file system, and security Internet of Things (IoTs) Internet of Everything 26 APCASE 2014 Keynote, February 10-12, 2014, Bali APCASE 2014 Keynote, February 10-12, 2014, Bali 2 7 Things – Objects Internet of Things (IoTs) Things in IoTs include physical as well as virtual entities. They have a logical representation in the virtual or Internet world. Things that can provide some services and can be connected to anetwork infrastructure. IERC: European Research Cluster for the Internet of Things definition APCASE 2014 Keynote, February 10-12, 2014, Bali 2 8 M2M Service Layer in IoT 2 9 freescale – White paper Smart Objects for an IoTs Architecture Overview Limitations of mobile applications? An Example - The Remote Six- Minute Walk test (6MWT) 3-axis acceleometer Bluetooth Heart rate sensor Sp02 sensor h Remote server Doctors, Carers Smart Phone Assessment 2 – Written Essay 20% = Group + Individual The essay will have four main components: Group Component: a description of the mobile application that they will develop in the Lab. This is the group component. Individual component 1: an analysis that clearly identifies the needs and justification for the selected application () Individual component 2 a review of the technologies selected () and Individual component 3a discussion why these technologies are selected and deployed. This is a group exercise and the essay is limited to 6 pages (single space, single column, font size 11, excluding diagrams and references). Assessment 4 – Design Project 30% (Peer + Tutor+ Report) Assessment You have to develop scenarios (screenshots) that demonstrate the functionality of a mobile application that you described in your group essay. The application (for a smartphone) may be a) an application that has not existed yet for a smartphone, or b) an existing application, but with new features not found in the existing application. The emphasis is on “Mobile” applications You will use an interface prototyping tool (such as www.mockupscreens.com or any other mock up tools that are available on the Internet) to design the different screens. To demonstrate the functionality of your application we expect that you will design at least 30 different screens. You must be able to “step through” your application demonstrating the logical flow of screens. http://www.mockupscreens.com/