You are on page 1of 21

Get connected:

WIRELESS
CONNECTIVITY
FOR TECH DUMMIES
Your guide to connectivity products
Get connected: Wireless Connectivity for Tech Dummies

INTRODUCTION
Manufacturers are rushing to join the Internet of Things (IoT) goldrush by creating new kinds
of products, systems, and devices to make our lives more efficient, more entertaining, and
more comfortable.

From health and wellness monitoring to smart energy meters, from automated logistics to
self-piloting drones, the world around us is fast becoming hyper-connected.

As IoT becomes commonplace in almost every aspect of our life, more and more businesses
need to adapt, or face disruption.

Embedded technology engineers now need to have a deep understanding of connectivity


for the first time in their careers, and senior management will find themselves left behind
without at least a basic level of understanding.

An IoT device consists of three elements: Hardware, software, and connectivity. The
hardware element will contain sensors such as temperature, sound, moisture, movement,
and so on. The application element will generally be hosted elsewhere, commonly on a
smartphone or tablet. Cloud services may also be utilized.

Connectivity is the critical third piece of the puzzle, linking hardware elements with each
other, and with the application. Without connectivity, there is no Internet of Things, just
things.

The aim of this eBook is to give you an introduction to how to use the
various connectivity protocols relevant for IoT. We will also present some
examples so you can begin to understand how the various protocols can
be used individually, and in combination.

Nordic Semiconductor 2
Get connected: Wireless Connectivity for Tech Dummies

TABLE OF CONTENTS

INTRODUCTION

01. IoT ARCHITECTURE

a. Device & gateway


b. Application back-end
c. Presentation / analytics

02. TECHNOLOGIES

a. Wi-Fi
b. Bluetooth low energy
c. RFID
d. NFC
e. Cellular
f. Z-Wave
g. ZigBee

03. THINGS TO CONSIDER

a. Over-the-air updates
b. Security concerns
c. Standards
d. The move to IPv6

04. WHICH CONNECTIVITY OPTION IS RIGHT FOR YOU?

Nordic Semiconductor 3
Get connected: Wireless Connectivity for Tech Dummies

“Know your
architecture!”

01. IOT ARCHITECTURE


Before evaluating the various connectivity options for your IoT project, it is important to
understand the functional architecture of IoT solutions.

IoT solutions require secure, bidirectional communication between devices, which could
number anywhere between two and several million. A back-end solution that provides
functions such as management, monitoring, analysis, automation is also required.

a. DEVICE & GATEWAY

In an IoT solution, a machine such as a washing machine or automobile has an embedded


communication device that connects to a network, thereby enabling the machine to interact
with a cloud-based application, applications on other devices such as smartphones, or other
machines.

The communication device may be connected to a local gateway through a short range
network such as WiFi, Zigbee or Bluetooth, or directly to a wide area network such as the
mobile cellular network.

Nordic Semiconductor 4
Get connected: Wireless Connectivity for Tech Dummies

b. APPLICATION BACK-END

The data processing required by the IoT solution most likely takes place in the cloud. The
back-end application:

• Receives huge quantities of data from devices via the gateway solutions
• Processes and stores the data
• Enables you to send data / instructions back to the device
• Controls registration of devices able to connect to the application
• Provides monitoring of all the devices

c. PRESENTATION / ANALYTICS

The business intelligence layer allows business users to interact with the IoT solution through
dashboards and reports. Depending on the solution, you will be able to check the individual
status of any device connected to the network, view real-time and historical data, and run
reports. This layer also allows for integration of the IoT solution into other business systems.

“The back-end application


enables you to
send data/instructions
back to the device”

Nordic Semiconductor 5
Get connected: Wireless Connectivity for Tech Dummies

“The correct choice for your


circumstances will depend
on many factors”

02. TECHNOLOGIES
There are many different connectivity options for an IoT solution.
Many are used in combination because of the different features and
benefits of each one.

Take a look at your smartphone, which has cellular, Wi-Fi and Bluetooth all built in as
standard.

Wi-Fi and cellular are popular choices for when a device needs to be connected directly to
the Internet, while Bluetooth Low Energy is a great choice for connecting devices to each
other and to a gateway device such as a smartphone.

The correct choice for your circumstances will depend on many factors, including:

• Power requirements (mains or battery?)


• Bandwidth requirements (how much data?)
• Frequency of data transfer (how often?)
• Range requirements (how far away?)
• Physical size limitations (how big?)
• Cost limitations (how expensive?)

We will now take a look at each of the major connectivity protocols in turn.

Nordic Semiconductor 6
Get connected: Wireless Connectivity for Tech Dummies

a. WI-FI

Along with cellular technology, Wi-Fi is the best known connectivity protocol and is present
in almost every home in the western world. Wherever you are, your smartphone will likely
pick up at least one available Wi-Fi network. In densely populated cities, that number can
run into the thousands.

As an established, mature technology, Wi-Fi can be used to easily link together IoT devices,
as well as connecting them to wireless access points that in turn connect to cloud-based
systems.

Instead of trying to handle the complexity of developing their own wireless systems, many
manufacturers instead choose to use pre-certified fully integrated Wi-Fi connectivity
solutions. Created specifically to help designers meet these new challenges, these
embedded modules and software provide a cost-effective way for IoT developers to get
their product to market with less time, less cost and less risk.

Modules should support all existing standards, including IEEE 802.11b/g/n standards at data
rates of up to 20 Mbps. In addition to basic 802.11 capabilities, the firmware should also
include support for advanced Wi-Fi features plus the full range of security options, including
WPS 2.0, WEP, and WPA/WPA2.

To speed up the design process, choose Wi-Fi modules that are equipped with internal flash
and integrated antenna. If you have global aspirations for your product, it is important to
look for pre-certified solutions, which will dramatically shorten the time to market.

“Wi-Fi is the best known


connectivity protocol and
is present in almost every
home in the western world”

Nordic Semiconductor 7
Get connected: Wireless Connectivity for Tech Dummies

CONNECTING TO WI-FI

An important aspect to consider when evaluating Wi-Fi for your product is how the user will
connect.

Currently, most devices that connect to a Wi-Fi network require an SSID and a pass phrase,
which is generally longer than a password. Most equipment manufacturers now program
in unique SSIDs and pass phrases that are printed on a sticker on the hardware. When the
router is turned on, users must use the ”Join Network” functionality on their computer or
smart device to connect. Up until recently, most consumer devices come with displays,
keyboards, or touch screens to make it straightforward to enter this information. Things
however get a little more complex when it comes to IoT devices.

The vast majority of IoT devices, whether wearables, smart home sensors or others, do not
have a display or the capacity to enter data directly to the device. To connect these to a
Wi-Fi network, the user must use an additional device.

CASE: A connected espresso machine

A Wi-Fi enabled espresso machine required the SSID and password in order to connect to the
network, but without a keyboard, entering the information is difficult. There are a couple of
options for manufacturers who want to put Wi-Fi capability in a coffee maker.

One approach is to include a “Wi-Fi Protected Setup” (WPS) button on the machine, which
should be pressed along with the equivalent button on the user’s router. However, this makes
the assumption that the user’s wireless router will have a WPS button, which is by no means
certain. Even if the router does have the button, how will you deal with support requests if the
machine is not connecting?

An alternative option is to have the espresso machine appear as an access point with its
own SSID and pass phrase. When the machine is activated, the SSID is broadcast. The user
connects wirelessly to the coffee maker, and navigates to an area to enter the SSID and
network pass phrase, which configures the device as a client on the user’s network. While
effective, this method assumes a reasonable level of technical ability on behalf of the user, and
will likely lead to a large volume of support requests and frustration.

Nordic Semiconductor 8
Get connected: Wireless Connectivity for Tech Dummies

THE FUTURE

Currently it is very easy for a typical home router to become overloaded with devices, and
for range to become an issue even inside an average home.

The Wi-Fi Alliance (the organization that advances Wi-Fi standards) promises to double the
range of standard 2.4GHz Wi-Fi connections, while also doing a better job of penetrating
walls and other obstacles, in the next iteration of the protocol called Wi-Fi HaLow, due out
in 2018.

However, in an industry where time to market is a critical success factor, waiting around for a
connectivity protocol currently under development is never a good strategy.

“Waiting around for a


connectivity protocol
currently under development
is never a good strategy”

Nordic Semiconductor 9
Get connected: Wireless Connectivity for Tech Dummies

b. BLUETOOTH LOW ENERGY

The Bluetooth standard was created on Ericsson research, with the aim to create a standard
for personal area networks, allowing short range, but using power. Bluetooth uses a radio
technology called Frequency Hopping Spread Spectrum (FHSS), which combined with fast
acknowledgements make the connection extremely robust and avoids channel interference
and multipath distortion.

The technology is managed and overseen by the non-profit Bluetooth Special Interest
Group, which has more than 20,000 member companies. Nordic Semiconductor is one of 11
board members.

Bluetooth’s fourth generation implementation in 2010 was introduced to meet the IoT
requirements for ultra-low power. Typical implementations of Bluetooth low energy, formerly
known as Bluetooth Smart, include fitness trackers and a wireless mouse connected to a PC.

An ideal BLE chip is small and fits nicely into an esthetically-pleasing wearable that is
convenient for the user to wear. A line-of-sight range of up to 100 meters is possible. Using BLE
requires your device to be paired with a host, most usually a cellphone with an app activated.

Making a product with Bluetooth low energy technology has become easy. Everything
you need from the chip to the protocol stack and examples of use is provided by the chip
vendor. And even if the technology is advanced, it is easy to use through standardized
profiles and API’s.

Firstly, it allows small packets of only 27 bytes. It has short transmit and receive windows
and there is always a race to idle. It turns on the radio as seldom as possible, and off as soon
as possible, retaining a quick connection speed. These features allow the device to run for
years, powered by a simple coin-cell battery.

CASE: Adidas miCoach SMART BALL

Equipment manufacturer Adidas are a well-known consumer brand in fashion as well as sport.
Recently they took their knowledge from the development and launch of a smart watch and
applied it to what they know best: sport.

With the Adidas miCoach SMART BALL and app, users can track and analyse different kinds
of kicks, with the aim of improving their game. It might not be the first market you think of for
Internet of Things disruption, but as the most popular participation sport in the world, football
has the potential to be an incredibly lucrative IoT market.

The ball itself contains a battery that lasts for approximately one week or 2,000 kicks before
it needs to be rested on a charging base that plugs into a mains connection. The ball connects
to the smartphone app (iPhone and Android) via Bluetooth low energy, whenever the ball is
kicked. Data sent includes speed, spin, and the flight path of the ball. The app then crunches
the numbers to bring the user tips on how to improve their style.

Nordic Semiconductor 10
Get connected: Wireless Connectivity for Tech Dummies

c. RFID

Though Radio-frequency identification (RFID) technology has been around for decades, the
emergence of IoT promises to introduce it to a whole new set of industries. The dominant
application of RFID remains inventory management, but other uses are emerging.

RFID tags are essentially intelligent bar codes that can talk to a networked system to track
every product to which they are attached. RFID tags are an improvement over bar codes
because the tags are not static information. They have read and write capabilities, so the
data stored on RFID tags can be changed, updated and locked.

Many manufacturers use RFID tags to track the location of each product they make from
the moment of manufacture to the moment of purchase. In addition to retail, RFID tags are
also tracking airline passengers, Alzheimer’s patients, children, pets and vehicles.

As they can store data cheaply and efficiently, RFID tags can calculate the cost of highway
tolls and public transit fares, automatically deducting the cost from the user’s account
balance. Rather than waiting to pay, passengers can use credit-card like passes with RFID
tags embedded inside.

Newer innovations in the RFID industry include active, semi-active and passive RFID tags.
These tags can store up to 2 kilobytes of data and are composed of a microchip, antenna
and, in the case of active and semi-passive tags, a battery. The tag’s components are
enclosed within plastic, silicon or sometimes glass.

At a basic level, each tag works in the same way:

• Data­stored within an RFID tag’s microchip waits to be read.


• The tag’s antenna receives electromagnetic energy from an RFID reader’s antenna.
• Using power from its internal battery or power harvested from the reader’s electro-
magnetic field, the tag sends radio waves back to the reader.
• The reader picks up the tag’s radio waves and interprets the frequencies as
meaningful data.

Active, semi-passive and passive RFID tags are making RFID technology more accessible.
These tags are less expensive to produce, and can be manufactured small enough to fit
inside almost any product.

Active and semi-passive RFID tags use internal batteries to power their circuits, while
passive RFID tags rely entirely on the reader and built-in induction loops as their power
source. Because these tags contain more hardware than passive RFID tags, they are more
expensive and therefore reserved for costly items that require bigger distances to function.
Airplanes will have active RFID tags, whereas a jar of pickles would have a passive tag.

Major retail chains use RFID alongside automated intelligent software to manage their
inventory, while retail payments are on the verge of transforming thanks to systems that use
Near Field Communication (NFC), a form of RFID.

Nordic Semiconductor 11
Get connected: Wireless Connectivity for Tech Dummies

d. NFC

While RFID has been around for a while, NFC is a promising technology. Known as the credit
card of the future, NFC powers many of the emerging payment systems of today including
contactless credit cards and digital wallets.

NFC devices can read passive RFID tags and extract the information stored in them. The
application stores credit card information under multiple layers of security and allows for
quick payments by tapping a card at an NFC terminal.

The technology is already used in advertising, whereby a user can tap an NFC-enabled
phone against a poster to obtain a discount code, for example. Such smart posters can add
a new level of engagement with customers. Passive RFID tags are so cheap to produce that
their use can make economic sense even just as a method of attracting and engaging with
potential customers.

It looks certain that NFC and RFID technologies have a future in the retail ad payments
space, although security remains a valid concern. With no form of user validation such as a
signature or PIN number required, NFC payments could be at risk from a hacked reader or
other device intercepting the signal.

“Smart posters can add a


new level of engagement
with customers”

Nordic Semiconductor 12
Get connected: Wireless Connectivity for Tech Dummies

e. CELLULAR

Cellular connectivity is an important access methodology to support and enable


communications over large scale IoT devices. Cellular technology is often used in
combination with local connectivity technologies such as WiFi or Bluetooth to address a
range of IoT use cases that require mobility and robust connectivity, and with GPS capability
in smartphones and other products to enable positioning and tracking services.

Through cellular connectivity, smart cities can be filled with street light automation, tunnel
navigation services, vehicle and bicycle sharing services, smart parking solutions, electronic
toll collection services and of course, the connected car.

CASE: The Connected Car

The concept of a connected vehicle is not new. The industry has been debating it ever since
GM launched their OnStar service back in the mid-1990s. Since then, the rate of improvement
in vehicle technology has been astonishing.

The connected car concept no longer just includes sensors and warning signs, but the Internet
connectivity to add interaction and even a local area network for devices within the car.

This is an unstoppable momentum, as the percentage of cars produced with connectivity is set
to increase from 7.5 percent in 2015 to 75 percent by 2020.

Cellular services are ideally suited to provide connectivity to the connected car vehicle market
because of the mobility requirements and real-time communication needs. As 4G rollout
continues and 5G networks are introduced, cellular connectivity will continue to enhance the
capabilities of the connected car. Soon, they will even drive themselves.

Once bandwidth and data costs are less of an issue, the collection of millions of data points
throughout the year could help dealers to predict issues before they occur. Entertainment
options including full streaming services for back-seat passengers and remote services such as
pre-warming the car will be commonplace.

There are some issues to overcome with cellular technologies. Many of the IoT solutions
already deployed will need to be migrated as 2G (and eventually 3G) networks become
obsolete, but the future for cellular connectivity looks bright.

Plans for 5th generation mobile networks (5G) are focused on adding capacity and reducing
latency, further enhancing the reliability of the solution.

Nordic Semiconductor 13
Get connected: Wireless Connectivity for Tech Dummies

f. Z-WAVE

The Z-Wave protocol is an interoperable, wireless, RF-based communications technology


designed specifically for control, monitoring and status reading applications in residential
and light commercial environments. It is best suited to control lighting, HVAC, security
systems, home cinema, garage and home access controls.

It is a low-powered RF communications technology that supports full mesh networks


without the need for a coordinator node. As it operates in the sub-1GHz band, it does not
experience interference from Wi-Fi or other technologies that operate in the 2.4 GHz range
such as Bluetooth. Unlike those technologies, Z-Wave is specifically designed to provice
transmission of small data packets, thus ideally suited for control and sensor applications.
Communication distance between two nodes is about 30 meters.

Devices can communicate to one another by using intermediate nodes to actively route
around and circumvent household obstacles or radio dead spots that might occur in a
house. A message from node A to node C can be successfully delivered even if the two
nodes are not within range, providing that a third node B can communicate with nodes A
and C. If the preferred route is unavailable, the message originator will attempt other routes
until a path is found to the C node. Therefore, a Z-Wave network can span much farther than
the radio range of a single unit, albeit with a slight delay.

g. ZIGBEE

ZigBee is an IEEE 802.15.4-based specification for a suite of high-level communication


protocols used to create personal area networks with small, low-power digital radios.

The most common implementation is within home automation, such as entertainment, safety
and control devices, but ZigBee is also suited to industrial control, wireless sensor networks,
medical data collection and building automation.

The technology defined by the ZigBee specification is intended to be simpler and less
expensive than other wireless personal area networks such as Bluetooth or Wi-Fi.

Its low power consumption limits transmission distances to 10–100 meters line-of-sight,
depending on power output and environmental characteristics. ZigBee devices can transmit
data over long distances by passing data through a mesh network of intermediate devices
to reach more distant ones. ZigBee is typically used in low data rate applications that require
long battery life and secure networking, such as lighting networks and building automation.

ZigBee protocols are intended for embedded applications requiring low power consumption
and tolerating low data rates. The resulting network will use very small amounts of power,
and indeed, individual devices must have a battery life of at least two years to pass ZigBee
certification.

Nordic Semiconductor 14
Get connected: Wireless Connectivity for Tech Dummies

“OTA-DFU can drastically


reduce the time to market
as products do not have to
be 100% finished to
be released”

03. THINGS TO CONSIDER


a. OVER-THE-AIR UPDATES
In the past, firmware was hard coded into the ROM and not intended to be changed after
manufacture. Before Internet access became commonplace, faulty products would either
have to be returned to the manufacturer to be upgraded, or simply become obsolete.

Over-the-air device firmware updates (OTA-DFU) refers to various methods of remotely


distributing new software, configuration settings, and even updating encryption keys to
devices. One central location can send an update to all users, who are unable to reject
or alter it. This makes it perfectly suited for critical updates, security patches and new
functionality.

OTA-DFU has become increasingly important to distribute product updates as smart


devices have become more complex. In the smartphone world, OTA is sometimes used to
refer to a simple software update, while in the world of IoT, firmware and software can be
updated directly to the device.

To fully appreciate the potential benefits of incorporating OTA-DFU into your product,
consider the case of an automotive recall announcement in 2014.

Both Tesla Motors and GM released recall notices related to a safety problem that could
cause fires. GM owners had to return their car to a dealership, causing an administrative
headache for the company and an inconvenient frustration for the owner. On the other
hand, Tesla issued an update via OTA-DFU technology and saved millions by avoiding the
need for customers to return their cars to a dealership.

Nordic Semiconductor 15
Get connected: Wireless Connectivity for Tech Dummies

With IoT devices flooding the market, how long will your product realistically be used and
loved by its users before a better product comes along?

If you are planning a recurring revenue business model, then this is a potential business killer.
Building in the ability to update the firmware on the fly extends the life of your product, thus
extending the cash flow.

But that is not the only benefit. OTA-DFU can drastically reduce the time to market as
products do not have to be 100% finished to be released.

Release the product when it’s 90% complete to early adopters, who often
have a higher tolerance for teething problems, and by the time you have
momentum in the market, your product will be fully-ready and all the
existing devices currently in use can be updated.

b. SECURITY CONCERNS

IoT is fundamentally changing how the world sees data security and privacy. Every end
point device or gateway device and connection that gathers, transmits, stores or processes
sensitive data is a potential risk.

Security rests on fundamentals. The management of encryption and authentication are the
foundation of resilient security, but there is no need for you to reinvent the wheel. Some
open source libraries perform encryption to a very high standard and are well suited even
for the resource constraints of an IoT device.

A study by HP found that 70 percent of the most commonly used IoT devices contain
security vulnerabilities, including:

• Insecure web/cloud interface


• Insufficient authentication and encryption
• Privacy issues
• Insecure mobile interface
• Insufficient security configurability
• Poor physical security

Nordic Semiconductor 16
Get connected: Wireless Connectivity for Tech Dummies

c. STANDARDS

With so many companies working on different products, technologies and platforms,


making all these devices communicate with each other is no small feat.

It seems likely that seamless overall compatibility is not going to happen.

Several groups are working to create an open standard that would allow interoperability
among the various products. Among them are the AllSeen Alliance, whose members include
Qualcomm, LG, Microsoft, Panasonic and Sony; and the Open Interconnect Consortium,
which includes Intel, Cisco, GE, Samsung and HP.

It is not yet clear how the open standards battle will conclude, although many believe we will
end up with three to four different standards rather than a single winner, and most likely a
number of proprietary environments, such as Apple.

In the meantime, one way consumers can get around the problem is by purchasing a hub
that supports multiple wireless technologies, such as the SmartThings hub from Samsung.

CASE: SmartThings Hub

The SmartThings Hub from Samsung is the heart of your smart home. It connects wirelessly
with hundreds of compatible smart devices, allowing you to monitor, control, and secure your
home from anywhere. It works with products from Samsung, Belkin, GE, Bose, Schlage, Yale,
Cree, Osram Lightify, Honeywell, First Alert, and many other brands.

A key benefit of the SmartThings Hub is the compatibility with both ZigBee Home Automation
and Z-Wave protocols, along with IP-accessible devices.

Nordic Semiconductor 17
Get connected: Wireless Connectivity for Tech Dummies

d. THE MOVE TO IPv6

Every device on the Internet is assigned an IP address for identification and location
definition. With the rapid growth of the Internet over the past two decades, it quickly
became evident that far more addresses would be required than were originally available
under the IPv4 protocol.

IPv4 uses 32-bit addresses and provides 4,294,967,296 of them, but the 128-bit system of
IPv6 will provide an astonishing number of addresses: 340,282,366,920,938,463,463,374,
607,431,768,211,456 to be precise.

The two protocols are not designed to be interoperable, which complicates the transition to
IPv6. Compatibility with IPv6 networking is mainly a software or firmware issue, but in reality
much of the older hardware is likely to be replaced.

For an IoT product manufacturer, the key issue to consider when it comes to IPv6 is security.
Although IPv6 has been discussed for years, there is still a lack of understanding within the
IT security industry.

All modern operating systems are compatible with IPv6 and it is enabled by default in the
majority. The reality is that most organizations will need to run IPv6 alongside its existing
IPv4 infrastructures for a longer period of time than first anticipated.

Complications such as this, especially involving legacy systems accessing cloud and mobile
services, open up all manner of security problems.

The greatest concern is that most current firewalls, detection and prevention technology
was built for IPv4. Although the vulnerabilities are theoretical, it is important to spend some
time understanding the potential threats and mitigating the risk to your IoT solution.

We recommend:

• Learn IPv6 concepts and operations


• Evaluate your security technology for IPv6, beyond the documentation
• Update your security procedures specifically for IPv6 and IoT

Nordic Semiconductor 18
Get connected: Wireless Connectivity for Tech Dummies

“The properties and function


of your product will help you
choose the right wireless
technology”

04. WHICH CONNECTIVITY OPTION IS


RIGHT FOR YOU?
Hopefully you are now a little clearer on which wireless technology is best for you. If you are
still struggling, consider your product priorities. Is it size, power consumption, user experience,
cost, or something else?

Once you get clear on the priorities for your product, your wireless communication options
become a lot clearer.

Some wearables combine different wireless technologies to take advantage of different


aspects of each method. The Apple Watch uses Bluetooth Classic, BLE, Wi-Fi, and even NFC
for mobile payments. But remember, with added complexity comes added cost and increased
security risk.

On the next page we have included a schematic comparison of technologi-


es to summarize what you should keep in mind when choosing your option.

Nordic Semiconductor 19
Get connected: Wireless Connectivity for Tech Dummies

TABLE 1: COMPARISON OF TECHNOLOGIES

Bluetooth
Wi-Fi low ener- RFID NFC Cellular Z-Wave ZigBee
gy

Bandwith >1 Gbit <1 Mbit - 100-400 kbit <300 Mbit 40 kbit <250 kbit

Native on Native on Android:


Phone
Smart- Smart- No Wide Native No No
connectivity
Phones Phones support

(Very low, Low/


Power
High Low tag is passive High Medium Low
consumption
passive) for tag

NA/High NA/High
Suitable for Re-
No Coin cells reader reader No Coin cells
Battery power 1 chargeable
current current

Max range 30-300 m 20-50 m 0-4 cm 0-4 cm 30 km 2


100 m 70-300 m

Global
Yes Yes Yes Yes 3
No Yes
frequency

Star (Mesh
Network Point to Point to Point to
Star in develop- Mesh Mesh
topography point point base station
ment)

Open
Yes Yes Yes Yes Yes No Yes
standard

Service provider
No No No No Yes No No
needed

1. Some technologies require connection to be continuously maintained,


and are therefore not suitable for battery-power.
2. Max distance to base station. Beyond that, cellular network is global.
3. Need multiple bands for global coverage. Including antennas, amplifiers, etc.

Nordic Semiconductor 20
Telephone: +47 22 51 10 50

Postal address:
Nordic Semiconductor ASA
P.O. Box 436, Skøyen
0213 Oslo
Norway

For direct shipment/ visiting address:


Karenslyst Allé 5
0278 Oslo
Norway

www.nordicsemi.com

You might also like