IQRF Basic informations Piotr Antończyk IQRF Tech s.r.o.
History Founded in 1991 HQ in Jicin, CZ IQRF since 2004 Over 30 patents IQRF technology Ecosystem provider
Basic features IQRF is complete wireless technology for ISM bands 868 MHz, 916 MHz and 433 MHz! - Transceiver modules with built-in operating system. - Functionality depends on user application written in C language or ready-to-use plug-in. - Low data rate 19.836 kb/s. - Packet oriented communication (max. 64 user bytes in RF packet) up to 56 B in 1 packet. - No license fees!
Basic features Bands 868, 916, 433 MHz Topology full mesh with 240 hops (used in real applications), 239 nodes References hundreds of thousands running devices worldwide since 2008 Protocol IQMESH, patented directed flooding networking, secure communication, redundant packet deliver, no need for self healing, no latency after reset, etc. Range 500m line of sight / 200m municipal area / 50 100m indoor @ 12 mw Power consumption Standard RX 12.3 ma Low Power RX 170 µa Deep sleep < 100 na sleep 2 µa
Unique features Transceiver architecture PATENTED, used in many technologies worldwide, built-in OS Robust routing algorithm PATENTED, directed flooding reliably working mesh network with 239 routers Direct Peripherals Access PATENTED, framework for wireless networks with no programming, easy-to-achieve interoperability, wireless integration in a few weeks Fast Response Command PATENTED, the fastest wireless mesh network data collection worldwide, 2bits from 240 nodes in 26s, minimal network traffic and power consumption Back up and restore back up of all network data for further easy network restore Autonetwork automated network build up
IQRF Technology DCTR-72Dx DCTR-76Dx GW-GSM-02A (72D) GW-WIFI-01 (72D) DS-START-04 GW-USB-06 KON-RASP-01 GW-ETH-02A (72D) RT-230-06 (72D) TR-72Dx-WMB DS-DPA-02 TR-76Dx-WMB
IQRF Technology Transceiver modules Accessories HW / SW development tools Gateways HWP / DPA Demo examples IQRF SDK Support IQRF Alliance
Ecosystem
Why mesh? Increased mesh coverage to go around obstacles Extended range with extra hops The topology can withstand the high traffic Alternative routes to get the transfer done A broken node will not destruct the transmission Expansion or modification can be done without disrupting other nodes
IQRF Options Two Layers: - operating system - user application Two Approaches: C programming Hardware Profiles (HWP)
HWP Hardware Profile (HWP) is ready to use application which offers some peripherals and services No programming! Need to modify? Custom DPA Handler
DPA protocol Direct Peripheral Access (DPA) is a simple byte oriented protocol used to control services and peripherals of IQMESH network devices by SPI or UART interfaces.
DPA protocol NADR PNUM PCMD HWPID PDATA Node Address Peripheral Number Peripheral Command HW Profile Identification Up to 56 B NADR Node Address (2B) specifies address of each node in a network PNUM Peripheral Number (1B) is code of specific peripheral available PCMD Peripheral Command (1B) contains specific command for particular peripheral HWPID HW Profile Identification (2B) uniquely specifies the type (functionality) of the device PDATA Up to 56 Bytes of data can be transferred with DPA protocol, data are used as a parameter for some Peripheral Commands, as well
Hardware and Software
Several types of modules Antenna options: Mounting options:
DCTR easy implementation...
Set up and maintenance...
DISCOVERY 0 C Zone 0 4 6 2 Virtual Routing Number 3 1 Zone 1 5 4 2/3 2 0/C 1
PACKET DELIVERY 0 C Time slot Directed Flooding 0 1 2 3 4 4 Redundant packet delivery 6 2 No lost packets 3 1 5 4 No need of self healing Minimal latency after reset 2/3 2 0/C 1 Time of packet delivery = Time of a hop * number of hops Time of packet delivery and receiving response = Time of a hop * number of hops *2
PACKET DELIVERY 5 out of 11 links lost 4 0 C 6 2 Time slot 0 1 2 3 4 3 1 5 4 2/3 2 0/C 1
Time in seconds FAST RESPONSE COMMAND 2 000 1 800 1 600 1 400 1 200 1 000 800 600 400 200 0 Nodes [#] Polling [s] FRC [s] 10 3 1 20 13 2 50 77 6 100 303 12 200 1206 24 239 1721 29 Collect 2 bits 239 nodes 1 byte 63 nodes 2 bytes 31 nodes 0 50 100 150 200 250 Number of Nodes C 1 2 3 N1 N2 N3 N2 N3 N3 Send 2 30 bytes FRC Polling Polling
Practical presentation IOT Start Let s play
IQMESH protocol - security
Security Three different protections based on AES- 128 Access encryptions - Bonding - CATS services - Network backup and restore Networking encryptions User encryptions
Security Back to practical presentation
Piotr Antończyk Country Sales and Application Engineer mail: piotr.antonczyk@iqrf.org tel. +48 667 323 222