Other IoT (Besides BLE)

Phil Morgan • May 16, 2020

I wanted to let you know that there are other IoT protocols out there besides BLE. We hear a lot about BLE, and last time, I wrote a lot about the operation of BLE.

This time I want to write about other alternatives. This isn’t going to be a comprehensive list but, hopefully, will give you a flavor of what is out there.

Where to start? Well let’s start with Wi-FI. Wi-Fi operates in 2.4GHz and 5GHz (and soon 6GHz, but we’ll ignore that for now). Most people don’t automatically register Wi-Fi with IoT but there are IoT devices out there that use Wi-Fi.

Most IoT protocols run on top of 802.15.4 or a variant of it. These protocols are ideal for IoT systems.

IoT protocols that use 2.4GHz include Bluetooth/BLE, Zigbee and WirelessHART. These operate in the same frequency space as 2.4GHz Wi-Fi.

We also have CBRS (private LTE) operating around 3.6 MHz.

Most of the rest of the more common protocols* operate Sub-1GHz. Usually operating around 800-900+MHz (country dependent in many cases). This is where you will find Z-Wave, LoRa, Thread, and HaLow.

Let’s have a high-level overview of WirelessHART, LoRa, Thread and HaLow.

WirelessHART operates in the 2.4GHz ISM band and is designed to be low-power and have long battery life. Used in industrial and especially refinery industries. Here is a link to a great overview of WirelessHART by my colleague and friend, Troy Martin: https://www.youtube.com/watch?v=FkoY5NF0fVY

LoRa stands for Long Range. It is designed to allow communication between 2 points (P2P) over long distances. LoRaWAN is based on LoRa and is the protocol for building a network.

Thread is a mesh-based system based on 802.15.4. It runs on IP(v6) and is designed to create device-to-device, or device-to-cloud communications. Thread builds on top of 6LowPAN, which is IPv6 over Low-Power Wireless Personal Area networks.

HaLow was created by the Wi-Fi Alliance and is sometimes called Wi-Fi for IoT. It is based on 802.11ah and thus runs below 1GHz (S1G). It has low-power and long-range, penetrating walls and building due to its operation below 1GHz. It is designed to be very power efficient, running for years on coin cell-type batteries. Like other Sub-1GHz protocols the exact frequencies that HaLow runs on is region dependent.

Well there you go. Now you know more about IoT and some of the various protocols that exist to support it.

See you next time!

===

About NC-Expert

NC-Expert is a privately-held California corporation and is well established within the Wireless, Security, and Collaboration industry certification training, courseware development, and consulting markets.

Led by its Founder and CEO, Rie Vainstein, NC-Expert has won numerous private contracts with Fortune level companies around the world. These customers have depended on NC-Expert to train, advise, and mentor their staff.

So remember, if you are looking for the best IT training just call us at (855) 941-2121 or contact us

The post Other IoT (Besides BLE) appeared first on NC Expert.

NC-Expert Blog

By Rie Vainstein March 31, 2025
A Digital Shield for Your Online Adventures As tech professionals, we often spend a good chunk of our lives navigating the digital realm. Whether you’re troubleshooting a network, coding a new app, or just binge-watching the latest series, one thing is clear: your connection to the internet is a double-edged sword. It’s both incredibly convenient and, if not properly secured, a potential vulnerability. Enter the VPN (Virtual Private Network) our trusty, digital bodyguard. If you’re not already using one, or if you’re not entirely sure why you should, let’s walk through some of the reasons why a VPN is essential for anyone working in IT and, frankly, for anyone who uses the internet. What Is a VPN? In simple terms, a VPN creates a secure, encrypted tunnel between your device and the internet. It allows your data to travel securely, masking your IP address, and ensuring that no one (be it hackers or nosy advertisers) can track or intercept your online activity. Think of it as your personal “cloak of invisibility” in the digital world! 
By Phil Morgan March 13, 2025
Troubleshooting Wireless Networks with Ekahau: A Professional Engineer’s Guide Wireless networks have become the backbone of modern business infrastructure. From office environments to large-scale enterprises, ensuring a seamless wireless experience is essential for productivity. However, despite advancements in Wi-Fi technology, network performance issues often arise, ranging from signal interference and dead zones to capacity overloads and channel mismanagement. To tackle these issues efficiently, professional engineers rely on powerful tools. One such tool, Ekahau AI Pro, has become a gold standard in the wireless industry for troubleshooting and optimizing Wi-Fi networks. This blog delves into troubleshooting wireless networks using Ekahau tools, providing practical examples and technical insights to guide professional engineers in improving network performance.
By Rie Vainstein March 3, 2025
Futureproofing Our Security In our increasingly connected world, the security of digital information has never been more critical. From banking transactions to private communications, our data is constantly transmitted and stored across the internet. The current systems that protect this data rely on cryptography, a branch of mathematics that helps keep information secure by encoding it in ways that are difficult to decode without the proper key. However, with the rise of quantum computers, traditional cryptography is facing new and significant threats. This is where Post-Quantum Cryptography comes into play. What is Post-Quantum Cryptography? Post-Quantum Cryptography (PQC) [1] refers to cryptographic algorithms that are specifically designed to be secure against the power of quantum computers. Quantum computers, once they become practical, will be capable of solving complex mathematical problems much faster than classical computers. This will render many of the encryption methods we rely on today [such as RSA (Rivest, Shamir, and Adleman – initials of the inventors) and ECC (Elliptic Curve Cryptography)] vulnerable to attack. Quantum computers operate on quantum bits, or “qubits”, which can exist in multiple states simultaneously, unlike classical bits that are either a zer (0) or one (1). This allows quantum computers to perform certain calculations exponentially faster than classical computers. For example, in a matter of seconds, a quantum computer could potentially break an RSA key, which is considered secure by today’s standards. As quantum computing technology advances, the need for PQC becomes even more urgent.