Other IoT (Besides BLE)

I wanted to let you know that there are other IoT protocols out there besides BLE. We hear a lot about BLE, and last time, I wrote a lot about the operation of BLE.

This time I want to write about other alternatives. This isn’t going to be a comprehensive list but, hopefully, will give you a flavor of what is out there.

Where to start? Well let’s start with Wi-FI. Wi-Fi operates in 2.4GHz and 5GHz (and soon 6GHz, but we’ll ignore that for now). Most people don’t automatically register Wi-Fi with IoT but there are IoT devices out there that use Wi-Fi.

Most IoT protocols run on top of 802.15.4 or a variant of it. These protocols are ideal for IoT systems.

IoT protocols that use 2.4GHz include Bluetooth/BLE, Zigbee and WirelessHART. These operate in the same frequency space as 2.4GHz Wi-Fi.

We also have CBRS (private LTE) operating around 3.6 MHz.

Most of the rest of the more common protocols* operate Sub-1GHz. Usually operating around 800-900+MHz (country dependent in many cases). This is where you will find Z-Wave, LoRa, Thread, and HaLow.

Let’s have a high-level overview of WirelessHART, LoRa, Thread and HaLow.

WirelessHART operates in the 2.4GHz ISM band and is designed to be low-power and have long battery life. Used in industrial and especially refinery industries. Here is a link to a great overview of WirelessHART by my colleague and friend, Troy Martin: https://www.youtube.com/watch?v=FkoY5NF0fVY

LoRa stands for Long Range. It is designed to allow communication between 2 points (P2P) over long distances. LoRaWAN is based on LoRa and is the protocol for building a network.

Thread is a mesh-based system based on 802.15.4. It runs on IP(v6) and is designed to create device-to-device, or device-to-cloud communications. Thread builds on top of 6LowPAN, which is IPv6 over Low-Power Wireless Personal Area networks.

HaLow was created by the Wi-Fi Alliance and is sometimes called Wi-Fi for IoT. It is based on 802.11ah and thus runs below 1GHz (S1G). It has low-power and long-range, penetrating walls and building due to its operation below 1GHz. It is designed to be very power efficient, running for years on coin cell-type batteries. Like other Sub-1GHz protocols the exact frequencies that HaLow runs on is region dependent.

Well there you go. Now you know more about IoT and some of the various protocols that exist to support it.

See you next time!

===

About NC-Expert

NC-Expert is a privately-held California corporation and is well established within the Wireless, Security, and Collaboration industry certification training, courseware development, and consulting markets.

Led by its Founder and CEO, Rie Vainstein, NC-Expert has won numerous private contracts with Fortune level companies around the world. These customers have depended on NC-Expert to train, advise, and mentor their staff.

So remember, if you are looking for the best IT training just call us at (855) 941-2121 or contact us

The post Other IoT (Besides BLE) appeared first on NC Expert.

NC-Expert Blog

By Rie Morgan April 30, 2026
Meet the Team: Repeaters, Hubs, Bridges, Switches, Modems, Gateways, and Access Points When you first step into networking, the equipment can feel like a cast of characters in a technical drama. Each device has a role. Some are veterans from networking’s early days. Others are modern specialists. Together, they form the backbone of how devices communicate. 
By Rie Morgan April 27, 2026
When people first start working with wi-fi security, or enter the cybersecurity arena, they quickly hear about something called the "CIA Triad". (No, not that CIA!) In cybersecurity, the CIA Triad stands for: Confidentiality, Integrity, and Availability . These three principles form the foundation of information security. Nearly every security control, policy, and technology decision can be traced back to protecting one (or more) of these pillars. But in real-world IT environments, there are two additional principles that deserve seats at the table: Authenticity and Non-Repudiation . Together, these five ideas provide a practical framework for understanding what security is actually trying to achieve. Let’s walk through them...
By Rie Morgan April 15, 2026
Wi‑Fi security is no longer just an IT checkbox; it is a business risk issue that affects data protection, uptime, customer trust, and compliance. Strong wireless security helps businesses keep unauthorized users out, protect sensitive traffic, and reduce the chance that a single compromised access point (AP) becomes a wider network breach.