SlideShare a Scribd company logo
1 of 24
IoT Protocols: Making IoT Data Communication Seamless
• The protocols of the Internet of Things (IoT) technology stack
are essential as, without them, the hardware would be rendered
useless, and data communication would be a challenge.
IoT protocols by definition and vision
• IoT protocols aim to connect devices to IoT devices over a
seamless and secure connection.
• The IoT protocols operate on four pillars - device, connectivity,
data, and analytics.
• Their defense-in-depth security strategy shields the data
transmission layer by layer.
• While the business layer includes the management of billing
and data marketplaces, the people who interact with IoT
devices and technologies fall under the technology users layer.
• The device layer comprises a combination of sensors,
hardware, actuators, software, and gateways, constituting a
device that connects and interacts with a network.
• The data layer involves the data collected, processed, stored,
and analyzed in business contexts.
IoT protocols connection models
• There is no set pattern for data routing, and the communication
is highly dependent on the network topology.
• However, the fundamental models are used either as standalone
or in combinations for IoT deployments, including:
1. Device-to-device
• It enables communication between nearby devices (proximity)
using IoT Protocols like Bluetooth, ZigBee, Z-Wave, 4G, 5G,
and WiFi.
2. Device-to-gateway
• In this model, the devices communicate with the data system
using a mediator platform, such as LPWAN, WiFi, and/or
Ethernet IoT protocols.
• The core functions of device-to-gateway are combining data
from sensors, analyzing it, and routing it to the destination data
system (data center or cloud). Also, in case of any problem, the
connection model sends back the data to the source device.
3. Device-to-data
• It works on edge computing, allowing devices to connect
directly with the data source. A few popular device-to-data
connection models include BLE, LoRaWAN, and Z-Wave.
4. Gateway-to-data
• It is the simple communication between the mediator platform
or central hubs and the data center or cloud. Open Automation
Software (OAS) and Universal Data Connector are the best
examples of robust IoT Gateways.
5. Communication between data
• This protocol connection model allows data transmission
between the data center and the cloud. It includes IoT Data
protocols like MQTT, HTTP, REST, etc.
Types of IoT protocols
• IoT protocols and standards are broadly classified into two
separate categories, including IoT data protocols that have
presentation or application layers and network protocols for IoT
comprising datalink and physical layers:
1. IoT Data Protocols
• These protocols establish the end-to-end communication
between low-power IoT devices and the hardware at the source,
client, and/or user side, using only wired or cellular networks.
The IoT data protocols function without an internet connection:
1. Advanced Message Queuing Protocol (AMQP)
• AMQP is widely used in banking and finance as a message-
oriented open standard software protocol. It comprises three
crucial message components - Exchange, Queue, and Routing.
• It is based on the Transmission Control Protocol and works on
the architecture of "publish/subscribe" and "request/response"
types. In addition, the guaranteed delivery or transaction
message makes AMQP interoperable, secure, and reliable.
2. Data Distribution Service (DDS)
• DDS is a UDP based "publish/subscribe" API that facilitates
secure real-time M2M data sharing between the connected IoT
devices. Furthermore, it works on broker-less scalable
architecture (DCPS and DLRL), i.e., it operates independently
of any hardware or software platform.
• Its multi-purpose function simplifies IoT deployment for both
small devices and high-performance networks.
3. Extensible Messaging and Presence Protocol (XMPP)
• XMPP is a decentralized, open-source, and secure protocol
developed using XML language to enable real-time data
exchange.
• It operates as a presence indicator by reflecting the status of
available servers and devices. XMPP-IoT is a lightweight
version of XMPP and is the best for consumer-oriented IoT
deployments as it is extensible, scalable, and flexible.
4. WebSocket
• Introduced by HTML5, WebSocket is an event-triggered independent TCP-based IoT
protocol or API. It establishes full-duplex real-time communication between the
client and server.
• Using advanced technology streamlines complexities involved in the bi-directional
transmission over the internet. And, it is suitable to maintain constant connectivity
across heterogeneous IoT devices. Notably, WebSocket is much faster than HTTP
5. Open Platform Communications Unified Architecture (OPC UA)
• OPC UA is a next-generation data model technology ideal for Industry 4.0 and IoT. It
operates on a platform-independent, encrypted, and extensible multi-layered
architecture. In addition, its service-oriented framework supports both
"publish/subscribe" and "request/response" models.
• As per the latest press release published by OPC Foundation, leading IoT vendors
such as SIEMENS, SAP, Microsoft, IBM, AWS, and Google Cloud are already
leveraging OPC UA for edge-to-cloud applications.
II. IoT Network Protocols
• These protocols constitute specific standards, policies, and
unified rules to establish secured communication between IoT
devices over the internet.
• With emerging advancements in the IoT ecosystem, these
protocols utilize multiple technologies that work on network
topologies. The most widely used are star and mesh topologies.
Following are the extensively used IoT network protocols:
• 1. Bluetooth and BLE
• Bluetooth is the top choice for shorter-range wireless
communication, preferably for personal 2.4 GHz networks.
Bluetooth Low Energy (BLE) is its optimized version and the
standard protocol for IoT architecture.
• The latest version of Bluetooth is 5.3. It was released on 13th
July 2021 and is still in beta. Bluetooth best suits beacons,
fitness, automotive, retail, and audio IoT applications.
2. Cellular - 4G and 5G
• Cellular is a wireless mobile communication network technology that
facilitates large bandwidth and reliable broadband services.
• Currently, 3G is almost on the verge of extinction. On the other hand,
4G is leading but not suited for IoT applications due to higher cost
and power consumption.
• However, the new-age 5G is ideal for IoT applications across
industries and personal usage.
3. Wi-Fi and Wi-Fi HaLow
• WiFi is the most popular and conventional wireless network
protocol for home and commercial usage. But, it is not very
flexible and scalable for IoT purposes.
• WiFi HaLow (IEEE 802.11 ah) is a unique solution to overcome
its challenges. This high-level communication protocol provides
a long-range between 750 and 950 MHz with low-power
connectivity.
• 4. Low Power Wide Area Networks (LPWANs)
• LPWANs are a new set of wireless network protocols devised
to set up communication between low-power IoT applications
over long ranges.
• They are a cost-saving option because they operate on small
and affordable batteries that are long-lasting and power-
efficient.
• MIOTY, LoRaWAN, 6LoWPAN, Thread, NB-IoT, LTE-M,
SigFox, and HayStack are purpose-built LPWANs for large-
scale IoT deployments.
5. ZigBee
• ZigBee is a mesh wireless communication protocol that
operates on a 2.4 GHz network.
• It is short-range, highly interoperable, low-power consuming,
and facilitates massive data transfer in a single instance with
high security.
• ZigBee is most appropriate for small, and medium ranged IoT
devices such as microcontrollers, sensors, gateways, and so on.
• Notably, due to its mesh grid structural design, the connectivity
can be extended over a long distance using multi-hop routing.
• ZigBee is best suited for commercial building and innovative
home automation applications.
• Actually, it is the safest wireless protocol for transferring real-
time patient data from a sensor.
6. Z-Wave
• Similar to ZigBee, the Z-Wave protocol also works on mesh
network topology. However, it is most prominent for IoT home
automation applications.
• Z-Wave is a Radio Frequency (RF) based, less power-
consuming wireless communication technology that operates on
800-900 MHz and is purely location-dependent.
• As a result, it hardly faces any connectivity hindrance. It
facilitates safe and steady data transmission with low latency.
7. Extensible Messaging and Presence Protocol (XMPP)
• This technology dates back to the early 2000s and was designed for
real-time human-to-human communication. XMPP is now used for
M2M communication and for routing XML data.
• XMPP supports the real-time exchange of structured but extensible
data across multiple network entities, making it suitable for
consumer-oriented IoT deployments, such as smart appliances and
wearables.
• Other than the above-stated options, the network protocols such as
Lightweight M2M (LWM2M), Radio-frequency Identification
(RFID), Near Field Communication (NFC), Ethernet, and Wi-Sun
have contributed significantly towards setting up the sustainable
connection in the IoT space.
• Therefore, be it for home or commercial usage, the selection of an
ideal IoT network protocol must consider the parameters of
bandwidth, range, power consumption, latency, intermittent
connectivity, Quality of Service (QoS), and security.
• Benefits of IoT wireless protocols
• IoT protocols form a crucial component of the IoT infrastructure.
They serve higher data throughput with lesser complexities.
Wireless IoT protocols have become the first choice solution for
personal and industrial usage. The rising demand for wireless
IoT protocols is because of the core benefits:
• Affordability
• Less time and energy consumption
• Robust security and data privacy
• Good network coverage and connectivity
• Automated and streamlined communications
• Faster data transfer and smoother operations
• Easy setup and deployment in the IoT infrastructure
• Simple to use while resulting in enhanced productivity
IoT Protocol Layers
• IoT works on various networking technologies based on the IT
infrastructure requirements, and therefore, it needs architecture
to establish a coherent IoT ecosystem.
•
• Considering the complexities involved in the configuration,
operations, functionalities, and communications, the five
layers of IoT architecture are best suited for all purposes.
• 1. Network layer
• Its core function is to connect the IoT devices with the network
systems and servers. The network layer also helps to route and
control the data transmission with the help of set
communication protocols and unified formats.
• Utilizing the TCP/IP stack and cellular and wireless
technologies depending on the specification, the network layer
helps set up secure transmission across all interconnected
devices. A few examples are IPv4/IPv6, ICMP, IGMP, ARP,
3G/4G/5G, UDP, 6LoWPAN, and WiFi.
• 2. Application layer
• It acts as an interface between the IoT devices and the end users
or any other device that requests the information over the
secured network. After successful data processing, formatting,
and presentation, it produces the final information. A few
examples of the application layer are HTTP, FTP, POP, IMAP,
TLS, SMTP, DNS, TFTP, SNMP, and TELNET.
• The IoT application protocol depends on four crucial parameters
- latency, reliability, bandwidth, and transportation. Considering
the same, along with the correspondence of the specifications
and features, the following are the top five IoT application
protocols:
• Representational State Transfer (REST)
• Constrained Application Protocol (CoAP)
• Advanced Message Queuing Protocol (AMQP)
• Message Queue Telemetry Transport (MQTT)
• Extensible Message and Presence Protocol (XMPP)
• 3. Perception layer
• It constitutes sensors, actuators, and AI-powered devices to
gather valuable details about the surrounding physical objects
or the environment. The accumulated data is converted from
analog signals to digital format for further operations.
• Its functioning includes identification, information collection,
and automated control technologies to channel the digital and
real worlds. A few examples of the perception layer include
surveillance cameras, bar codes, portable PCs, RFID, WSN,
and GPS.
• 4. Security layer
• It minimizes the risk of potential cyberattacks on the most
vulnerable areas of the IoT ecosystem. The security
checkpoints occur at three significant places - the device
(including hardware and software), cloud, and connection.
• With the rapid digital evolution during the outbreak, the
security challenges and underlying threats to the IoT
architecture also grew exponentially. Therefore, the layered
security approach has become of utmost importance in the
ongoing scenario.
• A few examples of the security layer include Trusted Platform
Module (TPM) chips, multiple authorizations, firewalls, NAC,
AAA, NAP, IPS encryption, and cryptography mechanisms.
• 5. Edge layer
• It works on the edge computing framework to improve latency,
bandwidth, and real-time communication challenges. The edge layer's
primary goal is to fetch and process the requested information closer
to the data sources.
• With the ever-increasing number of smart devices over a centralized
cloud system, the 'delay in response' is a significant concern. However,
combined with 5G and AI capabilities, edge IoT layers perform
exceptionally well for time-sensitive data and deliver faster results.
• A few examples of the edge layer include electronic vehicles,
smartphones, smartwatches, laptops, security cameras, V2X, public
transit applications, smart cities, and green technologies. The five
layers of IoT architecture facilitate the smooth functioning of the IoT
ecosystem.
• Besides, they can accommodate expansions and handle intricacies
following the latest technological advancements. The goal is to
establish seamless IoT interoperability, taking care of the 3Cs -
change, compatibility, and cybersecurity.
CONCLUSION
• It should be noted that safe and effective device
management is the keystone to the sustainable development
and management of IoT networks worldwide.
• The communication, data sharing, and usage of information by
intelligent devices happen in a full-stack IoT ecosystem.
• A unified global protocol standardization thus becomes crucial
to eliminate IoT fragmentation and potential security threats.
Conti…
• IoT protocols are the medium of communication or a shared
language that helps establish connections between different
smart devices and helps them interact with each other.
• They are essential for holistic device management.
• IoT protocols consider the needs, communication, and security
of the various devices integrated.
• Depending upon the IoT architecture, present scenario, and
usage context, different IoT protocols are designed to
minimize the risk of intrusion.

More Related Content

What's hot

UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfMansiMehta96928
 
IOT Platform Design Methodology
IOT Platform Design Methodology IOT Platform Design Methodology
IOT Platform Design Methodology poonam kumawat
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTsulaiman_karim
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesPrakash Honnur
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOTAmberSinghal1
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine TechnologySamip jain
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic designudhayakumarc1
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoTFabMinds
 
Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoTDamien Magoni
 
DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)Abdullah Ozturk
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Zakaria Hossain
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
 

What's hot (20)

UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdf
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
IOT Platform Design Methodology
IOT Platform Design Methodology IOT Platform Design Methodology
IOT Platform Design Methodology
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoT
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
IoT Connectivity
IoT Connectivity IoT Connectivity
IoT Connectivity
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOT
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoT
 
Unit 4
Unit 4Unit 4
Unit 4
 
TinyOS
TinyOSTinyOS
TinyOS
 
802 15-4 tutorial
802 15-4 tutorial802 15-4 tutorial
802 15-4 tutorial
 
Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoT
 
DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 

Similar to IOT PROTOCOLS.pptx

the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enableneelamsanjeevkumar
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdfJoshuaKimmich1
 
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxssuser52b751
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingssuser06ea42
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & EcosystemHarish Vadada
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfMD.ANISUR RAHMAN
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyaravindhawan
 
IoT Communication Protocols.pdf
IoT Communication Protocols.pdfIoT Communication Protocols.pdf
IoT Communication Protocols.pdfSudhanshiBakre1
 

Similar to IOT PROTOCOLS.pptx (20)

IoT _protocols.ppt
IoT _protocols.pptIoT _protocols.ppt
IoT _protocols.ppt
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enable
 
Important topics.pptx
Important topics.pptxImportant topics.pptx
Important topics.pptx
 
Chapter-1.pptx
Chapter-1.pptxChapter-1.pptx
Chapter-1.pptx
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
 
Iot
IotIot
Iot
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & Ecosystem
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
 
module 3.pptx
module 3.pptxmodule 3.pptx
module 3.pptx
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
 
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
 
IoT Communication Protocols.pdf
IoT Communication Protocols.pdfIoT Communication Protocols.pdf
IoT Communication Protocols.pdf
 
Iot
IotIot
Iot
 
IOT ajay binay.pdf
IOT ajay binay.pdfIOT ajay binay.pdf
IOT ajay binay.pdf
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 

Recently uploaded

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 

Recently uploaded (20)

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

IOT PROTOCOLS.pptx

  • 1. IoT Protocols: Making IoT Data Communication Seamless • The protocols of the Internet of Things (IoT) technology stack are essential as, without them, the hardware would be rendered useless, and data communication would be a challenge.
  • 2. IoT protocols by definition and vision • IoT protocols aim to connect devices to IoT devices over a seamless and secure connection. • The IoT protocols operate on four pillars - device, connectivity, data, and analytics. • Their defense-in-depth security strategy shields the data transmission layer by layer. • While the business layer includes the management of billing and data marketplaces, the people who interact with IoT devices and technologies fall under the technology users layer. • The device layer comprises a combination of sensors, hardware, actuators, software, and gateways, constituting a device that connects and interacts with a network. • The data layer involves the data collected, processed, stored, and analyzed in business contexts.
  • 3. IoT protocols connection models • There is no set pattern for data routing, and the communication is highly dependent on the network topology. • However, the fundamental models are used either as standalone or in combinations for IoT deployments, including:
  • 4. 1. Device-to-device • It enables communication between nearby devices (proximity) using IoT Protocols like Bluetooth, ZigBee, Z-Wave, 4G, 5G, and WiFi. 2. Device-to-gateway • In this model, the devices communicate with the data system using a mediator platform, such as LPWAN, WiFi, and/or Ethernet IoT protocols. • The core functions of device-to-gateway are combining data from sensors, analyzing it, and routing it to the destination data system (data center or cloud). Also, in case of any problem, the connection model sends back the data to the source device.
  • 5. 3. Device-to-data • It works on edge computing, allowing devices to connect directly with the data source. A few popular device-to-data connection models include BLE, LoRaWAN, and Z-Wave. 4. Gateway-to-data • It is the simple communication between the mediator platform or central hubs and the data center or cloud. Open Automation Software (OAS) and Universal Data Connector are the best examples of robust IoT Gateways. 5. Communication between data • This protocol connection model allows data transmission between the data center and the cloud. It includes IoT Data protocols like MQTT, HTTP, REST, etc.
  • 6. Types of IoT protocols • IoT protocols and standards are broadly classified into two separate categories, including IoT data protocols that have presentation or application layers and network protocols for IoT comprising datalink and physical layers:
  • 7. 1. IoT Data Protocols • These protocols establish the end-to-end communication between low-power IoT devices and the hardware at the source, client, and/or user side, using only wired or cellular networks. The IoT data protocols function without an internet connection: 1. Advanced Message Queuing Protocol (AMQP) • AMQP is widely used in banking and finance as a message- oriented open standard software protocol. It comprises three crucial message components - Exchange, Queue, and Routing. • It is based on the Transmission Control Protocol and works on the architecture of "publish/subscribe" and "request/response" types. In addition, the guaranteed delivery or transaction message makes AMQP interoperable, secure, and reliable.
  • 8. 2. Data Distribution Service (DDS) • DDS is a UDP based "publish/subscribe" API that facilitates secure real-time M2M data sharing between the connected IoT devices. Furthermore, it works on broker-less scalable architecture (DCPS and DLRL), i.e., it operates independently of any hardware or software platform. • Its multi-purpose function simplifies IoT deployment for both small devices and high-performance networks. 3. Extensible Messaging and Presence Protocol (XMPP) • XMPP is a decentralized, open-source, and secure protocol developed using XML language to enable real-time data exchange. • It operates as a presence indicator by reflecting the status of available servers and devices. XMPP-IoT is a lightweight version of XMPP and is the best for consumer-oriented IoT deployments as it is extensible, scalable, and flexible.
  • 9. 4. WebSocket • Introduced by HTML5, WebSocket is an event-triggered independent TCP-based IoT protocol or API. It establishes full-duplex real-time communication between the client and server. • Using advanced technology streamlines complexities involved in the bi-directional transmission over the internet. And, it is suitable to maintain constant connectivity across heterogeneous IoT devices. Notably, WebSocket is much faster than HTTP 5. Open Platform Communications Unified Architecture (OPC UA) • OPC UA is a next-generation data model technology ideal for Industry 4.0 and IoT. It operates on a platform-independent, encrypted, and extensible multi-layered architecture. In addition, its service-oriented framework supports both "publish/subscribe" and "request/response" models. • As per the latest press release published by OPC Foundation, leading IoT vendors such as SIEMENS, SAP, Microsoft, IBM, AWS, and Google Cloud are already leveraging OPC UA for edge-to-cloud applications.
  • 10. II. IoT Network Protocols • These protocols constitute specific standards, policies, and unified rules to establish secured communication between IoT devices over the internet. • With emerging advancements in the IoT ecosystem, these protocols utilize multiple technologies that work on network topologies. The most widely used are star and mesh topologies. Following are the extensively used IoT network protocols: • 1. Bluetooth and BLE • Bluetooth is the top choice for shorter-range wireless communication, preferably for personal 2.4 GHz networks. Bluetooth Low Energy (BLE) is its optimized version and the standard protocol for IoT architecture. • The latest version of Bluetooth is 5.3. It was released on 13th July 2021 and is still in beta. Bluetooth best suits beacons, fitness, automotive, retail, and audio IoT applications.
  • 11. 2. Cellular - 4G and 5G • Cellular is a wireless mobile communication network technology that facilitates large bandwidth and reliable broadband services. • Currently, 3G is almost on the verge of extinction. On the other hand, 4G is leading but not suited for IoT applications due to higher cost and power consumption. • However, the new-age 5G is ideal for IoT applications across industries and personal usage. 3. Wi-Fi and Wi-Fi HaLow • WiFi is the most popular and conventional wireless network protocol for home and commercial usage. But, it is not very flexible and scalable for IoT purposes. • WiFi HaLow (IEEE 802.11 ah) is a unique solution to overcome its challenges. This high-level communication protocol provides a long-range between 750 and 950 MHz with low-power connectivity.
  • 12. • 4. Low Power Wide Area Networks (LPWANs) • LPWANs are a new set of wireless network protocols devised to set up communication between low-power IoT applications over long ranges. • They are a cost-saving option because they operate on small and affordable batteries that are long-lasting and power- efficient. • MIOTY, LoRaWAN, 6LoWPAN, Thread, NB-IoT, LTE-M, SigFox, and HayStack are purpose-built LPWANs for large- scale IoT deployments.
  • 13. 5. ZigBee • ZigBee is a mesh wireless communication protocol that operates on a 2.4 GHz network. • It is short-range, highly interoperable, low-power consuming, and facilitates massive data transfer in a single instance with high security. • ZigBee is most appropriate for small, and medium ranged IoT devices such as microcontrollers, sensors, gateways, and so on. • Notably, due to its mesh grid structural design, the connectivity can be extended over a long distance using multi-hop routing. • ZigBee is best suited for commercial building and innovative home automation applications. • Actually, it is the safest wireless protocol for transferring real- time patient data from a sensor.
  • 14. 6. Z-Wave • Similar to ZigBee, the Z-Wave protocol also works on mesh network topology. However, it is most prominent for IoT home automation applications. • Z-Wave is a Radio Frequency (RF) based, less power- consuming wireless communication technology that operates on 800-900 MHz and is purely location-dependent. • As a result, it hardly faces any connectivity hindrance. It facilitates safe and steady data transmission with low latency.
  • 15. 7. Extensible Messaging and Presence Protocol (XMPP) • This technology dates back to the early 2000s and was designed for real-time human-to-human communication. XMPP is now used for M2M communication and for routing XML data. • XMPP supports the real-time exchange of structured but extensible data across multiple network entities, making it suitable for consumer-oriented IoT deployments, such as smart appliances and wearables. • Other than the above-stated options, the network protocols such as Lightweight M2M (LWM2M), Radio-frequency Identification (RFID), Near Field Communication (NFC), Ethernet, and Wi-Sun have contributed significantly towards setting up the sustainable connection in the IoT space. • Therefore, be it for home or commercial usage, the selection of an ideal IoT network protocol must consider the parameters of bandwidth, range, power consumption, latency, intermittent connectivity, Quality of Service (QoS), and security.
  • 16. • Benefits of IoT wireless protocols • IoT protocols form a crucial component of the IoT infrastructure. They serve higher data throughput with lesser complexities. Wireless IoT protocols have become the first choice solution for personal and industrial usage. The rising demand for wireless IoT protocols is because of the core benefits: • Affordability • Less time and energy consumption • Robust security and data privacy • Good network coverage and connectivity • Automated and streamlined communications • Faster data transfer and smoother operations • Easy setup and deployment in the IoT infrastructure • Simple to use while resulting in enhanced productivity
  • 17. IoT Protocol Layers • IoT works on various networking technologies based on the IT infrastructure requirements, and therefore, it needs architecture to establish a coherent IoT ecosystem. •
  • 18. • Considering the complexities involved in the configuration, operations, functionalities, and communications, the five layers of IoT architecture are best suited for all purposes. • 1. Network layer • Its core function is to connect the IoT devices with the network systems and servers. The network layer also helps to route and control the data transmission with the help of set communication protocols and unified formats. • Utilizing the TCP/IP stack and cellular and wireless technologies depending on the specification, the network layer helps set up secure transmission across all interconnected devices. A few examples are IPv4/IPv6, ICMP, IGMP, ARP, 3G/4G/5G, UDP, 6LoWPAN, and WiFi.
  • 19. • 2. Application layer • It acts as an interface between the IoT devices and the end users or any other device that requests the information over the secured network. After successful data processing, formatting, and presentation, it produces the final information. A few examples of the application layer are HTTP, FTP, POP, IMAP, TLS, SMTP, DNS, TFTP, SNMP, and TELNET. • The IoT application protocol depends on four crucial parameters - latency, reliability, bandwidth, and transportation. Considering the same, along with the correspondence of the specifications and features, the following are the top five IoT application protocols: • Representational State Transfer (REST) • Constrained Application Protocol (CoAP) • Advanced Message Queuing Protocol (AMQP) • Message Queue Telemetry Transport (MQTT) • Extensible Message and Presence Protocol (XMPP)
  • 20. • 3. Perception layer • It constitutes sensors, actuators, and AI-powered devices to gather valuable details about the surrounding physical objects or the environment. The accumulated data is converted from analog signals to digital format for further operations. • Its functioning includes identification, information collection, and automated control technologies to channel the digital and real worlds. A few examples of the perception layer include surveillance cameras, bar codes, portable PCs, RFID, WSN, and GPS.
  • 21. • 4. Security layer • It minimizes the risk of potential cyberattacks on the most vulnerable areas of the IoT ecosystem. The security checkpoints occur at three significant places - the device (including hardware and software), cloud, and connection. • With the rapid digital evolution during the outbreak, the security challenges and underlying threats to the IoT architecture also grew exponentially. Therefore, the layered security approach has become of utmost importance in the ongoing scenario. • A few examples of the security layer include Trusted Platform Module (TPM) chips, multiple authorizations, firewalls, NAC, AAA, NAP, IPS encryption, and cryptography mechanisms.
  • 22. • 5. Edge layer • It works on the edge computing framework to improve latency, bandwidth, and real-time communication challenges. The edge layer's primary goal is to fetch and process the requested information closer to the data sources. • With the ever-increasing number of smart devices over a centralized cloud system, the 'delay in response' is a significant concern. However, combined with 5G and AI capabilities, edge IoT layers perform exceptionally well for time-sensitive data and deliver faster results. • A few examples of the edge layer include electronic vehicles, smartphones, smartwatches, laptops, security cameras, V2X, public transit applications, smart cities, and green technologies. The five layers of IoT architecture facilitate the smooth functioning of the IoT ecosystem. • Besides, they can accommodate expansions and handle intricacies following the latest technological advancements. The goal is to establish seamless IoT interoperability, taking care of the 3Cs - change, compatibility, and cybersecurity.
  • 23. CONCLUSION • It should be noted that safe and effective device management is the keystone to the sustainable development and management of IoT networks worldwide. • The communication, data sharing, and usage of information by intelligent devices happen in a full-stack IoT ecosystem. • A unified global protocol standardization thus becomes crucial to eliminate IoT fragmentation and potential security threats.
  • 24. Conti… • IoT protocols are the medium of communication or a shared language that helps establish connections between different smart devices and helps them interact with each other. • They are essential for holistic device management. • IoT protocols consider the needs, communication, and security of the various devices integrated. • Depending upon the IoT architecture, present scenario, and usage context, different IoT protocols are designed to minimize the risk of intrusion.