SlideShare une entreprise Scribd logo
1  sur  159
Course Name: IoT System
Course Code: MC3253
Course Instructor : Dr Princy Randhawa
Friday, May 13, 2022 1
Friday, May 13, 2022 2
Course Syllabus
Introduction to M2M communication and IoT, An emerging industrial
structure for IoT, IoT system architecture, IoT reference model, IoT
deployment and operational view, IoT physical devices and endpoints,
Communication and networking protocols-MQTT and AMQP
protocols, IoT enabling technologies-RFID, WSN,SCADA etc.,
Analytics for the IoT, Applying the geospatial analytics to IoT data,
Real world design constraint, Technical design constraint, Future
internet design for various IoT use cases such as smart cities, smart
environments, smart homes, smart health etc.
Friday, May 13, 2022 3
Course Summary/ Objective
1. Explain about the Internet of Things (IoT) and its need and
also how it functions.
2. Identify the reasons that contributed to the development of IoT
technology.
3. Use Real IoT protocols for communication.
4. Challenges in IoT
5. Different areas of IoT applications
6. Develop basic IoT Applications
Students will be able to comprehend the ideas of the Internet of
Things and will be able to develop basic IoT applications
Friday, May 13, 2022 4
Course Outcome
CO.1 [MC3253.1] Understand the basic concepts of Internet of things
and its system architecture
CO.2[MC3253.2]Analyse the real protocols of IOT for communication
and its enabling technologies
CO.3 [MC3253.3] Design IoT applications in different areas and
analyse its performance
CO.4 [MC3253.4] Implement basic IoT applications using hardware
Friday, May 13, 2022 5
Books/References
 Holler J., Tsiatsis V., Mulligan C., Karnouskos., Boyle D., From
Machine-to-Machine to the Internet of Things: Introduction to a New
Age of Intelligence (1e), Elsevier 2014.
 Bahga A., Madisetti V., Internet of Things-A Hands on Approach (1e),
Orient Blackswan Private Limited, 2015.
 Roderick O., Marko N., Sanchez D. and Aryasomajula A., Internet of
Things and Data Analytics Handbook (1e), Wiley-Blackwell, 2017.
 Patil Y., Azure IoT Development Cookbook (1e), Packt publishing
Ltd, 2017
Friday, May 13, 2022 6
Learning Outcomes
Define the term "Internet of Things" (IoT)
Explain the technological advancements that have led to IoT
Explain the societal implications of IoT
Friday, May 13, 2022 7
Introduction
What is Internet of Things
Start with a device (‘ a thing’)- anything besides a
conventional computer
Add Computational Intelligence to improve the functioning of the device
Internet Connectivity
Friday, May 13, 2022 8
Generic Block Diagram of an IoT
Device
USB HOST
RJ45/Ethernet
NAND/NOR
DDR1..DDR3
CPU
GPU
HDMI
3.5 mm audio
RCA video
SD
MMC
UART
SDIO
SPI
I2C
CAN
Connectivity Processor
Graphics
Memory
Interfaces
Audio/Video
Interfaces
Storage
Interfaces
I/O
Interfaces
(for sensors,
actuators, etc.)
Friday, May 13, 2022 9
Traditional/Smart Watch
Needs Battery
Shows only time
Old Watch:500-600 Rs
 Contains sensors
 Can be charged with cable
 Shows time
 Calculates heart rate and blood pressure
 Connects to the smart phone.
 Facilitates life
 Makes calls
 New Watch: 4-5K
Friday, May 13, 2022 10
Exercise
1. Identify and analyse a device that is now an IoT device but was previously a
non-IoT device. Describe and list the device's features.
2. Contrast the device's previous functions with its current functions.
3. For your chosen Internet of Things device, list any enhancements or drawback,
if any, that it offers over the non-IoT device. Include a description of any
limitations that may be present in the new Internet-of-Things version of the
device.
4. Describe any privacy concerns with the IoT device that did not exist in the
device’s original version. Compare the original device's price to the price of the
new IoT version of the device.
Friday, May 13, 2022 11
How IoT works
Sensors/Devices Connectivity Data pre-
processing
User Interface
Collecting Data
Sending data to
Cloud
Delivering
Information to
User
Making Data
Useful
Friday, May 13, 2022 12
Introduction
Data: Raw and Unprocessed data
obtained from IoT devices
Information: Information is inferred
from data by filtering, processing,
categorising, condensing and
contextualization data
Knowledge: Knowledge is inferred
from information by organizing and
structuring information and is put
into action to achieve objectives
IoT Data Inferred into Information and Knowledge
Friday, May 13, 2022 13
Statistics
Source: https://financesonline.com/iot-trends/
Friday, May 13, 2022 14
Adoption of the IoT Trends
Cost of the hardware Device has decreased
 ENIAC cost- $500,000
 Laptop- $ 500-700
Smaller Size and weight
 ENIAC 1945- 1800 square feet, 27 tons
 Laptop- 0.05 square feet, under 2 kgs
Computational Ability
 ENIAC 1945- instruction per second -> 5000
 Laptop- instruction per second -> 18 billion
Internet Access
 Internet available almost everywhere in the world
 Wireless Access leads to cheap infrastructure
 Data cost is low
 Data Bandwidth is high
Friday, May 13, 2022 15
Societal Benefits of IoT
IoT makes life easier
 What food do I need- IoT Refrigerator
 Are my accounts balanced
Independence from people
 IoT devices handle things you needed humans
 Fewer doctor trips, no visit to supermarket
Link to the world
 Information access
 Global interaction between people are possible
Friday, May 13, 2022 16
Applications of IoT
Home
• Smart
Lighting
• Smart
Appliances
• Intrusion
Detection
• Smoke/Gas
Detectors
Cities
• Smart
Parking
• Smart Roads
• Structural
Health
Monitoring
• Emergency
Response
Environment
• Weather
Monitoring
• Air pollution
Monitoring
• Noise
Pollution
Monitoring
• Forest Fire
Detection
• Waste
Detection
Energy
• Smart Grids
• Renewable
Energy
Systems
• Prognostics
Retail
• Inventory
Management
• Smart
Payments
• Smart
Vending
Machines
Friday, May 13, 2022 17
Applications of IoT
Logistics
• Route
Generation
and
Scheduling
• Fleet Tracking
• Shipment
Monitoring
• Remote
Vehicle
Diagnostics
Agriculture
• Smart
Irrigation
• Green House
Control
Industry
• Machine
Diagnostics
and Prognosis
• Indoor Air
quality
Monitoring
Health &
Lifestyle
• Health and
Fitness
Monitoring
• Wearable
Electronics
Friday, May 13, 2022 18
Risks, Privacy and Security
 Social Isolation
 Dependence on technology and infrastructure
• IoT requires power and network
• Network outages and blackouts are more critical
 IoT Devices are constantly observing.
• Location: Cell Phone
• Health: Health Monitor
• Media Watching habits: TV/media system
• Purchasing habits: Credit card, cell phone
• Driving Habits: Car incident recording
 Data may be used to market to you
• Health problem? Drugs may be marketed to you
 Purchasing an IoT Device may give the manufacturer permission to use or
sell the data
• Consumer Agreement contracts can be cryptic
Friday, May 13, 2022 19
Risks, Privacy and Security
 Data may be used by insurance companies
• Were you speeding at the time of Accident?
• Do you have any undiagnosed health problem
 Data may not be held in a secure way
• Cloud is attacked with your data inside
• Even encrypted data is decrypted in use
• Media Watching habits: TV/media system
• Purchasing habits: Credit card, cell phone
• Driving Habits: Car incident recording
Friday, May 13, 2022 20
IoT Security Problems
DOS
DDOS
Information Manipulation
Unauthorised Access
Information Disclosure
Friday, May 13, 2022 21
Key Elements of IoT
Authentication
Access Control
Data Security
Non Repudiation
Availability
Friday, May 13, 2022 22
Future of IoT
Artificial Intelligence & IoT
VUI (Voice User Interface)
Miniaturization of Things
Power
Big Data & IoT
Friday, May 13, 2022 23
Exercise 2
An embedded system is a microprocessor- or microcontroller-based system of
hardware and software designed to perform dedicated functions within a larger
mechanical or electrical system. It is defined by simple interface.
1. Identify and compare two different systems available on the market. In each
system, list all of the devices that can be used as inputs or outputs.
2. Classify inputs & outputs based on their mode of interaction: Visual: data
carried by visible light; Audio: data carried by sound; Tactile: data carried by
touch: Electronic: data encoded in electrical signals
Friday, May 13, 2022 24
IoT Components
Sensors Gateway Cloud/server Analytics/Mobile App
•Amazon Web
Services (AWS)
•Microsoft Azure.
•Google Cloud.
•Alibaba Cloud.
•IBM Cloud.
•Oracle.
•Salesforce.
•SAP.
ZigBee,
Bluetooth
Wifi
LoRA
Friday, May 13, 2022 25
Enabling Technologies
Friday, May 13, 2022 26
IoT Gateway
Key Functionalities
•Establishing communication bridge
•Provides additional security.
•Performs data aggregation.
•Pre processing and filtering of data.
•Provides local storage as a cache/ buffer.
•Data computing at edge level.
•Ability to manage entire device.
•Device diagnostics.
•Adding more functional capability.
•Verifying protocols.
Working of Gateway
• Receives data from sensor
network.
• Performs Pre processing,
filtering and cleaning on
unfiltered data.
• Transports into standard
protocols for communication.
• Sends data to cloud.
Friday, May 13, 2022 27
IoT Architecture
Three Layered and Five Layered Architecture
Perception Layer
Network Layer
Application Layer
Perception Layer
Transport Layer
Processing Layer
Application Layer
Business Layer
Friday, May 13, 2022 28
IoT Architecture
Seven Layered Architecture
Physical/ Thing (Devices, Sensors, Controllers, Actuators)
Connectivity/Data Link ( Communication & Processing)
Network (Send data to correct path)
Transport (Transmit the data using communication protocol)
Session (Maintains connections and responsible to control the port , Connection initiated,
managed and edited
Perception (Encryption/Decryption data to ensure that data is in usable format at
application layer)
Application ( Human Machine Interaction to access network application
Friday, May 13, 2022 29
IoT Architecture analogous to Human Body
Another architecture proposed by Ning and Wang
Nerves
Spinal Cord
Human Brain
Processing and Data
Center
Distributed network
Network Layer
Friday, May 13, 2022 30
IoT Technology/Working
Pallavi Sethi, Smruti R. Sarangi, "Internet of Things: Architectures, Protocols, and Applications", Journal of Electrical and Computer
Engineering, vol. 2017, Article ID 9324035, 25 pages, 2017. https://doi.org/10.1155/2017/9324035
Friday, May 13, 2022
Communication
Source: https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification
Friday, May 13, 2022 32
Characteristics of IoT
Unique Identity
Dynamic Nature
Self Adapting
Self Configuring
Heterogeneity
Integrated to Information Network
Friday, May 13, 2022 33
Introduction to M2M
Machine to Machine (M2M) refers to networking of machines (devices)
Purpose of remote monitoring and control and data exchange
Similar to SCADA (Supervisory control and Data acquisition)
New and Existing
Devices
IoT Gateways Network Carrier Backend System
Friday, May 13, 2022 34
M2M Gateway
Native Protocol
Protocol
Translation
Proxy
Native Protocol
Protocol
translation
Proxy
M2M Gateway
Virtual Node
Virtual Node
M2M
Node
M2M
Node
IP
Routing
M2M Area Network
• Bluetooth
• Zigbee
• 802.15.4
• 6loWPAN
• UWB
• ModBus
• Z-Wave
Friday, May 13, 2022 35
M2M Applications
Friday, May 13, 2022 36
M2M/IoT
Basics of IoT M2M
Abbreviation Internet of Things Machine to Machine
Intelligence Devices have objects that are responsible for
decision making
Some degree of intelligence is observed
in this
Connection type used The connection is via Network and using
various communication types.
The connection is a point to point
Communication protocol
used
Internet protocols are used such
as HTTP, FTP, and Telnet.
Traditional protocols and
communication technology techniques
are used
Data Sharing Data is shared between other applications that
are used to improve the end-user experience.
Data is shared with only the
communicating parties.
Internet Internet connection is required for
communication
Devices are not dependent on the
Internet.
Scope A large number of devices yet scope is large. Limited Scope for devices.
Business Type used Business 2 Business(B2B) and Business 2
Consumer(B2C)
Business 2 Business (B2B)
Open API support Supports Open API integrations. There is no support for Open API’s
Friday, May 13, 2022 37
M2M/IoT
Basics of IoT M2M
Machines Heterogenous Homogenous
Hardware vs Software
Emphasis
Devices have objects that are responsible for
decision making
Some degree of intelligence is observed
in this
Data collection and
Analysis
Cloud (public, private or hybrid cloud) On Premises storage infrastructure
Examples Smart wearables, Big Data and Cloud, etc. Sensors, Data and Information, etc.
Friday, May 13, 2022 38
M2M/IoT
802.3
UDP
Transport Layer
Network Layer
Link Layer
Application Layer
TCP UDP
Transport Layer
Network Layer
Link Layer
Application Layer
IPv4 IPv6 6LoWPAN
IPv4 IPv6 6LoWPAN
HTTP CoAP Web Sockets
MQTT XMPP DDS AMQP
HTTP CoAP Web Sockets
MQTT XMPP DDS AMQP
TCP
802.16
802.11 802.15.4
2G/3G/LTE
802.3 802.16
802.11 802.15.4
2G/3G/LTE
IOT
M2M
Friday, May 13, 2022 39
M2M Features
Low Power Communication
Time Controlled
Time Tolerant
Packed Switched
Online small data transmission
Monitoring
Location Specific Trigger
Friday, May 13, 2022 40
M2M Issues/Concerns
Addressing
 M2M system should be flexible in supporting more
than one naming scheme
 Security
 M2M devices operate unmanned and unguarded by
humans and are subject to increased level of security
threats such as physical tampering, hacking,
unauthorised monitoring etc.
Friday, May 13, 2022 41
Physical Design of IoT
Things in
“IoT”
IoT
Communication
Protocols
Friday, May 13, 2022 42
Communication Models in IoT
Device-to-Device communication model
Source:))Tschofenig,)H.,)et.)al.,)Architectural)Considera/ons)in)Smart)Object)Networking.)Tech.)no.)RFC)7452.)Internet)Architecture)Board,)Mar.)2015.)We
b.) .)
Device-to-cloud communication model diagram
Friday, May 13, 2022 43
Communication Models in IoT
Source:))Tschofenig,)H.,)et.)al.,)Architectural)Considera/ons)in)Smart)Object)Networking.)Tech.)no.)RFC)7452.)Internet)Architecture)Board,)Mar.)2015.)We
b.) .)
Device-to-gateway communication model diagram.
Friday, May 13, 2022 44
Communication Models in IoT
Source:))Tschofenig,)H.,)et.)al.,)Architectural)Considera/ons)in)Smart)Object)Networking.)Tech.)no.)RFC)7452.)Internet)Architecture)Board,)Mar.)2015.)We
b.) .)
Back-end data sharing model diagram
Friday, May 13, 2022 45
IoT Communication Models
Request & Response Publisher-Subscriber Model
Client
Client
Receives
Response
Server
Request
Process Database
Fetch
Response
PUBLISHER
BROKER
T2
T1
T3
SUBSCRIBER
S1
S2
S3
S4
S5
Friday, May 13, 2022 46
IoT Communication Models
Push-Pull Model Exclusive Pair Model
CLIENT
SERVER
PUBLISHER
CONSUMER
Queue
Push Pull
Push Pull
Full Duplex and
Bidirectional
Communication
Friday, May 13, 2022 47
IoT || NodeMCU || ESP8266
Introduction to IoT and Getting started
with NodeMCU/ESP8266.
Friday, May 13, 2022 48
Link Layer Protocols
It determines how the data is sent physically over the
network physical layer or medium (Co-axial or Radio
wave)
Local network connect to which host is attached
Host on the same link exchange data packets over the
link layer using link layer protocols.
Link Layer determines how the packets are coded and
signalled by the hardware device over the medium to
which the host is attached.
Friday, May 13, 2022 49
802.3 Ethernet
Data rate are provided from 10Gbit/s to 40 Gbit/s and higher
It is primarily used in LAN, MANs and even WANs
Sensor units installed within a building automation system can use
wired technologies
S.
No.
Standard Shared Medium
1 802.3 Co-axial Cable 10BASE5
2 802.3i Copper Twisted Pair 10BASE-
T
3 802.3j Fiber Optic 10BASE-F
4 802.3ae Fiber 10Gbits/s
Friday, May 13, 2022 50
802.3 Ethernet
 Works on Bus Topology
 Access Control Method- CSMA/CD- Carrier Sensing
Multiple Access/Collision Detection
 No Acknowledgement
 Encoding Technique- Manchester
 Data Rate
Tp (T t > =2 *Tp)
IEEE 802.3 Frame Format
Preamble
SOF
Destination
Address
Source
Address
Data+ Padding
CRC
7
Bytes
1
Byte
6
Bytes
6
Bytes
Minimum: 46 Bytes
Maximum :1500 Bytes
4
Bytes
Friday, May 13, 2022 51
Limitations
Not for Real Time Application
 Delay can be introduced because of collisions leads to disastrous
effects
 Not for Interactive Applications
 Min 46 bytes need to be delivered
Friday, May 13, 2022 52
802.11 WiFi (Wireless-Fidelity)
 Primary challenge is to mediate access to a shared communication medium-in this
case, signals propagating through space.
Wireless Router
Router
Ethernet Switch
Access Point
ISP
Office/inter
net
wireless
wired
wired
Friday, May 13, 2022 53
802.11 WiFi (Wireless-Fidelity)
Wired
Wired
Friday, May 13, 2022 54
802.11 WiFi (Wireless-Fidelity)
 Collection of Wireless LAN
 Data rates from 1Mb/s to 6.75 Gb/s
 Wi-Fi provides communication range in the order of 20m (indoor) to 100m
(outdoor)
 Access Method- CSMA/CA
 Modes – Infrastructure, Adhoc and WIFI direct
S.
No.
Standard Operates Data Rate
1 802.11a 5 GHz Band 54 Mbps
2 802.11b and
802.11g
2.4 GHz Band 11 Mbps
54 Mbps
3 802.11n 2.4/5 GHz Bands 450 Mbps
4 802.11ac 5 GHz Band 866.7 Mbps
5 802.11ax 2.4/5 GHz Bands 2.4 Gbps
DISTRIBUTION SYSTEM (DS)
Friday, May 13, 2022 55
802.11 WiFi Architecture
STA1 STA3
STA2 STA4 STA5
STA6
STA7 STA8
AP 1 AP 2 AP 3
Basic Service Set (BSS)
AP-ACCESS POINT
BSS 1 BSS 2 BSS 3
 It is suitable for an ad-hoc configuration of nodes that may or may not be able to
communicate with other nodes
 Nodes are free to move around
 The set of directly reachable nodes may change over time
Friday, May 13, 2022 56
Services in 802.11
Services
Station Distribution System
Authentication Deauthentication Privacy Mac
Service
Data unit
Association Re-association
De-association
Open Shared Key Distribution
Integration
Friday, May 13, 2022 57
Frame Format (802.11)
Frame
Control
Duration
Address
1
Address
2
Address
3
Sequence
0-2312 Bytes
Check
Sequence
2
Bytes
2
Bytes
6
Bytes
6
Bytes
6
Bytes
2
Bytes
Data
4
Bytes
IEEE 802.11 Frame Format
Friday, May 13, 2022 58
802.16 –WiMAX Protocol
WiMAX- Worldwide interoperability for Microwave
Access
Collection of Wireless Broadband Standards
Data rates from 1.5 Mb/s to 1 Gbit/s
Mobile Stations- 100 Mbit/s, Fixed Stations- 1 Gbit/s
Wi-Fi provides communication range in the order of 20m
(indoor) to 100m (outdoor)
Friday, May 13, 2022 59
802.16 –Architecture
Air Interface
Base station Mobile Station
(Movable)
Subscriber Station
(Stationary)
Backbone Network connected
to Internet
Physical Layer
MAC Layer
Convergence Layer
WIFI/WIMAX Comparison
Friday, May 13, 2022 60
Feature WiMax
(802.16a)
Wi-Fi
(802.11b)
Wi-Fi
(802.11a/g)
Primary
Application
Broadband Wireless
Access
Wireless LAN Wireless LAN
Frequency Band Licensed/Unlicensed
2 G to 11 GHz
2.4 GHz ISM 2.4 GHz ISM (g)
5 GHz U-NII (a)
Channel
Bandwidth
Adjustable
1.25 M to 20 MHz
25 MHz 20 MHz
Half/Full Duplex Full Half Half
Radio Technology OFDM
(256-channels)
Direct Sequence
Spread Spectrum
OFDM
(64-channels)
Bandwidth
Efficiency
<=5 bps/Hz <=0.44 bps/Hz <=2.7 bps/Hz
Modulation BPSK, QPSK,
16-, 64-, 256-QAM
QPSK BPSK, QPSK,
16-, 64-QAM
Mobility Mobile WiMax
(802.16e)
In development In development
Mesh Yes Vendor
Proprietary
Vendor Proprietary
Access Protocol Request/Grant CSMA/CA CSMA/CA
Friday, May 13, 2022 61
802.15.4 –LR-WPAN
Collection of Standards for low rate wireless personal
area network (LR-WPAN)
High Level Protocols such as Zigbee
Data rates from 40 Kb/s to 250 Kb/s
Low cost and Low speed communication for power
constrained devices
IEEE 802.15. Protocol Stacks include –
•ZigBee
•6LoWPAN
•ISA100.11a
•Wireless HART
•Thread
Friday, May 13, 2022 62
Zigbee
Data Link (MAC) Layer
Network Layer
Physical Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
IEEE 802.15.4
ZIGBEE Protocol
ACE (Additional Communication
Enhancement)
ZNL uses Ad Hoc On Demand Distance Vector
Routing
Friday, May 13, 2022 63
Zigbee protocol
TOPOLOGY
Star
Cluster Tree
Mesh
C
R
E E
E
E
C
R R
R
R
E
E
E
E
E
E
E
E
E
E
E
E
R R
R
R
R
R
C
E
E
E
E
E
E
Friday, May 13, 2022 64
Advantages/Disadvantages
Advantages
•Cheap cost
•Long battery life,
•Quick installation
•Simple
•Extensible protocol stack
Disadvantages
•IEEE 802.15.4 causes interference and
multipath fading.
•doesn’t employ a frequency-hopping
approach.
•unbounded latency
•interference susceptibility
•Wireless sensor networks in the industry
•Building and home automation
•Remote controllers and interacting toys
•Automotive networks
Applications
Friday, May 13, 2022 65
2G/3G/LTE-Cellular Protocol
Mobile Generation Standards ( 2G including GSM and CDMA)
 Third Generation (3G including UMTS and CDMA2000)
 Fourth Generation (4G-LTE)
Data Rates- 9.6 Kb/s (for 2G) to up-to 100 Mb/s (for 4G)
Friday, May 13, 2022 66
CDMA/GSM
CDMA GSM
It stands for Code Division Multiple Access. It stands for Global System for Mobile Communication.
It uses a CDMA mechanism for data & call transmission. It uses TDMA and FDMA mechanism for data & voice
transmission.
The transmission rate is fast compared to GSM. The transmission rate is slow compared to CDMA.
It uses EVDO data transfer technology. It uses EDGE data transfer technology.
It is handset specific and does not require any SIM for
communication.
It is SIM specific, hence requires a SIM card for
communication.
During transmission, it is much prone to radiation emission. During transmission, it is comparatively less prone to
radiation emission.
It offers more secure communication compared to GSM. It offers less secure communication compared to CDAM.
The signal detection is difficult in CDMA. The signal detection is easy in GSM.
It provides built-in encryption. It requires additional encryption as no built-in encryption is
available.
It enables limited roaming. It enables worldwide roaming.
Friday, May 13, 2022 67
2G-Cellular Protocol
GSM- Only for Voice
Source: https://www.connectivity.technology/2019/08/high-level-architecture-introduction-of.html
MSC-Mobile Switching Centre
BSS-Base Station Subsystem
BSC-Base Station Controller
BTS-Base Transceiver Station
MS-Mobile Station
Friday, May 13, 2022 68
2.5G-GPRS Enhancement
Source: https://www.connectivity.technology/2019/08/high-level-architecture-introduction-of.html
GPRS-General Packet Radio Service
SGSN-Serving GPRS Support Node
GGSN-Gateway GPRS Support Node
Friday, May 13, 2022 69
3G-UMTS Network Architecture
Source: https://www.connectivity.technology/2019/08/high-level-architecture-introduction-of.html
UMTS-Universal Mobile
Telecommunications Service
RNC-Radio Network Controller
RNS-Radio Network Subsystem
UE-User Equipment
Friday, May 13, 2022 70
4G-’LTE’ Network Architecture
Source: https://www.connectivity.technology/2019/08/high-level-architecture-introduction-of.html
Friday, May 13, 2022 71
5G-‘Phase 1’ Network Architecture
Source: https://www.connectivity.technology/2019/08/high-level-architecture-introduction-of.html
Friday, May 13, 2022 72
Network Layer
Responsible for sending of IP datagrams from source to
destination network
Functions
 Host to Host Connectivity
 Switching
 Routing
 Fragmentation
 Logical Addressing
 Host Identification is done using hierarchical IP addressing
schemes such as IPv4 and IPv6
Friday, May 13, 2022 73
IPv4 (Internet Protocol)
It is used to identify the devices on a network using a
hierarchical addressing scheme
It uses 32 bit addressing scheme= 232 Or 4,294,967,296 addresses
IP protocols establish connections on packet network but do not
guarantee delivery of packets
 Guaranteed Delivery of packets are handled by the upper layer
protocols
00001001010000110110000100000010 32-bit address
00001001 01000011 01100001 00000010 4 octets
9 67 97 2 dotted decimal notation (9.67.97.2)
Friday, May 13, 2022 74
IPv4 Header Format
Version (4)
Identification (16) MF
TTL (8) Protocol (8) Header Check Sum (16)
Source IP (32)
Destination IP (32)
Option ( 0 to 40 Bytes)
Data
0 DF FO (13)
TTL (16)
HLEN(4) TOS (8) 4B
4B
4B
4B
4B
Header Size- 20B-60B
Friday, May 13, 2022 75
Fragmentation
Sender Receiver
Router
Maximum Transmission Unit
(MTU) =520B
Maximum Transmission Unit
(MTU)=200B
180 20
180 20
140 20
500 20
F2 F1 F0
Identification
Fragment Offset (FO)
10 10 10
0
180/8
==22.5
352/8
176 20
148 20 176 20
360/8
176/8
More Fragment(MF) 1
1
0
Do not Fragment (DF)
1
Friday, May 13, 2022 76
TTL (Time to live)
Router
N1
N1
N1
PACKET
R1
Default Router
R2
R3
Sender Receiver
TTL-3 TTL-2 TTL-1 TTL-0
Friday, May 13, 2022 77
Protocol Field (8 bits)
ICMP- 1
IGMP-2
TCP-6
UDP-17
ICMP<IGMP<UDP<TCP
Source
UDP ICMP TCP
TCP TCP IGMP
Router
Buffer
ICMP/IGMP/TCP
Friday, May 13, 2022 78
Optional Field (0-40 Byte)
Record Route
Source Routing
Padding
Friday, May 13, 2022 79
IPv6 Protocol
Newest Version of Internet Protocol
It uses 128-bit address = 2128
or 3.4 * 1038
IPv6 use Colon-Hex- representation
E.g. 2031:0000:130F:0000:0000:09C0:876A:130B
In IPv6 representation, addressing methods :
•Unicast
•Multicast
•Anycast
Friday, May 13, 2022 80
IPv6 Header
Version (4) Priority/Traffic
(8)
Flow label (20)
Payload
Length (16)
Next Header
(8)
Hop Limit
(8)
Source Address (128)
Destination Address (128)
Extension Header
Base Header-40 Bytes (320 bits) Fixed
Extension Headers and its code:
 Base Header
 Routing Headers (43)
 Hop by Hop Option (0)
 Fragment Header (44)
 Authentication Header (51)
 Destination Option (60)
 Encapsulating Security Payload
(50)
Source: https://www.geeksforgeeks.org/internet-protocol-version-6-ipv6-header/?ref=rp
Base Header (40B) Extension Header
1
Extension Header 2
Friday, May 13, 2022 81
Priority/Traffic Field
Priority assignment of Congestion controlled traffic :
Priority Meaning
0 No specific Traffics
1 Background data
2 Unattended data traffic
3 Reserved
4 Attended bulk data traffic
5 Reserved
6 Interactive Traffic
7 Control Traffic
Friday, May 13, 2022 82
IPv4/IPv6 (Comparison)
Feature IPv4 IPv6
Address Size 32 128
Address Format Dotted Decimal Notation
192.168.14.1
Hexadecimal Notation
3FFE:F200:0234:AB00
0123:4567:8901:ABCD
Checksum Field is available in header Not Available in header
Packet Size 576 bytes 1280 bytes
IP Sec Support Optional Required
No. of Header Field 12 8
Length of Header Field 20 40
Communication Both Multicast and Broadcast No Broadcast but uses
different types of multicast
Security Less More as compared to IPv4
Optional Field Available Not Available
Friday, May 13, 2022 83
IP/MAC address (Comparison)
S.NO MAC Address IPAddress
1. MAC Address stands for Media Access Control Address. IP Address stands for Internet Protocol Address.
2. MAC Address is a six byte hexadecimal address.
IP Address is either a four-byte (IPv4) or a sixteen-byte
(IPv6) address.
3.
A device attached with MAC Address can retrieve by ARP
protocol.
A device attached with IP Address can retrieve by RARP
protocol.
4. NIC Card’s Manufacturer provides the MAC Address. Internet Service Provider provides IP Address.
5.
MAC Address is used to ensure the physical address of a
computer.
IP Address is the logical address of the computer.
6. MAC Address operates in the data link layer. IP Address operates in the network layer.
7. MAC Address helps in simply identifying the device.
IP Address identifies the connection of the device on the
network.
8.
MAC Address of computer cannot be changed with time and
environment.
IP Address modifies with the time and environment.
9. MAC Addresses can’t be found easily by a third party. IP Addresses can be found by a third party.
10.
It is a 48-bit address that contains 6 groups of 2 hexadecimal
digits, separated by either hyphens (-) or colons(.).
Example:
00:FF:FF:AB:BB:AA or
00-FF-FF-AB-BB-AA
IPv4 uses 32-bit addresses in dotted notations, whereas IPv6
uses 128-bit addresses in hexadecimal notations.
Example:
IPv4 192.168.1.1
IPv6 FFFF:F200:3204:0B00
Friday, May 13, 2022 84
6LoWPAN (Low power Wireless
Personal Area Network)
6LoWPAN brings IP protocol to the low-power devices which have
limited processing capability.
6LoWPAN is an open standard defined by the Internet Engineering
Task Force, IETF
It operates in the 2.4 GHz frequency range
Data transfer rate-250 Kb/s
It works with the 802.14 link layer protocol and defines
compression mechanisms for IPv6 datagrams over IEEE 802.15.4-
based networks.
Friday, May 13, 2022 85
Features
Support 64 bit and 16 bit addressing
Designed for Low power and Lossy IoT networks
Useful with low power link layers
Unicast, Multicast, broadcast support
Support IP routing
Allows direction connection between
Supplementary adaptation layer included
Friday, May 13, 2022 86
6LoWPAN Protocol Stack
Layers
Application
Transport
Network
Data Link
Physical
6LoWPAN Protocol
Stack
COAP, MQTT
UDP, ICMP, DTLS
IPv6 With LoWPAN
IEEE 802.15.4 MAC
IEEE 802.15.4 PHY
TCP/IP Protocol
Stack
HTTP, FTP, DNS, SMTP
TCP, UDP,ICMP
IP
Ethernet, PPP
Ethernet
Friday, May 13, 2022 87
Architecture
Source:
https://zolertia.io/6low
pan-iot-protocol/
Friday, May 13, 2022 88
Architecture
Source: https://zolertia.io/6lowpan-iot-protocol/
Friday, May 13, 2022 89
Protocol Stack of 6LoWPAN
Source: https://radiocrafts.com/technologies/6lowpan/
Layers
Friday, May 13, 2022 90
Need of Adaptation Layer
Usage of IPv6 in transmission of packets over LoWPAN
(IEEE standard 802.15.4) is not possible due to large
header size.
Hence an adaptation layer is proposed by IETF to make
IPv6 and IEEE802.15.4 compatible with each other.
This layer is placed between data link layer and network
layer in 6LoWPAN protocol stack.
Main functions of this layer:
 Header Compression and decompression
 Fragmentation and Reassembling of packets
 Routing
Friday, May 13, 2022 91
6LoWPAN Security
Use AES-128 Link layer security which is
defined in IEEE802.15.4
It provides link authentication and encryption.
For more security transport layer UDP based
DTLS (datagram transport layer security)
protocol is used.
Friday, May 13, 2022 92
6LoWPAN Advantages
Support robust , self healing and scalable mesh networking.
Works efficiently with open IP standardized including UDP ,
TCP , COAP , HTTP , MQTT and web sockets.
In this network leaf nodes can be in sleep mode for a long
duration of time.
It also offers one to many and many to one routing.
It offers end to end IP addressable devices which don’t require
any gateway , only a router which can connect this network to
IP.
It is a standard: RFC6282.
Friday, May 13, 2022 93
6LoWPAN Disadvantages
It is less secure than Zigbee.
It has less immunity to interference than Wifi
or Bluetooth devices.
It supports short range without mesh topology.
Friday, May 13, 2022 94
6LoWPAN Disadvantages
It is less secure than Zigbee.
It has less immunity to interference than Wifi
or Bluetooth devices.
It supports short range without mesh topology.
Friday, May 13, 2022 95
6LoWPAN Applications
•SMART HOME: Connecting devices using IPv6 has the chance to gain distinct
advantages over other IoT systems. The Thread Initiative standardizes the protocol
running over 6LoWPAN to enable home automation. Also, Open Thread gives
developers a smooth introduction to Thread for the start to developing smart home
solutions.
•SMART AGRICULTURE: Enabling all kind of sensors used in agriculture and
farming by connecting devices that are far away from each other in remote
areas. There are endless possibilities that this protocol provides when it comes to
building mesh networks for this type of application.
•INDUSTRIAL IOT: The perfect asset for automated factories and industrial
plants is 6LoWPAN. Automation can enable major savings for the industry and
6LoWPAN has the ability to connect to the cloud. This opens up many different
areas for data monitoring, analysis and predictive maintenance.
Friday, May 13, 2022 96
Transport Layer
 It is an end-to-end layer used to deliver messages to a host.
 Flow Control (SR)
 Error Control (Check Sum)
 Multiplexing and Demultiplexing
 Acknowledgement
•Transmission Control Protocol
•It provides reliable communication between two hosts.
•User Datagram Protocol
•It provides unreliable communication between two hosts.
Friday, May 13, 2022 97
Transmission Control Protocol
(TCP)
 TCP is reliable protocol i.e., the receiver always sends either positive or
negative acknowledgement about the data packet to the sender, so that the
sender always has bright clue about whether the data packet is reached the
destination or it needs to resend it.
 TCP ensures that the data reaches intended destination in the same order it
was sent.
 TCP is connection oriented. TCP requires that connection between two
remote points be established before sending actual data.
 TCP provides error-checking and recovery mechanism.
 TCP provides end-to-end communication.
 TCP provides flow control and quality of service.
 TCP operates in Client/Server point-to-point mode.
 TCP provides full duplex server, i.e. it can perform roles of both receiver
and sender.
Source: https://www.gatevidyalay.com/transmission-control-protocol-tcp-header/
98
Transmission Control Protocol
(TCP) Header
20B
20-60B
99
Sequence /Acknowledgement
Number (32) / Header Length (4)
Byte Stream Protocol
IP-Packet stream
TCP Header
Data Bytes
Data Segment
2
0
1
2
0
4
2
0
3
2
0
6
2
0
2
2
0
5
SN
201
AN
207
IP header=HL
Total length
A=D.B+TCP-H
Friday, May 13, 2022 100
TCP Connection Establishment
SEQ-Sequence No.
Friday, May 13, 2022 101
TCP Connection Establishment
Steps through the process of transmitting a packet with TCP/IP.
Step 1: Establish connection
Source:
https://www.khanacademy.org/computing/
computers-and-
internet/xcae6f4a7ff015e7d:the-
internet/xcae6f4a7ff015e7d:transporting-
packets/a/transmission-control-protocol--
tcp
Friday, May 13, 2022 102
TCP Data Transfer
Steps through the process of transmitting a packet with TCP/IP.
Step 2: Send packets of data
Source:
https://www.khanacademy.org/computing/
computers-and-
internet/xcae6f4a7ff015e7d:the-
internet/xcae6f4a7ff015e7d:transporting-
packets/a/transmission-control-protocol--
tcp
Friday, May 13, 2022 103
TCP Data Termination
Step 3: Close the connection
Detecting lost packets
Source:
https://www.khanacademy.org/computing/
computers-and-
internet/xcae6f4a7ff015e7d:the-
internet/xcae6f4a7ff015e7d:transporting-
packets/a/transmission-control-protocol--
tcp
Friday, May 13, 2022 104
TCPAdvantages
It is a reliable protocol
It provides an error-checking mechanism as well as one for
recovery
It gives flow control
It makes sure that the data reaches the proper destination in the
exact order that it was sent
Open Protocol, not owned by any organization or individual
It assigns an IP address to each computer on the network and a
domain name to each site thus making each device site to be
distinguishable over the network.
Friday, May 13, 2022 105
TCP Disadvantages
 TCP is made for Wide Area Networks, thus its size can become an
issue for small networks with low resources
 TCP runs several layers so it can slow down the speed of the
network
 It is not generic in nature. Meaning, it cannot represent any
protocol stack other than the TCP/IP suite. E.g., it cannot work
with a Bluetooth connection.
 No modifications since their development around 30 years ago.
Friday, May 13, 2022 106
User Datagram Protocol (UDP)
 It is a lightweight data transport protocol that works on top of IP.
 It is an unreliable and connectionless protocol. So, there is no need to establish a
connection prior to data transfer.
 User Datagram Protocol (UDP) is more efficient in terms of both latency and
bandwidth.
 It is used when acknowledgement of data does not hold any significance.
 It is good protocol for data flowing in one direction.
 It is simple and suitable for query based communications.
 It is not connection oriented.
 It does not provide congestion control mechanism.
 It does not guarantee ordered delivery of data.
 It is stateless.
 It is suitable protocol for streaming applications such as VoIP, multimedia
streaming
Friday, May 13, 2022 107
UDP Header
Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
Friday, May 13, 2022 108
Applications of UDP
Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
 Used for simple request-response communication when the size of data is less and
hence there is lesser concern about flow and error control.
 It is a suitable protocol for multicasting as UDP supports packet switching.
 UDP is used for some routing update protocols like RIP(Routing Information
Protocol).
 Normally used for real-time applications which can not tolerate uneven delays
between sections of a received message.
 UDP takes a datagram from Network Layer, attaches its header, and sends it to the
user. So, it works fast.
 Actually, UDP is a null protocol if you remove the checksum field.
• Reduce the requirement of computer resources.
• When using the Multicast or Broadcast to transfer.
• The transmission of Real-time packets, mainly in multimedia applications.
Friday, May 13, 2022 109
Difference TCP/UDP
Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
Basis Transmission control protocol (TCP) User datagram protocol (UDP)
Type of Service TCP is a connection-oriented protocol. UDP is the Datagram-oriented protocol.
Reliability
TCP is reliable as it guarantees the delivery of data to
the destination router.
The delivery of data to the destination cannot be
guaranteed in UDP.
Error checking
mechanism
TCP provides extensive error-checking mechanisms
UDP has only the basic error checking mechanism using
checksums.
Acknowledgment An acknowledgment segment is present. No acknowledgment segment.
Sequence
Sequencing of data is a feature of Transmission Control
Protocol (TCP). this means that packets arrive in order
at the receiver.
There is no sequencing of data in UDP. If the order is
required, it has to be managed by the application layer.
Speed TCP is comparatively slower than UDP. UDP is faster, simpler, and more efficient than TCP.
Retransmission
Retransmission of lost packets is possible in TCP, but
not in UDP.
There is no retransmission of lost packets in the User
Datagram Protocol (UDP).
Header Length TCP has a (20-60) bytes variable length header. UDP has an 8 bytes fixed-length header.
Weight TCP is heavy-weight. UDP is lightweight.
Handshaking
Techniques
Uses handshakes such as SYN, ACK, SYN-ACK It’s a connectionless protocol i.e. No handshake
Broadcasting TCP doesn’t support Broadcasting. UDP supports Broadcasting.
Protocols TCP is used by HTTP, HTTPs, FTP, SMTP and Telnet.
UDP is used by DNS, DHCP, TFTP, SNMP, RIP, and
VoIP.
Stream Type The TCP connection is a byte stream. UDP connection is message stream.
Overhead Low but higher than UDP. Very low.
Friday, May 13, 2022 110
How all Layer Works
A R B
Host A
IA, MA
Router
IR, MR
Host B
IB, MB
PL
DLL
NL
TL
AL
PL
DLL
NL
PL
DLL
NL
TL
AL
m
m x y
m x y IA IB
m x y IA IB MA MR
m x y IA IB
m x y IA IB MR MB
ARP-Address Resolution protocol
N S I
n1,n2,n3 s1,s2,s3 a, b, c
Routing Table
n2
n1
n3
b
c
a
Friday, May 13, 2022 111
Application Layer
Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
 Application Layer provides a facility by which users can forward several
emails and it also provides a storage facility.
 This layer allows users to access, retrieve and manage files in a remote
computer.
 It allows users to log on as a remote host.
 This layer provides access to global information about various services.
 This layer provides services which include: e-mail, transferring files,
distributing results to the user, directory services, network resources and so
on.
 It provides protocols that allow software to send and receive information and
present meaningful data to users.
 It handles issues such as network transparency, resource allocation and so on.
 This layer serves as a window for users and application processes to access
network services.
 Application Layer is basically not a function, but it performs application layer
functions.
Friday, May 13, 2022 112
Application Layer
Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
 The application layer is actually an abstraction layer that specifies the shared
protocols and interface methods used by hosts in a communication network.
 Application Layer helps us to identify communication partners, and
synchronizing communication.
 This layer allows users to interact with other software applications.
 In this layer, data is in visual form, which makes users truly understand data
rather than remembering or visualize the data in the binary format (0’s or 1’s).
 This application layer basically interacts with Operating System (OS) and
thus further preserves the data in a suitable manner.
 This layer also receives and preserves data from it’s previous layer, which is
Presentation Layer (which carries in itself the syntax and semantics of the
information transmitted).
 The protocols which are used in this application layer depend upon what
information users wish to send or receive.
 This application layer, in general, performs host initialization followed by
remote login to hosts.
Friday, May 13, 2022 113
Application Layer
Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
Two remote application processes can communicate
mainly in two different fashions:
•Peer-to-peer: Both remote processes are executing at
same level and they exchange data using some shared
resource.
•Client-Server: One remote process acts as a Client and
requests some resource from another application process
acting as Server.
Friday, May 13, 2022 114
Client-Service Model
Source: https://www.tutorialspoint.com/data_communication_computer_network/client_server_model.htm
Communication
Two processes in client-server model can interact in various ways:
•Sockets
•Remote Procedure Calls (RPC)
Friday, May 13, 2022 115
Application Layer Protocol
Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
Friday, May 13, 2022 Single Level Wild card
MQTT Protocol
Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
 MQTT-Message Queuing Telemetry Transport Protocol
 Publish-Subscribe
 Introduced by IBM in 1999
 Components
 Publisher
 Subscriber
 Broker
 Methods
 Connect
 Disconnect
 Publish
 Subscribe
TS
Temperature Sensor Broker
20 Degree
C1
C2
C3
Clients
Subscribe
Subscribe
Subscribe
Publish
Home/hall/temperature
Home/+/temperature-Single Level Wild card
Home/# - Multi Level Wild card
Friday, May 13, 2022
MQTT Protocol Example
Source: https://www.concurrency.com/blog/june-2019/introduction-to-mqtt-protocol-for-iot-applications
Friday, May 13, 2022
MQTT Protocol
Source: https://www.concurrency.com/blog/june-2019/introduction-to-mqtt-protocol-for-iot-applications
Friday, May 13, 2022
Types of MQTT messages
Source:
https://internetofthingsagenda.
techtarget.com/definition/MQT
T-MQ-Telemetry-Transport
MQTT Message Description
An MQTT session is
divided into four stages:
Connection,
Authentication,
Communication and
Termination.
Friday, May 13, 2022
MQTT message Format
Source: https://www.rfwireless-world.com/Tutorials/MQTT-tutorial.html
Friday, May 13, 2022
MQTT Protocol Architecture Working
Operation
Source: https://www.rfwireless-world.com/Tutorials/MQTT-tutorial.html
Friday, May 13, 2022
Advantages
Source: https://internetofthingsagenda.techtarget.com/definition/MQTT-MQ-Telemetry-Transport
 Efficient data transmission and quick to implement, due to its being a
lightweight protocol;
 Low network usage, due to minimized data packets;
 Efficient distribution of data;
 Successful implementation of remote sensing and control;
 Fast, efficient message delivery;
 Uses small amounts of power, which is good for the connected devices; and
 Optimizes network bandwidth.
The lightweight properties and minimum overhead of the MQTT protocol
architecture help ensure smooth data transfer with low bandwidth and reduce the
load on the CPU and RAM.
Friday, May 13, 2022
Disadvantages
Source: https://internetofthingsagenda.techtarget.com/definition/MQTT-MQ-Telemetry-Transport
 MQTT has slower transmit cycles compared to Constrained Application
Protocol (CoAP).
 MQTT's resource discovery works on flexible topic subscription, whereas
CoAP uses a stable resource discovery system.
 MQTT is unencrypted. Instead, it uses TLS/SSL (Transport Layer
Security/Secure Sockets Layer) for security encryption.
 It is difficult to create a globally scalable MQTT network.
 Other MQTT challenges relate to security, interoperability and authentication.
Friday, May 13, 2022
Application and Use Cases
Source: https://internetofthingsagenda.techtarget.com/definition/MQTT-MQ-Telemetry-Transport
Due to its lightweight properties MQTT works well for
applications involving remote monitoring, including the
following:
synchronization of sensors, such as fire detectors or
motion sensors for theft detection, to determine if a
hazard is valid;
monitoring health parameters using sensors for
patients leaving a hospital; and
sensors alerting people of danger.
Friday, May 13, 2022
AMQP Protocol
AMQP- Advanced Message Queuing Protocol
Open
Begin
Attach
Transfer
Flow
Disposition
Detach
End
Close
Producer Consumer
Broker
publish Q1
Q2
Q3
E
E-Exchange- Direct, fanout , Topic, header
Binding
Routing key =a
Binding key=b
a
a
b
The basic unit of data in AMQP is a frame.
Friday, May 13, 2022
Advantages/benefits of AMQP
 It uses QoS and hence ensures safe passage of important data.
 AMQP uses already established publish/subscribe architecture
for data sharing as used by MQTT protocol.
 It ensures interoperability as it uses wire level protocol which
sends data as stream of bytes.
 It offers simpler peer to peer communication along with
intermediaries.
 The protocol has space to evolve to work with different
standards.
 It offers secured connection to users using SSL protocol like
CoAP, MQTT, HTTP and XMPP.
Friday, May 13, 2022
Disadvantages/Drawbacks of AMQP
 It is not backward compatible with old versions.
 It is not as simple as HTTP 1.0 or HTTP 1.1 or any other wire
protocols.
 It requires higher bandwidth unlike MQTT/CoAP/XMPP.
 Resource discovery is not supported unlike
CoAP/HTTP/XMPP.
Friday, May 13, 2022
Applications
The Advanced Message Queuing Protocol (AMQP) is an open standard for passing
business messages between applications or organizations. It connects systems,
feeds business processes with the information they need and reliably transmits
onward the instructions that achieve their goals.
Key Capabilities
AMQP connects across:
•Organizations – applications in different organizations
•Technologies – applications on different platforms
•Time – systems don’t need to be available simultaneously
•Space – reliably operate at a distance, or over poor networks
Source: https://www.amqp.org/about/what
Friday, May 13, 2022
CoAP Protocol - Constraint Application Protocol
Source: https://www.amqp.org/about/what
 It is an IoT protocol
 It is designed to allow single and small devices to join the IoT
through low bandwidth restricted networks
 It is designed for M2M and IoT applications such as smart
energy and building automation
 It follows Request-Response pattern model
 It runs over UDP protocol
 It also uses RESTFUL Architecture
 It uses less resources then HTTP
 In CoAP, client can use GET, PUT, DELETE methods during
request
 It uses small and simple 4 byte header.
 PROXY and caching capabilities
Friday, May 13, 2022
CoAP Layers
Source: https://dzone.com/articles/coap-protocol-step-by-step-guide
Upper Layer(Request and Response) :It
concerns communication method and deal
with request/ response method
Lower Layer: to deal with UDP and
asynchronous messages.
CoAP supports four different message types:
•Confirmable
•Non-confirmable
•Acknowledgment
•Reset
Client Server
CON (ID:0XAA51)
ACK (ID:0XAA51)
Or RST
Client Server
NON (ID:0XAA51)
Friday, May 13, 2022
CoAp Request/Response Model
https://dzone.com/articles/coap-protocol-step-by-step-guide
Client Server
CON (ID:OXAA51)
GET/PRESSURE
Token 0x14
ACK (ID:OXAA51)
1000 hPa
Token 0x14
Client Server
CON (ID:OXAA51)
GET/PRESSURE
Token 0x14
ACK (ID:OXAA51)
ACK (ID:OXAA52)
1000 hPa
Token 0x14
ACK (ID:OXAA52)
Friday, May 13, 2022
CoAP Message Format
Source: https://www.researchgate.net/figure/Format-of-a-CoAP-message-header_fig6_272641092
Friday, May 13, 2022
Difference MQTT/CoAP
Source:
https://www.tutori
alspoint.com/differ
ence-between-
coap-and-mqtt-
protocols
Friday, May 13, 2022
Disadvantages/Drawbacks of CoAP
 It is simple protocol and uses less overhead due to operation over UDP. It allows
short wake up times and long sleepy states. This helps in achieving long battery
life for use in IoT (Internet of Things) and M2M (Machine to Machine)
communication.
 It uses IPSEC or DTLS to provide secure communication.
 Synchronous communication is not necessity in CoAP protocol.
 It has lower latency compare to HTTP.
 It consumes less power than HTTP.
 It uses ACK message and hence it becomes reliable like HTTP. Moreover it avoids
unnecessary retransmissions.
 CoAP protocol is used as best protocol choice for home communication networks.
It is used in information appliances, communication equipment's and control
equipment's in smart home networks.
Friday, May 13, 2022
Advantages/Benefits of CoAP
 It is simple protocol and uses less overhead due to operation over UDP. It allows
short wake up times and long sleepy states. This helps in achieving long battery
life for use in IoT (Internet of Things) and M2M (Machine to Machine)
communication.
 It uses IPSEC or DTLS to provide secure communication.
 Synchronous communication is not necessity in CoAP protocol.
 It has lower latency compare to HTTP.
 It consumes less power than HTTP.
 It uses ACK message and hence it becomes reliable like HTTP. Moreover it avoids
unnecessary retransmissions.
 CoAP protocol is used as best protocol choice for home communication networks.
It is used in information appliances, communication equipment's and control
equipment's in smart home networks.
Friday, May 13, 2022
Disadvantages/Drawbacks of CoAP
 CoAP is unreliable protocol due to use of UDP. Hence CoAP messages reach
unordered or will get lost when they arrive at destination. To make CoAP as
reliable protocol, stop and wait with exponential backoff retransmission feature is
incorporated in it. Duplicate detection is also introduced.
 It acknowledges each receipt of the message and hence increases processing time.
Moreover it does not verify whether the received message has been decoded
properly or not.
 It is unencrypted protocol like MQTT and uses DTLS to provide security at the
cost of implementation overhead.
 CoAP has communication issues for devices behind NAT (Network Address
Translation).
Friday, May 13, 2022
HTTP Protocol
 HTTP stands for HyperText Transfer Protocol. It is invented by Tim Berner.
 HyperText is the type of text which is specially coded with the help of some standard
coding language called as HyperText Markup Language (HTML).
 HTTP/2 is latest version of HTTP, which was published on May 2015.
 HTTP provides standard between a web browser and web server to establish
communication.
 It is set of rules for transferring data from one computer to another. Data such as text,
images, and other multimedia files are shared on the World Wide Web.
Features
 HTTP is simple
 HTTP is stateless
 HTTP is extensible
 HTTP is connectionless
 Components
CLIENT PROXY PROXY SERVER
Friday, May 13, 2022
HTTP Working
Steps:
Step 1: Direct browser to URL
Step 2: Browser looks up IP
Step 3: Browser sends HTTP
request
Step 4: Host sends back HTTP
response
Step 5: The browser renders the
response
Friday, May 13, 2022
HTTP Working
Friday, May 13, 2022
HTTPAdvantages
There is no runtime support required to run properly.
As it is connectionless so there is no overhead in order to
create and maintain the state and information of the session.
HTTP is usable over the firewalls and global application is
possible.
HTTP is platform-independent.
HTTP reports the errors without closing the TCP connection.
Offers Reduced Network congestions.
Friday, May 13, 2022
HTTP Disadvantages
HTTP is not optimized for mobile.
HTTP is too verbose.
It can be only used for point-to-point connections.
This protocol does not have push capabilities.
This protocol does not offer reliable exchange without the retry
logic.
Friday, May 13, 2022
HTTP/MQTT Difference
Parameter MQTT HTTP
Abbreviation Message Queuing Telemetry Transport Hyper Text Transfer Protocol
Architecture It works on publish/subscribe model. It works on request/response model.
Complexity It has less complexity. It is more complex.
Runs over
It runs over Transmission Control
Protocol.
It runs over Transmission Control Protocol
(TCP) and can also adapted to User
Datagram Protocol.
Protocol Design This protocol’s design is Data centric.
This protocol’s design is Document
centric.
Message Size
The message size generated is less as it
uses binary format.
The message size generated is more as it
uses ASCII format.
Header Size It is of 2 bytes. It is of 8 bytes.
Port Number It works on 1883 port. It works on 80 or 8080 port.
Data Security It provides data security with SSL/TLS.
It does not provide security but Https is
built for that.
Friday, May 13, 2022
HTTP/AMQP Difference
Parameter AMQP HTTP
Full Form Advanced Message Queuing Protocol. Hyper Text Markup Protocol.
Developed by It was developed by JPMorgan Chase. It was developed by Tim Berners-Lee.
Communication
Nature
It has asynchronous communication nature. It has synchronous communication nature.
Usage It is easy to setup and manage. It is user centric and it can be used in every aspect.
Message Delivery It has guaranteed message delivery. It has no guarantee for message delivery.
Interface It provides publish/subscribe interface. It provides point to point interface.
Fault Tolerance
AMQP protocol can bear the server broke issue
on its own.
HTTP protocol is not capable to react to the server
breakdown issue.
Segmentation
It has the property of segmentation and can
process messages into slots.
It does not has this capability to treat each message
as segments.
Protocol
Characteristics
It is specific protocol used for specific purposes.
It is general purpose protocol and is used for
multiple purposes.
Friday, May 13, 2022
HTTP/CoAP Difference
Basis of COAP MQTT
Abbreviation Constrained Application Protocol Message Query Telemetry Transport
Communication
Type
It uses Request-Response model. It uses Publish-Subscribe model
Messaging Mode This uses both Asynchronous and Synchronous. This uses only Asynchronous
Transport layer
protocol
This mainly uses User Datagram protocol(UDP)
This mainly uses Transmission Control
protocol(TCP)
Header size It has 4 bytes sized header It has 2 bytes sized header
RESTful based Yes it uses REST principles No it does not uses REST principles
Persistence
support
It does not has such support
It supports and best used for live data
communication
Message Labelling It provides by adding labels to the messages. It has no such feature.
Usability/Security
It is used in Utility area networks and has secured
mechanism.
It is used in IoT applications and is secure
Friday, May 13, 2022
WebSocket Protocol
 It allows full-duplex communication over a single socket connection for sending
messages between client and server. It starts from ws:// or wss://
 It is based on single TCP and allows streams of messages to be sent back and forth
between the client and the server while keeping the TCP connection open.
 The client can be browser, a mobile application.
 It is a stateful Protocol
 No header overhead
 Suitable for Real time applications
 Standardised by IETF as RFC6455
Client
REQUEST
HANDSHAKE
WebSocket
GET ws://websocket.example.com/
HTTP/1.1
Origin: http://example.com
Connection: Upgrade Host:
websocket.example.com
Upgrade: websocket
Friday, May 13, 2022
Websocket Advantages
It supports duplex communication.
Using websockets, one can send and receive data immediately
faster than HTTP.
Cross origin communication (however this poses security
risks).
Cross platform compatibility (web, desktop, mobile)
HTTP takes up to 2000 bytes of overhead where as websocket
takes only 2 bytes.
Replace long polling
Friday, May 13, 2022
Websocket Disadvantages
Web browser must be fully HTML5 compliant.
Intermediary/Edge caching is not possible with websockets
unlike HTTP.
To build even simple protocol of your own, one can not be able
to use friendly HTTP statuses, body etc.
If application does not require a lot of dynamic interaction,
HTTP is much simpler to implement.
Friday, May 13, 2022
WebSocket Application
Real Time Web application
Gaming application (multiplayer)
Multimedia Chats
Social Feeds
Collaborative editing/coding
Location based apps
Online education
Sports updates
Friday, May 13, 2022
HTTP/ WebSocket Comparison
Basis of HTTP WebSocket's
Definition
HTTP is a communication protocol of the
world wide web. Http works as a request-
response protocol in the client-server
computing model. It is the most common
version of HTTP used in modern web
browsers and servers.
Web Socket is a standard protocol for two-way
data transfer between client and server. The
Web Socket protocol is built over TCP. Web
sockets are mainly used to push messages to a
client in real time updates.
Technology Half Duplex Full Duplex
Messaging Unidirectional and Stateless protocol Bi-Directional and Stateful
Features
−Moderate overhead to maintain and establish
connection
−HTTP creates a short connection at the client
and closes it once response is received from
server
−Frequent requests deteriorate performance
of HTTP
−Http uses HTTP or https protocol for sending
a request
Moderate overhead to maintain and establish
connection
−Minimum overhead per message
−Web socket keeps the connection open until
state has died
−Frequent requests are very well handled by
Web socket
−Web Socket uses WS protocol
Friday, May 13, 2022
XMPP (Extensible Messaging and
Presence Protocol)
 It is used for real-time communication ad streaming XML data between
network entities.
 Wide range of application such as messaging, presence, data syndication,
gaming, multi-party chat and voice/video calls.
 It allows sending small chunks of XML data from one network entity to
another in real time
 It is a decentralised protocol and uses client-server architecture
 It supports both client-to-server and server-to-server communication paths.
Let’s divide into each character of word XMPP:
•X : It means eXtensible. XMPP is a open source project which can be changed or
extended according to the need.
•M : XMPP is designed for sending messages in real time. It has very efficient push
mechanism compared to other protocols.
•P : It determines whether you are online/offline/busy. It indicates the state.
•P : XMPP is a protocol, that is, a set of standards that allow systems to
communicate with each other.
Friday, May 13, 2022
XMPPArchitecture
Friday, May 13, 2022
XMPP (Extensible Messaging and
Presence Protocol)
For example, I’m a whatsApp user and I’m identified by my mobile number, so
Friday, May 13, 2022
Advantages of XMPP
Firewall friendly
Enables pushing data, not just pulling
Strong authentication and security
Provides many tools for solving a wide range of
problems
Friday, May 13, 2022
RFID
 RFID-Radio Frequency Identification
 RFID Tag
 Components- Integrated Circuit, Antenna, Protective covering
 Types: Active and Passive
 RFID Reader
 AIDC (Automatic Identification and Data collection)
Microcontroller
RF-Signal
Generator
Signal Detector
Friday, May 13, 2022
RFID Challenges
RFID is prone to two main issues:
•Reader collision. Reader collision, when a signal from one
RFID reader interferes with a second reader, can be prevented by
using an anti-collision protocol to make RFID tags take turns
transmitting to their appropriate reader.
•Tag collision. Tag collision occurs when too many tags confuse
an RFID reader by transmitting data at the same time. Choosing
a reader that gathers tag info one at a time will prevent this issue.
Source: https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification
Friday, May 13, 2022
RFID Applications
 inventory management
 asset tracking and equipment tracking
 inventory control
 cargo and supply chain logistics
 vehicle tracking
 customer service and loss control
 improved visibility and distribution in the supply chain
 access control in security situations
 Shipping
 Healthcare
 Manufacturing
 retail sales
 tap-and-go credit card payments
Friday, May 13, 2022
RFID v/s Barcodes
RFID tags Barcodes
Can identify individual objects without
direct line of sight.
Direct line of sight required for
scanning.
Can scan items from inches to feet
away, depending on type of tag and
reader.
Require closer proximity for scanning.
Data can be updated in real time. Data is read-only and can't be changed.
Require a power source. No power source needed.
Read time is less than 100 milliseconds
per tag.
Read time is half a second or more per
tag.
Contain a sensor attached to an antenna,
often contained in a plastic cover and
more costly than barcodes.
Printed on the outside of an object and
more subject to wear.
Source: https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification
Friday, May 13, 2022
RFID v/s Barcodes
Radio frequency ID Near-field communication
Uni-directional Bi-directional
Range up to 100 m Range less than 0.2 m
LF/HF/UHF/Microwave 13.56 MHz
Continuous sampling No continuous sampling
Bit rate varies with frequency Up to 424 Kbps
Power rate varies with frequency <15 milliamperes
Source: https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification
Friday, May 13, 2022
References
Source: https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification
1. https://www.youtube.com/c/5MinutesEngineering
2. Bag, G.; Mukhtar, H.; Shams, S.M.; Kim, K.H.; Yoo, S.W. Inter-PAN Mobility Support for
6LoWPAN, ICCIT 2008, 2008, pp 787 – 792,
3. P. Sethi and S. R. Sarangi, “Internet of Things: Architectures, Protocols, and Applications,” J.
Electr. Comput. Eng., vol. 2017, p. 9324035, 2017, doi: 10.1155/2017/9324035.
4. O. Vermesan, P. Friess, P. Guillemin et al., “Internet of thingsstrategic research roadmap,” in
Internet of Things: Global Technological and Societal Trends, vol. 1, pp. 9–52, 2011.
5. I. Pe˜na-L´opez, Itu Internet Report 2005: The Internet of Things, 2005.
6. I. Mashal, O. Alsaryrah, T.-Y. Chung, C.-Z. Yang, W.-H. Kuo, andD. P.Agrawal, “Choices for
interaction with things on Internet] and underlying issues,” Ad Hoc Networks, vol. 28, pp. 68–
90, 2015.

Contenu connexe

Tendances

PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksSiya Agarwal
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsAbdullah Alfadhly
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
Technology Behind IoT (JNTUK - Unit - 1)
Technology Behind IoT (JNTUK - Unit - 1)Technology Behind IoT (JNTUK - Unit - 1)
Technology Behind IoT (JNTUK - Unit - 1)FabMinds
 
Iot architecture
Iot architectureIot architecture
Iot architectureAnam Iqbal
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalEslam Nader
 
iot based home automation
iot based home automationiot based home automation
iot based home automationparvathy s m
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation projectShohin Aheleroff
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)Kunal Adhikari
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionSathvik N Prasad
 
Voice controlled spy robot for security system
Voice controlled spy robot for security systemVoice controlled spy robot for security system
Voice controlled spy robot for security systemMayank Prajapati
 

Tendances (20)

IoT architecture
IoT architectureIoT architecture
IoT architecture
 
IOT gateways.pptx
IOT gateways.pptxIOT gateways.pptx
IOT gateways.pptx
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
IOT ppt
IOT pptIOT ppt
IOT ppt
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Technology Behind IoT (JNTUK - Unit - 1)
Technology Behind IoT (JNTUK - Unit - 1)Technology Behind IoT (JNTUK - Unit - 1)
Technology Behind IoT (JNTUK - Unit - 1)
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
iot based home automation
iot based home automationiot based home automation
iot based home automation
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation project
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolution
 
Home automation using blynk
Home automation using blynkHome automation using blynk
Home automation using blynk
 
Internet of things(IoT)
Internet of things(IoT)Internet of things(IoT)
Internet of things(IoT)
 
Iot based home automation
Iot based home automationIot based home automation
Iot based home automation
 
Internet of Things Using Arduino
Internet of Things Using ArduinoInternet of Things Using Arduino
Internet of Things Using Arduino
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Voice controlled spy robot for security system
Voice controlled spy robot for security systemVoice controlled spy robot for security system
Voice controlled spy robot for security system
 

Similaire à IOT System.pptx

[PPT] _ Unit 2 _ Complete PPT.pptx
[PPT] _ Unit 2 _ Complete PPT.pptx[PPT] _ Unit 2 _ Complete PPT.pptx
[PPT] _ Unit 2 _ Complete PPT.pptxSelvaraj Seerangan
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptxishwar69
 
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSIOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSbinuvijay1
 
UNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGSUNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGSbinuvijay1
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) GICTTraining
 
An Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfAn Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfCIOWomenMagazine
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationIRJET Journal
 
Internet of Things, An Introduction
Internet of Things, An IntroductionInternet of Things, An Introduction
Internet of Things, An IntroductionPouria Ghatrenabi
 
Entreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTEntreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTScaleway
 
1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdfdrputtanr
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSanjayKumarYadav58
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)milemadinah
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxssuserc5ee4c
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxJanasudhan1
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxSourajitMaity1
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)Biniam Behailu
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxChandravadhanaNaraya
 

Similaire à IOT System.pptx (20)

[PPT] _ Unit 2 _ Complete PPT.pptx
[PPT] _ Unit 2 _ Complete PPT.pptx[PPT] _ Unit 2 _ Complete PPT.pptx
[PPT] _ Unit 2 _ Complete PPT.pptx
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptx
 
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSIOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
 
UNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGSUNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGS
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
 
An Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfAn Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdf
 
16114883.ppt
16114883.ppt16114883.ppt
16114883.ppt
 
IoT PPT
IoT PPTIoT PPT
IoT PPT
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
 
Internet of Things, An Introduction
Internet of Things, An IntroductionInternet of Things, An Introduction
Internet of Things, An Introduction
 
Entreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTEntreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoT
 
1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
IoT.ppt
IoT.pptIoT.ppt
IoT.ppt
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 

Plus de Manipal University Jaipur

Plus de Manipal University Jaipur (7)

Tools for writing Review Article
Tools for writing Review ArticleTools for writing Review Article
Tools for writing Review Article
 
Introduction to Robotics
Introduction to RoboticsIntroduction to Robotics
Introduction to Robotics
 
Modern control system
Modern control systemModern control system
Modern control system
 
Electronic Measurement and Instrumentation
Electronic Measurement and InstrumentationElectronic Measurement and Instrumentation
Electronic Measurement and Instrumentation
 
System dynamics discovering of how's and why’s
System dynamics  discovering of how's and why’sSystem dynamics  discovering of how's and why’s
System dynamics discovering of how's and why’s
 
Biomedical Instrumentation
Biomedical InstrumentationBiomedical Instrumentation
Biomedical Instrumentation
 
Virtual instrumentation (LabVIEW)
Virtual instrumentation (LabVIEW)Virtual instrumentation (LabVIEW)
Virtual instrumentation (LabVIEW)
 

Dernier

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 

Dernier (20)

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 

IOT System.pptx

  • 1. Course Name: IoT System Course Code: MC3253 Course Instructor : Dr Princy Randhawa Friday, May 13, 2022 1
  • 2. Friday, May 13, 2022 2 Course Syllabus Introduction to M2M communication and IoT, An emerging industrial structure for IoT, IoT system architecture, IoT reference model, IoT deployment and operational view, IoT physical devices and endpoints, Communication and networking protocols-MQTT and AMQP protocols, IoT enabling technologies-RFID, WSN,SCADA etc., Analytics for the IoT, Applying the geospatial analytics to IoT data, Real world design constraint, Technical design constraint, Future internet design for various IoT use cases such as smart cities, smart environments, smart homes, smart health etc.
  • 3. Friday, May 13, 2022 3 Course Summary/ Objective 1. Explain about the Internet of Things (IoT) and its need and also how it functions. 2. Identify the reasons that contributed to the development of IoT technology. 3. Use Real IoT protocols for communication. 4. Challenges in IoT 5. Different areas of IoT applications 6. Develop basic IoT Applications Students will be able to comprehend the ideas of the Internet of Things and will be able to develop basic IoT applications
  • 4. Friday, May 13, 2022 4 Course Outcome CO.1 [MC3253.1] Understand the basic concepts of Internet of things and its system architecture CO.2[MC3253.2]Analyse the real protocols of IOT for communication and its enabling technologies CO.3 [MC3253.3] Design IoT applications in different areas and analyse its performance CO.4 [MC3253.4] Implement basic IoT applications using hardware
  • 5. Friday, May 13, 2022 5 Books/References  Holler J., Tsiatsis V., Mulligan C., Karnouskos., Boyle D., From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence (1e), Elsevier 2014.  Bahga A., Madisetti V., Internet of Things-A Hands on Approach (1e), Orient Blackswan Private Limited, 2015.  Roderick O., Marko N., Sanchez D. and Aryasomajula A., Internet of Things and Data Analytics Handbook (1e), Wiley-Blackwell, 2017.  Patil Y., Azure IoT Development Cookbook (1e), Packt publishing Ltd, 2017
  • 6. Friday, May 13, 2022 6 Learning Outcomes Define the term "Internet of Things" (IoT) Explain the technological advancements that have led to IoT Explain the societal implications of IoT
  • 7. Friday, May 13, 2022 7 Introduction What is Internet of Things Start with a device (‘ a thing’)- anything besides a conventional computer Add Computational Intelligence to improve the functioning of the device Internet Connectivity
  • 8. Friday, May 13, 2022 8 Generic Block Diagram of an IoT Device USB HOST RJ45/Ethernet NAND/NOR DDR1..DDR3 CPU GPU HDMI 3.5 mm audio RCA video SD MMC UART SDIO SPI I2C CAN Connectivity Processor Graphics Memory Interfaces Audio/Video Interfaces Storage Interfaces I/O Interfaces (for sensors, actuators, etc.)
  • 9. Friday, May 13, 2022 9 Traditional/Smart Watch Needs Battery Shows only time Old Watch:500-600 Rs  Contains sensors  Can be charged with cable  Shows time  Calculates heart rate and blood pressure  Connects to the smart phone.  Facilitates life  Makes calls  New Watch: 4-5K
  • 10. Friday, May 13, 2022 10 Exercise 1. Identify and analyse a device that is now an IoT device but was previously a non-IoT device. Describe and list the device's features. 2. Contrast the device's previous functions with its current functions. 3. For your chosen Internet of Things device, list any enhancements or drawback, if any, that it offers over the non-IoT device. Include a description of any limitations that may be present in the new Internet-of-Things version of the device. 4. Describe any privacy concerns with the IoT device that did not exist in the device’s original version. Compare the original device's price to the price of the new IoT version of the device.
  • 11. Friday, May 13, 2022 11 How IoT works Sensors/Devices Connectivity Data pre- processing User Interface Collecting Data Sending data to Cloud Delivering Information to User Making Data Useful
  • 12. Friday, May 13, 2022 12 Introduction Data: Raw and Unprocessed data obtained from IoT devices Information: Information is inferred from data by filtering, processing, categorising, condensing and contextualization data Knowledge: Knowledge is inferred from information by organizing and structuring information and is put into action to achieve objectives IoT Data Inferred into Information and Knowledge
  • 13. Friday, May 13, 2022 13 Statistics Source: https://financesonline.com/iot-trends/
  • 14. Friday, May 13, 2022 14 Adoption of the IoT Trends Cost of the hardware Device has decreased  ENIAC cost- $500,000  Laptop- $ 500-700 Smaller Size and weight  ENIAC 1945- 1800 square feet, 27 tons  Laptop- 0.05 square feet, under 2 kgs Computational Ability  ENIAC 1945- instruction per second -> 5000  Laptop- instruction per second -> 18 billion Internet Access  Internet available almost everywhere in the world  Wireless Access leads to cheap infrastructure  Data cost is low  Data Bandwidth is high
  • 15. Friday, May 13, 2022 15 Societal Benefits of IoT IoT makes life easier  What food do I need- IoT Refrigerator  Are my accounts balanced Independence from people  IoT devices handle things you needed humans  Fewer doctor trips, no visit to supermarket Link to the world  Information access  Global interaction between people are possible
  • 16. Friday, May 13, 2022 16 Applications of IoT Home • Smart Lighting • Smart Appliances • Intrusion Detection • Smoke/Gas Detectors Cities • Smart Parking • Smart Roads • Structural Health Monitoring • Emergency Response Environment • Weather Monitoring • Air pollution Monitoring • Noise Pollution Monitoring • Forest Fire Detection • Waste Detection Energy • Smart Grids • Renewable Energy Systems • Prognostics Retail • Inventory Management • Smart Payments • Smart Vending Machines
  • 17. Friday, May 13, 2022 17 Applications of IoT Logistics • Route Generation and Scheduling • Fleet Tracking • Shipment Monitoring • Remote Vehicle Diagnostics Agriculture • Smart Irrigation • Green House Control Industry • Machine Diagnostics and Prognosis • Indoor Air quality Monitoring Health & Lifestyle • Health and Fitness Monitoring • Wearable Electronics
  • 18. Friday, May 13, 2022 18 Risks, Privacy and Security  Social Isolation  Dependence on technology and infrastructure • IoT requires power and network • Network outages and blackouts are more critical  IoT Devices are constantly observing. • Location: Cell Phone • Health: Health Monitor • Media Watching habits: TV/media system • Purchasing habits: Credit card, cell phone • Driving Habits: Car incident recording  Data may be used to market to you • Health problem? Drugs may be marketed to you  Purchasing an IoT Device may give the manufacturer permission to use or sell the data • Consumer Agreement contracts can be cryptic
  • 19. Friday, May 13, 2022 19 Risks, Privacy and Security  Data may be used by insurance companies • Were you speeding at the time of Accident? • Do you have any undiagnosed health problem  Data may not be held in a secure way • Cloud is attacked with your data inside • Even encrypted data is decrypted in use • Media Watching habits: TV/media system • Purchasing habits: Credit card, cell phone • Driving Habits: Car incident recording
  • 20. Friday, May 13, 2022 20 IoT Security Problems DOS DDOS Information Manipulation Unauthorised Access Information Disclosure
  • 21. Friday, May 13, 2022 21 Key Elements of IoT Authentication Access Control Data Security Non Repudiation Availability
  • 22. Friday, May 13, 2022 22 Future of IoT Artificial Intelligence & IoT VUI (Voice User Interface) Miniaturization of Things Power Big Data & IoT
  • 23. Friday, May 13, 2022 23 Exercise 2 An embedded system is a microprocessor- or microcontroller-based system of hardware and software designed to perform dedicated functions within a larger mechanical or electrical system. It is defined by simple interface. 1. Identify and compare two different systems available on the market. In each system, list all of the devices that can be used as inputs or outputs. 2. Classify inputs & outputs based on their mode of interaction: Visual: data carried by visible light; Audio: data carried by sound; Tactile: data carried by touch: Electronic: data encoded in electrical signals
  • 24. Friday, May 13, 2022 24 IoT Components Sensors Gateway Cloud/server Analytics/Mobile App •Amazon Web Services (AWS) •Microsoft Azure. •Google Cloud. •Alibaba Cloud. •IBM Cloud. •Oracle. •Salesforce. •SAP. ZigBee, Bluetooth Wifi LoRA
  • 25. Friday, May 13, 2022 25 Enabling Technologies
  • 26. Friday, May 13, 2022 26 IoT Gateway Key Functionalities •Establishing communication bridge •Provides additional security. •Performs data aggregation. •Pre processing and filtering of data. •Provides local storage as a cache/ buffer. •Data computing at edge level. •Ability to manage entire device. •Device diagnostics. •Adding more functional capability. •Verifying protocols. Working of Gateway • Receives data from sensor network. • Performs Pre processing, filtering and cleaning on unfiltered data. • Transports into standard protocols for communication. • Sends data to cloud.
  • 27. Friday, May 13, 2022 27 IoT Architecture Three Layered and Five Layered Architecture Perception Layer Network Layer Application Layer Perception Layer Transport Layer Processing Layer Application Layer Business Layer
  • 28. Friday, May 13, 2022 28 IoT Architecture Seven Layered Architecture Physical/ Thing (Devices, Sensors, Controllers, Actuators) Connectivity/Data Link ( Communication & Processing) Network (Send data to correct path) Transport (Transmit the data using communication protocol) Session (Maintains connections and responsible to control the port , Connection initiated, managed and edited Perception (Encryption/Decryption data to ensure that data is in usable format at application layer) Application ( Human Machine Interaction to access network application
  • 29. Friday, May 13, 2022 29 IoT Architecture analogous to Human Body Another architecture proposed by Ning and Wang Nerves Spinal Cord Human Brain Processing and Data Center Distributed network Network Layer
  • 30. Friday, May 13, 2022 30 IoT Technology/Working Pallavi Sethi, Smruti R. Sarangi, "Internet of Things: Architectures, Protocols, and Applications", Journal of Electrical and Computer Engineering, vol. 2017, Article ID 9324035, 25 pages, 2017. https://doi.org/10.1155/2017/9324035
  • 31. Friday, May 13, 2022 Communication Source: https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification
  • 32. Friday, May 13, 2022 32 Characteristics of IoT Unique Identity Dynamic Nature Self Adapting Self Configuring Heterogeneity Integrated to Information Network
  • 33. Friday, May 13, 2022 33 Introduction to M2M Machine to Machine (M2M) refers to networking of machines (devices) Purpose of remote monitoring and control and data exchange Similar to SCADA (Supervisory control and Data acquisition) New and Existing Devices IoT Gateways Network Carrier Backend System
  • 34. Friday, May 13, 2022 34 M2M Gateway Native Protocol Protocol Translation Proxy Native Protocol Protocol translation Proxy M2M Gateway Virtual Node Virtual Node M2M Node M2M Node IP Routing M2M Area Network • Bluetooth • Zigbee • 802.15.4 • 6loWPAN • UWB • ModBus • Z-Wave
  • 35. Friday, May 13, 2022 35 M2M Applications
  • 36. Friday, May 13, 2022 36 M2M/IoT Basics of IoT M2M Abbreviation Internet of Things Machine to Machine Intelligence Devices have objects that are responsible for decision making Some degree of intelligence is observed in this Connection type used The connection is via Network and using various communication types. The connection is a point to point Communication protocol used Internet protocols are used such as HTTP, FTP, and Telnet. Traditional protocols and communication technology techniques are used Data Sharing Data is shared between other applications that are used to improve the end-user experience. Data is shared with only the communicating parties. Internet Internet connection is required for communication Devices are not dependent on the Internet. Scope A large number of devices yet scope is large. Limited Scope for devices. Business Type used Business 2 Business(B2B) and Business 2 Consumer(B2C) Business 2 Business (B2B) Open API support Supports Open API integrations. There is no support for Open API’s
  • 37. Friday, May 13, 2022 37 M2M/IoT Basics of IoT M2M Machines Heterogenous Homogenous Hardware vs Software Emphasis Devices have objects that are responsible for decision making Some degree of intelligence is observed in this Data collection and Analysis Cloud (public, private or hybrid cloud) On Premises storage infrastructure Examples Smart wearables, Big Data and Cloud, etc. Sensors, Data and Information, etc.
  • 38. Friday, May 13, 2022 38 M2M/IoT 802.3 UDP Transport Layer Network Layer Link Layer Application Layer TCP UDP Transport Layer Network Layer Link Layer Application Layer IPv4 IPv6 6LoWPAN IPv4 IPv6 6LoWPAN HTTP CoAP Web Sockets MQTT XMPP DDS AMQP HTTP CoAP Web Sockets MQTT XMPP DDS AMQP TCP 802.16 802.11 802.15.4 2G/3G/LTE 802.3 802.16 802.11 802.15.4 2G/3G/LTE IOT M2M
  • 39. Friday, May 13, 2022 39 M2M Features Low Power Communication Time Controlled Time Tolerant Packed Switched Online small data transmission Monitoring Location Specific Trigger
  • 40. Friday, May 13, 2022 40 M2M Issues/Concerns Addressing  M2M system should be flexible in supporting more than one naming scheme  Security  M2M devices operate unmanned and unguarded by humans and are subject to increased level of security threats such as physical tampering, hacking, unauthorised monitoring etc.
  • 41. Friday, May 13, 2022 41 Physical Design of IoT Things in “IoT” IoT Communication Protocols
  • 42. Friday, May 13, 2022 42 Communication Models in IoT Device-to-Device communication model Source:))Tschofenig,)H.,)et.)al.,)Architectural)Considera/ons)in)Smart)Object)Networking.)Tech.)no.)RFC)7452.)Internet)Architecture)Board,)Mar.)2015.)We b.) .) Device-to-cloud communication model diagram
  • 43. Friday, May 13, 2022 43 Communication Models in IoT Source:))Tschofenig,)H.,)et.)al.,)Architectural)Considera/ons)in)Smart)Object)Networking.)Tech.)no.)RFC)7452.)Internet)Architecture)Board,)Mar.)2015.)We b.) .) Device-to-gateway communication model diagram.
  • 44. Friday, May 13, 2022 44 Communication Models in IoT Source:))Tschofenig,)H.,)et.)al.,)Architectural)Considera/ons)in)Smart)Object)Networking.)Tech.)no.)RFC)7452.)Internet)Architecture)Board,)Mar.)2015.)We b.) .) Back-end data sharing model diagram
  • 45. Friday, May 13, 2022 45 IoT Communication Models Request & Response Publisher-Subscriber Model Client Client Receives Response Server Request Process Database Fetch Response PUBLISHER BROKER T2 T1 T3 SUBSCRIBER S1 S2 S3 S4 S5
  • 46. Friday, May 13, 2022 46 IoT Communication Models Push-Pull Model Exclusive Pair Model CLIENT SERVER PUBLISHER CONSUMER Queue Push Pull Push Pull Full Duplex and Bidirectional Communication
  • 47. Friday, May 13, 2022 47 IoT || NodeMCU || ESP8266 Introduction to IoT and Getting started with NodeMCU/ESP8266.
  • 48. Friday, May 13, 2022 48 Link Layer Protocols It determines how the data is sent physically over the network physical layer or medium (Co-axial or Radio wave) Local network connect to which host is attached Host on the same link exchange data packets over the link layer using link layer protocols. Link Layer determines how the packets are coded and signalled by the hardware device over the medium to which the host is attached.
  • 49. Friday, May 13, 2022 49 802.3 Ethernet Data rate are provided from 10Gbit/s to 40 Gbit/s and higher It is primarily used in LAN, MANs and even WANs Sensor units installed within a building automation system can use wired technologies S. No. Standard Shared Medium 1 802.3 Co-axial Cable 10BASE5 2 802.3i Copper Twisted Pair 10BASE- T 3 802.3j Fiber Optic 10BASE-F 4 802.3ae Fiber 10Gbits/s
  • 50. Friday, May 13, 2022 50 802.3 Ethernet  Works on Bus Topology  Access Control Method- CSMA/CD- Carrier Sensing Multiple Access/Collision Detection  No Acknowledgement  Encoding Technique- Manchester  Data Rate Tp (T t > =2 *Tp) IEEE 802.3 Frame Format Preamble SOF Destination Address Source Address Data+ Padding CRC 7 Bytes 1 Byte 6 Bytes 6 Bytes Minimum: 46 Bytes Maximum :1500 Bytes 4 Bytes
  • 51. Friday, May 13, 2022 51 Limitations Not for Real Time Application  Delay can be introduced because of collisions leads to disastrous effects  Not for Interactive Applications  Min 46 bytes need to be delivered
  • 52. Friday, May 13, 2022 52 802.11 WiFi (Wireless-Fidelity)  Primary challenge is to mediate access to a shared communication medium-in this case, signals propagating through space. Wireless Router Router Ethernet Switch Access Point ISP Office/inter net wireless wired wired
  • 53. Friday, May 13, 2022 53 802.11 WiFi (Wireless-Fidelity) Wired Wired
  • 54. Friday, May 13, 2022 54 802.11 WiFi (Wireless-Fidelity)  Collection of Wireless LAN  Data rates from 1Mb/s to 6.75 Gb/s  Wi-Fi provides communication range in the order of 20m (indoor) to 100m (outdoor)  Access Method- CSMA/CA  Modes – Infrastructure, Adhoc and WIFI direct S. No. Standard Operates Data Rate 1 802.11a 5 GHz Band 54 Mbps 2 802.11b and 802.11g 2.4 GHz Band 11 Mbps 54 Mbps 3 802.11n 2.4/5 GHz Bands 450 Mbps 4 802.11ac 5 GHz Band 866.7 Mbps 5 802.11ax 2.4/5 GHz Bands 2.4 Gbps
  • 55. DISTRIBUTION SYSTEM (DS) Friday, May 13, 2022 55 802.11 WiFi Architecture STA1 STA3 STA2 STA4 STA5 STA6 STA7 STA8 AP 1 AP 2 AP 3 Basic Service Set (BSS) AP-ACCESS POINT BSS 1 BSS 2 BSS 3  It is suitable for an ad-hoc configuration of nodes that may or may not be able to communicate with other nodes  Nodes are free to move around  The set of directly reachable nodes may change over time
  • 56. Friday, May 13, 2022 56 Services in 802.11 Services Station Distribution System Authentication Deauthentication Privacy Mac Service Data unit Association Re-association De-association Open Shared Key Distribution Integration
  • 57. Friday, May 13, 2022 57 Frame Format (802.11) Frame Control Duration Address 1 Address 2 Address 3 Sequence 0-2312 Bytes Check Sequence 2 Bytes 2 Bytes 6 Bytes 6 Bytes 6 Bytes 2 Bytes Data 4 Bytes IEEE 802.11 Frame Format
  • 58. Friday, May 13, 2022 58 802.16 –WiMAX Protocol WiMAX- Worldwide interoperability for Microwave Access Collection of Wireless Broadband Standards Data rates from 1.5 Mb/s to 1 Gbit/s Mobile Stations- 100 Mbit/s, Fixed Stations- 1 Gbit/s Wi-Fi provides communication range in the order of 20m (indoor) to 100m (outdoor)
  • 59. Friday, May 13, 2022 59 802.16 –Architecture Air Interface Base station Mobile Station (Movable) Subscriber Station (Stationary) Backbone Network connected to Internet Physical Layer MAC Layer Convergence Layer
  • 60. WIFI/WIMAX Comparison Friday, May 13, 2022 60 Feature WiMax (802.16a) Wi-Fi (802.11b) Wi-Fi (802.11a/g) Primary Application Broadband Wireless Access Wireless LAN Wireless LAN Frequency Band Licensed/Unlicensed 2 G to 11 GHz 2.4 GHz ISM 2.4 GHz ISM (g) 5 GHz U-NII (a) Channel Bandwidth Adjustable 1.25 M to 20 MHz 25 MHz 20 MHz Half/Full Duplex Full Half Half Radio Technology OFDM (256-channels) Direct Sequence Spread Spectrum OFDM (64-channels) Bandwidth Efficiency <=5 bps/Hz <=0.44 bps/Hz <=2.7 bps/Hz Modulation BPSK, QPSK, 16-, 64-, 256-QAM QPSK BPSK, QPSK, 16-, 64-QAM Mobility Mobile WiMax (802.16e) In development In development Mesh Yes Vendor Proprietary Vendor Proprietary Access Protocol Request/Grant CSMA/CA CSMA/CA
  • 61. Friday, May 13, 2022 61 802.15.4 –LR-WPAN Collection of Standards for low rate wireless personal area network (LR-WPAN) High Level Protocols such as Zigbee Data rates from 40 Kb/s to 250 Kb/s Low cost and Low speed communication for power constrained devices IEEE 802.15. Protocol Stacks include – •ZigBee •6LoWPAN •ISA100.11a •Wireless HART •Thread
  • 62. Friday, May 13, 2022 62 Zigbee Data Link (MAC) Layer Network Layer Physical Layer Transport Layer Session Layer Presentation Layer Application Layer IEEE 802.15.4 ZIGBEE Protocol ACE (Additional Communication Enhancement) ZNL uses Ad Hoc On Demand Distance Vector Routing
  • 63. Friday, May 13, 2022 63 Zigbee protocol TOPOLOGY Star Cluster Tree Mesh C R E E E E C R R R R E E E E E E E E E E E E R R R R R R C E E E E E E
  • 64. Friday, May 13, 2022 64 Advantages/Disadvantages Advantages •Cheap cost •Long battery life, •Quick installation •Simple •Extensible protocol stack Disadvantages •IEEE 802.15.4 causes interference and multipath fading. •doesn’t employ a frequency-hopping approach. •unbounded latency •interference susceptibility •Wireless sensor networks in the industry •Building and home automation •Remote controllers and interacting toys •Automotive networks Applications
  • 65. Friday, May 13, 2022 65 2G/3G/LTE-Cellular Protocol Mobile Generation Standards ( 2G including GSM and CDMA)  Third Generation (3G including UMTS and CDMA2000)  Fourth Generation (4G-LTE) Data Rates- 9.6 Kb/s (for 2G) to up-to 100 Mb/s (for 4G)
  • 66. Friday, May 13, 2022 66 CDMA/GSM CDMA GSM It stands for Code Division Multiple Access. It stands for Global System for Mobile Communication. It uses a CDMA mechanism for data & call transmission. It uses TDMA and FDMA mechanism for data & voice transmission. The transmission rate is fast compared to GSM. The transmission rate is slow compared to CDMA. It uses EVDO data transfer technology. It uses EDGE data transfer technology. It is handset specific and does not require any SIM for communication. It is SIM specific, hence requires a SIM card for communication. During transmission, it is much prone to radiation emission. During transmission, it is comparatively less prone to radiation emission. It offers more secure communication compared to GSM. It offers less secure communication compared to CDAM. The signal detection is difficult in CDMA. The signal detection is easy in GSM. It provides built-in encryption. It requires additional encryption as no built-in encryption is available. It enables limited roaming. It enables worldwide roaming.
  • 67. Friday, May 13, 2022 67 2G-Cellular Protocol GSM- Only for Voice Source: https://www.connectivity.technology/2019/08/high-level-architecture-introduction-of.html MSC-Mobile Switching Centre BSS-Base Station Subsystem BSC-Base Station Controller BTS-Base Transceiver Station MS-Mobile Station
  • 68. Friday, May 13, 2022 68 2.5G-GPRS Enhancement Source: https://www.connectivity.technology/2019/08/high-level-architecture-introduction-of.html GPRS-General Packet Radio Service SGSN-Serving GPRS Support Node GGSN-Gateway GPRS Support Node
  • 69. Friday, May 13, 2022 69 3G-UMTS Network Architecture Source: https://www.connectivity.technology/2019/08/high-level-architecture-introduction-of.html UMTS-Universal Mobile Telecommunications Service RNC-Radio Network Controller RNS-Radio Network Subsystem UE-User Equipment
  • 70. Friday, May 13, 2022 70 4G-’LTE’ Network Architecture Source: https://www.connectivity.technology/2019/08/high-level-architecture-introduction-of.html
  • 71. Friday, May 13, 2022 71 5G-‘Phase 1’ Network Architecture Source: https://www.connectivity.technology/2019/08/high-level-architecture-introduction-of.html
  • 72. Friday, May 13, 2022 72 Network Layer Responsible for sending of IP datagrams from source to destination network Functions  Host to Host Connectivity  Switching  Routing  Fragmentation  Logical Addressing  Host Identification is done using hierarchical IP addressing schemes such as IPv4 and IPv6
  • 73. Friday, May 13, 2022 73 IPv4 (Internet Protocol) It is used to identify the devices on a network using a hierarchical addressing scheme It uses 32 bit addressing scheme= 232 Or 4,294,967,296 addresses IP protocols establish connections on packet network but do not guarantee delivery of packets  Guaranteed Delivery of packets are handled by the upper layer protocols 00001001010000110110000100000010 32-bit address 00001001 01000011 01100001 00000010 4 octets 9 67 97 2 dotted decimal notation (9.67.97.2)
  • 74. Friday, May 13, 2022 74 IPv4 Header Format Version (4) Identification (16) MF TTL (8) Protocol (8) Header Check Sum (16) Source IP (32) Destination IP (32) Option ( 0 to 40 Bytes) Data 0 DF FO (13) TTL (16) HLEN(4) TOS (8) 4B 4B 4B 4B 4B Header Size- 20B-60B
  • 75. Friday, May 13, 2022 75 Fragmentation Sender Receiver Router Maximum Transmission Unit (MTU) =520B Maximum Transmission Unit (MTU)=200B 180 20 180 20 140 20 500 20 F2 F1 F0 Identification Fragment Offset (FO) 10 10 10 0 180/8 ==22.5 352/8 176 20 148 20 176 20 360/8 176/8 More Fragment(MF) 1 1 0 Do not Fragment (DF) 1
  • 76. Friday, May 13, 2022 76 TTL (Time to live) Router N1 N1 N1 PACKET R1 Default Router R2 R3 Sender Receiver TTL-3 TTL-2 TTL-1 TTL-0
  • 77. Friday, May 13, 2022 77 Protocol Field (8 bits) ICMP- 1 IGMP-2 TCP-6 UDP-17 ICMP<IGMP<UDP<TCP Source UDP ICMP TCP TCP TCP IGMP Router Buffer ICMP/IGMP/TCP
  • 78. Friday, May 13, 2022 78 Optional Field (0-40 Byte) Record Route Source Routing Padding
  • 79. Friday, May 13, 2022 79 IPv6 Protocol Newest Version of Internet Protocol It uses 128-bit address = 2128 or 3.4 * 1038 IPv6 use Colon-Hex- representation E.g. 2031:0000:130F:0000:0000:09C0:876A:130B In IPv6 representation, addressing methods : •Unicast •Multicast •Anycast
  • 80. Friday, May 13, 2022 80 IPv6 Header Version (4) Priority/Traffic (8) Flow label (20) Payload Length (16) Next Header (8) Hop Limit (8) Source Address (128) Destination Address (128) Extension Header Base Header-40 Bytes (320 bits) Fixed Extension Headers and its code:  Base Header  Routing Headers (43)  Hop by Hop Option (0)  Fragment Header (44)  Authentication Header (51)  Destination Option (60)  Encapsulating Security Payload (50) Source: https://www.geeksforgeeks.org/internet-protocol-version-6-ipv6-header/?ref=rp Base Header (40B) Extension Header 1 Extension Header 2
  • 81. Friday, May 13, 2022 81 Priority/Traffic Field Priority assignment of Congestion controlled traffic : Priority Meaning 0 No specific Traffics 1 Background data 2 Unattended data traffic 3 Reserved 4 Attended bulk data traffic 5 Reserved 6 Interactive Traffic 7 Control Traffic
  • 82. Friday, May 13, 2022 82 IPv4/IPv6 (Comparison) Feature IPv4 IPv6 Address Size 32 128 Address Format Dotted Decimal Notation 192.168.14.1 Hexadecimal Notation 3FFE:F200:0234:AB00 0123:4567:8901:ABCD Checksum Field is available in header Not Available in header Packet Size 576 bytes 1280 bytes IP Sec Support Optional Required No. of Header Field 12 8 Length of Header Field 20 40 Communication Both Multicast and Broadcast No Broadcast but uses different types of multicast Security Less More as compared to IPv4 Optional Field Available Not Available
  • 83. Friday, May 13, 2022 83 IP/MAC address (Comparison) S.NO MAC Address IPAddress 1. MAC Address stands for Media Access Control Address. IP Address stands for Internet Protocol Address. 2. MAC Address is a six byte hexadecimal address. IP Address is either a four-byte (IPv4) or a sixteen-byte (IPv6) address. 3. A device attached with MAC Address can retrieve by ARP protocol. A device attached with IP Address can retrieve by RARP protocol. 4. NIC Card’s Manufacturer provides the MAC Address. Internet Service Provider provides IP Address. 5. MAC Address is used to ensure the physical address of a computer. IP Address is the logical address of the computer. 6. MAC Address operates in the data link layer. IP Address operates in the network layer. 7. MAC Address helps in simply identifying the device. IP Address identifies the connection of the device on the network. 8. MAC Address of computer cannot be changed with time and environment. IP Address modifies with the time and environment. 9. MAC Addresses can’t be found easily by a third party. IP Addresses can be found by a third party. 10. It is a 48-bit address that contains 6 groups of 2 hexadecimal digits, separated by either hyphens (-) or colons(.). Example: 00:FF:FF:AB:BB:AA or 00-FF-FF-AB-BB-AA IPv4 uses 32-bit addresses in dotted notations, whereas IPv6 uses 128-bit addresses in hexadecimal notations. Example: IPv4 192.168.1.1 IPv6 FFFF:F200:3204:0B00
  • 84. Friday, May 13, 2022 84 6LoWPAN (Low power Wireless Personal Area Network) 6LoWPAN brings IP protocol to the low-power devices which have limited processing capability. 6LoWPAN is an open standard defined by the Internet Engineering Task Force, IETF It operates in the 2.4 GHz frequency range Data transfer rate-250 Kb/s It works with the 802.14 link layer protocol and defines compression mechanisms for IPv6 datagrams over IEEE 802.15.4- based networks.
  • 85. Friday, May 13, 2022 85 Features Support 64 bit and 16 bit addressing Designed for Low power and Lossy IoT networks Useful with low power link layers Unicast, Multicast, broadcast support Support IP routing Allows direction connection between Supplementary adaptation layer included
  • 86. Friday, May 13, 2022 86 6LoWPAN Protocol Stack Layers Application Transport Network Data Link Physical 6LoWPAN Protocol Stack COAP, MQTT UDP, ICMP, DTLS IPv6 With LoWPAN IEEE 802.15.4 MAC IEEE 802.15.4 PHY TCP/IP Protocol Stack HTTP, FTP, DNS, SMTP TCP, UDP,ICMP IP Ethernet, PPP Ethernet
  • 87. Friday, May 13, 2022 87 Architecture Source: https://zolertia.io/6low pan-iot-protocol/
  • 88. Friday, May 13, 2022 88 Architecture Source: https://zolertia.io/6lowpan-iot-protocol/
  • 89. Friday, May 13, 2022 89 Protocol Stack of 6LoWPAN Source: https://radiocrafts.com/technologies/6lowpan/ Layers
  • 90. Friday, May 13, 2022 90 Need of Adaptation Layer Usage of IPv6 in transmission of packets over LoWPAN (IEEE standard 802.15.4) is not possible due to large header size. Hence an adaptation layer is proposed by IETF to make IPv6 and IEEE802.15.4 compatible with each other. This layer is placed between data link layer and network layer in 6LoWPAN protocol stack. Main functions of this layer:  Header Compression and decompression  Fragmentation and Reassembling of packets  Routing
  • 91. Friday, May 13, 2022 91 6LoWPAN Security Use AES-128 Link layer security which is defined in IEEE802.15.4 It provides link authentication and encryption. For more security transport layer UDP based DTLS (datagram transport layer security) protocol is used.
  • 92. Friday, May 13, 2022 92 6LoWPAN Advantages Support robust , self healing and scalable mesh networking. Works efficiently with open IP standardized including UDP , TCP , COAP , HTTP , MQTT and web sockets. In this network leaf nodes can be in sleep mode for a long duration of time. It also offers one to many and many to one routing. It offers end to end IP addressable devices which don’t require any gateway , only a router which can connect this network to IP. It is a standard: RFC6282.
  • 93. Friday, May 13, 2022 93 6LoWPAN Disadvantages It is less secure than Zigbee. It has less immunity to interference than Wifi or Bluetooth devices. It supports short range without mesh topology.
  • 94. Friday, May 13, 2022 94 6LoWPAN Disadvantages It is less secure than Zigbee. It has less immunity to interference than Wifi or Bluetooth devices. It supports short range without mesh topology.
  • 95. Friday, May 13, 2022 95 6LoWPAN Applications •SMART HOME: Connecting devices using IPv6 has the chance to gain distinct advantages over other IoT systems. The Thread Initiative standardizes the protocol running over 6LoWPAN to enable home automation. Also, Open Thread gives developers a smooth introduction to Thread for the start to developing smart home solutions. •SMART AGRICULTURE: Enabling all kind of sensors used in agriculture and farming by connecting devices that are far away from each other in remote areas. There are endless possibilities that this protocol provides when it comes to building mesh networks for this type of application. •INDUSTRIAL IOT: The perfect asset for automated factories and industrial plants is 6LoWPAN. Automation can enable major savings for the industry and 6LoWPAN has the ability to connect to the cloud. This opens up many different areas for data monitoring, analysis and predictive maintenance.
  • 96. Friday, May 13, 2022 96 Transport Layer  It is an end-to-end layer used to deliver messages to a host.  Flow Control (SR)  Error Control (Check Sum)  Multiplexing and Demultiplexing  Acknowledgement •Transmission Control Protocol •It provides reliable communication between two hosts. •User Datagram Protocol •It provides unreliable communication between two hosts.
  • 97. Friday, May 13, 2022 97 Transmission Control Protocol (TCP)  TCP is reliable protocol i.e., the receiver always sends either positive or negative acknowledgement about the data packet to the sender, so that the sender always has bright clue about whether the data packet is reached the destination or it needs to resend it.  TCP ensures that the data reaches intended destination in the same order it was sent.  TCP is connection oriented. TCP requires that connection between two remote points be established before sending actual data.  TCP provides error-checking and recovery mechanism.  TCP provides end-to-end communication.  TCP provides flow control and quality of service.  TCP operates in Client/Server point-to-point mode.  TCP provides full duplex server, i.e. it can perform roles of both receiver and sender.
  • 99. 99 Sequence /Acknowledgement Number (32) / Header Length (4) Byte Stream Protocol IP-Packet stream TCP Header Data Bytes Data Segment 2 0 1 2 0 4 2 0 3 2 0 6 2 0 2 2 0 5 SN 201 AN 207 IP header=HL Total length A=D.B+TCP-H
  • 100. Friday, May 13, 2022 100 TCP Connection Establishment SEQ-Sequence No.
  • 101. Friday, May 13, 2022 101 TCP Connection Establishment Steps through the process of transmitting a packet with TCP/IP. Step 1: Establish connection Source: https://www.khanacademy.org/computing/ computers-and- internet/xcae6f4a7ff015e7d:the- internet/xcae6f4a7ff015e7d:transporting- packets/a/transmission-control-protocol-- tcp
  • 102. Friday, May 13, 2022 102 TCP Data Transfer Steps through the process of transmitting a packet with TCP/IP. Step 2: Send packets of data Source: https://www.khanacademy.org/computing/ computers-and- internet/xcae6f4a7ff015e7d:the- internet/xcae6f4a7ff015e7d:transporting- packets/a/transmission-control-protocol-- tcp
  • 103. Friday, May 13, 2022 103 TCP Data Termination Step 3: Close the connection Detecting lost packets Source: https://www.khanacademy.org/computing/ computers-and- internet/xcae6f4a7ff015e7d:the- internet/xcae6f4a7ff015e7d:transporting- packets/a/transmission-control-protocol-- tcp
  • 104. Friday, May 13, 2022 104 TCPAdvantages It is a reliable protocol It provides an error-checking mechanism as well as one for recovery It gives flow control It makes sure that the data reaches the proper destination in the exact order that it was sent Open Protocol, not owned by any organization or individual It assigns an IP address to each computer on the network and a domain name to each site thus making each device site to be distinguishable over the network.
  • 105. Friday, May 13, 2022 105 TCP Disadvantages  TCP is made for Wide Area Networks, thus its size can become an issue for small networks with low resources  TCP runs several layers so it can slow down the speed of the network  It is not generic in nature. Meaning, it cannot represent any protocol stack other than the TCP/IP suite. E.g., it cannot work with a Bluetooth connection.  No modifications since their development around 30 years ago.
  • 106. Friday, May 13, 2022 106 User Datagram Protocol (UDP)  It is a lightweight data transport protocol that works on top of IP.  It is an unreliable and connectionless protocol. So, there is no need to establish a connection prior to data transfer.  User Datagram Protocol (UDP) is more efficient in terms of both latency and bandwidth.  It is used when acknowledgement of data does not hold any significance.  It is good protocol for data flowing in one direction.  It is simple and suitable for query based communications.  It is not connection oriented.  It does not provide congestion control mechanism.  It does not guarantee ordered delivery of data.  It is stateless.  It is suitable protocol for streaming applications such as VoIP, multimedia streaming
  • 107. Friday, May 13, 2022 107 UDP Header Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
  • 108. Friday, May 13, 2022 108 Applications of UDP Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/  Used for simple request-response communication when the size of data is less and hence there is lesser concern about flow and error control.  It is a suitable protocol for multicasting as UDP supports packet switching.  UDP is used for some routing update protocols like RIP(Routing Information Protocol).  Normally used for real-time applications which can not tolerate uneven delays between sections of a received message.  UDP takes a datagram from Network Layer, attaches its header, and sends it to the user. So, it works fast.  Actually, UDP is a null protocol if you remove the checksum field. • Reduce the requirement of computer resources. • When using the Multicast or Broadcast to transfer. • The transmission of Real-time packets, mainly in multimedia applications.
  • 109. Friday, May 13, 2022 109 Difference TCP/UDP Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/ Basis Transmission control protocol (TCP) User datagram protocol (UDP) Type of Service TCP is a connection-oriented protocol. UDP is the Datagram-oriented protocol. Reliability TCP is reliable as it guarantees the delivery of data to the destination router. The delivery of data to the destination cannot be guaranteed in UDP. Error checking mechanism TCP provides extensive error-checking mechanisms UDP has only the basic error checking mechanism using checksums. Acknowledgment An acknowledgment segment is present. No acknowledgment segment. Sequence Sequencing of data is a feature of Transmission Control Protocol (TCP). this means that packets arrive in order at the receiver. There is no sequencing of data in UDP. If the order is required, it has to be managed by the application layer. Speed TCP is comparatively slower than UDP. UDP is faster, simpler, and more efficient than TCP. Retransmission Retransmission of lost packets is possible in TCP, but not in UDP. There is no retransmission of lost packets in the User Datagram Protocol (UDP). Header Length TCP has a (20-60) bytes variable length header. UDP has an 8 bytes fixed-length header. Weight TCP is heavy-weight. UDP is lightweight. Handshaking Techniques Uses handshakes such as SYN, ACK, SYN-ACK It’s a connectionless protocol i.e. No handshake Broadcasting TCP doesn’t support Broadcasting. UDP supports Broadcasting. Protocols TCP is used by HTTP, HTTPs, FTP, SMTP and Telnet. UDP is used by DNS, DHCP, TFTP, SNMP, RIP, and VoIP. Stream Type The TCP connection is a byte stream. UDP connection is message stream. Overhead Low but higher than UDP. Very low.
  • 110. Friday, May 13, 2022 110 How all Layer Works A R B Host A IA, MA Router IR, MR Host B IB, MB PL DLL NL TL AL PL DLL NL PL DLL NL TL AL m m x y m x y IA IB m x y IA IB MA MR m x y IA IB m x y IA IB MR MB ARP-Address Resolution protocol N S I n1,n2,n3 s1,s2,s3 a, b, c Routing Table n2 n1 n3 b c a
  • 111. Friday, May 13, 2022 111 Application Layer Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/  Application Layer provides a facility by which users can forward several emails and it also provides a storage facility.  This layer allows users to access, retrieve and manage files in a remote computer.  It allows users to log on as a remote host.  This layer provides access to global information about various services.  This layer provides services which include: e-mail, transferring files, distributing results to the user, directory services, network resources and so on.  It provides protocols that allow software to send and receive information and present meaningful data to users.  It handles issues such as network transparency, resource allocation and so on.  This layer serves as a window for users and application processes to access network services.  Application Layer is basically not a function, but it performs application layer functions.
  • 112. Friday, May 13, 2022 112 Application Layer Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/  The application layer is actually an abstraction layer that specifies the shared protocols and interface methods used by hosts in a communication network.  Application Layer helps us to identify communication partners, and synchronizing communication.  This layer allows users to interact with other software applications.  In this layer, data is in visual form, which makes users truly understand data rather than remembering or visualize the data in the binary format (0’s or 1’s).  This application layer basically interacts with Operating System (OS) and thus further preserves the data in a suitable manner.  This layer also receives and preserves data from it’s previous layer, which is Presentation Layer (which carries in itself the syntax and semantics of the information transmitted).  The protocols which are used in this application layer depend upon what information users wish to send or receive.  This application layer, in general, performs host initialization followed by remote login to hosts.
  • 113. Friday, May 13, 2022 113 Application Layer Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/ Two remote application processes can communicate mainly in two different fashions: •Peer-to-peer: Both remote processes are executing at same level and they exchange data using some shared resource. •Client-Server: One remote process acts as a Client and requests some resource from another application process acting as Server.
  • 114. Friday, May 13, 2022 114 Client-Service Model Source: https://www.tutorialspoint.com/data_communication_computer_network/client_server_model.htm Communication Two processes in client-server model can interact in various ways: •Sockets •Remote Procedure Calls (RPC)
  • 115. Friday, May 13, 2022 115 Application Layer Protocol Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
  • 116. Friday, May 13, 2022 Single Level Wild card MQTT Protocol Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/  MQTT-Message Queuing Telemetry Transport Protocol  Publish-Subscribe  Introduced by IBM in 1999  Components  Publisher  Subscriber  Broker  Methods  Connect  Disconnect  Publish  Subscribe TS Temperature Sensor Broker 20 Degree C1 C2 C3 Clients Subscribe Subscribe Subscribe Publish Home/hall/temperature Home/+/temperature-Single Level Wild card Home/# - Multi Level Wild card
  • 117. Friday, May 13, 2022 MQTT Protocol Example Source: https://www.concurrency.com/blog/june-2019/introduction-to-mqtt-protocol-for-iot-applications
  • 118. Friday, May 13, 2022 MQTT Protocol Source: https://www.concurrency.com/blog/june-2019/introduction-to-mqtt-protocol-for-iot-applications
  • 119. Friday, May 13, 2022 Types of MQTT messages Source: https://internetofthingsagenda. techtarget.com/definition/MQT T-MQ-Telemetry-Transport MQTT Message Description An MQTT session is divided into four stages: Connection, Authentication, Communication and Termination.
  • 120. Friday, May 13, 2022 MQTT message Format Source: https://www.rfwireless-world.com/Tutorials/MQTT-tutorial.html
  • 121. Friday, May 13, 2022 MQTT Protocol Architecture Working Operation Source: https://www.rfwireless-world.com/Tutorials/MQTT-tutorial.html
  • 122. Friday, May 13, 2022 Advantages Source: https://internetofthingsagenda.techtarget.com/definition/MQTT-MQ-Telemetry-Transport  Efficient data transmission and quick to implement, due to its being a lightweight protocol;  Low network usage, due to minimized data packets;  Efficient distribution of data;  Successful implementation of remote sensing and control;  Fast, efficient message delivery;  Uses small amounts of power, which is good for the connected devices; and  Optimizes network bandwidth. The lightweight properties and minimum overhead of the MQTT protocol architecture help ensure smooth data transfer with low bandwidth and reduce the load on the CPU and RAM.
  • 123. Friday, May 13, 2022 Disadvantages Source: https://internetofthingsagenda.techtarget.com/definition/MQTT-MQ-Telemetry-Transport  MQTT has slower transmit cycles compared to Constrained Application Protocol (CoAP).  MQTT's resource discovery works on flexible topic subscription, whereas CoAP uses a stable resource discovery system.  MQTT is unencrypted. Instead, it uses TLS/SSL (Transport Layer Security/Secure Sockets Layer) for security encryption.  It is difficult to create a globally scalable MQTT network.  Other MQTT challenges relate to security, interoperability and authentication.
  • 124. Friday, May 13, 2022 Application and Use Cases Source: https://internetofthingsagenda.techtarget.com/definition/MQTT-MQ-Telemetry-Transport Due to its lightweight properties MQTT works well for applications involving remote monitoring, including the following: synchronization of sensors, such as fire detectors or motion sensors for theft detection, to determine if a hazard is valid; monitoring health parameters using sensors for patients leaving a hospital; and sensors alerting people of danger.
  • 125. Friday, May 13, 2022 AMQP Protocol AMQP- Advanced Message Queuing Protocol Open Begin Attach Transfer Flow Disposition Detach End Close Producer Consumer Broker publish Q1 Q2 Q3 E E-Exchange- Direct, fanout , Topic, header Binding Routing key =a Binding key=b a a b The basic unit of data in AMQP is a frame.
  • 126. Friday, May 13, 2022 Advantages/benefits of AMQP  It uses QoS and hence ensures safe passage of important data.  AMQP uses already established publish/subscribe architecture for data sharing as used by MQTT protocol.  It ensures interoperability as it uses wire level protocol which sends data as stream of bytes.  It offers simpler peer to peer communication along with intermediaries.  The protocol has space to evolve to work with different standards.  It offers secured connection to users using SSL protocol like CoAP, MQTT, HTTP and XMPP.
  • 127. Friday, May 13, 2022 Disadvantages/Drawbacks of AMQP  It is not backward compatible with old versions.  It is not as simple as HTTP 1.0 or HTTP 1.1 or any other wire protocols.  It requires higher bandwidth unlike MQTT/CoAP/XMPP.  Resource discovery is not supported unlike CoAP/HTTP/XMPP.
  • 128. Friday, May 13, 2022 Applications The Advanced Message Queuing Protocol (AMQP) is an open standard for passing business messages between applications or organizations. It connects systems, feeds business processes with the information they need and reliably transmits onward the instructions that achieve their goals. Key Capabilities AMQP connects across: •Organizations – applications in different organizations •Technologies – applications on different platforms •Time – systems don’t need to be available simultaneously •Space – reliably operate at a distance, or over poor networks Source: https://www.amqp.org/about/what
  • 129. Friday, May 13, 2022 CoAP Protocol - Constraint Application Protocol Source: https://www.amqp.org/about/what  It is an IoT protocol  It is designed to allow single and small devices to join the IoT through low bandwidth restricted networks  It is designed for M2M and IoT applications such as smart energy and building automation  It follows Request-Response pattern model  It runs over UDP protocol  It also uses RESTFUL Architecture  It uses less resources then HTTP  In CoAP, client can use GET, PUT, DELETE methods during request  It uses small and simple 4 byte header.  PROXY and caching capabilities
  • 130. Friday, May 13, 2022 CoAP Layers Source: https://dzone.com/articles/coap-protocol-step-by-step-guide Upper Layer(Request and Response) :It concerns communication method and deal with request/ response method Lower Layer: to deal with UDP and asynchronous messages. CoAP supports four different message types: •Confirmable •Non-confirmable •Acknowledgment •Reset Client Server CON (ID:0XAA51) ACK (ID:0XAA51) Or RST Client Server NON (ID:0XAA51)
  • 131. Friday, May 13, 2022 CoAp Request/Response Model https://dzone.com/articles/coap-protocol-step-by-step-guide Client Server CON (ID:OXAA51) GET/PRESSURE Token 0x14 ACK (ID:OXAA51) 1000 hPa Token 0x14 Client Server CON (ID:OXAA51) GET/PRESSURE Token 0x14 ACK (ID:OXAA51) ACK (ID:OXAA52) 1000 hPa Token 0x14 ACK (ID:OXAA52)
  • 132. Friday, May 13, 2022 CoAP Message Format Source: https://www.researchgate.net/figure/Format-of-a-CoAP-message-header_fig6_272641092
  • 133. Friday, May 13, 2022 Difference MQTT/CoAP Source: https://www.tutori alspoint.com/differ ence-between- coap-and-mqtt- protocols
  • 134. Friday, May 13, 2022 Disadvantages/Drawbacks of CoAP  It is simple protocol and uses less overhead due to operation over UDP. It allows short wake up times and long sleepy states. This helps in achieving long battery life for use in IoT (Internet of Things) and M2M (Machine to Machine) communication.  It uses IPSEC or DTLS to provide secure communication.  Synchronous communication is not necessity in CoAP protocol.  It has lower latency compare to HTTP.  It consumes less power than HTTP.  It uses ACK message and hence it becomes reliable like HTTP. Moreover it avoids unnecessary retransmissions.  CoAP protocol is used as best protocol choice for home communication networks. It is used in information appliances, communication equipment's and control equipment's in smart home networks.
  • 135. Friday, May 13, 2022 Advantages/Benefits of CoAP  It is simple protocol and uses less overhead due to operation over UDP. It allows short wake up times and long sleepy states. This helps in achieving long battery life for use in IoT (Internet of Things) and M2M (Machine to Machine) communication.  It uses IPSEC or DTLS to provide secure communication.  Synchronous communication is not necessity in CoAP protocol.  It has lower latency compare to HTTP.  It consumes less power than HTTP.  It uses ACK message and hence it becomes reliable like HTTP. Moreover it avoids unnecessary retransmissions.  CoAP protocol is used as best protocol choice for home communication networks. It is used in information appliances, communication equipment's and control equipment's in smart home networks.
  • 136. Friday, May 13, 2022 Disadvantages/Drawbacks of CoAP  CoAP is unreliable protocol due to use of UDP. Hence CoAP messages reach unordered or will get lost when they arrive at destination. To make CoAP as reliable protocol, stop and wait with exponential backoff retransmission feature is incorporated in it. Duplicate detection is also introduced.  It acknowledges each receipt of the message and hence increases processing time. Moreover it does not verify whether the received message has been decoded properly or not.  It is unencrypted protocol like MQTT and uses DTLS to provide security at the cost of implementation overhead.  CoAP has communication issues for devices behind NAT (Network Address Translation).
  • 137. Friday, May 13, 2022 HTTP Protocol  HTTP stands for HyperText Transfer Protocol. It is invented by Tim Berner.  HyperText is the type of text which is specially coded with the help of some standard coding language called as HyperText Markup Language (HTML).  HTTP/2 is latest version of HTTP, which was published on May 2015.  HTTP provides standard between a web browser and web server to establish communication.  It is set of rules for transferring data from one computer to another. Data such as text, images, and other multimedia files are shared on the World Wide Web. Features  HTTP is simple  HTTP is stateless  HTTP is extensible  HTTP is connectionless  Components CLIENT PROXY PROXY SERVER
  • 138. Friday, May 13, 2022 HTTP Working Steps: Step 1: Direct browser to URL Step 2: Browser looks up IP Step 3: Browser sends HTTP request Step 4: Host sends back HTTP response Step 5: The browser renders the response
  • 139. Friday, May 13, 2022 HTTP Working
  • 140. Friday, May 13, 2022 HTTPAdvantages There is no runtime support required to run properly. As it is connectionless so there is no overhead in order to create and maintain the state and information of the session. HTTP is usable over the firewalls and global application is possible. HTTP is platform-independent. HTTP reports the errors without closing the TCP connection. Offers Reduced Network congestions.
  • 141. Friday, May 13, 2022 HTTP Disadvantages HTTP is not optimized for mobile. HTTP is too verbose. It can be only used for point-to-point connections. This protocol does not have push capabilities. This protocol does not offer reliable exchange without the retry logic.
  • 142. Friday, May 13, 2022 HTTP/MQTT Difference Parameter MQTT HTTP Abbreviation Message Queuing Telemetry Transport Hyper Text Transfer Protocol Architecture It works on publish/subscribe model. It works on request/response model. Complexity It has less complexity. It is more complex. Runs over It runs over Transmission Control Protocol. It runs over Transmission Control Protocol (TCP) and can also adapted to User Datagram Protocol. Protocol Design This protocol’s design is Data centric. This protocol’s design is Document centric. Message Size The message size generated is less as it uses binary format. The message size generated is more as it uses ASCII format. Header Size It is of 2 bytes. It is of 8 bytes. Port Number It works on 1883 port. It works on 80 or 8080 port. Data Security It provides data security with SSL/TLS. It does not provide security but Https is built for that.
  • 143. Friday, May 13, 2022 HTTP/AMQP Difference Parameter AMQP HTTP Full Form Advanced Message Queuing Protocol. Hyper Text Markup Protocol. Developed by It was developed by JPMorgan Chase. It was developed by Tim Berners-Lee. Communication Nature It has asynchronous communication nature. It has synchronous communication nature. Usage It is easy to setup and manage. It is user centric and it can be used in every aspect. Message Delivery It has guaranteed message delivery. It has no guarantee for message delivery. Interface It provides publish/subscribe interface. It provides point to point interface. Fault Tolerance AMQP protocol can bear the server broke issue on its own. HTTP protocol is not capable to react to the server breakdown issue. Segmentation It has the property of segmentation and can process messages into slots. It does not has this capability to treat each message as segments. Protocol Characteristics It is specific protocol used for specific purposes. It is general purpose protocol and is used for multiple purposes.
  • 144. Friday, May 13, 2022 HTTP/CoAP Difference Basis of COAP MQTT Abbreviation Constrained Application Protocol Message Query Telemetry Transport Communication Type It uses Request-Response model. It uses Publish-Subscribe model Messaging Mode This uses both Asynchronous and Synchronous. This uses only Asynchronous Transport layer protocol This mainly uses User Datagram protocol(UDP) This mainly uses Transmission Control protocol(TCP) Header size It has 4 bytes sized header It has 2 bytes sized header RESTful based Yes it uses REST principles No it does not uses REST principles Persistence support It does not has such support It supports and best used for live data communication Message Labelling It provides by adding labels to the messages. It has no such feature. Usability/Security It is used in Utility area networks and has secured mechanism. It is used in IoT applications and is secure
  • 145. Friday, May 13, 2022 WebSocket Protocol  It allows full-duplex communication over a single socket connection for sending messages between client and server. It starts from ws:// or wss://  It is based on single TCP and allows streams of messages to be sent back and forth between the client and the server while keeping the TCP connection open.  The client can be browser, a mobile application.  It is a stateful Protocol  No header overhead  Suitable for Real time applications  Standardised by IETF as RFC6455 Client REQUEST HANDSHAKE WebSocket GET ws://websocket.example.com/ HTTP/1.1 Origin: http://example.com Connection: Upgrade Host: websocket.example.com Upgrade: websocket
  • 146. Friday, May 13, 2022 Websocket Advantages It supports duplex communication. Using websockets, one can send and receive data immediately faster than HTTP. Cross origin communication (however this poses security risks). Cross platform compatibility (web, desktop, mobile) HTTP takes up to 2000 bytes of overhead where as websocket takes only 2 bytes. Replace long polling
  • 147. Friday, May 13, 2022 Websocket Disadvantages Web browser must be fully HTML5 compliant. Intermediary/Edge caching is not possible with websockets unlike HTTP. To build even simple protocol of your own, one can not be able to use friendly HTTP statuses, body etc. If application does not require a lot of dynamic interaction, HTTP is much simpler to implement.
  • 148. Friday, May 13, 2022 WebSocket Application Real Time Web application Gaming application (multiplayer) Multimedia Chats Social Feeds Collaborative editing/coding Location based apps Online education Sports updates
  • 149. Friday, May 13, 2022 HTTP/ WebSocket Comparison Basis of HTTP WebSocket's Definition HTTP is a communication protocol of the world wide web. Http works as a request- response protocol in the client-server computing model. It is the most common version of HTTP used in modern web browsers and servers. Web Socket is a standard protocol for two-way data transfer between client and server. The Web Socket protocol is built over TCP. Web sockets are mainly used to push messages to a client in real time updates. Technology Half Duplex Full Duplex Messaging Unidirectional and Stateless protocol Bi-Directional and Stateful Features −Moderate overhead to maintain and establish connection −HTTP creates a short connection at the client and closes it once response is received from server −Frequent requests deteriorate performance of HTTP −Http uses HTTP or https protocol for sending a request Moderate overhead to maintain and establish connection −Minimum overhead per message −Web socket keeps the connection open until state has died −Frequent requests are very well handled by Web socket −Web Socket uses WS protocol
  • 150. Friday, May 13, 2022 XMPP (Extensible Messaging and Presence Protocol)  It is used for real-time communication ad streaming XML data between network entities.  Wide range of application such as messaging, presence, data syndication, gaming, multi-party chat and voice/video calls.  It allows sending small chunks of XML data from one network entity to another in real time  It is a decentralised protocol and uses client-server architecture  It supports both client-to-server and server-to-server communication paths. Let’s divide into each character of word XMPP: •X : It means eXtensible. XMPP is a open source project which can be changed or extended according to the need. •M : XMPP is designed for sending messages in real time. It has very efficient push mechanism compared to other protocols. •P : It determines whether you are online/offline/busy. It indicates the state. •P : XMPP is a protocol, that is, a set of standards that allow systems to communicate with each other.
  • 151. Friday, May 13, 2022 XMPPArchitecture
  • 152. Friday, May 13, 2022 XMPP (Extensible Messaging and Presence Protocol) For example, I’m a whatsApp user and I’m identified by my mobile number, so
  • 153. Friday, May 13, 2022 Advantages of XMPP Firewall friendly Enables pushing data, not just pulling Strong authentication and security Provides many tools for solving a wide range of problems
  • 154. Friday, May 13, 2022 RFID  RFID-Radio Frequency Identification  RFID Tag  Components- Integrated Circuit, Antenna, Protective covering  Types: Active and Passive  RFID Reader  AIDC (Automatic Identification and Data collection) Microcontroller RF-Signal Generator Signal Detector
  • 155. Friday, May 13, 2022 RFID Challenges RFID is prone to two main issues: •Reader collision. Reader collision, when a signal from one RFID reader interferes with a second reader, can be prevented by using an anti-collision protocol to make RFID tags take turns transmitting to their appropriate reader. •Tag collision. Tag collision occurs when too many tags confuse an RFID reader by transmitting data at the same time. Choosing a reader that gathers tag info one at a time will prevent this issue. Source: https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification
  • 156. Friday, May 13, 2022 RFID Applications  inventory management  asset tracking and equipment tracking  inventory control  cargo and supply chain logistics  vehicle tracking  customer service and loss control  improved visibility and distribution in the supply chain  access control in security situations  Shipping  Healthcare  Manufacturing  retail sales  tap-and-go credit card payments
  • 157. Friday, May 13, 2022 RFID v/s Barcodes RFID tags Barcodes Can identify individual objects without direct line of sight. Direct line of sight required for scanning. Can scan items from inches to feet away, depending on type of tag and reader. Require closer proximity for scanning. Data can be updated in real time. Data is read-only and can't be changed. Require a power source. No power source needed. Read time is less than 100 milliseconds per tag. Read time is half a second or more per tag. Contain a sensor attached to an antenna, often contained in a plastic cover and more costly than barcodes. Printed on the outside of an object and more subject to wear. Source: https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification
  • 158. Friday, May 13, 2022 RFID v/s Barcodes Radio frequency ID Near-field communication Uni-directional Bi-directional Range up to 100 m Range less than 0.2 m LF/HF/UHF/Microwave 13.56 MHz Continuous sampling No continuous sampling Bit rate varies with frequency Up to 424 Kbps Power rate varies with frequency <15 milliamperes Source: https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification
  • 159. Friday, May 13, 2022 References Source: https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification 1. https://www.youtube.com/c/5MinutesEngineering 2. Bag, G.; Mukhtar, H.; Shams, S.M.; Kim, K.H.; Yoo, S.W. Inter-PAN Mobility Support for 6LoWPAN, ICCIT 2008, 2008, pp 787 – 792, 3. P. Sethi and S. R. Sarangi, “Internet of Things: Architectures, Protocols, and Applications,” J. Electr. Comput. Eng., vol. 2017, p. 9324035, 2017, doi: 10.1155/2017/9324035. 4. O. Vermesan, P. Friess, P. Guillemin et al., “Internet of thingsstrategic research roadmap,” in Internet of Things: Global Technological and Societal Trends, vol. 1, pp. 9–52, 2011. 5. I. Pe˜na-L´opez, Itu Internet Report 2005: The Internet of Things, 2005. 6. I. Mashal, O. Alsaryrah, T.-Y. Chung, C.-Z. Yang, W.-H. Kuo, andD. P.Agrawal, “Choices for interaction with things on Internet] and underlying issues,” Ad Hoc Networks, vol. 28, pp. 68– 90, 2015.

Notes de l'éditeur

  1. .TUNIOT, Smart things Adafruit.in Thingspeak ESP8266 TTGO ESPSMS ESP32 ESPNOW Keyword List 3 minute key point summary Submit 2-3 examination questions Index cards- What is the overall expression of the course on data, what is good about the course and any improvement. I would like the teacher do more…. I would like the faculty to less……
  2. Speed to text, audio processing, network communication. ENIAC (Electronic Numerical Integrator and Computer. )was the first programmable, electronic, general-purpose digital computer made in 1945.
  3. .
  4. Request and Response Model: Client send a request in the encoded format to the server. The request is process and categorised in server section. It will check what kind of data is required by the client then accordingly it fetch the data/ response from the database. Then prepare the response that will send to client receiver. Publisher Subscriber Model Publisher is the source of data that will go to the broker which will act as an intermediate and it collects the data.. Topic wise.IT stores all the subjects related to T1 (Topic 1). Suppose T1 is subscribed by the S3 that is known only to broker not to publisher. Publisher will only publish the data. T1 subscribed to S3…that will be given by broker only.
  5. Push-Pull Model: Queue Will act as buffer. From publisher side, the information is being pushed and from consumer side its being pulled. If there is no buffer , there was no control/flow of data. Rate of transfer of information is much high then consumer means transfer is more then the acceptance from the consumer then there will be mismatch of data so to avoid that we need buffer/queue. Exclusive Pair Model For communication between client and sever, we give an exclusive link. The link is full duplex and we can exchange information from both the side. If client doesn’t want to send any information/communicate till that time the link will be active. If it stops sending the data then it will be broken
  6. Not for smaller messages- hi, bye
  7. Applications:    Video streaming VoIP Video Conference E-Learning
  8. Zigbee in Healthcare - For example to monitor blood pressure, to monitor blood glucose level, bed sensor controller, weighing scale etc. Zigbee in smart energy - For example safe plug, smart socket, electricity consumption display, thermostats, energy manager etc. Zigbee in Home and building automation - For example remote control of various home and building related stuff. Zigbee for Closures - For example smart lock, Door sensor, occupancy sensor, etc. Zigbee for Home appliances - For example air conditioner, TV, digital water meter etc. Zigbee for telecom services - For example router/gateway etc.
  9. These fragments can take all different path to reach the destination. There will be out of order arrival of fragments to the receiver that is done through. Maximum fragment offset possible = (65535 – 20)  = 65515  {where 65535 is the maximum size of datagram and 20 is the minimum size of IP header}  Fragment offset. 2^13=65514+20= 2^16/2^13=8. We cannot add data (padding) into bits but can reduce it. So use 160 It will check no. of data bytes ahead of particular fragment and that will set to FO MF-More Fragment: Donot Fragment: BECAUSE SIZE OF DATAGRAM IS MORE THEN THE RECIEVER SIZE
  10. Record Route: To which route my packet will transfer. So I use option field to record the route for the packet. We will store the IP address of the packet.. 4B-40B. IP address can be stores in the option field instead of 10 just to put space into each Source Routing: trying to specify the route from source to destination. Record the sequence of the route in this field. Strict Routing- properly specify path to strictly follow to the source Loose Routing Padding- add dummy bits to the data
  11. between gateway
  12. The HTTP makes use of Client-server architecture. As we have already told you that the browser acts as the HTTP client and this client mainly communicates with the webserver that is hosting the website. The format of the request and the response message is similar. The Request Message mainly consists of a request line, a header, and a body sometimes. A Response message consists of the status line, a header, and sometimes a body. At the time when a client makes a request for some information (say client clicks on the hyperlink) to the webserver. The browser then sends a request message to the HTTP server for the requested objects. After that the following things happen: There is a connection that becomes open between the client and the webserver through the TCP. After that, the HTTP sends a request to the server that mainly collects the requested data. The response with the objects is sent back to the client by HTTP At last, HTTP closes the connection.