Students will be able to comprehend the ideas of the Internet of Things and will be able to develop basic IoT applications
Explain about the Internet of Things (IoT) and its need and
also how it functions.
2. Identify the reasons that contributed to the development of IoT technology.
3. Use Real IoT protocols for communication.
4. Challenges in IoT
5. Different areas of IoT applications
6. Develop basic IoT Applications
Introduction to IEEE STANDARDS and its different types.pptx
IOT System.pptx
1. Course Name: IoT System
Course Code: MC3253
Course Instructor : Dr Princy Randhawa
Friday, May 13, 2022 1
2. Friday, May 13, 2022 2
Course Syllabus
Introduction to M2M communication and IoT, An emerging industrial
structure for IoT, IoT system architecture, IoT reference model, IoT
deployment and operational view, IoT physical devices and endpoints,
Communication and networking protocols-MQTT and AMQP
protocols, IoT enabling technologies-RFID, WSN,SCADA etc.,
Analytics for the IoT, Applying the geospatial analytics to IoT data,
Real world design constraint, Technical design constraint, Future
internet design for various IoT use cases such as smart cities, smart
environments, smart homes, smart health etc.
3. Friday, May 13, 2022 3
Course Summary/ Objective
1. Explain about the Internet of Things (IoT) and its need and
also how it functions.
2. Identify the reasons that contributed to the development of IoT
technology.
3. Use Real IoT protocols for communication.
4. Challenges in IoT
5. Different areas of IoT applications
6. Develop basic IoT Applications
Students will be able to comprehend the ideas of the Internet of
Things and will be able to develop basic IoT applications
4. Friday, May 13, 2022 4
Course Outcome
CO.1 [MC3253.1] Understand the basic concepts of Internet of things
and its system architecture
CO.2[MC3253.2]Analyse the real protocols of IOT for communication
and its enabling technologies
CO.3 [MC3253.3] Design IoT applications in different areas and
analyse its performance
CO.4 [MC3253.4] Implement basic IoT applications using hardware
5. Friday, May 13, 2022 5
Books/References
Holler J., Tsiatsis V., Mulligan C., Karnouskos., Boyle D., From
Machine-to-Machine to the Internet of Things: Introduction to a New
Age of Intelligence (1e), Elsevier 2014.
Bahga A., Madisetti V., Internet of Things-A Hands on Approach (1e),
Orient Blackswan Private Limited, 2015.
Roderick O., Marko N., Sanchez D. and Aryasomajula A., Internet of
Things and Data Analytics Handbook (1e), Wiley-Blackwell, 2017.
Patil Y., Azure IoT Development Cookbook (1e), Packt publishing
Ltd, 2017
6. Friday, May 13, 2022 6
Learning Outcomes
Define the term "Internet of Things" (IoT)
Explain the technological advancements that have led to IoT
Explain the societal implications of IoT
7. Friday, May 13, 2022 7
Introduction
What is Internet of Things
Start with a device (‘ a thing’)- anything besides a
conventional computer
Add Computational Intelligence to improve the functioning of the device
Internet Connectivity
8. Friday, May 13, 2022 8
Generic Block Diagram of an IoT
Device
USB HOST
RJ45/Ethernet
NAND/NOR
DDR1..DDR3
CPU
GPU
HDMI
3.5 mm audio
RCA video
SD
MMC
UART
SDIO
SPI
I2C
CAN
Connectivity Processor
Graphics
Memory
Interfaces
Audio/Video
Interfaces
Storage
Interfaces
I/O
Interfaces
(for sensors,
actuators, etc.)
9. Friday, May 13, 2022 9
Traditional/Smart Watch
Needs Battery
Shows only time
Old Watch:500-600 Rs
Contains sensors
Can be charged with cable
Shows time
Calculates heart rate and blood pressure
Connects to the smart phone.
Facilitates life
Makes calls
New Watch: 4-5K
10. Friday, May 13, 2022 10
Exercise
1. Identify and analyse a device that is now an IoT device but was previously a
non-IoT device. Describe and list the device's features.
2. Contrast the device's previous functions with its current functions.
3. For your chosen Internet of Things device, list any enhancements or drawback,
if any, that it offers over the non-IoT device. Include a description of any
limitations that may be present in the new Internet-of-Things version of the
device.
4. Describe any privacy concerns with the IoT device that did not exist in the
device’s original version. Compare the original device's price to the price of the
new IoT version of the device.
11. Friday, May 13, 2022 11
How IoT works
Sensors/Devices Connectivity Data pre-
processing
User Interface
Collecting Data
Sending data to
Cloud
Delivering
Information to
User
Making Data
Useful
12. Friday, May 13, 2022 12
Introduction
Data: Raw and Unprocessed data
obtained from IoT devices
Information: Information is inferred
from data by filtering, processing,
categorising, condensing and
contextualization data
Knowledge: Knowledge is inferred
from information by organizing and
structuring information and is put
into action to achieve objectives
IoT Data Inferred into Information and Knowledge
13. Friday, May 13, 2022 13
Statistics
Source: https://financesonline.com/iot-trends/
14. Friday, May 13, 2022 14
Adoption of the IoT Trends
Cost of the hardware Device has decreased
ENIAC cost- $500,000
Laptop- $ 500-700
Smaller Size and weight
ENIAC 1945- 1800 square feet, 27 tons
Laptop- 0.05 square feet, under 2 kgs
Computational Ability
ENIAC 1945- instruction per second -> 5000
Laptop- instruction per second -> 18 billion
Internet Access
Internet available almost everywhere in the world
Wireless Access leads to cheap infrastructure
Data cost is low
Data Bandwidth is high
15. Friday, May 13, 2022 15
Societal Benefits of IoT
IoT makes life easier
What food do I need- IoT Refrigerator
Are my accounts balanced
Independence from people
IoT devices handle things you needed humans
Fewer doctor trips, no visit to supermarket
Link to the world
Information access
Global interaction between people are possible
16. Friday, May 13, 2022 16
Applications of IoT
Home
• Smart
Lighting
• Smart
Appliances
• Intrusion
Detection
• Smoke/Gas
Detectors
Cities
• Smart
Parking
• Smart Roads
• Structural
Health
Monitoring
• Emergency
Response
Environment
• Weather
Monitoring
• Air pollution
Monitoring
• Noise
Pollution
Monitoring
• Forest Fire
Detection
• Waste
Detection
Energy
• Smart Grids
• Renewable
Energy
Systems
• Prognostics
Retail
• Inventory
Management
• Smart
Payments
• Smart
Vending
Machines
17. Friday, May 13, 2022 17
Applications of IoT
Logistics
• Route
Generation
and
Scheduling
• Fleet Tracking
• Shipment
Monitoring
• Remote
Vehicle
Diagnostics
Agriculture
• Smart
Irrigation
• Green House
Control
Industry
• Machine
Diagnostics
and Prognosis
• Indoor Air
quality
Monitoring
Health &
Lifestyle
• Health and
Fitness
Monitoring
• Wearable
Electronics
18. Friday, May 13, 2022 18
Risks, Privacy and Security
Social Isolation
Dependence on technology and infrastructure
• IoT requires power and network
• Network outages and blackouts are more critical
IoT Devices are constantly observing.
• Location: Cell Phone
• Health: Health Monitor
• Media Watching habits: TV/media system
• Purchasing habits: Credit card, cell phone
• Driving Habits: Car incident recording
Data may be used to market to you
• Health problem? Drugs may be marketed to you
Purchasing an IoT Device may give the manufacturer permission to use or
sell the data
• Consumer Agreement contracts can be cryptic
19. Friday, May 13, 2022 19
Risks, Privacy and Security
Data may be used by insurance companies
• Were you speeding at the time of Accident?
• Do you have any undiagnosed health problem
Data may not be held in a secure way
• Cloud is attacked with your data inside
• Even encrypted data is decrypted in use
• Media Watching habits: TV/media system
• Purchasing habits: Credit card, cell phone
• Driving Habits: Car incident recording
21. Friday, May 13, 2022 21
Key Elements of IoT
Authentication
Access Control
Data Security
Non Repudiation
Availability
22. Friday, May 13, 2022 22
Future of IoT
Artificial Intelligence & IoT
VUI (Voice User Interface)
Miniaturization of Things
Power
Big Data & IoT
23. Friday, May 13, 2022 23
Exercise 2
An embedded system is a microprocessor- or microcontroller-based system of
hardware and software designed to perform dedicated functions within a larger
mechanical or electrical system. It is defined by simple interface.
1. Identify and compare two different systems available on the market. In each
system, list all of the devices that can be used as inputs or outputs.
2. Classify inputs & outputs based on their mode of interaction: Visual: data
carried by visible light; Audio: data carried by sound; Tactile: data carried by
touch: Electronic: data encoded in electrical signals
26. Friday, May 13, 2022 26
IoT Gateway
Key Functionalities
•Establishing communication bridge
•Provides additional security.
•Performs data aggregation.
•Pre processing and filtering of data.
•Provides local storage as a cache/ buffer.
•Data computing at edge level.
•Ability to manage entire device.
•Device diagnostics.
•Adding more functional capability.
•Verifying protocols.
Working of Gateway
• Receives data from sensor
network.
• Performs Pre processing,
filtering and cleaning on
unfiltered data.
• Transports into standard
protocols for communication.
• Sends data to cloud.
27. Friday, May 13, 2022 27
IoT Architecture
Three Layered and Five Layered Architecture
Perception Layer
Network Layer
Application Layer
Perception Layer
Transport Layer
Processing Layer
Application Layer
Business Layer
28. Friday, May 13, 2022 28
IoT Architecture
Seven Layered Architecture
Physical/ Thing (Devices, Sensors, Controllers, Actuators)
Connectivity/Data Link ( Communication & Processing)
Network (Send data to correct path)
Transport (Transmit the data using communication protocol)
Session (Maintains connections and responsible to control the port , Connection initiated,
managed and edited
Perception (Encryption/Decryption data to ensure that data is in usable format at
application layer)
Application ( Human Machine Interaction to access network application
29. Friday, May 13, 2022 29
IoT Architecture analogous to Human Body
Another architecture proposed by Ning and Wang
Nerves
Spinal Cord
Human Brain
Processing and Data
Center
Distributed network
Network Layer
30. Friday, May 13, 2022 30
IoT Technology/Working
Pallavi Sethi, Smruti R. Sarangi, "Internet of Things: Architectures, Protocols, and Applications", Journal of Electrical and Computer
Engineering, vol. 2017, Article ID 9324035, 25 pages, 2017. https://doi.org/10.1155/2017/9324035
31. Friday, May 13, 2022
Communication
Source: https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification
32. Friday, May 13, 2022 32
Characteristics of IoT
Unique Identity
Dynamic Nature
Self Adapting
Self Configuring
Heterogeneity
Integrated to Information Network
33. Friday, May 13, 2022 33
Introduction to M2M
Machine to Machine (M2M) refers to networking of machines (devices)
Purpose of remote monitoring and control and data exchange
Similar to SCADA (Supervisory control and Data acquisition)
New and Existing
Devices
IoT Gateways Network Carrier Backend System
36. Friday, May 13, 2022 36
M2M/IoT
Basics of IoT M2M
Abbreviation Internet of Things Machine to Machine
Intelligence Devices have objects that are responsible for
decision making
Some degree of intelligence is observed
in this
Connection type used The connection is via Network and using
various communication types.
The connection is a point to point
Communication protocol
used
Internet protocols are used such
as HTTP, FTP, and Telnet.
Traditional protocols and
communication technology techniques
are used
Data Sharing Data is shared between other applications that
are used to improve the end-user experience.
Data is shared with only the
communicating parties.
Internet Internet connection is required for
communication
Devices are not dependent on the
Internet.
Scope A large number of devices yet scope is large. Limited Scope for devices.
Business Type used Business 2 Business(B2B) and Business 2
Consumer(B2C)
Business 2 Business (B2B)
Open API support Supports Open API integrations. There is no support for Open API’s
37. Friday, May 13, 2022 37
M2M/IoT
Basics of IoT M2M
Machines Heterogenous Homogenous
Hardware vs Software
Emphasis
Devices have objects that are responsible for
decision making
Some degree of intelligence is observed
in this
Data collection and
Analysis
Cloud (public, private or hybrid cloud) On Premises storage infrastructure
Examples Smart wearables, Big Data and Cloud, etc. Sensors, Data and Information, etc.
38. Friday, May 13, 2022 38
M2M/IoT
802.3
UDP
Transport Layer
Network Layer
Link Layer
Application Layer
TCP UDP
Transport Layer
Network Layer
Link Layer
Application Layer
IPv4 IPv6 6LoWPAN
IPv4 IPv6 6LoWPAN
HTTP CoAP Web Sockets
MQTT XMPP DDS AMQP
HTTP CoAP Web Sockets
MQTT XMPP DDS AMQP
TCP
802.16
802.11 802.15.4
2G/3G/LTE
802.3 802.16
802.11 802.15.4
2G/3G/LTE
IOT
M2M
39. Friday, May 13, 2022 39
M2M Features
Low Power Communication
Time Controlled
Time Tolerant
Packed Switched
Online small data transmission
Monitoring
Location Specific Trigger
40. Friday, May 13, 2022 40
M2M Issues/Concerns
Addressing
M2M system should be flexible in supporting more
than one naming scheme
Security
M2M devices operate unmanned and unguarded by
humans and are subject to increased level of security
threats such as physical tampering, hacking,
unauthorised monitoring etc.
41. Friday, May 13, 2022 41
Physical Design of IoT
Things in
“IoT”
IoT
Communication
Protocols
42. Friday, May 13, 2022 42
Communication Models in IoT
Device-to-Device communication model
Source:))Tschofenig,)H.,)et.)al.,)Architectural)Considera/ons)in)Smart)Object)Networking.)Tech.)no.)RFC)7452.)Internet)Architecture)Board,)Mar.)2015.)We
b.) .)
Device-to-cloud communication model diagram
43. Friday, May 13, 2022 43
Communication Models in IoT
Source:))Tschofenig,)H.,)et.)al.,)Architectural)Considera/ons)in)Smart)Object)Networking.)Tech.)no.)RFC)7452.)Internet)Architecture)Board,)Mar.)2015.)We
b.) .)
Device-to-gateway communication model diagram.
44. Friday, May 13, 2022 44
Communication Models in IoT
Source:))Tschofenig,)H.,)et.)al.,)Architectural)Considera/ons)in)Smart)Object)Networking.)Tech.)no.)RFC)7452.)Internet)Architecture)Board,)Mar.)2015.)We
b.) .)
Back-end data sharing model diagram
45. Friday, May 13, 2022 45
IoT Communication Models
Request & Response Publisher-Subscriber Model
Client
Client
Receives
Response
Server
Request
Process Database
Fetch
Response
PUBLISHER
BROKER
T2
T1
T3
SUBSCRIBER
S1
S2
S3
S4
S5
46. Friday, May 13, 2022 46
IoT Communication Models
Push-Pull Model Exclusive Pair Model
CLIENT
SERVER
PUBLISHER
CONSUMER
Queue
Push Pull
Push Pull
Full Duplex and
Bidirectional
Communication
47. Friday, May 13, 2022 47
IoT || NodeMCU || ESP8266
Introduction to IoT and Getting started
with NodeMCU/ESP8266.
48. Friday, May 13, 2022 48
Link Layer Protocols
It determines how the data is sent physically over the
network physical layer or medium (Co-axial or Radio
wave)
Local network connect to which host is attached
Host on the same link exchange data packets over the
link layer using link layer protocols.
Link Layer determines how the packets are coded and
signalled by the hardware device over the medium to
which the host is attached.
49. Friday, May 13, 2022 49
802.3 Ethernet
Data rate are provided from 10Gbit/s to 40 Gbit/s and higher
It is primarily used in LAN, MANs and even WANs
Sensor units installed within a building automation system can use
wired technologies
S.
No.
Standard Shared Medium
1 802.3 Co-axial Cable 10BASE5
2 802.3i Copper Twisted Pair 10BASE-
T
3 802.3j Fiber Optic 10BASE-F
4 802.3ae Fiber 10Gbits/s
50. Friday, May 13, 2022 50
802.3 Ethernet
Works on Bus Topology
Access Control Method- CSMA/CD- Carrier Sensing
Multiple Access/Collision Detection
No Acknowledgement
Encoding Technique- Manchester
Data Rate
Tp (T t > =2 *Tp)
IEEE 802.3 Frame Format
Preamble
SOF
Destination
Address
Source
Address
Data+ Padding
CRC
7
Bytes
1
Byte
6
Bytes
6
Bytes
Minimum: 46 Bytes
Maximum :1500 Bytes
4
Bytes
51. Friday, May 13, 2022 51
Limitations
Not for Real Time Application
Delay can be introduced because of collisions leads to disastrous
effects
Not for Interactive Applications
Min 46 bytes need to be delivered
52. Friday, May 13, 2022 52
802.11 WiFi (Wireless-Fidelity)
Primary challenge is to mediate access to a shared communication medium-in this
case, signals propagating through space.
Wireless Router
Router
Ethernet Switch
Access Point
ISP
Office/inter
net
wireless
wired
wired
54. Friday, May 13, 2022 54
802.11 WiFi (Wireless-Fidelity)
Collection of Wireless LAN
Data rates from 1Mb/s to 6.75 Gb/s
Wi-Fi provides communication range in the order of 20m (indoor) to 100m
(outdoor)
Access Method- CSMA/CA
Modes – Infrastructure, Adhoc and WIFI direct
S.
No.
Standard Operates Data Rate
1 802.11a 5 GHz Band 54 Mbps
2 802.11b and
802.11g
2.4 GHz Band 11 Mbps
54 Mbps
3 802.11n 2.4/5 GHz Bands 450 Mbps
4 802.11ac 5 GHz Band 866.7 Mbps
5 802.11ax 2.4/5 GHz Bands 2.4 Gbps
55. DISTRIBUTION SYSTEM (DS)
Friday, May 13, 2022 55
802.11 WiFi Architecture
STA1 STA3
STA2 STA4 STA5
STA6
STA7 STA8
AP 1 AP 2 AP 3
Basic Service Set (BSS)
AP-ACCESS POINT
BSS 1 BSS 2 BSS 3
It is suitable for an ad-hoc configuration of nodes that may or may not be able to
communicate with other nodes
Nodes are free to move around
The set of directly reachable nodes may change over time
56. Friday, May 13, 2022 56
Services in 802.11
Services
Station Distribution System
Authentication Deauthentication Privacy Mac
Service
Data unit
Association Re-association
De-association
Open Shared Key Distribution
Integration
57. Friday, May 13, 2022 57
Frame Format (802.11)
Frame
Control
Duration
Address
1
Address
2
Address
3
Sequence
0-2312 Bytes
Check
Sequence
2
Bytes
2
Bytes
6
Bytes
6
Bytes
6
Bytes
2
Bytes
Data
4
Bytes
IEEE 802.11 Frame Format
58. Friday, May 13, 2022 58
802.16 –WiMAX Protocol
WiMAX- Worldwide interoperability for Microwave
Access
Collection of Wireless Broadband Standards
Data rates from 1.5 Mb/s to 1 Gbit/s
Mobile Stations- 100 Mbit/s, Fixed Stations- 1 Gbit/s
Wi-Fi provides communication range in the order of 20m
(indoor) to 100m (outdoor)
59. Friday, May 13, 2022 59
802.16 –Architecture
Air Interface
Base station Mobile Station
(Movable)
Subscriber Station
(Stationary)
Backbone Network connected
to Internet
Physical Layer
MAC Layer
Convergence Layer
60. WIFI/WIMAX Comparison
Friday, May 13, 2022 60
Feature WiMax
(802.16a)
Wi-Fi
(802.11b)
Wi-Fi
(802.11a/g)
Primary
Application
Broadband Wireless
Access
Wireless LAN Wireless LAN
Frequency Band Licensed/Unlicensed
2 G to 11 GHz
2.4 GHz ISM 2.4 GHz ISM (g)
5 GHz U-NII (a)
Channel
Bandwidth
Adjustable
1.25 M to 20 MHz
25 MHz 20 MHz
Half/Full Duplex Full Half Half
Radio Technology OFDM
(256-channels)
Direct Sequence
Spread Spectrum
OFDM
(64-channels)
Bandwidth
Efficiency
<=5 bps/Hz <=0.44 bps/Hz <=2.7 bps/Hz
Modulation BPSK, QPSK,
16-, 64-, 256-QAM
QPSK BPSK, QPSK,
16-, 64-QAM
Mobility Mobile WiMax
(802.16e)
In development In development
Mesh Yes Vendor
Proprietary
Vendor Proprietary
Access Protocol Request/Grant CSMA/CA CSMA/CA
61. Friday, May 13, 2022 61
802.15.4 –LR-WPAN
Collection of Standards for low rate wireless personal
area network (LR-WPAN)
High Level Protocols such as Zigbee
Data rates from 40 Kb/s to 250 Kb/s
Low cost and Low speed communication for power
constrained devices
IEEE 802.15. Protocol Stacks include –
•ZigBee
•6LoWPAN
•ISA100.11a
•Wireless HART
•Thread
62. Friday, May 13, 2022 62
Zigbee
Data Link (MAC) Layer
Network Layer
Physical Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
IEEE 802.15.4
ZIGBEE Protocol
ACE (Additional Communication
Enhancement)
ZNL uses Ad Hoc On Demand Distance Vector
Routing
63. Friday, May 13, 2022 63
Zigbee protocol
TOPOLOGY
Star
Cluster Tree
Mesh
C
R
E E
E
E
C
R R
R
R
E
E
E
E
E
E
E
E
E
E
E
E
R R
R
R
R
R
C
E
E
E
E
E
E
64. Friday, May 13, 2022 64
Advantages/Disadvantages
Advantages
•Cheap cost
•Long battery life,
•Quick installation
•Simple
•Extensible protocol stack
Disadvantages
•IEEE 802.15.4 causes interference and
multipath fading.
•doesn’t employ a frequency-hopping
approach.
•unbounded latency
•interference susceptibility
•Wireless sensor networks in the industry
•Building and home automation
•Remote controllers and interacting toys
•Automotive networks
Applications
65. Friday, May 13, 2022 65
2G/3G/LTE-Cellular Protocol
Mobile Generation Standards ( 2G including GSM and CDMA)
Third Generation (3G including UMTS and CDMA2000)
Fourth Generation (4G-LTE)
Data Rates- 9.6 Kb/s (for 2G) to up-to 100 Mb/s (for 4G)
66. Friday, May 13, 2022 66
CDMA/GSM
CDMA GSM
It stands for Code Division Multiple Access. It stands for Global System for Mobile Communication.
It uses a CDMA mechanism for data & call transmission. It uses TDMA and FDMA mechanism for data & voice
transmission.
The transmission rate is fast compared to GSM. The transmission rate is slow compared to CDMA.
It uses EVDO data transfer technology. It uses EDGE data transfer technology.
It is handset specific and does not require any SIM for
communication.
It is SIM specific, hence requires a SIM card for
communication.
During transmission, it is much prone to radiation emission. During transmission, it is comparatively less prone to
radiation emission.
It offers more secure communication compared to GSM. It offers less secure communication compared to CDAM.
The signal detection is difficult in CDMA. The signal detection is easy in GSM.
It provides built-in encryption. It requires additional encryption as no built-in encryption is
available.
It enables limited roaming. It enables worldwide roaming.
67. Friday, May 13, 2022 67
2G-Cellular Protocol
GSM- Only for Voice
Source: https://www.connectivity.technology/2019/08/high-level-architecture-introduction-of.html
MSC-Mobile Switching Centre
BSS-Base Station Subsystem
BSC-Base Station Controller
BTS-Base Transceiver Station
MS-Mobile Station
68. Friday, May 13, 2022 68
2.5G-GPRS Enhancement
Source: https://www.connectivity.technology/2019/08/high-level-architecture-introduction-of.html
GPRS-General Packet Radio Service
SGSN-Serving GPRS Support Node
GGSN-Gateway GPRS Support Node
69. Friday, May 13, 2022 69
3G-UMTS Network Architecture
Source: https://www.connectivity.technology/2019/08/high-level-architecture-introduction-of.html
UMTS-Universal Mobile
Telecommunications Service
RNC-Radio Network Controller
RNS-Radio Network Subsystem
UE-User Equipment
72. Friday, May 13, 2022 72
Network Layer
Responsible for sending of IP datagrams from source to
destination network
Functions
Host to Host Connectivity
Switching
Routing
Fragmentation
Logical Addressing
Host Identification is done using hierarchical IP addressing
schemes such as IPv4 and IPv6
73. Friday, May 13, 2022 73
IPv4 (Internet Protocol)
It is used to identify the devices on a network using a
hierarchical addressing scheme
It uses 32 bit addressing scheme= 232 Or 4,294,967,296 addresses
IP protocols establish connections on packet network but do not
guarantee delivery of packets
Guaranteed Delivery of packets are handled by the upper layer
protocols
00001001010000110110000100000010 32-bit address
00001001 01000011 01100001 00000010 4 octets
9 67 97 2 dotted decimal notation (9.67.97.2)
74. Friday, May 13, 2022 74
IPv4 Header Format
Version (4)
Identification (16) MF
TTL (8) Protocol (8) Header Check Sum (16)
Source IP (32)
Destination IP (32)
Option ( 0 to 40 Bytes)
Data
0 DF FO (13)
TTL (16)
HLEN(4) TOS (8) 4B
4B
4B
4B
4B
Header Size- 20B-60B
75. Friday, May 13, 2022 75
Fragmentation
Sender Receiver
Router
Maximum Transmission Unit
(MTU) =520B
Maximum Transmission Unit
(MTU)=200B
180 20
180 20
140 20
500 20
F2 F1 F0
Identification
Fragment Offset (FO)
10 10 10
0
180/8
==22.5
352/8
176 20
148 20 176 20
360/8
176/8
More Fragment(MF) 1
1
0
Do not Fragment (DF)
1
78. Friday, May 13, 2022 78
Optional Field (0-40 Byte)
Record Route
Source Routing
Padding
79. Friday, May 13, 2022 79
IPv6 Protocol
Newest Version of Internet Protocol
It uses 128-bit address = 2128
or 3.4 * 1038
IPv6 use Colon-Hex- representation
E.g. 2031:0000:130F:0000:0000:09C0:876A:130B
In IPv6 representation, addressing methods :
•Unicast
•Multicast
•Anycast
80. Friday, May 13, 2022 80
IPv6 Header
Version (4) Priority/Traffic
(8)
Flow label (20)
Payload
Length (16)
Next Header
(8)
Hop Limit
(8)
Source Address (128)
Destination Address (128)
Extension Header
Base Header-40 Bytes (320 bits) Fixed
Extension Headers and its code:
Base Header
Routing Headers (43)
Hop by Hop Option (0)
Fragment Header (44)
Authentication Header (51)
Destination Option (60)
Encapsulating Security Payload
(50)
Source: https://www.geeksforgeeks.org/internet-protocol-version-6-ipv6-header/?ref=rp
Base Header (40B) Extension Header
1
Extension Header 2
81. Friday, May 13, 2022 81
Priority/Traffic Field
Priority assignment of Congestion controlled traffic :
Priority Meaning
0 No specific Traffics
1 Background data
2 Unattended data traffic
3 Reserved
4 Attended bulk data traffic
5 Reserved
6 Interactive Traffic
7 Control Traffic
82. Friday, May 13, 2022 82
IPv4/IPv6 (Comparison)
Feature IPv4 IPv6
Address Size 32 128
Address Format Dotted Decimal Notation
192.168.14.1
Hexadecimal Notation
3FFE:F200:0234:AB00
0123:4567:8901:ABCD
Checksum Field is available in header Not Available in header
Packet Size 576 bytes 1280 bytes
IP Sec Support Optional Required
No. of Header Field 12 8
Length of Header Field 20 40
Communication Both Multicast and Broadcast No Broadcast but uses
different types of multicast
Security Less More as compared to IPv4
Optional Field Available Not Available
83. Friday, May 13, 2022 83
IP/MAC address (Comparison)
S.NO MAC Address IPAddress
1. MAC Address stands for Media Access Control Address. IP Address stands for Internet Protocol Address.
2. MAC Address is a six byte hexadecimal address.
IP Address is either a four-byte (IPv4) or a sixteen-byte
(IPv6) address.
3.
A device attached with MAC Address can retrieve by ARP
protocol.
A device attached with IP Address can retrieve by RARP
protocol.
4. NIC Card’s Manufacturer provides the MAC Address. Internet Service Provider provides IP Address.
5.
MAC Address is used to ensure the physical address of a
computer.
IP Address is the logical address of the computer.
6. MAC Address operates in the data link layer. IP Address operates in the network layer.
7. MAC Address helps in simply identifying the device.
IP Address identifies the connection of the device on the
network.
8.
MAC Address of computer cannot be changed with time and
environment.
IP Address modifies with the time and environment.
9. MAC Addresses can’t be found easily by a third party. IP Addresses can be found by a third party.
10.
It is a 48-bit address that contains 6 groups of 2 hexadecimal
digits, separated by either hyphens (-) or colons(.).
Example:
00:FF:FF:AB:BB:AA or
00-FF-FF-AB-BB-AA
IPv4 uses 32-bit addresses in dotted notations, whereas IPv6
uses 128-bit addresses in hexadecimal notations.
Example:
IPv4 192.168.1.1
IPv6 FFFF:F200:3204:0B00
84. Friday, May 13, 2022 84
6LoWPAN (Low power Wireless
Personal Area Network)
6LoWPAN brings IP protocol to the low-power devices which have
limited processing capability.
6LoWPAN is an open standard defined by the Internet Engineering
Task Force, IETF
It operates in the 2.4 GHz frequency range
Data transfer rate-250 Kb/s
It works with the 802.14 link layer protocol and defines
compression mechanisms for IPv6 datagrams over IEEE 802.15.4-
based networks.
85. Friday, May 13, 2022 85
Features
Support 64 bit and 16 bit addressing
Designed for Low power and Lossy IoT networks
Useful with low power link layers
Unicast, Multicast, broadcast support
Support IP routing
Allows direction connection between
Supplementary adaptation layer included
86. Friday, May 13, 2022 86
6LoWPAN Protocol Stack
Layers
Application
Transport
Network
Data Link
Physical
6LoWPAN Protocol
Stack
COAP, MQTT
UDP, ICMP, DTLS
IPv6 With LoWPAN
IEEE 802.15.4 MAC
IEEE 802.15.4 PHY
TCP/IP Protocol
Stack
HTTP, FTP, DNS, SMTP
TCP, UDP,ICMP
IP
Ethernet, PPP
Ethernet
87. Friday, May 13, 2022 87
Architecture
Source:
https://zolertia.io/6low
pan-iot-protocol/
88. Friday, May 13, 2022 88
Architecture
Source: https://zolertia.io/6lowpan-iot-protocol/
89. Friday, May 13, 2022 89
Protocol Stack of 6LoWPAN
Source: https://radiocrafts.com/technologies/6lowpan/
Layers
90. Friday, May 13, 2022 90
Need of Adaptation Layer
Usage of IPv6 in transmission of packets over LoWPAN
(IEEE standard 802.15.4) is not possible due to large
header size.
Hence an adaptation layer is proposed by IETF to make
IPv6 and IEEE802.15.4 compatible with each other.
This layer is placed between data link layer and network
layer in 6LoWPAN protocol stack.
Main functions of this layer:
Header Compression and decompression
Fragmentation and Reassembling of packets
Routing
91. Friday, May 13, 2022 91
6LoWPAN Security
Use AES-128 Link layer security which is
defined in IEEE802.15.4
It provides link authentication and encryption.
For more security transport layer UDP based
DTLS (datagram transport layer security)
protocol is used.
92. Friday, May 13, 2022 92
6LoWPAN Advantages
Support robust , self healing and scalable mesh networking.
Works efficiently with open IP standardized including UDP ,
TCP , COAP , HTTP , MQTT and web sockets.
In this network leaf nodes can be in sleep mode for a long
duration of time.
It also offers one to many and many to one routing.
It offers end to end IP addressable devices which don’t require
any gateway , only a router which can connect this network to
IP.
It is a standard: RFC6282.
93. Friday, May 13, 2022 93
6LoWPAN Disadvantages
It is less secure than Zigbee.
It has less immunity to interference than Wifi
or Bluetooth devices.
It supports short range without mesh topology.
94. Friday, May 13, 2022 94
6LoWPAN Disadvantages
It is less secure than Zigbee.
It has less immunity to interference than Wifi
or Bluetooth devices.
It supports short range without mesh topology.
95. Friday, May 13, 2022 95
6LoWPAN Applications
•SMART HOME: Connecting devices using IPv6 has the chance to gain distinct
advantages over other IoT systems. The Thread Initiative standardizes the protocol
running over 6LoWPAN to enable home automation. Also, Open Thread gives
developers a smooth introduction to Thread for the start to developing smart home
solutions.
•SMART AGRICULTURE: Enabling all kind of sensors used in agriculture and
farming by connecting devices that are far away from each other in remote
areas. There are endless possibilities that this protocol provides when it comes to
building mesh networks for this type of application.
•INDUSTRIAL IOT: The perfect asset for automated factories and industrial
plants is 6LoWPAN. Automation can enable major savings for the industry and
6LoWPAN has the ability to connect to the cloud. This opens up many different
areas for data monitoring, analysis and predictive maintenance.
96. Friday, May 13, 2022 96
Transport Layer
It is an end-to-end layer used to deliver messages to a host.
Flow Control (SR)
Error Control (Check Sum)
Multiplexing and Demultiplexing
Acknowledgement
•Transmission Control Protocol
•It provides reliable communication between two hosts.
•User Datagram Protocol
•It provides unreliable communication between two hosts.
97. Friday, May 13, 2022 97
Transmission Control Protocol
(TCP)
TCP is reliable protocol i.e., the receiver always sends either positive or
negative acknowledgement about the data packet to the sender, so that the
sender always has bright clue about whether the data packet is reached the
destination or it needs to resend it.
TCP ensures that the data reaches intended destination in the same order it
was sent.
TCP is connection oriented. TCP requires that connection between two
remote points be established before sending actual data.
TCP provides error-checking and recovery mechanism.
TCP provides end-to-end communication.
TCP provides flow control and quality of service.
TCP operates in Client/Server point-to-point mode.
TCP provides full duplex server, i.e. it can perform roles of both receiver
and sender.
101. Friday, May 13, 2022 101
TCP Connection Establishment
Steps through the process of transmitting a packet with TCP/IP.
Step 1: Establish connection
Source:
https://www.khanacademy.org/computing/
computers-and-
internet/xcae6f4a7ff015e7d:the-
internet/xcae6f4a7ff015e7d:transporting-
packets/a/transmission-control-protocol--
tcp
102. Friday, May 13, 2022 102
TCP Data Transfer
Steps through the process of transmitting a packet with TCP/IP.
Step 2: Send packets of data
Source:
https://www.khanacademy.org/computing/
computers-and-
internet/xcae6f4a7ff015e7d:the-
internet/xcae6f4a7ff015e7d:transporting-
packets/a/transmission-control-protocol--
tcp
103. Friday, May 13, 2022 103
TCP Data Termination
Step 3: Close the connection
Detecting lost packets
Source:
https://www.khanacademy.org/computing/
computers-and-
internet/xcae6f4a7ff015e7d:the-
internet/xcae6f4a7ff015e7d:transporting-
packets/a/transmission-control-protocol--
tcp
104. Friday, May 13, 2022 104
TCPAdvantages
It is a reliable protocol
It provides an error-checking mechanism as well as one for
recovery
It gives flow control
It makes sure that the data reaches the proper destination in the
exact order that it was sent
Open Protocol, not owned by any organization or individual
It assigns an IP address to each computer on the network and a
domain name to each site thus making each device site to be
distinguishable over the network.
105. Friday, May 13, 2022 105
TCP Disadvantages
TCP is made for Wide Area Networks, thus its size can become an
issue for small networks with low resources
TCP runs several layers so it can slow down the speed of the
network
It is not generic in nature. Meaning, it cannot represent any
protocol stack other than the TCP/IP suite. E.g., it cannot work
with a Bluetooth connection.
No modifications since their development around 30 years ago.
106. Friday, May 13, 2022 106
User Datagram Protocol (UDP)
It is a lightweight data transport protocol that works on top of IP.
It is an unreliable and connectionless protocol. So, there is no need to establish a
connection prior to data transfer.
User Datagram Protocol (UDP) is more efficient in terms of both latency and
bandwidth.
It is used when acknowledgement of data does not hold any significance.
It is good protocol for data flowing in one direction.
It is simple and suitable for query based communications.
It is not connection oriented.
It does not provide congestion control mechanism.
It does not guarantee ordered delivery of data.
It is stateless.
It is suitable protocol for streaming applications such as VoIP, multimedia
streaming
107. Friday, May 13, 2022 107
UDP Header
Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
108. Friday, May 13, 2022 108
Applications of UDP
Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
Used for simple request-response communication when the size of data is less and
hence there is lesser concern about flow and error control.
It is a suitable protocol for multicasting as UDP supports packet switching.
UDP is used for some routing update protocols like RIP(Routing Information
Protocol).
Normally used for real-time applications which can not tolerate uneven delays
between sections of a received message.
UDP takes a datagram from Network Layer, attaches its header, and sends it to the
user. So, it works fast.
Actually, UDP is a null protocol if you remove the checksum field.
• Reduce the requirement of computer resources.
• When using the Multicast or Broadcast to transfer.
• The transmission of Real-time packets, mainly in multimedia applications.
109. Friday, May 13, 2022 109
Difference TCP/UDP
Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
Basis Transmission control protocol (TCP) User datagram protocol (UDP)
Type of Service TCP is a connection-oriented protocol. UDP is the Datagram-oriented protocol.
Reliability
TCP is reliable as it guarantees the delivery of data to
the destination router.
The delivery of data to the destination cannot be
guaranteed in UDP.
Error checking
mechanism
TCP provides extensive error-checking mechanisms
UDP has only the basic error checking mechanism using
checksums.
Acknowledgment An acknowledgment segment is present. No acknowledgment segment.
Sequence
Sequencing of data is a feature of Transmission Control
Protocol (TCP). this means that packets arrive in order
at the receiver.
There is no sequencing of data in UDP. If the order is
required, it has to be managed by the application layer.
Speed TCP is comparatively slower than UDP. UDP is faster, simpler, and more efficient than TCP.
Retransmission
Retransmission of lost packets is possible in TCP, but
not in UDP.
There is no retransmission of lost packets in the User
Datagram Protocol (UDP).
Header Length TCP has a (20-60) bytes variable length header. UDP has an 8 bytes fixed-length header.
Weight TCP is heavy-weight. UDP is lightweight.
Handshaking
Techniques
Uses handshakes such as SYN, ACK, SYN-ACK It’s a connectionless protocol i.e. No handshake
Broadcasting TCP doesn’t support Broadcasting. UDP supports Broadcasting.
Protocols TCP is used by HTTP, HTTPs, FTP, SMTP and Telnet.
UDP is used by DNS, DHCP, TFTP, SNMP, RIP, and
VoIP.
Stream Type The TCP connection is a byte stream. UDP connection is message stream.
Overhead Low but higher than UDP. Very low.
110. Friday, May 13, 2022 110
How all Layer Works
A R B
Host A
IA, MA
Router
IR, MR
Host B
IB, MB
PL
DLL
NL
TL
AL
PL
DLL
NL
PL
DLL
NL
TL
AL
m
m x y
m x y IA IB
m x y IA IB MA MR
m x y IA IB
m x y IA IB MR MB
ARP-Address Resolution protocol
N S I
n1,n2,n3 s1,s2,s3 a, b, c
Routing Table
n2
n1
n3
b
c
a
111. Friday, May 13, 2022 111
Application Layer
Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
Application Layer provides a facility by which users can forward several
emails and it also provides a storage facility.
This layer allows users to access, retrieve and manage files in a remote
computer.
It allows users to log on as a remote host.
This layer provides access to global information about various services.
This layer provides services which include: e-mail, transferring files,
distributing results to the user, directory services, network resources and so
on.
It provides protocols that allow software to send and receive information and
present meaningful data to users.
It handles issues such as network transparency, resource allocation and so on.
This layer serves as a window for users and application processes to access
network services.
Application Layer is basically not a function, but it performs application layer
functions.
112. Friday, May 13, 2022 112
Application Layer
Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
The application layer is actually an abstraction layer that specifies the shared
protocols and interface methods used by hosts in a communication network.
Application Layer helps us to identify communication partners, and
synchronizing communication.
This layer allows users to interact with other software applications.
In this layer, data is in visual form, which makes users truly understand data
rather than remembering or visualize the data in the binary format (0’s or 1’s).
This application layer basically interacts with Operating System (OS) and
thus further preserves the data in a suitable manner.
This layer also receives and preserves data from it’s previous layer, which is
Presentation Layer (which carries in itself the syntax and semantics of the
information transmitted).
The protocols which are used in this application layer depend upon what
information users wish to send or receive.
This application layer, in general, performs host initialization followed by
remote login to hosts.
113. Friday, May 13, 2022 113
Application Layer
Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
Two remote application processes can communicate
mainly in two different fashions:
•Peer-to-peer: Both remote processes are executing at
same level and they exchange data using some shared
resource.
•Client-Server: One remote process acts as a Client and
requests some resource from another application process
acting as Server.
114. Friday, May 13, 2022 114
Client-Service Model
Source: https://www.tutorialspoint.com/data_communication_computer_network/client_server_model.htm
Communication
Two processes in client-server model can interact in various ways:
•Sockets
•Remote Procedure Calls (RPC)
116. Friday, May 13, 2022 Single Level Wild card
MQTT Protocol
Source: https://www.geeksforgeeks.org/user-datagram-protocol-udp/
MQTT-Message Queuing Telemetry Transport Protocol
Publish-Subscribe
Introduced by IBM in 1999
Components
Publisher
Subscriber
Broker
Methods
Connect
Disconnect
Publish
Subscribe
TS
Temperature Sensor Broker
20 Degree
C1
C2
C3
Clients
Subscribe
Subscribe
Subscribe
Publish
Home/hall/temperature
Home/+/temperature-Single Level Wild card
Home/# - Multi Level Wild card
117. Friday, May 13, 2022
MQTT Protocol Example
Source: https://www.concurrency.com/blog/june-2019/introduction-to-mqtt-protocol-for-iot-applications
118. Friday, May 13, 2022
MQTT Protocol
Source: https://www.concurrency.com/blog/june-2019/introduction-to-mqtt-protocol-for-iot-applications
119. Friday, May 13, 2022
Types of MQTT messages
Source:
https://internetofthingsagenda.
techtarget.com/definition/MQT
T-MQ-Telemetry-Transport
MQTT Message Description
An MQTT session is
divided into four stages:
Connection,
Authentication,
Communication and
Termination.
120. Friday, May 13, 2022
MQTT message Format
Source: https://www.rfwireless-world.com/Tutorials/MQTT-tutorial.html
121. Friday, May 13, 2022
MQTT Protocol Architecture Working
Operation
Source: https://www.rfwireless-world.com/Tutorials/MQTT-tutorial.html
122. Friday, May 13, 2022
Advantages
Source: https://internetofthingsagenda.techtarget.com/definition/MQTT-MQ-Telemetry-Transport
Efficient data transmission and quick to implement, due to its being a
lightweight protocol;
Low network usage, due to minimized data packets;
Efficient distribution of data;
Successful implementation of remote sensing and control;
Fast, efficient message delivery;
Uses small amounts of power, which is good for the connected devices; and
Optimizes network bandwidth.
The lightweight properties and minimum overhead of the MQTT protocol
architecture help ensure smooth data transfer with low bandwidth and reduce the
load on the CPU and RAM.
123. Friday, May 13, 2022
Disadvantages
Source: https://internetofthingsagenda.techtarget.com/definition/MQTT-MQ-Telemetry-Transport
MQTT has slower transmit cycles compared to Constrained Application
Protocol (CoAP).
MQTT's resource discovery works on flexible topic subscription, whereas
CoAP uses a stable resource discovery system.
MQTT is unencrypted. Instead, it uses TLS/SSL (Transport Layer
Security/Secure Sockets Layer) for security encryption.
It is difficult to create a globally scalable MQTT network.
Other MQTT challenges relate to security, interoperability and authentication.
124. Friday, May 13, 2022
Application and Use Cases
Source: https://internetofthingsagenda.techtarget.com/definition/MQTT-MQ-Telemetry-Transport
Due to its lightweight properties MQTT works well for
applications involving remote monitoring, including the
following:
synchronization of sensors, such as fire detectors or
motion sensors for theft detection, to determine if a
hazard is valid;
monitoring health parameters using sensors for
patients leaving a hospital; and
sensors alerting people of danger.
125. Friday, May 13, 2022
AMQP Protocol
AMQP- Advanced Message Queuing Protocol
Open
Begin
Attach
Transfer
Flow
Disposition
Detach
End
Close
Producer Consumer
Broker
publish Q1
Q2
Q3
E
E-Exchange- Direct, fanout , Topic, header
Binding
Routing key =a
Binding key=b
a
a
b
The basic unit of data in AMQP is a frame.
126. Friday, May 13, 2022
Advantages/benefits of AMQP
It uses QoS and hence ensures safe passage of important data.
AMQP uses already established publish/subscribe architecture
for data sharing as used by MQTT protocol.
It ensures interoperability as it uses wire level protocol which
sends data as stream of bytes.
It offers simpler peer to peer communication along with
intermediaries.
The protocol has space to evolve to work with different
standards.
It offers secured connection to users using SSL protocol like
CoAP, MQTT, HTTP and XMPP.
127. Friday, May 13, 2022
Disadvantages/Drawbacks of AMQP
It is not backward compatible with old versions.
It is not as simple as HTTP 1.0 or HTTP 1.1 or any other wire
protocols.
It requires higher bandwidth unlike MQTT/CoAP/XMPP.
Resource discovery is not supported unlike
CoAP/HTTP/XMPP.
128. Friday, May 13, 2022
Applications
The Advanced Message Queuing Protocol (AMQP) is an open standard for passing
business messages between applications or organizations. It connects systems,
feeds business processes with the information they need and reliably transmits
onward the instructions that achieve their goals.
Key Capabilities
AMQP connects across:
•Organizations – applications in different organizations
•Technologies – applications on different platforms
•Time – systems don’t need to be available simultaneously
•Space – reliably operate at a distance, or over poor networks
Source: https://www.amqp.org/about/what
129. Friday, May 13, 2022
CoAP Protocol - Constraint Application Protocol
Source: https://www.amqp.org/about/what
It is an IoT protocol
It is designed to allow single and small devices to join the IoT
through low bandwidth restricted networks
It is designed for M2M and IoT applications such as smart
energy and building automation
It follows Request-Response pattern model
It runs over UDP protocol
It also uses RESTFUL Architecture
It uses less resources then HTTP
In CoAP, client can use GET, PUT, DELETE methods during
request
It uses small and simple 4 byte header.
PROXY and caching capabilities
130. Friday, May 13, 2022
CoAP Layers
Source: https://dzone.com/articles/coap-protocol-step-by-step-guide
Upper Layer(Request and Response) :It
concerns communication method and deal
with request/ response method
Lower Layer: to deal with UDP and
asynchronous messages.
CoAP supports four different message types:
•Confirmable
•Non-confirmable
•Acknowledgment
•Reset
Client Server
CON (ID:0XAA51)
ACK (ID:0XAA51)
Or RST
Client Server
NON (ID:0XAA51)
131. Friday, May 13, 2022
CoAp Request/Response Model
https://dzone.com/articles/coap-protocol-step-by-step-guide
Client Server
CON (ID:OXAA51)
GET/PRESSURE
Token 0x14
ACK (ID:OXAA51)
1000 hPa
Token 0x14
Client Server
CON (ID:OXAA51)
GET/PRESSURE
Token 0x14
ACK (ID:OXAA51)
ACK (ID:OXAA52)
1000 hPa
Token 0x14
ACK (ID:OXAA52)
132. Friday, May 13, 2022
CoAP Message Format
Source: https://www.researchgate.net/figure/Format-of-a-CoAP-message-header_fig6_272641092
134. Friday, May 13, 2022
Disadvantages/Drawbacks of CoAP
It is simple protocol and uses less overhead due to operation over UDP. It allows
short wake up times and long sleepy states. This helps in achieving long battery
life for use in IoT (Internet of Things) and M2M (Machine to Machine)
communication.
It uses IPSEC or DTLS to provide secure communication.
Synchronous communication is not necessity in CoAP protocol.
It has lower latency compare to HTTP.
It consumes less power than HTTP.
It uses ACK message and hence it becomes reliable like HTTP. Moreover it avoids
unnecessary retransmissions.
CoAP protocol is used as best protocol choice for home communication networks.
It is used in information appliances, communication equipment's and control
equipment's in smart home networks.
135. Friday, May 13, 2022
Advantages/Benefits of CoAP
It is simple protocol and uses less overhead due to operation over UDP. It allows
short wake up times and long sleepy states. This helps in achieving long battery
life for use in IoT (Internet of Things) and M2M (Machine to Machine)
communication.
It uses IPSEC or DTLS to provide secure communication.
Synchronous communication is not necessity in CoAP protocol.
It has lower latency compare to HTTP.
It consumes less power than HTTP.
It uses ACK message and hence it becomes reliable like HTTP. Moreover it avoids
unnecessary retransmissions.
CoAP protocol is used as best protocol choice for home communication networks.
It is used in information appliances, communication equipment's and control
equipment's in smart home networks.
136. Friday, May 13, 2022
Disadvantages/Drawbacks of CoAP
CoAP is unreliable protocol due to use of UDP. Hence CoAP messages reach
unordered or will get lost when they arrive at destination. To make CoAP as
reliable protocol, stop and wait with exponential backoff retransmission feature is
incorporated in it. Duplicate detection is also introduced.
It acknowledges each receipt of the message and hence increases processing time.
Moreover it does not verify whether the received message has been decoded
properly or not.
It is unencrypted protocol like MQTT and uses DTLS to provide security at the
cost of implementation overhead.
CoAP has communication issues for devices behind NAT (Network Address
Translation).
137. Friday, May 13, 2022
HTTP Protocol
HTTP stands for HyperText Transfer Protocol. It is invented by Tim Berner.
HyperText is the type of text which is specially coded with the help of some standard
coding language called as HyperText Markup Language (HTML).
HTTP/2 is latest version of HTTP, which was published on May 2015.
HTTP provides standard between a web browser and web server to establish
communication.
It is set of rules for transferring data from one computer to another. Data such as text,
images, and other multimedia files are shared on the World Wide Web.
Features
HTTP is simple
HTTP is stateless
HTTP is extensible
HTTP is connectionless
Components
CLIENT PROXY PROXY SERVER
138. Friday, May 13, 2022
HTTP Working
Steps:
Step 1: Direct browser to URL
Step 2: Browser looks up IP
Step 3: Browser sends HTTP
request
Step 4: Host sends back HTTP
response
Step 5: The browser renders the
response
140. Friday, May 13, 2022
HTTPAdvantages
There is no runtime support required to run properly.
As it is connectionless so there is no overhead in order to
create and maintain the state and information of the session.
HTTP is usable over the firewalls and global application is
possible.
HTTP is platform-independent.
HTTP reports the errors without closing the TCP connection.
Offers Reduced Network congestions.
141. Friday, May 13, 2022
HTTP Disadvantages
HTTP is not optimized for mobile.
HTTP is too verbose.
It can be only used for point-to-point connections.
This protocol does not have push capabilities.
This protocol does not offer reliable exchange without the retry
logic.
142. Friday, May 13, 2022
HTTP/MQTT Difference
Parameter MQTT HTTP
Abbreviation Message Queuing Telemetry Transport Hyper Text Transfer Protocol
Architecture It works on publish/subscribe model. It works on request/response model.
Complexity It has less complexity. It is more complex.
Runs over
It runs over Transmission Control
Protocol.
It runs over Transmission Control Protocol
(TCP) and can also adapted to User
Datagram Protocol.
Protocol Design This protocol’s design is Data centric.
This protocol’s design is Document
centric.
Message Size
The message size generated is less as it
uses binary format.
The message size generated is more as it
uses ASCII format.
Header Size It is of 2 bytes. It is of 8 bytes.
Port Number It works on 1883 port. It works on 80 or 8080 port.
Data Security It provides data security with SSL/TLS.
It does not provide security but Https is
built for that.
143. Friday, May 13, 2022
HTTP/AMQP Difference
Parameter AMQP HTTP
Full Form Advanced Message Queuing Protocol. Hyper Text Markup Protocol.
Developed by It was developed by JPMorgan Chase. It was developed by Tim Berners-Lee.
Communication
Nature
It has asynchronous communication nature. It has synchronous communication nature.
Usage It is easy to setup and manage. It is user centric and it can be used in every aspect.
Message Delivery It has guaranteed message delivery. It has no guarantee for message delivery.
Interface It provides publish/subscribe interface. It provides point to point interface.
Fault Tolerance
AMQP protocol can bear the server broke issue
on its own.
HTTP protocol is not capable to react to the server
breakdown issue.
Segmentation
It has the property of segmentation and can
process messages into slots.
It does not has this capability to treat each message
as segments.
Protocol
Characteristics
It is specific protocol used for specific purposes.
It is general purpose protocol and is used for
multiple purposes.
144. Friday, May 13, 2022
HTTP/CoAP Difference
Basis of COAP MQTT
Abbreviation Constrained Application Protocol Message Query Telemetry Transport
Communication
Type
It uses Request-Response model. It uses Publish-Subscribe model
Messaging Mode This uses both Asynchronous and Synchronous. This uses only Asynchronous
Transport layer
protocol
This mainly uses User Datagram protocol(UDP)
This mainly uses Transmission Control
protocol(TCP)
Header size It has 4 bytes sized header It has 2 bytes sized header
RESTful based Yes it uses REST principles No it does not uses REST principles
Persistence
support
It does not has such support
It supports and best used for live data
communication
Message Labelling It provides by adding labels to the messages. It has no such feature.
Usability/Security
It is used in Utility area networks and has secured
mechanism.
It is used in IoT applications and is secure
145. Friday, May 13, 2022
WebSocket Protocol
It allows full-duplex communication over a single socket connection for sending
messages between client and server. It starts from ws:// or wss://
It is based on single TCP and allows streams of messages to be sent back and forth
between the client and the server while keeping the TCP connection open.
The client can be browser, a mobile application.
It is a stateful Protocol
No header overhead
Suitable for Real time applications
Standardised by IETF as RFC6455
Client
REQUEST
HANDSHAKE
WebSocket
GET ws://websocket.example.com/
HTTP/1.1
Origin: http://example.com
Connection: Upgrade Host:
websocket.example.com
Upgrade: websocket
146. Friday, May 13, 2022
Websocket Advantages
It supports duplex communication.
Using websockets, one can send and receive data immediately
faster than HTTP.
Cross origin communication (however this poses security
risks).
Cross platform compatibility (web, desktop, mobile)
HTTP takes up to 2000 bytes of overhead where as websocket
takes only 2 bytes.
Replace long polling
147. Friday, May 13, 2022
Websocket Disadvantages
Web browser must be fully HTML5 compliant.
Intermediary/Edge caching is not possible with websockets
unlike HTTP.
To build even simple protocol of your own, one can not be able
to use friendly HTTP statuses, body etc.
If application does not require a lot of dynamic interaction,
HTTP is much simpler to implement.
148. Friday, May 13, 2022
WebSocket Application
Real Time Web application
Gaming application (multiplayer)
Multimedia Chats
Social Feeds
Collaborative editing/coding
Location based apps
Online education
Sports updates
149. Friday, May 13, 2022
HTTP/ WebSocket Comparison
Basis of HTTP WebSocket's
Definition
HTTP is a communication protocol of the
world wide web. Http works as a request-
response protocol in the client-server
computing model. It is the most common
version of HTTP used in modern web
browsers and servers.
Web Socket is a standard protocol for two-way
data transfer between client and server. The
Web Socket protocol is built over TCP. Web
sockets are mainly used to push messages to a
client in real time updates.
Technology Half Duplex Full Duplex
Messaging Unidirectional and Stateless protocol Bi-Directional and Stateful
Features
−Moderate overhead to maintain and establish
connection
−HTTP creates a short connection at the client
and closes it once response is received from
server
−Frequent requests deteriorate performance
of HTTP
−Http uses HTTP or https protocol for sending
a request
Moderate overhead to maintain and establish
connection
−Minimum overhead per message
−Web socket keeps the connection open until
state has died
−Frequent requests are very well handled by
Web socket
−Web Socket uses WS protocol
150. Friday, May 13, 2022
XMPP (Extensible Messaging and
Presence Protocol)
It is used for real-time communication ad streaming XML data between
network entities.
Wide range of application such as messaging, presence, data syndication,
gaming, multi-party chat and voice/video calls.
It allows sending small chunks of XML data from one network entity to
another in real time
It is a decentralised protocol and uses client-server architecture
It supports both client-to-server and server-to-server communication paths.
Let’s divide into each character of word XMPP:
•X : It means eXtensible. XMPP is a open source project which can be changed or
extended according to the need.
•M : XMPP is designed for sending messages in real time. It has very efficient push
mechanism compared to other protocols.
•P : It determines whether you are online/offline/busy. It indicates the state.
•P : XMPP is a protocol, that is, a set of standards that allow systems to
communicate with each other.
152. Friday, May 13, 2022
XMPP (Extensible Messaging and
Presence Protocol)
For example, I’m a whatsApp user and I’m identified by my mobile number, so
153. Friday, May 13, 2022
Advantages of XMPP
Firewall friendly
Enables pushing data, not just pulling
Strong authentication and security
Provides many tools for solving a wide range of
problems
154. Friday, May 13, 2022
RFID
RFID-Radio Frequency Identification
RFID Tag
Components- Integrated Circuit, Antenna, Protective covering
Types: Active and Passive
RFID Reader
AIDC (Automatic Identification and Data collection)
Microcontroller
RF-Signal
Generator
Signal Detector
155. Friday, May 13, 2022
RFID Challenges
RFID is prone to two main issues:
•Reader collision. Reader collision, when a signal from one
RFID reader interferes with a second reader, can be prevented by
using an anti-collision protocol to make RFID tags take turns
transmitting to their appropriate reader.
•Tag collision. Tag collision occurs when too many tags confuse
an RFID reader by transmitting data at the same time. Choosing
a reader that gathers tag info one at a time will prevent this issue.
Source: https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification
156. Friday, May 13, 2022
RFID Applications
inventory management
asset tracking and equipment tracking
inventory control
cargo and supply chain logistics
vehicle tracking
customer service and loss control
improved visibility and distribution in the supply chain
access control in security situations
Shipping
Healthcare
Manufacturing
retail sales
tap-and-go credit card payments
157. Friday, May 13, 2022
RFID v/s Barcodes
RFID tags Barcodes
Can identify individual objects without
direct line of sight.
Direct line of sight required for
scanning.
Can scan items from inches to feet
away, depending on type of tag and
reader.
Require closer proximity for scanning.
Data can be updated in real time. Data is read-only and can't be changed.
Require a power source. No power source needed.
Read time is less than 100 milliseconds
per tag.
Read time is half a second or more per
tag.
Contain a sensor attached to an antenna,
often contained in a plastic cover and
more costly than barcodes.
Printed on the outside of an object and
more subject to wear.
Source: https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification
158. Friday, May 13, 2022
RFID v/s Barcodes
Radio frequency ID Near-field communication
Uni-directional Bi-directional
Range up to 100 m Range less than 0.2 m
LF/HF/UHF/Microwave 13.56 MHz
Continuous sampling No continuous sampling
Bit rate varies with frequency Up to 424 Kbps
Power rate varies with frequency <15 milliamperes
Source: https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification
159. Friday, May 13, 2022
References
Source: https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification
1. https://www.youtube.com/c/5MinutesEngineering
2. Bag, G.; Mukhtar, H.; Shams, S.M.; Kim, K.H.; Yoo, S.W. Inter-PAN Mobility Support for
6LoWPAN, ICCIT 2008, 2008, pp 787 – 792,
3. P. Sethi and S. R. Sarangi, “Internet of Things: Architectures, Protocols, and Applications,” J.
Electr. Comput. Eng., vol. 2017, p. 9324035, 2017, doi: 10.1155/2017/9324035.
4. O. Vermesan, P. Friess, P. Guillemin et al., “Internet of thingsstrategic research roadmap,” in
Internet of Things: Global Technological and Societal Trends, vol. 1, pp. 9–52, 2011.
5. I. Pe˜na-L´opez, Itu Internet Report 2005: The Internet of Things, 2005.
6. I. Mashal, O. Alsaryrah, T.-Y. Chung, C.-Z. Yang, W.-H. Kuo, andD. P.Agrawal, “Choices for
interaction with things on Internet] and underlying issues,” Ad Hoc Networks, vol. 28, pp. 68–
90, 2015.
Notes de l'éditeur
.TUNIOT, Smart things
Adafruit.in
Thingspeak
ESP8266
TTGO
ESPSMS
ESP32
ESPNOW
Keyword List
3 minute key point summary
Submit 2-3 examination questions
Index cards- What is the overall expression of the course on data, what is good about the course and any improvement.
I would like the teacher do more….
I would like the faculty to less……
Speed to text, audio processing, network communication.
ENIAC (Electronic Numerical Integrator and Computer. )was the first programmable, electronic, general-purpose digital computer made in 1945.
.
.
Request and Response Model:
Client send a request in the encoded format to the server. The request is process and categorised in server section. It will check what kind of data is required by the client then accordingly it fetch the data/ response from the database. Then prepare the response that will send to client receiver.
Publisher Subscriber Model
Publisher is the source of data that will go to the broker which will act as an intermediate and it collects the data.. Topic wise.IT stores all the subjects related to T1 (Topic 1). Suppose T1 is subscribed by the S3 that is known only to broker not to publisher. Publisher will only publish the data. T1 subscribed to S3…that will be given by broker only.
Push-Pull Model:
Queue Will act as buffer. From publisher side, the information is being pushed and from consumer side its being pulled. If there is no buffer , there was no control/flow of data. Rate of transfer of information is much high then consumer means transfer is more then the acceptance from the consumer then there will be mismatch of data so to avoid that we need buffer/queue.
Exclusive Pair Model
For communication between client and sever, we give an exclusive link. The link is full duplex and we can exchange information from both the side. If client doesn’t want to send any information/communicate till that time the link will be active. If it stops sending the data then it will be broken
Not for smaller messages- hi, bye
Applications:
Video streaming
VoIP
Video Conference
E-Learning
Zigbee in Healthcare - For example to monitor blood pressure, to monitor blood glucose level, bed sensor controller, weighing scale etc.
Zigbee in smart energy - For example safe plug, smart socket, electricity consumption display, thermostats, energy manager etc.
Zigbee in Home and building automation - For example remote control of various home and building related stuff.
Zigbee for Closures - For example smart lock, Door sensor, occupancy sensor, etc.
Zigbee for Home appliances - For example air conditioner, TV, digital water meter etc.
Zigbee for telecom services - For example router/gateway etc.
These fragments can take all different path to reach the destination. There will be out of order arrival of fragments to the receiver that is done through.
Maximum fragment offset possible = (65535 – 20) = 65515 {where 65535 is the maximum size of datagram and 20 is the minimum size of IP header}
Fragment offset. 2^13=65514+20= 2^16/2^13=8.
We cannot add data (padding) into bits but can reduce it. So use 160
It will check no. of data bytes ahead of particular fragment and that will set to FO
MF-More Fragment:
Donot Fragment: BECAUSE SIZE OF DATAGRAM IS MORE THEN THE RECIEVER SIZE
Record Route: To which route my packet will transfer. So I use option field to record the route for the packet. We will store the IP address of the packet.. 4B-40B. IP address can be stores in the option field instead of 10 just to put space into each
Source Routing: trying to specify the route from source to destination. Record the sequence of the route in this field.
Strict Routing- properly specify path to strictly follow to the source
Loose Routing
Padding- add dummy bits to the data
between gateway
The HTTP makes use of Client-server architecture. As we have already told you that the browser acts as the HTTP client and this client mainly communicates with the webserver that is hosting the website. The format of the request and the response message is similar. The Request Message mainly consists of a request line, a header, and a body sometimes. A Response message consists of the status line, a header, and sometimes a body.
At the time when a client makes a request for some information (say client clicks on the hyperlink) to the webserver. The browser then sends a request message to the HTTP server for the requested objects.
After that the following things happen:
There is a connection that becomes open between the client and the webserver through the TCP.
After that, the HTTP sends a request to the server that mainly collects the requested data.
The response with the objects is sent back to the client by HTTP
At last, HTTP closes the connection.