SlideShare a Scribd company logo
1 of 72
IoT Protocol Stack
Presented By:
Bimal Patel
Assistant Professor
Department of I.T.
CSPIT,CHARUSAT
Outline of Presentation
• IoT World Forum Architecture
• IoT Protocol Stack Architecture
• Communication Models
• Communication API
• IoT levels and Deployment Templates
3
IoT World Forum (IoTWF)
Standardized Architecture
• IoTWF architectural committee published 7-
layer IoT architectural reference model in 2014
• This committee was led by Cisco, IBM,
Rockwell Automation, and others
• While various IoT reference models exist, the
one put forth by the IoT World Forum offers
clean, simplified perspective on IoT
• Includes edge computing, data storage, and
access
IoT World Forum (IoTWF)
Standardized Architecture
4
7
Layer 1: Physical Devices and
Controllers Layer
• This layer is home to the “things” in the IoT,
including various endpoint devices & sensors
• Size of these “things” can range from almost
tiny sensors to huge machines in factory
• Their primary function is generating data and
being capable of being controlled over
network
Layer 2: Connectivity Layer
8
Layer 3: Edge Computing Layer
9
Upper Layers: Layers 4–7
10
Protocol Stack
Overall Protocols and efforts in support of IoT [04]
IoT Protocol Stack [01]
IoT
Protocols
• Link Layer
• 802.3 – Ethernet
• 802.11 – WiFi
• 802.16 – WiMax
• 802.15.4 – LR-WPAN
• 2G/3G/4G
• Network/Internet Layer
• IPv4
• IPv6
• 6LoWPAN
• Transport Layer
• TCP
• UDP
• Application Layer
• HTTP
• CoAP
• WebSocket
• MQTT
• XMPP
• DDS
• AMQP
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
1
3
IEEE802.15.4
• Provides framework for lower layers (MACand
PHY)for wirelessP
AN
• PHYdefines frequency band, transmission
power, and modulation schemeof thelink
• MACdefines issuessuchasmedium access
and flow control (frames)
• Usedfor low power, low cost and lowspeed
communication between devices (<~75m)
1
4
Features of IEEE802.15.4
• Nature of transmission is line ofsight
• Standard range of transmission - 10 to75m
• Transmission of data usesCSMA-CA(carrier
sensemultiple accesswith collision avoidance)
• Star and peer-to-peer network topologyis
included
1
5
IEEE802.15.4
Version Feature
802.15.4-
2003
Basicversion. Themodulation schemesand data rates were
fixed for different frequency band – 868, 915 MHz, and2.4
GHz.
802.15.4 -
2006
Also known as802.15.4b. Provides higher data rate even on the
lower frequency bands. In the 868 MHz, the data transmission
rate is up to 100 kb/s while in 915 MHz, the data transmission
rate is up to 250 kb/s. UsesOQPSKfor all the frequencybands.
802.15.4 a Increasesrange capability. Definestwo new physical layers–
Direct Sequenceultra-wideband (UWB)– 249.6 - 749.6 MHz
(sub-gigahertz band), 3.1 - 4.8 GHz(low band), and 6 - 10 GHz
(high band). Chirp spreadspectrum (CSS)approach in ISMband
at 2.4GHz.
802.15.4 c Thisversion provides 780 MHzband in China. It useseither
O-QPSKor MPSK(Multiple frequency-shift keying)using
data transmission rate 250kb/s.
1
6
IEEE802.15.4
Version Feature
802.15.4 d Thisversion provides 950 MHzband in Japan.It useseither
GFSK(Gaussianfrequency-shift keying) using data rate 100
kb/s or BPSKusing data rate 20kb/s.
802.15.4e Defines MACdevelopments to IEEE802.15.4 towardsISA
SP100.11aapplication (industrial applications).
802.15.4f Defines fresh PHYsfor 433 MHz frequency band(RFID
applications), 2.4 GHzfrequency band andUWB.
802.15.4g Defines fresh PHYsfor smart utility networks for902 - 928
MHz band (smart grid applications, majorly for theenergy
industry).
802.15.4
802.15.4
• IEEE 802.15.4 task group began to developa
standard for LR-WPAN.
• The goal of this group was to provide a
standard with ultra-low complexity, cost, and
power for low-data-rate wirelessconnectivity
among inexpensive fixed,portable, and
moving devices.
802.15.4
Approaches for Low Power
In order to achieve the low power and low cost goals
established by IEEE 802.15.4 the following approaches
are taken
• Reduce the amount of data transmitted
• Reduce the transceiver duty cycle and frequency of
data transmissions
• Reduce the frame overhead
• Reduce complexity
• Reduce range
• Implement strict power managementmechanisms
(power-down and sleep
IEEE 802.15.4
• IEEE 802.15.4 deals with only PHY layerand
portion of Data linklayer.
• The higher-layer protocols are left toindustry
and the individualapplications.
• The Zigbee Alliance is an association of
companies involved with building higher-layer
standards based on IEEE 802.15.4. This
includes network, security, and application
protocols.
IEEE 802.15.4
IEEE 802.15.4 draft standard supports multiple
network topologies including star and peer to peer
topology.
IEEE 802.15.4
IEEE 802.15.4
• IEEE 802 splits DLL into MAC and LLC sublayers.
• LLC is standardized and is common in
802.3,802.11,802.15.1.
• Features of the IEEE 802.15.4 MAC are
– Association and disassociation
– acknowledged frame delivery
– Channel access mechanism
– Frame validation
– Guaranteed time slot management
– Beacon management.
IEEE 802.15.4 …MAC
• MAC provides data and management services
to upper layers
• 802.15.4 MAC is of very low complexity,
making it very suitable for its intended low-
end applications, albeit at the cost of a smaller
feature set than 802.15.1 (e.g., 802.15.4 does
not support synchronous voice links).
IEEE 802.15.4 …MAC
IEEE 802.15.4 …MAC
• Frame control field indicates the type of MAC
frame being transmitted, specifies the format of
the address field, and controls the
acknowledgment.
• Multiple address types : 64 bit physical address
and short 8 bit network assigned address are
provided.
• Address field size may vary from 0 to 20 bytes.
• Payload field is variable with condition size of
mac frame <= 127 bytes.
• FCS is used for integrity check using 16 bit CRC.
IEEE 802.15.4 …PHY
• This standard provides 2 PHY options with
frequency band as fundamental difference.
• 2.4 GHz band has worldwide availability and
provides a transmission rate of 250 kb/s.
• The 868/915 MHz PHY specifies operation in the
868 MHz band in Europe and 915 MHz ISM band
in the United States and offer data rates 20 kb/s
and 40 kb/s respectively.
• Different transmission rates can be exploited to
achieve a variety of different goals.
IEEE 802.15.4 …Channel Structure
IEEE 802.15.4 …Modulation
Parameter EtherNet WiFi WiMax LR-
WPAN(ZigBee)
Cellular
Used Inside
offices and
houses
Outside
offices and
houses
Outside
offices and
houses
Outside
offices and
houses
Outside
offices and
houses
IEEE
Standards:
802.3 802.11 802.16 802.15.4
Range 100mtrs 100 mrts 80-90kms 10-100 mtrs 1-5kms
Data
Transfer
Rate
10Mb
ps-
100M
bps
54Mbps 40Mbps 250kbit/s 100Kb
ps-
1MB
ps
Application Houses,
Offices,
Industries
Mobile
Applications
, Video
Conferenci
ng
MetroPolita
n Area
Network
Smart
Metering,
Home
Automation
(Alexa), Smart
Asset Tracking
Camera on
Traffic
Light,
Video on
Demand
Working of RPL [02][05][06][07]
• Follows distance-vector routing protocol based on IPv6
• Directed Acyclic Graph(DAG):No cycles
• Destination-Oriented DAG(DODAG):Single root
• Up: Towards root
• Down: Away from root
• Objective Function: Hop count, ETX(Expected Transmission Count)(OF0,MHROF)
• Rank : Distance from root using specified objective
• RPL Instance: One or more DODAGs.
A node may belong to multiple RPL instances.
• DODAG ID: IPv6 Adr. Of the root
• DODAG Version: Current version of DODAG.Every time a new DODAG is computed
with the same root,its version incremented(for global repair)
RPL concepts
Working of RPL
RPL concepts
Working of RPL
1. DODAG Information Object(DIO):
▫ Downward RPL instance multicasts
▫ Allows other nodes to discover an RPL instance and join it
2. DODAG Information Solicitation(DIS)
▫ Link-Local multicast request for DIO(neighbour discovery)
▫ Do you know of any DODAGs?
3. Destination Advertisement Object(DAO)
▫ From child to parents or root
▫ Can I join you as a child on DODAG #x?
4. DAO Ack:Yes,you can! Or Sorry,you cant!
5. Consistency Check: Challenge/response messages for security
RPL Control Messages
RPL Operation
0
1 1
3
2
2
2
1
DIO
DIO
DIO
DIO
DIO
DIO
DIO DIO
DIO
DIO
DIO
DIO
DIO
DIO
2
3 3 3
3
2
• Directed Acyclic Graph (DAG) Information Option (DIO) messages are
broadcast to build the tree; includes a node’s rank (its level), ETX, etc.
• ETX probe is sent periodically to probe neighboring ETX
Working of RPL
Traffic Flows supported by RPL
Self Healing in RPL
• On a link failure a local repair mechanism tries to select a new parent or
path.
• If there are more local failures, RPL performs a complementary global
repair where the whole DODAG is rebuilt with different version number.
• The RPL protocol uses the link-layer metric as a parameter in the
calculation of a default route. The path is assumed to be good if link-layer
acknowledgements are received on it.
• RPL also uses a trickle timer to handle inconsistencies in the RPL
DODAG.
Summary of RPL [05]
Feature Description
Target Network LLN:IPv6/6LowPAN networks
Routing Type Source-routing,Distance-Vector
Topology Mesh,Hierarchical based on DAG
Traffic Flows MP2P,P2MP and P2P
Message update Trickle Timer
Control Messages DIO,DAO,DIS
Transmission Unicast and Multicast
Metrics and
Constraints
Dynamic, based on OF and Rank
Modes Storing and non-storing
RPL Implementation at various OS/Simulation Tools
Name OS Protocol Version Notes(Extensions…)
TinyRPL TinyOS Draft-ietf-roll-rpl-17 • Uses BLIP2.0
• Only Storing mode
• Only Single RPL instance ID
• Security options not supported
• Only telosb and epic platform
supported
ContikiRPL Contiki RFC 6550 By default enabled on Tmote sky platform
OpenWSN OpenWSN RFC 6550
NanoRK Nano-RK Draft-ietf-roll-rpl-07
NanoQplus NanoQplus Draft-ietf-roll-rpl-13
Operating System incorporating RPL [02]
Name Language Protocol Version Notes(Extensions…
)
Cooja C RFC 6550 MSPsim
NS-3 C++ and Python Draft-ietf-roll-rpl-19
Omnet++ C++ Draft-ietf-roll-rpl-19
J-SIM Tcl/Java Draft-ietf-roll-rpl-19 EU Funded Project
Simulators incorporating RPL [02]
IoT Protocols…Application
Layer…Hyper Text Transfer Protocol
• Forms foundation of World Wide Web(WWW)
• Includes commands such as GET,PUT, POST, HEAD, OPTIONS, TRACE..etc
• Follows a request-response model
• Uses Universal Resource Identifiers(URIs) to identify HTTP resources
IoT Protocols…Application Layer…CoAP
• Constrained Application Protocol
• Used for Machine to machine (M2M) applications meant for constrained
devices and n/w’s
• Web transfer protocol for IoT and uses request-response
model
• Uses client –server architecture
• Supports methods such as GET,POST, PUT and DELETE
• CoAP makes use of the UDP protocol for lightweight implementation.
• It also uses restful architecture, which is just like the HTTP protocol.
IoT Protocols…Application Layer…WebSocket
• Allows full-duplex communication over single socket
• Based on TCP
• Client can be a browser, IoT device or mobile application
IoT Protocols…Application Layer…MQTT
• Message Queue Telemetry Transport , light-weight messaging protocol
• Based on publish-subscribe model
• Well suited for constrained environments where devices have limited processing, low
memory and n/w bandwith requirement
MQTT and AMQP figures
MQTT Model
AMQP Model
IoT Protocols…Application Layer…AMQP
• Advanced Messaging Queuing Protocol used for business messaging.
• Supports both point-to-point and publisher/subscriber models, routing
and queuing
• Broker here receives messages from publishers and route them over
connections to consumers through messaging queues.
IoT Protocols…Application Layer…XMPP
• Extensible messaging and presence protocol
• For Real time communication and streaming XML data between n/w
entities
• Used for Applications such as Multi-party chat and voice/video calls.
• Decentralized protocol and uses client server architecture.
IoT Protocols…Application Layer…DDS
• Data Distribution service is a data-centric middleware standard for
device-to-device or machine-to-machine communication.
• Publish subscribe model where publishers create topics to which
subscribers can use.
• Provides Quality-of-service control and configurable reliability.
Parameter HTTP CoAP XMPP(Ope
n XML)
DDS AMQP MQTT
Protocol TCP UDP TCP TCP and
UDP
TCP TCP
Network
Layer
IP 6LowPAN IP IP IP IP
Architectu
re
Clie
nt-
Serv
er
Client-
Server and
Publish-
Subscribe
Client-
Server
Publish-
Subscribe
Client-
Server and
Publish-
Subscribe
Publish-
Subscribe
Synchroni
zation
Needed No Need Needed Sometimes
Needed,
Sometimes
Not
Needed Needed
Designed
for
Internet IoT/M2M IoT/M2M Real Time
SYstems
M2M IoT/M2M
Application WWW Retrieving
Sensor
Data
WhatsApp,
Gaming,
Google
Talk
Volswagen
Smart Cars
for Video
Assistance
Google
Cloud
Facebook
Messenger
Communication Models
Request–Response Communication Model
• Request–Response is a
communication model in which
the client sends requests to the
server and the server responds to
the requests.
• When the server receives a
request, it decides how to
respond, fetches the data,
retrieves resource
representations, prepares the
response and then sends the
response to the client.
• Stateless communication model
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
Stateful v/s Stateless
Publish–Subscribe Communication Model
• Publish–Subscribe is a
communication model that
involves publishers, brokers and
consumers.
• Publishers are the source of data.
Publishers send the data to the
topics which are managed by the
broker. Publishers are not aware of
the consumers.
• Consumers subscribe to the topics
which are managed by the broker.
• When the broker receives data for
a topic from the publisher, it sends
the data to all the subscribed
consumers.
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
Push–Pull Communication Model
• Push–Pull is a communication
model in which the data
producers push the data to
queues and the consumers pull
the data from the queues.
Producers do not need to be
aware of the consumers.
• Queues help in decoupling the
messaging between the producers
and consumers.
• Queues also act as a buffer which
helps in situations when there is a
mismatch between the rate at
which the producers push data
and the rate at which the
consumers pull data.
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
Push v/s Pull communication
Exclusive Pair Communication Model
• Exclusive Pair is a
bidirectional, fully duplex
communication model that
uses a persistent connection
between the client and the
server.
• Once the connection is set
up it, remains open until the
client sends a request to
close the connection.
• Client and server can send
messages to each other after
connection setup.
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
Communication APIs
REST-based Communication APIs
• Representational State Transfer
(REST) is a set of architectural
principles by which you can
design web services and web
APIs that focus on a system’s
resources and how resource
states are addressed and
transferred.
• REST APIs follow therequest–
response communication
model.
• REST architectural constraints
apply to the components,
connectors and data elements
within a distributed
hypermedia system. Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
REST-based Communication APIs Constraints
• Client – Server
• Stateless
• Cacheable
• Layered System
• Uniform Interface
• Code on demand
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
Client Server
Request
Response
Request
Response
WebSocket-based Communication APIs
• WebSocket APIs allow bi-
directional, full duplex
communication between
clients and servers.
• WebSocket APIs follow the
exclusive pair
communication model.
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
Comparison Based on REST Websocket
State Stateless Stateful
Directional Unidirectional Bidirectional
Req-Res/Full Duplex Follow Request Response Model Exclusive Pair Model
TCP Connections Each HTTP request involves
setting up a new TCP
Connection
Involves a single TCP
Connection for all
requests
Header Overhead Each request carries HTTP Headers,
hence not suitable forreal-time
Does not involve overhead of
headers.
Scalability Both horizontal and vertical
are easier
Only Vertical is easier
Difference between REST and WebSocket-based
Communication APIs
IoT Levels and Deployment Templates
An IoT system comprises the following components:
• Device: An IoT device allows identification, remote sensing, actuating and
remote monitoring capabilities.
• Resource: Resources are software components on the IoT device for
accessing, processing and storing sensor information, or for controlling
actuators connected to the device. Resources also include the software
components that enable network access for the device.
• Controller Service: Controller service is a native service that runs on the
device and interacts with the web services. Controller service sends data
from the device to the web service and receives commands from the
application (via web services) for controlling the device.
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
IoT Levels and Deployment Templates
• Database: Database can be either local or in the cloud and stores the data
generated by the IoT device.
• Web Service: Web services serve as a link between the IoT device,
application, database and analysis components. Web service can be
implemented using HTTP and REST principles (REST service) or using the
WebSocket protocol (WebSocket service).
• Analysis Component: This is responsible for analyzing the IoT data and
generating results in a form that is easy for the user to understand.
• Application: IoT applications provide an interface that the users can use to
control and monitor various aspects of the IoT system. Applications also
allow users to view the system status and the processed data.
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
IoT Level-1
• A level-1 IoT system has a
single node/device
performs sensing
that
and/or
actuation, stores data,
performs analysis and hosts
the application.
• Level-1 IoT systems are
suitable for modelling low-
cost and low-complexity
solutions where the data
involved is not big and the
analysis requirements are
computationally
not
intensive.
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
IoT – Level 1 Example …Home
Automation System
IoT Level-2
• A level-2 IoT system has a
single node that performs
sensing and/or actuation
and local analysis.
• Data is stored in the cloud
and the application is usually
cloud-based.
• Level-2 IoT systems are
suitable for solutions where
the data involved is big;
however, the primary
analysis requirement is not
computationally intensive
and can be done locally.
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
IoT – Level 2 Example …Smart Irrigation
IoT Level-3
• A level-3 IoT system has a
single node. Data is stored
and analyzed in the cloud
and the application is
cloud-based.
• Level-3 IoT systems are
suitable for solutions
where the data involved is
requirements
big and the analysis
are
computationally
intensive.
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
IoT – Level 3 Example …Tracking
Package Handling
Sensors used accelrometer and gyroscope
IoT Level-4
• A level-4 IoT system has multiple
nodes that perform local analysis.
Data is stored in the cloud and the
application is cloud-based.
• Level-4 contains local and cloud-
based observer nodes which can
subscribe to and receive
information collected in the cloud
from IoT devices.
• Level-4 IoT systems are suitable
for solutions where multiple
nodes are required, the data
involved is big and the analysis
requirements are computationally
intensive.
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
IoT – Level 3 Example …Noise Monitoring
Sound Sensors are used
IoT Level-5
• A level-5 IoT system has multiple end
nodes and one coordinator node.
• The end nodes perform sensing
and/or actuation.
• The coordinator node collects data
from the end nodes and sends it to
the cloud.
• Data is stored and analyzed in the
cloud and the application is cloud-
based.
• Level-5 IoT systems are suitable for
solutions based on wireless sensor
networks, in which the data involved
is big and the analysis requirements
are computationally intensive.
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
IoT Level-6
• A level-6 IoT system has multiple
independent end nodes that
perform sensing and/or actuation
and send data to the cloud.
• Data is stored in the cloud and the
application is cloud-based.
• The analytics component analyzes
the data and stores the results in
the cloud database.
• The results are visualized with the
cloud-based application.
• The centralized controller is aware
of the status of all the end nodes
and sends control commands to
the nodes.
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com

More Related Content

Similar to Final_IoT_Protocol Stack.pptx

Networking - TCP/IP stack introduction and IPv6
Networking - TCP/IP stack introduction and IPv6Networking - TCP/IP stack introduction and IPv6
Networking - TCP/IP stack introduction and IPv6Rodolfo Kohn
 
Cisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design sessionCisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design sessionCisco Russia
 
Introduction to Fog
Introduction to FogIntroduction to Fog
Introduction to FogCisco DevNet
 
Cisco Multi-Service FAN Solution
Cisco Multi-Service FAN SolutionCisco Multi-Service FAN Solution
Cisco Multi-Service FAN SolutionCisco DevNet
 
WPAN According To ZIGBEE
WPAN According To ZIGBEEWPAN According To ZIGBEE
WPAN According To ZIGBEEAfaq Siddiqui
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiMostafa Ali
 
An infrastructual secure wireless sensing and actuating solution
An infrastructual secure wireless sensing and actuating solutionAn infrastructual secure wireless sensing and actuating solution
An infrastructual secure wireless sensing and actuating solutionusman sarwar
 
IEEE.802.15.4 in internet of things.pptx
IEEE.802.15.4 in internet of things.pptxIEEE.802.15.4 in internet of things.pptx
IEEE.802.15.4 in internet of things.pptxkirtanchoudhary333
 
IEEE 802.15.4 is a wireless communication standard that was specifically desi...
IEEE 802.15.4 is a wireless communication standard that was specifically desi...IEEE 802.15.4 is a wireless communication standard that was specifically desi...
IEEE 802.15.4 is a wireless communication standard that was specifically desi...TohidKhan29
 
Wireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinWireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinRobert Russell
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.pptxdarlord
 
IPv6 and IoT
IPv6 and IoTIPv6 and IoT
IPv6 and IoTAPNIC
 

Similar to Final_IoT_Protocol Stack.pptx (20)

Networking - TCP/IP stack introduction and IPv6
Networking - TCP/IP stack introduction and IPv6Networking - TCP/IP stack introduction and IPv6
Networking - TCP/IP stack introduction and IPv6
 
Cisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design sessionCisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design session
 
IOT - Unit 3.pptx
IOT - Unit 3.pptxIOT - Unit 3.pptx
IOT - Unit 3.pptx
 
L6 6 lowpan
L6 6 lowpanL6 6 lowpan
L6 6 lowpan
 
Rpl2018
Rpl2018Rpl2018
Rpl2018
 
Introduction to Fog
Introduction to FogIntroduction to Fog
Introduction to Fog
 
Cisco Multi-Service FAN Solution
Cisco Multi-Service FAN SolutionCisco Multi-Service FAN Solution
Cisco Multi-Service FAN Solution
 
WPAN According To ZIGBEE
WPAN According To ZIGBEEWPAN According To ZIGBEE
WPAN According To ZIGBEE
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
An infrastructual secure wireless sensing and actuating solution
An infrastructual secure wireless sensing and actuating solutionAn infrastructual secure wireless sensing and actuating solution
An infrastructual secure wireless sensing and actuating solution
 
IEEE.802.15.4 in internet of things.pptx
IEEE.802.15.4 in internet of things.pptxIEEE.802.15.4 in internet of things.pptx
IEEE.802.15.4 in internet of things.pptx
 
IEEE 802.15.4 is a wireless communication standard that was specifically desi...
IEEE 802.15.4 is a wireless communication standard that was specifically desi...IEEE 802.15.4 is a wireless communication standard that was specifically desi...
IEEE 802.15.4 is a wireless communication standard that was specifically desi...
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinWireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_Linkedin
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.ppt
 
IPv6 and IoT
IPv6 and IoTIPv6 and IoT
IPv6 and IoT
 
Rpl2016
Rpl2016Rpl2016
Rpl2016
 

More from jainam bhavsar

More from jainam bhavsar (6)

CSP.pptx
CSP.pptxCSP.pptx
CSP.pptx
 
Webofthing_WOT_vs_IOT.pptx
Webofthing_WOT_vs_IOT.pptxWebofthing_WOT_vs_IOT.pptx
Webofthing_WOT_vs_IOT.pptx
 
iot_application_casestudies.pptx
iot_application_casestudies.pptxiot_application_casestudies.pptx
iot_application_casestudies.pptx
 
5 it awt week 8
5 it awt week 85 it awt week 8
5 it awt week 8
 
5 it awt week 7
5 it awt week 75 it awt week 7
5 it awt week 7
 
5 it awt week 6
5 it awt week 65 it awt week 6
5 it awt week 6
 

Recently uploaded

ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

Final_IoT_Protocol Stack.pptx

  • 1. IoT Protocol Stack Presented By: Bimal Patel Assistant Professor Department of I.T. CSPIT,CHARUSAT
  • 2. Outline of Presentation • IoT World Forum Architecture • IoT Protocol Stack Architecture • Communication Models • Communication API • IoT levels and Deployment Templates
  • 3. 3 IoT World Forum (IoTWF) Standardized Architecture • IoTWF architectural committee published 7- layer IoT architectural reference model in 2014 • This committee was led by Cisco, IBM, Rockwell Automation, and others • While various IoT reference models exist, the one put forth by the IoT World Forum offers clean, simplified perspective on IoT • Includes edge computing, data storage, and access
  • 4. IoT World Forum (IoTWF) Standardized Architecture 4
  • 5. 7 Layer 1: Physical Devices and Controllers Layer • This layer is home to the “things” in the IoT, including various endpoint devices & sensors • Size of these “things” can range from almost tiny sensors to huge machines in factory • Their primary function is generating data and being capable of being controlled over network
  • 7. Layer 3: Edge Computing Layer 9
  • 9. Protocol Stack Overall Protocols and efforts in support of IoT [04] IoT Protocol Stack [01]
  • 10. IoT Protocols • Link Layer • 802.3 – Ethernet • 802.11 – WiFi • 802.16 – WiMax • 802.15.4 – LR-WPAN • 2G/3G/4G • Network/Internet Layer • IPv4 • IPv6 • 6LoWPAN • Transport Layer • TCP • UDP • Application Layer • HTTP • CoAP • WebSocket • MQTT • XMPP • DDS • AMQP Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com
  • 11. 1 3 IEEE802.15.4 • Provides framework for lower layers (MACand PHY)for wirelessP AN • PHYdefines frequency band, transmission power, and modulation schemeof thelink • MACdefines issuessuchasmedium access and flow control (frames) • Usedfor low power, low cost and lowspeed communication between devices (<~75m)
  • 12. 1 4 Features of IEEE802.15.4 • Nature of transmission is line ofsight • Standard range of transmission - 10 to75m • Transmission of data usesCSMA-CA(carrier sensemultiple accesswith collision avoidance) • Star and peer-to-peer network topologyis included
  • 13. 1 5 IEEE802.15.4 Version Feature 802.15.4- 2003 Basicversion. Themodulation schemesand data rates were fixed for different frequency band – 868, 915 MHz, and2.4 GHz. 802.15.4 - 2006 Also known as802.15.4b. Provides higher data rate even on the lower frequency bands. In the 868 MHz, the data transmission rate is up to 100 kb/s while in 915 MHz, the data transmission rate is up to 250 kb/s. UsesOQPSKfor all the frequencybands. 802.15.4 a Increasesrange capability. Definestwo new physical layers– Direct Sequenceultra-wideband (UWB)– 249.6 - 749.6 MHz (sub-gigahertz band), 3.1 - 4.8 GHz(low band), and 6 - 10 GHz (high band). Chirp spreadspectrum (CSS)approach in ISMband at 2.4GHz. 802.15.4 c Thisversion provides 780 MHzband in China. It useseither O-QPSKor MPSK(Multiple frequency-shift keying)using data transmission rate 250kb/s.
  • 14. 1 6 IEEE802.15.4 Version Feature 802.15.4 d Thisversion provides 950 MHzband in Japan.It useseither GFSK(Gaussianfrequency-shift keying) using data rate 100 kb/s or BPSKusing data rate 20kb/s. 802.15.4e Defines MACdevelopments to IEEE802.15.4 towardsISA SP100.11aapplication (industrial applications). 802.15.4f Defines fresh PHYsfor 433 MHz frequency band(RFID applications), 2.4 GHzfrequency band andUWB. 802.15.4g Defines fresh PHYsfor smart utility networks for902 - 928 MHz band (smart grid applications, majorly for theenergy industry).
  • 16. 802.15.4 • IEEE 802.15.4 task group began to developa standard for LR-WPAN. • The goal of this group was to provide a standard with ultra-low complexity, cost, and power for low-data-rate wirelessconnectivity among inexpensive fixed,portable, and moving devices.
  • 18. Approaches for Low Power In order to achieve the low power and low cost goals established by IEEE 802.15.4 the following approaches are taken • Reduce the amount of data transmitted • Reduce the transceiver duty cycle and frequency of data transmissions • Reduce the frame overhead • Reduce complexity • Reduce range • Implement strict power managementmechanisms (power-down and sleep
  • 19. IEEE 802.15.4 • IEEE 802.15.4 deals with only PHY layerand portion of Data linklayer. • The higher-layer protocols are left toindustry and the individualapplications. • The Zigbee Alliance is an association of companies involved with building higher-layer standards based on IEEE 802.15.4. This includes network, security, and application protocols.
  • 20. IEEE 802.15.4 IEEE 802.15.4 draft standard supports multiple network topologies including star and peer to peer topology.
  • 22. IEEE 802.15.4 • IEEE 802 splits DLL into MAC and LLC sublayers. • LLC is standardized and is common in 802.3,802.11,802.15.1. • Features of the IEEE 802.15.4 MAC are – Association and disassociation – acknowledged frame delivery – Channel access mechanism – Frame validation – Guaranteed time slot management – Beacon management.
  • 23. IEEE 802.15.4 …MAC • MAC provides data and management services to upper layers • 802.15.4 MAC is of very low complexity, making it very suitable for its intended low- end applications, albeit at the cost of a smaller feature set than 802.15.1 (e.g., 802.15.4 does not support synchronous voice links).
  • 25. IEEE 802.15.4 …MAC • Frame control field indicates the type of MAC frame being transmitted, specifies the format of the address field, and controls the acknowledgment. • Multiple address types : 64 bit physical address and short 8 bit network assigned address are provided. • Address field size may vary from 0 to 20 bytes. • Payload field is variable with condition size of mac frame <= 127 bytes. • FCS is used for integrity check using 16 bit CRC.
  • 26. IEEE 802.15.4 …PHY • This standard provides 2 PHY options with frequency band as fundamental difference. • 2.4 GHz band has worldwide availability and provides a transmission rate of 250 kb/s. • The 868/915 MHz PHY specifies operation in the 868 MHz band in Europe and 915 MHz ISM band in the United States and offer data rates 20 kb/s and 40 kb/s respectively. • Different transmission rates can be exploited to achieve a variety of different goals.
  • 29. Parameter EtherNet WiFi WiMax LR- WPAN(ZigBee) Cellular Used Inside offices and houses Outside offices and houses Outside offices and houses Outside offices and houses Outside offices and houses IEEE Standards: 802.3 802.11 802.16 802.15.4 Range 100mtrs 100 mrts 80-90kms 10-100 mtrs 1-5kms Data Transfer Rate 10Mb ps- 100M bps 54Mbps 40Mbps 250kbit/s 100Kb ps- 1MB ps Application Houses, Offices, Industries Mobile Applications , Video Conferenci ng MetroPolita n Area Network Smart Metering, Home Automation (Alexa), Smart Asset Tracking Camera on Traffic Light, Video on Demand
  • 30. Working of RPL [02][05][06][07] • Follows distance-vector routing protocol based on IPv6 • Directed Acyclic Graph(DAG):No cycles • Destination-Oriented DAG(DODAG):Single root • Up: Towards root • Down: Away from root • Objective Function: Hop count, ETX(Expected Transmission Count)(OF0,MHROF) • Rank : Distance from root using specified objective • RPL Instance: One or more DODAGs. A node may belong to multiple RPL instances. • DODAG ID: IPv6 Adr. Of the root • DODAG Version: Current version of DODAG.Every time a new DODAG is computed with the same root,its version incremented(for global repair) RPL concepts
  • 31. Working of RPL RPL concepts
  • 32. Working of RPL 1. DODAG Information Object(DIO): ▫ Downward RPL instance multicasts ▫ Allows other nodes to discover an RPL instance and join it 2. DODAG Information Solicitation(DIS) ▫ Link-Local multicast request for DIO(neighbour discovery) ▫ Do you know of any DODAGs? 3. Destination Advertisement Object(DAO) ▫ From child to parents or root ▫ Can I join you as a child on DODAG #x? 4. DAO Ack:Yes,you can! Or Sorry,you cant! 5. Consistency Check: Challenge/response messages for security RPL Control Messages
  • 33. RPL Operation 0 1 1 3 2 2 2 1 DIO DIO DIO DIO DIO DIO DIO DIO DIO DIO DIO DIO DIO DIO 2 3 3 3 3 2 • Directed Acyclic Graph (DAG) Information Option (DIO) messages are broadcast to build the tree; includes a node’s rank (its level), ETX, etc. • ETX probe is sent periodically to probe neighboring ETX
  • 34. Working of RPL Traffic Flows supported by RPL
  • 35. Self Healing in RPL • On a link failure a local repair mechanism tries to select a new parent or path. • If there are more local failures, RPL performs a complementary global repair where the whole DODAG is rebuilt with different version number. • The RPL protocol uses the link-layer metric as a parameter in the calculation of a default route. The path is assumed to be good if link-layer acknowledgements are received on it. • RPL also uses a trickle timer to handle inconsistencies in the RPL DODAG.
  • 36. Summary of RPL [05] Feature Description Target Network LLN:IPv6/6LowPAN networks Routing Type Source-routing,Distance-Vector Topology Mesh,Hierarchical based on DAG Traffic Flows MP2P,P2MP and P2P Message update Trickle Timer Control Messages DIO,DAO,DIS Transmission Unicast and Multicast Metrics and Constraints Dynamic, based on OF and Rank Modes Storing and non-storing
  • 37. RPL Implementation at various OS/Simulation Tools Name OS Protocol Version Notes(Extensions…) TinyRPL TinyOS Draft-ietf-roll-rpl-17 • Uses BLIP2.0 • Only Storing mode • Only Single RPL instance ID • Security options not supported • Only telosb and epic platform supported ContikiRPL Contiki RFC 6550 By default enabled on Tmote sky platform OpenWSN OpenWSN RFC 6550 NanoRK Nano-RK Draft-ietf-roll-rpl-07 NanoQplus NanoQplus Draft-ietf-roll-rpl-13 Operating System incorporating RPL [02] Name Language Protocol Version Notes(Extensions… ) Cooja C RFC 6550 MSPsim NS-3 C++ and Python Draft-ietf-roll-rpl-19 Omnet++ C++ Draft-ietf-roll-rpl-19 J-SIM Tcl/Java Draft-ietf-roll-rpl-19 EU Funded Project Simulators incorporating RPL [02]
  • 38. IoT Protocols…Application Layer…Hyper Text Transfer Protocol • Forms foundation of World Wide Web(WWW) • Includes commands such as GET,PUT, POST, HEAD, OPTIONS, TRACE..etc • Follows a request-response model • Uses Universal Resource Identifiers(URIs) to identify HTTP resources
  • 39. IoT Protocols…Application Layer…CoAP • Constrained Application Protocol • Used for Machine to machine (M2M) applications meant for constrained devices and n/w’s • Web transfer protocol for IoT and uses request-response model • Uses client –server architecture • Supports methods such as GET,POST, PUT and DELETE • CoAP makes use of the UDP protocol for lightweight implementation. • It also uses restful architecture, which is just like the HTTP protocol.
  • 40.
  • 41. IoT Protocols…Application Layer…WebSocket • Allows full-duplex communication over single socket • Based on TCP • Client can be a browser, IoT device or mobile application IoT Protocols…Application Layer…MQTT • Message Queue Telemetry Transport , light-weight messaging protocol • Based on publish-subscribe model • Well suited for constrained environments where devices have limited processing, low memory and n/w bandwith requirement
  • 42. MQTT and AMQP figures MQTT Model AMQP Model
  • 43. IoT Protocols…Application Layer…AMQP • Advanced Messaging Queuing Protocol used for business messaging. • Supports both point-to-point and publisher/subscriber models, routing and queuing • Broker here receives messages from publishers and route them over connections to consumers through messaging queues.
  • 44. IoT Protocols…Application Layer…XMPP • Extensible messaging and presence protocol • For Real time communication and streaming XML data between n/w entities • Used for Applications such as Multi-party chat and voice/video calls. • Decentralized protocol and uses client server architecture.
  • 45. IoT Protocols…Application Layer…DDS • Data Distribution service is a data-centric middleware standard for device-to-device or machine-to-machine communication. • Publish subscribe model where publishers create topics to which subscribers can use. • Provides Quality-of-service control and configurable reliability.
  • 46.
  • 47. Parameter HTTP CoAP XMPP(Ope n XML) DDS AMQP MQTT Protocol TCP UDP TCP TCP and UDP TCP TCP Network Layer IP 6LowPAN IP IP IP IP Architectu re Clie nt- Serv er Client- Server and Publish- Subscribe Client- Server Publish- Subscribe Client- Server and Publish- Subscribe Publish- Subscribe Synchroni zation Needed No Need Needed Sometimes Needed, Sometimes Not Needed Needed Designed for Internet IoT/M2M IoT/M2M Real Time SYstems M2M IoT/M2M Application WWW Retrieving Sensor Data WhatsApp, Gaming, Google Talk Volswagen Smart Cars for Video Assistance Google Cloud Facebook Messenger
  • 49.
  • 50. Request–Response Communication Model • Request–Response is a communication model in which the client sends requests to the server and the server responds to the requests. • When the server receives a request, it decides how to respond, fetches the data, retrieves resource representations, prepares the response and then sends the response to the client. • Stateless communication model Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com
  • 52. Publish–Subscribe Communication Model • Publish–Subscribe is a communication model that involves publishers, brokers and consumers. • Publishers are the source of data. Publishers send the data to the topics which are managed by the broker. Publishers are not aware of the consumers. • Consumers subscribe to the topics which are managed by the broker. • When the broker receives data for a topic from the publisher, it sends the data to all the subscribed consumers. Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com
  • 53. Push–Pull Communication Model • Push–Pull is a communication model in which the data producers push the data to queues and the consumers pull the data from the queues. Producers do not need to be aware of the consumers. • Queues help in decoupling the messaging between the producers and consumers. • Queues also act as a buffer which helps in situations when there is a mismatch between the rate at which the producers push data and the rate at which the consumers pull data. Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com
  • 54. Push v/s Pull communication
  • 55. Exclusive Pair Communication Model • Exclusive Pair is a bidirectional, fully duplex communication model that uses a persistent connection between the client and the server. • Once the connection is set up it, remains open until the client sends a request to close the connection. • Client and server can send messages to each other after connection setup. Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com
  • 57. REST-based Communication APIs • Representational State Transfer (REST) is a set of architectural principles by which you can design web services and web APIs that focus on a system’s resources and how resource states are addressed and transferred. • REST APIs follow therequest– response communication model. • REST architectural constraints apply to the components, connectors and data elements within a distributed hypermedia system. Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com
  • 58. REST-based Communication APIs Constraints • Client – Server • Stateless • Cacheable • Layered System • Uniform Interface • Code on demand Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com Client Server Request Response Request Response
  • 59. WebSocket-based Communication APIs • WebSocket APIs allow bi- directional, full duplex communication between clients and servers. • WebSocket APIs follow the exclusive pair communication model. Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com
  • 60. Comparison Based on REST Websocket State Stateless Stateful Directional Unidirectional Bidirectional Req-Res/Full Duplex Follow Request Response Model Exclusive Pair Model TCP Connections Each HTTP request involves setting up a new TCP Connection Involves a single TCP Connection for all requests Header Overhead Each request carries HTTP Headers, hence not suitable forreal-time Does not involve overhead of headers. Scalability Both horizontal and vertical are easier Only Vertical is easier Difference between REST and WebSocket-based Communication APIs
  • 61. IoT Levels and Deployment Templates An IoT system comprises the following components: • Device: An IoT device allows identification, remote sensing, actuating and remote monitoring capabilities. • Resource: Resources are software components on the IoT device for accessing, processing and storing sensor information, or for controlling actuators connected to the device. Resources also include the software components that enable network access for the device. • Controller Service: Controller service is a native service that runs on the device and interacts with the web services. Controller service sends data from the device to the web service and receives commands from the application (via web services) for controlling the device. Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com
  • 62. IoT Levels and Deployment Templates • Database: Database can be either local or in the cloud and stores the data generated by the IoT device. • Web Service: Web services serve as a link between the IoT device, application, database and analysis components. Web service can be implemented using HTTP and REST principles (REST service) or using the WebSocket protocol (WebSocket service). • Analysis Component: This is responsible for analyzing the IoT data and generating results in a form that is easy for the user to understand. • Application: IoT applications provide an interface that the users can use to control and monitor various aspects of the IoT system. Applications also allow users to view the system status and the processed data. Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com
  • 63. IoT Level-1 • A level-1 IoT system has a single node/device performs sensing that and/or actuation, stores data, performs analysis and hosts the application. • Level-1 IoT systems are suitable for modelling low- cost and low-complexity solutions where the data involved is not big and the analysis requirements are computationally not intensive. Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com
  • 64. IoT – Level 1 Example …Home Automation System
  • 65. IoT Level-2 • A level-2 IoT system has a single node that performs sensing and/or actuation and local analysis. • Data is stored in the cloud and the application is usually cloud-based. • Level-2 IoT systems are suitable for solutions where the data involved is big; however, the primary analysis requirement is not computationally intensive and can be done locally. Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com
  • 66. IoT – Level 2 Example …Smart Irrigation
  • 67. IoT Level-3 • A level-3 IoT system has a single node. Data is stored and analyzed in the cloud and the application is cloud-based. • Level-3 IoT systems are suitable for solutions where the data involved is requirements big and the analysis are computationally intensive. Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com
  • 68. IoT – Level 3 Example …Tracking Package Handling Sensors used accelrometer and gyroscope
  • 69. IoT Level-4 • A level-4 IoT system has multiple nodes that perform local analysis. Data is stored in the cloud and the application is cloud-based. • Level-4 contains local and cloud- based observer nodes which can subscribe to and receive information collected in the cloud from IoT devices. • Level-4 IoT systems are suitable for solutions where multiple nodes are required, the data involved is big and the analysis requirements are computationally intensive. Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com
  • 70. IoT – Level 3 Example …Noise Monitoring Sound Sensors are used
  • 71. IoT Level-5 • A level-5 IoT system has multiple end nodes and one coordinator node. • The end nodes perform sensing and/or actuation. • The coordinator node collects data from the end nodes and sends it to the cloud. • Data is stored and analyzed in the cloud and the application is cloud- based. • Level-5 IoT systems are suitable for solutions based on wireless sensor networks, in which the data involved is big and the analysis requirements are computationally intensive. Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com
  • 72. IoT Level-6 • A level-6 IoT system has multiple independent end nodes that perform sensing and/or actuation and send data to the cloud. • Data is stored in the cloud and the application is cloud-based. • The analytics component analyzes the data and stores the results in the cloud database. • The results are visualized with the cloud-based application. • The centralized controller is aware of the status of all the end nodes and sends control commands to the nodes. Bahga & Madisetti, © 2015 Book website: http://www.internet-of-things-book.com