SlideShare a Scribd company logo
1 of 3
COAP (Constrained Application Protocol) is a specialized
web transfer protocol designed for use with constrained
networks and devices, such as those found in the Internet
of Things (IoT). It is a lightweight and efficient protocol that
enables low-power devices to communicate with each
other and with the internet.
COAP is based on the RESTful architecture and operates
over the User Datagram Protocol (UDP). It uses a simple
request-response model to transfer data, which reduces
the amount of overhead and makes it suitable for use with
resource-constrained devices. COAP also supports
reliable and unreliable messaging, multicast requests, and
resource discovery.
COAP provides a set of methods that allow clients to
interact with resources on servers. These methods include
GET, PUT, POST, and DELETE, which are similar to the
HTTP methods. COAP also defines a set of response
codes that indicate the status of a request, such as
success or failure.
Overall, COAP is a promising protocol for the Internet of
Things, as it is designed to work efficiently and reliably
with resource-constrained devices and networks.
MQTT (Message Queuing Telemetry Transport) is a
lightweight messaging protocol designed for use in
constrained environments, such as low-bandwidth or
unreliable networks. It is commonly used in IoT
(Internet of Things) applications for real-time
communication between devices and servers.
In MQTT, communication occurs between a publisher
and subscriber. The publisher sends messages to a
broker, which then delivers the messages to all
subscribers who have subscribed to the corresponding
topic. The messages are published with a "topic" string
that describes the content of the message, allowing
subscribers to filter and receive only the messages
they are interested in.
MQTT uses a "publish/subscribe" messaging pattern,
which is different from the traditional
"request/response" pattern used in many other
protocols. This allows for more efficient use of network
bandwidth and resources, as messages are only sent
when there is new data available to be transmitted.
MQTT is widely used in IoT applications because it is
lightweight, flexible, and has a low overhead, making it
well-suited for use in resource-constrained devices. It
is also designed to be easily implemented in a wide
variety of hardware and software platforms.
LoRaWAN (Long Range Wide Area Network) is a low
power, long-range wireless communication protocol
designed to connect low-cost, battery-operated devices
over long distances in a wide range of IoT (Internet of
Things) applications. It uses the LoRa modulation
technique, which allows for long-range communication
while consuming very little power.
LoRaWAN operates in the unlicensed radio spectrum,
which means that anyone can use it without having to
pay any fees or obtain a license. This makes it an ideal
solution for IoT applications that require long-range, low-
power communication and don't need high data rates.
LoRaWAN networks consist of gateways, which act as
the communication interface between the end devices
and the network server. The end devices, such as
sensors and actuators, communicate with the gateways
using the LoRa modulation technique. The gateways
then forward the data to the network server, which
processes and stores the data.
LoRaWAN is particularly suitable for applications such
as smart cities, precision agriculture, asset tracking, and
environmental monitoring, where low power
consumption, long range, and low data rates are
important.
6LoWPAN (IPv6 over Low-Power Wireless Personal Area
Network) is a communication protocol that allows devices
with low-power wireless connectivity to connect to the
internet and exchange data using the IPv6 protocol.
It was developed to address the need for low-power, low-
bandwidth connectivity for devices such as sensors,
actuators, and other small devices that require
connectivity to the internet. 6LoWPAN enables these
devices to communicate over low-power, wireless
networks such as IEEE 802.15.4 or Bluetooth Low Energy
(BLE).
6LoWPAN uses techniques such as header compression,
fragmentation, and adaptation to reduce the size of IPv6
packets, making them more suitable for transmission over
low-power wireless networks. This protocol also supports
mesh networking, which allows devices to communicate
with each other through intermediate nodes, enabling
wider network coverage and improved reliability.
Overall, 6LoWPAN is a key technology for the Internet of
Things (IoT), enabling the connectivity of a wide range of
devices that were previously unable to connect to the
internet due to their limited capabilities.
The architecture of the Internet of Things (IoT) typically
includes several layers, each with its own set of
components and functionalities. Here are some of the
common layers and components of an IoT architecture:
1.Devices and sensors layer: This layer includes the
physical devices and sensors that collect and transmit
data to the network. These can include a wide range of
devices, from simple sensors like temperature or humidity
sensors to more complex devices like cameras or drones.
2.Connectivity layer: This layer includes the various
protocols and technologies that allow devices to connect
to the network and communicate with each other. This can
include Wi-Fi, Bluetooth, cellular, or other types of
wireless or wired connections.
3.Data processing layer: This layer includes the various
technologies and tools used to collect, store, and process
data from the devices and sensors. This can include
cloud-based platforms, edge computing systems, or other
data processing technologies.
4.Application layer: This layer includes the software
applications that use the data collected by the devices and
sensors to provide value to users. These can include
applications for monitoring, analysis, automation, or other
purposes.
1.Security layer: This layer includes the various
technologies and protocols used to secure the IoT
network and the data transmitted through it. This can
include encryption, authentication, access control, and
other security measures.
Overall, the architecture of an IoT system can vary
depending on the specific use case and requirements.
However, these layers and components provide a general
framework for understanding how an IoT system is
designed and how it functions.

More Related Content

Similar to Important topics.pptx

IRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET Journal
 
LoRa Technology - DNA of IoT
LoRa Technology - DNA of IoTLoRa Technology - DNA of IoT
LoRa Technology - DNA of IoTijtsrd
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & EcosystemHarish Vadada
 
Research review of iot
Research review of iotResearch review of iot
Research review of iotAbdullah Aziz
 
What is the application protocol for IoT.pdf
What is the application protocol for IoT.pdfWhat is the application protocol for IoT.pdf
What is the application protocol for IoT.pdfashumasih3
 
IOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxIOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxMeghaShree665225
 
Capillary Networks – Bridging the Cellular and IoT Worlds
Capillary Networks –  Bridging the Cellular and IoT WorldsCapillary Networks –  Bridging the Cellular and IoT Worlds
Capillary Networks – Bridging the Cellular and IoT WorldsEricsson
 
Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things IJECEIAES
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfMD.ANISUR RAHMAN
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
internt of things 1.pptx
internt of things 1.pptxinternt of things 1.pptx
internt of things 1.pptxRiazAhmad521284
 
the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enableneelamsanjeevkumar
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachKarthic C M
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 

Similar to Important topics.pptx (20)

IRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WAN
 
LoRa Technology - DNA of IoT
LoRa Technology - DNA of IoTLoRa Technology - DNA of IoT
LoRa Technology - DNA of IoT
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & Ecosystem
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Research review of iot
Research review of iotResearch review of iot
Research review of iot
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
What is the application protocol for IoT.pdf
What is the application protocol for IoT.pdfWhat is the application protocol for IoT.pdf
What is the application protocol for IoT.pdf
 
IOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxIOT Network architecture and Design.pptx
IOT Network architecture and Design.pptx
 
Capillary Networks – Bridging the Cellular and IoT Worlds
Capillary Networks –  Bridging the Cellular and IoT WorldsCapillary Networks –  Bridging the Cellular and IoT Worlds
Capillary Networks – Bridging the Cellular and IoT Worlds
 
K010426371
K010426371K010426371
K010426371
 
Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things
 
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
internt of things 1.pptx
internt of things 1.pptxinternt of things 1.pptx
internt of things 1.pptx
 
the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enable
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approach
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
Iot
IotIot
Iot
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Important topics.pptx

  • 1. COAP (Constrained Application Protocol) is a specialized web transfer protocol designed for use with constrained networks and devices, such as those found in the Internet of Things (IoT). It is a lightweight and efficient protocol that enables low-power devices to communicate with each other and with the internet. COAP is based on the RESTful architecture and operates over the User Datagram Protocol (UDP). It uses a simple request-response model to transfer data, which reduces the amount of overhead and makes it suitable for use with resource-constrained devices. COAP also supports reliable and unreliable messaging, multicast requests, and resource discovery. COAP provides a set of methods that allow clients to interact with resources on servers. These methods include GET, PUT, POST, and DELETE, which are similar to the HTTP methods. COAP also defines a set of response codes that indicate the status of a request, such as success or failure. Overall, COAP is a promising protocol for the Internet of Things, as it is designed to work efficiently and reliably with resource-constrained devices and networks. MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol designed for use in constrained environments, such as low-bandwidth or unreliable networks. It is commonly used in IoT (Internet of Things) applications for real-time communication between devices and servers. In MQTT, communication occurs between a publisher and subscriber. The publisher sends messages to a broker, which then delivers the messages to all subscribers who have subscribed to the corresponding topic. The messages are published with a "topic" string that describes the content of the message, allowing subscribers to filter and receive only the messages they are interested in. MQTT uses a "publish/subscribe" messaging pattern, which is different from the traditional "request/response" pattern used in many other protocols. This allows for more efficient use of network bandwidth and resources, as messages are only sent when there is new data available to be transmitted. MQTT is widely used in IoT applications because it is lightweight, flexible, and has a low overhead, making it well-suited for use in resource-constrained devices. It is also designed to be easily implemented in a wide variety of hardware and software platforms.
  • 2. LoRaWAN (Long Range Wide Area Network) is a low power, long-range wireless communication protocol designed to connect low-cost, battery-operated devices over long distances in a wide range of IoT (Internet of Things) applications. It uses the LoRa modulation technique, which allows for long-range communication while consuming very little power. LoRaWAN operates in the unlicensed radio spectrum, which means that anyone can use it without having to pay any fees or obtain a license. This makes it an ideal solution for IoT applications that require long-range, low- power communication and don't need high data rates. LoRaWAN networks consist of gateways, which act as the communication interface between the end devices and the network server. The end devices, such as sensors and actuators, communicate with the gateways using the LoRa modulation technique. The gateways then forward the data to the network server, which processes and stores the data. LoRaWAN is particularly suitable for applications such as smart cities, precision agriculture, asset tracking, and environmental monitoring, where low power consumption, long range, and low data rates are important. 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Network) is a communication protocol that allows devices with low-power wireless connectivity to connect to the internet and exchange data using the IPv6 protocol. It was developed to address the need for low-power, low- bandwidth connectivity for devices such as sensors, actuators, and other small devices that require connectivity to the internet. 6LoWPAN enables these devices to communicate over low-power, wireless networks such as IEEE 802.15.4 or Bluetooth Low Energy (BLE). 6LoWPAN uses techniques such as header compression, fragmentation, and adaptation to reduce the size of IPv6 packets, making them more suitable for transmission over low-power wireless networks. This protocol also supports mesh networking, which allows devices to communicate with each other through intermediate nodes, enabling wider network coverage and improved reliability. Overall, 6LoWPAN is a key technology for the Internet of Things (IoT), enabling the connectivity of a wide range of devices that were previously unable to connect to the internet due to their limited capabilities.
  • 3. The architecture of the Internet of Things (IoT) typically includes several layers, each with its own set of components and functionalities. Here are some of the common layers and components of an IoT architecture: 1.Devices and sensors layer: This layer includes the physical devices and sensors that collect and transmit data to the network. These can include a wide range of devices, from simple sensors like temperature or humidity sensors to more complex devices like cameras or drones. 2.Connectivity layer: This layer includes the various protocols and technologies that allow devices to connect to the network and communicate with each other. This can include Wi-Fi, Bluetooth, cellular, or other types of wireless or wired connections. 3.Data processing layer: This layer includes the various technologies and tools used to collect, store, and process data from the devices and sensors. This can include cloud-based platforms, edge computing systems, or other data processing technologies. 4.Application layer: This layer includes the software applications that use the data collected by the devices and sensors to provide value to users. These can include applications for monitoring, analysis, automation, or other purposes. 1.Security layer: This layer includes the various technologies and protocols used to secure the IoT network and the data transmitted through it. This can include encryption, authentication, access control, and other security measures. Overall, the architecture of an IoT system can vary depending on the specific use case and requirements. However, these layers and components provide a general framework for understanding how an IoT system is designed and how it functions.