- The document provides an overview of various Internet of Things (IoT) communication protocols including MQTT, HTTP/REST, and DDS.
- It discusses the key aspects of MQTT including its publish-subscribe model, use of a message broker, lightweight design, and quality of service levels. HTTP/REST is described as using a client-server model with status codes and uniform interfaces.
- The document also compares MQTT and HTTP/REST, noting MQTT is simpler, message-centric, and ideal for low-power IoT devices, while HTTP/REST is more complex, document-centric, and the standard web protocol.
MQTT - A practical protocol for the Internet of ThingsBryan Boyd
In today’s mobile world, the volume of connected devices and data is growing at a rapid pace. As more and more “things” become part of the Internet (refrigerators, pacemakers, cows?), the importance of scalable, reliable and efficient messaging becomes paramount. In this talk we will dive into MQTT: a lightweight, open standard publish/subscribe protocol for rapid messaging between “things”.
MQTT is simple to understand, yet robust enough to support interactions between millions of devices and users. MQTT is being used in connected car applications, mobile banking, Facebook Messenger, and many things in between. In this talk you will learn all about the protocol (in 10 minutes!) and see some of its applications: live-tracking, gaming, and more. We’ll walk through designing an MQTT-based API for a ride-share mobile application, and discuss how MQTT and REST APIs can complement each other.
MQTT is an alternative lightweight and highly reliable protocol compared to the HTTP.
In these series of slides I reiterate the strengths of the MQTT protocol.
Stephen Nicolas shares pretty exciting data on MQTT-HTTP comparison http://stephendnicholas.com/archives/1217
MQTT - A practical protocol for the Internet of ThingsBryan Boyd
In today’s mobile world, the volume of connected devices and data is growing at a rapid pace. As more and more “things” become part of the Internet (refrigerators, pacemakers, cows?), the importance of scalable, reliable and efficient messaging becomes paramount. In this talk we will dive into MQTT: a lightweight, open standard publish/subscribe protocol for rapid messaging between “things”.
MQTT is simple to understand, yet robust enough to support interactions between millions of devices and users. MQTT is being used in connected car applications, mobile banking, Facebook Messenger, and many things in between. In this talk you will learn all about the protocol (in 10 minutes!) and see some of its applications: live-tracking, gaming, and more. We’ll walk through designing an MQTT-based API for a ride-share mobile application, and discuss how MQTT and REST APIs can complement each other.
MQTT is an alternative lightweight and highly reliable protocol compared to the HTTP.
In these series of slides I reiterate the strengths of the MQTT protocol.
Stephen Nicolas shares pretty exciting data on MQTT-HTTP comparison http://stephendnicholas.com/archives/1217
The session with highlight Intel’s vision for IoT Security and the fundamental building blocks and capabilities Intel and the ecosystem are providing to organizations to build security in from design through deployment and maintenance.
Introducing Multi Valued Vectors Fields in Apache LuceneSease
Since the introduction of native vector-based search in Apache Lucene happened, many features have been developed, but the support for multiple vectors in a dedicated KNN vector field remained to explore. Having the possibility of indexing (and searching) multiple values per field unlocks the possibility of working with long textual documents, splitting them in paragraphs and encoding each paragraph as a separate vector: scenario that is often encountered by many businesses. This talk explores the challenges, the technical design and the implementation activities happened during the work for this contribution to the Apache Lucene project. The audience is expected to get an understanding of how multi-valued fields can work in a vector-based search use-case and how this feature has been implemented.
Dans le cadre de la 8ème edition des Cyber Security Days 2018, organisée par l'agence nationale de la sécurité informatique, notre partenaire Fortinet-Exclusive Networks a présenté son module "Fortinet Security Fabric".
Elastic Security: Unified protection for everyoneElasticsearch
Prevent, detect, and respond to threats with Elastic Security, free and open for analysts everywhere. Built on the Elastic Stack, Elastic Security powers the SOC by eliminating blind spots, stopping threats at scale, and arming every analyst. Join this fast-moving session to see it in action.
Tutorial at IEEE IM 2019.
The tutorial will provide a comprehensive coverage of the Network Automation domain starting with the scope and definitions, introducing the challenges and then developing the different approaches to realize complete future network automation solutions. A special focus will be put on the newly created ETSI ISG ZSM "Zero Touch Network and Service Management" and the standardization landscape.
NFV +SDN
(Network Function Virtualization + Software Defined Networking)
- What, Why and When NFV and SDN?
- Basic concepts and definition of NFV, SDN.
- Benefits of NFV.
- NFV Architecture
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...confluent
Our talk will explore the transformative impact of integrating Confluent, HiveMQ, and SparkPlug in Industry 4.0, emphasizing the creation of a Unified Namespace.
In addition to the creation of a Unified Namespace, our webinar will also delve into Stream Governance and Scaling, highlighting how these aspects are crucial for managing complex data flows and ensuring robust, scalable IIoT-Platforms.
You will learn how to ensure data accuracy and reliability, expand your data processing capabilities, and optimize your data management processes.
Don't miss out on this opportunity to learn from industry experts and take your business to the next level.
The session with highlight Intel’s vision for IoT Security and the fundamental building blocks and capabilities Intel and the ecosystem are providing to organizations to build security in from design through deployment and maintenance.
Introducing Multi Valued Vectors Fields in Apache LuceneSease
Since the introduction of native vector-based search in Apache Lucene happened, many features have been developed, but the support for multiple vectors in a dedicated KNN vector field remained to explore. Having the possibility of indexing (and searching) multiple values per field unlocks the possibility of working with long textual documents, splitting them in paragraphs and encoding each paragraph as a separate vector: scenario that is often encountered by many businesses. This talk explores the challenges, the technical design and the implementation activities happened during the work for this contribution to the Apache Lucene project. The audience is expected to get an understanding of how multi-valued fields can work in a vector-based search use-case and how this feature has been implemented.
Dans le cadre de la 8ème edition des Cyber Security Days 2018, organisée par l'agence nationale de la sécurité informatique, notre partenaire Fortinet-Exclusive Networks a présenté son module "Fortinet Security Fabric".
Elastic Security: Unified protection for everyoneElasticsearch
Prevent, detect, and respond to threats with Elastic Security, free and open for analysts everywhere. Built on the Elastic Stack, Elastic Security powers the SOC by eliminating blind spots, stopping threats at scale, and arming every analyst. Join this fast-moving session to see it in action.
Tutorial at IEEE IM 2019.
The tutorial will provide a comprehensive coverage of the Network Automation domain starting with the scope and definitions, introducing the challenges and then developing the different approaches to realize complete future network automation solutions. A special focus will be put on the newly created ETSI ISG ZSM "Zero Touch Network and Service Management" and the standardization landscape.
NFV +SDN
(Network Function Virtualization + Software Defined Networking)
- What, Why and When NFV and SDN?
- Basic concepts and definition of NFV, SDN.
- Benefits of NFV.
- NFV Architecture
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...confluent
Our talk will explore the transformative impact of integrating Confluent, HiveMQ, and SparkPlug in Industry 4.0, emphasizing the creation of a Unified Namespace.
In addition to the creation of a Unified Namespace, our webinar will also delve into Stream Governance and Scaling, highlighting how these aspects are crucial for managing complex data flows and ensuring robust, scalable IIoT-Platforms.
You will learn how to ensure data accuracy and reliability, expand your data processing capabilities, and optimize your data management processes.
Don't miss out on this opportunity to learn from industry experts and take your business to the next level.
WebRTC transforms a Web browser into a fully fledged client for Real Time Communications (audio, video, IM, screensharing). Google and Mozilla have contributed to this Open Source project, creating a variety of business opportunities unthinkable just a few years ago. During this seminar we’ll see the technology aspects and potential, why this attracts Web developers and what the role of VoIP developers has become.
Managing microservices with Istio Service MeshRafik HARABI
Developing and managing hundreds (or maybe thousands) of microservices at scale is a challenge for both development and operations teams.
We have seen over the last years the appearance of new frameworks dedicated to deliver ‘Cloud Native’ applications by providing a set of (out of box) building blocks. Most of these frameworks integrate microservices concerns at the code level.
Recently, we have seen the emerging of a new pattern known as sidecar or proxy promoting to push all these common concerns outside of the business code and provides them on the edge by integrate a new layer to the underlying platform called Service Mesh.
Istio is one of the leading Service Mesh implementing sidecar pattern.
We will go during the presentation throw the core concepts behind Istio, the capabilities that provides to manage, secure and observe microservices and how it gives a new breath for both developers and operations.
The presentation will be guided by a sequence of demo exposing Istio capabilities.
Processing IoT Data from End to End with MQTT and Apache Kafka confluent
(Kai Waehner, Confluent) Kafka Summit SF 2018
This session discusses end-to-end use cases such as connected cars, smart home or healthcare sensors, where you integrate Internet of Things (IoT) devices with enterprise IT using open source technologies and standards. MQTT is a lightweight messaging protocol for IoT. However, MQTT is not built for high scalability, longer storage or easy integration to legacy systems. Apache Kafka is a highly scalable distributed streaming platform, which ingests, stores, processes and forwards high volumes of data from thousands of IoT devices.
This session discusses the Apache Kafka open source ecosystem as a streaming platform to process IoT data. See a live demo of how MQTT brokers like Mosquitto or RabbitMQ integrate with Kafka, and how you can even integrate MQTT clients to Kafka without MQTT Broker. Learn how to analyze the IoT data either natively on Kafka with Kafka Streams/KSQL or on an external big data cluster like Spark, Flink or Elasticsearch leveraging Kafka Connect.
A slide deck from my tech talks on WebRTC. These slides give a high-level technical overview of WebRTC, outlining its internal mechanisms and some of the signaling and RTP topologies that are typically seen with it. Plus some of the updates and improvements coming as technology evolves.
From leading IoT Protocols to Python Dashboarding_finalLukas Ott
First i like to give an overview on common IoT Protocols:
#CoAP (Constrained Application Protocol -> Close to HTTP / REST ) #MQTT ( Message Queue Telemetry Transport -> Pub/Sub with Broker -> Well defined Quality of Service -> Newest addition Eclipse Amlem (formerly the core of IBM Watson IoT platform) -> Eclipse Sparkplug -> Standardization of the topics and payloads -> Interoperability!) , #DDS (Data Distribution Service -> Pub/Sub without Broker -> Drones / Robotics) #LwM2M (Lightweight M2M -> Runs on Top of CoAP or MQTT -> standard sets of payloads for sensors) #zenoh (https://zenoh.io/ Pub/Sub Protocol -> combines the advantages of #DDS and #MQTT) #eclipsefoundation #apache #opensource #lightweight (+ some comments that this is not complete and does not encompass Industrial and Building Automation)
Then I would like to show the leading edge IoT protocol Zenoh. Saving Zenoh Payload to Apache IoTDB. After that I would like to dive into Panel and the awesome capabilities of Apache ECharts.
Troubleshooting and Best Practices with WSO2 Enterprise IntegratorWSO2
This slide deck discusses how to troubleshoot an issue in WSO2 Enterprise Integrator and follow best practices in order to optimize output and avoid failure.
Watch webinar here: https://wso2.com/library/webinars/2018/10/troubleshooting-and-best-practices-with-wso2-enterprise-integrator
End-to-end IoT solutions with Java and Eclipse IoTBenjamin Cabé
The IoT market is poised to an exponential growth, but there are still lots of barriers that prevent building a real, open, Internet of Things. Over the last years, Eclipse has been growing an ecosystem of open-source projects for IoT, that are used in real-world solutions, from smart gateways bridging sensors to the cloud, to device management infrastructures or home automation systems.
Java is a key-enabler for IoT, and this presentation provides you with concrete examples on how to build end-to-end solutions with the Eclipse IoT Java stack and projects like Paho, Kura, SmartHome, Californium, OM2M, Eclipse SCADA, Concierge ... This session will give you the keys to build a scalable IoT solution on top of open-source technology and open standards.
Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)Jakub Botwicz
Presentation about Cotopaxi toolkit from Black Hat Asia 2019 Arsenal session. Author: Jakub Botwicz
https://www.blackhat.com/asia-19/arsenal/schedule/index.html#cotopaxi-iot-protocols-security-testing-toolkit-14325
Presenter - Boris Cherkasskiy
The industry-wide demand to collect and present machine statistical and performance data is continually growing. While it’s possible to IoT-enable a machine with the use of an Intelligent Gateway or by utilizing an MES system, it might be cost-prohibitive for a small machine.
This session will present a solution that allows you to push data from an S7-1200 PLC directly to the cloud via standard MQTT protocol. Attendees will gain a quick path to Industry 4.0 using standard IoT protocol to connect a custom machine (or a cell/line) to an existing and fast-growing IoT infrastructure.
Similar to Internet of Things - protocols review (MeetUp Wireless & Networks, Poznań 21.02.2018) (20)
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
3. Hello world
- Who am I ?
- Open Source contributor* & user
- Open Hardware fanatic
- Software Engineer & DevOps
- Golang / Python / Java
- GNU Linux
- Sci-fi fanIoT
Protocols review
*) https://github.com/allegro/akubra , https://github.com/bieli
7. General reasons - why IoT ?
- Connect both inanimate and living things
- Use sensors for data collection (data streams)
- Change what types of item communicate over
an IP Network
- Benefits for today:
- Faster knowledge/stats sharing with M2M
- Better quality in control and automation
- Cost Savings (Machine Learning, Analytics)
IoT
Protocols review
9. Communication protocol...
- ..., a defined set of rules and regulations
that determine how data is transmitted in
telecommunications and computer
networking
- machines languages in ‘Machine to
Machine’ (M2M) world
IoT
Protocols review
13. MQTT - general information
- Message Queuing Telemetry Transport (ver. 3.1.1)
- publish – subscribe messaging pattern
- requires a message broker
- asynchronous messages model (events)
- works on top of the TCP/IP protocol (possible TLS)
- lightweight, efficient and simple implementation
- Open Sourced with standards (40+ client libraries)IoT
Protocols review
http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/mqtt-v3.1.1.html
19. MQTT - Quality of Service
Even though TCP/IP provides guaranteed data delivery, data loss can still
occur if a TCP connection breaks down and message in transmit are lost.
Therefore MQTT adds 3 quality of service levels on top of TCP.
IoT
Protocols review
https://www.slideshare.net/PeterREgli/mq-telemetry-transport
21. MQTT QoS - examples
QoS level 0 (best effort)
- temperature sensor data is regularly published
- lost of an individual value is not critical for application
QoS level 1 (quaranteed to arrive, but duplicated are possible)
- door sensor senses the door state
- it’s important how door state change (close->open, open->close)
- states are published losslessly to subscribers
QoS level 2 (exactly once)
- application where duplicated events could lead to incorrect actions, e.g.
sounding an alarm as a reaction to an event recived by the message
IoT
Protocols review
23. MQTT toolbox
https://www.slideshare.net/Hamdamboy/message-queuing-telemetry-transport-mqtt
IoT
Protocols review
mqtt-spy
- is probably one of the most advanced open source utilities for publishing
and monitoring activity on MQTT topics. It is aimed at two groups of users:
- innovators who need a tool for creating IoT prototypes or integration
projects
- power users who need an advanced utility for their work
environments
mosquitto
- an open source MQTT broker (from Eclipse project)
- implements the MQTT protocol versions 3.1 and 3.1.1.
- is lightweight and is suitable for use on all devices from low power
single board computers to full servers
paho - MQTT client library implementrations http://www.eclipse.org/paho/
25. HTTP + RESTful
- The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed,
collaborative, and hypermedia information systems.[1]
HTTP is the foundation of
data communication for the World Wide Web.
-
- REpresentational State Transfer (REST), or RESTful, web services provide
interoperability between computer systems on the Internet.
-
- created by the internet community with global companies support
- supported by all vendors, companies, organizations (wide range)
- based on RFC (Request for Comments)
- client/server libs exists in all (popular) programming lang.
- stateful, cached, scalable, session, extensible and secureIoT
Protocols review
27. HTTP - typical flow
IoT
Protocols review
1) Open a TCP connection. The TCP connection will be used to send a request, or several, and receive an answer.
2) Send an HTTP message in ASCII. HTTP messages (before HTTP/2) are human-readable.
GET / HTTP/1.1
Host: developer.mozilla.org
Accept-Language: en
3) Read the response sent by the server:
HTTP/1.1 200 OK
Date: Sat, 09 Oct 2010 14:28:02 GMT
Server: Apache
Last-Modified: Tue, 01 Dec 2009 20:18:22 GMT
ETag: "51142bc1-7449-479b075b2891b"
Accept-Ranges: bytes
Content-Length: 29769
Content-Type: text/html
<!DOCTYPE html... (here comes the 29769 bytes of the requested web page)
4) Close or reuse the connection for further requests.
29. Uniform Resource Identifier
scheme:[//[user[:password]@]host[:port]][/path][?query][#fragment]
IoT
Protocols review
hierarchical part
┌───────────────────┴─────────────────────┐
authority path
┌───────────────┴───────────────┐┌───┴────┐
abc://username:password@example.com:123/path/data?key=value#fragid1
└┬┘ └───────┬───────┘ └────┬────┘ └┬┘ └───┬───┘ └──┬──┘
scheme user information host port query fragment
urn:example:mammal:monotreme:echidna
└┬┘ └──────────────┬───────────────┘
scheme path
https://tools.ietf.org/html/rfc3986 , https://en.wikipedia.org/wiki/Uniform_Resource_Identifier
30. HTTP - status codes
IoT
Protocols review
- 1xx: Information. The request was received by the server,
continue processing.
- 2xx: Successful. The request was received, understood,
accepted, and processed by the server.
- 3xx: Redirection. Additional action is required to complete the
request.
- 4xx: Client Error. There was a problem with the request
received by the server.
- 5xx: Server Error. The request was received, understood, and
accepted by the server, however, a server error occurred in
processing the request.
https://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html
31. HTTP - request methods
IoT
Protocols review
- OPTIONS
- GET
- HEAD
- POST
- PUT
- DELETE
- TRACE
- CONNECT
- PATCH
https://tools.ietf.org/html/rfc1738 , https://tools.ietf.org/html/rfc3187
35. HTTP 1.1 vs. HTTP/2
IoT
Protocols review
no pipelining vs. pipelining (better performance)
optional secure vs. secure by design
https://imagekit.io/demo/http2-vs-http1
36. REST API - definition
IoT
Protocols review
- REST is a simple way to organize interactions
between independent systems (based on HTTP
protocol).
- Optimal usage of HTTP with few architectural constraints:
- Client-server architecture
- Statelessness
- Cacheability
- Layered system
- Uniform interface
- Code on demand (optional)
https://tools.ietf.org/html/rfc1738 , https://tools.ietf.org/html/rfc3187
41. Relationship between URL
and HTTP methods
IoT
Protocols review
https://en.m.wikipedia.org/wiki/Representational_state_transfer
42. REST IoT solutions (hubs)
IoT
Protocols review
- The REST APIs for IoT Hub offer programmatic access to
the device, messaging, and job services, as well as the
resource provider, in IoT Hub.
- Typical subjects for IoT hubs:
- Device Identities
- Device Twins
- Device Messaging
- Jobs
- Resource Provider
- Common error codes
https://docs.microsoft.com/pl-pl/rest/api/iothub/
43. Request:
GET https://<IoT hub domain name>/devices?api-version=2016-11-14
Response:
- status code: 200
- type: Device[]
- description: OK
Media Types: "application/json", "text/json"
Device[] - collections of Device resource
Device - has dedicated properties like: deviceId (string), deviceStatus (disabled |
enabled : string), cloudToDeviceMessageCount (integer)
REST - GET all devices
IoT
Protocols review
https://docs.microsoft.com/en-us/rest/api/iothub/deviceapi/getdevices
44. Request:
PUT https://<IoT hub domain name>/jobs/v2/{jobid}
Request Body:
- Media Types: "application/json", "text/json"
- required: jobId (string)
- required: type (string - enum: schedule | Device | Method | Update | Twin)
- optional: queryCondition (string)
Response:
- status code: 201
- description: Created
Media Types: "application/json", "text/json"
REST - PUT create job
IoT
Protocols review
https://docs.microsoft.com/en-us/rest/api/iothub/deviceapi/getdevices
45. Request:
PATCH https://<IoT domain name>/twins/{id}?api-version=2016-11-14
Request Body:
- Media Types: "application/json", "text/json"
- required: DeviceId (string)
- required: IsConnected (boolean)
- optional: Version (integer)
Response:
- status code: 200
- type: DeviceTwinInfo
- description: Created + Media Types: "application/json", "text/json"
REST - PATCH update twin
IoT
Protocols review
https://docs.microsoft.com/en-us/rest/api/iothub/devicetwinapi/updatedevicetwin
48. Text based HTTP sniffer:
https://github.com/jbittel/httpry
HTTP/REST toolbox
IoT
Protocols review
http://xmodulo.com/sniff-http-traffic-command-line-linux.html
49. MQTT - simple protocol and message centric
- has pretty short specification
- public - subscribe (default port 1883)
- light (small, it’s binary with 2Byte header)
- ideal for exchanging data between low power
machines
- implemented data security
- has Quality Of Service
- avg. libraries size: 30KB C, 100KB Java
- data distribution: 1 to 0/1/N
MQTT vs. HTTP/REST
IoT
Protocols review
http://www.rfwireless-world.com/Terminology/MQTT-vs-HTTP.html , http://mqtt.ximxim.com/mqtt-vs-http-which-one-is-the-best-for-iot/
HTTP/REST - complex protocol and document centric
- specifications are much longer
- client - server (default port 80 or 8080)
- text based protocol (large, it is in ASCII format)
- standard communication protocol for sharing
data and information
- security only in HTTPS
- no Quality Of Service
- avg. libraries size: Large
- data distribution: one to one only
50. MQTT vs. HTTP/REST - life
IoT
Protocols review
https://www.slideshare.net/paolopat/mqtt-iot-protocols-comparison
According to measurements in 3G networks, throughput of MQTT is 93 times faster than HTTP’s.
HTTP is worthy, well tested and extendable.
But MQTT is more suitable when it is referred to IoT development.
52. DDS - basics
IoT
Protocols review
- "The first open international middleware standard directly addressing
publish-subscribe communications for real-time and embedded
systems."
- DDS addresses the needs of applications like financial trading, air-traffic
control, smart grid management, and other big data applications.
- The standard is used in applications such as smartphone operating systems,
transportation systems and vehicles, software-defined radio, and by healthcare
providers.
53. MoM - middleware concept
Message-oriented middleware (MOM) is
software or hardware infrastructure supporting
sending and receiving messages between
distributed systems.
MOM allows application modules to be
distributed over heterogeneous platforms and
reduces the complexity of developing
applications that span multiple operating
systems and network protocols.
A MOM system with built-in intelligence can
transform messages en route to match the
requirements of the sender or of the recipient.
IoT
Protocols review
54. DDS - interoperability
The DDS interoperability demonstration used
scenarios such as:
- Basic connectivity to network using IP
- Discovery of publishers and subscribers
- Quality of service (QoS) Compatibility
between requester and offerer
- Delay-tolerant networking
- Multiple topics and instances of topics
- Exclusive ownerships of topics
- Content filtering of topic data including
time and geographicIoT
Protocols review
55. Data-Centricity or Message-Centricity?
- In a message-centric system the focus is on
delivery of the message itself regardless of
the data payload it contains and the
infrastructure's role is to ensure that messages
get to their intended recipients.
- In a data-centric system the focus is on
user defined data (the data model). The unit
of exchange in this type of system is a data
value. The middleware understands the
context of the data and ensures that all
interested subscribers have a correct and
consistent view of the data. This is similar in
concept to a database that can provide a
global view (data space) of the data and can
manage its access.
IoT
Protocols review
Global data space
56. - DDS supports a decentralized broker-less
architecture to enable seamless data sharing
between producers and consumers.
- DDS is based on the idea of a virtual “global
data space” where producers write to the
data space and consumers read from the
data space.
- A data model consisting of named topics,
their user defined data types and associated
QoS is used to by the DDS infrastructure to
control how data is shared.
- DDS connects producers to consumers over
the data bus
DDS Data Bus Architecture
IoT
Protocols review
DDS Data Bus Architecture
57. DDS toolbox
IoT
Protocols review
- DDS community code examples (free)
- https://github.com/rticommunity/rticonnextdds-examples
- CoreDX DDS Spy (commercial)
- http://www.twinoakscomputing.com/datasheets/CoreDX_DDS_SpyTool_datasheet.pdf
- it can process data from industry standard network capture files (e.g. Wireshark)
58. MQTT - simple publish-subscribe protocol
- messages delivery with Quality of Service is the most
important
- communication by one point: Message Broker
- Message Broker is the SPoF
- data messages routed by topics
- for collecting data from few systems with sensors
network
- usage in telemetry: device to server, data center, ITcloud
- centralized & server based analytics, business logic and
integration
MQTT vs. DDS
IoT
Protocols review
http://www.rfwireless-world.com/Terminology/MQTT-vs-HTTP.html , http://mqtt.ximxim.com/mqtt-vs-http-which-one-is-the-best-for-iot/
DDS - data-centric standard
- data sharing (visiblility for consumers) is the most
important
- communication is peer-to-peer
- decentralized (no SPoF’s)
- distributed, manage tiny devices
- reliable, high-performance architecture for
connecting many systems with different networks
- usage in Intelligent Systems: within and
between devices, dedicated systems, real-time
cloud, analytics, biz logic & integration
distributed, embedded, at edge
59. MQTT vs. DDS requirements
IoT
Protocols review
https://www.slideshare.net/RealTimeInnovations/comparison-of-mqtt-and-dds-as-m2m-protocols-for-the-internet-of-things
62. IoT protocols distribution
Rather than trying to fit all of the IoT Protocols on top of existing architecture
models like OSI Model, we have broken the protocols into the following layers
to provide some level of organization:
1. Infrastructure (ex: 6LowPAN, IPv4/IPv6, RPL, UDP, DTLS)
2. Identification (ex: EPC, uCode, IPv6, URIs)
3. Comms / Transport (ex: NFC, Wifi, Bluetooth, LoRaWAN, NB-IoT)
4. Discovery (ex: Physical Web, mDNS, DNS-SD, HyperCat)
5. Data Protocols (ex: MQTT, CoAP, AMQP, Websocket, DDS, HTTP)
6. Device Management (ex: TR-069, OMA-DM)
7. Semantic (ex: JSON-LD, Web Thing Model, SensorML)
8. Multi-layer Frameworks (ex: Alljoyn, IoTivity, Weave, Homekit, Thread)
IoT
Protocols review
https://www.postscapes.com/internet-of-things-protocols/
67. Integrate DDS into the Broker/ESB
IoT
Protocols review
https://www.slideshare.net/RealTimeInnovations/comparison-of-mqtt-and-dds-as-m2m-protocols-for-the-internet-of-things
69. IoT implementation steps
STEP-1: Look at the use cases that are relevant to the domain or industry you
operate in.
STEP-2: Think of ways to enhance those use cases to increase your Reach,
Accuracy, Customer Satisfaction, Retention or Cross-sell opportunities.
STEP-3: Analyze the impact and compatibility of existing Processes and
Systems.
STEP-4: Identify the IoT platform and Skills required to implement and carry
out maintenance activities.
STEP-5: Identify the “Things” required and technical aspects like protocols.
IoT
Protocols review
https://www.linkedin.com/pulse/point-of-view-role-bpm-internet-things-iot-yusufzai-s-khan
70. 1. marcinbielak.blogspot.com - my private tech. blog
2. IoT Standards and Protocols
3. Mesh vs star topology diagram from slides, slides
4. Understanding IoT cloud
5. Key Standarization Activities
6. MQTT telemetry transport
7. Power Profiling: HTTPS Long Polling vs. MQTT with
SSL, on Android
References