SlideShare a Scribd company logo
Protocols of IoT
Ankit Anand
7th Sem., B.Tech. (IT),
S.O.E., CUSAT.
26-09-2017 1
Topics in this Presentation
What is Internet of Things?
How IoT Works?
Current Status & Future Prospect of IoT
The Future of IoT
 IoT Data Link Protocol
Network Layer Routing Protocols
 Network Layer Encapsulation Protocols
 Session Layer Protocols
2
What is IoT?
The Internet of Things (IoT) is the network of physical objects or
"things" embedded with electronics, software, sensors, and network
connectivity, which enables these objects to collect and exchange data.
IoT allows objects to be sensed and controlled remotely across
existing network infrastructure, creating opportunities for more direct
integration between the physical world and computer-based systems,
and resulting in improved efficiency, accuracy and economic benefit.
3
"Things," in the IoT sense, can refer to a wide variety
of devices such as heart monitoring implants, biochip
transponders on farm animals, electric clams in coastal
waters, automobiles with built-in sensors, DNA analysis
devices for environmental/food/pathogen monitoring or
field operation devices that assist fire-fighters in search
and rescue operations.
These devices collect useful data with the help of
various existing technologies and then autonomously flow
the data between other devices.
4
The concept of the Internet of Things first became
popular in 1999, through the Auto-ID Center at MIT and
related market-analysis publications. R
Radio-frequency identification (RFID) was seen as a
prerequisite for the IoT at that point. If all objects and
people in daily life were equipped with identifiers,
computers could manage and inventory them. Besides
using RFID, the tagging of things may be achieved through
such technologies as near field communication, barcodes,
QR codes, bluetooth, and digital watermarking.
History of IoT
5
How IoT Works?
Internet of Things is not the result of a single novel technology;
instead, several complementary technical developments provide
capabilities that taken together help to bridge the gap between the virtual
and physical world. These capabilities include:
Communication and cooperation
Addressability
Identification
Sensing
Actuation
Embedded information processing
Localization
User interfaces
6
How IoT Works?
7
RFID Sensor Smart Tech Nano Tech
To identify
and track the
data of
things
To collect and
process the
data to detect
the changes in
the physical
status of things
To enhance the
power of the
network by
devolving
processing
capabilities to
different part of
the network.
To make the
smaller and
smaller things
have the ability
to connect and
interact.
The Structure of IoT
The IoT can be viewed as a gigantic network consisting of
networks of devices and computers connected through a series
of intermediate technologies where numerous technologies
like RFIDs, wireless connections may act as enablers of this
connectivity.
Tagging Things : Real-time item traceability and addressability
by RFIDs.
Feeling Things : Sensors act as primary devices to collect data
from the environment.
Shrinking Things : Miniaturization and Nanotechnology has
provoked the ability of smaller things to interact and connect
within the “things” or “smart devices.”
Thinking Things : Embedded intelligence in devices through
sensors has formed the network connection to the Internet. It
can make the “things” realizing the intelligent control.
8
Current Status & Future Prospect of IoT
9
“Change is the only thing permanent in this world”
Different IOT Protocols
• IoT Data Link Protocol
• Network Layer Routing Protocols
• Network Layer Encapsulation Protocols
• Session Layer Protocols
IoT Data Link Protocol
• In this section, we discuss the datalink layer protocol standards. The
discussion includes physical (PHY) and MAC layer protocols which are
combined by most standards.
IEEE 802.15.4
• IEEE 802.15.4 is the most commonly used IoT standard for MAC. It
defines a frame format, headers including source and destination
addresses, and how nodes can communicate with each other. The
frame formats used in traditional networks are not suitable for low
power multi-hopnetworking in IoT due to their overhead. In 2008,
IEEE802.15.4e was created to extend IEEE802.15.4 and support low
power communication. It uses time synchronization and channel
hopping to enable high reliability, low cost and meet IoT
communications requirements. Its specific MAC features can be
summarized as follows [802.15.4]:
Specific MAC features can be summarized as follows
[802.15.4]:
• Scheduling: The standard does not define how the scheduling is done but it needs to be
built carefully such that it handles mobility scenarios. It can be centralized by a manager
node which is responsible for building the schedule, informing others about the schedule
and other nodes will just follow the schedule
• Synchronization: Synchronization is necessary to maintain nodes’ connectivity to their
neighbors and to the gateways. Two approaches can be used: acknowledgment-based or
frame-based synchronization. In acknowledgement-based mode, the nodes are already
in communication and they send acknowledgment for reliability guarantees, thus can be
used to maintain connectivity as well. In frame-based mode, nodes are not
communicating and hence, they send an empty frame at pre-specified intervals (about
30second typically).
WirelessHART
• WirelessHART is a datalink protocol that operates on the top of IEEE 802.15.4
PHY and adoptsvTime Division Multiple Access (TDMA) in its MAC. It is a
secure and reliable MAC protocol that uses advanced encryption to encrypt
the messages and calculate the integrity in order to offer reliability. The
architecture, as shown in Figure 3 consists of a network manager, a security
manager, a gateway to connect the wireless network to the wired networks,
wireless devices as field devices, access points, routers and adapters. The
standard offers end-to-end, per-hop or peer-to- peer security mechanisms.
End to end security mechanisms enforce security from sources to destinations
while per-hop mechanisms secure it to next hop only[Kim08, Raza10].
Z-Wave
Z-Wave is a low-power MAC protocol designed for home automation
and has been used for IoT communication, especially for smart home
and small commercial domains. It covers about 30- meter point-to-
point communication and is suitable for small messages in IoT
applications, like light control, energy control, wearable healthcare
control and others. It uses CSMA/CA for collision detection and ACK
messages for reliable transmission. It follows a master/slave
architecture in which the master control the slaves, send them
commands, and handling scheduling of the whole network [Z-Wave].
Bluetooth Low Energy
• Bluetooth low energy or Bluetooth smart is a short range communication
protocol with PHY and MAC layer widely used for in-vehicle networking. Its
low energy can reach ten times less than the classic Bluetooth while its
latency can reach 15 times. Its access control uses a contentionless MAC with
low latency and fast transmission. It follows master/slave architecture and
offers two types of frames: adverting and data frames. The Advertising frame
is used for discovery and is sent by slaves on one or more of dedicated
advertisement channels. Master nodes sense advertisement channels to find
slaves and connect them. After connection, the master tells the slave it’s
waking cycle and scheduling sequence. Nodes are usually awake only when
they are communicating and they go to sleep otherwise to save their power
[Decuir10, Gomez12].
Network Layer Routing Protocols
• In this section, we discuss some standard and non-standard protocols
that are used for routing in IoT applications. It should be noted that
we have partitioned the network layer in two sublayers:
• routing layer which handles the transfer the packets from source to
destination, and an
• encapsulation layer that forms the packets. Encapsulation
mechanisms will be discussed in the next section.
RPL
Routing Protocol for Low-Power and Lossy Networks (RPL) is distance-vector protocol that
can support a variety of datalink protocols, including the ones discussed in the previous
section. It builds a Destination Oriented Directed Acyclic Graph (DODAG) that has only one
route from each leaf node to the root in which all the traffic from the node will be routed to.
At first, each node sends a DODAG Information Object (DIO) advertising itself as the root.
This message is propagated in the network and the whole DODAG is gradually built. When
communicating, the node sends a Destination Advertisement Object (DAO) to its parents,
the DAO is propagated to the root and the root decides where to send it depending on the
destination. When a new node wants to join the network, it sends a DODAG Information
Solicitation (DIS) request to join the network and the root will reply back with a DAO
Acknowledgment (DAO-ACK) confirming the join. RPL nodes can be stateless, which is most
common, or stateful. A stateless node keeps tracks of its parents only. Only root has the
complete knowledge of the entire DODAG. Hence, all communications go through the root
in every case. A stateful node keeps track of its children and parents and hence when
communicating inside a sub-tree of the DODAG, it does not have to go through the root
[RFC6550].
CORPL
• An extension of RPL is CORPL, or cognitive RPL, which is designed for cognitive
networks and uses DODAG topology generation but with two new modifications
to RPL. CORPL utilizes opportunistic forwarding to forward the packet by choosing
multiple forwarders (forwarder set) and coordinates between the nodes to
choose the best next hop to forward the packet to. DODAG is built in the same
way as RPL. Each node maintains a forwarding set instead of its parent only and
updates its neighbor with its changes using DIO messages. Based on the updated
information, each node dynamically updates its neighbor priorities in order to
construct the forwarder set [Aijaz15].
CARP
• Channel-Aware Routing Protocol (CARP) is a distributed routing protocol designed for
underwater communication. It can be used for IoT due to its lightweight packets. It considers
link quality, which is computed based on historical successful data transmission gathered
fromneighboring sensors, to select the forwarding nodes. There are two scenarios: network
initialization and data forwarding. In network initialization, a HELLO packet is broadcasted from
the sink to all other nodes in the networks. In data forwarding, the packet is routed from sensor
to sink in a hop- by-hop fashion. Each next hop is determined independently. The main problem
with CARP is that it does not support reusability of previously collected data. In other words, if
the application requires sensor data only when it changes significantly, then CARP
dataforwarding is not beneficial to that specific application. An enhancement of CARP was done
in E-CARP by allowing the sink node to save previously received sensory data. When new data
is needed, E-CARP sends a Ping packet which is replied with the data from the sensors nodes.
Thus, E-CARP reduces the communication overhead drastically [Shou15].
Network Layer Encapsulation Protocols
• One problem in IoT applications is that IPv6 addresses are too long
and cannot fit in most IoT datalink frames which are relatively much
smaller. Hence, IETF is developing a set of standards to encapsulate
IPv6 datagrams in different datalink layer frames for use in IoT
applications. In this section, we review these mechanisms briefly.
6LoWPAN
• IPv6 over Low power Wireless Personal Area Network (6LoWPAN) is
the first and most commonly used standard in this category. It
efficiently encapsulates IPv6 long headers in IEEE802.15.4 small
packets, which cannot exceed 128 bytes. The specification supports
different length addresses, low bandwidth, different topologies
including star or mesh, power consumption, low cost, scalable
networks, mobility, unreliability and long sleep time.
6TiSCH
• 6TiSCH working group in IETF is developing standards
to allow IPv6 to pass through TimeSlotted Channel
Hopping (TSCH) mode of IEEE 802.15.4e datalinks. It
defines a Channel Distribution usage matrix consisting
of available frequencies in columns and time-slots
available for network scheduling operations in rows.
This matrix is portioned into chucks where each chunk
contains time and frequencies and is globally known
to all nodes in the network.
Session Layer Protocols
• This section reviews standards and protocols for message passing in
IoT session layer proposed by different standardization organizations.
Most of the IP applications, including IoT applications use TCP or UDP
for transport. However, there are several message distribution
functions that are common among many IoT applications; it is
desirable that these functions be implemented in an interoperable
standard ways by different applications. These are the so called
“Session Layer” protocols described in this section.
MQTT
• Message Queue Telemetry Transport (MQTT) was introduced by IBM in 1999
and standardized by OASIS in 2013 [Locke10 , Karagiannis15]. It is designed to
provide embedded connectivity between applications and middleware’s on
one side and networks and communications on the other side. It follows a
publish/subscribe architecture, as shown in Figure 5 , where the system
consists of three main components: publishers, subscribers, and a broker.
From IoT point of view, publishers are basically the lightweight sensors that
connect to the broker to send their data and go back to sleep whenever
possible. Subscribers are applications that are interested in a certain topic, or
sensory data, so they connect to brokers to be informed whenever new data
are received. The brokers classify sensory data in topics and send them to
subscribers interested inthe topics
SMQTT
• An extension of MQTT is Secure MQTT (SMQTT) which uses encryption based
on lightweight attribute based encryption. The main advantage of using such
encryption is the broadcast encryption feature, in which one message is
encrypted and delivered to multiple other nodes, which is quite common in
IoT applications. In general, the algorithm consists of four main stages: setup,
encryption, publish and decryption. In the setup phase, the subscribers and
publishers register themselves to the broker and get a master secret key
according to their developer’s choice of key generation algorithm. Then, when
the data is published, it is encrypted, published by the broker which sends it
to the subscribers and finally decrypted at the subscribers which have the
same master secret key. The key generation and encryption algorithms are not
standardized. SMQTT is proposed only to enhance MQTT security feature
[Singh15].
AMQP
The Advanced Message Queuing Protocol (AMQP) is another session
layer protocol that was designed for financial industry. It runs over TCP
and provides a publish/ subscribe architecture which is similar to that
of MQTT. The difference is that the broker is divided into two main
components: exchange and queues, as shown in Figure 6. The exchange
is responsible for receiving publisher messages and distributing them
to queues based on pre-defined roles and conditions. Queues basically
represent the topics and subscribed by subscribers which will get the
sensory data whenever they are available in the queue [AMQP12].
CoAP
The Constrained Application Protocol (CoAP) is another session layer protocol
designed by IETF Constrained RESTful Environment (Core) working group to
provide lightweight RESTful (HTTP) interface. Representational State Transfer
(REST) is the standard interface between HTTP client and servers. However, for
lightweight applications such as IoT, REST could result in significant overhead
and power consumption. CoAP is designed to enable low-power sensors to use
RESTful services while meeting their power constrains. It is built over UDP,
instead of TCP commonly used in HTTP and has a light mechanism to provide
reliability. CoAP architecture is divided into two main sublayers: messaging and
request/response. The messaging sublayer is responsible for reliability and
duplication of messages while the request/response sublayer is responsible for
communication. As shown in Figure 7 , CoAP has four messaging modes:
confirmable, non- confirmable, piggyback and separate
CoAP
• Confirmable and nonconfirmable modes represent the reliable and
unreliable transmissions, respectively while theother modes are used
for request/response. Piggyback is used for client/server direct
communication where the server sends its response directly after
receiving the message, i.e., within the acknowledgment message. On
the other hand, the separate mode is used when the server response
comes in a message separate from the acknowledgment, and may
take some time to be sent by the server. As in HTTP, CoAP utilizes GET,
PUT, PUSH, DELETE messages requests to retrieve, create, update,
and delete, respectively
XMPP
• Extensible Messaging and Presence Protocol (XMPP) is a messaging protocol that
was designed originally for chatting and message exchange applications. It was
standardized by IETF more than a decade ago. Hence, it is well known and has
proven to be highly efficient over the internet. Recently, it has been reused for
IoT applications as well as a protocol for SDN. This reusing of the same standard is
due to its use of XML which makes it easily extensible. XMPP supports both
publish/ subscribe and request/ response architecture and it is up to the
application developer to choose which architecture to use. It is designed for near
real-time applications and, thus, efficiently supports low-latency small messages.
It does not provide any quality of service guarantees and, hence, is not practical
for M2M communications. Moreover, XML messages create additional overhead
due to lots of headers and tag formats which increase the power consumption
that is critical for IoT application. Hence, XMPP is rarely used in IoT but hasgained
some interest for enhancing its architecture in order to support IoT applications.
THANK YOU
35

More Related Content

What's hot

Protocols for IoT
Protocols for IoTProtocols for IoT
Protocols for IoT
Aravindhan G K
 
Iot architecture
Iot architectureIot architecture
Iot architecture
Anam Iqbal
 
Seminar report of optical ethernet
Seminar report of optical ethernetSeminar report of optical ethernet
Seminar report of optical ethernetMohammad Waziruddin
 
CoAP protocol -Internet of Things(iot)
CoAP protocol -Internet of Things(iot)CoAP protocol -Internet of Things(iot)
CoAP protocol -Internet of Things(iot)
Sabahat Nowreen Shaik
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoT
FabMinds
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
Ashutosh Bhardwaj
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
Hitesh Mohapatra
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
pavan penugonda
 
Protocols for IoT
Protocols for IoTProtocols for IoT
Protocols for IoT
Amit Dev
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizations
FabMinds
 
RFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSRFID with INTERNET OF THINGS
RFID with INTERNET OF THINGS
Bino Mathew Varghese
 
6lowpan
6lowpan6lowpan
Unit 4
Unit 4Unit 4
Data enrichment
Data enrichmentData enrichment
Data enrichment
FabMinds
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
Zakaria Hossain
 
6LoWPAN
6LoWPAN 6LoWPAN
Nb iot presentation
Nb iot presentationNb iot presentation
Nb iot presentation
manoj pradhan
 

What's hot (20)

Protocols for IoT
Protocols for IoTProtocols for IoT
Protocols for IoT
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
Seminar report of optical ethernet
Seminar report of optical ethernetSeminar report of optical ethernet
Seminar report of optical ethernet
 
Wot
WotWot
Wot
 
CoAP protocol -Internet of Things(iot)
CoAP protocol -Internet of Things(iot)CoAP protocol -Internet of Things(iot)
CoAP protocol -Internet of Things(iot)
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoT
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
Protocols for IoT
Protocols for IoTProtocols for IoT
Protocols for IoT
 
802 15-4 tutorial
802 15-4 tutorial802 15-4 tutorial
802 15-4 tutorial
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizations
 
RFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSRFID with INTERNET OF THINGS
RFID with INTERNET OF THINGS
 
6lowpan
6lowpan6lowpan
6lowpan
 
Unit 4
Unit 4Unit 4
Unit 4
 
Data enrichment
Data enrichmentData enrichment
Data enrichment
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
 
6LoWPAN
6LoWPAN 6LoWPAN
6LoWPAN
 
LoRa and NB-IoT
LoRa and NB-IoT LoRa and NB-IoT
LoRa and NB-IoT
 
Nb iot presentation
Nb iot presentationNb iot presentation
Nb iot presentation
 

Viewers also liked

IoT transport protocols
IoT transport protocolsIoT transport protocols
IoT transport protocols
Gwenole Gendrot
 
The Role of the Communication Protocols in the IoT: Pitfalls and Advantages
The Role of the Communication Protocols in the IoT: Pitfalls and AdvantagesThe Role of the Communication Protocols in the IoT: Pitfalls and Advantages
The Role of the Communication Protocols in the IoT: Pitfalls and Advantages
Fabio Gatti
 
Iot current solution banchmark
Iot current solution banchmarkIot current solution banchmark
Iot current solution banchmark
Fabio Gatti
 
Standards Drive the Internet of Things
Standards Drive the Internet of ThingsStandards Drive the Internet of Things
Standards Drive the Internet of Things
zdshelby
 
OMA Lightweight M2M Tutorial
OMA Lightweight M2M TutorialOMA Lightweight M2M Tutorial
OMA Lightweight M2M Tutorial
zdshelby
 
Iot protocols seminar
Iot protocols seminarIot protocols seminar
Iot protocols seminar
Makarand Badgujar
 
Introduction to Embedded System
Introduction to Embedded SystemIntroduction to Embedded System
Introduction to Embedded System
Emertxe Information Technologies Pvt Ltd
 
Arm processor
Arm processorArm processor
Arm processor
SHREEHARI WADAWADAGI
 
Inheritance in OOPS
Inheritance in OOPSInheritance in OOPS
Inheritance in OOPS
Ronak Chhajed
 
Embedded C - Optimization techniques
Embedded C - Optimization techniquesEmbedded C - Optimization techniques
Embedded C - Optimization techniques
Emertxe Information Technologies Pvt Ltd
 
Multiple Inheritance
Multiple InheritanceMultiple Inheritance
Multiple Inheritance
adil raja
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetooth
Sonali Parab
 
I2C Protocol
I2C ProtocolI2C Protocol
I2C Protocol
Abhijeet kapse
 
Compiler in System Programming/Code Optimization techniques in System Program...
Compiler in System Programming/Code Optimization techniques in System Program...Compiler in System Programming/Code Optimization techniques in System Program...
Compiler in System Programming/Code Optimization techniques in System Program...
Janki Shah
 
Object-Oriented Design: Multiple inheritance (C++ and C#)
Object-Oriented Design: Multiple inheritance (C++ and C#)Object-Oriented Design: Multiple inheritance (C++ and C#)
Object-Oriented Design: Multiple inheritance (C++ and C#)
Adair Dingle
 
I2C programming with C and Arduino
I2C programming with C and ArduinoI2C programming with C and Arduino
I2C programming with C and Arduino
sato262
 
Serial Peripheral Interface
Serial Peripheral InterfaceSerial Peripheral Interface
Serial Peripheral Interface
Anurag Tomar
 
SPI Protocol
SPI ProtocolSPI Protocol
SPI Protocol
Anurag Tomar
 
Arm developement
Arm developementArm developement
Arm developement
hirokiht
 
Embedded C
Embedded CEmbedded C

Viewers also liked (20)

IoT transport protocols
IoT transport protocolsIoT transport protocols
IoT transport protocols
 
The Role of the Communication Protocols in the IoT: Pitfalls and Advantages
The Role of the Communication Protocols in the IoT: Pitfalls and AdvantagesThe Role of the Communication Protocols in the IoT: Pitfalls and Advantages
The Role of the Communication Protocols in the IoT: Pitfalls and Advantages
 
Iot current solution banchmark
Iot current solution banchmarkIot current solution banchmark
Iot current solution banchmark
 
Standards Drive the Internet of Things
Standards Drive the Internet of ThingsStandards Drive the Internet of Things
Standards Drive the Internet of Things
 
OMA Lightweight M2M Tutorial
OMA Lightweight M2M TutorialOMA Lightweight M2M Tutorial
OMA Lightweight M2M Tutorial
 
Iot protocols seminar
Iot protocols seminarIot protocols seminar
Iot protocols seminar
 
Introduction to Embedded System
Introduction to Embedded SystemIntroduction to Embedded System
Introduction to Embedded System
 
Arm processor
Arm processorArm processor
Arm processor
 
Inheritance in OOPS
Inheritance in OOPSInheritance in OOPS
Inheritance in OOPS
 
Embedded C - Optimization techniques
Embedded C - Optimization techniquesEmbedded C - Optimization techniques
Embedded C - Optimization techniques
 
Multiple Inheritance
Multiple InheritanceMultiple Inheritance
Multiple Inheritance
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetooth
 
I2C Protocol
I2C ProtocolI2C Protocol
I2C Protocol
 
Compiler in System Programming/Code Optimization techniques in System Program...
Compiler in System Programming/Code Optimization techniques in System Program...Compiler in System Programming/Code Optimization techniques in System Program...
Compiler in System Programming/Code Optimization techniques in System Program...
 
Object-Oriented Design: Multiple inheritance (C++ and C#)
Object-Oriented Design: Multiple inheritance (C++ and C#)Object-Oriented Design: Multiple inheritance (C++ and C#)
Object-Oriented Design: Multiple inheritance (C++ and C#)
 
I2C programming with C and Arduino
I2C programming with C and ArduinoI2C programming with C and Arduino
I2C programming with C and Arduino
 
Serial Peripheral Interface
Serial Peripheral InterfaceSerial Peripheral Interface
Serial Peripheral Interface
 
SPI Protocol
SPI ProtocolSPI Protocol
SPI Protocol
 
Arm developement
Arm developementArm developement
Arm developement
 
Embedded C
Embedded CEmbedded C
Embedded C
 

Similar to Iot

Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
Dr.M.Karthika parthasarathy
 
Chapter 1 pdf
Chapter 1 pdfChapter 1 pdf
Chapter 1 pdf
ChAnushaECE
 
Internet of things unit-1
Internet of things unit-1Internet of things unit-1
Internet of things unit-1
Srimatre K
 
7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf
Gaurav Sharma
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
JoshuaKimmich1
 
IOT ajay binay.pdf
IOT ajay binay.pdfIOT ajay binay.pdf
IOT ajay binay.pdf
MaaheenKashish
 
Iot
IotIot
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
parveen837153
 
IOT.pdf
IOT.pdfIOT.pdf
IOT.pdf
HarshNagda5
 
Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hyd
Kishore5511
 
IOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxIOT Network architecture and Design.pptx
IOT Network architecture and Design.pptx
MeghaShree665225
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
TELKOMNIKA JOURNAL
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
MD.ANISUR RAHMAN
 
IoT.pptx .in this we can see about more details
IoT.pptx .in this we can see about more detailsIoT.pptx .in this we can see about more details
IoT.pptx .in this we can see about more details
HEARTSPORTS
 
Internet of things a survey on enabling technologies, protocols and applicat...
Internet of things  a survey on enabling technologies, protocols and applicat...Internet of things  a survey on enabling technologies, protocols and applicat...
Internet of things a survey on enabling technologies, protocols and applicat...
Mustafa Sadiq
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
PrarthanaModak1
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
Manikandan Kandasamy
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Karthic C M
 

Similar to Iot (20)

IoT _protocols.ppt
IoT _protocols.pptIoT _protocols.ppt
IoT _protocols.ppt
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
Chapter 1 pdf
Chapter 1 pdfChapter 1 pdf
Chapter 1 pdf
 
Internet of things unit-1
Internet of things unit-1Internet of things unit-1
Internet of things unit-1
 
7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
IOT ajay binay.pdf
IOT ajay binay.pdfIOT ajay binay.pdf
IOT ajay binay.pdf
 
Iot
IotIot
Iot
 
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
 
IOT.pdf
IOT.pdfIOT.pdf
IOT.pdf
 
Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hyd
 
IOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxIOT Network architecture and Design.pptx
IOT Network architecture and Design.pptx
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
 
IoT.pptx .in this we can see about more details
IoT.pptx .in this we can see about more detailsIoT.pptx .in this we can see about more details
IoT.pptx .in this we can see about more details
 
Internet of things a survey on enabling technologies, protocols and applicat...
Internet of things  a survey on enabling technologies, protocols and applicat...Internet of things  a survey on enabling technologies, protocols and applicat...
Internet of things a survey on enabling technologies, protocols and applicat...
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approach
 

More from Ankit Anand

Voice oriented data communication
Voice oriented data communicationVoice oriented data communication
Voice oriented data communication
Ankit Anand
 
Wireless gateways and mobile appl. servers
Wireless gateways and mobile appl. serversWireless gateways and mobile appl. servers
Wireless gateways and mobile appl. servers
Ankit Anand
 
Internet protocol security
Internet protocol securityInternet protocol security
Internet protocol security
Ankit Anand
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
Ankit Anand
 
Wtls
WtlsWtls
Wap wml-6
Wap wml-6Wap wml-6
Wap wml-6
Ankit Anand
 
Data (1)
Data (1)Data (1)
Data (1)
Ankit Anand
 
Mc seminar
Mc seminarMc seminar
Mc seminar
Ankit Anand
 
Mcseminar
McseminarMcseminar
Mcseminar
Ankit Anand
 
Middleware final
Middleware finalMiddleware final
Middleware final
Ankit Anand
 
Web services
Web servicesWeb services
Web services
Ankit Anand
 
Wap wml
Wap wmlWap wml
Wap wml
Ankit Anand
 
Vpn 3
Vpn 3Vpn 3
Enhanced data gsm environment
Enhanced data gsm environmentEnhanced data gsm environment
Enhanced data gsm environment
Ankit Anand
 
Seminar gprs
Seminar gprsSeminar gprs
Seminar gprs
Ankit Anand
 
Seminar mc palm
Seminar mc palmSeminar mc palm
Seminar mc palm
Ankit Anand
 
Guided media
Guided mediaGuided media
Guided media
Ankit Anand
 
12 mobile os
12 mobile os12 mobile os
12 mobile os
Ankit Anand
 

More from Ankit Anand (20)

Voice oriented data communication
Voice oriented data communicationVoice oriented data communication
Voice oriented data communication
 
Wireless gateways and mobile appl. servers
Wireless gateways and mobile appl. serversWireless gateways and mobile appl. servers
Wireless gateways and mobile appl. servers
 
Internet protocol security
Internet protocol securityInternet protocol security
Internet protocol security
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Wtls
WtlsWtls
Wtls
 
Wap wml-6
Wap wml-6Wap wml-6
Wap wml-6
 
Data (1)
Data (1)Data (1)
Data (1)
 
Mc
McMc
Mc
 
Mc seminar
Mc seminarMc seminar
Mc seminar
 
Mcseminar
McseminarMcseminar
Mcseminar
 
Middleware final
Middleware finalMiddleware final
Middleware final
 
Web services
Web servicesWeb services
Web services
 
Wap wml
Wap wmlWap wml
Wap wml
 
Vpn 3
Vpn 3Vpn 3
Vpn 3
 
Vpn
VpnVpn
Vpn
 
Enhanced data gsm environment
Enhanced data gsm environmentEnhanced data gsm environment
Enhanced data gsm environment
 
Seminar gprs
Seminar gprsSeminar gprs
Seminar gprs
 
Seminar mc palm
Seminar mc palmSeminar mc palm
Seminar mc palm
 
Guided media
Guided mediaGuided media
Guided media
 
12 mobile os
12 mobile os12 mobile os
12 mobile os
 

Recently uploaded

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 

Recently uploaded (20)

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 

Iot

  • 1. Protocols of IoT Ankit Anand 7th Sem., B.Tech. (IT), S.O.E., CUSAT. 26-09-2017 1
  • 2. Topics in this Presentation What is Internet of Things? How IoT Works? Current Status & Future Prospect of IoT The Future of IoT  IoT Data Link Protocol Network Layer Routing Protocols  Network Layer Encapsulation Protocols  Session Layer Protocols 2
  • 3. What is IoT? The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data. IoT allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration between the physical world and computer-based systems, and resulting in improved efficiency, accuracy and economic benefit. 3
  • 4. "Things," in the IoT sense, can refer to a wide variety of devices such as heart monitoring implants, biochip transponders on farm animals, electric clams in coastal waters, automobiles with built-in sensors, DNA analysis devices for environmental/food/pathogen monitoring or field operation devices that assist fire-fighters in search and rescue operations. These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices. 4
  • 5. The concept of the Internet of Things first became popular in 1999, through the Auto-ID Center at MIT and related market-analysis publications. R Radio-frequency identification (RFID) was seen as a prerequisite for the IoT at that point. If all objects and people in daily life were equipped with identifiers, computers could manage and inventory them. Besides using RFID, the tagging of things may be achieved through such technologies as near field communication, barcodes, QR codes, bluetooth, and digital watermarking. History of IoT 5
  • 6. How IoT Works? Internet of Things is not the result of a single novel technology; instead, several complementary technical developments provide capabilities that taken together help to bridge the gap between the virtual and physical world. These capabilities include: Communication and cooperation Addressability Identification Sensing Actuation Embedded information processing Localization User interfaces 6
  • 7. How IoT Works? 7 RFID Sensor Smart Tech Nano Tech To identify and track the data of things To collect and process the data to detect the changes in the physical status of things To enhance the power of the network by devolving processing capabilities to different part of the network. To make the smaller and smaller things have the ability to connect and interact.
  • 8. The Structure of IoT The IoT can be viewed as a gigantic network consisting of networks of devices and computers connected through a series of intermediate technologies where numerous technologies like RFIDs, wireless connections may act as enablers of this connectivity. Tagging Things : Real-time item traceability and addressability by RFIDs. Feeling Things : Sensors act as primary devices to collect data from the environment. Shrinking Things : Miniaturization and Nanotechnology has provoked the ability of smaller things to interact and connect within the “things” or “smart devices.” Thinking Things : Embedded intelligence in devices through sensors has formed the network connection to the Internet. It can make the “things” realizing the intelligent control. 8
  • 9. Current Status & Future Prospect of IoT 9 “Change is the only thing permanent in this world”
  • 10. Different IOT Protocols • IoT Data Link Protocol • Network Layer Routing Protocols • Network Layer Encapsulation Protocols • Session Layer Protocols
  • 11. IoT Data Link Protocol • In this section, we discuss the datalink layer protocol standards. The discussion includes physical (PHY) and MAC layer protocols which are combined by most standards.
  • 12. IEEE 802.15.4 • IEEE 802.15.4 is the most commonly used IoT standard for MAC. It defines a frame format, headers including source and destination addresses, and how nodes can communicate with each other. The frame formats used in traditional networks are not suitable for low power multi-hopnetworking in IoT due to their overhead. In 2008, IEEE802.15.4e was created to extend IEEE802.15.4 and support low power communication. It uses time synchronization and channel hopping to enable high reliability, low cost and meet IoT communications requirements. Its specific MAC features can be summarized as follows [802.15.4]:
  • 13. Specific MAC features can be summarized as follows [802.15.4]: • Scheduling: The standard does not define how the scheduling is done but it needs to be built carefully such that it handles mobility scenarios. It can be centralized by a manager node which is responsible for building the schedule, informing others about the schedule and other nodes will just follow the schedule • Synchronization: Synchronization is necessary to maintain nodes’ connectivity to their neighbors and to the gateways. Two approaches can be used: acknowledgment-based or frame-based synchronization. In acknowledgement-based mode, the nodes are already in communication and they send acknowledgment for reliability guarantees, thus can be used to maintain connectivity as well. In frame-based mode, nodes are not communicating and hence, they send an empty frame at pre-specified intervals (about 30second typically).
  • 14. WirelessHART • WirelessHART is a datalink protocol that operates on the top of IEEE 802.15.4 PHY and adoptsvTime Division Multiple Access (TDMA) in its MAC. It is a secure and reliable MAC protocol that uses advanced encryption to encrypt the messages and calculate the integrity in order to offer reliability. The architecture, as shown in Figure 3 consists of a network manager, a security manager, a gateway to connect the wireless network to the wired networks, wireless devices as field devices, access points, routers and adapters. The standard offers end-to-end, per-hop or peer-to- peer security mechanisms. End to end security mechanisms enforce security from sources to destinations while per-hop mechanisms secure it to next hop only[Kim08, Raza10].
  • 15.
  • 16. Z-Wave Z-Wave is a low-power MAC protocol designed for home automation and has been used for IoT communication, especially for smart home and small commercial domains. It covers about 30- meter point-to- point communication and is suitable for small messages in IoT applications, like light control, energy control, wearable healthcare control and others. It uses CSMA/CA for collision detection and ACK messages for reliable transmission. It follows a master/slave architecture in which the master control the slaves, send them commands, and handling scheduling of the whole network [Z-Wave].
  • 17. Bluetooth Low Energy • Bluetooth low energy or Bluetooth smart is a short range communication protocol with PHY and MAC layer widely used for in-vehicle networking. Its low energy can reach ten times less than the classic Bluetooth while its latency can reach 15 times. Its access control uses a contentionless MAC with low latency and fast transmission. It follows master/slave architecture and offers two types of frames: adverting and data frames. The Advertising frame is used for discovery and is sent by slaves on one or more of dedicated advertisement channels. Master nodes sense advertisement channels to find slaves and connect them. After connection, the master tells the slave it’s waking cycle and scheduling sequence. Nodes are usually awake only when they are communicating and they go to sleep otherwise to save their power [Decuir10, Gomez12].
  • 18. Network Layer Routing Protocols • In this section, we discuss some standard and non-standard protocols that are used for routing in IoT applications. It should be noted that we have partitioned the network layer in two sublayers: • routing layer which handles the transfer the packets from source to destination, and an • encapsulation layer that forms the packets. Encapsulation mechanisms will be discussed in the next section.
  • 19. RPL Routing Protocol for Low-Power and Lossy Networks (RPL) is distance-vector protocol that can support a variety of datalink protocols, including the ones discussed in the previous section. It builds a Destination Oriented Directed Acyclic Graph (DODAG) that has only one route from each leaf node to the root in which all the traffic from the node will be routed to. At first, each node sends a DODAG Information Object (DIO) advertising itself as the root. This message is propagated in the network and the whole DODAG is gradually built. When communicating, the node sends a Destination Advertisement Object (DAO) to its parents, the DAO is propagated to the root and the root decides where to send it depending on the destination. When a new node wants to join the network, it sends a DODAG Information Solicitation (DIS) request to join the network and the root will reply back with a DAO Acknowledgment (DAO-ACK) confirming the join. RPL nodes can be stateless, which is most common, or stateful. A stateless node keeps tracks of its parents only. Only root has the complete knowledge of the entire DODAG. Hence, all communications go through the root in every case. A stateful node keeps track of its children and parents and hence when communicating inside a sub-tree of the DODAG, it does not have to go through the root [RFC6550].
  • 20. CORPL • An extension of RPL is CORPL, or cognitive RPL, which is designed for cognitive networks and uses DODAG topology generation but with two new modifications to RPL. CORPL utilizes opportunistic forwarding to forward the packet by choosing multiple forwarders (forwarder set) and coordinates between the nodes to choose the best next hop to forward the packet to. DODAG is built in the same way as RPL. Each node maintains a forwarding set instead of its parent only and updates its neighbor with its changes using DIO messages. Based on the updated information, each node dynamically updates its neighbor priorities in order to construct the forwarder set [Aijaz15].
  • 21. CARP • Channel-Aware Routing Protocol (CARP) is a distributed routing protocol designed for underwater communication. It can be used for IoT due to its lightweight packets. It considers link quality, which is computed based on historical successful data transmission gathered fromneighboring sensors, to select the forwarding nodes. There are two scenarios: network initialization and data forwarding. In network initialization, a HELLO packet is broadcasted from the sink to all other nodes in the networks. In data forwarding, the packet is routed from sensor to sink in a hop- by-hop fashion. Each next hop is determined independently. The main problem with CARP is that it does not support reusability of previously collected data. In other words, if the application requires sensor data only when it changes significantly, then CARP dataforwarding is not beneficial to that specific application. An enhancement of CARP was done in E-CARP by allowing the sink node to save previously received sensory data. When new data is needed, E-CARP sends a Ping packet which is replied with the data from the sensors nodes. Thus, E-CARP reduces the communication overhead drastically [Shou15].
  • 22. Network Layer Encapsulation Protocols • One problem in IoT applications is that IPv6 addresses are too long and cannot fit in most IoT datalink frames which are relatively much smaller. Hence, IETF is developing a set of standards to encapsulate IPv6 datagrams in different datalink layer frames for use in IoT applications. In this section, we review these mechanisms briefly.
  • 23. 6LoWPAN • IPv6 over Low power Wireless Personal Area Network (6LoWPAN) is the first and most commonly used standard in this category. It efficiently encapsulates IPv6 long headers in IEEE802.15.4 small packets, which cannot exceed 128 bytes. The specification supports different length addresses, low bandwidth, different topologies including star or mesh, power consumption, low cost, scalable networks, mobility, unreliability and long sleep time.
  • 24. 6TiSCH • 6TiSCH working group in IETF is developing standards to allow IPv6 to pass through TimeSlotted Channel Hopping (TSCH) mode of IEEE 802.15.4e datalinks. It defines a Channel Distribution usage matrix consisting of available frequencies in columns and time-slots available for network scheduling operations in rows. This matrix is portioned into chucks where each chunk contains time and frequencies and is globally known to all nodes in the network.
  • 25. Session Layer Protocols • This section reviews standards and protocols for message passing in IoT session layer proposed by different standardization organizations. Most of the IP applications, including IoT applications use TCP or UDP for transport. However, there are several message distribution functions that are common among many IoT applications; it is desirable that these functions be implemented in an interoperable standard ways by different applications. These are the so called “Session Layer” protocols described in this section.
  • 26. MQTT • Message Queue Telemetry Transport (MQTT) was introduced by IBM in 1999 and standardized by OASIS in 2013 [Locke10 , Karagiannis15]. It is designed to provide embedded connectivity between applications and middleware’s on one side and networks and communications on the other side. It follows a publish/subscribe architecture, as shown in Figure 5 , where the system consists of three main components: publishers, subscribers, and a broker. From IoT point of view, publishers are basically the lightweight sensors that connect to the broker to send their data and go back to sleep whenever possible. Subscribers are applications that are interested in a certain topic, or sensory data, so they connect to brokers to be informed whenever new data are received. The brokers classify sensory data in topics and send them to subscribers interested inthe topics
  • 27.
  • 28. SMQTT • An extension of MQTT is Secure MQTT (SMQTT) which uses encryption based on lightweight attribute based encryption. The main advantage of using such encryption is the broadcast encryption feature, in which one message is encrypted and delivered to multiple other nodes, which is quite common in IoT applications. In general, the algorithm consists of four main stages: setup, encryption, publish and decryption. In the setup phase, the subscribers and publishers register themselves to the broker and get a master secret key according to their developer’s choice of key generation algorithm. Then, when the data is published, it is encrypted, published by the broker which sends it to the subscribers and finally decrypted at the subscribers which have the same master secret key. The key generation and encryption algorithms are not standardized. SMQTT is proposed only to enhance MQTT security feature [Singh15].
  • 29. AMQP The Advanced Message Queuing Protocol (AMQP) is another session layer protocol that was designed for financial industry. It runs over TCP and provides a publish/ subscribe architecture which is similar to that of MQTT. The difference is that the broker is divided into two main components: exchange and queues, as shown in Figure 6. The exchange is responsible for receiving publisher messages and distributing them to queues based on pre-defined roles and conditions. Queues basically represent the topics and subscribed by subscribers which will get the sensory data whenever they are available in the queue [AMQP12].
  • 30.
  • 31. CoAP The Constrained Application Protocol (CoAP) is another session layer protocol designed by IETF Constrained RESTful Environment (Core) working group to provide lightweight RESTful (HTTP) interface. Representational State Transfer (REST) is the standard interface between HTTP client and servers. However, for lightweight applications such as IoT, REST could result in significant overhead and power consumption. CoAP is designed to enable low-power sensors to use RESTful services while meeting their power constrains. It is built over UDP, instead of TCP commonly used in HTTP and has a light mechanism to provide reliability. CoAP architecture is divided into two main sublayers: messaging and request/response. The messaging sublayer is responsible for reliability and duplication of messages while the request/response sublayer is responsible for communication. As shown in Figure 7 , CoAP has four messaging modes: confirmable, non- confirmable, piggyback and separate
  • 32. CoAP • Confirmable and nonconfirmable modes represent the reliable and unreliable transmissions, respectively while theother modes are used for request/response. Piggyback is used for client/server direct communication where the server sends its response directly after receiving the message, i.e., within the acknowledgment message. On the other hand, the separate mode is used when the server response comes in a message separate from the acknowledgment, and may take some time to be sent by the server. As in HTTP, CoAP utilizes GET, PUT, PUSH, DELETE messages requests to retrieve, create, update, and delete, respectively
  • 33.
  • 34. XMPP • Extensible Messaging and Presence Protocol (XMPP) is a messaging protocol that was designed originally for chatting and message exchange applications. It was standardized by IETF more than a decade ago. Hence, it is well known and has proven to be highly efficient over the internet. Recently, it has been reused for IoT applications as well as a protocol for SDN. This reusing of the same standard is due to its use of XML which makes it easily extensible. XMPP supports both publish/ subscribe and request/ response architecture and it is up to the application developer to choose which architecture to use. It is designed for near real-time applications and, thus, efficiently supports low-latency small messages. It does not provide any quality of service guarantees and, hence, is not practical for M2M communications. Moreover, XML messages create additional overhead due to lots of headers and tag formats which increase the power consumption that is critical for IoT application. Hence, XMPP is rarely used in IoT but hasgained some interest for enhancing its architecture in order to support IoT applications.