SlideShare a Scribd company logo
1 of 24
IoT Protocols: Making IoT Data Communication Seamless
• The protocols of the Internet of Things (IoT) technology stack
are essential as, without them, the hardware would be rendered
useless, and data communication would be a challenge.
IoT protocols by definition and vision
• IoT protocols aim to connect devices to IoT devices over a
seamless and secure connection.
• The IoT protocols operate on four pillars - device, connectivity,
data, and analytics.
• Their defense-in-depth security strategy shields the data
transmission layer by layer.
• While the business layer includes the management of billing
and data marketplaces, the people who interact with IoT
devices and technologies fall under the technology users layer.
• The device layer comprises a combination of sensors,
hardware, actuators, software, and gateways, constituting a
device that connects and interacts with a network.
• The data layer involves the data collected, processed, stored,
and analyzed in business contexts.
IoT protocols connection models
• There is no set pattern for data routing, and the communication
is highly dependent on the network topology.
• However, the fundamental models are used either as standalone
or in combinations for IoT deployments, including:
1. Device-to-device
• It enables communication between nearby devices (proximity)
using IoT Protocols like Bluetooth, ZigBee, Z-Wave, 4G, 5G,
and WiFi.
2. Device-to-gateway
• In this model, the devices communicate with the data system
using a mediator platform, such as LPWAN, WiFi, and/or
Ethernet IoT protocols.
• The core functions of device-to-gateway are combining data
from sensors, analyzing it, and routing it to the destination data
system (data center or cloud). Also, in case of any problem, the
connection model sends back the data to the source device.
3. Device-to-data
• It works on edge computing, allowing devices to connect
directly with the data source. A few popular device-to-data
connection models include BLE, LoRaWAN, and Z-Wave.
4. Gateway-to-data
• It is the simple communication between the mediator platform
or central hubs and the data center or cloud. Open Automation
Software (OAS) and Universal Data Connector are the best
examples of robust IoT Gateways.
5. Communication between data
• This protocol connection model allows data transmission
between the data center and the cloud. It includes IoT Data
protocols like MQTT, HTTP, REST, etc.
Types of IoT protocols
• IoT protocols and standards are broadly classified into two
separate categories, including IoT data protocols that have
presentation or application layers and network protocols for IoT
comprising datalink and physical layers:
1. IoT Data Protocols
• These protocols establish the end-to-end communication
between low-power IoT devices and the hardware at the source,
client, and/or user side, using only wired or cellular networks.
The IoT data protocols function without an internet connection:
1. Advanced Message Queuing Protocol (AMQP)
• AMQP is widely used in banking and finance as a message-
oriented open standard software protocol. It comprises three
crucial message components - Exchange, Queue, and Routing.
• It is based on the Transmission Control Protocol and works on
the architecture of "publish/subscribe" and "request/response"
types. In addition, the guaranteed delivery or transaction
message makes AMQP interoperable, secure, and reliable.
2. Data Distribution Service (DDS)
• DDS is a UDP based "publish/subscribe" API that facilitates
secure real-time M2M data sharing between the connected IoT
devices. Furthermore, it works on broker-less scalable
architecture (DCPS and DLRL), i.e., it operates independently
of any hardware or software platform.
• Its multi-purpose function simplifies IoT deployment for both
small devices and high-performance networks.
3. Extensible Messaging and Presence Protocol (XMPP)
• XMPP is a decentralized, open-source, and secure protocol
developed using XML language to enable real-time data
exchange.
• It operates as a presence indicator by reflecting the status of
available servers and devices. XMPP-IoT is a lightweight
version of XMPP and is the best for consumer-oriented IoT
deployments as it is extensible, scalable, and flexible.
4. WebSocket
• Introduced by HTML5, WebSocket is an event-triggered independent TCP-based IoT
protocol or API. It establishes full-duplex real-time communication between the
client and server.
• Using advanced technology streamlines complexities involved in the bi-directional
transmission over the internet. And, it is suitable to maintain constant connectivity
across heterogeneous IoT devices. Notably, WebSocket is much faster than HTTP
5. Open Platform Communications Unified Architecture (OPC UA)
• OPC UA is a next-generation data model technology ideal for Industry 4.0 and IoT. It
operates on a platform-independent, encrypted, and extensible multi-layered
architecture. In addition, its service-oriented framework supports both
"publish/subscribe" and "request/response" models.
• As per the latest press release published by OPC Foundation, leading IoT vendors
such as SIEMENS, SAP, Microsoft, IBM, AWS, and Google Cloud are already
leveraging OPC UA for edge-to-cloud applications.
II. IoT Network Protocols
• These protocols constitute specific standards, policies, and
unified rules to establish secured communication between IoT
devices over the internet.
• With emerging advancements in the IoT ecosystem, these
protocols utilize multiple technologies that work on network
topologies. The most widely used are star and mesh topologies.
Following are the extensively used IoT network protocols:
• 1. Bluetooth and BLE
• Bluetooth is the top choice for shorter-range wireless
communication, preferably for personal 2.4 GHz networks.
Bluetooth Low Energy (BLE) is its optimized version and the
standard protocol for IoT architecture.
• The latest version of Bluetooth is 5.3. It was released on 13th
July 2021 and is still in beta. Bluetooth best suits beacons,
fitness, automotive, retail, and audio IoT applications.
2. Cellular - 4G and 5G
• Cellular is a wireless mobile communication network technology that
facilitates large bandwidth and reliable broadband services.
• Currently, 3G is almost on the verge of extinction. On the other hand,
4G is leading but not suited for IoT applications due to higher cost
and power consumption.
• However, the new-age 5G is ideal for IoT applications across
industries and personal usage.
3. Wi-Fi and Wi-Fi HaLow
• WiFi is the most popular and conventional wireless network
protocol for home and commercial usage. But, it is not very
flexible and scalable for IoT purposes.
• WiFi HaLow (IEEE 802.11 ah) is a unique solution to overcome
its challenges. This high-level communication protocol provides
a long-range between 750 and 950 MHz with low-power
connectivity.
• 4. Low Power Wide Area Networks (LPWANs)
• LPWANs are a new set of wireless network protocols devised
to set up communication between low-power IoT applications
over long ranges.
• They are a cost-saving option because they operate on small
and affordable batteries that are long-lasting and power-
efficient.
• MIOTY, LoRaWAN, 6LoWPAN, Thread, NB-IoT, LTE-M,
SigFox, and HayStack are purpose-built LPWANs for large-
scale IoT deployments.
5. ZigBee
• ZigBee is a mesh wireless communication protocol that
operates on a 2.4 GHz network.
• It is short-range, highly interoperable, low-power consuming,
and facilitates massive data transfer in a single instance with
high security.
• ZigBee is most appropriate for small, and medium ranged IoT
devices such as microcontrollers, sensors, gateways, and so on.
• Notably, due to its mesh grid structural design, the connectivity
can be extended over a long distance using multi-hop routing.
• ZigBee is best suited for commercial building and innovative
home automation applications.
• Actually, it is the safest wireless protocol for transferring real-
time patient data from a sensor.
6. Z-Wave
• Similar to ZigBee, the Z-Wave protocol also works on mesh
network topology. However, it is most prominent for IoT home
automation applications.
• Z-Wave is a Radio Frequency (RF) based, less power-
consuming wireless communication technology that operates on
800-900 MHz and is purely location-dependent.
• As a result, it hardly faces any connectivity hindrance. It
facilitates safe and steady data transmission with low latency.
7. Extensible Messaging and Presence Protocol (XMPP)
• This technology dates back to the early 2000s and was designed for
real-time human-to-human communication. XMPP is now used for
M2M communication and for routing XML data.
• XMPP supports the real-time exchange of structured but extensible
data across multiple network entities, making it suitable for
consumer-oriented IoT deployments, such as smart appliances and
wearables.
• Other than the above-stated options, the network protocols such as
Lightweight M2M (LWM2M), Radio-frequency Identification
(RFID), Near Field Communication (NFC), Ethernet, and Wi-Sun
have contributed significantly towards setting up the sustainable
connection in the IoT space.
• Therefore, be it for home or commercial usage, the selection of an
ideal IoT network protocol must consider the parameters of
bandwidth, range, power consumption, latency, intermittent
connectivity, Quality of Service (QoS), and security.
• Benefits of IoT wireless protocols
• IoT protocols form a crucial component of the IoT infrastructure.
They serve higher data throughput with lesser complexities.
Wireless IoT protocols have become the first choice solution for
personal and industrial usage. The rising demand for wireless
IoT protocols is because of the core benefits:
• Affordability
• Less time and energy consumption
• Robust security and data privacy
• Good network coverage and connectivity
• Automated and streamlined communications
• Faster data transfer and smoother operations
• Easy setup and deployment in the IoT infrastructure
• Simple to use while resulting in enhanced productivity
IoT Protocol Layers
• IoT works on various networking technologies based on the IT
infrastructure requirements, and therefore, it needs architecture
to establish a coherent IoT ecosystem.
•
• Considering the complexities involved in the configuration,
operations, functionalities, and communications, the five
layers of IoT architecture are best suited for all purposes.
• 1. Network layer
• Its core function is to connect the IoT devices with the network
systems and servers. The network layer also helps to route and
control the data transmission with the help of set
communication protocols and unified formats.
• Utilizing the TCP/IP stack and cellular and wireless
technologies depending on the specification, the network layer
helps set up secure transmission across all interconnected
devices. A few examples are IPv4/IPv6, ICMP, IGMP, ARP,
3G/4G/5G, UDP, 6LoWPAN, and WiFi.
• 2. Application layer
• It acts as an interface between the IoT devices and the end users
or any other device that requests the information over the
secured network. After successful data processing, formatting,
and presentation, it produces the final information. A few
examples of the application layer are HTTP, FTP, POP, IMAP,
TLS, SMTP, DNS, TFTP, SNMP, and TELNET.
• The IoT application protocol depends on four crucial parameters
- latency, reliability, bandwidth, and transportation. Considering
the same, along with the correspondence of the specifications
and features, the following are the top five IoT application
protocols:
• Representational State Transfer (REST)
• Constrained Application Protocol (CoAP)
• Advanced Message Queuing Protocol (AMQP)
• Message Queue Telemetry Transport (MQTT)
• Extensible Message and Presence Protocol (XMPP)
• 3. Perception layer
• It constitutes sensors, actuators, and AI-powered devices to
gather valuable details about the surrounding physical objects
or the environment. The accumulated data is converted from
analog signals to digital format for further operations.
• Its functioning includes identification, information collection,
and automated control technologies to channel the digital and
real worlds. A few examples of the perception layer include
surveillance cameras, bar codes, portable PCs, RFID, WSN,
and GPS.
• 4. Security layer
• It minimizes the risk of potential cyberattacks on the most
vulnerable areas of the IoT ecosystem. The security
checkpoints occur at three significant places - the device
(including hardware and software), cloud, and connection.
• With the rapid digital evolution during the outbreak, the
security challenges and underlying threats to the IoT
architecture also grew exponentially. Therefore, the layered
security approach has become of utmost importance in the
ongoing scenario.
• A few examples of the security layer include Trusted Platform
Module (TPM) chips, multiple authorizations, firewalls, NAC,
AAA, NAP, IPS encryption, and cryptography mechanisms.
• 5. Edge layer
• It works on the edge computing framework to improve latency,
bandwidth, and real-time communication challenges. The edge layer's
primary goal is to fetch and process the requested information closer
to the data sources.
• With the ever-increasing number of smart devices over a centralized
cloud system, the 'delay in response' is a significant concern. However,
combined with 5G and AI capabilities, edge IoT layers perform
exceptionally well for time-sensitive data and deliver faster results.
• A few examples of the edge layer include electronic vehicles,
smartphones, smartwatches, laptops, security cameras, V2X, public
transit applications, smart cities, and green technologies. The five
layers of IoT architecture facilitate the smooth functioning of the IoT
ecosystem.
• Besides, they can accommodate expansions and handle intricacies
following the latest technological advancements. The goal is to
establish seamless IoT interoperability, taking care of the 3Cs -
change, compatibility, and cybersecurity.
CONCLUSION
• It should be noted that safe and effective device
management is the keystone to the sustainable development
and management of IoT networks worldwide.
• The communication, data sharing, and usage of information by
intelligent devices happen in a full-stack IoT ecosystem.
• A unified global protocol standardization thus becomes crucial
to eliminate IoT fragmentation and potential security threats.
Conti…
• IoT protocols are the medium of communication or a shared
language that helps establish connections between different
smart devices and helps them interact with each other.
• They are essential for holistic device management.
• IoT protocols consider the needs, communication, and security
of the various devices integrated.
• Depending upon the IoT architecture, present scenario, and
usage context, different IoT protocols are designed to
minimize the risk of intrusion.

More Related Content

What's hot

Components of IOT Implementation
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT ImplementationAashiq Ahamed N
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptNishant Kayal
 
Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoTDamien Magoni
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine TechnologySamip jain
 
Io t system management with
Io t system management withIo t system management with
Io t system management withxyxz
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)Hamdamboy (함담보이)
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptxPratik Gohel
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOTAmberSinghal1
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
 

What's hot (20)

Iot
IotIot
Iot
 
Components of IOT Implementation
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT Implementation
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar ppt
 
6lowpan
6lowpan6lowpan
6lowpan
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT sensor devices
IoT sensor devicesIoT sensor devices
IoT sensor devices
 
Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoT
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
IoT sensing and actuation
IoT sensing and actuationIoT sensing and actuation
IoT sensing and actuation
 
Io t system management with
Io t system management withIo t system management with
Io t system management with
 
CoAP - Web Protocol for IoT
CoAP - Web Protocol for IoTCoAP - Web Protocol for IoT
CoAP - Web Protocol for IoT
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOT
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 

Similar to IOT PROTOCOLS.pptx

the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enableneelamsanjeevkumar
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdfJoshuaKimmich1
 
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxssuser52b751
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingssuser06ea42
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & EcosystemHarish Vadada
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfMD.ANISUR RAHMAN
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyaravindhawan
 
IoT Communication Protocols.pdf
IoT Communication Protocols.pdfIoT Communication Protocols.pdf
IoT Communication Protocols.pdfSudhanshiBakre1
 

Similar to IOT PROTOCOLS.pptx (20)

IoT _protocols.ppt
IoT _protocols.pptIoT _protocols.ppt
IoT _protocols.ppt
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enable
 
Important topics.pptx
Important topics.pptxImportant topics.pptx
Important topics.pptx
 
Chapter-1.pptx
Chapter-1.pptxChapter-1.pptx
Chapter-1.pptx
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & Ecosystem
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
 
module 3.pptx
module 3.pptxmodule 3.pptx
module 3.pptx
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
 
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
 
IoT Communication Protocols.pdf
IoT Communication Protocols.pdfIoT Communication Protocols.pdf
IoT Communication Protocols.pdf
 
Iot
IotIot
Iot
 
IOT ajay binay.pdf
IOT ajay binay.pdfIOT ajay binay.pdf
IOT ajay binay.pdf
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
1.pptx
1.pptx1.pptx
1.pptx
 

Recently uploaded

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

Recently uploaded (20)

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 

IOT PROTOCOLS.pptx

  • 1. IoT Protocols: Making IoT Data Communication Seamless • The protocols of the Internet of Things (IoT) technology stack are essential as, without them, the hardware would be rendered useless, and data communication would be a challenge.
  • 2. IoT protocols by definition and vision • IoT protocols aim to connect devices to IoT devices over a seamless and secure connection. • The IoT protocols operate on four pillars - device, connectivity, data, and analytics. • Their defense-in-depth security strategy shields the data transmission layer by layer. • While the business layer includes the management of billing and data marketplaces, the people who interact with IoT devices and technologies fall under the technology users layer. • The device layer comprises a combination of sensors, hardware, actuators, software, and gateways, constituting a device that connects and interacts with a network. • The data layer involves the data collected, processed, stored, and analyzed in business contexts.
  • 3. IoT protocols connection models • There is no set pattern for data routing, and the communication is highly dependent on the network topology. • However, the fundamental models are used either as standalone or in combinations for IoT deployments, including:
  • 4. 1. Device-to-device • It enables communication between nearby devices (proximity) using IoT Protocols like Bluetooth, ZigBee, Z-Wave, 4G, 5G, and WiFi. 2. Device-to-gateway • In this model, the devices communicate with the data system using a mediator platform, such as LPWAN, WiFi, and/or Ethernet IoT protocols. • The core functions of device-to-gateway are combining data from sensors, analyzing it, and routing it to the destination data system (data center or cloud). Also, in case of any problem, the connection model sends back the data to the source device.
  • 5. 3. Device-to-data • It works on edge computing, allowing devices to connect directly with the data source. A few popular device-to-data connection models include BLE, LoRaWAN, and Z-Wave. 4. Gateway-to-data • It is the simple communication between the mediator platform or central hubs and the data center or cloud. Open Automation Software (OAS) and Universal Data Connector are the best examples of robust IoT Gateways. 5. Communication between data • This protocol connection model allows data transmission between the data center and the cloud. It includes IoT Data protocols like MQTT, HTTP, REST, etc.
  • 6. Types of IoT protocols • IoT protocols and standards are broadly classified into two separate categories, including IoT data protocols that have presentation or application layers and network protocols for IoT comprising datalink and physical layers:
  • 7. 1. IoT Data Protocols • These protocols establish the end-to-end communication between low-power IoT devices and the hardware at the source, client, and/or user side, using only wired or cellular networks. The IoT data protocols function without an internet connection: 1. Advanced Message Queuing Protocol (AMQP) • AMQP is widely used in banking and finance as a message- oriented open standard software protocol. It comprises three crucial message components - Exchange, Queue, and Routing. • It is based on the Transmission Control Protocol and works on the architecture of "publish/subscribe" and "request/response" types. In addition, the guaranteed delivery or transaction message makes AMQP interoperable, secure, and reliable.
  • 8. 2. Data Distribution Service (DDS) • DDS is a UDP based "publish/subscribe" API that facilitates secure real-time M2M data sharing between the connected IoT devices. Furthermore, it works on broker-less scalable architecture (DCPS and DLRL), i.e., it operates independently of any hardware or software platform. • Its multi-purpose function simplifies IoT deployment for both small devices and high-performance networks. 3. Extensible Messaging and Presence Protocol (XMPP) • XMPP is a decentralized, open-source, and secure protocol developed using XML language to enable real-time data exchange. • It operates as a presence indicator by reflecting the status of available servers and devices. XMPP-IoT is a lightweight version of XMPP and is the best for consumer-oriented IoT deployments as it is extensible, scalable, and flexible.
  • 9. 4. WebSocket • Introduced by HTML5, WebSocket is an event-triggered independent TCP-based IoT protocol or API. It establishes full-duplex real-time communication between the client and server. • Using advanced technology streamlines complexities involved in the bi-directional transmission over the internet. And, it is suitable to maintain constant connectivity across heterogeneous IoT devices. Notably, WebSocket is much faster than HTTP 5. Open Platform Communications Unified Architecture (OPC UA) • OPC UA is a next-generation data model technology ideal for Industry 4.0 and IoT. It operates on a platform-independent, encrypted, and extensible multi-layered architecture. In addition, its service-oriented framework supports both "publish/subscribe" and "request/response" models. • As per the latest press release published by OPC Foundation, leading IoT vendors such as SIEMENS, SAP, Microsoft, IBM, AWS, and Google Cloud are already leveraging OPC UA for edge-to-cloud applications.
  • 10. II. IoT Network Protocols • These protocols constitute specific standards, policies, and unified rules to establish secured communication between IoT devices over the internet. • With emerging advancements in the IoT ecosystem, these protocols utilize multiple technologies that work on network topologies. The most widely used are star and mesh topologies. Following are the extensively used IoT network protocols: • 1. Bluetooth and BLE • Bluetooth is the top choice for shorter-range wireless communication, preferably for personal 2.4 GHz networks. Bluetooth Low Energy (BLE) is its optimized version and the standard protocol for IoT architecture. • The latest version of Bluetooth is 5.3. It was released on 13th July 2021 and is still in beta. Bluetooth best suits beacons, fitness, automotive, retail, and audio IoT applications.
  • 11. 2. Cellular - 4G and 5G • Cellular is a wireless mobile communication network technology that facilitates large bandwidth and reliable broadband services. • Currently, 3G is almost on the verge of extinction. On the other hand, 4G is leading but not suited for IoT applications due to higher cost and power consumption. • However, the new-age 5G is ideal for IoT applications across industries and personal usage. 3. Wi-Fi and Wi-Fi HaLow • WiFi is the most popular and conventional wireless network protocol for home and commercial usage. But, it is not very flexible and scalable for IoT purposes. • WiFi HaLow (IEEE 802.11 ah) is a unique solution to overcome its challenges. This high-level communication protocol provides a long-range between 750 and 950 MHz with low-power connectivity.
  • 12. • 4. Low Power Wide Area Networks (LPWANs) • LPWANs are a new set of wireless network protocols devised to set up communication between low-power IoT applications over long ranges. • They are a cost-saving option because they operate on small and affordable batteries that are long-lasting and power- efficient. • MIOTY, LoRaWAN, 6LoWPAN, Thread, NB-IoT, LTE-M, SigFox, and HayStack are purpose-built LPWANs for large- scale IoT deployments.
  • 13. 5. ZigBee • ZigBee is a mesh wireless communication protocol that operates on a 2.4 GHz network. • It is short-range, highly interoperable, low-power consuming, and facilitates massive data transfer in a single instance with high security. • ZigBee is most appropriate for small, and medium ranged IoT devices such as microcontrollers, sensors, gateways, and so on. • Notably, due to its mesh grid structural design, the connectivity can be extended over a long distance using multi-hop routing. • ZigBee is best suited for commercial building and innovative home automation applications. • Actually, it is the safest wireless protocol for transferring real- time patient data from a sensor.
  • 14. 6. Z-Wave • Similar to ZigBee, the Z-Wave protocol also works on mesh network topology. However, it is most prominent for IoT home automation applications. • Z-Wave is a Radio Frequency (RF) based, less power- consuming wireless communication technology that operates on 800-900 MHz and is purely location-dependent. • As a result, it hardly faces any connectivity hindrance. It facilitates safe and steady data transmission with low latency.
  • 15. 7. Extensible Messaging and Presence Protocol (XMPP) • This technology dates back to the early 2000s and was designed for real-time human-to-human communication. XMPP is now used for M2M communication and for routing XML data. • XMPP supports the real-time exchange of structured but extensible data across multiple network entities, making it suitable for consumer-oriented IoT deployments, such as smart appliances and wearables. • Other than the above-stated options, the network protocols such as Lightweight M2M (LWM2M), Radio-frequency Identification (RFID), Near Field Communication (NFC), Ethernet, and Wi-Sun have contributed significantly towards setting up the sustainable connection in the IoT space. • Therefore, be it for home or commercial usage, the selection of an ideal IoT network protocol must consider the parameters of bandwidth, range, power consumption, latency, intermittent connectivity, Quality of Service (QoS), and security.
  • 16. • Benefits of IoT wireless protocols • IoT protocols form a crucial component of the IoT infrastructure. They serve higher data throughput with lesser complexities. Wireless IoT protocols have become the first choice solution for personal and industrial usage. The rising demand for wireless IoT protocols is because of the core benefits: • Affordability • Less time and energy consumption • Robust security and data privacy • Good network coverage and connectivity • Automated and streamlined communications • Faster data transfer and smoother operations • Easy setup and deployment in the IoT infrastructure • Simple to use while resulting in enhanced productivity
  • 17. IoT Protocol Layers • IoT works on various networking technologies based on the IT infrastructure requirements, and therefore, it needs architecture to establish a coherent IoT ecosystem. •
  • 18. • Considering the complexities involved in the configuration, operations, functionalities, and communications, the five layers of IoT architecture are best suited for all purposes. • 1. Network layer • Its core function is to connect the IoT devices with the network systems and servers. The network layer also helps to route and control the data transmission with the help of set communication protocols and unified formats. • Utilizing the TCP/IP stack and cellular and wireless technologies depending on the specification, the network layer helps set up secure transmission across all interconnected devices. A few examples are IPv4/IPv6, ICMP, IGMP, ARP, 3G/4G/5G, UDP, 6LoWPAN, and WiFi.
  • 19. • 2. Application layer • It acts as an interface between the IoT devices and the end users or any other device that requests the information over the secured network. After successful data processing, formatting, and presentation, it produces the final information. A few examples of the application layer are HTTP, FTP, POP, IMAP, TLS, SMTP, DNS, TFTP, SNMP, and TELNET. • The IoT application protocol depends on four crucial parameters - latency, reliability, bandwidth, and transportation. Considering the same, along with the correspondence of the specifications and features, the following are the top five IoT application protocols: • Representational State Transfer (REST) • Constrained Application Protocol (CoAP) • Advanced Message Queuing Protocol (AMQP) • Message Queue Telemetry Transport (MQTT) • Extensible Message and Presence Protocol (XMPP)
  • 20. • 3. Perception layer • It constitutes sensors, actuators, and AI-powered devices to gather valuable details about the surrounding physical objects or the environment. The accumulated data is converted from analog signals to digital format for further operations. • Its functioning includes identification, information collection, and automated control technologies to channel the digital and real worlds. A few examples of the perception layer include surveillance cameras, bar codes, portable PCs, RFID, WSN, and GPS.
  • 21. • 4. Security layer • It minimizes the risk of potential cyberattacks on the most vulnerable areas of the IoT ecosystem. The security checkpoints occur at three significant places - the device (including hardware and software), cloud, and connection. • With the rapid digital evolution during the outbreak, the security challenges and underlying threats to the IoT architecture also grew exponentially. Therefore, the layered security approach has become of utmost importance in the ongoing scenario. • A few examples of the security layer include Trusted Platform Module (TPM) chips, multiple authorizations, firewalls, NAC, AAA, NAP, IPS encryption, and cryptography mechanisms.
  • 22. • 5. Edge layer • It works on the edge computing framework to improve latency, bandwidth, and real-time communication challenges. The edge layer's primary goal is to fetch and process the requested information closer to the data sources. • With the ever-increasing number of smart devices over a centralized cloud system, the 'delay in response' is a significant concern. However, combined with 5G and AI capabilities, edge IoT layers perform exceptionally well for time-sensitive data and deliver faster results. • A few examples of the edge layer include electronic vehicles, smartphones, smartwatches, laptops, security cameras, V2X, public transit applications, smart cities, and green technologies. The five layers of IoT architecture facilitate the smooth functioning of the IoT ecosystem. • Besides, they can accommodate expansions and handle intricacies following the latest technological advancements. The goal is to establish seamless IoT interoperability, taking care of the 3Cs - change, compatibility, and cybersecurity.
  • 23. CONCLUSION • It should be noted that safe and effective device management is the keystone to the sustainable development and management of IoT networks worldwide. • The communication, data sharing, and usage of information by intelligent devices happen in a full-stack IoT ecosystem. • A unified global protocol standardization thus becomes crucial to eliminate IoT fragmentation and potential security threats.
  • 24. Conti… • IoT protocols are the medium of communication or a shared language that helps establish connections between different smart devices and helps them interact with each other. • They are essential for holistic device management. • IoT protocols consider the needs, communication, and security of the various devices integrated. • Depending upon the IoT architecture, present scenario, and usage context, different IoT protocols are designed to minimize the risk of intrusion.