SlideShare a Scribd company logo
UNIT-III
PROTOCOLS AND TECHNOLOGIES BEHIND
IOT
Dr. C. GOPINATH
Assistant Professor
St. Joseph College of Engineering
IOT Protocols - IPv6, 6LoWPAN, MQTT, CoAP - RFID, Wireless Sensor
Networks, Big Data Analytics, Cloud Computing, Embedded Systems.
IOT PROTOCOLS
The Internet of Things (IoT) is about the network of sensor devices to the web in real-time. IoT devices communicate
with each other over the network, so certain standards and rules need to be set to determine how data is exchanged.
These rules are called IoT Network Protocols. The wireless hardwares used in IoT are the nodes and the base stations.
Nodes or clients are the devices that connect to the base stations. Base stations are the routers or gateways. In this
topic discuss about the protocols used between these devices.
IMPORTANCE OF IOT PROTOCOLS
The ability to interact with each other and resolve common problems is what separates lot devices from traditional
computers. These interactions are only possible if there is a medium or means of communication in the IoT
ecosystem. The IoT protocols are thus a common "language" that allows devices to interact with other lot devices.
The IoT protocols lay down standards that are adopted in every IoT ecosystem for proper functioning and to avoid
security threats.
CLASSIFICATION OF IOT PROTOCOLS
IoT protocols are classified into two types:
1. IoT Data Protocol
(a) Message Queuing Telemetry Transport(MQTT) : MQTT is one of the prime IoT protocols. MQTT protocol is a type of IoT
communication protocol that is famous and is gaining popularity due to its transportation of messages through the
publish/subscribe messaging. It is lightweight and easily transfers data between two or more machines.
(b) Devices share information through a broker or server. Download the broker in your PC, MAC, Linux system or in
Raspberry pie. The most common brokers available in the market these days are HIVEMQ and Mosquito.
(c) MQTT is different to the regular client-server model. It divides clients into two groups. MQTT brokers act as a mediator
and pass on the messages from the clients (publishers in MQTT) to the consumers who receive data on the other
end(MQTT subscriber).
Message Queuing Telemetry Transport (MQTT)
(b) Advanced Message Queuing Protocol
JP Morgan Chase & Co founded the AMQP protocol in 2003. This is an important protocol in IoT. It offers exchange of
data within the network and it is protocol. AMQP Protocol focuses mainly on banking systems and other businesses. It uses
either the request-response messaging or the publisher-subscriber model.
Publishers generate messages and consumers at the other end pick those messages to process them. Message brokers
make sure that the right message goes to the right consumer.
The brokers uses two components to achieve this as shown in the diagram:
Exchange ‫܀‬
Queues ‫܀‬
(c) Data Distribution Service
DDS is a widely used protocol in IoT due to its versatility and extensible nature. It does not depends on
middlemen for communication and it directly connects sensor to other devices for open communication.
DDS ensure secure message transfer and data sharing.
Data Distribution Service
(d) Constrained Application Protocol (COAP)
 CoAP is another promising protocol in the future of IoT. COAP protocol transfers documents in a way similar to HTTP,
however, CoAPs design ful fills the needs of constrained nodes. The packets in CoAP are much smaller in size when
you compare it with Hypertext Transfer Protocol (HTTP). COAP operates through UDP. Clients and servers retrieve
information through Connectionless datagrams.
 CoAP permits UDP broadcast and multicast to address. CoAP also acts on the client/server model. Clients generate
requests to servers and servers in return transfer responses. Clients can GET, POST, DELETE and PUT the resources.
 "Confirmable" and "non confirmable" are tags for request and response messages. Non-confirmable messages come
under the label "fire and forget". CoAP assures similar data security methods except that the data transfer takes place
through UDP and not TLS.
2. IoT Network Protocols
(a) Wireless Body Area Networks (WBAN)
This network has other names such as Body Area Network(BAN), Medical Body Area Network(MBAN) or Body
Sensor Network (BSN). They form close connections and are usually within the 10 centimetre to 1 metre range. The
common ones include Bluetooth, NFC, Zigbee, RFID (Radio Frequency) and various other proprietary technologies.
Wireless Body Area Networks (WBAN)
(b) Wireless Personal Area Networks(WPAN)
These have an extended range when you compare them with the WBAN. These have a 1 metre to 10 metre range.
These networks include Bluetooth, RFID and other similar proprietary software technologies. You can think of these
devices as your personal devices that you want to connect with or make them connect with other personal devices.
(c) Wireless Local Area Network(WLAN)
You must have come across the word WLAN. Any local wireless network can be known as a Wireless Local Area
Network. This includes Wi Fi / 802.11 and Zigbee networks. Wi Fi is a standard and universal option whereas Zigbee
handles protocols that require high level communication. Bluetooth can also come under WLAN.
(d) Wireless Metropolitan Area Networks (WMANs)
This network covers up a larger area such as a city or state. The network is Capable of housing an entire city and various
devices around the city can easily connect to this network.
(e) Wireless Wide Area Network(WWAN)
This is another common kind of network. This network provides connection at a much larger scale as compared to
WMANS. It is capable of providing communication across the globe as well.
IPV6 (INTERNET PROTOCOL VERSION 6)
 IoT refers to the network of interconnected physical devices, sensors, vehicles, appliances, and more, all embedded with
technology to collect and exchange data.
 This technology revolution has transformed various industries, including healthcare, agriculture, manufacturing, and smart
cities. As IoT devices proliferate, they require unique IP addresses to communicate over the internet.
 ❖ However, the limitations of IPv4 addressing, such as address exhaustion and the need for Network Address Translation
(NAT), hindered the scalability and growth of IoT.
 ❖ IPv6 addressing offers a solution to these challenges. With its vast address space, IPv6 can accommodate an astronomical
number of devices, ensuring that each device can have a unique and globally routable address.
 This eliminates the need for NAT and facilitates direct communication between devices, leading to more efficient data
exchange and improved connectivity. 9
IMPLEMENTATION OF IPV6 ADDRESSING IN IOT
Implementing IPv6 addressing in IoT involves assigning IPv6 addresses to individual devices, enabling them to
communicate seamlessly within the IoT ecosystem. Here's a simplified breakdown of the implementation process:
1. Unique IPv6 Addresses: Each IoT device is assigned a unique IPv6 address. This address is composed of a network
prefix and an interface identifier, which can be based on the device's MAC address or other methods.
2. Auto configuration: IoT devices can use IPv6 Stateless Address Auto configuration (SLAAC) to generate their interface
identifier and create a complete IPv6 address. This process eliminates the need for manual address configuration.
3. Address Management: Organizations and network administrators manage the allocation of IPv6 addresses to IoT
devices. This can be done dynamically using DHCPv6 (Dynamic Host Configuration Protocol for IPv6) or through other
management tools.
4. Routing and Communication: loT devices use their IPv6 addresses to route and exchange data over the internet, With
globally routable addresses, devices can communicate directly without the complexities of NAT.
BENEFITS OF IPV6 ADDRESSING IN IOT
IPv6 addressing offers a range of benefits that are particularly advantageous in the context of loT:
1. Scalability: IPv6's vast address space ensures that the increasing number of IoT devices can be accommodated
without running out of unique addresses.
2. Simplified Connectivity: IoT devices can communicate directly with one another without the need for NAT,
streamlining data exchange and reducing latency.
3. Security Improvements: IPv6 includes built-in security features such as IPsec, which enhances the confidentiality and
integrity of data transmitted between devices.
4. Efficient Address Auto configuration: SLAAC enables devices to generate their addresses automatically, reducing the
need for manual configuration and easing deployment.
5. Enhanced Quality of Service: IoT devices can communicate more efficiently, leading to improved performance and
reliability in applications like real-time monitoring and control.
IPv6 was developed by Internet Engineering Task Force (IETF) to deal with the problem of IPv4 exhaustion. IPv6 is a
128-bits address having an address space of 2128, which is way bigger than IPv4. IPv6 use Hexa-Decimal format
separated by colon (:)
Components in Address format:
1. There are 8 groups and each group represents 2 Bytes (16-bits).
2. Each Hex-Digit is of 4 bits (1 nibble)
3. Delimiter used – colon (:)
IPv6 Addressing methods
In IPv6 representation, there are three addressing methods:
 Unicast
 Multicast
 Anycast
1. Unicast Address
Unicast Address identifies a single network interface. A packet sent to a unicast address is delivered to the interface
identified by that address.
2. Multicast Address
Multicast Address is used by multiple hosts, called as groups, acquires a multicast destination address. These hosts need
not be geographically together. If any packet is sent to this multicast address, it will be distributed to all interfaces
corresponding to that multicast address. And every node is configured in the same way. In simple words, one data packet
is sent to multiple destinations simultaneously.
3. Anycast Address
Anycast Address is assigned to a group of interfaces. Any packet sent to an anycast address will be delivered to only one
member interface (mostly nearest host possible).
Types of IPv6 address:
There are 128 bits in IPv6 address but by looking at the first few bits we can identify what type of address it is.
IOT -UNIT-3.pptx PROTOCOLS AND TECHNOLOGIES BEHIND IOT
ADVANTAGES OF IPV6:
1. Real time Data Transmission: Real time data transmission refers to the process of transmitting data in a very fast
manner or immediately. Example: Live streaming services such as cricket matches, or other tournament that are
streamed on web exactly as soon as it happens with a maximum delay of 5-6 seconds.
2. IPv6 supports authentication: Verifying that the data received by the receiver from the sender is exactly what the
sender sent and came through the sender only not from any third party. Example: Matching the hash value of both the
messages for verification is also done by IPv6.
3. IPv6 performs Encryption: Ipv6 can encrypt the message at network layer even if the protocols of application layer at
user level didn't encrypt the message which is a major advantage as it takes care of encryption.
4. Faster processing at Router: Routers are able to process data packets of Ipv6 much faster due to smaller Base header
of fixed size - 40 bytes which helps in decreasing processing time resulting in more efficient packet transmission.
Whereas in Ipv4, we have to calculate the length of header which lies between 20-60 bytes.
6LoWPAN The 6LoWPAN protocol refers to IPv6 Low Power Personal Area Network which uses a lightweight IP-based
communication to travel over low data rate networks. It has limited processing ability to transfer information wirelessly using
an internet protocol. 6LowPAN Security Measure Security is a major issue for 6LowPAN communication Protocol. There are
several attacks issues at the security level of 6LoWPAN which aim is to direct destruction of the network. Properties of
6LowPAN protocol • Standard: RFC6282 • Frequency: Used over a variety of other networking media including Bluetooth
Smart (2.4GHz) or Zig Bee or low-power RF (sub-1GHz) • Range: NA • Data Rates: NA
6LoWPAN
MQTT (Message Queue Telemetry Transport) MQTT (Message Queue Telemetry Transport) is a messaging protocol
which was introduced by IBM in 1999. It was initially built for monitoring sensor node and faraway tracking in IoT. Its
suits are small, cheap, low-memory and low-power devices. MQTT provides embedded connectivity between
applications and middleware in one side and another side it connects networks and communicators.
MQTT (Message Queue Telemetry Transport)
CoAP CoAP (Constrained Application Protocol) is a session layer protocol that provides the REST ful (HTTP)
interface between HTTP client and server. It is designed by IETF Constrained REST ful Environment (CoRE)
working group. It is designed to use devices on the same constrained network between devices and general nodes
on the Internet. CoAP enables low-power sensors to use REST ful services while meeting their low power
constraints. This protocol is specially built for IoT systems primarily based on HTTP protocols. • This network is
used within the limited network or in a constrained environment. The whole architecture of CoAP consists of
CoAP client, CoAP server, REST CoAP proxy, and REST internet.
CoAP
Ad

More Related Content

What's hot (20)

Introduction of iot
Introduction of iotIntroduction of iot
Introduction of iot
sandeepkraggarwal
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
Hitesh Mohapatra
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
Dr. Mazlan Abbas
 
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
EIT Digital Alumni
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
pavan penugonda
 
IOT System.pptx
IOT System.pptxIOT System.pptx
IOT System.pptx
Manipal University Jaipur
 
IOT- UNIT 2-COMPONENTS IN INTERNET OF THINGS
IOT- UNIT 2-COMPONENTS IN INTERNET OF  THINGSIOT- UNIT 2-COMPONENTS IN INTERNET OF  THINGS
IOT- UNIT 2-COMPONENTS IN INTERNET OF THINGS
binuvijay1
 
IoT for Healthcare
IoT for HealthcareIoT for Healthcare
IoT for Healthcare
SenZations Summer School
 
Iot
IotIot
Iot
Priti Banya Mohanty
 
Internet of things
Internet of thingsInternet of things
Internet of things
Sai praveen Seva
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and Challenges
Ahmed Banafa
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
Eslam Nader
 
Internet of things
Internet of thingsInternet of things
Internet of things
Komal Agarwal
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
Komal Gandhi
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
Prakash Honnur
 
Internet of things and its applications
Internet of things and its applicationsInternet of things and its applications
Internet of things and its applications
MMithunkrishnan
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
udhayakumarc1
 
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSIOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
binuvijay1
 
IoT in healthcare
IoT in healthcareIoT in healthcare
IoT in healthcare
Nikhil Neema
 
Wearable electronics
Wearable electronicsWearable electronics
Wearable electronics
Arya Ls
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
Dr. Mazlan Abbas
 
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
EIT Digital Alumni
 
IOT- UNIT 2-COMPONENTS IN INTERNET OF THINGS
IOT- UNIT 2-COMPONENTS IN INTERNET OF  THINGSIOT- UNIT 2-COMPONENTS IN INTERNET OF  THINGS
IOT- UNIT 2-COMPONENTS IN INTERNET OF THINGS
binuvijay1
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and Challenges
Ahmed Banafa
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
Eslam Nader
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
Komal Gandhi
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
Prakash Honnur
 
Internet of things and its applications
Internet of things and its applicationsInternet of things and its applications
Internet of things and its applications
MMithunkrishnan
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
udhayakumarc1
 
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSIOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
binuvijay1
 
Wearable electronics
Wearable electronicsWearable electronics
Wearable electronics
Arya Ls
 

Similar to IOT -UNIT-3.pptx PROTOCOLS AND TECHNOLOGIES BEHIND IOT (20)

Iot
IotIot
Iot
Ankit Anand
 
IoT _protocols.ppt
IoT _protocols.pptIoT _protocols.ppt
IoT _protocols.ppt
rohitbansal761378
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
Dr.M.Karthika parthasarathy
 
imp iot12334566777889900--oiiu8uy75r.pdf
imp iot12334566777889900--oiiu8uy75r.pdfimp iot12334566777889900--oiiu8uy75r.pdf
imp iot12334566777889900--oiiu8uy75r.pdf
ranisharadpatil
 
7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf
Gaurav Sharma
 
IOT.pdf
IOT.pdfIOT.pdf
IOT.pdf
HarshNagda5
 
Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hyd
Kishore5511
 
Chapter 1 pdf
Chapter 1 pdfChapter 1 pdf
Chapter 1 pdf
ChAnushaECE
 
Lecture 5,6 [Autosavedaot IOT ]slides.pptx
Lecture 5,6 [Autosavedaot IOT ]slides.pptxLecture 5,6 [Autosavedaot IOT ]slides.pptx
Lecture 5,6 [Autosavedaot IOT ]slides.pptx
sarfarazkhanwattoo
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
JoshuaKimmich1
 
Internet of Things and the protocols ppt
Internet of Things and the protocols pptInternet of Things and the protocols ppt
Internet of Things and the protocols ppt
AnithaChristyAngelin
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks Essay
Katyana Londono
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Karthic C M
 
Internet of things unit-1
Internet of things unit-1Internet of things unit-1
Internet of things unit-1
Srimatre K
 
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
parveen837153
 
IOT COMPLETE NOTES.pdf jhdflhagflkajshfagslgfahflasgshlah
IOT COMPLETE NOTES.pdf jhdflhagflkajshfagslgfahflasgshlahIOT COMPLETE NOTES.pdf jhdflhagflkajshfagslgfahflasgshlah
IOT COMPLETE NOTES.pdf jhdflhagflkajshfagslgfahflasgshlah
AvinashKumar547425
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
IJECEIAES
 
DS-University-IOT COMPLETE NOTES.pdf FOR CIVIL
DS-University-IOT COMPLETE NOTES.pdf FOR CIVILDS-University-IOT COMPLETE NOTES.pdf FOR CIVIL
DS-University-IOT COMPLETE NOTES.pdf FOR CIVIL
DrAAdaikalam
 
UNIT–I: Introduction: IoT Standards, Devices and Gateways, Local and Wide are...
UNIT–I: Introduction: IoT Standards, Devices and Gateways, Local and Wide are...UNIT–I: Introduction: IoT Standards, Devices and Gateways, Local and Wide are...
UNIT–I: Introduction: IoT Standards, Devices and Gateways, Local and Wide are...
swethabollam11
 
imp iot12334566777889900--oiiu8uy75r.pdf
imp iot12334566777889900--oiiu8uy75r.pdfimp iot12334566777889900--oiiu8uy75r.pdf
imp iot12334566777889900--oiiu8uy75r.pdf
ranisharadpatil
 
Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hyd
Kishore5511
 
Lecture 5,6 [Autosavedaot IOT ]slides.pptx
Lecture 5,6 [Autosavedaot IOT ]slides.pptxLecture 5,6 [Autosavedaot IOT ]slides.pptx
Lecture 5,6 [Autosavedaot IOT ]slides.pptx
sarfarazkhanwattoo
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
JoshuaKimmich1
 
Internet of Things and the protocols ppt
Internet of Things and the protocols pptInternet of Things and the protocols ppt
Internet of Things and the protocols ppt
AnithaChristyAngelin
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks Essay
Katyana Londono
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Karthic C M
 
Internet of things unit-1
Internet of things unit-1Internet of things unit-1
Internet of things unit-1
Srimatre K
 
IOT COMPLETE NOTES.pdf jhdflhagflkajshfagslgfahflasgshlah
IOT COMPLETE NOTES.pdf jhdflhagflkajshfagslgfahflasgshlahIOT COMPLETE NOTES.pdf jhdflhagflkajshfagslgfahflasgshlah
IOT COMPLETE NOTES.pdf jhdflhagflkajshfagslgfahflasgshlah
AvinashKumar547425
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
IJECEIAES
 
DS-University-IOT COMPLETE NOTES.pdf FOR CIVIL
DS-University-IOT COMPLETE NOTES.pdf FOR CIVILDS-University-IOT COMPLETE NOTES.pdf FOR CIVIL
DS-University-IOT COMPLETE NOTES.pdf FOR CIVIL
DrAAdaikalam
 
UNIT–I: Introduction: IoT Standards, Devices and Gateways, Local and Wide are...
UNIT–I: Introduction: IoT Standards, Devices and Gateways, Local and Wide are...UNIT–I: Introduction: IoT Standards, Devices and Gateways, Local and Wide are...
UNIT–I: Introduction: IoT Standards, Devices and Gateways, Local and Wide are...
swethabollam11
 
Ad

Recently uploaded (20)

seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic AlgorithmDesign Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Journal of Soft Computing in Civil Engineering
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
Reflections on Morality, Philosophy, and History
 
Working with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to ImplementationWorking with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to Implementation
Alabama Transportation Assistance Program
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Journal of Soft Computing in Civil Engineering
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
Ad

IOT -UNIT-3.pptx PROTOCOLS AND TECHNOLOGIES BEHIND IOT

  • 1. UNIT-III PROTOCOLS AND TECHNOLOGIES BEHIND IOT Dr. C. GOPINATH Assistant Professor St. Joseph College of Engineering
  • 2. IOT Protocols - IPv6, 6LoWPAN, MQTT, CoAP - RFID, Wireless Sensor Networks, Big Data Analytics, Cloud Computing, Embedded Systems.
  • 3. IOT PROTOCOLS The Internet of Things (IoT) is about the network of sensor devices to the web in real-time. IoT devices communicate with each other over the network, so certain standards and rules need to be set to determine how data is exchanged. These rules are called IoT Network Protocols. The wireless hardwares used in IoT are the nodes and the base stations. Nodes or clients are the devices that connect to the base stations. Base stations are the routers or gateways. In this topic discuss about the protocols used between these devices. IMPORTANCE OF IOT PROTOCOLS The ability to interact with each other and resolve common problems is what separates lot devices from traditional computers. These interactions are only possible if there is a medium or means of communication in the IoT ecosystem. The IoT protocols are thus a common "language" that allows devices to interact with other lot devices. The IoT protocols lay down standards that are adopted in every IoT ecosystem for proper functioning and to avoid security threats.
  • 4. CLASSIFICATION OF IOT PROTOCOLS IoT protocols are classified into two types: 1. IoT Data Protocol (a) Message Queuing Telemetry Transport(MQTT) : MQTT is one of the prime IoT protocols. MQTT protocol is a type of IoT communication protocol that is famous and is gaining popularity due to its transportation of messages through the publish/subscribe messaging. It is lightweight and easily transfers data between two or more machines. (b) Devices share information through a broker or server. Download the broker in your PC, MAC, Linux system or in Raspberry pie. The most common brokers available in the market these days are HIVEMQ and Mosquito. (c) MQTT is different to the regular client-server model. It divides clients into two groups. MQTT brokers act as a mediator and pass on the messages from the clients (publishers in MQTT) to the consumers who receive data on the other end(MQTT subscriber). Message Queuing Telemetry Transport (MQTT)
  • 5. (b) Advanced Message Queuing Protocol JP Morgan Chase & Co founded the AMQP protocol in 2003. This is an important protocol in IoT. It offers exchange of data within the network and it is protocol. AMQP Protocol focuses mainly on banking systems and other businesses. It uses either the request-response messaging or the publisher-subscriber model. Publishers generate messages and consumers at the other end pick those messages to process them. Message brokers make sure that the right message goes to the right consumer. The brokers uses two components to achieve this as shown in the diagram: Exchange ‫܀‬ Queues ‫܀‬
  • 6. (c) Data Distribution Service DDS is a widely used protocol in IoT due to its versatility and extensible nature. It does not depends on middlemen for communication and it directly connects sensor to other devices for open communication. DDS ensure secure message transfer and data sharing. Data Distribution Service
  • 7. (d) Constrained Application Protocol (COAP)  CoAP is another promising protocol in the future of IoT. COAP protocol transfers documents in a way similar to HTTP, however, CoAPs design ful fills the needs of constrained nodes. The packets in CoAP are much smaller in size when you compare it with Hypertext Transfer Protocol (HTTP). COAP operates through UDP. Clients and servers retrieve information through Connectionless datagrams.  CoAP permits UDP broadcast and multicast to address. CoAP also acts on the client/server model. Clients generate requests to servers and servers in return transfer responses. Clients can GET, POST, DELETE and PUT the resources.  "Confirmable" and "non confirmable" are tags for request and response messages. Non-confirmable messages come under the label "fire and forget". CoAP assures similar data security methods except that the data transfer takes place through UDP and not TLS.
  • 8. 2. IoT Network Protocols (a) Wireless Body Area Networks (WBAN) This network has other names such as Body Area Network(BAN), Medical Body Area Network(MBAN) or Body Sensor Network (BSN). They form close connections and are usually within the 10 centimetre to 1 metre range. The common ones include Bluetooth, NFC, Zigbee, RFID (Radio Frequency) and various other proprietary technologies. Wireless Body Area Networks (WBAN)
  • 9. (b) Wireless Personal Area Networks(WPAN) These have an extended range when you compare them with the WBAN. These have a 1 metre to 10 metre range. These networks include Bluetooth, RFID and other similar proprietary software technologies. You can think of these devices as your personal devices that you want to connect with or make them connect with other personal devices. (c) Wireless Local Area Network(WLAN) You must have come across the word WLAN. Any local wireless network can be known as a Wireless Local Area Network. This includes Wi Fi / 802.11 and Zigbee networks. Wi Fi is a standard and universal option whereas Zigbee handles protocols that require high level communication. Bluetooth can also come under WLAN.
  • 10. (d) Wireless Metropolitan Area Networks (WMANs) This network covers up a larger area such as a city or state. The network is Capable of housing an entire city and various devices around the city can easily connect to this network.
  • 11. (e) Wireless Wide Area Network(WWAN) This is another common kind of network. This network provides connection at a much larger scale as compared to WMANS. It is capable of providing communication across the globe as well.
  • 12. IPV6 (INTERNET PROTOCOL VERSION 6)  IoT refers to the network of interconnected physical devices, sensors, vehicles, appliances, and more, all embedded with technology to collect and exchange data.  This technology revolution has transformed various industries, including healthcare, agriculture, manufacturing, and smart cities. As IoT devices proliferate, they require unique IP addresses to communicate over the internet.  ❖ However, the limitations of IPv4 addressing, such as address exhaustion and the need for Network Address Translation (NAT), hindered the scalability and growth of IoT.  ❖ IPv6 addressing offers a solution to these challenges. With its vast address space, IPv6 can accommodate an astronomical number of devices, ensuring that each device can have a unique and globally routable address.  This eliminates the need for NAT and facilitates direct communication between devices, leading to more efficient data exchange and improved connectivity. 9
  • 13. IMPLEMENTATION OF IPV6 ADDRESSING IN IOT Implementing IPv6 addressing in IoT involves assigning IPv6 addresses to individual devices, enabling them to communicate seamlessly within the IoT ecosystem. Here's a simplified breakdown of the implementation process: 1. Unique IPv6 Addresses: Each IoT device is assigned a unique IPv6 address. This address is composed of a network prefix and an interface identifier, which can be based on the device's MAC address or other methods. 2. Auto configuration: IoT devices can use IPv6 Stateless Address Auto configuration (SLAAC) to generate their interface identifier and create a complete IPv6 address. This process eliminates the need for manual address configuration. 3. Address Management: Organizations and network administrators manage the allocation of IPv6 addresses to IoT devices. This can be done dynamically using DHCPv6 (Dynamic Host Configuration Protocol for IPv6) or through other management tools. 4. Routing and Communication: loT devices use their IPv6 addresses to route and exchange data over the internet, With globally routable addresses, devices can communicate directly without the complexities of NAT.
  • 14. BENEFITS OF IPV6 ADDRESSING IN IOT IPv6 addressing offers a range of benefits that are particularly advantageous in the context of loT: 1. Scalability: IPv6's vast address space ensures that the increasing number of IoT devices can be accommodated without running out of unique addresses. 2. Simplified Connectivity: IoT devices can communicate directly with one another without the need for NAT, streamlining data exchange and reducing latency. 3. Security Improvements: IPv6 includes built-in security features such as IPsec, which enhances the confidentiality and integrity of data transmitted between devices. 4. Efficient Address Auto configuration: SLAAC enables devices to generate their addresses automatically, reducing the need for manual configuration and easing deployment. 5. Enhanced Quality of Service: IoT devices can communicate more efficiently, leading to improved performance and reliability in applications like real-time monitoring and control.
  • 15. IPv6 was developed by Internet Engineering Task Force (IETF) to deal with the problem of IPv4 exhaustion. IPv6 is a 128-bits address having an address space of 2128, which is way bigger than IPv4. IPv6 use Hexa-Decimal format separated by colon (:) Components in Address format: 1. There are 8 groups and each group represents 2 Bytes (16-bits). 2. Each Hex-Digit is of 4 bits (1 nibble) 3. Delimiter used – colon (:)
  • 16. IPv6 Addressing methods In IPv6 representation, there are three addressing methods:  Unicast  Multicast  Anycast 1. Unicast Address Unicast Address identifies a single network interface. A packet sent to a unicast address is delivered to the interface identified by that address. 2. Multicast Address Multicast Address is used by multiple hosts, called as groups, acquires a multicast destination address. These hosts need not be geographically together. If any packet is sent to this multicast address, it will be distributed to all interfaces corresponding to that multicast address. And every node is configured in the same way. In simple words, one data packet is sent to multiple destinations simultaneously. 3. Anycast Address Anycast Address is assigned to a group of interfaces. Any packet sent to an anycast address will be delivered to only one member interface (mostly nearest host possible).
  • 17. Types of IPv6 address: There are 128 bits in IPv6 address but by looking at the first few bits we can identify what type of address it is.
  • 19. ADVANTAGES OF IPV6: 1. Real time Data Transmission: Real time data transmission refers to the process of transmitting data in a very fast manner or immediately. Example: Live streaming services such as cricket matches, or other tournament that are streamed on web exactly as soon as it happens with a maximum delay of 5-6 seconds. 2. IPv6 supports authentication: Verifying that the data received by the receiver from the sender is exactly what the sender sent and came through the sender only not from any third party. Example: Matching the hash value of both the messages for verification is also done by IPv6. 3. IPv6 performs Encryption: Ipv6 can encrypt the message at network layer even if the protocols of application layer at user level didn't encrypt the message which is a major advantage as it takes care of encryption. 4. Faster processing at Router: Routers are able to process data packets of Ipv6 much faster due to smaller Base header of fixed size - 40 bytes which helps in decreasing processing time resulting in more efficient packet transmission. Whereas in Ipv4, we have to calculate the length of header which lies between 20-60 bytes.
  • 20. 6LoWPAN The 6LoWPAN protocol refers to IPv6 Low Power Personal Area Network which uses a lightweight IP-based communication to travel over low data rate networks. It has limited processing ability to transfer information wirelessly using an internet protocol. 6LowPAN Security Measure Security is a major issue for 6LowPAN communication Protocol. There are several attacks issues at the security level of 6LoWPAN which aim is to direct destruction of the network. Properties of 6LowPAN protocol • Standard: RFC6282 • Frequency: Used over a variety of other networking media including Bluetooth Smart (2.4GHz) or Zig Bee or low-power RF (sub-1GHz) • Range: NA • Data Rates: NA 6LoWPAN MQTT (Message Queue Telemetry Transport) MQTT (Message Queue Telemetry Transport) is a messaging protocol which was introduced by IBM in 1999. It was initially built for monitoring sensor node and faraway tracking in IoT. Its suits are small, cheap, low-memory and low-power devices. MQTT provides embedded connectivity between applications and middleware in one side and another side it connects networks and communicators. MQTT (Message Queue Telemetry Transport)
  • 21. CoAP CoAP (Constrained Application Protocol) is a session layer protocol that provides the REST ful (HTTP) interface between HTTP client and server. It is designed by IETF Constrained REST ful Environment (CoRE) working group. It is designed to use devices on the same constrained network between devices and general nodes on the Internet. CoAP enables low-power sensors to use REST ful services while meeting their low power constraints. This protocol is specially built for IoT systems primarily based on HTTP protocols. • This network is used within the limited network or in a constrained environment. The whole architecture of CoAP consists of CoAP client, CoAP server, REST CoAP proxy, and REST internet. CoAP
  翻译: