Module Iii (Iot)
Module Iii (Iot)
COMMUNICATION PROTOCOLS
Connecting Smart Objects: Communication Criteria, IoT Access Technologies
IoT devices and sensors must be connected to the network for their data to be utilized. In addition to the wide
range of sensors, actuators, and smart objects that make up IoT, there are also a number of different protocols
used to connect them.
Two main sections divide this chapter. The first main section, “Communications Criteria,” describes the
characteristics and attributes when selecting and dealing with connecting smart objects. The various
technologies used for connecting sensors can differ greatly depending on the criteria used to analyze them. The
following subsections look closely at these criteria:
❑ Range: The importance of signal propagation and distance.
❑ Frequency Bands: This section describes licensed and unlicensed spectrum, including sub-GHz
frequencies. (The Licensed Electromagnetic Spectrum Is Used For Tightly Controlled Activities Like
Cellular Service And Radio Stations. Portions Of Unlicensed Spectrum, Used By Wi-fi, Are Free And
Open To The Public.)
❑ Power Consumption: This section discusses the considerations required for devices connected to a stable
power source compared to those that are battery powered.
❑ Topology: This section highlights the various layouts that may be supported for connecting multiple smart
objects.
❑ Constrained Devices: This section details the limitations of certain smart objects from a connectivity
perspective.
❑ Constrained-Node Networks: This section highlights the challenges that are often encountered with
networks connecting smart objects.
The second main section of this chapter, “IoT Access Technologies,” provides an in-depth look at some of the
technologies that are considered when connecting smart objects. Currently, the number of technologies connecting
smart objects is quite extensive, but with certain protocols eventually winning out over others in the various IoT
market segments. Other technologies are mentioned in context when applicable. The following subsections cover
technologies for connecting smart objects:
❑ IEEE 802.15.4: This section highlights IEEE 802.15.4, an older but foundational wireless protocol for
connecting smart objects.
❑ IEEE 802.15.4g and IEEE 802.15.4e: This section discusses improvements to 802.15.4 that are targeted to
utilities and smart cities deployments.
❑ IEEE 1901.2a: This section discusses IEEE 1901.2a, which is a technology for connecting smart objects over
power lines.
❑ IEEE 802.11ah: This section discusses IEEE 802.11ah, a technology built on the well-known 802.11 Wi-Fi
standards that is specifically for smart objects.
❑ LoRaWAN: This section discusses LoRaWAN, a scalable technology designed for longer distances with low
power requirements in the unlicensed spectrum.
❑ NB-IoT and Other LTE Variations: This section discusses NB-IoT and other LTE variations, which are often
the choice of mobile service providers looking to connect smart objects over longer distances in the licensed
spectrum.
Communication Criteria
Wireless communication is prevalent in the world of smart object connectivity, mainly because it eases
deployment and allows smart objects to be mobile, changing location without losing connectivity.
Range
How far does the signal need to be propagated?
What will be the area of coverage for a selected wireless technology?
Should indoor versus outdoor deployments be differentiated? The simplest approach to answering these
types of questions is to categorize these technologies into the following ranges:
Short range: The classical wired example is a serial cable. Wireless short-range technologies are often
considered as an alternative to a serial cable, supporting tens of meters of maximum distance between two
devices.
Examples of short-range wireless technologies are IEEE 802.15.1 Bluetooth and IEEE 802.15.7 Visible
Light Communications (VLC). These short-range communication methods are found in only a minority of IoT
installations.
Medium range: This range is the main category of IoT access technologies. In the range of tens to hundreds
of meters, many specifications and implementations are available. The maximum distance is generally less
than 1 mile between two devices, although RF technologies do not have real maximum distances defined, as
long as the radio signal is transmitted and received in the scope of the applicable specification.
Examples of medium-range wireless technologies include IEEE 802.11 Wi-Fi, IEEE 802.15.4, and
802.15.4g WPAN.
Long range: Distances greater than 1 mile between two devices require long-range technologies. Wireless
examples are cellular (2G, 3G, 4G) and some applications of outdoor IEEE 802.11 Wi-Fi and Low-Power
Wide-Area (LPWA) technologies. LPWA communications have the ability to communicate over a large
area without consuming much power. These technologies are therefore ideal for battery-powered IoT
sensors. (LPWA and the other examples just mentioned are discussed in more detail later in this chapter.)
Found mainly in industrial networks, IEEE 802.3 over optical fiber and IEEE 1901 Broadband Power Line
Communications are classified as long range but are not really considered IoT access technologies.
Frequency Bands
Radio spectrum is regulated by countries and/or organizations, such as the International Telecommunication
Union (ITU) and the Federal Communications Commission (FCC). These groups define the regulations and
transmission requirements for various frequency bands. For example, portions of the spectrum are allocated to
types of telecommunications such as radio, television, military, and so on.
Focusing on IoT access technologies, the frequency bands leveraged by wireless communications are split
between licensed and unlicensed bands. Licensed spectrum is generally applicable to IoT long-range access
technologies and allocated to communications infrastructures deployed by services providers, public
services (for example, first responders, military), broadcasters, and utilities. Examples of licensed spectrum
commonly used for IoT access are cellular, WiMAX, and Narrowband IoT (NB-IoT) technologies.
Exceptions exist in the licensed spectrum. For example, the Digital Enhanced Cordless Telecommunications
(DECT) wireless technology operates in licensed bands centered on 1.9 GHz, but no royalty fees apply. Therefore,
DECT Ultra Low Energy (ULE) is defined as an IoT wireless communication standard in the licensed spectrum,
but it does not require a service provider.
The ITU has also defined unlicensed spectrum for the industrial, scientific, and medical (ISM) portions of the
radio bands. These frequencies are used in many communications technologies for short-range devices (SRDs).
Unlicensed means that no guarantees or protections are offered in the ISM bands for device communications.
For IoT access, these are the most well-known ISM bands:
❑ IEEE 802.15.1 Bluetooth (The low range of IEEE 802.15.1 Bluetooth limits its usefulness in most IoT
deployments.)
Unlicensed spectrum is usually simpler to deploy than licensed because it does not require a service provider.
However, it can suffer from more interference because other devices may be competing for the same frequency
in a specific area. This becomes a key element in decisions for IoT deployments.
The frequency of transmission directly impacts how a signal propagates and its practical maximum range.
Either for indoor or outdoor deployments, the sub-GHz frequency bands allow greater distances
between devices. These bands have a better ability than the 2.4 GHz ISM band to penetrate building
infrastructures or go around obstacles, while keeping the transmit power within regulation.
The disadvantage of sub-GHz frequency bands is their lower rate of data delivery compared to higher
frequencies. However, most IoT sensors do not need to send data at high rates. Therefore, the lower
transmission speeds of sub-GHz technologies are usually not a concern for IoT sensor deployments.
However, most IoT access technologies tend to focus on the two sub-GHz frequency regions around 868
MHz and 915 MHz.
Power Consumption
❑ IoT device is very broad, there is a clear delineation between powered nodes and battery-powered nodes. A powered
node has a direct connection to a power source, and communications are usually not limited by power consumption criteria.
However, ease of deployment of powered nodes is limited by the availability of a power source, which makes mobility
more complex.
❑ Battery-powered nodes bring much more flexibility to IoT devices. These nodes are often classified by the required
lifetimes of their batteries. Their batteries can be changed or the devices replaced when a street gets resurfaced. For devices
under regular maintenance, a battery life of 2 to 3 years is an option.
❑ IoT wireless access technologies must address the needs of low power consumption and connectivity for battery-powered
nodes. This has led to the evolution of a new wireless environment known as Low-Power Wide-Area (LPWA).
❑ Wired IoT access technologies consisting of powered nodes are not exempt from power optimization. In the case of
deployment of smart meters over PLC, the radio interface on meters can’t consume 5 to 10 watts of power, or this will add
up to a 20-million-meter deployment consuming 100 to 200 megawatts of energy for communications.
Topology
❑ For example, indoor Wi-Fi deployments are mostly a set of nodes forming a star topology around their
access points (APs).
❑ Meanwhile, outdoor Wi-Fi may consist of a mesh topology for the backbone of APs, with nodes
connecting to the APs in a star topology.
❑ A mesh topology helps cope with low transmit power, searching to reach a greater overall distance, and
coverage by having intermediate nodes relaying traffic for other nodes.
❑ A node that doesn’t interconnect or relay the traffic of other nodes is known as a leaf node, or reduced-
function device (RFD).
❑ While well adapted to powered nodes, mesh topology requires a properly optimized implementation for
battery-powered nodes. Battery-powered nodes are often placed in a “sleep mode” to preserve battery
life when not transmitting.
IoT Access Technologies
Familiarization of the following topics are addressed for each IoT access technology:
1. Standardization and alliances: The standards bodies that maintain the protocols for a technology
2. Physical layer: The wired or wireless methods and relevant frequencies
3. MAC layer: Considerations at the Media Access Control (MAC) layer, which bridges the physical layer with
data link control
4. Topology: The topologies supported by the technology
5. Security: Security aspects of the technology
6. Competitive technologies: Other technologies that are similar and may be suitable alternatives to the given
technology
IEEE 802.15.4
IEEE 802.15.4 is a wireless access technology for low-cost and low-data-rate devices that are powered or run on
batteries. In addition to being low cost and offering a reasonable battery life, this access technology enables easy
installation using a compact protocol stack while remaining both simple and flexible.
IEEE 802.15.4 is commonly found in the following types of deployments:
❑ Home and building automation
❑ Automotive networks
❑ Industrial wireless sensor networks
❑ Interactive toys and remote controls
Criticisms of IEEE 802.15.4 often focus on its MAC reliability, unbounded latency, and susceptibility to
interference and multipath fading (lacks a frequency-hopping technique).
The MAC layer achieves these tasks by using various predefined frame types. In fact, four types of MAC frames
are specified in 802.15.4:
❑ Data frame: Handles all transfers of data
❑ Beacon frame: Used in the transmission of beacons from a PAN coordinator
❑ Acknowledgement frame: Confirms the successful reception of a frame
❑ MAC command frame: Responsible for control communication between devices
Fig. IEEE 802.15.4 MAC Format
The 802.15.4 MAC frame can be broken down into the MAC Header, MAC Payload, and MAC Footer fields.
MAC Frame MAC Header
1. Frame Control (2B): This field specifies the type of 1. Frame Control, Sequence Number, and Addressing Fields:
frame, including whether it's a data, beacon, or These fields are part of the MAC header, which provides
acknowledgment frame. It also indicates the frame's information about the frame's structure and addresses.
addressing mode and security options. MAC Payload
2. Sequence Number (1B): This field is used for frame 1. Frame Payload: This is the data content of the frame.
sequencing and retransmission purposes. It increments 2. MAC Footer
for each transmitted frame within a super frame. 3. FCS: This field is part of the MAC footer and is used for error
3. Addressing Fields (Variable): This section contains the detection.
destination and source addresses. The exact length of PHY Frame
this field depends on the addressing mode specified in 1. Preamble (6B): This field consists of a sequence of alternating 1s
the Frame Control field. It can include PAN identifiers and 0s used for synchronization between the transmitter and
(16-bit) and device addresses (64-bit or 16-bit). receiver.
4. Frame Payload (Variable): This field contains the 2. Start of Frame Delimiter (SFD) (1B): This field marks the
actual data being transmitted. The maximum payload beginning of the frame.
size is 127 bytes. 3. Frame Length (1B): This field specifies the length of the PHY
5. Frame Check Sequence (FCS) (2B): This field is a Service Data Unit (PSDU), which includes the MAC frame and any
cyclic redundancy check (CRC) used for error detection. additional PHY-specific information.
It ensures the integrity of the received data. 4. PHY Service Data Unit (PSDU) (0-127B): This field contains the
MAC frame and any additional PHY-specific information, such as
header, footer, or padding.
❑ The MAC Header field is composed of the Frame Control, Sequence Number and the Addressing fields.
❑ The Frame Control field defines attributes such as frame type, addressing modes, and other control flags.
❑ The Sequence Number field indicates the sequence identifier for the frame.
❑ The Addressing field specifies the Source and Destination PAN Identifier fields as well as the Source and
Destination Address fields.
❑ The MAC Footer field is nothing more than a frame check sequence (FCS). An FCS is a calculation based on the
data in the frame that is used by the receiving side to confirm the integrity of the data in the frame.
IEEE 802.15.4 requires all devices to support a unique 64-bit extended MAC address, based on EUI-64. However, because
the maximum payload is 127 bytes, 802.15.4 also defines how a 16-bit “short address” is assigned to devices. This short
address is local to the PAN and substantially reduces the frame overhead compared to a 64-bit extended MAC address.
However, you should be aware that the use of this short address might be limited to specific upper-layer protocol stacks.
Topology
❑ IEEE 802.15.4–based networks can be built as star, peer-to-
peer, or mesh topologies.
❑ Mesh networks tie together many nodes. This allows nodes
that would be out of range if trying to communicate directly
to leverage intermediary nodes to transfer communications.
❑ Every 802.15.4 PAN should be set up with a unique ID.
All the nodes in the same 802.15.4 network should use the
same PAN ID.
❑ Fig. shows an example of an 802.15.4 mesh network with a
PAN ID of 1. Fig. 802.15.4 Sample Mesh Network
❑ Full-function devices (FFDs) and reduced-function devices Topology
(RFDs) are defined in IEEE 802.15.4.
❑ A minimum of one FFD acting as a PAN coordinator is
required to deliver services that allow other devices to
associate and form a cell or PAN.
❑ In Fig. a single PAN coordinator is identified for PAN ID 1.
❑ FFD devices can communicate with any other devices,
whereas RFD devices can communicate only with FFD
devices.
Security
Fig. Frame Format with the Auxiliary Security Header Field for 802.15.4-2006 and Later Versions
1. AES Encryption: IEEE 802.15.4 uses Advanced Encryption Standard (AES) with a 128-bit key length for data
security.
2. Block Cipher: AES is a block cipher, meaning it works on fixed-size data blocks.
3. Symmetric Key Cryptography: AES uses the same key for both encryption and decryption (symmetric key).
4. Widespread Adoption: AES, established by the US National Institute of Standards and Technology in 2001, is widely
used by the US government and the private sector.
5. Data Validation: AES in 802.15.4 also validates data via a Message Integrity Code (MIC), calculated using the same
AES key.
6. Security Enabled Field: The Security Enabled field in the Frame Control portion of the 802.15.4 header enables AES
encryption when set to 1.
7. Frame Format Changes: Enabling security modifies the frame format by adding an Auxiliary Security Header,
reducing the payload size.
How encryption and security features are integrated into the Media Access Control (MAC) frame.
Frame Components:
1.Frame Control (2 Bytes): This segment includes essential control settings for the frame, such as the frame type and
acknowledgement request settings. It also includes the Security Enabled bit, which, when set to 1, indicates that the frame will be
secured using encryption.
2.Sequence Number (1 Byte): Used to keep track of frame order and ensure data integrity across transmission.
3.Addressing Fields (4 - 20 Bytes):
1. Destination PAN Identifier and Destination Address: These fields identify the destination's network and device
address.
2. Source PAN Identifier and Source Address: These identify the source network and device address.
4.Auxiliary Security Header (Variable Size): Added to the MAC frame when the Security Enabled bit is set. This header
manages encryption settings, such as key identifiers and nonce values, necessary for securing the frame.
5.Frame Payload (Variable): The actual data being transmitted. The size of the payload can be affected by the inclusion of the
Auxiliary Security Header, which reduces the available space for data.
6.Frame Check Sequence (2 Bytes): A checksum field used for error detection to ensure the integrity of the frame during
transmission.
MAC Payload and MAC Footer:
1. The MAC Payload includes the addressing fields, Auxiliary Security Header, and Frame Payload. The entire payload is
subject to encryption when security is enabled.
2. The MAC Footer contains the Frame Check Sequence, providing error detection functionality.
Security Features:
1. Encryption: The presence of the Auxiliary Security Header indicates that the frame payload is encrypted using the AES
algorithm with a 128-bit key.
2. Data Integrity and Authentication: The encryption process also involves the calculation of a Message Integrity Code
(MIC) using the same AES key, ensuring that the data has not been tampered with in transit.
Practical Example
If you use an AES encryption tool or software:
1. Input: "Hello, World!"
2. Key: A 128-bit key (for example, a random sequence like "09af30f2eff07429128a20f1abcd1234").
3. Output: Ciphertext (a sequence of bytes, which may be represented in hexadecimal).
Competitive Technologies
❑ The IEEE 802.15.4 PHY and MAC layers form the foundation for several IoT networking profiles, with vendors
❑ In contrast, DASH7, based on the ISO18000-7 standard, is a competitive radio technology designed for industrial
❑ DASH7 offers low power consumption, a compact stack, long range (up to 1 mile), AES encryption, and operates at
frequencies of 433 MHz, 868 MHz, and 915 MHz with data rates up to 166.667 kbps and a 256-byte maximum
payload.
LoRaWAN
LoRaWAN (Long Range Wide Area Network) is a protocol for wide-area networks designed to allow low-powered
devices to communicate with Internet-connected applications over long range wireless connections. It is primarily used
for connecting low-power Internet of Things (IoT) devices.
Key Characteristics of LoRaWAN
1. Long Range: Capable of covering distances up to 15 km under ideal conditions.
2. Low Power: Designed for battery-operated devices with long lifespans.
3. Secure: Multiple layers of encryption for network, application, and device-level security.
4. Bi-directional Communication: Supports both uplink and downlink transmissions.
5. Adaptive Data Rate: Optimizes data rates, airtime, and energy consumption based on network conditions.
6. Scalability: Designed to support millions of devices over large areas with minimal infrastructure.
Applications:
1. Smart cities: Monitoring traffic, pollution, and infrastructure.
2. Agriculture: Tracking livestock, monitoring crops, and optimizing irrigation.
3. Asset tracking: Locating valuable items like containers, equipment, and vehicles.
4. Environmental monitoring: Measuring temperature, humidity, and other environmental factors.
Low-Power Wide-Area (LPWA) technologies have garnered significant interest in recent years for their suitability in long-
range and battery-powered IoT applications. They offer new business opportunities for service providers and enterprises
exploring IoT solutions.
LoRaWAN, an example of an unlicensed-band LPWA technology, is discussed for its applicability in these scenarios. The
following section will cover licensed-band alternatives, such as NB-IoT and other LTE variations, which are standardized by
the 3rd Generation Partnership Project (3GPP).
RFID Features
Scalability : Providing acceptable levels of service in the presence of large number of nodes.
Typically, throughput decreases at a rate of , N = number of nodes.
Quality of service: Offering guarantees in terms of bandwidth, delay, jitter, packet loss
probability. Limited bandwidth, unpredictable changes in RF channel characteristics.
Energy efficiency :Nodes have limited battery power. Nodes need to cooperate with other
nodes for relaying their information.
Security: Open medium. Nodes prone to malicious attacks, infiltration, eavesdropping,
interference.
Sensor Web
Cooperation in Wireless Ad Hoc and Sensor Networks
❑ Nodes communicate with other nodes with the help of intermediate nodes.
❑ The intermediate nodes act as relays. Wireless nodes are energy-constrained. Nodes may
or may not cooperate.
❑ Two extremities: Total cooperation: if all relay requests are accepted, nodes will quickly
exhaust limited energy. Total non-cooperation: if no relay requests are accepted, the
network throughput will go down rapidly.
❑ Issues: Selfishness, self-interests, etc. Tradeoff: individual node’s lifetime vs. Throughput.
Types of Node Behaviour
❑ Normal nodes work perfectly in ideal environmental conditions.
❑ Failed nodes are simply those unable to perform an operation; this could be because power failure and
environmental events.
❑ Badly failed nodes exhibit features of failed nodes but they can also send false routing messages which are
❑ Selfish nodes are typified by their unwillingness to cooperate, as the protocol requires whenever there is a
personal cost involved. Packet dropping is the main attack by selfish nodes.
❑ Malicious nodes aim to deliberately disrupt the correct operation of the routing protocol, denying network
service if possible.
Bluetooth
• Enables applications to di
• Radio Frequency Com • Bluetooth enabled
scover available services
munications (RFCOM electronic devices connect
• The Logical Link Control an and their features.
M). and communicate wirelessly
d Adaptation Protocol (L2C
• It is a cable through short range
AP) • Addresses the unique cha
replacement protocol networks known as Piconets
• Layered over the Baseband racteristics of the
used for generating a .
Protocol and resides in the data Bluetooth environment such
virtual serial data stream. • Provisions are in place,
link layer. as, dynamic changes in the
which allow for a master
• Used to multiplex multiple quality of services in RF
• RFCOMM provides and a slave
logical connections between proximity of devices in
for binary data transport. to switch their roles.
two devices. motion.
• Provides connection‐oriented • Can function over a
• Supports up to 60 • The simplest configuratio
and connectionless data serv reliable packet transfer
simultaneous connections n is a point to point confi
ices to upper layer protocols protocol.
between two BT devices guration with one master
• Uses a request/response
. and one slave.
model.
IP as the Network Layer
How data from "things" (IoT devices) is managed by data center servers, either in the cloud
or distributed locations. Dedicated applications run on virtualized or traditional operating
systems, including network edge platforms like fog computing.
These lightweight applications communicate with the servers, emphasizing the need for a
common architectural approach. This architecture should be independent of lower layers
(connectivity) and upper layers (applications). The Internet Protocol (IP) suite, adopted
widely since the 1990s, became central to this architecture, playing a key role in both IT
and OT environments.
Key Advantages of the IP Suite for IoT:
1. Open and Standards-Based: Ensures interoperability, interchangeability, security, and management, supported by open
standards like those from IETF, which governs network and transport layer protocols.
2. Versatile: IP can accommodate a wide range of access technologies and can evolve alongside physical and data link layers
like Ethernet, Wi-Fi, and cellular, making it adaptable over time.
3. Ubiquitous: IP (IPv4/IPv6) is widely supported across all operating systems and IoT application protocols, making it the
most pervasive protocol for IoT solutions across industry verticals.
4. Scalable: IP is proven for massive scalability, as demonstrated by its deployment in millions of private and public
infrastructure nodes, with the capability to handle large numbers of IoT devices.
5. Manageable and Secure: IP networks come with well-understood management and security tools developed over 30 years
of operational experience, offering ease in integration with operational technologies (OT).
6. Stable and Resilient: IP's long-standing use in critical infrastructures (e.g., financial, defense) and its support for voice and
video services showcase its stability and resilience.
7. Consumers' Market Adoption: IP is integral to consumer IoT solutions, enabling connectivity between smart devices
(smartphones, tablets, PCs) and IoT applications via broadband and mobile wireless infrastructure.
8. Innovation Factor: IP has driven significant innovation in various domains (e.g., Web, e-commerce, social media,
mobility, cloud services) and continues to foster innovation in IoT.
The Need for Optimization
The Internet of Things (IoT) will primarily rely on the Internet Protocol (IP)
suite, but challenges remain. One key issue is integrating non-IP devices and
addressing limitations at both the device and network levels, common in IoT
environments. To manage these restrictions, optimizations are needed across
various layers of the IP stack. Additionally, the transition from IPv4 to IPv6
introduces further complexities in IoT solutions.
Constrained Nodes
Devices possessing constrained processing capabilities, memory, storage, and power resources relative to
conventional PCs or servers. These nodes frequently have difficulties in network connectivity, including
unreliable pathways and erratic throughput, particularly during alterations in topology.
❑ In the early days of the Internet, bandwidth was limited by low-speed modems, but even with these
constraints, it was proven that IP could work over low-bandwidth networks.
❑ Today, despite the evolution to high-speed infrastructures, many IoT devices in the "last mile" still rely on
low-bandwidth networks due to technical constraints like low power, limited transmission distance, and
bandwidth regulations.
❑ These constrained networks, operating at a few kbps to a few hundred kbps, often face challenges like high
latency, packet loss, and fluctuating packet delivery rates, especially in wireless and narrowband power-line
communications.
❑ In such networks, overreacting to failures can cause collapse, so it's crucial to minimize control plane traffic
and consider the power consumption of battery-powered nodes to avoid further degradation of network
performance.
Application Protocols for IoT
(Message Queuing Telemetry Transport) MQTT
MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol widely used in IoT
networks due to its efficiency in low-bandwidth, high-latency, and unreliable network environments.
XMPP (Extensible Messaging and Presence Protocol) is a communication protocol based on XML, primarily
designed for instant messaging but increasingly used in IoT due to its flexibility and scalability. It provides a
flexible framework for building real-time communication applications.
Key Concepts:
How XMPP Works:
1. Jabber ID: This is your unique identifier on the XMPP network. It
1.Client: This is your messaging app typically looks like [email protected].
(like WhatsApp, Telegram, or a 2. Availability: This indicates your availability status (e.g., online, away,
custom-built one). busy).
2.Server: This is a central hub that 3. Roster: This is your list of contacts.
manages connections between 4. Message: This is a text-based communication sent between two users.
clients. 5. MUC (Multi-User Chat): This allows for group chats.
3.XMPP Core: This is the
underlying protocol that defines how
clients and servers communicate.
❑ It is a middleware protocol designed for real-time, scalable, and high-performance data exchange, commonly used in
IoT and distributed systems.
❑ DDS is a publish-subscribe communication protocol that allows different applications (publishers and subscribers) to
exchange data in real time.
Key components in the diagram: How DDS Works
1. Participants: Represented by different 1. Publishers send (or publish) data to a shared data space,
shapes (e.g., squares, circles). without knowing the recipients (subscribers).
2. Topics: Labeled lines connecting 2. Subscribers express interest in certain data topics and
participants. receive updates from publishers automatically when new
3. Data Writers and Readers: Publishers use data becomes available.
Data Writers to send data, while 3. This decouples the sender (publisher) and receiver
subscribers use Data Readers to receive it. (subscriber), allowing them to communicate efficiently
without needing direct connections.
Advanced Message Queuing Protocol (AMQP)
1.Producer sends a message: The producer sends a message to an exchange in the broker.
2.Exchange routes the message: The exchange routes the message based on a predefined rule to one or more queues.
3.Message stored in the queue: The message is held in the queue until a consumer retrieves it.
4.Consumer receives the message: The consumer processes the message and acknowledges its receipt.
Constrained Application Protocol (CoAP)
It is a lightweight protocol designed specifically for the Internet of Things (IoT). It's optimized for resource-constrained
devices, making it ideal for sensors, actuators, and other IoT devices.
Working Process:
1.Client-Server Model: CoAP follows a simple client-server architecture, where clients (e.g., sensors or smart devices)
send requests to servers (e.g., resource providers).
2.Request and Response: Clients can perform CRUD (Create, Read, Update, Delete) operations on resources using simple
HTTP-like methods (GET, POST, PUT, DELETE).
3.Message Format: CoAP uses a compact binary format for its messages, which is more efficient than text-based protocols
like HTTP, making it suitable for low-bandwidth, high-latency networks.
4.Reliability and Acknowledgments: CoAP includes built-in mechanisms for reliability, such as acknowledgments and
retransmissions for confirmed messages, ensuring that important data is reliably delivered.
5.Observe Option: CoAP allows clients to subscribe to resources and receive updates when the resource changes, enabling
efficient real-time data monitoring.
6.Multicast Support: CoAP can send messages to multiple recipients at once, which is beneficial for applications like
smart lighting or environmental monitoring.