0% found this document useful (0 votes)
1 views

FSIoT Chapter2

The document discusses the Internet of Things (IoT), predicting that the number of connected devices will soon exceed 20 billion. It outlines various applications of IoT, including smart homes, healthcare, industrial automation, and environmental monitoring, highlighting the importance of connectivity, intelligence, and security in IoT systems. Additionally, it covers the physical design of IoT devices and the protocols governing their communication.

Uploaded by

mercy
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

FSIoT Chapter2

The document discusses the Internet of Things (IoT), predicting that the number of connected devices will soon exceed 20 billion. It outlines various applications of IoT, including smart homes, healthcare, industrial automation, and environmental monitoring, highlighting the importance of connectivity, intelligence, and security in IoT systems. Additionally, it covers the physical design of IoT devices and the protocols governing their communication.

Uploaded by

mercy
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 94

SIoT

Chapter-2
INTRODUCTIO
NS
 The things that are connected to the internet
are going to be projected to cross the 20
billion figures soon. This is what has been
predicted.

 So, many things, billions and in fact, billions


and trillions of things are going to be
connected to the internetwork of things.

 Internet of things says is that the scope of


this internet is going to be expanded. So, it is
going to be expanded beyond computing and
computer devices being connected.
 It is going to interconnect different
things that physical objects that we
see around us

 Different objects such as the lighting


system in a room, the lights, the
fans, the air conditioners and
anything and everything including
things such as the toothbrush, the
microwave oven, the refrigerator
and so on.

 So forth and not only in our homes,


but also in our businesses such as
internet working different machines,
internet working different
equipment's and so on.
 So, each and everything that we see
around us that we use at our home in
businesses, in workplaces, everything
being internet worked. So, this is the
whole vision of internet work of
things, internet of things.
Internet of Things
(IOT):
The Internet of things (IoT) describes the network of physical objects
“things” that are embedded with sensors, software, and other
technologies for the purpose of connecting and exchanging data with
other devices and systems over the Internet.

Internet technology connecting devices, machines, tools to the


internet by means of wireless technologies such as Wi-Fi cellular
technologies, Bluetooth, Zigbee and different other wireless
technologies that are available to us.

The IoT is the network of physical objects that contain embedded


technology to communicate and sense or interact with their internal
states or the external states.
The following is the idea how would you lead your life connected to IoT
The following is the idea how would you lead your life connected to IoT
An Overview
An Overview
IoT Growth
Application Areas of IoT
 Smart Homes: Home automation systems are designed to make everyday
routine tasks convenient, such as regulating lights, controlling appliances,
adjusting thermostats, etc.
 It works with the help of Embedded systems, Home Automation
Systems, Energy Management and Climate adaptation.

 Health and wellbeing (Internet of Medical Things):


 IoT for Patients - Wearable devices such as fitness bands and other
wirelessly connected devices track and monitor health parameters
such as heartbeats and oxygen saturation in individual patients.

 IoT for doctors - Data collected from IoT devices can help physicians
identify the best treatment process for patients by using wearables and
other home monitoring equipment's, etc.

 IoT for Hospitals - IoT devices tagged with sensors can be used for
tracking real time location of medical equipment like wheelchairs,
 Smart industry: IoT can boost productivity by enabling
industrial automation by real-time data analytics and seamless operations
with high-quality output.

 The automation of industrial processes or Industrial IoT is integral


to Industry 4.0.

 Smart Energy: IoT-enabled smart grid empowers consumers and


governments to make better decisions regarding energy usage.

 It allows cities to save electricity through sophisticated, seamless


connectivity and communications.
 Smart agriculture: IoT enables precision farming through data
analysis to optimize agricultural operations.
 It monitors key parameters such as soil moisture, nutrients,
etc. and helps the farmer community make better informed
decisions.
 It uses various technologies such as GPS, GIS, sensors, aerial
devices, field mapping, etc. to streamline crop management
processes, increase production levels, and improve
profitability.
 Example: Israel based start-up Fielding employs IoT to
manage pests by using pesticides more efficiently and safely.

 Smart Environment: IoT allows environmental sensors to


connect with devices such as smartphones to enable real time
status of environmental factors such as humidity, temperature,
 IoT in Disaster Management: IoT can be helpful in quick
hazard mapping, Earthquake Early Warning Systems, etc.
 For example, the National Advance Seismic System of the
United States delivers real-time information, providing
situational awareness for emergency response.

 Smart Water Monitoring: Ministry of Jal Shakti, India, has


decided to employ “sensor-based IoT devices” in every
village under the National Jal jeevan mission to monitor the
quality of water.
 Smart Cities: Smart cities leverage IoT to facilitate smart
infrastructure to improve the quality of life for their city
residents, optimize resource usage, and increase operational
efficiency.
 Smart traffic management systems for example, employ
 Street lighting offers energy-efficient solutions through
adaptive lighting facilitated by embedded systems on the
network.

 Waste Management Systems optimize collection routes and


schedule the fill levels of waste containers by collecting and
analyzing sensor data.

 IoT in Defense: The Internet of Military Things (IoMT) is a


class of connected devices employed for warfare.
 It has wide applications in advanced combat operations and
intelligence-oriented warfare.
 It allows real-time connectivity among devices, such as
between unmanned vehicles and a central command station.
 For example, Joint All Domain Command and Control of
Major Components of Internet
of Things
 Things or devices: These include smart thermostats,
wearable fitness trackers, connected home appliances,
industrial machinery that has embedded sensors,
processors, and communication hardware to collect and
transmit data.
 IoT devices are connected to the internet network through
various means, such as Wi-Fi, cellular networks,
Bluetooth, etc.

 Gateway: Gateway ensures interoperability of the


connected devices and sensors.
 It manages the bidirectional data traffic between
different networks and protocols.
 Cloud: IoT cloud offers tools to collect, process, manage, and
store huge amounts of data in real time.
 Industries and services can easily access this data remotely
and make critical decisions when necessary.

 Analytics: Itis the process of converting analog data from


billions of smart devices and sensors into useful insights that
can be interpreted and used for detailed analysis.
 It manages and improves the IoT system.

 User interface: User interfaces are the visible and tangible


part of the IoT system that users can access, interact with, and
feed input and response to.
Workin
g of
IoT
•Data Ingestion: IoT devices or sensors collect data from the environment
and provide inputs such as temperature and humidity for further processing
in clouds.

•Data transmission: The data is transmitted to the cloud via Gateway.


• Gateway uses both cellular and satellite communication to transmit data.

•Data processing: Data processed at cloud level generates optimal


response.
• For example, to check the temperature range of an Air Conditioner.

•Data visualization: It is about showing information and alerting for


proactive response.

•Data analysis and prediction: Data analytics make use of collected data
over time to provide actionable insight. It helps in predicting future events.
• For example, by analyzing data, future malfunctioning of machines can
Characteristics of IoT

The characteristics of IoT are as follows


• Connectivity
• Intelligence
• Identity
• Scalability
• Dynamic and Self-Adapting (Complexity)
• Architecture
• Safety (Security)
• Network
• Data
1. Connectivity
Connectivity is an essential feature of IoT. IoT lets you connect cell phones, laptops,
and other internet devices. Any person can get information about anything at any
time and place.
IoT can connect through several wireless devices, like sensors, cell phones, trackers,
etc. This way, the person will not have to wait for an internet connection to operate
a device.

2. Identity of Things
The collaboration of name and number gives an identity to an internet device.
Giving an identity to the device is an essential aspect of loT. Identity helps to
differentiate between various internet devices and select the device we want to
send the command.
Every device needs a different controlling power based on the type of data provided.
It is essential to give a unique identity to every device so that we can set up
passwords or other security means. For example, fingerprints, face recognition IP
addresses, and Face lock systems are several means of security given to the
different identified devices to protect them.
Connectivity

• Connectivity is an important
requirement of the IoT
infrastructure.

• Things of IoT should be connected


to the IoT infrastructure.

• Anyone, anywhere, anytime can


connectivity should be always
guaranteed.

• Without connection, nothing makes


sense.
Intelligence
and
Identity
• The extraction of knowledge
from the generated data is
very important.
• For example, a sensor
generates data, but that data
will only be useful if it is
interpreted properly.
• Each IoT device has a unique
identity.
• This identification is helpful in
tracking the equipment and
at times for querying its
status.
3. Intelligence

The intelligence of IoT devices depends on the sensors' intelligence. The sensors
send the data to the user for further analysis.
We need to update the IoT devices regularly to get the smart work done. It adds
to their features and makes them smarter.

4. Dynamic

We need to create IoT devices in a way that they can adapt to the environment.
For example, an AC should have a sensor that can send a signal to the cloud and
adjust it to the premises of the place. Similarly, the camera can easily click
photographs by adjusting to light situations, like day and night.
5. Scalability

Scalability means the amount of data one can handle efficiently. The
IoT has created a setup to handle enormous data and generate useful
analysis.

6. Self Upgradation

As we saw above, updating the software regularly is important. But


who has the time to remember to do that? Thus, with its artificial
intelligence, IoT upgrades itself without human help. It also allows the
set up of a network for the addition of any new IoT devices. Thus, the
technology can quickly start working without delay if the setup has
already been done.
Scalability

• The number of elements


connected to the IoT zone is
increasing day by day.

• Hence, an IoT setup should


be capable of handling the
massive expansion.

• The data generated as an


outcome is enormous, and it
should be handled
appropriately.
Dynamic and
Self-Adapting
(Complexity)
• IoT devices should dynamically
adapt themselves to the
changing contexts and scenarios.

• Assume a camera meant for the


surveillance.

• It should be adaptable to work in


different conditions and different
light situations (morning,
afternoon, night).
7. Architecture
The architecture of IoT is designed in a way that it can support various
devices, technologies, and protocols. Its main work is to confirm whether
each connected device does not interfere with the other. This way, the safety
and security of each device's data are maintained.

8. Security
With the increasing number of IoT devices, issues regarding the security of
personal data have arisen. There might be a chance of data leakage as a
large amount of data is collected, exchanged, and generated. There is a
chance of personal data being transferred without approval, which is a
matter of concern.
To overcome this challenge, IoT has created networks, systems, and devices
wherein privacy is well maintained. Maintaining safety and security is a big
dare for IoT. However, it still handles it without any disruption.
It should be
hybrid, supporting
IoT architecture
different
cannot be
manufacturers
homogeneous in
products to
nature.
function in the IoT

Architect network.

ure
IoT is not owned IoT is a reality
by anyone when multiple
engineering domains come
branch. together.
Safety
• There is a danger of the sensitive
personal details of the users getting
compromised when all his/her devices
are connected to the internet.

• This can cause a loss to the user.

• Hence, data security is the major


challenge.

• Besides, the equipment involved is


huge.

• IoT networks may also be at the risk.


equipment safety is also critical.
9. Network
With the increasing number of IoT devices in a network, it becomes difficult to
maintain communication for proper functioning. However, cloud service and
gateway are a few methods that can solve such problems.
Often, one device can use the connectivity of another device to establish
network connectivity even if the second device is not connected to a network.
Because IoT devices can communicate with one another, it is more effective and
adaptable than other current technologies.

10. Data
The data gathered from IoT devices are analyzed for future prediction. For
example, a calorie meter. It helps to regulate the number of calories each day.
We also have fitness data, thermostats, and various devices that monitor our
health. Therefore, we can use the data collected through these devices.
Physical Design of Internet of Things (IOT)
Physical design knowledge is crucial for selecting suitable
devices and sensors, ensuring seamless integration, and
optimizing connectivity options in IoT systems.
It enables power efficient strategies, facilitates edge
computing, and enhances reliability and resilience through
redundancy and failover mechanisms.

This knowledge ensures robust, efficient, and reliable IoT


ecosystems.
The physical design of IoT (internet of things) includes things
and different protocols.
Physical Design of IoT: Things

Things in IoT refers to IoT devices.

Things have unique identities.

Things can perform sensing, actuation, and monitoring.

Some of the examples of things in internet of things are shown


below.
Some of the examples of IoT devices are:

 Home appliances: smart TV, smart refrigerator,


smart AC, etc.
 Smart phones and computers
 Wearables: smart watch, smart sensors, etc.
 Automobiles like self-driving cars
 Energy systems
 Retail : smart payment
 Printers
 Industrial machines
 Healthcare: smart watch, smart healthcare, etc.
 Surveillance: smart cameras, smart trackers,
etc.
Things can exchange data with other connected devices and
applications, collect data from other devices, and process the
data either locally or send it to centralized servers or cloud.

IoT devices can have several interfaces like:


• I/O interfaces for sensors
• Interface for Internet connectivity
• Memory and storage connectivity interfaces
• Audio/video interfaces

An IoT thing or device is made up of different components.

The generic block diagram of an IoT thing or device is given


below:
 An IoT device provides connectivity interfaces like USB, RJ45,
etc.

 It contains a microcontroller or processor for computation


tasks.

 It provides audio/video interfaces like HDMI, RCA, 3.5mm


audio channel.

 It contains memory interfaces like DDR.

 It might support graphics by providing a separate Graphical


Processing Unit (GPU), it provides storage interfaces like
MMC, SDIO.


Physical Design of IoT: IoT Protocols

A protocol is a set of rules that governs the communication


between two or more devices. A protocol defines the rules,
syntax, semantics and synchronization of communication and
possible error recovery methods.
An overview of different protocols used in IoT with respect to
TCP/IP protocol stack is given below:
Link Layer Protocols:
 The link layer is responsible for establishing and terminating
links between the nodes.

 The packets or datagrams travel through these links.

 The link layer also defines the format of packet that is to be


communicated across the link and is responsible for physical
addressing.
 The link layer also handles error detection, retransmission,
flow control and access of the link.

 Protocols generally used at this layer are Ethernet, Wi-Fi,


WiMax, LR-WPAN, cellular technologies, etc.
Network Layer Protocols:
The main role of the network layer is transferring the packet
from sender to receiving host.

The network layer also handles routing, which involves selecting


the next node and forwarding the packets across the
communication path.

The network layer is also responsible for logical addressing (like


IP address) and for congestion control which prevents the
network from being overloaded with traffic.

Different protocols at network layer are:


•IPv4 (32-bit addresses)
•IPv6 (128-bit addresses)
Transport Layer Protocols:
The main role of transport layer is providing end-to-end
communication between the applications running on hosts.
The transport layer provides a logical communication channel
through which the end applications can communicate with each
other.
The transport layer is implemented on the end hosts.
It is not present in the routers.
The transport layer is also responsible for the reliable delivery of
the message across the end nodes, flow control and
multiplexing and demultiplexing of the channels at end nodes.

Different protocols at transport layer are:


•TCP (Transmission Control Protocol)
•UDP (User Datagram Protocol)
Application Layer Protocols

The application layer is where the users of an IoT application


interact with the IoT application/system.
The application layer allows the users to interact with the IoT
sensors and access other services provided by the
communication network.
The application layer provides services like authentication,
naming, message formatting, email, etc, to the users.

Different protocols at transport layer are:


•HTTP (HyperText Transfer Protocol)
– Uses TCP, Stateless, Request-Response Model
•CoAP (Constrained Application Protocol)
– Uses UDP, Request-Response Model

•MQTT (Message Queue Telemetry Transport)


– Follows publish-subscribe model
– No security
– Used with low power devices

•XMPP (Extensible Messaging and Presence Protocol)


– Real-time communication, For sending XML data

•AMQP (Advanced Message Queuing Protocol)


– Supports both point-to-point and publisher-subscriber models
– High performance and secure protocol
– Uses TCP

•WebSocket
– Full-duplex connection over a single socket connection
– Uses TCP

•DDS (Data Distribution Service)


– Middleware standard, Reliable than MQTT
– Follows publish-subscribe model
– Uses UDP
Functional blocks of IoT
 The Internet of Things (IoT) is a rapidly growing industry, with
more and more devices becoming connected on a regular
basis.

 The Internet of Things devices range from small sensors to


huge machines and systems, but they all have one thing in
common: they generate data.

 IoT systems use functional blocks to make sense of this data


and extract value from it.

 These blocks are distinct components of the IoT system that


carry out specialized functions.
IoT Functional Blocks:

IoT systems are composed of several building blocks, including


sensors/actuators, connectivity, security, services, etc. The
functional blocks are responsible for sensing, verification,
actuation, management, and communication.

These functional blocks are made up of devices that handle


interactions between a web server and the client, enable
controls and monitoring functions, manage data transfer, secure
the IoT system through authentication and various purposes, and
offer an interface for monitoring and managing various concepts.
Let’s gather more information about the IoT Functional Blocks.
Advantages of IoT Functional Blocks
IoT Functional Blocks provide various advantages to enterprises and people
interested in implementing IoT solutions.
These advantages include −

Scalability
IoT Scalability is built into Functional Blocks, allowing enterprises to add new
devices and services to their IoT system as needed. The capacity to scale assures
that an IoT system can grow and react to changing business needs and future
technology.

Interoperability
IoT Functional Blocks is a standardized architecture for developing IoT solutions. This
standardization means that devices and services from various suppliers may
function seamlessly together, enhancing interoperability and lowering integration
costs.
Modularity
Because IoT Functional Blocks are modular, they may
be swapped, modified, or added as needed. Because of
this versatility, enterprises can select the optimal
components for their IoT system and easily swap out
components as needed.

Flexibility
IoT Functional Blocks offer a variety of deployment
choices. Depending on their needs, businesses can
implement an IoT system on-premises, in the cloud, or
in a hybrid approach.
Sensor Networks.
Wireless Sensor Network (WSN)
• Wireless Sensor Network (WSN), is an infrastructure-less wireless
network that is deployed in many wireless sensors in an ad-hoc manner
that is used to monitor the system, physical, or environmental conditions
• Sensor nodes are used in WSN with the onboard processor that manages
and monitors the environment in a particular area.
• They are connected to the Base Station which acts as a processing unit in
the WSN System. The base Station in a WSN System is connected through
the Internet to share data. WSN can be used for processing, analysis,
storage, and mining of the data
Wireless Sensor Network Architecture
A Wireless Sensor Network (WSN) architecture is structured into three main
layers:
Physical Layer: This layer connects sensor nodes to the base station using
technologies like radio waves, infrared, or Bluetooth. It ensures the
physical communication between nodes and the base station.

Data Link Layer: Responsible for establishing a reliable connection between


sensor nodes and the base station. It uses protocols such as IEEE 802.15.4.

Application Layer: Enables sensor nodes to communicate specific data to


the base station. It uses protocols like ZigBee to define how data is
formatted, transmitted, and received, supporting various applications such as
environmental monitoring or industrial control.
WSN Network Topologies
Wireless Sensor Networks (WSNs) can be organized into different network topologies based on
their application and network type.
Here are the most common types:
Bus Topology: In a Bus Topology, multiple nodes are connected to a single line or bus.
Data travels along this bus from one node to the next. It’s a simple layout often used in smaller
networks.

Star Topology: Star Topology have a central node, called the master node, which connects
directly to multiple other nodes. Data flows from the master node to the connected
nodes. This topology is efficient for centralized control.

Tree Topology: Tree Topology arrange nodes in a hierarchical structure resembling a tree.
Data is transmitted from one node to another along the branches of the tree structure.
It’s useful for expanding coverage in hierarchical deployments.
Mesh Topology: Mesh Topology feature nodes interconnected with one another, forming
a mesh-like structure. Data can travel through multiple paths from one node to another
until it reaches its destination. This topology offers robust coverage and redundancy
Applications of WSN

Internet of Things (IoT)


 Surveillance and Monitoring for security, threat
detection
 Environmental temperature, humidity, and air
pressure
 Noise Level of the surrounding
 Medical applications like patient monitoring
 Agriculture
 Landslide Detection
Advantages
 Low cost: WSNs consist of small, low-cost sensors that are easy to deploy,

 Wireless communication: WSNs eliminate the need for wired connections, which can
be costly and difficult to install. Wireless communication also enables flexible
deployment and reconfiguration of the network.

 Energy efficiency: WSNs use low-power devices and protocols to conserve energy,
enabling long-term operation without the need for frequent battery replacements.

 Scalability: WSNs can be scaled up or down easily by adding or removing sensors,


making them suitable for a range of applications and environments.

 Real-time monitoring: WSNs enable real-time monitoring of physical phenomena in


the environment, providing timely information for decision making and control.
While WSNs offer many benefits, they also have limitations
and challenges that must be considered when deploying and
using them in real-world applications.

Disadvantages
 Limited range
 Limited processing power
 Data security
 Interference
 Deployment challenges
Communication
Protocols
Communication protocols are an essential part of IoT, enabling devices to communicate
with each other and exchange information seamlessly.
What are IoT Protocols?
 IoT protocols are sets of rules and standards that govern the way IoT devices
communicate with each other and with other systems over the internet.
 These protocols define how data is exchanged, what format it should be in, and
how it should be encrypted and authenticated for security purposes.

Role of communication protocols in IoT


 These devices need to communicate with each other and with other systems,
such as cloud services, in a standardized and interoperable manner.
 Communication protocols provide a common language and framework for IoT
devices to communicate with each other and with other systems.
 They enable devices to work together, even if they are from different
manufacturers or use different communication technologies.
 Communication protocols also ensure the security and privacy of IoT data.
 They define the authentication, encryption, and access control mechanisms
that protect IoT data from unauthorized access or tampering.
 Communication protocols can also optimize the use of network resources by
minimizing the bandwidth and energy consumption of IoT devices.
Communication Protocols in IoT
 There are several communication protocols in IoT, each designed for specific use cases
and applications.

MQTT (Message Queuing Telemetry Transport)


 MQTT is a lightweight publish-subscribe protocol designed for IoT devices with limited
resources such as low bandwidth, memory, and processing power.
 It works on top of the TCP/IP protocol and uses a simple and efficient messaging model
to enable bi-directional communication between devices.
 MQTT is widely used in IoT applications such as smart homes, industrial automation,
and asset tracking.
Advantages:
 Low overhead and efficient use of network bandwidth
 Can handle unreliable and intermittent network connections
 Supports QoS (Quality of Service) levels for message delivery assurance
 Scalable and easy to implement
Disadvantages:
 Limited security features, which may require additional encryption and authentication
mechanisms
 May not be suitable for applications that require real-time communication
CoAP (Constrained Application Protocol)
 CoAP is a lightweight protocol designed for IoT devices with limited
resources and low-power networks such as 6LoWPAN and Zigbee.
 It’s like HTTP in terms of its request/response model, but it’s optimized
for constrained devices and networks.
 CoAP is widely used in IoT applications such as smart homes, healthcare
monitoring, and industrial automation.
Advantages:
 Low overhead and efficient use of network bandwidth
 Can handle unreliable and intermittent network connections
 Supports resource discovery and manipulation
 Scalable and easy to implement
Disadvantages:
 Limited security features, which may require additional encryption and
authentication mechanisms
 May not be suitable for applications that require real-time
communication
DDS (Data Distribution Service)
 DDS is a protocol designed for real-time data distribution and messaging
in mission-critical systems such as industrial automation, aerospace, and
defense.
 It provides a publish-subscribe model with support for Quality of Service
(QoS) levels and data-centric middleware.
 DDS is suitable for applications that require high-speed data transfer
and real-time communication.
Advantages:
 High scalability and support for real-time data distribution
 Reliable and secure communication with built-in authentication and
encryption
 Supports Quality of Service (QoS) levels for message delivery assurance
Disadvantages:
 May not be suitable for resource-constrained devices due to its
complexity and overhead
 Requires specialized expertise for implementation and maintenance
Zigbee
 Zigbee is a wireless communication protocol designed for low-power and
low-data-rate IoT applications such as smart homes, smart lighting, and
home automation.
 It operates on the IEEE 802.15.4 standard and provides a mesh
networking topology for reliable communication in a decentralized
network.
Advantages:
 Low-power consumption for extended battery life
 Reliable communication with mesh networking topology
 Secure communication with built-in encryption and authentication
 Suitable for low-data-rate applications
Disadvantages:
 Limited range compared to other wireless protocols such as Wi-Fi and
Bluetooth
 Limited bandwidth and data rate
 Requires a gateway for internet connectivity
LoRaWAN (Long Range Wide Area Network)
 LoRaWAN is a low-power, long-range wireless communication protocol
designed for IoT applications such as smart cities, asset tracking, and
agriculture.
 It operates on the unlicensed radio spectrum and provides a wide area
network (WAN) for communication over long distances.
Advantages:
 Long-range communication up to several kilometers
 Low-power consumption for extended battery life
 Secure communication with built-in encryption and authentication
 Suitable for low-data-rate applications
Disadvantages:
 Limited bandwidth and data rate
 Requires a gateway for internet connectivity
 Limited network coverage in some regions
HTTP (Hypertext Transfer Protocol)
 HTTP is a widely used protocol for web communication and is also used
in IoT applications such as smart homes and smart cities.
 It uses a request/response model and supports various data formats
such as JSON and XML.
 HTTP is suitable for IoT applications that require real-time
communication and high-speed data transfer.
Advantages:
 Widely used and supported
 Supports various data formats
 Suitable for real-time communication and high-speed data transfer
 Robust security features
Disadvantages:
 High overhead and inefficient use of network bandwidth
 Not suitable for low-power and resource-constrained devices
 Requires a reliable and stable network connection
WebSocket

•Linked to the HTTP protocol, the


WebSocket technology establishes a TCP
connection between a browser and a
server, and then both exchange
information until the connection is closed.
Figure 3 shows a high-level comparison
between HTTP and WebSocket.
•Although this protocol can be seen as an
improvement of the HTTP connection, the
WebSocket is still very overloaded and
heavy for IoT application.
Advanced Message Queue Protocol (AMQP)
 In the beginning, AMQP was not initially created for IoT applications, but
for banking environments.
 AMQP accepts publish/subscribe architectures, as well as
request/response types.
 It is TCP-based, so delivery is guaranteed, as well as acknowledgment,
which makes this protocol reliable, with the consequent overhead
message reliability.
 Compared to MQTT, AMQP offers two Quality of Service levels:
 At most once: the sender does not wait until having an acknowledgment
from the receiver to delete a message.
 At least once: for each message, the sender will receive an
acknowledgment from the receiver before deleting the message. In a
case where the acknowledgment is lost, the message is re-sent.
 Exactly once: the messages are sent only once. It requires special
coordination between the sender and the receiver.
Extensible Messaging and Presence Protocol (XMPP)
 It is based on Extensible Markup Language (XML) and in the
past, it was known as Jabber.
 It is an open-source, decentralized, secure protocol to
exchange XML messages.
 A characteristic factor of XMPP is its addressing method and
how nodes are identified.
 It uses a Jabber ID with the format [email protected],
which allows two nodes to interchange information regardless
of the distance between them.
OPC Unified Architecture (OPC UA)
 It is a standard made for industrial communication, strongly
oriented to guarantee interoperability between
manufacturers, operating systems, and programming
languages.
 The OPC foundation reported that many industrial vendors
are currently (as of 2022)
adopting the OPC UA as the open standard.
 All in all, the OPC UA is a transport-agnostic protocol, so it
supports both previously used architectures:
request/response (such as WebSocket or HTTP), as well as the
publish/subscribe (such as the MQTT).

You might also like