IOT Notes Unit 1 2 3 4 and 5

Download as pdf or txt
Download as pdf or txt
You are on page 1of 56

Unit I

INTRODUCTION TO IOT
IOT allows devices or hardware together information and send it over the internet to cloud, app or software.
The Internet of Things, also called The Internet of Objects, refers to a wireless network between objects; usually the
network will be wireless and self-­‐configuring, such as household appliances.
The term "Internet of Things" has come to describe a number of technologies and research disciplines that enable the
Internet to reach out into the real world of physical objects.

Characteristics

1) Dynamic & Self Adapting: IoT devices and systems may have the capability to dynamically adapt with the changing
contexts and take actions based on their operating conditions, user‗s context or sensed environment.
Eg: the surveillance system is adapting itself based on context and changing conditions.
2) Self Configuring: allowing a large number of devices to work together to provide certain functionality.
3) Unique Identity: Each IoT device has a unique identity and a unique identifier (IP address).
4) Intelligence

Applications of IoT

1) Home
2) Industry
3) Environment
4) Retail
5) Agriculture
6) Science and Research
7) Health & Life Style
8) College/University/Institute

Why IOT is Important?

1. Better Decision Making


2. Better Quality for Life
3. Automation
4. Real Time Tracking and Monitoring

Advantages of IoT
1. Increased convenience
2. Better monitoring
3. Save time
4. Minimize human effort
5. Ease of Access
6. Automation and Control
7. Enhance Data Collection
8. Improve security
9. Improved efficiency
Disadvantages of IoT
1. An IoT device is very costly and time-consuming.
2. Security issues
3. complexity of systems
4. High dependency on the internet
5. Increased unemployment
6. Privacy concern
7. Connectivity and Power
8. Dependence on technology
9. Limited battery life on some devices.

Overview of Governance, Privacy and Security Issues.


Elements of an IoT Ecosystem
Seven major Elements of an IoT ecosystem:

1. IoT devices

2. Security

3. Network

4. Gateway

5. The cloud

6. Application

7. User
Components of IoT

1. Sensors/Devices:

Sensors/Devices collect data from their environment. e.g. Our phone is a device that has multiple sensors like GPS,
camera, Motion etc. where data is being collected based on surroundings

2. Connectivity to Cloud :

The sensors/devices can be connected to the cloud and store, through a variety of methods including: Bluetooth, WiFi,
Cellular etc.

3. Data Processing :

Software perform data processing on cloud data to get a analyzed or computed data. e.g Computing the temperature
within an acceptable range.
4. User Interface :

The analyzed or computed data is made useful to the end user via and alert(email, text, notification). e.g a alert message
when temperature is beyond the acceptable range.
Unit II
IoT Protocols

A)Link Layer

 802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer. Eg: 802.3
uses co-axial cable
 802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN) communication standards including
extensive description of link layer.
 802.16 - WiMax: IEEE802.16 is a collection of wireless broadband standards including exclusive
description of link layer.
 802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless personal area
network(LR-WPAN).

B) Network Layer:
Responsible for sending IP datagrams from source network to destination network

 IPv4: Internet Protocol version4 is uses 32 bit address.


 IPv6: Internet Protocol version6 uses 128 bit address.
 6LOWPAN:(IPv6overLowpowerWirelessPersonalAreaNetwork)

C)Transport Layer:

 TCP: Transmission Control Protocol used by web browsers (along with HTTP and HTTPS),
email(along with SMTP, FTP). Connection oriented and stateless protocol.
 UDP: User Datagram Protocol is connectionless protocol.
D) Application Layer:

 HTTP: Hyper Text Transfer Protocol that forms foundation of WWW.


 CoAP: Constrained Application Protocol for machine-to-machine (M2M) Uses client- server
architecture.
 WebSocket: allows full duplex communication over a single socket connection.
 MQTT: Message Queue Telemetry Transport is light weight messaging protocol based on publish-
subscribe model. Uses client server architecture.
 XMPP: Extensible Message and Presence Protocol for real time communication.Support client-
server and server-server communication.
 DDS: Data Distribution Service is data centric middleware standards for device-to-device or
machine-to-machine communication. Uses publish-subscribe model.
 AMQP: Advanced Message Queuing Protocol .Supports both point-to-point and publish-subscribe
model.

BACnet
 Building Automation Control Network
 Open communication protocol standards that building management systems
 Data that BACnet sends can be much more complex
 It is more Complex
 It is Low cost Protocol
 It support User Datagram Protocol(UDP)
 Communication across devices
 BACnet uses a client-server architecture, where devices can act as either clients or servers.
 It also supports a variety of networking technologies, such as IPv4, IPv6, and BACnet/IP,Zigbee.
 Multiple devices communication Network

Modbus (M bus)
 Modbus is a network protocol best used for industrial automation systems specifically for connecting electronic
equipment.
 Open communication protocol used in building automation and control systems
 Room Heater(30 C to 90 C)
 Protocol that uses a master-slave architecture, where one device (the master) sends commands to one or more
devices (the slaves).
 Two-way communication between devices
 Less complex
 Low cost protocol
 Communication between devices
 It support TCP(Transmission Control Protocol)

Lonworks
 Local Operating Network
 Use in building automation and control systems.
 Uses a distributed control architecture
 High Cost
 It also supports a variety of networking technologies, such as IPv4 and IPv6.
BACnet Modbus Lonworks
Building Automation Control M Bus Local Operating Network
Network

Developed by ASHRAE Developed by Modicon Developed by Echelon


Corporation
Communication across Connection between Fiber optics and other
devices devices media
Low Cost Low Cost High Cost
Client-Server Master-slave Distributed control
Architecture Architecture, Architecture

Ethernet, IP, Zigbee ASCII, RTU, TCP/IP Network

Zigbee
 Zigbee technology addresses needs of industrialmeasurement and control (automation)
 Zigbee Alliance is consortium of 150+ companies
 Includes Honeywell, Motorola, Phillips, Samsung, Mitsubishi
 IEEE 802.15.4 is “Low-Rate Wireless PAN Standard”
 Zigbee Alliance promotes IEEE 802.15.4 standard
 IEEE 802.15.4 defines only Physical and MAC layers
 Not attractive for business communication networks because of low data rate

Standard recognizes 2 types of devices


Full-Function Device (FFD)
 Can also function as a normal device

Reduced-Function Device (RFD)

• Simpler in design than FFD


• Can’t function as Network Coordinator

FFD RFD
Full-Function Device Reduced-Function Device
High Cost Low Cost
With Network Without Network
More Complex Less Complex
Use Bluetooth, Wifi, IP Address No Use Bluetooth, Wifi, IP Address
Four Pillars for IOT
M2M Machine To Machine
WSN Wireless Sensor Network
SCADA-Supervisory Control and Data Acquistion
RFID-Radio Frequency Identification

M2M Machine To Machine


It uses WAN , GPRS, Cellular and Fixed Network
Subset of IoT
M2M is mostly Hrdware Based Technology
One To One Communication (Peer To Peer Communication)
Direct communication between machines.
Deployed in a closed System
It is use for Monitoring and Control System
Design for Small Scale Project
It works both indoors as well as outdoors
M2M supports various network topologies such as star, mesh, tree, peer to peer etc.
Components of M2M architecture are
1) M2M Devices
2) M2M Area Network (Device Domain)
3) M2M Gateway
4) M2M Communcation Network (Network Domain)
5) M2M Applications ( Application Domain)

Advantage
1. Higher range,
2. Minimum latency,
3. Higher throughput
4. Consume less energy.
5. Reduces fragmentation
6. Non IP Protocol

Disadvantage
1. It is designed and optimized for small number of network devices.
2. Limit flexibility and innovation.

Application
 Smart Home Meter
 Asset Tracking
 Supply chain management (SCM)
 Vending machine:
 Warehouse management systems

 Manufacturing
SCADA
Supervisory Control and Data Acquisition
Using short range n/w inside a building or an industrial plant
Store large amount of data
Installation cost is high
Very Complex
As per User Requirement, You can store data
It support hardware and software system
SCADA Advantage
1. Faster and Easier
2. Centralized control
3. Real-time data
4. It is fast in obtaining response
5. Remote access

SCADA Disadvantage
1. Installation costs are higher
2. Increases unemployment rates
3. System supports use of restricted softwares and hardware equipments.
4. Not Suitable for small project

SCADA Application
 Food Processing Industry
 Chemical Industry
 Water Treatment Plant
Where

 Human-machine Interface (HMI)

 Remote Terminal Units (RTU)

 Programmable Logic Controllers (PLC)

RFID
Radio Frequency Identification
RFID scanners can read multiple codes at once.
RFID systems are much more efficient for scanning a large number of items
Uses radio frequency to read and capture information stored on a tag attached to an object
Real Time Data Use
Track the object/Identify the object
Eliminate the Human Error

Types of RFID
Passive RFID
Active RFID

Passive RFID Active RFID

Lower Cost Higher Cost


Short Range 100 Feet Long Range Upto 1000 Feet
Less Secure More Secure
Store short signal Data Store Large signal Data

Advantages of RFID
1. Better Security then Bar Code
2. More Efficiency
3. Durability
4. Support Long Range then Bar Code
5. Identify the goods

Disadvantages of RFID
1. High Cost then Bar code
2. Not Accurate Everytime
3. Power Shortage Issue
4. Implementation can be difficult & time consuming
5. RFID technology is harder to understand
Application of RFID
 Animal Tracking
 Library Book
 Automatic Toll Deduction (Fast Tag Card)
 Identify Real Time Train Coach Position/Tracking

RFID GPS
Radio Frequency Identification Global Positioning System
Range Upto 500 meter Range Upto 1000+ Meter
No Battery Battery Range(1-7 Days)
Power Consumption is very low Power Consumption is very High
Used to track high-value goods. Used to track Low value goods.

UWB
 Ultra Wide Band
 70 meters (Low), 250 meters (Max.)
 More Accuracy then RFID
 UWB is ideal for accurate position tracking, low latency multimedia and high data rate applications
 Most recent location technologies
 Very secure Then RFID
 Less cost compare to RFID
 UMB is 2 way Communication but RFID is One Way Communication

Which One of technology is best for position tracking and Security (RFID,UMB ,GPS)?

UMB (Ultra Wide Band)


Wireless Sensor Networks

Sensor is a device used to gather information about a physical process and


translate into electrical signals thatcan be processed, measured and analyzed

1. Sensor networks have emerged as a promising tool for monitoring


thephysical world, that can sense, process and communicate.

2. WSN is a special kind of ad-hoc network that consists of large no. of


wireless sensor nodes.

3. WSN is a group of low-power, low-cost, multifunctional and small size


wireless sensor nodes

WSN Applications

1. Environmental monitoring
2. Health care
3. Disaster Mitigation
4. Industrial applications
5. Security and safety applications
6. Military Applications

Important Issues

1. Coverage

2. Connectivity

3. Power management

4. Self-deployment

5. Security
Need of WSNs

1. Sensor at inaccessible or difficult-to-access locations


2. Sensors are mobile or nomadic
3. Quick deployment
4. Ad-hoc networking

Wireless Sensor Network Architecture


Main Constraints of WSNs:

1. Limited sensing and communication range

2. Limited battery capacity

3. Limited processing

Challenges in WSN

1. Fault Performance
2. Scalability
3. Production Cost
4. Operation Environment
5. Quality of Service
6. Data Aggregation
7. Data Compression
8. Data Latency

Advantages in Wireless Sensors

1. Much cheaper to deploy than wired sensors

2. Sensor nodes can be added or removed easily

3. Node location can be changed without rewiring

4. Can be configured into different network topologies


Special Features of Wireless Sensors

1. Large number, high density deployment


2. Channels are unreliable
3. Ad-hoc transmission mode
4. Less predefined deployment
5. Vulnerable to environmental damages

HTTP
 HTTP stands for Hyper Text Transfer Protocol.
o
 It is a protocol used to access the data on the World Wide Web (www).
 The HTTP protocol can be used to transfer the data in theform of plain text,
hypertext, audio, video, and so on.

HTTP Request and HTTP Response


1. A client sends an HTTP request to the web
2. A web server receives the request
3. The server runs an application to process the request
4. The server returns an HTTP response to the browser
5. The client receives the response
HTTPS?

The full form of HTTPS is Hypertext Transfer Protocol Secure. HTTPS is a secure version of
the HTTP protocol. To provide encryption, HTTPS uses an encryption protocol known as
Transport Layer Security. The use of HTTPS protocol is mainly required where we need to
enter the bank account details.
It is written in the address bar as https://.
HTTP vs. HTTPS
HTTP vs. HTTPS

OSI Model
 OSI stands for Open Systems Interconnection
 Created by International Standards Organization (ISO)
 Was created as a framework and reference model to explain how different
networking technologies work together and interact .
 Each layer has specific functions it is responsible for
 All layers work together in the correct order to move data around a network
 Open System Interconnect is an open standard for all communication systems. OSI
model is established by International Standard Organization (ISO). This model has
seven layers:

TCP/IP Model

Internet uses TCP/IP protocol suite, also known as Internet suite. This defines
Internet Model which contains four layered architecture. OSI Model is general
communication model but Internet Model is what the internet uses for all its
communication. This model has the following layers:
• TCP stands for Transmission Control Protocol
• IP stands for Internet Protocol

Application Layer: This layer defines the protocol which enables user to interact
with the network. For example, FTP, HTTP etc.
Transport Layer: This layer defines how data should flow between hosts. Major
protocol at this layer is Transmission Control Protocol (TCP). This layer ensures
data delivered between hosts is in-order and is responsible for end- to-end
delivery.
Internet Layer: Internet Protocol (IP) works on this layer. This layer facilitates
host addressing and recognition. This layer defines routing.
Link Layer: This layer provides mechanism of sending and receiving actual data.
Unlike its OSI Model counterpart, this layer is independent of underlying network
architecture and hardware.
IEEE 802 Model
2 Layer Model

IEEE Standard Chart

IEEE 802.1 MAC Layer


IEEE 802.2 Logical Link Layer
IEEE802.3 Ethernet
IEEE802.4 Token Bus
IEEE802.5 Token Ring
IEEE802.8 Fiber Optic
IEEE802.11 MLAN(WiFi)
IEEE 802.14 Modem
IEEE802.15 WPAN
IEEE802.15.1 Bluetooth
IEEE802.15.4 Zigbee
IEEE802.15.5 Mesh Network
IEEE802.16 WMAN(WiMax)
KNX Protocol
 Also Known as Konnex
 Widely used in —home and Building Automation
 KNX devices Used for lighting, security systems, energy management,
audio video, white goods, displays, remote control, etc
 It Support Large Network
 Free of Cost
 Toplogy(Tree Topolgy,Star Topolgy)
 OSI Based Communication Protocol
 Multicast Peer to Peer Network

Issue with IOT Standardization


1. Critical to Market development
2. Highly decentralized Activity

APS Layer
Application Support Sublayer
Interface between Network Layer and Application Layer
End To End Security
5layer Architecture
1.Physical Layer
2. Media Access Layer
3. Network Layer
4. Application Support Sublayer
5. Application Layer
APS Function
 Packet Filtering for Device
 Ensuring communication between devices

APS Layer Security


 End To End Security
 It support for Unicast Transmission
 Can not Applied for Multicast Transmission
 APS Length 128 bit
Benefits of IoT Standards
Interoperability and Innovation Flexibility
Guaranteed Quality and Credibility
Global Scalability
Unit III
3 layer Architecture of IoT
Three layers, namely, the perception, network, and application layers.
1. Perception Layer
This perception layer is the IoT architecture’s physical layer. In these sensors and
embedded systems are used mainly.It is also known as device layer.
This first layer of IoT architecture is a sensing layer that
includes devices , sensors, and actuators that collect data from their surroundings and
control things at the edge. Devices that sense or control things in the real world is the
foundation layer for an IoT ecosystem
2. Network Layer
The network layer is responsible for connecting to other smart things, network
devices, and servers.
3. Application Layer
The user communicates with this application layer. It specifies different uses for the
IoT, such as smart houses, smart cities, and smart health.
5 layer Architecture of IoT
5 Layer Architecture is considered as the best-proposed architecture of IoT.5 layer architecture
is considered as best. 5 Layer model can be considered as an extension to the basic
architecture of (3 Layer) IoT because it has two additional layers to the basic model.
Middleware Architecture

The functionality of the middleware layer:

 Resources Management
 User Tracking
 Context Management
 Service Management
 Data Management
 Security Management
IoT Stack Architecture

7 Layers of IoT Architecture


Seven layers

1.Physical Devices and Controllers


The First layer consists of physical devices and controllers that might control multiple devices.

2.Connectivity
The device would be connected to internet using Wifi, Ethernet, 3G and other technologies. This
Connectivity layer enables the device to send data to cloud and vice versa.

3.Edge Computing
 Data filtering
 Formatting
 Expanding/decoding
 Assessment

4.Data Accumulation
Data accumulation layer stores the data in an easy accessible format .

5.Data Abstraction
The layer focuses on rendering data and its storage in ways that enable developing simpler,
performance-enhanced applications.
6.Application
It links the software layer with physical layer.

7.Collaboration and Processes


Collaboration and processes layer provides response or action to be taken against the data
provided.
Unit 3
OIC Architecture
Open Interconnect Consortium

It is also called Open source Architecture

Highly Secure

More Flexible

Scalable

Platform Independent Framework


OIC Conceptual Architecture

OIC
Roles

RESTful OIC Roles OIC


Resource
Model Client Server
Layer
OIC Entity
(sensor
Resource actuator
interface)

OIC OIC
OIC
Device Device
Implem-
Abstraction
entation
Specific Interfaces
Protocol Connectivity Connectivity
Layer

Application of OIC
1. Smart Camera
2. Smart Home Application
3. Access Control Devices
4. Health monitor
5. Indoor Environment Control
6. Lighting Camera
Importance of OIC
1. Improve Efficiency
2. Reduce Cost
3. Improve Customer Experience
Note It is also called Network to Network Architecture.

SOA (Service Object Architecture)


Make Software Reusable
Platform Independent
Easy Maintenance Software

Drawback of SOA
1. High Cost
2. Very Complex
3. High Investment

Application of SOA
1. Gaming Software/App
2. Healthcare Software/App
3. Army and Air force Software/App
5 Layer of SOA Service Object Architecture

1. Object
2. Object Abstraction
3. Service Management
4. Service Composition
5. Application
4 Layer of SOA Service Object Architecture
Unit 4
Z wave
1. Z-Wave also known as a smart home hub
2. Z-Wave is a wireless communications protocol used primarily for
residential and commercial building automation
3. More-User friendly and Easier to setup
4. Range 30-65 Meters
5. Z-Wave and Zigbee are two of the biggest names in smart home
communication protocols
6. It is a mesh network using low-energy radio waves
7. More Expensive then Zigbee
8. Z-Wave network, limited to four hops, supports a maximum of 232
devices.
9. Z-Wave chips are only available from Silicon Labs.
All Z-Wave technology is backward-compatible.
Physical Range 100-800 Meters

Internet of Everything
IoE is the intelligent connection of people, process, data and things

Pillars/Element of The Internet of Everything (IoE)


 People: Connecting people in more relevant, valuable ways.
 Data: Converting data into intelligence to make better decisions.
 Process: Delivering the right information to the right person (or
machine) at the right time.
 Things: Physical devices and objects connected to the Internet and
each other for intelligent decision making; often called Internet of
Things (IoT).
Features of IoE

1. Decentralized data processing


2. Data input / output
3. Interconnection with other technologies
Advanced Message Queuing Protocol (AMQP)
 Advanced Message Queuing Protocol is an open standard
application layer protocol for message-oriented middleware.
 It is a lightweight, protocol which supports the applications for
transfer of data.
 Cost-free
 Focuses on process-to-process communication across IP networks
 Protocol is currently using TCP as its transport protocol.
 Supports both point-to-point and publish-subscribe model.

AMQP was designed with the following main characteristics as goals


 Security
 Reliability
 Interoperability
 Standard
 Open

Difference between COAP and HTTP protocols


COAP HTTP
Constrained Application Protocol Hyper Text Transfer Protocol
It support User Datagram It Support Transmission Control
Protocol(UDP) Protocol(TCP)
Both Client server-based protocol and Client server-based protocol
Publish-Subscribe model.
It Support IPv6 It support IPv4 and IPv6
It support Multicast message It Does not support Multicast message
4 bytes sized header 8 bytes sized header
It works on 5683 port Number. It works on 80 port Number.
Difference between COAP and MQTT protocols

COAP MQTT
Constrained Application Protocol Message Queuing Telemetry Transport
4 bytes sized header 2 bytes sized header
This uses both Asynchronous and Uses only Asynchronous
Synchronous.
Client server-based protocol and Communication-based protocol (Publish-
Publish-Subscribe model. Subscribe model)
Communication model is one-one(One Communication model is Many-
to One Protocol) Many(Many to Many Protocol
It support User Datagram It Support Transmission Control
Protocol(UDP) Protocol(TCP)
CoAP is not more matured and stable MQTT is more matured and stable than
than MQTT CoAP.

Difference between HTTP and MQTT protocols


HTTP MQTT
Hyper Text Transfer Protocol Message Queuing Telemetry Transport
8 bytes sized header 2 bytes sized header
More complex. Less Complex.
Client server-based (Request/Response It Support on publish-subscribe model.
model)
It works on 80 port Number. It works on 1883 port Number
Protocol is Use Transport Layer Security Protocol is Use datagram transport layer
(TLS), although formerly it was known security (DTLS) for security.
as Secure Sockets Layer (SSL) for
security.
Difference between web of things Protocol Vs Internet of things Protocol

XML- Extensible Markup Language

HTTP- Hyper Text Transfer Protocol

TLS- Transport Layer Security

TCP- Transport Control Protocol

IPV6- Internet Protocol Version 6

6LOWPAN- 6 Low Power Wireless Personal Area Network

DTLS- Datagram Transport Layer Security


IoT Communication Models
1.Request-Response Model

2. Publish-Subscibe Model:
Two Pillar for web
Web of Things (WOT) Architecture
4 Layer Architecture Webs of Things (WOT)
1. Access Layer
2. Find Layer
3. Share Layer
4. Compose Layer
Difference between IPV6 and Low PAN
LowPAN- “Low Power wireless Personal Area Network”
LowPAN Support only IPV6 address so it is called 6 LowPAN.
LowPAN Support mesh Routing but IPV6 does not support it
IPV6 only use for data segment, lowPAN use for data segmentation and
Re assemble of Date.
IPv6 operates in 2.4 GHz frequency range
Drowback of LowPAN
 Only support IPV6 address
 Support only 128 bit address
 Low PAN is sub network of IPV6.
Unit 5

Categorization of IOT middleware platform


Various IoT Middleware platforms can be categorized into following four
categories namely

1. Open Source IoT Cloud Platforms,


2. Developer Friendly IoT Cloud platform,
3. End to End connectivity IoT cloud Platform
4. Public Traded IoT Cloud Platforms

Publicly Traded IoT Middleware Platforms: This category consists of platforms


developed and maintained by large public traded companies such as AWS IoT
Platform Microsoft Azure IoT Hub, IBM Watson IoT Platform, Google IoT
Platform, Oracle IoT Platform.

Open source IoT Middleware Platforms: This category consists of platforms


that provide data management services under open licenses such as Kaa
ThingSpeak. ·

Developer Friendly IoT Middleware Platforms: This category of platforms is


developer friendly and can be easily integrated with Arduino, Raspberry etc. to
develop users’ applications

End to End Connectivity IoT Middleware Platforms: Platforms designed based


on supplied hardware and required solution such as Samsara.
Brownfield IOT Greenfield IOT

Build on Existing System/Project Build on New System/Project


Developed Undeveloped
Require Less Time Require More Time
Use your Approach Understand previous Approach
Low Risk High Risk
Low Cost (Not Always) High Cost
Substantial Dependency No Dependency
IOT Platform

It is also called IOT middleware

IoT platform provides security and authentication for sensors and users.

IoT Platform connects sensors and devices.

It has 7 layer architecture

IoT Platform fills the gap between the devices (sensors) and application (network).

Brownfield IOT

1. Build on Existing system.


2. Lower Risk
3. Use previous developer approach.
4. Lower Cost (Not Always)
5. Lower Time
6. It is use for Developer Software.
Steps of Brownfield IOT
VSCP Protocol
 Very Simple Control Protocol
 Application Layer Protocol
 Home Automation Control Protocol
 It is work as a framework, not Protocol.
 Event Based Protocol
 Fee automation protocol suitable for building- automation
 VSCP works with different Use for Like CAN, Ethernet, RS232, TCPIP,
zigbee, bluetooth, USB, GPRS etc.

DDS Protocol
Data Distribution Service Protocol
Use Publish Subscribe Model
It is Use For device-to-device or machine-to-machine communication.
It requires real-time data exchange.
Applications
1. Aerospace and defense
2. Air-traffic control
3. Autonomous vehicles medical devices
4. Robotics
5. Power generation
6. Simulation and testing
7. Smart grid management
8. Transportation systems

XMPP Protocol
Extensible Message and Presence Protocol
It supports for Real Time Communication.
It Support client-server and server-server communication.

Application Layer Protocol


It supports Transmission Control Protocol (TCP)

Full Duplex

Open technologies for instant messaging, presence, multi-party chat, voice and
video calls.

It is decentralized.

MQTT Protocol

Message Queue Telemetry Transport

Publish-Subscribe Model.

Uses client server architecture.

Web Socket

Two-way equal Communication Protocol

Based on TCP Protocol

Use Publisher Subscribe Model.

It is Communication Model.

Port Number 80 and 443.

Full duplex communication

It defines how data is exchanged between Networks.


it is reliable and efficient
it is used by almost all clients.
Application of web socket
1. Chat App
2. Real Time Chart
3. Treading App
4. Multiplayer Games
WAMP Protocol
Web Application Message Protocol
It is sub protocol of web Socket
It is Routed Protocol
Bi-directional.
Framework Based on WAMP.
RPC (Remote Procedure Call) + Pub Sub (Publisher Subscribe Model) =
WAMP.

Open application-level protocol.

Sub Protocol of Web Socket.

Distributed applications.

High-level messaging.

It is used widely in the modern Internet


IOT Application for Future industry

Future Factory Concepts

Among enterprise IoT usage, most deployments are in electricity, gas,


steam, water supply, and waste management. The wholesale and retail
industry.

Future for Industry 5.0 includes the manufacture of robots, including


industrial robots, with improved artificial intelligence and cognitive
computing technologies to improve efficiencies and speed of delivery,
while at the same time allowing people to focus on other areas

Globally, the number of IoT devices is expected to reach 29 billion by


2030.
IOT Communication Model

Push-Pull Model

Producers push data to queues and consumers pull data from the queues.

Producers do not need to aware of the consumers.

Queues help in decoupling the message between the producers and


consumers.

Exclusive Pair
Bi directional
Full duplex
It is also Called Stateful Communication Model

You might also like