IOT and its communication models and protocols.pdf

3,591 views 19 slides Nov 28, 2022
Slide 1
Slide 1 of 19
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19

About This Presentation

A brief visual description of the Internet of Things and how it works. Then, we will learn about the communication models of IoT and how their structure defines them. Then we will go for the IoT protocols and know about different types of protocols. At last, we will see some applications of IoT.


Slide Content

CSE412 –BIG DATA & IOT

TEAM MEMBERS
MD. IFTEKHARUL ISLAM
RIDOY
192-15-2811
MD. ANISUR RAHMAN
192-15-2825
MD. ARMANUL
ISLAM
192-15-2842

CONTENTS
1)IOT
2)IOT COMMUNICATION MODELS
3)IOT PROTOCOLS
4)APPLICATIONS

Embedded
SENSORS
PROCESSING
SOFTWARE
INTERNET
DATA
EXCHANGE

Request & Response
Model
Publish-Subscribe
Model
Push Pull Model COMMUNICATION
MODELS
Exclusive Pair Model
CommunicationmodelsusedinIoThavegreat
value.TheIoTsallowpeopleandthingstobe
connectedanytime,anyspace,withanything
andanyone,usinganynetworkandany
service.Thatiswhy,weneedtounderstand
thecommunicationsofdifferentdevicesto
utilizeandmakethebestuseoIOT.

REQUEST & RESPONSE MODEL
TheclientistheIOTdevicethatsendsa
requesttotheserver.Therequestmaybefor
transferofdataoruploadofdata.The
servermayberemoteorlocalandcan
handlerequestsofmultipleclients.The
Requestresponsemodelisstatelessand
henceeachrequestisindependently
handled.Servercanreceivetherequest,
decideitsresponseandfetchthedata.

PUBLISH SUBSCRIBE MODEL
Therearethreeentitiespublisher,brokerand
consumers.Publisherssendthedatatothe
brokersontopicsmanagedbythebrokers.
Consumerssubscribetotopicsandbrokers
sendthedataonthetopicstotheconsumers.
Hence,brokersresponsibilityistoacceptdata
frompublishersandsendittotheappropriate
consumer.

PUSH PULL MODEL
Dataproducerpushdatatoqueuesand
consumerpulldatafromqueues.
Producersandconsumersarenotaware
ofeachother.Queuesactasbuffersand
areusefulwhenproducersproducedata
atarateatwhichisfasterthanrateat
whichconsumerscandownload.

EXCLUSIVE PAIR MODEL
Itisabi-directional,fullduplexcommunication
modelthatusesapersistentconnection
betweenclientandserver.Theconnectionis
persistentandremainsopentillclientsendsa
requesttoclosetheconnection.Thisisa
statefulconnectionmodelandserverisaware
ofallopenconnections.

What is Iotprotocol?
Singledeviceslikesmartphonesandpersonalcomputersalsousenetworkprotocolsforcommunication.
Butgeneralprotocolsthatareusedbythesepersonaldevicesmightnotmeetspecificrequirementslike
bandwidth,latency,andrangeofIoT-basedsolutions.Hence,afewimprovedversionsofexisting
protocolsandsomenewIoTprotocolsareevolvedtomeettherequirementsofIoTdevices.
IoT protocols and standards are broadly classified into two separate categories.
These are:
1.IoT data protocols (Presentation / Application layers)
2. Network protocols for IoT (Datalink / Physical layers)
IOTPROTOCOLS

IoT
Protocol
Cellular (3G, 4G, and 5G)
LPWANs
Mesh protocols
Bluetooth and BLE
RFID
WiFi/WiFiHaLOW
IOTPROTOCOLS

Bluetooth and BLE
Protocol
BluetoothisoneoftheprotocolswhichareusedinsomeoftheIoTdevicestocommunicatewiththeother
devices.SimilartoBluetooth,BluetoothLEoperatesinthe2.4GHzband.Thehiddendifferenceisthat
BluetoothLowEnergyremainsinsleepmodeunlessaconnectioninitiates.Theactualconnectiontimesonly
lastafewmilliseconds,unlikeBluetooth,whichconnectsforafewsecondsorafewhoursatatime.

CellularIoTusescellularnetworkstoconnect
physicaldevicestotheInternet.Thisconnection
enablesthesedevicestotransmitandreceivedata,
makingthempartofthe“InternetofThings”(IoT).
CellularIoTisthemostpopulartypeofIoT
connectivity,primarilybecauseit:Providesexcellent
coverage.IoTcanconnectvia2G,3G,4G,or5G
networks.DependingontheneedsoftheIoTdevice
andapplication,thereareprimarilytwotypesof
CellularIoTconnections,namely,LTE-MandNB-
IoTwhicharetherecentIoTspecificvariables.2G
and3Garenolongerusedformobileconnectivity.
Cellular Protocol

LPWANs Protocol
LPWANs(LowPowerWideAreaNetworks)arenewsetsofprotocolsdevelopedforIoTsolutionsbutcanalsobe
usedbyotherdevicestocommunicateoverawidearea.Evencellularnetworkscanprovideawide-area
communicationnetwork,butthecostofcommunicationovercellularnetworksishighbecauseofitshighpower
consumption.LPWANsenablecommunicationsoverwideareawiththehelpofsmallandinexpensivebatteries
thatcanlastforlong-termmakingitacost-savingoptionincomparisonwithcellularnetworks.LPWANsare
commonlyusedinapplicationsincludingSmartmetering,smartlighting,assetmonitoringandtracking,smart
cities,precisionagriculture,livestockmonitoring,energymanagement,manufacturing,andindustrialIoT
deployments.

Mesh protocols
AMeshprotocolisalocalnetworktopologywheredevicesare
connecteddirectlyinanon-hierarchicalwaytoroutedataacrossthe
network.Thedevicesinameshnetworkcommunicateaccordingtoa
predefinedprotocolthatallowseachdevicetoparticipateinthedata
transmissiononthenetwork.
IoTMeshNetworkingMainComponents:
•Gateways: Gateways are devices that connect the mesh network to
the internet.
•Repeaters: Repeaters capture data in the network and reiterate it to
the endpoints.
•Endpoints: Endpoints are devices that receive data from repeaters.

Wifi/ WifiHaLow
Wi-Fi(WirelessFidelity)isthemostpopularIOTcommunication
protocolsforwirelesslocalareanetwork.Wi-FiprovidesInternet
accesstodevicesthatarewithintherangeofabout20-40meters
fromthesource.Ithasadatarateupto600Mbpsmaximum,
dependingonchannelfrequencyusedandthenumberof
antennas.
IntermsofusingtheWi-FiprotocolforIOT,therearesomepros&
constobeconsidered.TheinfrastructureordevicecostforWi-Fiis
low&deploymentiseasybutthepowerconsumptionishighand
theWi-Firangeisquitemoderate.So,theWi-Fimaynotbethe
bestchoiceforalltypesofIOTapplicationsbutitcanbeusedfor
applicationslikeHomeAutomation.

RFID
RadioFrequencyIdentification–orRFID–isusedto
automaticallyidentifyanobjectandcapturingdataaboutthat
objectthathasbeenstoredinasmallmicrochiptagand
attachedtotheobject.TheRFIDtaghasabuilt-inantenna
thatcommunicatestoascanningdevicethatreadsthedata
remotely.Thedataisthentransferredfromthescanning
devicetotheenterpriseapplicationsoftwarethathousesthe
data.EachRFIDtaghasitsownuniqueidentifyingnumber.
RFIDcanbeusedtorecordandcontrolthemovementof
assetsandpersonnel.You’veprobablyseenRFIDtagson
thebackofyourlibrarybooks,oreveninthenewbiometric
passports.Itmakestrackingassetscontainedinboxesor
palletseasiertomanage.

APPLICATIONS

THANK YOU
“IoT-Coming soon in a "THING" near you.”
―Syed Sharukh