IOT -UNIT-3.pptx PROTOCOLS AND TECHNOLOGIES BEHIND IOT
404 views
21 slides
Jun 27, 2024
Slide 1 of 21
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
About This Presentation
IOT PROTOCOLS,IMPORTANCE OF IOT PROTOCOLS,Message Queuing Telemetry Transport(MQTT) : MQTT is one of the prime IoT protocols. MQTT protocol is a type of IoT communication protocol that is famous and is gaining popularity due to its transportation of messages through the publish/subscribe messaging. ...
IOT PROTOCOLS,IMPORTANCE OF IOT PROTOCOLS,Message Queuing Telemetry Transport(MQTT) : MQTT is one of the prime IoT protocols. MQTT protocol is a type of IoT communication protocol that is famous and is gaining popularity due to its transportation of messages through the publish/subscribe messaging. It is lightweight and easily transfers data between two or more machines.
Advanced Message Queuing Protocol
JP Morgan Chase & Co founded the AMQP protocol in 2003. This is an important protocol in IoT. It offers exchange of data within the network and it is protocol. AMQP Protocol focuses mainly on banking systems and other businesses. It uses either the request-response messaging or the publisher-subscriber model.
Data Distribution Service
DDS is a widely used protocol in IoT due to its versatility and extensible nature. It does not depends on middlemen for communication and it directly connects sensor to other devices for open communication.
DDS ensure secure message transfer and data sharing.
IoT Network Protocols
Wireless Body Area Networks (WBAN)
This network has other names such as Body Area Network(BAN), Medical Body Area Network(MBAN) or Body Sensor Network (BSN). They form close connections and are usually within the 10 centimetre to 1 metre range. The common ones include Bluetooth, NFC, Zigbee, RFID (Radio Frequency) and various other proprietary technologies.
Wireless Personal Area Networks(WPAN)
These have an extended range when you compare them with the WBAN. These have a 1 metre to 10 metre range.
These networks include Bluetooth, RFID and other similar proprietary software technologies. You can think of these devices as your personal devices that you want to connect with or make them connect with other personal devices.
c) Wireless Local Area Network(WLAN)
You must have come across the word WLAN. Any local wireless network can be known as a Wireless Local Area Network. This includes Wi Fi / 802.11 and Zigbee networks. Wi Fi is a standard and universal option whereas Zigbee handles protocols that require high level communication. Bluetooth can also come under WLAN.
Wireless Metropolitan Area Networks (WMANs)
This network covers up a larger area such as a city or state. The network is Capable of housing an entire city and various devices around the city can easily connect to this network.
IPv6 Addressing methods
In IPv6 representation, there are three addressing methods:
Unicast
Multicast
Anycast
Unicast Address
Unicast Address identifies a single network interface. A packet sent to a unicast address is delivered to the interface identified by that address.
2. Multicast Address
Multicast Address is used by multiple hosts, called as groups, acquires a multicast destination address. These hosts need not be geographically together. If any packet is sent to this multicast address, it will be distributed to all interfaces corresponding to that multicast address. And every node is configured in the same way.
Size: 1.86 MB
Language: en
Added: Jun 27, 2024
Slides: 21 pages
Slide Content
UNIT-III PROTOCOLS AND TECHNOLOGIES BEHIND IOT Dr. C. GOPINATH Assistant Professor St. Joseph College of Engineering
IOT Protocols - IPv6, 6LoWPAN, MQTT, CoAP - RFID, Wireless Sensor Networks, Big Data Analytics, Cloud Computing, Embedded Systems.
IOT PROTOCOLS The Internet of Things (IoT) is about the network of sensor devices to the web in real-time. IoT devices communicate with each other over the network, so certain standards and rules need to be set to determine how data is exchanged. These rules are called IoT Network Protocols. The wireless hardwares used in IoT are the nodes and the base stations. Nodes or clients are the devices that connect to the base stations. Base stations are the routers or gateways. In this topic discuss about the protocols used between these devices. IMPORTANCE OF IOT PROTOCOLS The ability to interact with each other and resolve common problems is what separates lot devices from traditional computers . These interactions are only possible if there is a medium or means of communication in the IoT ecosystem . The IoT protocols are thus a common "language" that allows devices to interact with other lot devices. The IoT protocols lay down standards that are adopted in every IoT ecosystem for proper functioning and to avoid security threats .
CLASSIFICATION OF IOT PROTOCOLS IoT protocols are classified into two types: 1. IoT Data Protocol Message Queuing Telemetry Transport(MQTT ) : MQTT is one of the prime IoT protocols . MQTT protocol is a type of IoT communication protocol that is famous and is gaining popularity due to its transportation of messages through the publish/subscribe messaging. It is lightweight and easily transfers data between two or more machines . Devices share information through a broker or server. Download the broker in your PC, MAC, Linux system or in Raspberry pie. The most common brokers available in the market these days are HIVEMQ and Mosquito . MQTT is different to the regular client-server model. It divides clients into two groups. MQTT brokers act as a mediator and pass on the messages from the clients ( publishers in MQTT) to the consumers who receive data on the other end(MQTT subscriber). Message Queuing Telemetry Transport (MQTT )
(b) Advanced Message Queuing Protocol JP Morgan Chase & Co founded the AMQP protocol in 2003. This is an important protocol in IoT. It offers exchange of data within the network and it is protocol . AMQP Protocol focuses mainly on banking systems and other businesses. It uses either the request-response messaging or the publisher-subscriber model . Publishers generate messages and consumers at the other end pick those messages to process them. Message brokers make sure that the right message goes to the right consumer. The brokers uses two components to achieve this as shown in the diagram: Exchange ܀ Queues ܀
(c) Data Distribution Service DDS is a widely used protocol in IoT due to its versatility and extensible nature. It does not depends on middlemen for communication and it directly connects sensor to other devices for open communication. DDS ensure secure message transfer and data sharing . Data Distribution Service
(d) Constrained Application Protocol (COAP) CoAP is another promising protocol in the future of IoT. COAP protocol transfers documents in a way similar to HTTP, however, CoAPs design ful fills the needs of constrained nodes. The packets in CoAP are much smaller in size when you compare it with Hypertext Transfer Protocol (HTTP). COAP operates through UDP. Clients and servers retrieve information through Connectionless datagrams . CoAP permits UDP broadcast and multicast to address. CoAP also acts on the client/server model. Clients generate requests to servers and servers in return transfer responses. Clients can GET, POST, DELETE and PUT the resources . "Confirmable" and "non confirmable" are tags for request and response messages. Non-confirmable messages come under the label "fire and forget". CoAP assures similar data security methods except that the data transfer takes place through UDP and not TLS.
2. IoT Network Protocols Wireless Body Area Networks (WBAN ) This network has other names such as Body Area Network(BAN), Medical Body Area Network(MBAN) or Body Sensor Network (BSN). They form close connections and are usually within the 10 centimetre to 1 metre range . The common ones include Bluetooth, NFC, Zigbee, RFID ( Radio Frequency) and various other proprietary technologies. Wireless Body Area Networks (WBAN)
(b) Wireless Personal Area Networks(WPAN) These have an extended range when you compare them with the WBAN. These have a 1 metre to 10 metre range . These networks include Bluetooth, RFID and other similar proprietary software technologies. You can think of these devices as your personal devices that you want to connect with or make them connect with other personal devices. (c) Wireless Local Area Network(WLAN) You must have come across the word WLAN. Any local wireless network can be known as a Wireless Local Area Network . This includes Wi Fi / 802.11 and Zigbee networks. Wi Fi is a standard and universal option whereas Zigbee handles protocols that require high level communication . Bluetooth can also come under WLAN .
(d) Wireless Metropolitan Area Networks (WMANs) This network covers up a larger area such as a city or state. The network is Capable of housing an entire city and various devices around the city can easily connect to this network.
(e) Wireless Wide Area Network(WWAN) This is another common kind of network. This network provides connection at a much larger scale as compared to WMANS. It is capable of providing communication across the globe as well.
IPV6 (INTERNET PROTOCOL VERSION 6 ) IoT refers to the network of interconnected physical devices, sensors, vehicles, appliances, and more, all embedded with technology to collect and exchange data. This technology revolution has transformed various industries, including healthcare, agriculture, manufacturing, and smart cities. As IoT devices proliferate, they require unique IP addresses to communicate over the internet. ❖ However, the limitations of IPv4 addressing, such as address exhaustion and the need for Network Address Translation (NAT), hindered the scalability and growth of IoT. ❖ IPv6 addressing offers a solution to these challenges. With its vast address space, IPv6 can accommodate an astronomical number of devices, ensuring that each device can have a unique and globally routable address. This eliminates the need for NAT and facilitates direct communication between devices, leading to more efficient data exchange and improved connectivity. 9
IMPLEMENTATION OF IPV6 ADDRESSING IN IOT Implementing IPv6 addressing in IoT involves assigning IPv6 addresses to individual devices, enabling them to communicate seamlessly within the IoT ecosystem. Here's a simplified breakdown of the implementation process: Unique IPv6 Addresses: Each IoT device is assigned a unique IPv6 address. This address is composed of a network prefix and an interface identifier, which can be based on the device's MAC address or other methods . Auto configuration: IoT devices can use IPv6 Stateless Address Auto configuration (SLAAC) to generate their interface identifier and create a complete IPv6 address. This process eliminates the need for manual address configuration. Address Management: Organizations and network administrators manage the allocation of IPv6 addresses to IoT devices. This can be done dynamically using DHCPv6 (Dynamic Host Configuration Protocol for IPv6) or through other management tools. Routing and Communication: loT devices use their IPv6 addresses to route and exchange data over the internet, With globally routable addresses, devices can communicate directly without the complexities of NAT.
BENEFITS OF IPV6 ADDRESSING IN IOT IPv6 addressing offers a range of benefits that are particularly advantageous in the context of loT: 1. Scalability : IPv6's vast address space ensures that the increasing number of IoT devices can be accommodated without running out of unique addresses. 2 . Simplified Connectivity: IoT devices can communicate directly with one another without the need for NAT, streamlining data exchange and reducing latency. 3 . Security Improvements: IPv6 includes built-in security features such as IPsec, which enhances the confidentiality and integrity of data transmitted between devices. 4 . Efficient Address Auto configuration: SLAAC enables devices to generate their addresses automatically, reducing the need for manual configuration and easing deployment. 5 . Enhanced Quality of Service: IoT devices can communicate more efficiently, leading to improved performance and reliability in applications like real-time monitoring and control.
IPv6 was developed by Internet Engineering Task Force (IETF) to deal with the problem of IPv4 exhaustion. IPv6 is a 128-bits address having an address space of 2128, which is way bigger than IPv4. IPv6 use Hexa-Decimal format separated by colon (:) Components in Address format: There are 8 groups and each group represents 2 Bytes (16-bits). Each Hex-Digit is of 4 bits (1 nibble) Delimiter used – colon (:)
IPv6 Addressing methods In IPv6 representation, there are three addressing methods: Unicast Multicast Anycast Unicast Address Unicast Address identifies a single network interface. A packet sent to a unicast address is delivered to the interface identified by that address. 2 . Multicast Address Multicast Address is used by multiple hosts, called as groups, acquires a multicast destination address. These hosts need not be geographically together. If any packet is sent to this multicast address, it will be distributed to all interfaces corresponding to that multicast address. And every node is configured in the same way. In simple words, one data packet is sent to multiple destinations simultaneously. 3 . Anycast Address Anycast Address is assigned to a group of interfaces. Any packet sent to an anycast address will be delivered to only one member interface (mostly nearest host possible).
Types of IPv6 address: There are 128 bits in IPv6 address but by looking at the first few bits we can identify what type of address it is.
ADVANTAGES OF IPV6: Real time Data Transmission: Real time data transmission refers to the process of transmitting data in a very fast manner or immediately. Example: Live streaming services such as cricket matches, or other tournament that are streamed on web exactly as soon as it happens with a maximum delay of 5-6 seconds. IPv6 supports authentication: Verifying that the data received by the receiver from the sender is exactly what the sender sent and came through the sender only not from any third party. Example: Matching the hash value of both the messages for verification is also done by IPv6. IPv6 performs Encryption: Ipv6 can encrypt the message at network layer even if the protocols of application layer at user level didn't encrypt the message which is a major advantage as it takes care of encryption. Faster processing at Router: Routers are able to process data packets of Ipv6 much faster due to smaller Base header of fixed size - 40 bytes which helps in decreasing processing time resulting in more efficient packet transmission. Whereas in Ipv4, we have to calculate the length of header which lies between 20-60 bytes .
6LoWPAN The 6LoWPAN protocol refers to IPv6 Low Power Personal Area Network which uses a lightweight IP-based communication to travel over low data rate networks. It has limited processing ability to transfer information wirelessly using an internet protocol. 6LowPAN Security Measure Security is a major issue for 6LowPAN communication Protocol. There are several attacks issues at the security level of 6LoWPAN which aim is to direct destruction of the network. Properties of 6LowPAN protocol • Standard: RFC6282 • Frequency: Used over a variety of other networking media including Bluetooth Smart (2.4GHz) or Zig Bee or low-power RF (sub-1GHz) • Range: NA • Data Rates: NA 6LoWPAN MQTT (Message Queue Telemetry Transport) MQTT (Message Queue Telemetry Transport) is a messaging protocol which was introduced by IBM in 1999. It was initially built for monitoring sensor node and faraway tracking in IoT. Its suits are small, cheap, low-memory and low-power devices. MQTT provides embedded connectivity between applications and middleware in one side and another side it connects networks and communicators. MQTT (Message Queue Telemetry Transport)
CoAP CoAP (Constrained Application Protocol) is a session layer protocol that provides the REST ful (HTTP) interface between HTTP client and server. It is designed by IETF Constrained REST ful Environment ( CoRE ) working group. It is designed to use devices on the same constrained network between devices and general nodes on the Internet. CoAP enables low-power sensors to use REST ful services while meeting their low power constraints. This protocol is specially built for IoT systems primarily based on HTTP protocols. • This network is used within the limited network or in a constrained environment. The whole architecture of CoAP consists of CoAP client, CoAP server, REST CoAP proxy, and REST internet. CoAP