SeekayAlaisKaruppaia
15 views
17 slides
Mar 12, 2025
Slide 1 of 17
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
About This Presentation
Communication Protocols and Technologies of IoT
Size: 1006.08 KB
Language: en
Added: Mar 12, 2025
Slides: 17 pages
Slide Content
Protocols and Technologies Behind IoT Unit III
IPv4 vs IPv6 1. Address Length: - IPv4: It uses a 32-bit address length. - IPv6: It employs a 128-bit address length. 2. Address Format: - IPv4: Addresses are numeric and expressed as a string of numbers separated by periods (e.g., 192.168.0.1). - IPv6: Addresses are alphanumeric and written as a group of 8 hexadecimal numbers separated by colons (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334). 3. Security Features: - IPv4: Basic security features; additional security mechanisms need to be implemented separately. - IPv6: Built-in security features, including IPSec (Internet Protocol Security) for data authentication and encryption, making it more secure. 4. Header Structure: - IPv4: Has a more complex header structure. - IPv6: Features a simpler and more efficient header format, which enhances cost-effectiveness and internet connection speed 5. Fragmentation: - IPv4: Requires fragmentation when dealing with large packets. - IPv6: Minimizes fragmentation due to its larger address space and efficient header design³. 6. Multicast Support: - IPv4: Supports multicast communication. - IPv6: Offers even more efficient multicast communication, reducing the need for routine broadcast messaging¹. 7. Configuration Methods: - IPv4: Supports manual and DHCP (Dynamic Host Configuration Protocol) address configuration. - IPv6: Supports auto-configuration and renumbering for easier deployment².
Features of IPv6 1. No NAT (Network Address Translation): - Unlike IPv4, which often requires NAT to handle address shortages, IPv6 allows for end-to-end connectivity at the IP layer. Each device can have a globally unique address. 2. Multicasting: - IPv6 supports multicast transmission, allowing data packets to be sent to multiple destinations simultaneously. This is especially useful for bandwidth-intensive flows like multimedia streams. 3. Prevents Private Address Collisions: - IPv6 design avoids the issue of private address collisions that sometimes occur in IPv4 networks. 4. Simpler Header Format: - The IPv6 header has a more straightforward structure, making it easier for routers to process and route packets efficiently. 5. Efficient Routing: - IPv6 simplifies routing overall, leading to more efficient network operations. 6. Quality of Service ( QoS ): - IPv6 includes flow labeling, allowing for true QoS . This means better handling of different types of traffic. 7. Built-in Security Layer (IPsec): - IPv6 embeds IPsec (Internet Protocol Security) by default, enhancing confidentiality and data integrity. 8. Flexible Options and Extensions: - IPv6 provides flexibility for future extensions and options beyond its core features.
6LoWPAN 1. What is 6LoWPAN? - 6LoWPAN stands for IPv6 over Low Power Personal Area Network. - It's an extension of the IPv6 protocol designed specifically for wireless personal area networks (WPANs). - WPANs are networks where interconnected devices are centered around a person's workspace and communicate wirelessly. - 6LoWPAN enables communication using the IPv6 protocol, which provides a large number of addresses and improved reliability. 2. Key Features and Characteristics: - Low Power: 6LoWPAN targets small, low-power devices with limited processing abilities. - Short Range: It operates within a short range (typically up to ~200 meters outdoors). - Low Memory Usage: Designed for devices with minimal memory resources. - Low Bit Rate: Supports data rates up to 200 kbps. - Mesh Network: Forms a robust, self-healing mesh network. - IPv6 Compatibility: Allows individual nodes to be IP-enabled.
6LowPAN 3. Advantages: - Robust Mesh Network: 6LoWPAN creates a mesh network that can heal itself, making it scalable and reliable. - Low-Cost Communication: It delivers cost-effective communication for IoT devices. - Direct Routing to Cloud Platforms: Since it uses IPv6, it can be directly routed to cloud services. - Sleep Mode Support: Leaf nodes can stay in sleep mode for extended periods. 4. Disadvantages: - Less Secure Than Zigbee : While it provides security (using AES 128 link layer security), it's less secure than Zigbee . - Interference Sensitivity: Has lower immunity to interference compared to Wi-Fi and Bluetooth. - Short Range Without Mesh Topology: Without mesh topology, its range is limited.
6LoWPAN 5. Applications: - Wireless Sensor Networks: Used extensively in sensor networks. - Home Automation: Enables smart home devices to communicate efficiently. - Smart Agriculture: Monitors agricultural processes and environmental conditions. - Industrial Monitoring: Supports monitoring and control in industrial settings. 6. Security and Interoperability: - Security: 6LoWPAN uses AES 128 link layer security and includes transport layer security mechanisms. - Interoperability: It allows constrained devices to transmit IPv6 packets efficiently.
Functions of 6LoWPAN 1. Header Compression: IPv6 packets typically have large headers, which can be inefficient for low-power networks with constrained bandwidth. 6LoWPAN employs header compression techniques to reduce the size of IPv6 headers, making more efficient use of the limited bandwidth available in these networks. 2. Fragmentation and Reassembly: Low-power wireless networks often have smaller maximum packet sizes compared to traditional wired or wireless networks. 6LoWPAN supports the fragmentation and reassembly of IPv6 packets into smaller pieces, allowing them to be transmitted across the network and then reassembled at the destination. 3. Neighbor Discovery: Neighbor discovery is a mechanism for nodes to discover and keep track of other nodes on the same network segment. 6LoWPAN includes support for Neighbor Discovery, allowing devices to efficiently discover and communicate with other devices within the same network. 4. Mesh Networking: 6LoWPAN supports mesh networking, allowing devices to communicate with each other through multiple hops. This is particularly useful in scenarios where direct communication between devices may not be possible due to distance or obstructions. 5. Address Autoconfiguration : 6LoWPAN devices can automatically configure their IPv6 addresses, simplifying network setup and management in IoT deployments. 6. Energy Efficiency: 6LoWPAN is designed with energy efficiency in mind, allowing devices to conserve battery power by minimizing the amount of data transmitted and reducing the overhead associated with IPv6 communication.
MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol designed for low-bandwidth, high-latency, or unreliable networks, commonly used in IoT (Internet of Things) and other applications where efficient communication is essential. Here's how MQTT typically works: 1. Client-Server Architecture: MQTT follows a client-server architecture. There are two main components: the MQTT broker (server) and MQTT clients. 2. Broker: The MQTT broker is a server that acts as an intermediary between clients. It receives messages from clients and routes them to the appropriate destinations. 3. Clients: Clients are devices or applications that connect to the MQTT broker to publish messages, subscribe to topics, or both. 4. Publish-Subscribe Model: MQTT uses a publish-subscribe messaging pattern. In this model, clients can publish messages to specific topics, and other clients can subscribe to these topics to receive messages. 5. Topics: Topics are hierarchical strings used to categorize messages. Clients can publish messages to topics and subscribe to one or more topics to receive messages.
6. Connection Establishment: MQTT clients connect to the broker over TCP/IP or other supported protocols. They establish a persistent TCP connection to the broker, which allows for efficient message exchange. 7. Publishing Messages: A client publishes a message to the broker by specifying a topic and payload (the actual data to be transmitted). The broker receives the message and forwards it to all clients subscribed to the corresponding topic. 8. Subscribing to Topics: Clients can subscribe to one or more topics of interest. When a client subscribes to a topic, the broker adds it to the list of subscribers for that topic. Whenever a message is published to a subscribed topic, the broker delivers the message to all subscribed clients. 9. Quality of Service ( QoS ): MQTT supports different levels of Quality of Service for message delivery: - QoS 0 (At most once): Messages are delivered at most once, with no acknowledgment or retries. - QoS 1 (At least once): Messages are guaranteed to be delivered at least once to the recipient, but duplicates may occur. - QoS 2 (Exactly once): Messages are guaranteed to be delivered exactly once to the recipient, ensuring no duplicates. 10. Retained Messages: MQTT brokers can retain the last message published on a topic. When a client subscribes to a topic with retained messages, it immediately receives the last retained message for that topic. Overall, MQTT provides a lightweight, efficient, and flexible messaging solution for IoT and other applications, enabling reliable communication over constrained networks.
CoAP CoAP (Constrained Application Protocol) is a lightweight and simple protocol designed for use in constrained environments, such as IoT (Internet of Things) devices, where memory, processing power, and bandwidth are limited. Here's how CoAP typically functions: 1. Client-Server Architecture: CoAP follows a client-server architecture, similar to HTTP. Clients send requests to servers, and servers respond to those requests. 2. UDP-Based Communication: CoAP is typically built on top of UDP (User Datagram Protocol) for its lightweight nature and suitability for constrained environments. However, it can also be used over other transport protocols. 3. Request Methods: CoAP defines four request methods similar to HTTP: - GET: Retrieve resource representation. - POST: Create new resource or trigger a process on the server. - PUT: Update an existing resource. - DELETE: Delete a resource. 4. URIs (Uniform Resource Identifiers): CoAP uses URIs to identify resources on the server, similar to URLs in HTTP. URIs are used in requests to specify the target resource.
5. Messages: CoAP messages consist of a header and, optionally, a payload. The header includes information such as the message type (confirmable, non-confirmable, acknowledge, reset), method, message ID for message retransmission and matching, and token for message correlation. The payload carries the application-specific data. 6. Observing Resources: CoAP supports the observation of resources. Clients can express interest in observing a resource, and servers can send notifications to those clients when the state of the observed resource changes. 7. Request-Response Model: CoAP operates on a request-response model. Clients send requests to servers, and servers respond with appropriate responses. Responses include a response code indicating the status of the request (similar to HTTP status codes), such as success, client error, or server error. 8. Reliability: CoAP provides optional reliability through message acknowledgment and retransmission. Confirmable messages require an acknowledgment from the receiver, and if no acknowledgment is received within a certain timeout period, the message is retransmitted. 9. Message Layer Security: CoAP can be used with DTLS (Datagram Transport Layer Security) to provide secure communication over UDP. 10. Proxying and Caching: CoAP supports proxying and caching, allowing intermediaries to forward CoAP requests to other servers and cache responses to improve performance and reduce bandwidth usage. Overall, CoAP is designed to be lightweight, efficient, and suitable for constrained environments, making it well-suited for IoT applications where resource constraints are common.