SlideShare ist ein Scribd-Unternehmen logo
1 von 61
Department of Computer science
& Applications
Internet Of Things
G.S.Ramireddy, M.Sc
Lecture in Computers
Govt Degree College,
Ravulapalem
Introduction to Internet of Things
Architectures and Protocols
2 / 57
Outline
IoT overview
From M2M to IoT
IoT Architecture
4
5
IoT Standards
IoT Protocols
IoT Platforms
8
An Example: MQTT
July 31, 2017 3 / 57
IoT overview
IoT Overview - Definition
 The term ”Internet of Things” (IoT) denotes a trend where a large
number of embedded devices employ communication services
offered by the Internet protocols. Many of these devices, often
called ”smart objects, are not directly operated by humans, but
exist as components in buildings or vehicles, or are spread out in the
environment. (The Internet Architecture Board)
 A global infrastructure for the information society, enabling
advanced services by interconnecting (physical and virtual) things
based on existing and evolving interoperable information and
communication technologies (ITU)
 The Internet of things (noun): The interconnection via the Internet
of computing devices embedded in everyday objects, enabling them
to send and receive data (Oxford Dictionary)
July 31, 2017 4 / 57
IoT overview
IoT Overview - Enablers
Ubiquitous Connectivity: Low cost, high speed, and pervasive
network connectivity
Widespread adoption of IPbased networking.
Moores law continues to deliver greater computing power at lower
price points and lower power consumption. Manufacturing advances
allow cutting-edge computing and communications technology to
be incorporated into very small objects
Rise of Cloud Computing and big data analytics.
July 31, 2017 5 / 57
IoT overview
IoT Overview - Challenges
Security
Privacy
Interoperability / Standards
Legal, Regulatory and Rights
Emerging Economy and Development Issues
July 31, 2017 6 / 57
From M2M to IoT
From M2M to IoT
 In the 1990s, advances in wireless technology
allowed machinetomachine (M2M) enterprise and
industrial solutions to become widespread.
 Many of these early M2M solutions, however, were
based on closed purposebuilt networks and proprietary
or industryspecific standards
 The recent open M2M solutions are usually vertically
centric which mean it serves a particular domain
application (Health, Home, Industrial , etc.)
 The concept of IoT is to build a horizontal layer that
overlap all domains creating one big platform.
July 31, 2017 7 / 57
From M2M to IoT
From M2M to IoT
The IoT Horizontal Layer
July 31, 2017 8 / 57
From M2M to IoT
From M2M to IoT
A use case example: Stress measurement M2M
solution
July 31, 2017 9 / 57
From M2M to IoT
From M2M to IoT
A use case example: Stress measurement IoT
solution
July 31, 2017 10 / 57
IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
IOTA
M
a
n
a
g
e
m
e
n
t
Layer
Security
Layer
DC
GC
NC
TC
GSC S S C
GMC
SMC
GSEC
SSEC
D C : D e v i c e Capabilities
G C : G a t e w a y Capabilities
N C : N e t w o r k Capabilities
TC: Transport Capabilities
G S C : G e n e r i c S u p p o r t Capabilities
S S C : S p e c i fi c S u p p o r t Capabilities
IOTA: IOT Applications
G S E C : G e n e r i c Securi ty Capabilities
S S E C : S p e c i fi c Securi ty Capabilities
S M C : S p e c i fi c M a n a g e m e n t Capabilities
G M C : G e n e r i c M a n a g e m e n t Capabilities
Source: ITU (redrawn)
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
IOTA
M
a
n
a
g
e
m
e
n
t
Layer
Security
Layer
DC
GC
NC
TC
GSC S S C
GMC
SMC
GSEC
SSEC
D C : D e v i c e Capabilities
G C : G a t e w a y Capabilities
N C : N e t w o r k Capabilities
TC: Transport Capabilities
G S C : G e n e r i c S u p p o r t Capabilities
S S C : S p e c i fi c S u p p o r t Capabilities
IOTA: IOT Applications
G S E C : G e n e r i c Securi ty Capabilities
S S E C : S p e c i fi c Securi ty Capabilities
S M C : S p e c i fi c M a n a g e m e n t Capabilities
G M C : G e ne r i c M a n a g e m e n t Capabilities
Device Capabilities: Sensing and actuating, sleeping and waking up,
ad-hoc networking, communicating directly or indirectly with upper layers
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
IOTA
M
a
n
a
g
e
m
e
n
t
Layer
Security
Layer
DC
GC
NC
TC
GSC S S C
GMC
SMC
GSEC
SSEC
D C : D e v i c e Capabilities
G C : G a t e w a y Capabilities
N C : N e t w o r k Capabilities
TC: Transport Capabilities
G S C : G e n e r i c S u p p o r t Capabilities
S S C : S p e c i fi c S u p p o r t Capabilities
IOTA: IOT Applications
G S E C : G e n e r i c Securi ty Capabilities
S S E C : S p e c i fi c Securi ty Capabilities
S M C : S p e c i fi c M a n a g e m e n t Capabilities
G M C : G e ne r i c M a n a g e m e n t Capabilities
Gateway Capabilities: Multiple interfaces support, protocol conversion,
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
some of application logic, execution environment
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
IOTA
M
a
n
a
g
e
m
e
n
t
Layer
Security
Layer
DC
GC
NC
TC
GSC S S C
GMC
SMC
GSEC
SSEC
D C : D e v i c e Capabilities
G C : G a t e w a y Capabilities
N C : N e t w o r k Capabilities
TC: Transport Capabilities
G S C : G e n e r i c S u p p o r t Capabilities
S S C : S p e c i fi c S u p p o r t Capabilities
IOTA: IOT Applications
G S E C : G e n e r i c Securi ty Capabilities
S S E C : S p e c i fi c Securi ty Capabilities
S M C : S p e c i fi c M a n a g e m e n t Capabilities
G M C : G e ne r i c M a n a g e m e n t Capabilities
Network Capabilities: Network connectivity, mobility management, AAA
(authentication, authorization, and accounting)
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
IOTA
M
a
n
a
g
e
m
e
n
t
Layer
Security
Layer
DC
GC
NC
TC
GSC S S C
GMC
SMC
GSEC
SSEC
D C : D e v i c e Capabilities
G C : G a t e w a y Capabilities
N C : N e t w o r k Capabilities
TC: Transport Capabilities
G S C : G e ne r i c S u p p o r t Capabilities
S S C : S p e c i fi c S u p p o r t Capabilities
IOTA: IOT Applications
G S E C : G e n e r i c Securi ty Capabilities
S S E C : S p e c i fi c Securi ty Capabilities
S M C : S p e c i fi c M a n a g e m e n t Capabilities
G M C : G e n e r i c M a n a g e m e n t Capabilities
Transport Capabilities: Transport services for data and control
information
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
IOTA
M
a
n
a
g
e
m
e
n
t
Layer
Security
Layer
DC
GC
NC
TC
GSC S S C
GMC
SMC
GSEC
SSEC
D C : D e v i c e Capabilities
G C : G a t e w a y Capabilities
N C : N e t w o r k Capabilities
TC: Transport Capabilities
G S C : G e n e r i c S u p p o r t Capabilities
S S C : S p e c i fi c S u p p o r t Capabilities
IOTA: IOT Applications
G S E C : G e n e r i c Securi ty Capabilities
S S E C : S p e c i fi c Securi ty Capabilities
S M C : S p e c i fi c M a n a g e m e n t Capabilities
G M C : G e n e r i c M a n a g e m e n t Capabilities
Generic Support Capabilities: Data processing, Data storage, etc.
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
IOTA
M
a
n
a
g
e
m
e
n
t
Layer
Security
Layer
DC
GC
NC
TC
GSC S S C
GMC
SMC
GSEC
SSEC
D C : D e v i c e Capabilities
G C : G a t e w a y Capabilities
N C : N e t w o r k Capabilities
TC: Transport Capabilities
G S C : G e n e r i c S u p p o r t Capabilities
S S C : S p e c i fi c S u p p o r t Capabilities
IOTA: IOT Applications
G S E C : G e n e r i c Securi ty Capabilities
S S E C : S p e c i fi c Securi ty Capabilities
S M C : S p e c i fi c M a n a g e m e n t Capabilities
G M C : G e ne r i c M a n a g e m e n t Capabilities
Specific Support Capabilities: Provide different support functions for
different IoT applications
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
IOTA
M
a
n
a
g
e
m
e
n
t
Layer
Security
Layer
DC
GC
NC
TC
GSC S S C
GMC
SMC
GSEC
SSEC
D C : D e v i c e Capabilities
G C : G a t e w a y Capabilities
N C : N e t w o r k Capabilities
TC: Transport Capabilities
G S C : G e n e r i c S u p p o r t Capabilities
S S C : S p e c i fi c S u p p o r t Capabilities
IOTA: IOT Applications
G S E C : G e n e r i c Securi ty Capabilities
S S E C : S p e c i fi c Securi ty Capabilities
S M C : S p e c i fi c M a n a g e m e n t Capabilities
G M C : G e ne r i c M a n a g e m e n t Capabilities
IoT Application: The Internet of things application written by an
IoT developer and executed by the user
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
IOTA
M
a
n
a
g
e
m
e
n
t
Layer
Security
Layer
DC
GC
NC
TC
GSC S S C
GMC
SMC
GSEC
SSEC
D C : D e v i c e Capabilities
G C : G a t e w a y Capabilities
N C : N e t w o r k Capabilities
TC: Transport Capabilities
G S C : G e n e r i c S u p p o r t Capabilities
S S C : S p e c i fi c S u p p o r t Capabilities
IOTA: IOT Applications
G S E C : G e n e r i c Securi ty Capabilities
S S E C : S p e c i fi c Securi ty Capabilities
S M C : S p e c i fi c M a n a g e m e n t Capabilities
G M C : G e n e r i c M a n a g e m e n t Capabilities
Generic Management Capabilities: Device management such as
activation/deactivation and firmware/software upgrades, Network topology
and congestion management
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
IOTA
M
a
n
a
g
e
m
e
n
t
Layer
Security
Layer
DC
GC
NC
TC
GSC S S C
GMC
SMC
GSEC
SSEC
D C : D e v i c e Capabilities
G C : G a t e w a y Capabilities
N C : N e t w o r k Capabilities
TC: Transport Capabilities
G S C : G e n e r i c S u p p o r t Capabilities
S S C : S p e c i fi c S u p p o r t Capabilities
IOTA: IOT Applications
G S E C : G e n e r i c Securi ty Capabilities
S S E C : S p e c i fi c Securi ty Capabilities
S M C : S p e c i fi c M a n a g e m e n t Capabilities
G M C : G e ne r i c M a n a g e m e n t Capabilities
Specific Management Capabilities: coupled with application-
specific requirements
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
IOTA
M
a
n
a
g
e
m
e
n
t
Layer
Security
Layer
DC
GC
NC
TC
GSC S S C
GMC
SMC
GSEC
SSEC
D C : D e v i c e Capabilities
G C : G a t e w a y Capabilities
N C : N e t w o r k Capabilities
TC: Transport Capabilities
G S C : G e n e r i c S u p p o r t Capabilities
S S C : S p e c i fi c S u p p o r t Capabilities
IOTA: IOT Applications
G S E C : G e n e r i c Securi ty Capabilities
S S E C : S p e c i fi c Securi ty Capabilities
S M C : S p e c i fi c M a n a g e m e n t Capabilities
G M C : G e ne r i c M a n a g e m e n t Capabilities
Generic Security Capabilities: authorization, authentication,
data confidentiality and integrity protection, privacy protection
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
IOTA
M
a
n
a
g
e
m
e
n
t
Layer
Security
Layer
DC
GC
NC
TC
GSC S S C
GMC
SMC
GSEC
SSEC
D C : D e v i c e Capabilities
G C : G a t e w a y Capabilities
N C : N e t w o r k Capabilities
TC: Transport Capabilities
G S C : G e n e r i c S u p p o r t Capabilities
S S C : S p e c i fi c S u p p o r t Capabilities
IOTA: IOT Applications
G S E C : G e n e r i c Securi ty Capabilities
S S E C : S p e c i fi c Securi ty Capabilities
S M C : S p e c i fi c M a n a g e m e n t Capabilities
G M C : G e ne r i c M a n a g e m e n t Capabilities
Specific Security Capabilities: coupled with application-
specific requirements
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
10 / 57
IoT Architecture
IoT Architecture - Communication Models
1-Device to Device Model
2-Device to Cloud Model
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Source: Internet Society
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
11 / 57
IoT Architecture
IoT Architecture - Communication Models
3-Device to Gateway Model
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Source: Internet Society
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
12 / 57
IoT Architecture
IoT Architecture - Communication Models
4-Back End Data Sharing Model
Source: Internet Society
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
13 / 57
IoT Standards
IoT Standards - Benefits
Reduced deployment and operation costs
) Costeffective products thanks to focused R&D efforts
) Easier application development
) Easier integration between solution components
) Ability to share and reuse infrastructure and field devices
Sustainable investments
) No vendor lockin
) Ability to benefit from further evolutions of the standard as it grows
Improved opportunities
) Ability to share and reuse data across vertical applications
) Ability to interconnect with other IoT/M2M systems
) Fostering of new applications and new business models
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
18 / 57
IoT Standards
IoT Standards - Overview
Source: Intel
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
19 / 57
IoT Standards
IoT Standards - Organizations
Internet Engineering Task Force (IETF)
) Constrained RESTful Environments Working Group (CoRE)
) IPv6 over Low power WPAN Working Group (6lowpan)
) Routing Over Low power and Lossy networks Working Group (ROLL)
OneM2M : The purpose and goal of oneM2M is to develop
technical specifications which address the need for a common M2M
Service Layer that can be readily embedded within various hardware
and software.
World Wide Web Consortium (W3C)
) Web of thing Community Group
) Semantic Sensor Net Ontology
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
20 / 57
IoT Standards
IoT Standards - Organizations
Organization for the Advancement of Structured Information
Standards (OASIS)
) MQTT Technical Committee
Eclipse Paho Project: The scope of the Paho project is to
provide open source implementations of open and standard
messaging protocols that support current and emerging
requirements of IoT
International Telecommunication Union (ITU-T)
) Internet of Things Global Standards Initiative (IoT-GSI)
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
21 / 57
IoT Standards
IoT Standards - Alliances
Allseen Alliance : The AllSeen Alliance is dedicated to the
widespread adoption of products, systems and services that support
the Internet of Things
) AllJoyn Framework: A universal IoT Development Framework
Open Connectivity Foundation (OCF)
) The successor to Open Interconnect Consortium (OIC)
) Provides IoTivity Framework and data models based on RESTful API
Modeling Language (RAML)
) Allseen alliance has recently merged in one alliance with OCF
Open Mobile Alliance (OMA): OMA is the Leading Industry Forum
for Developing Market Driven Interoperable Mobile Service Enablers
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
22 / 57
IoT Standards
IoT Standards - Alliances
IP Smart Object Alliance (IPSO): A global non-profit organization
serving the various communities seeking to establish the Internet
Protocol as the network for the connection of Smart Objects by
providing coordinated marketing efforts available to the general public
Industrial Internet Consortium: Founded in 2014 to further
development, adoption and wide-spread use of
interconnected machines, intelligent analytics and people at
work
) Internet of Things Global Standards Initiative (IoT-GSI)
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
23 / 57
IoT Standards
IoT Standards - Semantics
Industry specific groups are in best position to define metadata for
each vertical.
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
24 / 57
IoT Standards
IoT Standards - OneM2M
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Source: OneM2M
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
25 / 57
IoT Protocols
IoT Protocols - Overview
Low Power communication protocols : COAP, MQTT, RPL, 6LoWPAN,
802.15.4, Low Power Wide Area Network (3GPP and others)
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Source: OneM2M
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
26 / 57
IoT Protocols
IoT Protocols - Data Communication
Constrained Application Protocol (COAP)
) RESTful protocol design minimizing the complexity of mapping
with HTTP
) Low header overhead and parsing complexity
) URI and content-type support
) Support for the discovery of resources provided by known CoAP services
) Simple subscription for a resource, and resulting push notifications
Message Queuing Telemetry Transport (MQTT)
) invented by IBM in 2000 for telemetry applications using low
power data rates
) enables a publish/subscribe messaging model in an extremely
lightweight way
) requires Small Code footprint and low bandwidth
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
27 / 57
IoT Protocols
IoT Protocols - Local Network
Communication
IEEE 802.15.4
) IEEE 802.15.4 is a standard which specifies the physical layer and
media access control for low-rate wireless personal area networks
(LR-WPANs).
) It is maintained by the IEEE 802.15 working group
) It is the basis for the ZigBee,ISA100.11a, WirelessHART, and MiWi
specifications, each of which further extends the standard by
developing the upper layers which are not defined in IEEE 802.15.4
) it is used with 6LoWPAN and standard Internet protocols to build a
wireless embedded Internet.
Zigbee
) Uses the 802.15.4 standard and operates in the 2.4 GHz frequency
range with 250 kbps
) The maximum number of nodes in the network is 1024 with a range
up to 200 meter. ZigBee can use 128 bit AES encryption.
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
28 / 57
IoT Protocols
IoT Protocols - Local Network
Communication
Bluetooth Low Energy
) designed and marketed by the Bluetooth Special Interest Group
) Different Profiles for Different applications
) Provide the same range as classic bluetooth with considerable low
energy consumption
) the technology used in beacons used to send contextual information
based on locations (Google beacon platform , Google Physical web,
Apple ibeacon)
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
29 / 57
IoT Protocols
IoT Protocols - Low Power Wide Area
Network (LPWAN)
Weightless is a proposed proprietary open wireless technology
standard for exchanging data between a base station and
thousands of machines around it (using wavelength radio
transmissions in unoccupied TV transmission channels) with high
levels of security.
NB-IoT (Narrow-Band IoT) A technology being standardized
by the 3GPP standards body
LTE-MTC (LTE-Machine Type Communication) -
Standards-based family of technologies supports several
technology categories, such as Cat-1 and CatM1, suitable for the
IoT.
EC-GSM-IoT (Extended Coverage-GSM-IoT) - Enables new
capabilities of existing cellular networks for LPWA (Low Power Wide
Area) IoT applications. EC-GSM-IoT can be activated through new
software deployed over a very large GSM footprint, adding even more
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
30 / 57
IoT Protocols
IoT Protocols - Low Power Wide Area
Network (LPWAN)
Sigfox is a French company that build Low Power wide network for
connected devices using its proprietary protocol.
LoRaWAN - Network protocol intended for wireless battery operated
Things in regional, national or global network. It is managed by Lora
Alliance.
RPMA (Random phase multiple access) A technology
communication system employing direct-sequence spread
spectrum (DSSS) with multiple access.
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
31 / 57
IoT Protocols
IoT Protocols - Low Power Wide Area Network (LPWAN)
Source: indigoo.com
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
32 / 57
IoT Protocols
IoT Protocols - Low Power Wide Area Network (LPWAN)
Source: indigoo.com
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
33 / 57
IoT Protocols
IoT Protocols - Routing Protocols
IPv6 over Low power
Wireless Personal Area
Networks (6LoWPAN)
) An adaption layer for IPv6
over IEEE802.15.4 links
) Operates only in the 2.4
GHz frequency range with
250 kbps transfer rate
Routing Protocol for low
Power and Lossy Networks
(RPL)
) Developed by IETF ROLL
Working Group
) Ideal for N to 1 links
(meters reading)
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
34 / 57
IoT Protocols
IoT Protocols - Discovery
Search around me: This
category of discovery
includes technologies that
allow to discover things
around me (in a spatial
sense)
) NFC
) UriBeacon (Formerly
known as Physical Web
from Google)
) iBeacon (from Apple)
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
35 / 57
IoT Protocols
IoT Protocols - Discovery
Search on my network: It covers technologies enabling discovery
of things on the network.
) mDNS
) SSDP
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
36 / 57
IoT Protocols
IoT Protocols - Discovery
Searching in a directory:
) A central directory is used
for discovery of things and
resources
) Discovery requests are
sent to the directory
CoRE Resource
Directory
XMPP IoT Discovery
SPARQL Endpoints
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
37 / 57
IoT Protocols
IoT Protocols - Discovery
Search Across Peers:
) In P2P style discovery, the directory is essentially distributed across the
peers
) Distributed hash tables (DHT) is often used to map the search space
into a numeric range and then allocates servers to parts of that
range
) Observation: the technique works well for scale free networks
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
38 / 57
IoT Protocols
IoT Protocols - Discovery
Search for Thing Metadata:
) Once a thing” has been
discovered with
mentioned mechanisms
next ”resources”
(thing metadata)
access at thing level
needs to be performed
) Examples
CoAP + CoRE Link
Format (for thing
metadata)
SensorObservation
Service (SOS): it is a
webservice which
allows querying sensor
metadata.
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
39 / 57
An Example: MQTT
MQTT - Features
Client Server publish/subscribe messaging transport protocol
Simple to implement
Lightweight and Bandwidth Efficient
small code footprint
Provide a Quality of Service Data Delivery
Data Agnostic
Continuous Session Awareness
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
43 / 57
An Example: MQTT
MQTT - Publish and Subscribe Model
Source: HiveMQ.com
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
44 / 57
An Example: MQTT
MQTT - Publish and Subscribe Model
The Pub/Sub model decouples the sender (Publisher) from
the receiver (Subscriber) by a third party called the broker
) Space decoupling: Publisher and subscriber do not need to
know each other (by ip address and port for example)
) Time decoupling: Publisher and subscriber do not need to run at
the same time
) Synchronization decoupling: Operations on both components are
not halted during publish or receiving
The broker filters all incoming messages coming from publishers
and distributes them to subscribers accordingly
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
45 / 57
An Example: MQTT
MQTT - Publish and Subscribe Model
Pub/Sub also provides a greater scalability than the traditional
client-server approach because operations on the broker can be
highly parallelized and processed event-driven
To scale publish/subscribe to millions of connections, cluster of
brokers are used .
The broker filter then forward messages to subscribers based on
three criteria :
) Subject-based filtering
) Content-based filtering
) Type-based filtering
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
46 / 57
An Example: MQTT
MQTT Connection
Source: HiveMQ.com
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
47 / 57
An Example: MQTT
MQTT Publish and Subscribe
Source: HiveMQ.com
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
48 / 57
An Example: MQTT
MQTT Topics
Source: HiveMQ.com
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
49 / 57
An Example: MQTT
MQTT Quality of Service (QoS)
Qos is a major feature of MQTT because it handles retransmission
and guarantees the delivery of the message
Mostly used for unreliable networks.
Three levels: 0, 1, and 2.
QoS 0 at most once: A
message wont be acknowledged
by the receiver or stored and
redelivered by the sender. This
is often called fire and forget
and provides the same
guarantee as the underlying
TCP protocol.
Source: HiveMQ.com
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
50 / 57
An Example: MQTT
MQTT Quality of Service (QoS)
QoS 1 at least once
) When using QoS level 1, it is
guaranteed that amessagewill be
delivered at least once to the
receiver. But the message can also
be delivered more than once.
) The sender will store the message
until it gets an acknowledgement in
form of aPUBACK command
message from the receiver.
) If the PUBACK isnt received in a
reasonable amount of time the sender
will resend the PUBLISH message
Source: HiveMQ.com
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
51 / 57
An Example: MQTT
MQTT Quality of Service (QoS)
It is the lowest level
If a receiver gets a QoS 2 PUBLISH it will process the message
and send PUBREC message.
When the sender receives the PUBREC it can safely discard the
initial publish, then store the PUBREC and respond with a PUBREL.
After the receiver gets the PUBREL it can discard every stored
state and answer with a PUBCOMP. The same is true when the
sender receives the PUBCOMP.
Source: HiveMQ.com
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
52 / 57
An Example: MQTT
MQTT - Simple Expirment
We will use two applications running on your mobile phones. One
acts as a publisher and the other as a subscriber. You can also work
in pairs.
For Android use mymqtt (publisher) and MQTT Dash (subscriber)
applications. Download them from Google play and install them in
your phone
For iphone, go to the website service
http://www.hivemq.com/demos/websocket-client/
First configure the clients with the following minimal parameters :
Address : iot.eclipse.org Port : 1884
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
53 / 57
An Example: MQTT
MQTT - Simple Expirment
Use one client to subscribe to the following topic:
kacst/b36/xxxx/temp (xxxx is a random number)
Use the other client to publish a message using the same topic
Publish a different value and make sure it is received by the subscriber
You could also try the wild-card feature
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
54 / 57
An Example: MQTT
Summary
 The IoT vision is to build a horizontal layer across
different vertical domains to facilitate data sharing
and enable innovative applications
 The IoT functional architecture includes
from top to bottom application, application
support, network, and device layers.
Management and security span all layers.
 Four IoT communication models: Device to device
, Device to cloud, Device to gateway , and Back
end sharing data models
 The IoT ecosystem has four Business roles :
Device provider, Network provider, Platform
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
55 / 57
An Example: MQTT
Summary
New protocols are designed in each functional layer.
OneM2M works to standardize the horizontal layer of the
IoT
Rich metadata is needed to describe things and their actions,
events, and relations
IoT platform is the back end system where the real work is done. It
is composed of different components that facilitate device
management, data storage and processing , events handling, data
analysis, visualization, and API to connect to devices or other
platforms or systems
Finally we describe the publish and subscribe communication
model and how MQTT protocol and why it is suitable for IoT
applications
nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares
Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017
56 / 57

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
Lecture 16
Lecture 16Lecture 16
Lecture 16
 
Components of IOT Implementation
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT Implementation
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and Similarities
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
PhD Projects in IoT Network Simulator Research Guidance
PhD Projects in IoT Network Simulator Research GuidancePhD Projects in IoT Network Simulator Research Guidance
PhD Projects in IoT Network Simulator Research Guidance
 
Iot architecture report
Iot architecture reportIot architecture report
Iot architecture report
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
 
Internet of Things Scalability
Internet of Things ScalabilityInternet of Things Scalability
Internet of Things Scalability
 
Iot
IotIot
Iot
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
Introduction of iot
Introduction of iotIntroduction of iot
Introduction of iot
 

Ähnlich wie Iot m2m

liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
MohammadSwerki2
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
Mohammed Saqib
 
Industrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceIndustrial IoT and OT/IT Convergence
Industrial IoT and OT/IT Convergence
Michelle Holley
 
An extensive review: Internet of things is speeding up the necessity for 5G
An extensive review: Internet of things is speeding up the necessity for 5GAn extensive review: Internet of things is speeding up the necessity for 5G
An extensive review: Internet of things is speeding up the necessity for 5G
IJERA Editor
 

Ähnlich wie Iot m2m (20)

CROM Digital Twins and IoT
CROM Digital Twins and IoTCROM Digital Twins and IoT
CROM Digital Twins and IoT
 
Advance driving analysis and control
Advance driving analysis and controlAdvance driving analysis and control
Advance driving analysis and control
 
Why and what you need to know about 6G in 2022
Why and what you need to know about 6G in 2022Why and what you need to know about 6G in 2022
Why and what you need to know about 6G in 2022
 
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
 
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
[이동식 원격 데이터센터 컨퍼런스] 이동식 원격 데이터센터의 군 활용-국방대 권태욱 교수
 
Mark Goldstein: "Emerging Broadband Capabilities & Applications" Ignite AZ Br...
Mark Goldstein: "Emerging Broadband Capabilities & Applications" Ignite AZ Br...Mark Goldstein: "Emerging Broadband Capabilities & Applications" Ignite AZ Br...
Mark Goldstein: "Emerging Broadband Capabilities & Applications" Ignite AZ Br...
 
Emerging Broadband Capabilities & Applications Ignite Presentation 5/29/19
Emerging Broadband Capabilities & Applications Ignite Presentation 5/29/19Emerging Broadband Capabilities & Applications Ignite Presentation 5/29/19
Emerging Broadband Capabilities & Applications Ignite Presentation 5/29/19
 
M2M communications and internet of things for smart cities
M2M communications and internet of things for smart citiesM2M communications and internet of things for smart cities
M2M communications and internet of things for smart cities
 
sensors-22-00196-v2.pdf
sensors-22-00196-v2.pdfsensors-22-00196-v2.pdf
sensors-22-00196-v2.pdf
 
Process offloading from android device to cloud using JADE.
Process offloading from android device to cloud using JADE.Process offloading from android device to cloud using JADE.
Process offloading from android device to cloud using JADE.
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Requirements and Challenges of Smart Mobility for IoT
Requirements and Challenges of Smart Mobility for IoTRequirements and Challenges of Smart Mobility for IoT
Requirements and Challenges of Smart Mobility for IoT
 
TII_Thierry_LESTABLE_CN4R_v5.pdf
TII_Thierry_LESTABLE_CN4R_v5.pdfTII_Thierry_LESTABLE_CN4R_v5.pdf
TII_Thierry_LESTABLE_CN4R_v5.pdf
 
Industrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceIndustrial IoT and OT/IT Convergence
Industrial IoT and OT/IT Convergence
 
Nagaraju_curriculum vitae
Nagaraju_curriculum vitaeNagaraju_curriculum vitae
Nagaraju_curriculum vitae
 
Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016
Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016
Звиад Кардава. Интернет вещей - модное слово или реальность? РИФ-Воронеж 2016
 
TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud Systems
 
An extensive review: Internet of things is speeding up the necessity for 5G
An extensive review: Internet of things is speeding up the necessity for 5GAn extensive review: Internet of things is speeding up the necessity for 5G
An extensive review: Internet of things is speeding up the necessity for 5G
 
Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

Iot m2m

  • 1. Department of Computer science & Applications Internet Of Things G.S.Ramireddy, M.Sc Lecture in Computers Govt Degree College, Ravulapalem
  • 2. Introduction to Internet of Things Architectures and Protocols 2 / 57
  • 3. Outline IoT overview From M2M to IoT IoT Architecture 4 5 IoT Standards IoT Protocols IoT Platforms 8 An Example: MQTT July 31, 2017 3 / 57
  • 4. IoT overview IoT Overview - Definition  The term ”Internet of Things” (IoT) denotes a trend where a large number of embedded devices employ communication services offered by the Internet protocols. Many of these devices, often called ”smart objects, are not directly operated by humans, but exist as components in buildings or vehicles, or are spread out in the environment. (The Internet Architecture Board)  A global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies (ITU)  The Internet of things (noun): The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data (Oxford Dictionary) July 31, 2017 4 / 57
  • 5. IoT overview IoT Overview - Enablers Ubiquitous Connectivity: Low cost, high speed, and pervasive network connectivity Widespread adoption of IPbased networking. Moores law continues to deliver greater computing power at lower price points and lower power consumption. Manufacturing advances allow cutting-edge computing and communications technology to be incorporated into very small objects Rise of Cloud Computing and big data analytics. July 31, 2017 5 / 57
  • 6. IoT overview IoT Overview - Challenges Security Privacy Interoperability / Standards Legal, Regulatory and Rights Emerging Economy and Development Issues July 31, 2017 6 / 57
  • 7. From M2M to IoT From M2M to IoT  In the 1990s, advances in wireless technology allowed machinetomachine (M2M) enterprise and industrial solutions to become widespread.  Many of these early M2M solutions, however, were based on closed purposebuilt networks and proprietary or industryspecific standards  The recent open M2M solutions are usually vertically centric which mean it serves a particular domain application (Health, Home, Industrial , etc.)  The concept of IoT is to build a horizontal layer that overlap all domains creating one big platform. July 31, 2017 7 / 57
  • 8. From M2M to IoT From M2M to IoT The IoT Horizontal Layer July 31, 2017 8 / 57
  • 9. From M2M to IoT From M2M to IoT A use case example: Stress measurement M2M solution July 31, 2017 9 / 57
  • 10. From M2M to IoT From M2M to IoT A use case example: Stress measurement IoT solution July 31, 2017 10 / 57
  • 11. IoT Architecture IoT Architecture Device Layer Network Layer Application Support Layer Application Layer IOTA M a n a g e m e n t Layer Security Layer DC GC NC TC GSC S S C GMC SMC GSEC SSEC D C : D e v i c e Capabilities G C : G a t e w a y Capabilities N C : N e t w o r k Capabilities TC: Transport Capabilities G S C : G e n e r i c S u p p o r t Capabilities S S C : S p e c i fi c S u p p o r t Capabilities IOTA: IOT Applications G S E C : G e n e r i c Securi ty Capabilities S S E C : S p e c i fi c Securi ty Capabilities S M C : S p e c i fi c M a n a g e m e n t Capabilities G M C : G e n e r i c M a n a g e m e n t Capabilities Source: ITU (redrawn) nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
  • 12. IoT Architecture IoT Architecture Device Layer Network Layer Application Support Layer Application Layer IOTA M a n a g e m e n t Layer Security Layer DC GC NC TC GSC S S C GMC SMC GSEC SSEC D C : D e v i c e Capabilities G C : G a t e w a y Capabilities N C : N e t w o r k Capabilities TC: Transport Capabilities G S C : G e n e r i c S u p p o r t Capabilities S S C : S p e c i fi c S u p p o r t Capabilities IOTA: IOT Applications G S E C : G e n e r i c Securi ty Capabilities S S E C : S p e c i fi c Securi ty Capabilities S M C : S p e c i fi c M a n a g e m e n t Capabilities G M C : G e ne r i c M a n a g e m e n t Capabilities Device Capabilities: Sensing and actuating, sleeping and waking up, ad-hoc networking, communicating directly or indirectly with upper layers nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
  • 13. IoT Architecture IoT Architecture Device Layer Network Layer Application Support Layer Application Layer IOTA M a n a g e m e n t Layer Security Layer DC GC NC TC GSC S S C GMC SMC GSEC SSEC D C : D e v i c e Capabilities G C : G a t e w a y Capabilities N C : N e t w o r k Capabilities TC: Transport Capabilities G S C : G e n e r i c S u p p o r t Capabilities S S C : S p e c i fi c S u p p o r t Capabilities IOTA: IOT Applications G S E C : G e n e r i c Securi ty Capabilities S S E C : S p e c i fi c Securi ty Capabilities S M C : S p e c i fi c M a n a g e m e n t Capabilities G M C : G e ne r i c M a n a g e m e n t Capabilities Gateway Capabilities: Multiple interfaces support, protocol conversion, nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares some of application logic, execution environment Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
  • 14. IoT Architecture IoT Architecture Device Layer Network Layer Application Support Layer Application Layer IOTA M a n a g e m e n t Layer Security Layer DC GC NC TC GSC S S C GMC SMC GSEC SSEC D C : D e v i c e Capabilities G C : G a t e w a y Capabilities N C : N e t w o r k Capabilities TC: Transport Capabilities G S C : G e n e r i c S u p p o r t Capabilities S S C : S p e c i fi c S u p p o r t Capabilities IOTA: IOT Applications G S E C : G e n e r i c Securi ty Capabilities S S E C : S p e c i fi c Securi ty Capabilities S M C : S p e c i fi c M a n a g e m e n t Capabilities G M C : G e ne r i c M a n a g e m e n t Capabilities Network Capabilities: Network connectivity, mobility management, AAA (authentication, authorization, and accounting) nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
  • 15. IoT Architecture IoT Architecture Device Layer Network Layer Application Support Layer Application Layer IOTA M a n a g e m e n t Layer Security Layer DC GC NC TC GSC S S C GMC SMC GSEC SSEC D C : D e v i c e Capabilities G C : G a t e w a y Capabilities N C : N e t w o r k Capabilities TC: Transport Capabilities G S C : G e ne r i c S u p p o r t Capabilities S S C : S p e c i fi c S u p p o r t Capabilities IOTA: IOT Applications G S E C : G e n e r i c Securi ty Capabilities S S E C : S p e c i fi c Securi ty Capabilities S M C : S p e c i fi c M a n a g e m e n t Capabilities G M C : G e n e r i c M a n a g e m e n t Capabilities Transport Capabilities: Transport services for data and control information nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
  • 16. IoT Architecture IoT Architecture Device Layer Network Layer Application Support Layer Application Layer IOTA M a n a g e m e n t Layer Security Layer DC GC NC TC GSC S S C GMC SMC GSEC SSEC D C : D e v i c e Capabilities G C : G a t e w a y Capabilities N C : N e t w o r k Capabilities TC: Transport Capabilities G S C : G e n e r i c S u p p o r t Capabilities S S C : S p e c i fi c S u p p o r t Capabilities IOTA: IOT Applications G S E C : G e n e r i c Securi ty Capabilities S S E C : S p e c i fi c Securi ty Capabilities S M C : S p e c i fi c M a n a g e m e n t Capabilities G M C : G e n e r i c M a n a g e m e n t Capabilities Generic Support Capabilities: Data processing, Data storage, etc. nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
  • 17. IoT Architecture IoT Architecture Device Layer Network Layer Application Support Layer Application Layer IOTA M a n a g e m e n t Layer Security Layer DC GC NC TC GSC S S C GMC SMC GSEC SSEC D C : D e v i c e Capabilities G C : G a t e w a y Capabilities N C : N e t w o r k Capabilities TC: Transport Capabilities G S C : G e n e r i c S u p p o r t Capabilities S S C : S p e c i fi c S u p p o r t Capabilities IOTA: IOT Applications G S E C : G e n e r i c Securi ty Capabilities S S E C : S p e c i fi c Securi ty Capabilities S M C : S p e c i fi c M a n a g e m e n t Capabilities G M C : G e ne r i c M a n a g e m e n t Capabilities Specific Support Capabilities: Provide different support functions for different IoT applications nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
  • 18. IoT Architecture IoT Architecture Device Layer Network Layer Application Support Layer Application Layer IOTA M a n a g e m e n t Layer Security Layer DC GC NC TC GSC S S C GMC SMC GSEC SSEC D C : D e v i c e Capabilities G C : G a t e w a y Capabilities N C : N e t w o r k Capabilities TC: Transport Capabilities G S C : G e n e r i c S u p p o r t Capabilities S S C : S p e c i fi c S u p p o r t Capabilities IOTA: IOT Applications G S E C : G e n e r i c Securi ty Capabilities S S E C : S p e c i fi c Securi ty Capabilities S M C : S p e c i fi c M a n a g e m e n t Capabilities G M C : G e ne r i c M a n a g e m e n t Capabilities IoT Application: The Internet of things application written by an IoT developer and executed by the user nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
  • 19. IoT Architecture IoT Architecture Device Layer Network Layer Application Support Layer Application Layer IOTA M a n a g e m e n t Layer Security Layer DC GC NC TC GSC S S C GMC SMC GSEC SSEC D C : D e v i c e Capabilities G C : G a t e w a y Capabilities N C : N e t w o r k Capabilities TC: Transport Capabilities G S C : G e n e r i c S u p p o r t Capabilities S S C : S p e c i fi c S u p p o r t Capabilities IOTA: IOT Applications G S E C : G e n e r i c Securi ty Capabilities S S E C : S p e c i fi c Securi ty Capabilities S M C : S p e c i fi c M a n a g e m e n t Capabilities G M C : G e n e r i c M a n a g e m e n t Capabilities Generic Management Capabilities: Device management such as activation/deactivation and firmware/software upgrades, Network topology and congestion management nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
  • 20. IoT Architecture IoT Architecture Device Layer Network Layer Application Support Layer Application Layer IOTA M a n a g e m e n t Layer Security Layer DC GC NC TC GSC S S C GMC SMC GSEC SSEC D C : D e v i c e Capabilities G C : G a t e w a y Capabilities N C : N e t w o r k Capabilities TC: Transport Capabilities G S C : G e n e r i c S u p p o r t Capabilities S S C : S p e c i fi c S u p p o r t Capabilities IOTA: IOT Applications G S E C : G e n e r i c Securi ty Capabilities S S E C : S p e c i fi c Securi ty Capabilities S M C : S p e c i fi c M a n a g e m e n t Capabilities G M C : G e ne r i c M a n a g e m e n t Capabilities Specific Management Capabilities: coupled with application- specific requirements nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
  • 21. IoT Architecture IoT Architecture Device Layer Network Layer Application Support Layer Application Layer IOTA M a n a g e m e n t Layer Security Layer DC GC NC TC GSC S S C GMC SMC GSEC SSEC D C : D e v i c e Capabilities G C : G a t e w a y Capabilities N C : N e t w o r k Capabilities TC: Transport Capabilities G S C : G e n e r i c S u p p o r t Capabilities S S C : S p e c i fi c S u p p o r t Capabilities IOTA: IOT Applications G S E C : G e n e r i c Securi ty Capabilities S S E C : S p e c i fi c Securi ty Capabilities S M C : S p e c i fi c M a n a g e m e n t Capabilities G M C : G e ne r i c M a n a g e m e n t Capabilities Generic Security Capabilities: authorization, authentication, data confidentiality and integrity protection, privacy protection nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
  • 22. IoT Architecture IoT Architecture Device Layer Network Layer Application Support Layer Application Layer IOTA M a n a g e m e n t Layer Security Layer DC GC NC TC GSC S S C GMC SMC GSEC SSEC D C : D e v i c e Capabilities G C : G a t e w a y Capabilities N C : N e t w o r k Capabilities TC: Transport Capabilities G S C : G e n e r i c S u p p o r t Capabilities S S C : S p e c i fi c S u p p o r t Capabilities IOTA: IOT Applications G S E C : G e n e r i c Securi ty Capabilities S S E C : S p e c i fi c Securi ty Capabilities S M C : S p e c i fi c M a n a g e m e n t Capabilities G M C : G e ne r i c M a n a g e m e n t Capabilities Specific Security Capabilities: coupled with application- specific requirements nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 10 / 57
  • 23. IoT Architecture IoT Architecture - Communication Models 1-Device to Device Model 2-Device to Cloud Model nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Source: Internet Society Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 11 / 57
  • 24. IoT Architecture IoT Architecture - Communication Models 3-Device to Gateway Model nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Source: Internet Society Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 12 / 57
  • 25. IoT Architecture IoT Architecture - Communication Models 4-Back End Data Sharing Model Source: Internet Society nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 13 / 57
  • 26. IoT Standards IoT Standards - Benefits Reduced deployment and operation costs ) Costeffective products thanks to focused R&D efforts ) Easier application development ) Easier integration between solution components ) Ability to share and reuse infrastructure and field devices Sustainable investments ) No vendor lockin ) Ability to benefit from further evolutions of the standard as it grows Improved opportunities ) Ability to share and reuse data across vertical applications ) Ability to interconnect with other IoT/M2M systems ) Fostering of new applications and new business models nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 18 / 57
  • 27. IoT Standards IoT Standards - Overview Source: Intel nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 19 / 57
  • 28. IoT Standards IoT Standards - Organizations Internet Engineering Task Force (IETF) ) Constrained RESTful Environments Working Group (CoRE) ) IPv6 over Low power WPAN Working Group (6lowpan) ) Routing Over Low power and Lossy networks Working Group (ROLL) OneM2M : The purpose and goal of oneM2M is to develop technical specifications which address the need for a common M2M Service Layer that can be readily embedded within various hardware and software. World Wide Web Consortium (W3C) ) Web of thing Community Group ) Semantic Sensor Net Ontology nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 20 / 57
  • 29. IoT Standards IoT Standards - Organizations Organization for the Advancement of Structured Information Standards (OASIS) ) MQTT Technical Committee Eclipse Paho Project: The scope of the Paho project is to provide open source implementations of open and standard messaging protocols that support current and emerging requirements of IoT International Telecommunication Union (ITU-T) ) Internet of Things Global Standards Initiative (IoT-GSI) nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 21 / 57
  • 30. IoT Standards IoT Standards - Alliances Allseen Alliance : The AllSeen Alliance is dedicated to the widespread adoption of products, systems and services that support the Internet of Things ) AllJoyn Framework: A universal IoT Development Framework Open Connectivity Foundation (OCF) ) The successor to Open Interconnect Consortium (OIC) ) Provides IoTivity Framework and data models based on RESTful API Modeling Language (RAML) ) Allseen alliance has recently merged in one alliance with OCF Open Mobile Alliance (OMA): OMA is the Leading Industry Forum for Developing Market Driven Interoperable Mobile Service Enablers nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 22 / 57
  • 31. IoT Standards IoT Standards - Alliances IP Smart Object Alliance (IPSO): A global non-profit organization serving the various communities seeking to establish the Internet Protocol as the network for the connection of Smart Objects by providing coordinated marketing efforts available to the general public Industrial Internet Consortium: Founded in 2014 to further development, adoption and wide-spread use of interconnected machines, intelligent analytics and people at work ) Internet of Things Global Standards Initiative (IoT-GSI) nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 23 / 57
  • 32. IoT Standards IoT Standards - Semantics Industry specific groups are in best position to define metadata for each vertical. nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 24 / 57
  • 33. IoT Standards IoT Standards - OneM2M nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Source: OneM2M Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 25 / 57
  • 34. IoT Protocols IoT Protocols - Overview Low Power communication protocols : COAP, MQTT, RPL, 6LoWPAN, 802.15.4, Low Power Wide Area Network (3GPP and others) nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Source: OneM2M Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 26 / 57
  • 35. IoT Protocols IoT Protocols - Data Communication Constrained Application Protocol (COAP) ) RESTful protocol design minimizing the complexity of mapping with HTTP ) Low header overhead and parsing complexity ) URI and content-type support ) Support for the discovery of resources provided by known CoAP services ) Simple subscription for a resource, and resulting push notifications Message Queuing Telemetry Transport (MQTT) ) invented by IBM in 2000 for telemetry applications using low power data rates ) enables a publish/subscribe messaging model in an extremely lightweight way ) requires Small Code footprint and low bandwidth nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 27 / 57
  • 36. IoT Protocols IoT Protocols - Local Network Communication IEEE 802.15.4 ) IEEE 802.15.4 is a standard which specifies the physical layer and media access control for low-rate wireless personal area networks (LR-WPANs). ) It is maintained by the IEEE 802.15 working group ) It is the basis for the ZigBee,ISA100.11a, WirelessHART, and MiWi specifications, each of which further extends the standard by developing the upper layers which are not defined in IEEE 802.15.4 ) it is used with 6LoWPAN and standard Internet protocols to build a wireless embedded Internet. Zigbee ) Uses the 802.15.4 standard and operates in the 2.4 GHz frequency range with 250 kbps ) The maximum number of nodes in the network is 1024 with a range up to 200 meter. ZigBee can use 128 bit AES encryption. nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 28 / 57
  • 37. IoT Protocols IoT Protocols - Local Network Communication Bluetooth Low Energy ) designed and marketed by the Bluetooth Special Interest Group ) Different Profiles for Different applications ) Provide the same range as classic bluetooth with considerable low energy consumption ) the technology used in beacons used to send contextual information based on locations (Google beacon platform , Google Physical web, Apple ibeacon) nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 29 / 57
  • 38. IoT Protocols IoT Protocols - Low Power Wide Area Network (LPWAN) Weightless is a proposed proprietary open wireless technology standard for exchanging data between a base station and thousands of machines around it (using wavelength radio transmissions in unoccupied TV transmission channels) with high levels of security. NB-IoT (Narrow-Band IoT) A technology being standardized by the 3GPP standards body LTE-MTC (LTE-Machine Type Communication) - Standards-based family of technologies supports several technology categories, such as Cat-1 and CatM1, suitable for the IoT. EC-GSM-IoT (Extended Coverage-GSM-IoT) - Enables new capabilities of existing cellular networks for LPWA (Low Power Wide Area) IoT applications. EC-GSM-IoT can be activated through new software deployed over a very large GSM footprint, adding even more nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 30 / 57
  • 39. IoT Protocols IoT Protocols - Low Power Wide Area Network (LPWAN) Sigfox is a French company that build Low Power wide network for connected devices using its proprietary protocol. LoRaWAN - Network protocol intended for wireless battery operated Things in regional, national or global network. It is managed by Lora Alliance. RPMA (Random phase multiple access) A technology communication system employing direct-sequence spread spectrum (DSSS) with multiple access. nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 31 / 57
  • 40. IoT Protocols IoT Protocols - Low Power Wide Area Network (LPWAN) Source: indigoo.com nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 32 / 57
  • 41. IoT Protocols IoT Protocols - Low Power Wide Area Network (LPWAN) Source: indigoo.com nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 33 / 57
  • 42. IoT Protocols IoT Protocols - Routing Protocols IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) ) An adaption layer for IPv6 over IEEE802.15.4 links ) Operates only in the 2.4 GHz frequency range with 250 kbps transfer rate Routing Protocol for low Power and Lossy Networks (RPL) ) Developed by IETF ROLL Working Group ) Ideal for N to 1 links (meters reading) nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 34 / 57
  • 43. IoT Protocols IoT Protocols - Discovery Search around me: This category of discovery includes technologies that allow to discover things around me (in a spatial sense) ) NFC ) UriBeacon (Formerly known as Physical Web from Google) ) iBeacon (from Apple) nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 35 / 57
  • 44. IoT Protocols IoT Protocols - Discovery Search on my network: It covers technologies enabling discovery of things on the network. ) mDNS ) SSDP nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 36 / 57
  • 45. IoT Protocols IoT Protocols - Discovery Searching in a directory: ) A central directory is used for discovery of things and resources ) Discovery requests are sent to the directory CoRE Resource Directory XMPP IoT Discovery SPARQL Endpoints nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 37 / 57
  • 46. IoT Protocols IoT Protocols - Discovery Search Across Peers: ) In P2P style discovery, the directory is essentially distributed across the peers ) Distributed hash tables (DHT) is often used to map the search space into a numeric range and then allocates servers to parts of that range ) Observation: the technique works well for scale free networks nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 38 / 57
  • 47. IoT Protocols IoT Protocols - Discovery Search for Thing Metadata: ) Once a thing” has been discovered with mentioned mechanisms next ”resources” (thing metadata) access at thing level needs to be performed ) Examples CoAP + CoRE Link Format (for thing metadata) SensorObservation Service (SOS): it is a webservice which allows querying sensor metadata. nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 39 / 57
  • 48. An Example: MQTT MQTT - Features Client Server publish/subscribe messaging transport protocol Simple to implement Lightweight and Bandwidth Efficient small code footprint Provide a Quality of Service Data Delivery Data Agnostic Continuous Session Awareness nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 43 / 57
  • 49. An Example: MQTT MQTT - Publish and Subscribe Model Source: HiveMQ.com nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 44 / 57
  • 50. An Example: MQTT MQTT - Publish and Subscribe Model The Pub/Sub model decouples the sender (Publisher) from the receiver (Subscriber) by a third party called the broker ) Space decoupling: Publisher and subscriber do not need to know each other (by ip address and port for example) ) Time decoupling: Publisher and subscriber do not need to run at the same time ) Synchronization decoupling: Operations on both components are not halted during publish or receiving The broker filters all incoming messages coming from publishers and distributes them to subscribers accordingly nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 45 / 57
  • 51. An Example: MQTT MQTT - Publish and Subscribe Model Pub/Sub also provides a greater scalability than the traditional client-server approach because operations on the broker can be highly parallelized and processed event-driven To scale publish/subscribe to millions of connections, cluster of brokers are used . The broker filter then forward messages to subscribers based on three criteria : ) Subject-based filtering ) Content-based filtering ) Type-based filtering nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 46 / 57
  • 52. An Example: MQTT MQTT Connection Source: HiveMQ.com nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 47 / 57
  • 53. An Example: MQTT MQTT Publish and Subscribe Source: HiveMQ.com nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 48 / 57
  • 54. An Example: MQTT MQTT Topics Source: HiveMQ.com nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 49 / 57
  • 55. An Example: MQTT MQTT Quality of Service (QoS) Qos is a major feature of MQTT because it handles retransmission and guarantees the delivery of the message Mostly used for unreliable networks. Three levels: 0, 1, and 2. QoS 0 at most once: A message wont be acknowledged by the receiver or stored and redelivered by the sender. This is often called fire and forget and provides the same guarantee as the underlying TCP protocol. Source: HiveMQ.com nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 50 / 57
  • 56. An Example: MQTT MQTT Quality of Service (QoS) QoS 1 at least once ) When using QoS level 1, it is guaranteed that amessagewill be delivered at least once to the receiver. But the message can also be delivered more than once. ) The sender will store the message until it gets an acknowledgement in form of aPUBACK command message from the receiver. ) If the PUBACK isnt received in a reasonable amount of time the sender will resend the PUBLISH message Source: HiveMQ.com nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 51 / 57
  • 57. An Example: MQTT MQTT Quality of Service (QoS) It is the lowest level If a receiver gets a QoS 2 PUBLISH it will process the message and send PUBREC message. When the sender receives the PUBREC it can safely discard the initial publish, then store the PUBREC and respond with a PUBREL. After the receiver gets the PUBREL it can discard every stored state and answer with a PUBCOMP. The same is true when the sender receives the PUBCOMP. Source: HiveMQ.com nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 52 / 57
  • 58. An Example: MQTT MQTT - Simple Expirment We will use two applications running on your mobile phones. One acts as a publisher and the other as a subscriber. You can also work in pairs. For Android use mymqtt (publisher) and MQTT Dash (subscriber) applications. Download them from Google play and install them in your phone For iphone, go to the website service http://www.hivemq.com/demos/websocket-client/ First configure the clients with the following minimal parameters : Address : iot.eclipse.org Port : 1884 nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 53 / 57
  • 59. An Example: MQTT MQTT - Simple Expirment Use one client to subscribe to the following topic: kacst/b36/xxxx/temp (xxxx is a random number) Use the other client to publish a message using the same topic Publish a different value and make sure it is received by the subscriber You could also try the wild-card feature nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 54 / 57
  • 60. An Example: MQTT Summary  The IoT vision is to build a horizontal layer across different vertical domains to facilitate data sharing and enable innovative applications  The IoT functional architecture includes from top to bottom application, application support, network, and device layers. Management and security span all layers.  Four IoT communication models: Device to device , Device to cloud, Device to gateway , and Back end sharing data models  The IoT ecosystem has four Business roles : Device provider, Network provider, Platform nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 55 / 57
  • 61. An Example: MQTT Summary New protocols are designed in each functional layer. OneM2M works to standardize the horizontal layer of the IoT Rich metadata is needed to describe things and their actions, events, and relations IoT platform is the back end system where the real work is done. It is composed of different components that facilitate device management, data storage and processing , events handling, data analysis, visualization, and API to connect to devices or other platforms or systems Finally we describe the publish and subscribe communication model and how MQTT protocol and why it is suitable for IoT applications nter for Computer Technology and Applied M (CTAM) Riyadh, Saudi Arabiares Dr. Abdullah Alfadhly KACST National Ce Introduction to Internet of Things July 31, 2017 56 / 57