SlideShare una empresa de Scribd logo
1 de 31
INTERNET OF THINGS(IOT)
Presented by : Rakesh Kumar Gupta
School of Engineering, CUSAT
14150041
What is the Internet of Things?
• Cisco “Internet of Everything”
• …the latest wave of the Internet -- connecting physical objects…to provide
better safety, comfort, and efficiency
• IBM “Internet of Things”
• …a completely new world-wide web, one comprised of the messages that
digitally empowered devices would send to one another. It is the same
Internet, but not the same Web.
• GE “Industrial Internet”
• …convergence of machine and intelligent data…to create brilliant machines
• RTI “Your Systems. Working as One.”
• …an entirely new utility.
• The Internet of Things (IoT) is the
network of physical objects or
"things" embedded with electronics,
software, sensors, and network
connectivity, which enables these
objects to collect and exchange
data.
The Internet of Things (IoT) completely
transforms
connectivity from “any-time, any-
where” for “any-one”
into “any-time, any-where” for “any-
thing”
History
• 1997 under the title “Challenges to the Network”.
• 1999, Auto-ID Center founded in MIT – Kevin Ashton
• 2003, EPC Global founded in MIT
• 2005, Four important technologies of the internet of
things was proposed in WSIS conference.
• 2008, First international conference of internet of
things: The IOT 2008 was held at Zurich
IoT Using Everywhere
Wearable IoT
Sensors in even the holy cow!
In the world of IoT, even the cows will be connected and
monitored. Sensors are implanted in the ears of cattle. This
allows farmers to monitor cows’ health and track their
movements, ensuring a healthier, more plentiful supply of milk.
On average, each cow generates about 200 MB of information
per year.
Current Status & Future Prospect of IoT
Generic Architecture and Protocols of IoT
 In Digital communication we have TCP/IP protocols stacks.
 Why we need Protocols in IoT?
 IoT connects enormous number of objects which will create a massive
traffic and tremendous amount of data capacity is needed.
 IoT will face numerous challenges especially privacy and security issues.
 Therefore, the new standard architecture and protocols for IoT needs to
address many essential factors (i.e. sustainability, reliability, Quality of
Service, confidentiality, integrity, etc.).
Protocol: A set of Rules regulations
• IoT architecture can be divided into five layers
 Perception Layer: Similar to physical layer in
OSI model which consists of the different types of
sensor (i.e. RFID, Zigbee, QR code, Infrared, etc.)
devices and environmental elements.
 Collection of information from sensor
 Transmits gathered information through the
Network layer for its secure communication toward
central information processing system.
 Network Layer:
 keeps the sensitive information confidential
 In securely transfers , from sensor devices to the central
information processing system through 3G, 4G, UMTS,
WiFi, WiMAX, RFID, Infrared, Satellite, etc. dependent upon
the type of sensors devices.
 Middleware Layer: Middleware layer has two
essential functions,
 service management
 store the lower layer information into the database.
• this layer also has capability to retrieve, process, compute
information, and then automatically decide based on the
computational results.
 Application Layer:
 Responsible for applications management based on
the processed information in the Middleware layer.
The IoT applications can be smart postal, smart health,
smart car, smart glasses, smart home, smart
independent living, smart transportation,
etc.
Business Layer: This layer functions cover the
whole IoT applications and services management. It
can create practically graphs, business models, flow
chart, executive report, etc. based on the amount of
accurate data received from lower layer and effective
data analysis process.
.
 Protocols
MQTT (Message Queue Telemetry Transport):
MQTT is a Client Server publishes or subscribes messaging transport
protocol.
 It is light weight, open, simple and designed so as to be easy to
implement.
 The protocol runs over TCP/IP or over other network protocol
that provided ordered, lossless, bi-directional connections.
 The MQTT features include: use of the publish/subscribe
message pattern which provides one-to-many message
distribution.
Client
Client
 Publish/Subscribe decouples a client, which is sending a
particular message(called publisher)from another
client(or more clients ),which is receiving the message
(called subscriber).
 In order to determine, which message gets to which
client, MQTT uses topics. A topic is a hierarchical
structured string, which is used for message filtering and
routing .
When talking about a client it almost always means an
MQTT client. This includes publisher or subscribers, both
of them label an MQTT client that is only doing publishing
or subscribing. (In general a MQTT client can be both a
publisher & subscriber at the same time). A MQTT client
is any device from a micro controller up to a full
fledged server, that has a MQTT library running and is
connecting to an MQTT broker over any kind of
network
 Client
The counterpart to a MQTT client is the MQTT broker,
which is the heart of any publish/subscribe protocol.
Depending on the concrete implementation, a broker can
handle up to thousands of concurrently connected MQTT
clients. The broker is primarily responsible for
receiving all messages, filtering them, decide who is
interested in it and then sending the message to all
subscribed clients.
 Broker
MQTT Connection
 The MQTT protocol is based on top of TCP/IP and both
client and broker need to have a TCP/IP stack.
 The connection is initiated through a client sending a
CONNECT message to the broker. The broker response
with a CONNACK and a status code.
 Once the connection is established, the broker will
keep it open as long as the client doesn’t send a
disconnect command or it looses the connection
 A good-natured client will send a connect message
with the following content among other things:
Clientid: identifier of each MQTT client connecting to a MQTT broker
Clean Session: client wants to establish a persistent session or not
Username/Password: username and password for authenticating the client and
also authorization.
Will Message: It allows to notify other clients, when a client disconnects
ungracefully.
KeepAlive: The keep alive is a time interval, the clients commits to by
sending regular PING Request messages to the broker.
 The CONNACK contains only two data entries:
session present flag, connect return code.
Session Present flag:
session present flag indicate, whether the
broker already has a persistent session of the
client from previous interactions
Return Code Return Code Response
0 Connection Accepted
1
Connection Refused, unacceptable
protocol version
2
Connection Refused, identifier
rejected
3
Connection Refused, Server
unavailable
4
Connection Refused, bad user name
or password
5 Connection Refused, not authorized
.
 CoAP
CoAP is the Constrained Application Protocol from the CoRE
(Constrained Resource Environments) IETF group.
 Architecture
 Like HTTP, CoAP is a document transfer protocol. Unlike HTTP,
CoAP is designed for the needs of constrained devices.
 CoAP packets are much smaller than HTTP TCP flows.
 CoAP runs over UDP, not TCP. Clients and servers communicate
through connectionless datagrams.
 CoAP allows UDP broadcast and multicast to be used for
addressing.
 CoAP follows a client/server model. Clients make
requests to servers, servers send back responses.
Clients may GET, PUT, POST and DELETE resources.
 CoAP is designed to interoperate with HTTP and the
RESTful web at large through simple proxies.
CoAP Message Header Format
CoAP message header Description
Ver
It is 2 bit unsigned integer. It mentions
CoAP version number. Set to one.
T
It is 2 bit unsigned integer. Indicates
message type viz. confirmable (0), non-
confirmable (1), ACK (2) or RESET(3).
TKL
It is 4 bit unsigned integer, Indicates length
of token (0 to 8 bytes).
Code
It is 8 bit unsigned integer, It is split into
two parts viz. 3 bit class (MSBs) and 5 bit
detail (LSBs).
Message ID
16 bit unsigned integer. Used for matching
responses. Used to detect message
duplication.
CoAP Message Exchange
 CoAP is unreliable protocol due to use of
UDP. Hence CoAP messages reach unordered
or will get lost when they arrive at
destination.
To make CoAP as reliable protocol, stop and
wait with exponential backoff retransmission
feature is incorporated in it. Duplicate
detection is also introduced.
Internet of things(iot)
Internet of things(iot)

Más contenido relacionado

La actualidad más candente

Internet of Things: Its Applications Future and Problems
Internet of Things: Its Applications Future and ProblemsInternet of Things: Its Applications Future and Problems
Internet of Things: Its Applications Future and ProblemsRiten Debnath
 
Internet of-thing
Internet of-thingInternet of-thing
Internet of-thingRishab garg
 
Internet of things
Internet of thingsInternet of things
Internet of thingsBrockanurag
 
Internet of Things - Lu, Ralph
Internet of Things - Lu, RalphInternet of Things - Lu, Ralph
Internet of Things - Lu, Ralphralphlu
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptxLamisaFaria
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 
How Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT ApplicationsHow Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT ApplicationsAnand SFJ
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGAYESHA JAVED
 
Internet of things
Internet of thingsInternet of things
Internet of thingsVikrant Negi
 

La actualidad más candente (20)

Iot
IotIot
Iot
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things: Its Applications Future and Problems
Internet of Things: Its Applications Future and ProblemsInternet of Things: Its Applications Future and Problems
Internet of Things: Its Applications Future and Problems
 
Internet of-thing
Internet of-thingInternet of-thing
Internet of-thing
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things - Lu, Ralph
Internet of Things - Lu, RalphInternet of Things - Lu, Ralph
Internet of Things - Lu, Ralph
 
IOT ppt
IOT pptIOT ppt
IOT ppt
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptx
 
The IoT Advantage
The IoT AdvantageThe IoT Advantage
The IoT Advantage
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
How Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT ApplicationsHow Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT Applications
 
IOT Consulting Service in Bangalore
IOT Consulting Service in BangaloreIOT Consulting Service in Bangalore
IOT Consulting Service in Bangalore
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
 
IoT
IoTIoT
IoT
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT
IoTIoT
IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Similar a Internet of things(iot)

Internet of things unit-1
Internet of things unit-1Internet of things unit-1
Internet of things unit-1Srimatre K
 
IRJET- MQTT in Internet of Things
IRJET- MQTT in Internet of ThingsIRJET- MQTT in Internet of Things
IRJET- MQTT in Internet of ThingsIRJET Journal
 
InduSoft Web Studio and MQTT for Internet of Things Applications
InduSoft Web Studio and MQTT for Internet of Things ApplicationsInduSoft Web Studio and MQTT for Internet of Things Applications
InduSoft Web Studio and MQTT for Internet of Things ApplicationsAVEVA
 
A Short Report on MQTT protocol for Internet of Things(IoT)
A Short Report on MQTT protocol for Internet of Things(IoT)A Short Report on MQTT protocol for Internet of Things(IoT)
A Short Report on MQTT protocol for Internet of Things(IoT)sonycse
 
Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Pokala Sai
 
Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hydKishore5511
 
Mqtt(Message queue telemetry protocol) presentation
Mqtt(Message queue telemetry protocol) presentation Mqtt(Message queue telemetry protocol) presentation
Mqtt(Message queue telemetry protocol) presentation Piyush Rathi
 
CCN AAT 2023 for mqtt protocol ppt presentation
CCN AAT 2023 for mqtt protocol ppt presentationCCN AAT 2023 for mqtt protocol ppt presentation
CCN AAT 2023 for mqtt protocol ppt presentationHidangmayumRahul
 
What is the application protocol for IoT.pdf
What is the application protocol for IoT.pdfWhat is the application protocol for IoT.pdf
What is the application protocol for IoT.pdfashumasih3
 
Study on Messaging Protocol Message Queue Telemetry Transport for the Interne...
Study on Messaging Protocol Message Queue Telemetry Transport for the Interne...Study on Messaging Protocol Message Queue Telemetry Transport for the Interne...
Study on Messaging Protocol Message Queue Telemetry Transport for the Interne...BRNSSPublicationHubI
 
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Istabraq M. Al-Joboury
 
Message queue telemetry transport and lightweight machine-tomachine comparis...
Message queue telemetry transport and lightweight machine-tomachine comparis...Message queue telemetry transport and lightweight machine-tomachine comparis...
Message queue telemetry transport and lightweight machine-tomachine comparis...IJECEIAES
 
Overview on Application protocols in Internet of Things
Overview on Application protocols in Internet of ThingsOverview on Application protocols in Internet of Things
Overview on Application protocols in Internet of ThingsJIGAR MAKHIJA
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdfJoshuaKimmich1
 
IOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxIOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxMeghaShree665225
 
What's the Right Messaging Standard for the IoT?
What's the Right Messaging  Standard for the IoT?What's the Right Messaging  Standard for the IoT?
What's the Right Messaging Standard for the IoT?Angelo Corsaro
 

Similar a Internet of things(iot) (20)

Internet of things unit-1
Internet of things unit-1Internet of things unit-1
Internet of things unit-1
 
IRJET- MQTT in Internet of Things
IRJET- MQTT in Internet of ThingsIRJET- MQTT in Internet of Things
IRJET- MQTT in Internet of Things
 
InduSoft Web Studio and MQTT for Internet of Things Applications
InduSoft Web Studio and MQTT for Internet of Things ApplicationsInduSoft Web Studio and MQTT for Internet of Things Applications
InduSoft Web Studio and MQTT for Internet of Things Applications
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
A Short Report on MQTT protocol for Internet of Things(IoT)
A Short Report on MQTT protocol for Internet of Things(IoT)A Short Report on MQTT protocol for Internet of Things(IoT)
A Short Report on MQTT protocol for Internet of Things(IoT)
 
Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications
 
IOT.pdf
IOT.pdfIOT.pdf
IOT.pdf
 
Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hyd
 
Mqtt(Message queue telemetry protocol) presentation
Mqtt(Message queue telemetry protocol) presentation Mqtt(Message queue telemetry protocol) presentation
Mqtt(Message queue telemetry protocol) presentation
 
CCN AAT 2023 for mqtt protocol ppt presentation
CCN AAT 2023 for mqtt protocol ppt presentationCCN AAT 2023 for mqtt protocol ppt presentation
CCN AAT 2023 for mqtt protocol ppt presentation
 
What is the application protocol for IoT.pdf
What is the application protocol for IoT.pdfWhat is the application protocol for IoT.pdf
What is the application protocol for IoT.pdf
 
Study on Messaging Protocol Message Queue Telemetry Transport for the Interne...
Study on Messaging Protocol Message Queue Telemetry Transport for the Interne...Study on Messaging Protocol Message Queue Telemetry Transport for the Interne...
Study on Messaging Protocol Message Queue Telemetry Transport for the Interne...
 
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
Message queue telemetry transport and lightweight machine-tomachine comparis...
Message queue telemetry transport and lightweight machine-tomachine comparis...Message queue telemetry transport and lightweight machine-tomachine comparis...
Message queue telemetry transport and lightweight machine-tomachine comparis...
 
Overview on Application protocols in Internet of Things
Overview on Application protocols in Internet of ThingsOverview on Application protocols in Internet of Things
Overview on Application protocols in Internet of Things
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
IOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxIOT Network architecture and Design.pptx
IOT Network architecture and Design.pptx
 
What's the Right Messaging Standard for the IoT?
What's the Right Messaging  Standard for the IoT?What's the Right Messaging  Standard for the IoT?
What's the Right Messaging Standard for the IoT?
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Internet of things(iot)

  • 1. INTERNET OF THINGS(IOT) Presented by : Rakesh Kumar Gupta School of Engineering, CUSAT 14150041
  • 2. What is the Internet of Things? • Cisco “Internet of Everything” • …the latest wave of the Internet -- connecting physical objects…to provide better safety, comfort, and efficiency • IBM “Internet of Things” • …a completely new world-wide web, one comprised of the messages that digitally empowered devices would send to one another. It is the same Internet, but not the same Web. • GE “Industrial Internet” • …convergence of machine and intelligent data…to create brilliant machines • RTI “Your Systems. Working as One.” • …an entirely new utility.
  • 3. • The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.
  • 4. The Internet of Things (IoT) completely transforms connectivity from “any-time, any- where” for “any-one” into “any-time, any-where” for “any- thing”
  • 5. History • 1997 under the title “Challenges to the Network”. • 1999, Auto-ID Center founded in MIT – Kevin Ashton • 2003, EPC Global founded in MIT • 2005, Four important technologies of the internet of things was proposed in WSIS conference. • 2008, First international conference of internet of things: The IOT 2008 was held at Zurich
  • 6.
  • 8. Sensors in even the holy cow! In the world of IoT, even the cows will be connected and monitored. Sensors are implanted in the ears of cattle. This allows farmers to monitor cows’ health and track their movements, ensuring a healthier, more plentiful supply of milk. On average, each cow generates about 200 MB of information per year.
  • 9. Current Status & Future Prospect of IoT
  • 10. Generic Architecture and Protocols of IoT  In Digital communication we have TCP/IP protocols stacks.  Why we need Protocols in IoT?  IoT connects enormous number of objects which will create a massive traffic and tremendous amount of data capacity is needed.  IoT will face numerous challenges especially privacy and security issues.  Therefore, the new standard architecture and protocols for IoT needs to address many essential factors (i.e. sustainability, reliability, Quality of Service, confidentiality, integrity, etc.). Protocol: A set of Rules regulations
  • 11. • IoT architecture can be divided into five layers  Perception Layer: Similar to physical layer in OSI model which consists of the different types of sensor (i.e. RFID, Zigbee, QR code, Infrared, etc.) devices and environmental elements.  Collection of information from sensor  Transmits gathered information through the Network layer for its secure communication toward central information processing system.
  • 12.  Network Layer:  keeps the sensitive information confidential  In securely transfers , from sensor devices to the central information processing system through 3G, 4G, UMTS, WiFi, WiMAX, RFID, Infrared, Satellite, etc. dependent upon the type of sensors devices.  Middleware Layer: Middleware layer has two essential functions,  service management  store the lower layer information into the database. • this layer also has capability to retrieve, process, compute information, and then automatically decide based on the computational results.
  • 13.  Application Layer:  Responsible for applications management based on the processed information in the Middleware layer. The IoT applications can be smart postal, smart health, smart car, smart glasses, smart home, smart independent living, smart transportation, etc. Business Layer: This layer functions cover the whole IoT applications and services management. It can create practically graphs, business models, flow chart, executive report, etc. based on the amount of accurate data received from lower layer and effective data analysis process. .
  • 14.  Protocols MQTT (Message Queue Telemetry Transport): MQTT is a Client Server publishes or subscribes messaging transport protocol.  It is light weight, open, simple and designed so as to be easy to implement.  The protocol runs over TCP/IP or over other network protocol that provided ordered, lossless, bi-directional connections.  The MQTT features include: use of the publish/subscribe message pattern which provides one-to-many message distribution.
  • 16.  Publish/Subscribe decouples a client, which is sending a particular message(called publisher)from another client(or more clients ),which is receiving the message (called subscriber).  In order to determine, which message gets to which client, MQTT uses topics. A topic is a hierarchical structured string, which is used for message filtering and routing .
  • 17. When talking about a client it almost always means an MQTT client. This includes publisher or subscribers, both of them label an MQTT client that is only doing publishing or subscribing. (In general a MQTT client can be both a publisher & subscriber at the same time). A MQTT client is any device from a micro controller up to a full fledged server, that has a MQTT library running and is connecting to an MQTT broker over any kind of network  Client The counterpart to a MQTT client is the MQTT broker, which is the heart of any publish/subscribe protocol. Depending on the concrete implementation, a broker can handle up to thousands of concurrently connected MQTT clients. The broker is primarily responsible for receiving all messages, filtering them, decide who is interested in it and then sending the message to all subscribed clients.  Broker
  • 18. MQTT Connection  The MQTT protocol is based on top of TCP/IP and both client and broker need to have a TCP/IP stack.
  • 19.  The connection is initiated through a client sending a CONNECT message to the broker. The broker response with a CONNACK and a status code.  Once the connection is established, the broker will keep it open as long as the client doesn’t send a disconnect command or it looses the connection
  • 20.  A good-natured client will send a connect message with the following content among other things:
  • 21. Clientid: identifier of each MQTT client connecting to a MQTT broker Clean Session: client wants to establish a persistent session or not Username/Password: username and password for authenticating the client and also authorization. Will Message: It allows to notify other clients, when a client disconnects ungracefully. KeepAlive: The keep alive is a time interval, the clients commits to by sending regular PING Request messages to the broker.
  • 22.  The CONNACK contains only two data entries: session present flag, connect return code. Session Present flag: session present flag indicate, whether the broker already has a persistent session of the client from previous interactions
  • 23. Return Code Return Code Response 0 Connection Accepted 1 Connection Refused, unacceptable protocol version 2 Connection Refused, identifier rejected 3 Connection Refused, Server unavailable 4 Connection Refused, bad user name or password 5 Connection Refused, not authorized .
  • 24.  CoAP CoAP is the Constrained Application Protocol from the CoRE (Constrained Resource Environments) IETF group.  Architecture  Like HTTP, CoAP is a document transfer protocol. Unlike HTTP, CoAP is designed for the needs of constrained devices.  CoAP packets are much smaller than HTTP TCP flows.  CoAP runs over UDP, not TCP. Clients and servers communicate through connectionless datagrams.  CoAP allows UDP broadcast and multicast to be used for addressing.
  • 25.  CoAP follows a client/server model. Clients make requests to servers, servers send back responses. Clients may GET, PUT, POST and DELETE resources.  CoAP is designed to interoperate with HTTP and the RESTful web at large through simple proxies.
  • 27. CoAP message header Description Ver It is 2 bit unsigned integer. It mentions CoAP version number. Set to one. T It is 2 bit unsigned integer. Indicates message type viz. confirmable (0), non- confirmable (1), ACK (2) or RESET(3). TKL It is 4 bit unsigned integer, Indicates length of token (0 to 8 bytes). Code It is 8 bit unsigned integer, It is split into two parts viz. 3 bit class (MSBs) and 5 bit detail (LSBs). Message ID 16 bit unsigned integer. Used for matching responses. Used to detect message duplication.
  • 29.  CoAP is unreliable protocol due to use of UDP. Hence CoAP messages reach unordered or will get lost when they arrive at destination. To make CoAP as reliable protocol, stop and wait with exponential backoff retransmission feature is incorporated in it. Duplicate detection is also introduced.