SlideShare a Scribd company logo
1
Introduction:
IoT Networking - Part 2
Dr. Sudip Misra
Professor
Department of Computer Science and Engineering
Indian Institute of Technology Kharagpur
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/
Research Lab: cse.iitkgp.ac.in/~smisra/swan/
Industry 4.0 and Industrial Internet of Things
Requirements of IoT Network
 Coverage
 High throughput
 Low latency
 Ultra reliability
 High power efficiency
2Industry 4.0 and Industrial Internet of Things
3Industry 4.0 and Industrial Internet of Things
MQTT
MQTT
 Message Queue Telemetry Transport
 Introduced by IBM and standardized by Organization for the
Advancement of Structured Information Standards (OASIS) in
2013
 Works on Publish/Subscribe framework on top of TCP/IP
architecture
 Advantages
 Reliable, Lightweight, and cost-effective protocol
4Industry 4.0 and Industrial Internet of Things
MQTT Publish/Subscribe Framework
5Industry 4.0 and Industrial Internet of Things
Source: Hanes, D, et al. (2017), "IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things", Cisco Press.
MQTT QoS
 QoS of MQTT protocol is maintained for two transactions
 First transaction: Publishing client  MQTT Server
 Second transaction: MQTT Server  Subscribing Client
 Client on each transaction sets the QoS level
 For the first transaction, publishing client sets the QoS level
 For second transaction, client subscriber sets the QoS level
6Industry 4.0 and Industrial Internet of Things
Source: Hanes, D, et al. (2017), "IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things", Cisco Press.
MQTT QoS Levels
 Supports 3-level of QoS
 QoS 0:
 Also known as “at most once” delivery
 Best effort and unacknowledged data service
 Publisher transmits the message one time to server and server
transmits it once to subscriber
 No retry is performed
7Industry 4.0 and Industrial Internet of Things
Source: Hanes, D, et al. (2017), "IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things", Cisco Press.
MQTT QoS Levels
 QoS 1:
 Also known as “at least once” delivery
 Message delivery between the publisher, server and then between server
and subscribers occurs at least once.
 Retry is performed until acknowledgement of message is recieved
 QoS 2:
 Also known as “exactly once” delivery
 This QoS level is used when neither packet loss or duplication of message
is allowed
 Retry is performed until the message is delivered exactly once
8Industry 4.0 and Industrial Internet of Things
9Industry 4.0 and Industrial Internet of Things
CoAP
CoAP
 Constrained Application Protocol
 CoAP was designed by IETF Constrained RESTful Environment
(CoRE) working group to enable application with lightweight
RESTful (HTTP) interface
 Works on Request/Response framework based on the UDP
architecture, including Datagram Transport Layer Security
(DTLS) secure transport protocol
10Industry 4.0 and Industrial Internet of Things
Source: Hanes, D, et al. (2017), "IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things", Cisco Press.
CoAP
 CoAP defines four types of messages
 CON: Conformable
 NON: Non-conformable
 RST: Reset
 ACK: Acknowledgement
 For conformable type message, the recipient must explicitly either
acknowledge or reject the message.
 In case of non-conformable type message, the recipient sends
reset message if it can’t process the message.
11Industry 4.0 and Industrial Internet of Things
Source: Hanes, D, et al. (2017), "IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things", Cisco Press.
CoAP
 Utilizes GET, PUT, OBSERVE, PUSH, and DELETE messages
requests to retrieve, create, initiate, update, and delete
subscription respectively.
 Supports caching capabilities to improve the response time
and reduce bandwidth consumption.
 Uses IP multicast to support data requests sent to a group of
devices.
 Specialized for machine-to-machine (M2M) communication.
12Industry 4.0 and Industrial Internet of Things
Source: Hanes, D, et al. (2017), "IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things", Cisco Press.
13Industry 4.0 and Industrial Internet of Things
XMPP
XMPP
 Extensible Messaging and Presence Protocol
 Supports Publish/Subscribe messaging framework on top of
TCP protocol
 The communication protocol is based on Extensive Markup
Language (XML).
 Uses Datagram Transport Layer Security (DTLS) secure
transport protocol
14Industry 4.0 and Industrial Internet of Things
Source: Rayes, A., & Salam, S. (2016), "Internet of Things from hype to reality: the road to digitization", Springer.
XMPP
 XMPP model is decentralized, no central server is required.
 Advantages of XMPP
 Interoperability: Supports interoperability between heterogeneous
networks
 Extensibility: Supports privacy lists, multi-user chat, and
publish/subscribe chat status notifications
 Flexibility: Supports customized markup language defined by different
organizations according to their needs
15Industry 4.0 and Industrial Internet of Things
Source: H. Wang et. al., "A Lightweight XMPP Publish/Subscribe Scheme for Resource-Constrained IoT Devices," IEEE Access, vol. 5, pp.
16393-16405, 2017.
16Industry 4.0 and Industrial Internet of Things
AMQP
AMQP
 Advance Message Queuing Protocol
 Optimized for financial applications
 Binary message-oriented protocol on top of TCP
 Supports Publish/Subscribe framework for both
 Point-to-point (P2P)
 Multipoint communication
17Industry 4.0 and Industrial Internet of Things
Source: Rayes, A., & Salam, S. (2016), "Internet of Things from hype to reality: the road to digitization", Springer.
AMQP
 Uses token-based mechanism for flow control
 Ensures no buffer overflow at the receiving end
 Message delivery guarantee services:
 At least once: Guarantees message delivery but may do so multiple
times
 At most once: Each message is delivered once or never
 Exactly once: No message drop and delivered once one
18Industry 4.0 and Industrial Internet of Things
Source: Rayes, A., & Salam, S. (2016), "Internet of Things from hype to reality: the road to digitization", Springer.
19Industry 4.0 and Industrial Internet of Things
IEEE 1888
IEEE 1888
 Energy-efficient network control protocol
 Defines a generalized data exchange protocol between
network components over the IPv4/v6-based network.
 Universal Resource Identifiers (URIs) based data identification
 Applications: Environmental monitoring, energy saving, and
central management systems.
20Industry 4.0 and Industrial Internet of Things
Source: Rayes, A., & Salam, S. (2016), "Internet of Things from hype to reality: the road to digitization", Springer.
21Industry 4.0 and Industrial Internet of Things
DDS RTPS
DDS RTPS
 Distributed Data Service Real Time Publish and Subscribe
 Supports Publish/Subscribe framework and on top of UDP
transport layer protocol.
 Data-centric and binary protocol
 Data is termed as “topics”.
 The users/listeners may subscribe to their particular topic of
interest
22Industry 4.0 and Industrial Internet of Things
Source: Rayes, A., & Salam, S. (2016), "Internet of Things from hype to reality: the road to digitization", Springer.
DDS RTPS
 A single topic may have multiple speakers of different
priorities
 Supports enlisted QoS for data distribution
 Data persistence
 Delivery deadline
 Reliability
 Data freshness
 Applications: Military, Industrial, and healthcare monitoring
23Industry 4.0 and Industrial Internet of Things
Source: Rayes, A., & Salam, S. (2016), "Internet of Things from hype to reality: the road to digitization", Springer.
24Introduction to Internet of Things
Ad

More Related Content

What's hot (20)

IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
Pradeep Kumar TS
 
Protocols for IoT
Protocols for IoTProtocols for IoT
Protocols for IoT
Aravindhan G K
 
IOT - Unit 3.pptx
IOT - Unit 3.pptxIOT - Unit 3.pptx
IOT - Unit 3.pptx
PallaviPatil580306
 
IEEE.802.15.4 in internet of things.pptx
IEEE.802.15.4 in internet of things.pptxIEEE.802.15.4 in internet of things.pptx
IEEE.802.15.4 in internet of things.pptx
kirtanchoudhary333
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
Vipul Kumar Maurya
 
Internet of Things - module 1
Internet of Things -  module 1Internet of Things -  module 1
Internet of Things - module 1
Syed Mustafa
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
skumartarget
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoT
FabMinds
 
netconf and yang
netconf and yangnetconf and yang
netconf and yang
pavan penugonda
 
489594658-Unit-III-Iot architecture.pptx
489594658-Unit-III-Iot architecture.pptx489594658-Unit-III-Iot architecture.pptx
489594658-Unit-III-Iot architecture.pptx
MBIEDANGOMEGNIFRANKG
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
Components of IOT Implementation
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT Implementation
Aashiq Ahamed N
 
IPv4
IPv4IPv4
IPv4
Dhiraj Mishra
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
Jyothishmathi Institute of Technology and Science Karimnagar
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
Hamdamboy (함담보이)
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
3G4G
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
Maathu Michael
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
DRREC
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
Jagdeep Singh
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
Rahul Hada
 

Similar to IoT Networking Part 2 (20)

lecture4week1iotnetworkingpart1-190114153249.pptx
lecture4week1iotnetworkingpart1-190114153249.pptxlecture4week1iotnetworkingpart1-190114153249.pptx
lecture4week1iotnetworkingpart1-190114153249.pptx
Ishu Chaudhary
 
What's the Right Messaging Standard for the IoT?
What's the Right Messaging  Standard for the IoT?What's the Right Messaging  Standard for the IoT?
What's the Right Messaging Standard for the IoT?
Angelo Corsaro
 
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Mark Goldstein
 
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJINTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
150ROHITCHANDRASHEKH
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
Arpan Pal
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, Abstract
Victoria Burke
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
Samantha Randall
 
Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
Olivera Kotevska, Ph.D.
 
Message-Oriented Middleware for Edge Computing Applications
Message-Oriented Middleware for Edge Computing ApplicationsMessage-Oriented Middleware for Edge Computing Applications
Message-Oriented Middleware for Edge Computing Applications
Thomas Rausch
 
NetSim Webinar on IOT
NetSim Webinar on IOTNetSim Webinar on IOT
NetSim Webinar on IOT
KAVITHA IYER
 
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
parveen837153
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
Afna Crcs
 
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
Istabraq M. Al-Joboury
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
Syed Mustafa
 
Unify Internet Of Things with Clayster
Unify Internet Of Things with ClaysterUnify Internet Of Things with Clayster
Unify Internet Of Things with Clayster
claysterworld
 
Lecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptxLecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptx
SurendraBasnet6
 
Da3210751081
Da3210751081Da3210751081
Da3210751081
IJMER
 
October Southern CA Road Shows - Build Safe and Secure Distributed Systems
October Southern CA Road Shows -  Build Safe and Secure Distributed SystemsOctober Southern CA Road Shows -  Build Safe and Secure Distributed Systems
October Southern CA Road Shows - Build Safe and Secure Distributed Systems
Real-Time Innovations (RTI)
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) Wave
Chuck Petras
 
lecture4week1iotnetworkingpart1-190114153249.pptx
lecture4week1iotnetworkingpart1-190114153249.pptxlecture4week1iotnetworkingpart1-190114153249.pptx
lecture4week1iotnetworkingpart1-190114153249.pptx
Ishu Chaudhary
 
What's the Right Messaging Standard for the IoT?
What's the Right Messaging  Standard for the IoT?What's the Right Messaging  Standard for the IoT?
What's the Right Messaging Standard for the IoT?
Angelo Corsaro
 
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Mark Goldstein
 
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJINTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
150ROHITCHANDRASHEKH
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
Arpan Pal
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, Abstract
Victoria Burke
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
Samantha Randall
 
Message-Oriented Middleware for Edge Computing Applications
Message-Oriented Middleware for Edge Computing ApplicationsMessage-Oriented Middleware for Edge Computing Applications
Message-Oriented Middleware for Edge Computing Applications
Thomas Rausch
 
NetSim Webinar on IOT
NetSim Webinar on IOTNetSim Webinar on IOT
NetSim Webinar on IOT
KAVITHA IYER
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
Afna Crcs
 
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
Istabraq M. Al-Joboury
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
Syed Mustafa
 
Unify Internet Of Things with Clayster
Unify Internet Of Things with ClaysterUnify Internet Of Things with Clayster
Unify Internet Of Things with Clayster
claysterworld
 
Lecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptxLecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptx
SurendraBasnet6
 
Da3210751081
Da3210751081Da3210751081
Da3210751081
IJMER
 
October Southern CA Road Shows - Build Safe and Secure Distributed Systems
October Southern CA Road Shows -  Build Safe and Secure Distributed SystemsOctober Southern CA Road Shows -  Build Safe and Secure Distributed Systems
October Southern CA Road Shows - Build Safe and Secure Distributed Systems
Real-Time Innovations (RTI)
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) Wave
Chuck Petras
 
Ad

More from Hitesh Mohapatra (20)

Introduction to Edge and Fog Computing.pdf
Introduction to Edge and Fog Computing.pdfIntroduction to Edge and Fog Computing.pdf
Introduction to Edge and Fog Computing.pdf
Hitesh Mohapatra
 
Amazon Web Services (AWS) : Fundamentals
Amazon Web Services (AWS) : FundamentalsAmazon Web Services (AWS) : Fundamentals
Amazon Web Services (AWS) : Fundamentals
Hitesh Mohapatra
 
Resource Cluster and Multi-Device Broker.pdf
Resource Cluster and Multi-Device Broker.pdfResource Cluster and Multi-Device Broker.pdf
Resource Cluster and Multi-Device Broker.pdf
Hitesh Mohapatra
 
Failover System in Cloud Computing System
Failover System in Cloud Computing SystemFailover System in Cloud Computing System
Failover System in Cloud Computing System
Hitesh Mohapatra
 
Resource Replication & Automated Scaling Listener
Resource Replication & Automated Scaling ListenerResource Replication & Automated Scaling Listener
Resource Replication & Automated Scaling Listener
Hitesh Mohapatra
 
Storage Device & Usage Monitor in Cloud Computing.pdf
Storage Device & Usage Monitor in Cloud Computing.pdfStorage Device & Usage Monitor in Cloud Computing.pdf
Storage Device & Usage Monitor in Cloud Computing.pdf
Hitesh Mohapatra
 
Networking in Cloud Computing Environment
Networking in Cloud Computing EnvironmentNetworking in Cloud Computing Environment
Networking in Cloud Computing Environment
Hitesh Mohapatra
 
Uniform-Cost Search Algorithm in the AI Environment
Uniform-Cost Search Algorithm in the AI EnvironmentUniform-Cost Search Algorithm in the AI Environment
Uniform-Cost Search Algorithm in the AI Environment
Hitesh Mohapatra
 
Logical Network Perimeter in Cloud Computing
Logical Network Perimeter in Cloud ComputingLogical Network Perimeter in Cloud Computing
Logical Network Perimeter in Cloud Computing
Hitesh Mohapatra
 
Software Product Quality - Part 1 Presentation
Software Product Quality - Part 1 PresentationSoftware Product Quality - Part 1 Presentation
Software Product Quality - Part 1 Presentation
Hitesh Mohapatra
 
Multitenancy in cloud computing architecture
Multitenancy in cloud computing architectureMultitenancy in cloud computing architecture
Multitenancy in cloud computing architecture
Hitesh Mohapatra
 
Server Consolidation in Cloud Computing Environment
Server Consolidation in Cloud Computing EnvironmentServer Consolidation in Cloud Computing Environment
Server Consolidation in Cloud Computing Environment
Hitesh Mohapatra
 
Web Services / Technology in Cloud Computing
Web Services / Technology in Cloud ComputingWeb Services / Technology in Cloud Computing
Web Services / Technology in Cloud Computing
Hitesh Mohapatra
 
Resource replication in cloud computing.
Resource replication in cloud computing.Resource replication in cloud computing.
Resource replication in cloud computing.
Hitesh Mohapatra
 
Software Measurement and Metrics (Quantified Attribute)
Software Measurement and Metrics (Quantified Attribute)Software Measurement and Metrics (Quantified Attribute)
Software Measurement and Metrics (Quantified Attribute)
Hitesh Mohapatra
 
Software project management is an art and discipline of planning and supervis...
Software project management is an art and discipline of planning and supervis...Software project management is an art and discipline of planning and supervis...
Software project management is an art and discipline of planning and supervis...
Hitesh Mohapatra
 
Software project management is an art and discipline of planning and supervis...
Software project management is an art and discipline of planning and supervis...Software project management is an art and discipline of planning and supervis...
Software project management is an art and discipline of planning and supervis...
Hitesh Mohapatra
 
The life cycle of a virtual machine (VM) provisioning process
The life cycle of a virtual machine (VM) provisioning processThe life cycle of a virtual machine (VM) provisioning process
The life cycle of a virtual machine (VM) provisioning process
Hitesh Mohapatra
 
BUSINESS CONSIDERATIONS FOR CLOUD COMPUTING
BUSINESS CONSIDERATIONS FOR CLOUD COMPUTINGBUSINESS CONSIDERATIONS FOR CLOUD COMPUTING
BUSINESS CONSIDERATIONS FOR CLOUD COMPUTING
Hitesh Mohapatra
 
Traditional Data Center vs. Virtualization – Differences and Benefits
Traditional Data Center vs. Virtualization – Differences and BenefitsTraditional Data Center vs. Virtualization – Differences and Benefits
Traditional Data Center vs. Virtualization – Differences and Benefits
Hitesh Mohapatra
 
Introduction to Edge and Fog Computing.pdf
Introduction to Edge and Fog Computing.pdfIntroduction to Edge and Fog Computing.pdf
Introduction to Edge and Fog Computing.pdf
Hitesh Mohapatra
 
Amazon Web Services (AWS) : Fundamentals
Amazon Web Services (AWS) : FundamentalsAmazon Web Services (AWS) : Fundamentals
Amazon Web Services (AWS) : Fundamentals
Hitesh Mohapatra
 
Resource Cluster and Multi-Device Broker.pdf
Resource Cluster and Multi-Device Broker.pdfResource Cluster and Multi-Device Broker.pdf
Resource Cluster and Multi-Device Broker.pdf
Hitesh Mohapatra
 
Failover System in Cloud Computing System
Failover System in Cloud Computing SystemFailover System in Cloud Computing System
Failover System in Cloud Computing System
Hitesh Mohapatra
 
Resource Replication & Automated Scaling Listener
Resource Replication & Automated Scaling ListenerResource Replication & Automated Scaling Listener
Resource Replication & Automated Scaling Listener
Hitesh Mohapatra
 
Storage Device & Usage Monitor in Cloud Computing.pdf
Storage Device & Usage Monitor in Cloud Computing.pdfStorage Device & Usage Monitor in Cloud Computing.pdf
Storage Device & Usage Monitor in Cloud Computing.pdf
Hitesh Mohapatra
 
Networking in Cloud Computing Environment
Networking in Cloud Computing EnvironmentNetworking in Cloud Computing Environment
Networking in Cloud Computing Environment
Hitesh Mohapatra
 
Uniform-Cost Search Algorithm in the AI Environment
Uniform-Cost Search Algorithm in the AI EnvironmentUniform-Cost Search Algorithm in the AI Environment
Uniform-Cost Search Algorithm in the AI Environment
Hitesh Mohapatra
 
Logical Network Perimeter in Cloud Computing
Logical Network Perimeter in Cloud ComputingLogical Network Perimeter in Cloud Computing
Logical Network Perimeter in Cloud Computing
Hitesh Mohapatra
 
Software Product Quality - Part 1 Presentation
Software Product Quality - Part 1 PresentationSoftware Product Quality - Part 1 Presentation
Software Product Quality - Part 1 Presentation
Hitesh Mohapatra
 
Multitenancy in cloud computing architecture
Multitenancy in cloud computing architectureMultitenancy in cloud computing architecture
Multitenancy in cloud computing architecture
Hitesh Mohapatra
 
Server Consolidation in Cloud Computing Environment
Server Consolidation in Cloud Computing EnvironmentServer Consolidation in Cloud Computing Environment
Server Consolidation in Cloud Computing Environment
Hitesh Mohapatra
 
Web Services / Technology in Cloud Computing
Web Services / Technology in Cloud ComputingWeb Services / Technology in Cloud Computing
Web Services / Technology in Cloud Computing
Hitesh Mohapatra
 
Resource replication in cloud computing.
Resource replication in cloud computing.Resource replication in cloud computing.
Resource replication in cloud computing.
Hitesh Mohapatra
 
Software Measurement and Metrics (Quantified Attribute)
Software Measurement and Metrics (Quantified Attribute)Software Measurement and Metrics (Quantified Attribute)
Software Measurement and Metrics (Quantified Attribute)
Hitesh Mohapatra
 
Software project management is an art and discipline of planning and supervis...
Software project management is an art and discipline of planning and supervis...Software project management is an art and discipline of planning and supervis...
Software project management is an art and discipline of planning and supervis...
Hitesh Mohapatra
 
Software project management is an art and discipline of planning and supervis...
Software project management is an art and discipline of planning and supervis...Software project management is an art and discipline of planning and supervis...
Software project management is an art and discipline of planning and supervis...
Hitesh Mohapatra
 
The life cycle of a virtual machine (VM) provisioning process
The life cycle of a virtual machine (VM) provisioning processThe life cycle of a virtual machine (VM) provisioning process
The life cycle of a virtual machine (VM) provisioning process
Hitesh Mohapatra
 
BUSINESS CONSIDERATIONS FOR CLOUD COMPUTING
BUSINESS CONSIDERATIONS FOR CLOUD COMPUTINGBUSINESS CONSIDERATIONS FOR CLOUD COMPUTING
BUSINESS CONSIDERATIONS FOR CLOUD COMPUTING
Hitesh Mohapatra
 
Traditional Data Center vs. Virtualization – Differences and Benefits
Traditional Data Center vs. Virtualization – Differences and BenefitsTraditional Data Center vs. Virtualization – Differences and Benefits
Traditional Data Center vs. Virtualization – Differences and Benefits
Hitesh Mohapatra
 
Ad

Recently uploaded (20)

New Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdfNew Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdf
mohamedezzat18803
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Journal of Soft Computing in Civil Engineering
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
Artificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptxArtificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptx
DrMarwaElsherif
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
The Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLabThe Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLab
Journal of Soft Computing in Civil Engineering
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Data Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptxData Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptx
RushaliDeshmukh2
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
LECTURE-16 EARTHEN DAM - II.pptx it's uses
LECTURE-16 EARTHEN DAM - II.pptx it's usesLECTURE-16 EARTHEN DAM - II.pptx it's uses
LECTURE-16 EARTHEN DAM - II.pptx it's uses
CLokeshBehera123
 
How to use nRF24L01 module with Arduino
How to use nRF24L01 module with ArduinoHow to use nRF24L01 module with Arduino
How to use nRF24L01 module with Arduino
CircuitDigest
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
New Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdfNew Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdf
mohamedezzat18803
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
Artificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptxArtificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptx
DrMarwaElsherif
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Data Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptxData Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptx
RushaliDeshmukh2
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
LECTURE-16 EARTHEN DAM - II.pptx it's uses
LECTURE-16 EARTHEN DAM - II.pptx it's usesLECTURE-16 EARTHEN DAM - II.pptx it's uses
LECTURE-16 EARTHEN DAM - II.pptx it's uses
CLokeshBehera123
 
How to use nRF24L01 module with Arduino
How to use nRF24L01 module with ArduinoHow to use nRF24L01 module with Arduino
How to use nRF24L01 module with Arduino
CircuitDigest
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 

IoT Networking Part 2

  • 1. 1 Introduction: IoT Networking - Part 2 Dr. Sudip Misra Professor Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Email: [email protected] Website: http://cse.iitkgp.ac.in/~smisra/ Research Lab: cse.iitkgp.ac.in/~smisra/swan/ Industry 4.0 and Industrial Internet of Things
  • 2. Requirements of IoT Network  Coverage  High throughput  Low latency  Ultra reliability  High power efficiency 2Industry 4.0 and Industrial Internet of Things
  • 3. 3Industry 4.0 and Industrial Internet of Things MQTT
  • 4. MQTT  Message Queue Telemetry Transport  Introduced by IBM and standardized by Organization for the Advancement of Structured Information Standards (OASIS) in 2013  Works on Publish/Subscribe framework on top of TCP/IP architecture  Advantages  Reliable, Lightweight, and cost-effective protocol 4Industry 4.0 and Industrial Internet of Things
  • 5. MQTT Publish/Subscribe Framework 5Industry 4.0 and Industrial Internet of Things Source: Hanes, D, et al. (2017), "IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things", Cisco Press.
  • 6. MQTT QoS  QoS of MQTT protocol is maintained for two transactions  First transaction: Publishing client  MQTT Server  Second transaction: MQTT Server  Subscribing Client  Client on each transaction sets the QoS level  For the first transaction, publishing client sets the QoS level  For second transaction, client subscriber sets the QoS level 6Industry 4.0 and Industrial Internet of Things Source: Hanes, D, et al. (2017), "IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things", Cisco Press.
  • 7. MQTT QoS Levels  Supports 3-level of QoS  QoS 0:  Also known as “at most once” delivery  Best effort and unacknowledged data service  Publisher transmits the message one time to server and server transmits it once to subscriber  No retry is performed 7Industry 4.0 and Industrial Internet of Things Source: Hanes, D, et al. (2017), "IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things", Cisco Press.
  • 8. MQTT QoS Levels  QoS 1:  Also known as “at least once” delivery  Message delivery between the publisher, server and then between server and subscribers occurs at least once.  Retry is performed until acknowledgement of message is recieved  QoS 2:  Also known as “exactly once” delivery  This QoS level is used when neither packet loss or duplication of message is allowed  Retry is performed until the message is delivered exactly once 8Industry 4.0 and Industrial Internet of Things
  • 9. 9Industry 4.0 and Industrial Internet of Things CoAP
  • 10. CoAP  Constrained Application Protocol  CoAP was designed by IETF Constrained RESTful Environment (CoRE) working group to enable application with lightweight RESTful (HTTP) interface  Works on Request/Response framework based on the UDP architecture, including Datagram Transport Layer Security (DTLS) secure transport protocol 10Industry 4.0 and Industrial Internet of Things Source: Hanes, D, et al. (2017), "IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things", Cisco Press.
  • 11. CoAP  CoAP defines four types of messages  CON: Conformable  NON: Non-conformable  RST: Reset  ACK: Acknowledgement  For conformable type message, the recipient must explicitly either acknowledge or reject the message.  In case of non-conformable type message, the recipient sends reset message if it can’t process the message. 11Industry 4.0 and Industrial Internet of Things Source: Hanes, D, et al. (2017), "IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things", Cisco Press.
  • 12. CoAP  Utilizes GET, PUT, OBSERVE, PUSH, and DELETE messages requests to retrieve, create, initiate, update, and delete subscription respectively.  Supports caching capabilities to improve the response time and reduce bandwidth consumption.  Uses IP multicast to support data requests sent to a group of devices.  Specialized for machine-to-machine (M2M) communication. 12Industry 4.0 and Industrial Internet of Things Source: Hanes, D, et al. (2017), "IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things", Cisco Press.
  • 13. 13Industry 4.0 and Industrial Internet of Things XMPP
  • 14. XMPP  Extensible Messaging and Presence Protocol  Supports Publish/Subscribe messaging framework on top of TCP protocol  The communication protocol is based on Extensive Markup Language (XML).  Uses Datagram Transport Layer Security (DTLS) secure transport protocol 14Industry 4.0 and Industrial Internet of Things Source: Rayes, A., & Salam, S. (2016), "Internet of Things from hype to reality: the road to digitization", Springer.
  • 15. XMPP  XMPP model is decentralized, no central server is required.  Advantages of XMPP  Interoperability: Supports interoperability between heterogeneous networks  Extensibility: Supports privacy lists, multi-user chat, and publish/subscribe chat status notifications  Flexibility: Supports customized markup language defined by different organizations according to their needs 15Industry 4.0 and Industrial Internet of Things Source: H. Wang et. al., "A Lightweight XMPP Publish/Subscribe Scheme for Resource-Constrained IoT Devices," IEEE Access, vol. 5, pp. 16393-16405, 2017.
  • 16. 16Industry 4.0 and Industrial Internet of Things AMQP
  • 17. AMQP  Advance Message Queuing Protocol  Optimized for financial applications  Binary message-oriented protocol on top of TCP  Supports Publish/Subscribe framework for both  Point-to-point (P2P)  Multipoint communication 17Industry 4.0 and Industrial Internet of Things Source: Rayes, A., & Salam, S. (2016), "Internet of Things from hype to reality: the road to digitization", Springer.
  • 18. AMQP  Uses token-based mechanism for flow control  Ensures no buffer overflow at the receiving end  Message delivery guarantee services:  At least once: Guarantees message delivery but may do so multiple times  At most once: Each message is delivered once or never  Exactly once: No message drop and delivered once one 18Industry 4.0 and Industrial Internet of Things Source: Rayes, A., & Salam, S. (2016), "Internet of Things from hype to reality: the road to digitization", Springer.
  • 19. 19Industry 4.0 and Industrial Internet of Things IEEE 1888
  • 20. IEEE 1888  Energy-efficient network control protocol  Defines a generalized data exchange protocol between network components over the IPv4/v6-based network.  Universal Resource Identifiers (URIs) based data identification  Applications: Environmental monitoring, energy saving, and central management systems. 20Industry 4.0 and Industrial Internet of Things Source: Rayes, A., & Salam, S. (2016), "Internet of Things from hype to reality: the road to digitization", Springer.
  • 21. 21Industry 4.0 and Industrial Internet of Things DDS RTPS
  • 22. DDS RTPS  Distributed Data Service Real Time Publish and Subscribe  Supports Publish/Subscribe framework and on top of UDP transport layer protocol.  Data-centric and binary protocol  Data is termed as “topics”.  The users/listeners may subscribe to their particular topic of interest 22Industry 4.0 and Industrial Internet of Things Source: Rayes, A., & Salam, S. (2016), "Internet of Things from hype to reality: the road to digitization", Springer.
  • 23. DDS RTPS  A single topic may have multiple speakers of different priorities  Supports enlisted QoS for data distribution  Data persistence  Delivery deadline  Reliability  Data freshness  Applications: Military, Industrial, and healthcare monitoring 23Industry 4.0 and Industrial Internet of Things Source: Rayes, A., & Salam, S. (2016), "Internet of Things from hype to reality: the road to digitization", Springer.