Professional Documents
Culture Documents
08 Iot Presentation 2
08 Iot Presentation 2
Allowing for wireless control of smart home devices, such as smart lights, security
systems, thermostats, sensors, smart door locks, and garage door openers
How Z-Wave works
A Z-Wave network consists of internet of things (IoT) devices and a primary controller, also
known as a smart home hub, which is the only device in a Z-Wave network that is usually
connected to the internet. When a Z-Wave hub receives a command from a smart home
application on a user's smartphone, tablet or computer, it routes the command to its
destination device across networks of up to 232 devices
Benefits of Z wave
Energy Conservation: Z-Wave technology can help you to conserve energy in multiple
ways, including thermostat control corresponding to daylight sensors, and lights and
appliances turned off and on at a set schedule
Wider coverage range than Bluetooth
Range of Z wave 100 meters to 328 feet
IOT protocols
IoT protocols are communication standards that enable devices to exchange information with
each other and with other systems over the internet. They play a critical role in IoT systems as
they define the rules for data transmission, encoding, and decoding.
working of IOT protocols?
Transport layer
The transport layer is responsible for ensuring reliable data transmission
Network Layer
The network layer provides routing and addressing capabilities.
Application layer
The application layer defines the rules for data encoding, decoding, and processing.
Iot protocols in Transport layer
In any IoT protocol, the transport layer enables and safeguards the communication of the
data as it travels between layers.
Transmission Control Protocol (TCP)
The application layer serves as the interface between the user and the device within a given
IoT protocol.
There are four application layers:
Advanced Message Queuing Protocol (AMQP)
3-Access Control:
Access control is used to restrict access to specific IoT network resources. IoT communication
protocols such as MQTT, CoAP, and DDS have access control mechanisms that ensure that only
authorized devices and users can access specific network resources.
4-Message Integrity:
Message integrity ensures that the data transmitted between devices is not tampered
with or modified during transmission. IoT communication protocols such as MQTT, CoAP,
and DDS use Message Authentication Codes (MACs) to ensure message integrity
Back-End Server Architecture
5-Firewall Protection:
Firewall protection is used to protect IoT devices and systems from unauthorized access. IoT
communication protocols such as MQTT and CoAP often use firewalls to prevent unauthorized
access and attacks from external sources.
6-Over-the-Air (OTA) Updates:
OTA updates are used to update firmware, security patches, and other software updates
to IoT devices remotely. IoT communication protocols such as MQTT, CoAP, and DDS
support OTA updates to ensure that the IoT devices are up-to-date with the latest security
patches and updates.
Thank you