You are on page 1of 21

Presented By

Name Saqib Mehmood


Roll No 19-CS-15
Name Shehryar babar
Roll No 19-CS-25
Name No Muhammad Awais
Roll No 19-CS-34
Z-Wave

Z-Wave is a wireless communications protocol used primarily for residential and


commercial building automation. It is a mesh network using low-energy radio waves to
communicate from device to device

Allowing for wireless control of smart home devices, such as smart lights, security
systems, thermostats, sensors, smart door locks, and garage door openers
How Z-Wave works

A Z-Wave network consists of internet of things (IoT) devices and a primary controller, also
known as a smart home hub, which is the only device in a Z-Wave network that is usually
connected to the internet. When a Z-Wave hub receives a command from a smart home
application on a user's smartphone, tablet or computer, it routes the command to its
destination device across networks of up to 232 devices
Benefits of Z wave

 Energy Conservation: Z-Wave technology can help you to conserve energy in multiple
ways, including thermostat control corresponding to daylight sensors, and lights and
appliances turned off and on at a set schedule
 Wider coverage range than Bluetooth
 Range of Z wave 100 meters to 328 feet
IOT protocols

IoT protocols are communication standards that enable devices to exchange information with
each other and with other systems over the internet. They play a critical role in IoT systems as
they define the rules for data transmission, encoding, and decoding.
working of IOT protocols?

IoT protocols work by establishing a connection between two devices or systems,


exchanging data in a predefined format, and closing the connection when the
communication is complete.
IoT protocols involves several layers
physical layer
The physical layer is responsible for transmitting data between devices

Transport layer
The transport layer is responsible for ensuring reliable data transmission

Network Layer
The network layer provides routing and addressing capabilities.
Application layer
The application layer defines the rules for data encoding, decoding, and processing.
Iot protocols in Transport layer
In any IoT protocol, the transport layer enables and safeguards the communication of the
data as it travels between layers.
Transmission Control Protocol (TCP)

User Datagram Protocol (UDP)


Transmission Control Protocol (TCP)
The dominant protocol for a majority of internet connectivity. It offers host-to-host
communication, breaking large sets of data into individual packets and resending and
reassembling packets as needed.

User Datagram Protocol (UDP)


A communications protocol that enables process-to-process communication and runs on
top of IP. UDP improves data transfer rates over TCP and best suits applications that
require lossless data transmissions.
IOT protocols in application layer?

The application layer serves as the interface between the user and the device within a given
IoT protocol.
There are four application layers:
Advanced Message Queuing Protocol (AMQP)

Constrained Application Protocol (CoAP)

Data Distribution Service (DDS)

Message Queue Telemetry Transport (MQTT)


Advanced Message Queuing Protocol (AMQP)
A software layer that creates interoperability between messaging middleware. It helps a range of
systems and applications work together, creating standardized messaging on an industrial scale.

Constrained Application Protocol (CoAP)


A constrained-bandwidth and constrained-network protocol designed for devices with
limited capacity to connect in machine-to-machine communication. CoAP is also a
document-transfer protocol that runs over User Datagram Protocol (UDP).
Data Distribution Service (DDS)
A versatile peer-to-peer communication protocol that does everything from running tiny
devices to connecting high-performance networks. DDS streamlines deployment,
increases reliability, and reduces complexity.
 

Message Queue Telemetry Transport (MQTT)


A messaging protocol designed for lightweight machine-to-machine communication and
primarily used for low-bandwidth connections to remote locations. MQTT uses a
publisher-subscriber pattern and is ideal for small devices that require efficient bandwidth
and battery use.
The security features of IOT protocols
IoT communication protocols include several security features to protect the devices,
networks, and data involved in IoT communications. Some of the key security features of
IoT communication protocols are:
1-Authentication and Authorization:
Authentication verifies the identity of the devices and users accessing the IoT network,
and authorization determines the level of access they have to different network resources.
Protocols such as MQTT, CoAP, and HTTPS use different authentication and authorization
methods such as usernames and passwords, digital certificates, and OAuth.
2-Encryption:
Encryption is used to protect data from unauthorized access and ensure that it can
only be accessed by authorized parties. IoT communication protocols such as MQTT, CoAP,
and HTTPS use different encryption methods such as Transport Layer Security (TLS) and
Datagram Transport Layer Security (DTLS) to secure data in transit.
 

3-Access Control:
Access control is used to restrict access to specific IoT network resources. IoT communication
protocols such as MQTT, CoAP, and DDS have access control mechanisms that ensure that only
authorized devices and users can access specific network resources.
4-Message Integrity:
Message integrity ensures that the data transmitted between devices is not tampered
with or modified during transmission. IoT communication protocols such as MQTT, CoAP,
and DDS use Message Authentication Codes (MACs) to ensure message integrity
Back-End Server Architecture
 

5-Firewall Protection:
Firewall protection is used to protect IoT devices and systems from unauthorized access. IoT
communication protocols such as MQTT and CoAP often use firewalls to prevent unauthorized
access and attacks from external sources.
6-Over-the-Air (OTA) Updates:
OTA updates are used to update firmware, security patches, and other software updates
to IoT devices remotely. IoT communication protocols such as MQTT, CoAP, and DDS
support OTA updates to ensure that the IoT devices are up-to-date with the latest security
patches and updates.
Thank you

You might also like