You are on page 1of 20

IOT communication models

Presented by Khadija Amir


Contents

 1)Internet of things (IoT)


 2)IOT COMMUNICATION MODELS
 3)IOT PROTOCOLS
 4)APPLICATIONS
Internet of Things (IoT)
The Internet of Things (IoT) is the network of
physical devices, vehicles, home appliances and
other items embedded with electronics, software,
sensors, actuators, and connectivity which enables
these things to connect and exchange data.
Benefits:
• direct integration of the physical world into
computer-based systems
• resulting in efficiency improvements
• economic benefits
• reduced human intervention.
Internet Usage and Population Statistics
Internet of things
COMMUNICATION MODELS

 The IoTs allow people and things to be connected any time, any space, with anything and
anyone, using any network and any service. That is why, we need to understand the
communications of different devices to utilize and make the best use o IOT.
 Request & Response Model
 Publish-Subscribe Model
 Push Pull Model
 Exclusive Pair Model
REQUEST & RESPONSE MODEL

 The client is the IOT device that sends a request to the server. The request maybe for
transfer of data or upload of data. The server maybe remote or local and can handle
requests of multiple clients. The Request response model is stateless and hence each
request is independently handled. Server can receive the request, decide its response and
fetch the data.
PUBLISH SUBSCRIBE MODEL

 There are three entities publisher, broker and consumers. Publishers send the data to the
brokers on topics managed by the brokers. Consumers subscribe to topics and brokers send
the data on the topics to the consumers. Hence, brokers responsibility is to accept data
from publishers and send it to the appropriate consumer.
PUSH PULL MODEL

 Data producer push data to queues and consumer pull data from queues. Producers and
consumers are not aware of each other. Queues act as buffers and are useful when
producers produce data at a rate at which is faster than rate at which consumers can
download.
EXCLUSIVE PAIR MODEL

 It is a bi-directional, full duplex communication model that uses a persistent connection


between client and server. The connection is persistent and remains open till client sends a
request to close the connection. This is a stateful connection model and server is aware of
all open connections.
Iot protocols
 What is Iot protocol?
Single devices like smartphones and personal computers also use network protocols for
communication. But general protocols that are used by these personal devices might not meet
specific requirements like bandwidth, latency, and range of IoT-based solutions. Hence, a few
improved versions of IoT protocols are evolved to meet the requirements of IoT devices.
 IoT protocols and standards are broadly classified into two separate categories. These are:
1. IoT data protocols (Presentation / Application layers)
2. Network protocols for IoT (Datalink / Physical layers
Iot protocols
Bluetooth and BLE Protocol
 Bluetooth is one of the protocols which are used in some of the IoT devices to
communicate with the other devices.
 Similar to Bluetooth, Bluetooth LE (low energy)operates in the 2.4 GHz band. It remains
in sleep mode unless a connection initiates. The actual connection times only last a few
milliseconds, unlike Bluetooth, which connects for a few seconds or a few hours at a time.
Cellular Protocol

 Cellular IoT uses cellular networks to connect physical devices to the Internet. This
connection enables these devices to transmit and receive data, making them part of the
“Internet of Things” (IoT). Cellular IoT is the most popular type of IoT connectivity,
primarily because it: Provides excellent coverage. IoT can connect via 2G, 3G,4G, or 5G
networks. Depending on the needs of the IoT device and application, there are primarily
two types of Cellular IoT connections, namely, LTE-M and NB IoT which are the recent
IoT specific variables. 2G and 3G are no longer used for mobile connectivity.
LPWANs Protocol

 LPWANs (Low Power Wide Area Networks) are new sets of protocols developed for IoT
solutions but can also be used by other devices to communicate over a wide area. Even
cellular networks can provide a wide-area communication network, but the cost of
communication over cellular networks is high because of its high power consumption.
LPWANs enable communications over wide area with the help of small and inexpensive
batteries that can last for long-term making it a cost-saving option in comparison with
cellular networks. LPWANs are commonly used in applications including Smart metering,
smart lighting, asset monitoring and tracking, smart cities, precision agriculture, livestock
monitoring, energy management, manufacturing, and industrial IoT deployments
Mesh protocols

 A Mesh protocol is a local network topology where devices are connected directly in a
non-hierarchical way to route data across the network. The devices in a mesh network
communicate according to a predefined protocol that allows each device to participate in
the data transmission on the network. IoT Mesh Networking Main Components:
 Gateways: Gateways are devices that connect the mesh network to the internet.
 Repeaters: Repeaters capture data in the network and reiterate it to the endpoints.
 Endpoints: Endpoints are devices that receive data from repeaters
Wifi/ Wifi HaLow

 Wi-Fi (Wireless Fidelity) is the most popular IOT communication protocols for wireless
local area network. Wi-Fi provides Internet access to devices that are within the range of
about 20 - 40 meters from the source. It has a data rate upto 600 Mbps maximum,
depending on channel frequency used and the number of antennas. In terms of using the
Wi-Fi protocol for IOT, there are some pros & cons to be considered. The infrastructure or
device cost for Wi-Fi is low & deployment is easy but the power consumption is high and
the Wi-Fi range is quite moderate. So, the Wi-Fi may not be the best choice for all types of
IOT applications but it can be used for applications like Home Automation.
RFID

 Radio Frequency Identification – or RFID – is used to automatically identify an object and


capturing data about that object that has been stored in a small microchip tag and attached
to the object. The RFID tag has a built-in antenna that communicates to a scanning device
that reads the data remotely. The data is then transferred from the scanning device to the
enterprise application software that houses the data. Each RFID tag has its own unique
identifying number. RFID can be used to record and control the movement of assets and
personnel. You’ve probably seen RFID tags on the back of your library books, or even in
the new biometric passports. It makes tracking assets contained in boxes or pallets easier to
manage.
APPLICATIONS

You might also like