Skip to content
Cuelogic
  • Services
    • Services

      Build better software and explore engineering excellence with our industry-leading tech services.

      • Product Engineering
        • Product Engineering
          • Product Development
          • UX Consulting
          • Application Development
          • Application Modernization
          • Quality Assurance Services
          Menu
          • Product Development
          • UX Consulting
          • Application Development
          • Application Modernization
          • Quality Assurance Services
          Migrating application and databases to the cloud, moving from legacy technologies to a serverless platform for a FinTech organization.
          Download ❯
      • Cloud Engineering
        • Cloud Engineering
          • Cloud Services
          • DevOps Services
          • Cloud Migration
          • Cloud Optimization
          • Cloud Computing Services
          Menu
          • Cloud Services
          • DevOps Services
          • Cloud Migration
          • Cloud Optimization
          • Cloud Computing Services
          Building end-to-end data engineering capabilities and setting up DataOps for a healthcare ISV managing sensitive health data.
          Download ❯
      • Data & Machine Learning
        • Data & Machine Learning
          • Big Data Services
          • AI Consulting
          Menu
          • Big Data Services
          • AI Consulting
          Setting up a next-gen SIEM system, processing PB scale data with zero lag, and implementing real-time threat detection.
          Download ❯
      • Internet of Things
        • Internet of Things
          • IoT Consulting
          • IoT App Development
          Menu
          • IoT Consulting
          • IoT App Development
          Building a technically robust IoT ecosystem that was awarded the best implementation in Asia Pacific for a new age IoT business.
          Download ❯
      • Innovation Lab as a Service
        • Innovation Lab as a Service
          • Innovation Lab as a Service
          Menu
          • Innovation Lab as a Service
          Establishing an Innovation Lab for the world’s largest Pharma ISV, accelerating product innovation & tech research while ensuring BaU.
          Download ❯
      • Cybersecurity Services
        • Cybersecurity Services
          • Cybersecurity Services
          Menu
          • Cybersecurity Services
          Big Data Engineering at scale for IAC’s SIEM system, processing PB scale data to help brands like Tinder, Vimeo, Dotdash, etc.
          Download ❯
      • Healthcare IT Services
        • Healthcare IT Services
          • Healthcare IT Services
          Menu
          • Healthcare IT Services
          Upgrading a platform for patients to access doctors via chat or video consultation, modernizing design, & migrating infra to the cloud.
          Download ❯
  • Company
    • Company

      Find out why Cuelogic, a world-leading software product development company, is the best fit for your needs. See how our engineering excellence makes a difference in the lives of everyone we work with.

    • about usAbout

      Discover how Cuelogic is as a global software consultancy and explore what makes us stand apart.

    • CultureCulture

      Read about our free and open culture, a competitive edge that helps clients and employees thrive.

    • Current openingCurrent Openings

      Want to join us? Search current openings, check out the recruitment process, or email your resume.

  • Insights
  • Tell Us Your Project
Tell Us Your Project  ❯
IoT  8 Mins Read  November 13, 2019  Amol Muratkar

Understanding IoT Standards and Protocols | Powering Internet of Things

Share Via –
Share on facebook
Share on twitter
Share on linkedin

Home > Understanding IoT Standards and Protocols | Powering Internet of Things

Introduction

A plethora of devices connected and sharing information is called the internet of things. These devices collect, send and receive data to applications, objects, and servers. They are used in various industries like automotive, industrial automation, medicine, security systems, and manufacturing. 

There are various protocols and standards to connect. To decide a protocol, we need to consider the following aspects:

  • bandwidth
  • range
  • power consumptions
  • node of the protocols. 

This article is aimed at understanding IoT standards and protocols offered by Internet Engineering Task Force (IETF), Institute of Electrical and Electronics Engineers (IEEE), and the International Telecommunication Union (ITU).

The following will give the protocol structure much better:

  • IoT Data Link Protocol
    • IEEE 802.15.4e
    • IEEE 802.11 ah
    • WirelessHART
    • Z-Wave
    • Bluetooth Low Energy
    • Zigbee Smart Energy
    • DASH7
    • HomePlug
    • G.9959
    • LTE-A
    • LoRaWAN
    • Weightless
    • DECT/ULE
  • Network Layer 
    • Routing Protocols
  • RPL
  • CORPL
  • CARP
    • Encapsulation Protocols
  • LoWPAN
  • 6TiSCH
  • 6Lo
  • IPv6 over G.9959
  • IPv6 over Bluetooth Low Energy
  • Session Layer Protocols
    • MQTT
    • SMQTT
    • AMQP
    • CoAP
    • XMPP
    • DDS
  • IoT Management Protocol
    • Interconnection of Heterogeneous Datalink
    • Smart Transducer Interface
  • Security in IoT Protocols
    • MAC 802.15.4
    • 6LoWPAN
    • RPL
    • Application Layer

Background of IoT Protocol 

In 1982, the first machine which can communicate, and track record was created. It was a soft drink vending machine from Coca-Cola. In 1999, an RFID technology researcher, Kelvin Ashton coined the term internet of things. In two decades from 2000-2019, the system had undergone rapid development and found many practical applications.

Since then, it has evolved as a different internet world, it requires a new range of standards and protocols. Although new standards are available some applications still use technology like HTTP.

Necessity of IoT Protocols

The following points will emphasize the necessity of these communication protocols and how they help us in overcoming issues:

  • Can be used to call for help in case of emergency or failure of another device which is connected.
  • Assist in notifying the user about the emergency.
  • Economically profitable, as the end-user data can be used to analyse trends and market.
  • Minimizes risks of security threats.
  • Unification of all the IoT communications available worldwide.
  • Heterogeneity within the connected systems.

Types of IoT Connections

The connections of the devices in IoT platform can be of following types: 

  • Device to Device (D2D) 
  • Device to Gateway 
  • Gateway to Data systems
  • Between data systems

Let’s discuss in brief about each connection type of IoT.

  • Device to Device (D2D): It is the type of communication in which two IoT devices communicate. Example: the communication established between a smartphone and the smartwatch. This type of connection is not very common, as many such devices couldn’t handle data from another device. 
  • Device to Gateway: It is the communication established between the sensors and the gateways. Such connections perform two major types of functions: 
    1. to consolidate and route the data from the sensors to the systems
    2. to analyse and send back the erroneous data to the device. 
  • Gateway to Data systems: It is the connection established between the data systems and the gateways. Gateways are a more complex computing system to find the right protocol as they help in analysing the data traffic in the system.
  • Between data systems: This is the information transfer within the cloud or the data centre. The protocols employed for such functions should be capable of integrating with existing applications, should be available all the time, should have the capacity and reliability for recovery of the data in case of an emergency.

Choosing an IoT Protocol for your communication system

Various factors must be considered before choosing a system. Most of these factors depends largely on the application but some common ones have been discussed here:

  • Number of connected devices
  • Reliability of the network
  • Delays while transmitting real-time data
  • Security of the network
  • Cost of infrastructure and connection
  • Handling of multiple heterogeneous devices
  • Application configuration
  • Traffic management

The range decreases as the bandwidth increases. LoraWAN is the only long transmission that can be used. The 3G, 4G and 5G network for the medium distance transmission. The rest of all protocols are used for short-range transmission.

Types of IoT Networks

Types of IoT Networks

  • Nano network: A few or a small number of devices connected for sensing the data, computing the data, storing the data, and actuating the response. 

For example, military, biomedical, nanotechnology, etc.

  • NFC (Near-Field Communication): It is for objects that are very close to each other, say 4 cm of distance. 

For example, payment systems, key cards, and ID cards

  • BAN (Body Area Network): Systems that are on the body, near the body or inside the body (embedded implants) are called BAN. 

For example, biomedical implants

  • PAN (Personal Area Network): For communication in a small range, homes with rooms like 15-20 feet apart. 

For example, Virtual assistant and home security systems.

  • LAN (Local Area Network): A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
    • CAN (Campus/Corporate area network): A Controller Area Network (CAN) bus is a communication system made for vehicle intercommunication.
  • MAN (Metropolitan Area of Network): A metropolitan area network is a computer network that interconnects users with computer resources in a geographic region of the size of a metropolitan area. 
  • WAN (Wide area network): A WAN (wide area network) is a communications network that spans a large geographic area such as across cities, states, or countries. 

There are other networks also which are combinations of two or more connections between nodes such as line, ring, star, mesh, fully connected, tree, bus. 

The following sections will discuss more about the protocols and standards of IoT.

IoT Protocols

Gartner in Hype Cycle for IoT Standards and Protocols has prioritized few protocols based on their project interoperability, longevity, and on maturity 

levels mentioned as below:

1) On the Rise

  • Backscatter Communications
  • Micro OS
  • Li-Fi
  • 5G mMTC
  • 802.11ax
  • Ultrasound
  • OMA SpecWorks LightweightM2M
  • Hardware Security

2) At the Peak

  • RISC-V
  • Constrained Application Protocol
  • 802.11ai
  • Bluetooth 5
  • FIDO Authentication Protocols
  • Secure Processing Unit
  • Advanced Development Boards
  • e-SIM
  • LoRa
  • NB-IoT

3) Sliding into the Trough

  • Arduino
  • Data Distribution Service
  • LPWA
  • Sigfox
  • Thread
  • oneM2M
  • 802.11ad
  • DotDot
  • MicroPython
  • Bluetooth Beacons
  • Wi-SUN
  • 802.11ah
  • 802.11p
  • Trusted Environments
  • LTE-M

4) Climbing the Slope

  • Message Queue Telemetry Transport
  • IPv6
  • AMQP
  • 6LoWPAN

5) Entering the Plateau

  • SCOTA

Data Protocols

Whenever we have a need to transfer the data from our system to an IoT platform or any other system which is connected, we require a data protocol. The following are the three main types of data protocols:

  1. a) Message Queuing Telemetry Transport (MQTT) 
  2. b) Constrained Application Protocol (CoAP)
  3. c) Extensible Message and Presence Protocol (XMPP).

Here we will be discussing some major data protocols:

  • IEEE 802.15.4: It supports slow power communication. This protocol is famous for the Medium Access Control (MAC) layer. In specific it talks about the following MAC feature like:
  1. Slot frame Structure
  2. Scheduling
  3. Synchronization
  4. Channel Hopping
  5. Network formation
  • IEEE 802.11 AH: It is an extension of the original version IEEE 802.11. It is designed standard for low overhead and power-friendly communication that is suitable for sensors and nodes. It includes features like:
  1. Synchronization Frame
  2. Efficient Bidirectional Packet Exchange
  3. Short Mac Frame
  4. Null Data Packet
  5. Increase Sleep Time

Let’s discuss each of the above mentioned data protocols in brief:

Constrained Application Protocol (CoAP)

It was designed in 2013 to transfer the HTTP model into a usable protocol that can be used in restrictive environments of device and network. The CoAP is based on User Datagram Protocol (UDP) to establish secure communication between endpoints. The following are the features of CoAP:

  • Open IETF Standard
  • Compact 4-byte header
  • UDP, SMS and TCP support
  • Strong DTLS security
  • Asynchronous subscription
  • Built-in discovery

It avoids ambiguity through the following strategies 

    1. HTTP get
    2. put up
    3. delete 
    4. placed strategies

It uses RESTful architecture which is divided into two main layers messaging and request/response. CoAP has four messaging modes: 

  • confirmable, 
  • not confirmable
  • piggyback and 
  • separate

Confirmable represents reliable transmission. Not conformable denotes the unreliable transmission. Piggyback is the direct communication with the client or server within acknowledgement. In the separate mode, the message is received separately from the acknowledgement. 

MQTT (Message Queue Telemetry Transport)

It is a lightweight protocol that is for transmitting data from sensors and applications to middleware. Arlen Nipper (Arcom) and Andy Stanford-Clark (IBM) developed this protocol in the year 1999. The main function of this protocol is to obtain data from all the devices. The core mechanisms involve:

  • Subscriber
  • Publisher
  • Broker

Publisher generates and transmits data to the publisher with the help of the broker. The broker ensures the security by checking and rechecking the authorization of the publisher and the subscriber. The following are the benefits of this protocol:

  • cheap, 
  • low-power consuming devices
  • small devices 
  • low and vulnerable bandwidth network.
  • More memory sources
  • Little processing
  • Operation over wireless networks
  • Good reliability

Modes of achieving this are called Quality of Service. The following are the QoS:

  • QoS0 (At most once): Fastest but least reliable. The publication will be sent but confirmation will not be received. 
  • QoS1 (At least once): Fast message delivery but duplicates may be expected.
  • QoS2 (Exactly once): Most reliable as the duplicates are controlled.

It acts as an embedded bridge between the application and middleware. Below described are the duties of the publisher, broker, and subscriber.

  • Publisher: lightweight sensors which connect broker to send data 
  • Subscribers: Applications that receive sensory data and inform the broker about newly received data
  • Brokers: Classify sensory data and send it to the subscribers.

Extensible Messaging and Presence Protocol (XMPP) 

In 1999, Jabber open source community developed this is for real-time messaging. This is written in XML language and it is message-based middleware. It allows real-time transmission of message-based data among the clients. Since it is extensively used, lightweight XMPP for IoT applications was developed. It has some drawbacks such as the services are neither of good quality nor end-to-end encryption is offered. 

DDS (Data Distribution Service)

It was developed by the Object Management Group (OMG) which can be deployed in the low footprint devices and also in the cloud. It offers various quality services like 

  1. a) security
  2. b) urgency 
  3. c) priority
  4. d) durability 
  5. e) reliability

It has two main layers namely: 

  • Data-centric publish-subscribe: It delivers the information to subscribers. It ensures that the data which is distributed is resource-aware, scalable, and efficient.
  • Data-local reconstruction sublayers: It provides an interface to DCPS functionalities.

Examples of the applications of this protocol are:

  • Air-traffic system control, 
  • Smart grid management, 
  • Autonomous vehicles,
  • Transportation systems, 
  • Robotics, 
  • Power generation 
  • Healthcare services

It is applied in all places where large lightweight systems are interconnected to send and receive data from the cloud. 

Advanced Message Queuing Protocol (AMQP)

It was developed in 2003. It has standard open-source subscription protocol. It is the only protocol that is useful for end-to-end application for individual IoT. It has the benefit of:

  • message orientation
  • queuing
  • routing 
  • reliability
  • security

It is in an application layer with international standards. It is best suited for message-based middleware environments. It comprises of following three components:

  • Exchanges: gets and puts message in the queue
  • Message queue: stores the message until processed
  • Binding: tells the relationship between the first and the next component

Near Field Communication (NFC)

It is based on the electromagnetic induction loop between two antennas in the radio frequency which is available at ISM band of 13.56 MHz on ISO/IEC 18000-3. The frequency bands are available at a rate of 106 Kbit/s to 424 Kbit/s.

It requires an initiator and a target. The initiator generates the RF field. It has two modes of communication:

  • Active communication mode: Both devices the initiator and the target communicate alternatively. Both the devices are electrically powered.
  • Passive communication mode: The initiator provides a carrier field while targeting answers by modulating.

Benefits of using NFC include:

  • Low-speed connection
  • More capable of wireless communication
  • Short-range
  • Support encryption
  • Less private RFID systems
  • Consumes less power
  • Does not require pairing
  • The maximum rate of NFC is 424 Kb/s
  • Works even with unpowered devices
  • Compatible with existing systems

It also has a few drawbacks such as: 

  • Short-range is not available in many old devices
  • Take time to set up

Challenges Faced by IoT 

Developing such a complex IoT system is challenging. Some of the challenges faced by IoT are:

  1. Mobility
  2. Reliability
  3. Scalability
  4. Management
  5. Availability
  6. Interoperability
  7. Security
  8. Privacy

Recommended Content
AIoT: Why it has been labelled as the catalyst to IoT Strategy ❯
5G and IoT | How will Machines change with this superfast internet? ❯
IoT & Edge Computing – The advantage for digital devices ❯
Go Back to Main Page ❯
Tags
IoT standards IoT Protocols
Share This Blog
Share on facebook
Share on twitter
Share on linkedin

Leave a Reply Cancel reply

People Also Read

Product Development

Low Code Platform: The Future of Software Development

8 Mins Read
Quality Engineering

BDD vs TDD : Highlighting the two important Quality Engineering Practices

8 Mins Read
DevOps

Getting Started With Feature Flags

10 Mins Read
Subscribe to our Blog
Subscribe to our newsletter to receive the latest thought leadership by Cuelogic experts, delivered straight to your inbox!
Services
Product Engineering
  • Product Development
  • UX Consulting
  • Application Development
  • Application Modernization
  • Quality Assurance Services
Menu
  • Product Development
  • UX Consulting
  • Application Development
  • Application Modernization
  • Quality Assurance Services
Data & Machine Learning
  • Big Data Services
  • AI Consulting
Menu
  • Big Data Services
  • AI Consulting
Innovation Lab as a Service
Cybersecurity Services
Healthcare IT Solutions
Cloud Engineering
  • Cloud Services
  • DevOps Services
  • Cloud Migration
  • Cloud Optimization
  • Cloud Computing Services
Menu
  • Cloud Services
  • DevOps Services
  • Cloud Migration
  • Cloud Optimization
  • Cloud Computing Services
Internet of Things
  • IoT Consulting
  • IoT App Development
Menu
  • IoT Consulting
  • IoT App Development
Company
  • About
  • Culture
  • Current Openings
Menu
  • About
  • Culture
  • Current Openings
We are Global
India  |  USA  | Australia
We are Social
Facebook
Twitter
Linkedin
Youtube
Subscribe to our Newsletter

We don't spam!

cuelogic

We are Hiring!

Blogs

Recent Posts

  • Low Code Platform: The Future of Software Development
  • BDD vs TDD : Highlighting the two important Quality Engineering Practices
  • Getting Started With Feature Flags
  • Data Mesh – Rethinking Enterprise Data Architecture
  • Top Technology Trends for 2021
cuelogic

We are Hiring!

Blogs

Recent Posts

  • Low Code Platform: The Future of Software Development
  • BDD vs TDD : Highlighting the two important Quality Engineering Practices
  • Getting Started With Feature Flags
  • Data Mesh – Rethinking Enterprise Data Architecture
  • Top Technology Trends for 2021
We are Global
India  |  USA  | Australia
We are Social
Facebook
Twitter
Linkedin
Youtube
Subscribe to our Newsletter

We don't spam!

Services
Product Engineering

Product Development

UX Consulting

Application Development

Application Modernization

Quality Assurance Services

Cloud Engineering

Cloud Services

DevOps Services

Cloud Migration

Cloud Optimization

Cloud Computing Services

Data & Machine Learning

Big Data Services

AI Consulting

Internet of Things

IoT Consulting

IoT Application Services

Innovation Lab As A Service
Cybersecurity Services
Healthcare IT Services
Company

About

Culture

Current Openings

Insights
Privacy Policy  
All Rights Reserved © Cuelogic 2021

Close

Do you have an app development challenge? We'd love to hear about it!

By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.