 Bluetooth is a wireless communication standard that is
designed for short-range communication (up to around
30 meters) and low power consumption.
 It is widely supported by many types of devices,
including smartphones, tablets, laptops, and IoT devices.
 In terms of its operation, Bluetooth uses a star topology,
in which a central device (such as a smartphone or a
gateway) communicates with multiple peripheral devices
(such as sensors or actuators).
 The central device establishes a connection with each
peripheral device and exchanges data with them.
 Bluetooth also supports connectionless communication,
in which devices can send and receive data without
establishing a direct connection.
 Bluetooth 5.0 is the latest version of the Bluetooth
standard, and it is designed for high-speed, low-power,
and low-latency communication. It supports data rates
up to 2 Mbps, making it well-suited for transferring data
at a rate of around 10 Mbps.
 Bluetooth 5.0 is a reliable and efficient connective
technology that is well-suited for short-range
communication with a data rate of around 10 Mbps and
good quality of service.
Zigbee is a wireless communication protocol used for building
automation and smart home systems.
Zigbee operates in the 2.4GHz frequency band and is based on
the IEEE 802.15.4 standard for wireless personal area networks
(WPANs).
Zigbee supports several different network topologies, including
star, tree, and mesh.
 Star topology is typically used for simple networks with a
single coordinator, while tree topology is used for larger
networks with multiple coordinators.
 Mesh topology is used for networks with many devices
and allows for self-healing and self-organizing
capabilities.
 Zigbee is commonly used in building automation and
smart home systems for the control of lights, bulbs, and
sockets, as well as other devices such as thermostats,
security systems, and home entertainment systems.
 In energy management, Zigbee- enabled devices can
monitor energy consumption, turn appliances on and off
to reduce consumption, and communicate with utilities
to respond to demand response signals.
In industrial automation, Zigbee can be used for machine-to-
machine (M2M) communication and monitoring of industrial
equipment.
In healthcare, Zigbee can be used for wireless medical devices
such as glucose monitors and patient monitoring systems.
In retail, Zigbee can be used for in-store tracking and inventory
management.
In agriculture, Zigbee can be used for monitoring soil moisture,
temperature, and other environmental factors.
Range
 Bluetooth has a shorter range than ZigBee, typically up to
30 meters (100 feet) in open space.
 ZigBee, on the other hand, has a longer range, up to 100
meters (300 feet) in open space.
Device support
 Bluetooth allows up to eight devices to be connected to a
single master device,
 ZigBee supports up to 65,000 nodes (devices) in a single
network.
Data rate
 Bluetooth has a higher data rate than ZigBee, typically up to
2.1 Mbps.
 ZigBee has a lower data rate, typically up to 250 Kbps.
Power consumption
 Bluetooth requires more power than ZigBee
 ZigBee, on the other hand, is designed for low-power
consumption, making it suitable for use in devices that
require long battery life..
Cost
 Bluetooth is typically free to use, as it is an open standard.
 ZigBee, on the other hand, charges a fee for every connected
device, as it is a proprietary standard.
IIOT BASIC CONCEPTS FOR DIPLOMA FINAL YEAR STUDENTS.pptx
 BLE is a wireless communication standard that is designed
for low power consumption and short-range communication
(up to around 30 meters).
 It is often used for IoT applications that require long battery
life and a low-power, low-bandwidth connection.
 BLE operates on the same frequency as classic Bluetooth (2.4
GHz), but it uses a different protocol that is optimized for low
power consumption.
 BLE devices can operate for months or even years on a single
coin cell battery, making it an ideal choice for applications
where frequent charging is not possible.
 In terms of operation, BLE uses a star topology, in which a
central device (such as a smartphone or a gateway)
communicates with multiple peripheral devices (such as
sensors or actuators).
 The central device establishes a connection with each
peripheral device and exchanges data with them.
 BLE also supports connectionless communication, in which
devices can send and receive data without establishing a
direct connection.
 BLE is widely supported by many types of devices, including
smartphones, tablets, laptops, and dedicated IoT devices.
 It is a relatively simple and inexpensive technology to
implement, making it a good choice for many IoT
applications.
 RFID is a wireless technology that uses radio waves to
transmit data between a reader and a tag.
 The tag contains a microchip and an antenna, which are used
to store and transmit data.
 The reader, also known as an RFID interrogator, uses an
antenna to transmit a radio frequency (RF) signal that
activates the tag.
 The tag then responds by transmitting its data back to the
reader, which can then be used to identify and track the tag.
 The working principle of RFID is based on the interaction
between the reader and the tag.
 When the reader transmits an RF signal, it activates the tag,
which then responds by transmitting its data back to the
reader. This data can be used to identify and track the tag, as
well as to store and retrieve other information, such as the
location or condition of the object to which the tag is
attached.
 Near-field communication (NFC) is a short-range wireless
connectivity technology.
 Near-field communication transmits data through
electromagnetic radio fields to enable two devices to
communicate with each other.
 Such devices include mobile phones, tablets, laptops, and
wearables.
 Range coverage is max 20 cm.
 Frequency of operation is 13.56 MHz.
 NFC technology works by combining four key elements:
◦ an NFC microchip within a device, which acts as an antenna and
receiver;
◦ a reader/writer that scans and allows NFC devices to access data;
◦ an NFC software application on the device that can use data received
by the NFC chip;
◦ an information or communications service provider (ISP) that
manages all device communications that occur through the ISP.
NFC began in the payment-card industry and is evolving to include
applications in numerous industries worldwide.
 NFC device can work in three modes:
◦ NFC card emulation
Enables NFC-enabled devices such as smartphones to act like smart
cards, allowing users to perform transactions such as payment or
ticketing.
◦ NFC reader/writer
Enables NFC-enabled devices to read information stored on
inexpensive NFC tags embedded in labels or smart posters.
◦ NFC peer-to-peer
Enables two NFC-enabled devices to communicate with each other
to exchange information
 Data rate
 Wi-fi offers data transfer rates from a few Mbps to Gbps depending on the
type of Wi-fi standard used.
 Security
◦ Wi-Fi includes a number of security features, such as encryption and
authentication, that can help to protect against unauthorized access
and data breaches
 Coverage area
◦ Wi-Fi has a longer range than Bluetooth, which makes it well-suited
for covering a large area, such as a campus.
 Scalability
◦ Wi-fi supports a large number of devices and users making it suitable
for applications with a high degree of scalability.
 Cost
◦ Wi-fi is generally less expensive to implement than other wireless
technologies, such as cellular and etc.
 Different types of wi-fi
IEEE standard Frequency Max data rate Range
802.11a 5 GHz 54 Mbps 400 ft
802.11b 2.4 GHz 11 Mbps 450 ft
802.11g 2.4 GHz 54 Mbps 450 ft
802.11n 2.4 / 5 GHz 600 Mbps 825 ft
802.11ac 5 GHz 1 Gbps 1000 ft
 Internet protocol (IP) is a set of rules that dictates how data is
sent to the internet.
 IoT protocols ensure that information from one device
(sensor) is read and understood by another device,
(a gateway, a service).
 The IoT devices are connected to the Internet via an IP
(Internet Protocol) network.
 HTTP – Hypertext Transfer Protocol
 MQTT – Message Queue Telemetry Transport Protocol.
 AMQP – Advanced Message Queuing Protocol.
 CoAP – Constrained Application Protocol
 The Hypertext Transfer Protocol (HTTP) is an application-level
protocol for distributed, collaborative, hypermedia information
systems.
 This is the foundation for data communication for the World Wide
Web (i.e. internet) since 1990.
 HTTP is a TCP/IP based communication protocol, that is used to
deliver data on the World Wide Web.
 HTTP is stateless:
◦ HTTP is a stateless protocol, which means that it does not maintain any
information about previous requests.
 Connectionless protocol:
◦ HTTP is a protocol that does not require a connection.
 Media independence:
◦ The HTTP protocol is media independent in the sense that data can be
transferred as long as both the client and the server understand how to handle
the data content.
 Unidirectional
◦ The HTTP is unidirectional, made for one system (client) to be sending one
message to another one (server).
 Limited security feature:
◦ HTTP has limited security features, making it vulnerable to man-in-the- middle
attacks and other types of cyber threats. It is not recommended for use cases that
require high-security, sensitive information exchange.
 Not meant for Streaming
◦ HTTP is not meant for streaming data, it is built for small chunks of data
exchange and not for continuous streaming.
 Power consumption:
◦ HTTP relies on Transmission Control Protocol (TCP), which requires a lot of
computing resources, so it is not suitable for battery-powered applications.
 Latency:
◦ HTTP can be latency-prone due to the nature of its request-response model,
where a request must be sent before a response can be received. This can make
it less suitable for use cases that require low latency and real-time
communication.
 Not meant for IoT:
◦ As HTTP is not designed for low-power devices and networks, it is not a
suitable protocol for IoT applications.
 MQTT is used in Machine to machine communication(M2M).
 It was first developed by IBM.(Now Oasis is Developing MQTT)
 MQTT protocol is a messaging protocol.
 MQTT protocol collects the data from the devices and forwards to
the network. So the connection between the devices and network
can be established by this protocol.
 MQTT is a lightweight, publish-subscribe messaging protocol
that is designed to be used in Internet of Things (IoT) applications
where bandwidth and resources are limited.
 It does not require that both the client and the server establish a
connection at the same time.
 It provides faster data transmission, like how
WhatsApp/messenger provides a faster delivery. It's a real-time
messaging protocol.
 MQTT supports queuing, which means that it can store data in a
queue if the network is unavailable or the broker is not reachable.
This ensures that data is not lost and can be transmitted as soon as
the network becomes available again.
 It is commonly used in applications where devices need to send
and receive data over a network, such as in remote monitoring
systems.
 The working principle of the MQTT protocol is based on the
publish- subscribe model.
 In this model, devices that want to send data (publishers)
sends it to a central server (broker), which then forwards the
data to any devices that are subscribed to receive it
(subscribers). This allows devices to communicate with each
other without the need for a direct connection.
 APPLICATIONS
◦ Fire detection from remote monitoring.
◦ car sensors.
◦ Smart street lighting in a smart city
◦ 3D printing process in an industry.
 Advanced Message Queuing Protocol (AMQP) is an open
source published standard for asynchronous messaging by
wire.
 Advanced message queuing is a suitable protocol for the
message-oriented middleware environments.
 It was developed by John Hara from JP Morgan Chase,
London in 2003.(Initially for banking environments)
 The protocol is used in client/server messaging and in IoT
device management.
 Guaranteed delivery
 AMQP ensures that messages are delivered reliably, even if the recipient is
offline or unavailable. If a recipient is unable to receive a message, the
message is stored in a queue until it can be delivered.
 Acknowledgment
◦ AMQP allows recipients to acknowledge the receipt of a message,
which helps to ensure that the sender knows that the message has
been received.
 Routing
◦ AMQP allows messages to be routed to specific recipients based on predefined
rules, which can help to improve the efficiency of message delivery.
 Security
◦ AMQP supports the use of encryption and authentication to secure messages
and ensure that they are only delivered to the intended recipients.
 Interoperability
◦ AMQP is designed to be interoperable with other messaging protocols, allowing
it to be used in a variety of different systems and environments.
 The publisher can communicate with subscriber through AMQP
carrier.
 The messages from the publisher can be store in the carrier of
AMQP and as per the message queue and order; they will be
forwarded to the relevant subscriber with proper security system.
 Constrained Application Protocol (CoAP) is a specialized web
transfer protocol for use with constrained nodes and constrained
networks in the Internet of Things.
 It is generally used for machine-to-machine (M2M) applications
such as smart energy and building automation.
 The protocol was designed by the Internet Engineering Task Force
(IETF).
 CoAP is the alternate protocol for the HTTP.
 CoAP is basically a client-server IoT protocol where the client
makes a request and the server sends back a response as it happens
in HTTP.
 Lightweight
◦ CoAP is designed to be lightweight and efficient, making it suitable for use with
constrained devices that have limited processing and memory resources.
 Request/response model
◦ CoAP uses a request/response model similar to HTTP, which allows devices to
communicate with each other by sending and receiving messages.
 Asynchronous communication
◦ CoAP supports asynchronous communication, which means that devices can
send and receive messages at any time, rather than having to wait for a response
before sending the next message.
 Secure communication
◦ CoAP supports secure communication through the use of encryption and
authentication mechanisms.
 Interoperability
◦ CoAP is designed to be interoperable with other protocols, such as HTTP, which
allows it to be easily integrated with other systems and devices.
 Low-power WAN (LPWAN) is a wireless wide area network
technology that interconnects low-bandwidth, battery-powered
devices with low bit rates over long ranges.
 It suits all IoT applications where small amounts of data are
transmitted frequently.
 Using LPWAN technologies, the IoT devices can also get connected
to the Internet directly which eliminates the need for IoT gateways.
 It is a perfect IoT connectivity solution for mobile IoT devices.
 Long range: The operating range of LPWAN technology varies
from 1-5 kilometers in urban areas to over 10-40 km in rural
settings. It can also enable effective data communication in indoor
and underground locations.
 Low power: Optimized for power consumption, LPWAN
transceivers can run on small, inexpensive batteries for up to 20
years.
 Low cost: LPWAN's simplified, lightweight protocols reduce
complexity in hardware design and lower device costs.
 Frequency bands: LPWAN operates in both unlicensed frequency
bands and licensed frequency bands.
 Security: LPWAN uses advanced encryption and authentication
techniques to secure communications and prevent unauthorized
access to the network.
 Scalability: LPWAN supports a massive number of simultaneously
connected devices(1,00,000) with the low data rate.
IIOT BASIC CONCEPTS FOR DIPLOMA FINAL YEAR STUDENTS.pptx
 LoRaWAN is a low-power, long-range wireless
networking technology that is designed for use in
the Internet of Things (IoT) and machine-to-
machine (M2M) applications.
 It can be used to transmit data over long distances,
even in areas where there is no internet
connectivity.
 Long range: LoraWAN can transmit data over distances
of up to several kilometres, depending on the environment
and antenna used.(typically up to 15 km (9.3 miles) in
urban environments and up to 40 km (25 miles) in rural
environments)
 Low power: LoRaWAN is designed to be energy-efficient,
allowing devices to operate for long periods of time on a
single battery.
 Low cost: LoRaWAN uses an unlicensed spectrum, which
makes it relatively inexpensive to implement.
 Robustness: LoRaWAN is designed to be resistant to
interference and can operate in challenging environments.
 Security: LoRaWAN uses advanced encryption and
authentication techniques to secure communications and
prevent unauthorized access to the network.
 Frequency bands: LoRaWAN operates in unlicensed
frequency bands, which means that it can be used without
the need for a license.
 Network architecture: LoRaWAN uses a star-of-stars
network architecture, in which devices communicate with
"gateways" that are connected to the network
infrastructure. This allows LoRaWAN to support a large
number of devices while minimizing the infrastructure
required.
IIOT BASIC CONCEPTS FOR DIPLOMA FINAL YEAR STUDENTS.pptx
 One example of an application where LoRaWAN can be
used to transmit data without the internet is in remote
monitoring systems.
 For example, sensors could be installed in remote locations
to monitor environmental conditions, such as temperature,
humidity, and air quality.
 These sensors could transmit data to a central station using
LoRaWAN, allowing the data to be monitored and
analyzed in real time, even in areas where there is no
internet connectivity.
 Open Platform Communications Unified Architecture.
 The OPC Foundation developed the OPC Unified
Architecture (OPC UA) as a machine-to-machine
communication protocol that can be used to connect
different types of programmable logic controllers (PLCs)
to a human-machine interface (HMI).
 OPC UA is a common architecture that can be used with
Allen Bradley, Delta, Siemens, and other types of PLCs,
eliminating the need for individual drivers for each type of
PLC.
 OPC UA uses a standard data model and communication
protocol to enable interoperability between different
devices and systems.
 It can be used to exchange data and control commands
between PLCs, HMIs, and other devices, regardless of the
manufacturer or protocol used by the devices.
 This allows different types of PLCs to be connected to a
single HMI without the need for individual drivers.
 OPC Unified Architecture (OPC UA) is a machine-to-
machine communication protocol that is used to exchange
data and control commands between devices and systems
in industrial and other applications.
 Interoperability
OPC UA is designed to be a common architecture that can
be used with a wide range of devices and systems, regardless of
the manufacturer or protocol used. This enables interoperability
between different devices and systems, allowing them to
communicate and exchange data more seamlessly.
 Scalability
OPC UA is designed to handle large numbers of connected
devices and can scale to meet the needs of different applications.
 Security
OPC UA includes built-in security features, such as
encryption and authentication, to protect against
unauthorized access and data tampering.
 Robustness
OPC UA is designed to be reliable and resilient, with
features such as error handling and retry mechanisms to
ensure that data is delivered reliably.
 Extensibility
OPC UA includes a flexible data model that can be
extended to support new types of data and devices.
Question 6: In order to connect Allen broadly PLC, delta
PLC, and siemens PLC to HMI, each should have its own
drivers. Instead of using individual drivers, which machine-
to-machine communication protocol developed by the OPC
foundation is a common architecture for all the PLCs, and
can be used to resolve this problem.
Question 11: The industry wants to set up WLAN for
connecting devices and computers to transfer a large amount
of data. Which protocol is suitable and explain the protocol
model.
One protocol that would be suitable for setting up a WLAN
(Wireless Local Area Network) to transfer large amounts of
data is IEEE 802.11ac.
 802.11ac is a wireless networking standard that is designed
for high- speed, high-bandwidth applications.
 It supports data rates up to several Gbps, making it well-
suited for transferring large amounts of data.
 In terms of its protocol model, 802.1lac uses a client-server
architecture, in which a central access point (AP)
communicates with multiple client devices.
 The AP acts as a "hub" that connects the client devices to
the network and enables them to communicate with each
other.
 The client devices can be laptops, smartphones, tablets, or
other types of devices that are equipped with an 802.1lac
wireless adapter.
 802.11ac uses a variety of techniques to improve the
performance and efficiency of the wireless connection,
including multiple-input multiple- output (MIMO) antenna
technology, beamforming, and channel bonding.
 It also includes a number of security features, such as
encryption and authentication, to protect against
unauthorized access and data breaches.

More Related Content

PDF
IOT and its communication models and protocols.pdf
PPTX
404347218-PRESENTATION-ON-BLUETOOTH-TECHNOLOGY.pptx
DOCX
Bluetooth technology
PPTX
siddharth bt ppt.pptx
PDF
Internet of things (io t) protocols
PDF
PDF
IOT ajay binay.pdf
PPTX
Arthi.pptx
IOT and its communication models and protocols.pdf
404347218-PRESENTATION-ON-BLUETOOTH-TECHNOLOGY.pptx
Bluetooth technology
siddharth bt ppt.pptx
Internet of things (io t) protocols
IOT ajay binay.pdf
Arthi.pptx

Similar to IIOT BASIC CONCEPTS FOR DIPLOMA FINAL YEAR STUDENTS.pptx (20)

PPT
IoT _protocols.ppt
DOC
Bluetooth
PPS
Bluetoothppt
PDF
Physical Design of IoT.pdf
PDF
imp iot12334566777889900--oiiu8uy75r.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Chapter 1 pdf
DOCX
The Differences of between ZigBee and Bluetooth technologies
PDF
Bluetooth
PPTX
Types of wireless communication technologies
PPT
ITC_lec_12.ppt
PPT
Itc lec 12 wired and wireless network
PPTX
BLUETOOTH _TECHNOLOGY
PPT
Its Introduction to computer applications
PPT
IoT Devices
PPTX
IOT Communication And Open Platforms 4TH UNIT.pptx
PPTX
connecting smart object in IoT.pptx
PPTX
Bluetooth
PPTX
Bluetooth k.v
PPT
Bluetooth
IoT _protocols.ppt
Bluetooth
Bluetoothppt
Physical Design of IoT.pdf
imp iot12334566777889900--oiiu8uy75r.pdf
Internet of Things (IOT) - A guide to understanding
Chapter 1 pdf
The Differences of between ZigBee and Bluetooth technologies
Bluetooth
Types of wireless communication technologies
ITC_lec_12.ppt
Itc lec 12 wired and wireless network
BLUETOOTH _TECHNOLOGY
Its Introduction to computer applications
IoT Devices
IOT Communication And Open Platforms 4TH UNIT.pptx
connecting smart object in IoT.pptx
Bluetooth
Bluetooth k.v
Bluetooth
Ad

Recently uploaded (20)

PPTX
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
PDF
BBC NW_Tech Facilities_30 Odd Yrs Ago [J].pdf
PDF
LS-6-Digital-Literacy (1) K12 CURRICULUM .pdf
PDF
Using Technology to Foster Innovative Teaching Practices (www.kiu.ac.ug)
PPTX
Design ,Art Across Digital Realities and eXtended Reality
PPTX
Software-Development-Life-Cycle-SDLC.pptx
PDF
ST MNCWANGO P2 WIL (MEPR302) FINAL REPORT.pdf
PPTX
22ME926Introduction to Business Intelligence and Analytics, Advanced Integrat...
PPTX
Real Estate Management PART 1.pptxFFFFFFFFFFFFF
PPTX
Soft Skills Unit 2 Listening Speaking Reading Writing.pptx
PPTX
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
PDF
THE PEDAGOGICAL NEXUS IN TEACHING ELECTRICITY CONCEPTS IN THE GRADE 9 NATURAL...
PPT
UNIT-I Machine Learning Essentials for 2nd years
PPTX
MODULE 02 - CLOUD COMPUTING-Virtual Machines and Virtualization of Clusters a...
PDF
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
PDF
Performance, energy consumption and costs: a comparative analysis of automati...
PPTX
1. Effective HSEW Induction Training - EMCO 2024, O&M.pptx
PDF
V2500 Owner and Operatore Guide for Airbus
PDF
IAE-V2500 Engine Airbus Family A319/320
PDF
Mechanics of materials week 2 rajeshwari
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
BBC NW_Tech Facilities_30 Odd Yrs Ago [J].pdf
LS-6-Digital-Literacy (1) K12 CURRICULUM .pdf
Using Technology to Foster Innovative Teaching Practices (www.kiu.ac.ug)
Design ,Art Across Digital Realities and eXtended Reality
Software-Development-Life-Cycle-SDLC.pptx
ST MNCWANGO P2 WIL (MEPR302) FINAL REPORT.pdf
22ME926Introduction to Business Intelligence and Analytics, Advanced Integrat...
Real Estate Management PART 1.pptxFFFFFFFFFFFFF
Soft Skills Unit 2 Listening Speaking Reading Writing.pptx
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
THE PEDAGOGICAL NEXUS IN TEACHING ELECTRICITY CONCEPTS IN THE GRADE 9 NATURAL...
UNIT-I Machine Learning Essentials for 2nd years
MODULE 02 - CLOUD COMPUTING-Virtual Machines and Virtualization of Clusters a...
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
Performance, energy consumption and costs: a comparative analysis of automati...
1. Effective HSEW Induction Training - EMCO 2024, O&M.pptx
V2500 Owner and Operatore Guide for Airbus
IAE-V2500 Engine Airbus Family A319/320
Mechanics of materials week 2 rajeshwari
Ad

IIOT BASIC CONCEPTS FOR DIPLOMA FINAL YEAR STUDENTS.pptx

  • 1.  Bluetooth is a wireless communication standard that is designed for short-range communication (up to around 30 meters) and low power consumption.  It is widely supported by many types of devices, including smartphones, tablets, laptops, and IoT devices.
  • 2.  In terms of its operation, Bluetooth uses a star topology, in which a central device (such as a smartphone or a gateway) communicates with multiple peripheral devices (such as sensors or actuators).  The central device establishes a connection with each peripheral device and exchanges data with them.
  • 3.  Bluetooth also supports connectionless communication, in which devices can send and receive data without establishing a direct connection.  Bluetooth 5.0 is the latest version of the Bluetooth standard, and it is designed for high-speed, low-power, and low-latency communication. It supports data rates up to 2 Mbps, making it well-suited for transferring data at a rate of around 10 Mbps.
  • 4.  Bluetooth 5.0 is a reliable and efficient connective technology that is well-suited for short-range communication with a data rate of around 10 Mbps and good quality of service.
  • 5. Zigbee is a wireless communication protocol used for building automation and smart home systems. Zigbee operates in the 2.4GHz frequency band and is based on the IEEE 802.15.4 standard for wireless personal area networks (WPANs). Zigbee supports several different network topologies, including star, tree, and mesh.
  • 6.  Star topology is typically used for simple networks with a single coordinator, while tree topology is used for larger networks with multiple coordinators.  Mesh topology is used for networks with many devices and allows for self-healing and self-organizing capabilities.
  • 7.  Zigbee is commonly used in building automation and smart home systems for the control of lights, bulbs, and sockets, as well as other devices such as thermostats, security systems, and home entertainment systems.  In energy management, Zigbee- enabled devices can monitor energy consumption, turn appliances on and off to reduce consumption, and communicate with utilities to respond to demand response signals.
  • 8. In industrial automation, Zigbee can be used for machine-to- machine (M2M) communication and monitoring of industrial equipment. In healthcare, Zigbee can be used for wireless medical devices such as glucose monitors and patient monitoring systems. In retail, Zigbee can be used for in-store tracking and inventory management. In agriculture, Zigbee can be used for monitoring soil moisture, temperature, and other environmental factors.
  • 9. Range  Bluetooth has a shorter range than ZigBee, typically up to 30 meters (100 feet) in open space.  ZigBee, on the other hand, has a longer range, up to 100 meters (300 feet) in open space.
  • 10. Device support  Bluetooth allows up to eight devices to be connected to a single master device,  ZigBee supports up to 65,000 nodes (devices) in a single network.
  • 11. Data rate  Bluetooth has a higher data rate than ZigBee, typically up to 2.1 Mbps.  ZigBee has a lower data rate, typically up to 250 Kbps.
  • 12. Power consumption  Bluetooth requires more power than ZigBee  ZigBee, on the other hand, is designed for low-power consumption, making it suitable for use in devices that require long battery life..
  • 13. Cost  Bluetooth is typically free to use, as it is an open standard.  ZigBee, on the other hand, charges a fee for every connected device, as it is a proprietary standard.
  • 15.  BLE is a wireless communication standard that is designed for low power consumption and short-range communication (up to around 30 meters).  It is often used for IoT applications that require long battery life and a low-power, low-bandwidth connection.  BLE operates on the same frequency as classic Bluetooth (2.4 GHz), but it uses a different protocol that is optimized for low power consumption.
  • 16.  BLE devices can operate for months or even years on a single coin cell battery, making it an ideal choice for applications where frequent charging is not possible.  In terms of operation, BLE uses a star topology, in which a central device (such as a smartphone or a gateway) communicates with multiple peripheral devices (such as sensors or actuators).  The central device establishes a connection with each peripheral device and exchanges data with them.
  • 17.  BLE also supports connectionless communication, in which devices can send and receive data without establishing a direct connection.  BLE is widely supported by many types of devices, including smartphones, tablets, laptops, and dedicated IoT devices.  It is a relatively simple and inexpensive technology to implement, making it a good choice for many IoT applications.
  • 18.  RFID is a wireless technology that uses radio waves to transmit data between a reader and a tag.  The tag contains a microchip and an antenna, which are used to store and transmit data.  The reader, also known as an RFID interrogator, uses an antenna to transmit a radio frequency (RF) signal that activates the tag.  The tag then responds by transmitting its data back to the reader, which can then be used to identify and track the tag.
  • 19.  The working principle of RFID is based on the interaction between the reader and the tag.  When the reader transmits an RF signal, it activates the tag, which then responds by transmitting its data back to the reader. This data can be used to identify and track the tag, as well as to store and retrieve other information, such as the location or condition of the object to which the tag is attached.
  • 20.  Near-field communication (NFC) is a short-range wireless connectivity technology.  Near-field communication transmits data through electromagnetic radio fields to enable two devices to communicate with each other.  Such devices include mobile phones, tablets, laptops, and wearables.  Range coverage is max 20 cm.  Frequency of operation is 13.56 MHz.
  • 21.  NFC technology works by combining four key elements: ◦ an NFC microchip within a device, which acts as an antenna and receiver; ◦ a reader/writer that scans and allows NFC devices to access data; ◦ an NFC software application on the device that can use data received by the NFC chip; ◦ an information or communications service provider (ISP) that manages all device communications that occur through the ISP. NFC began in the payment-card industry and is evolving to include applications in numerous industries worldwide.
  • 22.  NFC device can work in three modes: ◦ NFC card emulation Enables NFC-enabled devices such as smartphones to act like smart cards, allowing users to perform transactions such as payment or ticketing. ◦ NFC reader/writer Enables NFC-enabled devices to read information stored on inexpensive NFC tags embedded in labels or smart posters. ◦ NFC peer-to-peer Enables two NFC-enabled devices to communicate with each other to exchange information
  • 23.  Data rate  Wi-fi offers data transfer rates from a few Mbps to Gbps depending on the type of Wi-fi standard used.  Security ◦ Wi-Fi includes a number of security features, such as encryption and authentication, that can help to protect against unauthorized access and data breaches  Coverage area ◦ Wi-Fi has a longer range than Bluetooth, which makes it well-suited for covering a large area, such as a campus.
  • 24.  Scalability ◦ Wi-fi supports a large number of devices and users making it suitable for applications with a high degree of scalability.  Cost ◦ Wi-fi is generally less expensive to implement than other wireless technologies, such as cellular and etc.
  • 25.  Different types of wi-fi IEEE standard Frequency Max data rate Range 802.11a 5 GHz 54 Mbps 400 ft 802.11b 2.4 GHz 11 Mbps 450 ft 802.11g 2.4 GHz 54 Mbps 450 ft 802.11n 2.4 / 5 GHz 600 Mbps 825 ft 802.11ac 5 GHz 1 Gbps 1000 ft
  • 26.  Internet protocol (IP) is a set of rules that dictates how data is sent to the internet.  IoT protocols ensure that information from one device (sensor) is read and understood by another device, (a gateway, a service).  The IoT devices are connected to the Internet via an IP (Internet Protocol) network.
  • 27.  HTTP – Hypertext Transfer Protocol  MQTT – Message Queue Telemetry Transport Protocol.  AMQP – Advanced Message Queuing Protocol.  CoAP – Constrained Application Protocol
  • 28.  The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems.  This is the foundation for data communication for the World Wide Web (i.e. internet) since 1990.  HTTP is a TCP/IP based communication protocol, that is used to deliver data on the World Wide Web.
  • 29.  HTTP is stateless: ◦ HTTP is a stateless protocol, which means that it does not maintain any information about previous requests.  Connectionless protocol: ◦ HTTP is a protocol that does not require a connection.  Media independence: ◦ The HTTP protocol is media independent in the sense that data can be transferred as long as both the client and the server understand how to handle the data content.
  • 30.  Unidirectional ◦ The HTTP is unidirectional, made for one system (client) to be sending one message to another one (server).  Limited security feature: ◦ HTTP has limited security features, making it vulnerable to man-in-the- middle attacks and other types of cyber threats. It is not recommended for use cases that require high-security, sensitive information exchange.  Not meant for Streaming ◦ HTTP is not meant for streaming data, it is built for small chunks of data exchange and not for continuous streaming.
  • 31.  Power consumption: ◦ HTTP relies on Transmission Control Protocol (TCP), which requires a lot of computing resources, so it is not suitable for battery-powered applications.  Latency: ◦ HTTP can be latency-prone due to the nature of its request-response model, where a request must be sent before a response can be received. This can make it less suitable for use cases that require low latency and real-time communication.  Not meant for IoT: ◦ As HTTP is not designed for low-power devices and networks, it is not a suitable protocol for IoT applications.
  • 32.  MQTT is used in Machine to machine communication(M2M).  It was first developed by IBM.(Now Oasis is Developing MQTT)  MQTT protocol is a messaging protocol.  MQTT protocol collects the data from the devices and forwards to the network. So the connection between the devices and network can be established by this protocol.  MQTT is a lightweight, publish-subscribe messaging protocol that is designed to be used in Internet of Things (IoT) applications where bandwidth and resources are limited.
  • 33.  It does not require that both the client and the server establish a connection at the same time.  It provides faster data transmission, like how WhatsApp/messenger provides a faster delivery. It's a real-time messaging protocol.  MQTT supports queuing, which means that it can store data in a queue if the network is unavailable or the broker is not reachable. This ensures that data is not lost and can be transmitted as soon as the network becomes available again.  It is commonly used in applications where devices need to send and receive data over a network, such as in remote monitoring systems.
  • 34.  The working principle of the MQTT protocol is based on the publish- subscribe model.
  • 35.  In this model, devices that want to send data (publishers) sends it to a central server (broker), which then forwards the data to any devices that are subscribed to receive it (subscribers). This allows devices to communicate with each other without the need for a direct connection.  APPLICATIONS ◦ Fire detection from remote monitoring. ◦ car sensors. ◦ Smart street lighting in a smart city ◦ 3D printing process in an industry.
  • 36.  Advanced Message Queuing Protocol (AMQP) is an open source published standard for asynchronous messaging by wire.  Advanced message queuing is a suitable protocol for the message-oriented middleware environments.  It was developed by John Hara from JP Morgan Chase, London in 2003.(Initially for banking environments)  The protocol is used in client/server messaging and in IoT device management.
  • 37.  Guaranteed delivery  AMQP ensures that messages are delivered reliably, even if the recipient is offline or unavailable. If a recipient is unable to receive a message, the message is stored in a queue until it can be delivered.  Acknowledgment ◦ AMQP allows recipients to acknowledge the receipt of a message, which helps to ensure that the sender knows that the message has been received.
  • 38.  Routing ◦ AMQP allows messages to be routed to specific recipients based on predefined rules, which can help to improve the efficiency of message delivery.  Security ◦ AMQP supports the use of encryption and authentication to secure messages and ensure that they are only delivered to the intended recipients.  Interoperability ◦ AMQP is designed to be interoperable with other messaging protocols, allowing it to be used in a variety of different systems and environments.
  • 39.  The publisher can communicate with subscriber through AMQP carrier.  The messages from the publisher can be store in the carrier of AMQP and as per the message queue and order; they will be forwarded to the relevant subscriber with proper security system.
  • 40.  Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained networks in the Internet of Things.  It is generally used for machine-to-machine (M2M) applications such as smart energy and building automation.  The protocol was designed by the Internet Engineering Task Force (IETF).  CoAP is the alternate protocol for the HTTP.  CoAP is basically a client-server IoT protocol where the client makes a request and the server sends back a response as it happens in HTTP.
  • 41.  Lightweight ◦ CoAP is designed to be lightweight and efficient, making it suitable for use with constrained devices that have limited processing and memory resources.  Request/response model ◦ CoAP uses a request/response model similar to HTTP, which allows devices to communicate with each other by sending and receiving messages.  Asynchronous communication ◦ CoAP supports asynchronous communication, which means that devices can send and receive messages at any time, rather than having to wait for a response before sending the next message.
  • 42.  Secure communication ◦ CoAP supports secure communication through the use of encryption and authentication mechanisms.  Interoperability ◦ CoAP is designed to be interoperable with other protocols, such as HTTP, which allows it to be easily integrated with other systems and devices.
  • 43.  Low-power WAN (LPWAN) is a wireless wide area network technology that interconnects low-bandwidth, battery-powered devices with low bit rates over long ranges.  It suits all IoT applications where small amounts of data are transmitted frequently.  Using LPWAN technologies, the IoT devices can also get connected to the Internet directly which eliminates the need for IoT gateways.  It is a perfect IoT connectivity solution for mobile IoT devices.
  • 44.  Long range: The operating range of LPWAN technology varies from 1-5 kilometers in urban areas to over 10-40 km in rural settings. It can also enable effective data communication in indoor and underground locations.  Low power: Optimized for power consumption, LPWAN transceivers can run on small, inexpensive batteries for up to 20 years.  Low cost: LPWAN's simplified, lightweight protocols reduce complexity in hardware design and lower device costs.
  • 45.  Frequency bands: LPWAN operates in both unlicensed frequency bands and licensed frequency bands.  Security: LPWAN uses advanced encryption and authentication techniques to secure communications and prevent unauthorized access to the network.  Scalability: LPWAN supports a massive number of simultaneously connected devices(1,00,000) with the low data rate.
  • 47.  LoRaWAN is a low-power, long-range wireless networking technology that is designed for use in the Internet of Things (IoT) and machine-to- machine (M2M) applications.  It can be used to transmit data over long distances, even in areas where there is no internet connectivity.
  • 48.  Long range: LoraWAN can transmit data over distances of up to several kilometres, depending on the environment and antenna used.(typically up to 15 km (9.3 miles) in urban environments and up to 40 km (25 miles) in rural environments)  Low power: LoRaWAN is designed to be energy-efficient, allowing devices to operate for long periods of time on a single battery.
  • 49.  Low cost: LoRaWAN uses an unlicensed spectrum, which makes it relatively inexpensive to implement.  Robustness: LoRaWAN is designed to be resistant to interference and can operate in challenging environments.  Security: LoRaWAN uses advanced encryption and authentication techniques to secure communications and prevent unauthorized access to the network.
  • 50.  Frequency bands: LoRaWAN operates in unlicensed frequency bands, which means that it can be used without the need for a license.  Network architecture: LoRaWAN uses a star-of-stars network architecture, in which devices communicate with "gateways" that are connected to the network infrastructure. This allows LoRaWAN to support a large number of devices while minimizing the infrastructure required.
  • 52.  One example of an application where LoRaWAN can be used to transmit data without the internet is in remote monitoring systems.  For example, sensors could be installed in remote locations to monitor environmental conditions, such as temperature, humidity, and air quality.  These sensors could transmit data to a central station using LoRaWAN, allowing the data to be monitored and analyzed in real time, even in areas where there is no internet connectivity.
  • 53.  Open Platform Communications Unified Architecture.  The OPC Foundation developed the OPC Unified Architecture (OPC UA) as a machine-to-machine communication protocol that can be used to connect different types of programmable logic controllers (PLCs) to a human-machine interface (HMI).  OPC UA is a common architecture that can be used with Allen Bradley, Delta, Siemens, and other types of PLCs, eliminating the need for individual drivers for each type of PLC.
  • 54.  OPC UA uses a standard data model and communication protocol to enable interoperability between different devices and systems.  It can be used to exchange data and control commands between PLCs, HMIs, and other devices, regardless of the manufacturer or protocol used by the devices.
  • 55.  This allows different types of PLCs to be connected to a single HMI without the need for individual drivers.  OPC Unified Architecture (OPC UA) is a machine-to- machine communication protocol that is used to exchange data and control commands between devices and systems in industrial and other applications.
  • 56.  Interoperability OPC UA is designed to be a common architecture that can be used with a wide range of devices and systems, regardless of the manufacturer or protocol used. This enables interoperability between different devices and systems, allowing them to communicate and exchange data more seamlessly.  Scalability OPC UA is designed to handle large numbers of connected devices and can scale to meet the needs of different applications.
  • 57.  Security OPC UA includes built-in security features, such as encryption and authentication, to protect against unauthorized access and data tampering.  Robustness OPC UA is designed to be reliable and resilient, with features such as error handling and retry mechanisms to ensure that data is delivered reliably.
  • 58.  Extensibility OPC UA includes a flexible data model that can be extended to support new types of data and devices. Question 6: In order to connect Allen broadly PLC, delta PLC, and siemens PLC to HMI, each should have its own drivers. Instead of using individual drivers, which machine- to-machine communication protocol developed by the OPC foundation is a common architecture for all the PLCs, and can be used to resolve this problem.
  • 59. Question 11: The industry wants to set up WLAN for connecting devices and computers to transfer a large amount of data. Which protocol is suitable and explain the protocol model. One protocol that would be suitable for setting up a WLAN (Wireless Local Area Network) to transfer large amounts of data is IEEE 802.11ac.
  • 60.  802.11ac is a wireless networking standard that is designed for high- speed, high-bandwidth applications.  It supports data rates up to several Gbps, making it well- suited for transferring large amounts of data.  In terms of its protocol model, 802.1lac uses a client-server architecture, in which a central access point (AP) communicates with multiple client devices.  The AP acts as a "hub" that connects the client devices to the network and enables them to communicate with each other.
  • 61.  The client devices can be laptops, smartphones, tablets, or other types of devices that are equipped with an 802.1lac wireless adapter.  802.11ac uses a variety of techniques to improve the performance and efficiency of the wireless connection, including multiple-input multiple- output (MIMO) antenna technology, beamforming, and channel bonding.  It also includes a number of security features, such as encryption and authentication, to protect against unauthorized access and data breaches.