The internet of things or (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. The technologies and principles of IoT will have a broad impact on organizations, affecting business strategy, risk management and a wide range of technical areas such as architecture and network design. In this whitepaper, I am dealing with IoT protocol queue and all IoT technologies like Wireless sensor networks, blueooth, Wifi low power, Zigbee, Near Field Communication and sensors.
- IOT NETWORK PROTOCOL QUEUE
The Internet Engineering Task Force (IETF) has designed a possible procedure for transmission among IoT modules employing IP because IP is adaptable and dependable medium. The Internet Protocol for Smart Objects (IPSO) Association has reported much research representing possible procedures and mediums for the IP stack mediums and furthermore adding adaption layer, which is employed for transmission among smart objects. The figure 1 represents the Protocol stack of IoT.Figure 1: The IoT Network Protocol Stack
- MAC and Physical Layer:
The IEE 802.15.4 standard is introduced for providing transmission among close-packed and economical little energy implanted mediums that request extended life battery. It determines protocols and measure for the MAC and physical medium of the IP storage. It manages little energy transmission beside with economic and low area transmission. On account of these constrained environment resources, we demand a portable structure measure, low transmit power and low bandwidth. Communication charges a very low power, which is one proportion of that utilized in mobile or WiFi clusters. This maximizes the transmission medium. Since there is a restricted area, the modules pose to function commonly in order to empower multihop routing among extended areas. This resulting in the packet medium is restricted to 127 bytes and the medium of transmission is restricted to 250kbps. The programming function in IEEE 802.15.4 has a built-in discharge, which possesses strong transmission, authorize us to identify losses and validate the recommunication of missing packets.
- Adaption Layer
IPv6 is contemplated as the superior procedure for transmission in the IoT platform due to its adaptability and solidity. Initially mass IP standards were not expected to be appropriate for transmission in framework with little energy wireless range such as IEE 802.15.4. The 6LoWPAN is a composition for IPv6 across little energy wireless distinctive range clusters, it is an ideally established medium for wireless transmission. It empowers transmission utilizing IPv6 across the IEEE 802.15.4 l transport and the link medium. It could transfer with different IP modules on the system. Due the maximum label range attainable in IPv6 it has been chosen and this connects to the Internet by a router. Which additionally manages standard maintenance for alteration among IPv4 and IPv6 as nowadays IPv4 is most deployed Internet. The headers in IPv6 are not adequate to appropriate within the compact 127 byte MTU of the 802.15.4 protocol.
The adaption layer individually carries out the following optimizations to minimize transmission overhead;
- Header constriction: 6L0WPAN describes the header constriction of IPv6 data for minimizing the overdue of IPv6. Most of the area is removed since they’re obtained from link level data or could be divided among data.
- Decentralization: The minimal MTU dimension of TPv6 is 1280 bytes. At the same time, the utmost frame magnitude of IEEE 802.15.4 is 127 bytes. Consequently, we have to explode the IPv6 information. And this is carried out by the adaption medium.
- Link layer advancement: 6LoWPAN also handles mesh gateway, which is carried out at the medium utilizing link medium minimum address in place of in the network layer. This attribute is employed for transmission among the 6LoWPAN network.
- Network Layer:
For overthrow the obtained information from transport medium, the network layer plays an important role. The “IETF Routing Over Low Power and Lossy Networks (ROLL) functioning organization has designed a routing protocol (RPL) for Low Power and Lossy Networks (LLNs)”. For these systems, RPL is an attainable gateway standard, placed on displacement nodes. It defines how a Destination Oriented Directed Acyclic Graph (DODAG) is established with the edges succeeding the interchange distance vectors. A group of restrictions and targeted action is utilized to establish the representation with the superior route. The targeted function and restrictions may vary according to their specifications. For example, restrictions could be to evade battery power mediums or to advance encipher mediums. The target function aims to lower the latency or the anticipated amount of packets that desire to post.
To accomplish the memory demands of junctions, they are categorized into storing and non-storing junctions lean over their possibility to stack gateway data. When junctions are in non-storing mediums and a descending route is established, the gateway data is adjoined to the succeeding context and transmit additionally over the source. The source encounter the entire way in the packet and delivers an information message down with the route packet to the target leap by leap.
- Transport Layer:
TCP is not a superior method for transmission in minimum energy habitat, as it has a huge elevated overdue to the reality that it is a link-based standard. Consequently, UDP is favoured since it is an un-connected standard and has a minimum overdue.
- Application Layer:
This medium is accountable for information presentation and configuration. In this medium the internet is generally established on HTTP. Although, HTTP is not appropriate in restricted measure habitat since it is absolutely expansive in temperament and this experience a huge analysing overdue. Various different protocols are being introduced for IoT environments like MQTT (Message Queue Telemetry Transport) and CoAP (Constrained Application Protocol).
- Message Queue Telemetry Transport: It is a light-weight standard, which makes appropriate for IoT applications. MQTT is a communicated protocol which function across TCP. Primarily it was introduced by IBM as a client/server standard. The clients are communicated and the server functions as a bridge/broker to users who interconnect to TCP. Users could subscribe or publish to a research. This transmission functions between the broker whose function is to contemplate presentations and additionally validate the user for privacy. On account of it functions among TCP, it cannot be utilized with all methods of IoT implementations. In addition, it employs context for research names, which maximizes its overdue.
- Constrained Application Protocol: It is another idea to HTTP. It is widely employed in various IoT implementations. Dissimilar to HTTP, it integrates expansion for restricted implementation habitat. It utilizes the effective XML Interchange information, which is a binary information form and is considerably effective by means of space when equated to simple text HTML/XML. Some of the different attributes are, resource identification, multicast message support, header compression, congestion control, auto configuration and asynchronous message exchange. CoAP as four message types, Acknowledgement, reset, non-confirmable and confirmable. For effective communication among UDP, sustainable packets are employed. The acknowledgment could be conveying back itself. Additionally, for security reasons it employs DTLS (Datagram Transport Layer Security)
- MAC and Physical Layer:
- WIRELESS SENSOR NETWORKS
At different intervals, information from a detector is not utilized in tracking wide ranges and compound actions. Various sensor edges require interconnecting with one another wirelessly. The drawback of non-IP automations like NFC, Bluetooth and RFID is that their medium is much compact. So, they’re not utilized in various implementations, where a sizeable range requires to be tracked between various sensors nodes installed in mixed locations. A WSN comprises of thousands of sensors nodes inter-linked employing wireless automations. It gathers information over the habitat and transforms it to module router that imparts the data to the cloud across the Internet. In a wireless network the transmission among the nodes might be multi-leap or directed. The sensor edges are of nature limited but entrance nodes have enough energy and organize services. The general network employed in WSN is a star, a hybrid system and a mesh. Almost every transmission in WSN is established on the standard IEEE 802.15.4. Certainly, there are lot of standards that are deployed in IoT framework and let us describe the objective of a general IoT protocol queue with the widespread proxies.
- LOW ENERGY BLUETOOTH
It was introduced by the Bluetooth specific fascinated division and equally called as “Bluetooth Smart”. Comparatively, it consumes low power and it has shorter medium when equated with challenging standards. The BLE standard storage is identical to the storage utilized in typical Bluetooth automation. Chiefly, it has two components: host and the controller. Generally, the controller is a network on fragment with a radio; the link and the physical medium are administered in this component. The features of top mediums are incorporated in the host. BLE is not well matched with Bluetooth. Here are some dissimilarity among typical Bluetooth and BLE.
The chief dissimilarity is the BLE did not carry information transmission rather it handles frequent transmission of compact data messages with an information range of 1 Mbps. Master and Slave are the two classification of modules in BLE. The master functions as a central component which interconnect different slaves. Examine an IoT structure in which a cellular phone or personal computer acts as the master and portable modules like smart wearables, fitness tracker, thermostat, or any tracking component functions as slaves. In manifestation like this, slaves should be considerably more systematic. Additionally, to economize power, salves are typically in rest manner and call up constantly to accept data messages from the master.
In typical Bluetooth, the interconnection is on whole spell if no information transmission took place. Furthermore, it manages 79 information mediums with 1 MHz medium frequency and an information range of 1 million figure, considering that BLE manages 40 mediums with 2 MHz medium frequency and 1 million symbol data rates. BLE handles low cycle stipulations as size of the packet is compact and the transmission time is 80s for small packet data. The BLE protocol storage manages IP oriented transmission, a demonstration is performed by Siekkinen et al. records the amount of bytes send per Joule to represent that BLE acquires considerably low power when equated to challenging protocols like Zigbee. The power co-efficient of BLE is 2.5 times superior when compared with Zigbee.
- WIFI LOW POWER
Based upon the IEEE 802.11ah standard, the WiFi association newly introduced “WiFi HaLow”. While comparing with conventional WiFi device it consumes low energy and also has an extensive range. The area of WiFi HaLow is almost double that of conventional WiFi. So that’s why this standard is more appropriated for IoT implementations. Similar to other WiFi modules, the supporting devices WiFi HaLow also manages IP interconnection, which is key for IoT implementations. The parameters of the IEEE 802.11 ah standard were introduced to manage with wireless networks, where modules are power restricted and need comparatively wide area of transmission. This standard functions in the sub-gigahertz band (900MHz). Due to quite minimum bandwidth, the medium is extensive because maximum bandwidth waves decline from excessive attenuation. We can increase the medium by minimizing the frequency additionally, the information rate will also be decreased and thus the exchange is not established. This standard also handles extensive star structure systems, where a number of links are interlinked to a single medium.
The Zigbee was designed by the Zigbee association, which functions for minimum power, reliable and effective transmission resources. Zigbee is utilized in Personal Area Networks and it is oriented to the IEEE 802.15.4 transmission standard. Zigbee is different from BLE, as here the system delivers multihop routing and the communication range of is very compact (10-100 meters). Zigbee uses three different modules in a network, they are, Fully Functional Device (FFD), RFD (Reduced Functional Device), and one Zigbee facilitator. Additionally, the FFD junction can function as a gateway. It manages topologies like star, mesh and tree topologies. Based on the topology the routing will be defined . Zigbee identification and administration of nodes are some of the other attributes of Zigbee, it manages leaving and joining nodes in the network, addressing compact 16-bit and multi-jump gateway. The structure for transmission and multiplex program implementation is delivered by the application medium. It contemplates Zigbee Device Object Application Sublayer (APS), and a (ZDO) Application Objects (APO). APOs are distributed over the system nodes. The module and the system administration resources are delivered by the ZDO, and then employs the APOs. Information transmission resources offered by the Application Sublayer to the APOs and ZDO. It is accountable for reliable transmission among the Application Objects. These characteristics are utilized to develop a superior distributed application.
- NEAR FIELD COMMUNICATION (NFC)
NFC is a wireless communication technology used comparatively for short mediums, by which cellular devices can interconnect with one another across a distance of certain centimetres. All data types can be transformed among the NFC installed modules in minors by transporting them near to one another. This automation is RFID oriented. It manages alterations in the amplitude domain to transform information among dissimilar NFC installed modules. It functions over a bandwidth of 13.56 MHz, which is identical as higher modulation RFID. Active and passive are the two modes of operations. The pair functions produce amplitude domains in active passage, while only a single module produces the domain in the passive mode and different utilizes charge frequency to transmit information. The passive mode take advantage in accumalator enabled mediums to power optimization. The essential advantage of the near proximity among modules to optimize power that is essential for secure payment transactions. At last, NFC can be utilized for two-way broadcasting which is differ from RFID. Therefore, most of the available smartphone in the markets are NFC installed.
- SENSORS AND ACTUATORS
Every IoT implementations must have extremely different sensors to gather information from the habitat. One of the most key features of IoT is context realization, which is not attainable short of sensor automation. Detectors are vital elements in smart objects, these are smaller in dimension, minimum of price and intake minimum energy. They are regulated by agents such as accumulator ability and easy utilization. For building different smart applications Schmidt and Van Laerhoven suggested an overview of components.
- Agent Communication
Agent technology is one of the fast-growing domains of Artificial Intelligence, which is an uttermost consequence in present research. To be a software entity located environment an Intelligent Agent can be,
- acknowledge to interchanges in the domain;
- be proactive in attaining its goals; and also
To attain the goal, IA masters by itself and makes use of its inner command base and it’s shown in the figure 2. So that it looks like a natural analogy for human acts. It has an aerial presentation conduct in data distribution and control of self-forced knowledge.Figure 2: Basic Agent Diagram
- Definition of Multi Agent System
Multi-Agent System (MAS) is an operating network which deploys numeral interlinkage mediums to resolve an issue in unlocked and decentralized unknown mediums. MAS have no centralized constraint principles. The aim of MAS is mainly designed to achieve and collaborate the required agents.
Multi agent systems and agents are gradually connected to the design of distributed and dynamic systems, implements with success into the fields including robotics, oceanography, medicine, e-commerce, and so on. The application of wireless technologies, like Universal Mobile Telecommunications System (UMTS), Bluetooth, General Packet Radio Service (GPRS), and so on., mould it feasible to discover superior means of providing the agents with the capability of communicating with the help of hand-held devices (e.g. Personal Digital Access (PDA’s) and cellular phones) and also provides mobile services.Figure 3: Basic structure of agent
The figure 3 represents the basic structure of agent. The Multi-Agent System (MAS) offer a solution, which functions by minimizing the time consumed for the initiation and implementation of any modifications in the monitoring parameters by adding intelligence to the system. This research work explains about a MAS solution to particular practical demands of network administrators working in an Internet Service Provider (ISP) domain. In this technical work, the way in which simplification introduced by a Centralized Router Agent (CRA), which permits for route selection to be carried out external to the routers and also helps in such route selection to be notified by outside network intelligence, deals with this predicament is studied.
- Agent Communication
As IoT technology has already made itself comfortable in our homes, public spaces, offices and factories, and given the breakneck pace of its development, it seems that the hackneyed IoT phrase ‘anything that can be connected will be connected’ is ever closer to becoming our daily reality. In this whitepaper, I explained about the Short range IoT network solutions i.e. Bluetooth, Medium range solutions i.e. Wi-Fi and Zigbee.
- Balakrishnan. S and K L Shunmuganathan. Article: A JADE Implementation of Integrated Agent System for E-Mail Coordination (IASEC). International Journal of Computer Applications 58(5): 5-9, November 2012.
- S.Balakrishnan, “An Overview of Agent Based Intelligent Systems and Its Tools”, CSI Communications magazine, Volume No. 42, Issue No. 10, January 2019, pp. 15-17.
- S.Balakrishnan, “Agent based Bioinformatics Integration using JADE – Overview”, CSI Communications magazine, Volume No. 43, Issue No. 9, December 2019, pp. 29-31.
- Balakrishnan S and Steven Uatuaromuinjo Tjiraso, “Integration of Agent Based Computing with Cloud Computing: Towards Cloud Intelligent Systems”, International Research Publication House, Delhi. Engineering and Technology: Recent Innovations & Research, ISBN- 978-93-86138-06-4, pp. 1-17.
- S. Balakrishnan, K.N. Sivabalan and J. Janet “MASFE - Mutliagent System for Filtering E-Mails Using JADE”, Advanced Engineering Research and Applications (AERA), Research India Publications, ISBN- 978-93-84443-42-9, pp. 148-167, 2017.
- P.Arivazhagan, Balakrishnan. S and K L Shunmuganathan. “An Agent Based Centralized Router with Dynamic Connection Management Scheme Using JADE”, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 11, Number 3 (2016) pp 2036-2041.
- Balakrishnan. S and K L Shunmuganathan, R. Sreenevasan, “Amelioration of Artificial Intelligence using Game Techniques for an Imperfect Information Board Game Geister” International Journal of Applied Engineering Research (IJAER). ISSN 0973-4562. Vol 9, Number 22 (2014) pp. 11849-11860.
- Balakrishnan. S and K L Shunmuganathan, An Agent Based Collaborative Spam Filtering Assistance Using JADE”, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 21 (2015) pp 42476-42479.
- A.Jebaraj Rathnakumar, S.Balakrishnan, Design Of Multi-Agent Based Systems For Entrusted Communication Using JADE”, Taga Journal of Graphic Technology, Vol. 14, pp. 766-774, 2018.
- S. Balakrishnan, B. Persis Urbana Ivy and S. Sudhakar Ilango, “A Novel And Secured Intrusion Detection System For Wireless Sensor Networks Using Identity Based Online/Offline Signature”, ARPN Journal of Engineering and Applied Sciences. November 2018, Vol. 13 No. 21, pp. 8544-8547.
- S.Balakrishnan, Vinod K, B. Shaji. (2018). “Secured and Energy Efficient AODV Routing Protocol For Wireless Sensor Network”, International Journal of Pure and Applied Mathematics, Vol. 119, No. 10c, 2018, pp. 563-570.
- S.Balakrishnan, J.P.Ananth, L.Ramanathan, S.P.Premnath, (2018). “An Adaptive Energy Efficient Data Gathering In Wireless Sensor Networks”, International Journal of Pure and Applied Mathematics, Volume 118 No. 21, 2018, pp. 2501-2510.
- J.P.Ananth, S.Balakrishnan, S.P.Premnath, (2018). “Logo Based Pattern Matching Algorithm for Intrusion Detection System in Wireless Sensor Network”, International Journal of Pure and Applied Mathematics, Volume 119, No. 12, 2018, pp. 753-762.
- S.Balakrishnan, “Peer-To-Peer Central Registry Based Internet of Everything (IoE) Protocol”, CSI Communications magazine, Vol. 41, issue 4, July 2017, pp. 26-29.
- S.Balakrishnan, J. Janet, R. Sachinkanithkar, D. Reshma, “Technological Innovations for Agricultural Developments Through Information Communications Technology (ICT)”, CSI Communications magazine, Vol. 41, issue 6, September 2017, pp. 10-13.
- S.Balakrishnan, S.Sheeba Rani, K.C.Ramya, “Design and Development of IoT Based Smart Aquaculture System in a Cloud Environment”, International Journal of Oceans and Oceanography, ISSN 0973-2667, Volume 13, Number 1 (2019), pp. 121-127.
- J.Janet, S.Balakrishnan, S.Sheeba Rani, “IOT Based Fishery Management System”, International Journal of Oceans and Oceanography, ISSN 0973-2667, Volume 13, Number 1 (2019), pp. 147-152.
- J.Janet, S.Balakrishnan, S.Sheeba Rani, “IoT based lake and reservoir management system”, International Journal of Lakes and Rivers (IJLR), Vol. 12, Issue 1, (2019), pp. 21-25.
- S.Sheeba Rani, S.Balakrishnan, V.Kamatchi Sundari, K.C.Ramya, IoT Based Water Level Monitoring System for Lake in a Cloud Environment, International Journal of Lakes and Rivers (IJLR), Vol. 12, Issue 1, (2019), pp. 21-25. (WoS)
- R. Ram Vishnu, V. Nobin Pal, C. Narasimma Moorthy, S. Balakrishnan, “Arduino Based Smart Alarm Mobile Application System”, Jour of Adv Research in Dynamical & Control Systems. Vol. , 14-Special issue, 2018, pp. 1217-1223.
- Ranjeethapriya K, Susila N, Granty Regina Elwin, Balakrishnan S, “Raspberry Pi Based Intrusion Detection System”, International Journal of Pure and Applied Mathematics, Volume 119, No. 12, 2018, pp.1197-1205.
- K. Dasaradharami Reddy, S. Mohanraju, Dr.A. Jebaraj Ratnakumar, Dr.S. Balakrishnan, “Querying and Searching of Friendship Selection in the Social IoT, Jour of Adv Research in Dynamical & Control Systems. Vol.10, 11-Special issue, 2018, pp. 910- 914.
- V. Anandkumar, Kalaiarasan T R, S.Balakrishnan, “IoT Based Soil Analysis and Irrigation System”, International Journal of Pure and Applied Mathematics, Volume 119, No. 12, 2018, pp.1127-1134.