Analysis of IoT Communication Layers, Protocols, and Design Approaches
VerifiedAdded on 2023/01/11
|9
|2106
|21
Report
AI Summary
This report provides an in-depth analysis of communication layers, protocols, and design approaches within the context of the Internet of Things (IoT) and the Internet of Everything (IoE). It begins by outlining the functions of the business, application, processing, transport, and perception layers, illustrating their roles in managing and processing data within an IoT system. The report then explores the components of an IoT system, including connectivity, data processing, and user interfaces, with examples. The report also delves into messaging protocols such as MQTT, CoAP, AMQP, and HTTP, with a detailed examination of MQTT, including its relation to IoT, its workings, and comparisons to HTTP. Furthermore, the report addresses privacy issues and challenges associated with MQTT. It also evaluates different wireless communication technologies used in IoT devices, including ZigBee, Wi-Fi, WiMax, and Bluetooth/BLE, and explains the workings of I2C and SPI protocols. The report concludes with a comprehensive overview of various technologies and their applications in IoT systems.

Designing and Developing Products
for the Internet of Everything IoE
1
for the Internet of Everything IoE
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
TASK 1 Communication Layer.......................................................................................................3
TASK 2 Design Approach...............................................................................................................5
TASK 3 Communication Protocol...................................................................................................6
REFERENCES................................................................................................................................8
2
TASK 1 Communication Layer.......................................................................................................3
TASK 2 Design Approach...............................................................................................................5
TASK 3 Communication Protocol...................................................................................................6
REFERENCES................................................................................................................................8
2

TASK 1 Communication Layer
Q.1 Outline the function of five layers such as business, application, processing, transport and
perception layer.
The communication layer is mainly defined the idea of internet of things but it is
sufficient for research on the IOT because it often focus on the final aspects of system. There are
various function of five different layers that can easily manage the entire processing of IOT
system.
Functions
The business layer manage the entire IOT system which include applications, enterprise
and profit model. In order to maintain the user’s privacy while increasing scope of entire
system.
The processing layer is known as middleware layer that perform task to store, analyse
and process large amount of data or information. it comes from the transport layer. In
order to provide the diverse set of services to lower layers (Zieliński, 2015). In most of
cases, it can emerge with various technologies such as big data processing, cloud
computing and databases.
The transport layer transfer the sensor data or information from perception layer and
established the connection with multiple devices such as 3G, Bluetooth, NFC and RFID.
The Perception layer is consider as physical layer which has sensors for sensing and
collecting large information about environment (Iannacci, 2018). Sometimes, it sense
come with various physical parameter and identify suitable objective.
The application layer is responsible for delivering the application within specific service
to another user. In this way, it can be defined multiple application in which IOT can be
deployed.
3
Q.1 Outline the function of five layers such as business, application, processing, transport and
perception layer.
The communication layer is mainly defined the idea of internet of things but it is
sufficient for research on the IOT because it often focus on the final aspects of system. There are
various function of five different layers that can easily manage the entire processing of IOT
system.
Functions
The business layer manage the entire IOT system which include applications, enterprise
and profit model. In order to maintain the user’s privacy while increasing scope of entire
system.
The processing layer is known as middleware layer that perform task to store, analyse
and process large amount of data or information. it comes from the transport layer. In
order to provide the diverse set of services to lower layers (Zieliński, 2015). In most of
cases, it can emerge with various technologies such as big data processing, cloud
computing and databases.
The transport layer transfer the sensor data or information from perception layer and
established the connection with multiple devices such as 3G, Bluetooth, NFC and RFID.
The Perception layer is consider as physical layer which has sensors for sensing and
collecting large information about environment (Iannacci, 2018). Sometimes, it sense
come with various physical parameter and identify suitable objective.
The application layer is responsible for delivering the application within specific service
to another user. In this way, it can be defined multiple application in which IOT can be
deployed.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 1 Communication Layers
Q2. Identify the role of components in working of IoT system starting from connectivity, data
processing and user interface with example.
The internet of things is basically network of physical objects such as sensors/devices,
connectivity, data processing, user interface and so on.
First Sensor or device help in gathering data from the surrounding environment. A device
can have various sensors that can bundle together to do more than just sense things.
Connectivity is another step for sending the collection of data to cloud infrastructure but it
will require the medium for transport (Miraz, Ali and Picking, 2018). The sensors can be
connected with the cloud through medium of communication and transports such as cellular
networks, Wi-Fi Bluetooth.
Once data is collected and get to cloud, software performs processing on the acquired data.
It is the simplest way to check entire temperature. Furthermore, User interface made available to
end user in different ways. In order to achieve by triggering alarm on the phone and provide
notification through email.
4
Q2. Identify the role of components in working of IoT system starting from connectivity, data
processing and user interface with example.
The internet of things is basically network of physical objects such as sensors/devices,
connectivity, data processing, user interface and so on.
First Sensor or device help in gathering data from the surrounding environment. A device
can have various sensors that can bundle together to do more than just sense things.
Connectivity is another step for sending the collection of data to cloud infrastructure but it
will require the medium for transport (Miraz, Ali and Picking, 2018). The sensors can be
connected with the cloud through medium of communication and transports such as cellular
networks, Wi-Fi Bluetooth.
Once data is collected and get to cloud, software performs processing on the acquired data.
It is the simplest way to check entire temperature. Furthermore, User interface made available to
end user in different ways. In order to achieve by triggering alarm on the phone and provide
notification through email.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

TASK 2 Design Approach
Q3. Four widely accepted and emerging messaging protocols for IoT system such as MQTT,
CoAP, AMQP and HTTP.
a). identify the relation to the messaging protocol MQTT for IoT and how it works.
MQTT is based on the publish/subscribe protocol that allows for network device to
publish to a broker. It has been established the connection with broker and perform a role as
mediate communication between two devices (Schatten, Ševa and Tomičić, 2016). When another
way in which client publishes a message on subscribed. MQTT has established the relation to
access IOT data. It brings benefits to the processes.
MQTT is bidirectional which publish a message on subscribed and maintain the stateful
session awareness. It make possible to increase the large amount of data which being monitored
and controlled. It is mainly severed that any authorized client in the system that can publish new
value back to edge of network device.
b). Comparison between the two transport protocol.
MQTT HTTP
It is based on the data centric
MQTT is a term lightweightness and
public/ subscribe the model which
make as perfect for resource
constrained device (Tucker, Bulim
and North, 2018).
MQTT protocol ensure high delivery
guarantees.
It encrypts payload.
It is based on the document centric.
HTTP is performed request and
response protocol for client or server
computing.
HTTP protocol is not ensure high
delivery guarantees.
Data cannot be encrypted before
transmission.
Table: 1
c). Finding the privacy issue and other challenges with use of MQTT.
Message queuing telemetry transport is a communication protocol that widely used in
IOT deployments. MQTT is consider as publish-subscribe protocol that provide facilitates one to
many communication by Broker (Voell, Chatterjee and Golovatchev, 2018). In term of privacy,
internet wide scan can be exposed with MQTT endpoints but it has increased the security issue.
5
Q3. Four widely accepted and emerging messaging protocols for IoT system such as MQTT,
CoAP, AMQP and HTTP.
a). identify the relation to the messaging protocol MQTT for IoT and how it works.
MQTT is based on the publish/subscribe protocol that allows for network device to
publish to a broker. It has been established the connection with broker and perform a role as
mediate communication between two devices (Schatten, Ševa and Tomičić, 2016). When another
way in which client publishes a message on subscribed. MQTT has established the relation to
access IOT data. It brings benefits to the processes.
MQTT is bidirectional which publish a message on subscribed and maintain the stateful
session awareness. It make possible to increase the large amount of data which being monitored
and controlled. It is mainly severed that any authorized client in the system that can publish new
value back to edge of network device.
b). Comparison between the two transport protocol.
MQTT HTTP
It is based on the data centric
MQTT is a term lightweightness and
public/ subscribe the model which
make as perfect for resource
constrained device (Tucker, Bulim
and North, 2018).
MQTT protocol ensure high delivery
guarantees.
It encrypts payload.
It is based on the document centric.
HTTP is performed request and
response protocol for client or server
computing.
HTTP protocol is not ensure high
delivery guarantees.
Data cannot be encrypted before
transmission.
Table: 1
c). Finding the privacy issue and other challenges with use of MQTT.
Message queuing telemetry transport is a communication protocol that widely used in
IOT deployments. MQTT is consider as publish-subscribe protocol that provide facilitates one to
many communication by Broker (Voell, Chatterjee and Golovatchev, 2018). In term of privacy,
internet wide scan can be exposed with MQTT endpoints but it has increased the security issue.
5

There will be no specific security configuration in home devices. In this way, it has rapidly
increasing the problem or issue. In this way, it also outlined the design issues and
implementation of vulnerabilities which contribute to the number of unsecure deployment. For
instance, it allows a malicious client to supply the invalid data or information. Therefore,
attacker can increase client to be flooded with similar message over.
On the other hand, unsecure end point can expose record and leak information. Vulnerable
endpoint can also running the risk related the denial of service attacks.
TASK 3 Communication Protocol
a). Explain and evaluate the four different type of wireless communication technologies used in
IoT devices.
Wireless communication plays significant role in their day to day life. Beside, wireless
technology has become integral part which provide the facility to transmit data from one node to
another. It provide exchange of information without any conduction through RF radio signals. In
order to share information across the device over some meter to hundreds (Miraz and et.al.,
2015). In recently, it is gaining traction in the LPWAN group and designed specifically to be
used in the networks.
There are different types of wireless communication technologies used in the internet of
things devices.
ZigBee: it is a type of wireless technology that mainly used to establish the connection
between sender and receiver side. It is inexpensive to run and does not require a lot of
power which making as an ideal solution for industrial applications (Charmonman and
Mongkhonvanit, 2015). The ZigBee Protocol offer 128 bit encryption technique which
allows node to be connected together through various pathways. The ability of
technology is to connect with multiple devices together simultaneously.
Wi-Fi: It is one of most commonly used technology that allows two devices to
communicate with one another (Voell, Chatterjee and Golovatchev, 2018). It is useful for
establish the connection with router to device such as phone, computers and tablets. It is
running the local wireless network that runs of 802.11 standards.
WiMax: it stands for worldwide interoperability for Microwave access. This technology
allows for transferring at rate of 30 to 40 megabits per second. It is a term that refer
specifically to interoperable implementation of wireless (Voell, Chatterjee and
6
increasing the problem or issue. In this way, it also outlined the design issues and
implementation of vulnerabilities which contribute to the number of unsecure deployment. For
instance, it allows a malicious client to supply the invalid data or information. Therefore,
attacker can increase client to be flooded with similar message over.
On the other hand, unsecure end point can expose record and leak information. Vulnerable
endpoint can also running the risk related the denial of service attacks.
TASK 3 Communication Protocol
a). Explain and evaluate the four different type of wireless communication technologies used in
IoT devices.
Wireless communication plays significant role in their day to day life. Beside, wireless
technology has become integral part which provide the facility to transmit data from one node to
another. It provide exchange of information without any conduction through RF radio signals. In
order to share information across the device over some meter to hundreds (Miraz and et.al.,
2015). In recently, it is gaining traction in the LPWAN group and designed specifically to be
used in the networks.
There are different types of wireless communication technologies used in the internet of
things devices.
ZigBee: it is a type of wireless technology that mainly used to establish the connection
between sender and receiver side. It is inexpensive to run and does not require a lot of
power which making as an ideal solution for industrial applications (Charmonman and
Mongkhonvanit, 2015). The ZigBee Protocol offer 128 bit encryption technique which
allows node to be connected together through various pathways. The ability of
technology is to connect with multiple devices together simultaneously.
Wi-Fi: It is one of most commonly used technology that allows two devices to
communicate with one another (Voell, Chatterjee and Golovatchev, 2018). It is useful for
establish the connection with router to device such as phone, computers and tablets. It is
running the local wireless network that runs of 802.11 standards.
WiMax: it stands for worldwide interoperability for Microwave access. This technology
allows for transferring at rate of 30 to 40 megabits per second. It is a term that refer
specifically to interoperable implementation of wireless (Voell, Chatterjee and
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Golovatchev, 2018). WiMax technology is basically used with various mobile carriers
and deliver the wireless data to the specific customers. Therefore, it can be delivered the
data through high speed by using LTE 4G networks.
Bluetooth/BLE: It is another type of wireless technology that mainly used to transfer data
over short distance. It is frequently used in the small and also assume the device for
purpose connection establishment among devices (Charmonman and Mongkhonvanit,
2015). For instance, there are various speaker used technology. BLE perform the
significant role to pick up stream and commonly introduced in the mobile phones.
b). Understand working of I2C and SPI protocol.
I2C is a serial communication protocol that mainly used to transfer data in the format of
bits along with single wire. In this protocol, the output of bits is synchronized to sampling of bits.
It is clock signals shared between the master and slave. It can be possible when communication
between many devices through I2C protocol (Charmonman and Mongkhonvanit, 2015). Each
and every device has present ID as well as unique device address. In order to select the better
device for purpose of communication. In I2C protocol, the data signal can easily transferred in
the sequence of 8-bits. Afterwards, it can start with condition occurs comes 8 bits sequence
which indicate the address of slave.
After each 8 bit sequence which follows the bit called knowledge. The first acknowledge bit in
the most comes another addressing sequence but it has an internal registers of slave device.
Serial Peripheral Interface: it is to be consider as interface bus which commonly used to
send data between small peripherals and microcontroller (Voell, Chatterjee and Golovatchev,
2018). It consists of serial port because there is no such control over when data transmitted from
one node to another. Since, hardware devices normally rely on everything being synchronized
through single clock (Voell, Chatterjee and Golovatchev, 2018). Asynchronous serial work with
proper format but it has required the lot of extra start, automatically stop bits send with every
bite.
7
and deliver the wireless data to the specific customers. Therefore, it can be delivered the
data through high speed by using LTE 4G networks.
Bluetooth/BLE: It is another type of wireless technology that mainly used to transfer data
over short distance. It is frequently used in the small and also assume the device for
purpose connection establishment among devices (Charmonman and Mongkhonvanit,
2015). For instance, there are various speaker used technology. BLE perform the
significant role to pick up stream and commonly introduced in the mobile phones.
b). Understand working of I2C and SPI protocol.
I2C is a serial communication protocol that mainly used to transfer data in the format of
bits along with single wire. In this protocol, the output of bits is synchronized to sampling of bits.
It is clock signals shared between the master and slave. It can be possible when communication
between many devices through I2C protocol (Charmonman and Mongkhonvanit, 2015). Each
and every device has present ID as well as unique device address. In order to select the better
device for purpose of communication. In I2C protocol, the data signal can easily transferred in
the sequence of 8-bits. Afterwards, it can start with condition occurs comes 8 bits sequence
which indicate the address of slave.
After each 8 bit sequence which follows the bit called knowledge. The first acknowledge bit in
the most comes another addressing sequence but it has an internal registers of slave device.
Serial Peripheral Interface: it is to be consider as interface bus which commonly used to
send data between small peripherals and microcontroller (Voell, Chatterjee and Golovatchev,
2018). It consists of serial port because there is no such control over when data transmitted from
one node to another. Since, hardware devices normally rely on everything being synchronized
through single clock (Voell, Chatterjee and Golovatchev, 2018). Asynchronous serial work with
proper format but it has required the lot of extra start, automatically stop bits send with every
bite.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

One unique benefits of SPI is that when data can be transferred without any interruption. A
large number of bits can be sent or receive in proper manner. Hardware devices communicating
through SPI which consider as master-slave relationship. It is controlling the device whereas
slave takes instruction from master.
8
large number of bits can be sent or receive in proper manner. Hardware devices communicating
through SPI which consider as master-slave relationship. It is controlling the device whereas
slave takes instruction from master.
8

REFERENCES
Book and Journals
Charmonman, S. and Mongkhonvanit, P., 2015, November. Special consideration for big data in
IoE or Internet of Everything. In 2015 13th International Conference on ICT and
Knowledge Engineering (ICT & Knowledge Engineering 2015) (pp. 147-150). IEEE.
Iannacci, J., 2018. Internet of things (IoT); internet of everything (IoE); tactile internet; 5G–A
(not so evanescent) unifying vision empowered by EH-MEMS (energy harvesting
MEMS) and RF-MEMS (radio frequency MEMS). Sensors and Actuators A: Physical.
272. pp.187-198.
Miraz, M.H. and et.al., 2015, September. A review on Internet of Things (IoT), Internet of
everything (IoE) and Internet of nano things (IoNT). In 2015 Internet Technologies and
Applications (ITA) (pp. 219-224). IEEE.
Miraz, M.H., Ali, M., Excell, P.S. and Picking, R., 2018. Internet of Nano-Things, things and
everything: Future growth trends. Future Internet. 10(8). p.68.
Schatten, M., Ševa, J. and Tomičić, I., 2016. A roadmap for scalable agent organizations in the
internet of everything. Journal of Systems and Software. 115. pp.31-41.
Tucker, K., Bulim, J. and North, M.M., 2018. Internet industry: A perspective review through
internet of things and internet of everything. International Management Review. 14(2).
p.26.
Voell, C., Chatterjee, P.. and Golovatchev, J., 2018, July. How digital twins enable the next level
of PLM–A guide for the concept and the implementation in the Internet of Everything
Era. In IFIP International Conference on Product Lifecycle Management (pp. 238-249).
Springer, Cham.
Zieliński, J.S., 2015. Internet of Everything (IoE) in smart grid. Przegląd Elektrotechniczny.
91(3). pp.157-159.
9
Book and Journals
Charmonman, S. and Mongkhonvanit, P., 2015, November. Special consideration for big data in
IoE or Internet of Everything. In 2015 13th International Conference on ICT and
Knowledge Engineering (ICT & Knowledge Engineering 2015) (pp. 147-150). IEEE.
Iannacci, J., 2018. Internet of things (IoT); internet of everything (IoE); tactile internet; 5G–A
(not so evanescent) unifying vision empowered by EH-MEMS (energy harvesting
MEMS) and RF-MEMS (radio frequency MEMS). Sensors and Actuators A: Physical.
272. pp.187-198.
Miraz, M.H. and et.al., 2015, September. A review on Internet of Things (IoT), Internet of
everything (IoE) and Internet of nano things (IoNT). In 2015 Internet Technologies and
Applications (ITA) (pp. 219-224). IEEE.
Miraz, M.H., Ali, M., Excell, P.S. and Picking, R., 2018. Internet of Nano-Things, things and
everything: Future growth trends. Future Internet. 10(8). p.68.
Schatten, M., Ševa, J. and Tomičić, I., 2016. A roadmap for scalable agent organizations in the
internet of everything. Journal of Systems and Software. 115. pp.31-41.
Tucker, K., Bulim, J. and North, M.M., 2018. Internet industry: A perspective review through
internet of things and internet of everything. International Management Review. 14(2).
p.26.
Voell, C., Chatterjee, P.. and Golovatchev, J., 2018, July. How digital twins enable the next level
of PLM–A guide for the concept and the implementation in the Internet of Everything
Era. In IFIP International Conference on Product Lifecycle Management (pp. 238-249).
Springer, Cham.
Zieliński, J.S., 2015. Internet of Everything (IoE) in smart grid. Przegląd Elektrotechniczny.
91(3). pp.157-159.
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.