Unit 3
Unit 3
TCP works with the Internet Protocol (IP), which defines how computers send packets of data to
each other. Together, TCP and IP are the basic rules that define the internet.
determines how to break application data into packets that networks can deliver;
sends packets to, and accepts packets from, the network layer;
manages flow control;
handles retransmission of dropped or garbled packets, as it's meant to provide error-free data
transmission; and
acknowledges all packets that arrive.
When a web server sends an HTML file to a client, it uses the hypertext transfer protocol
(HTTP) to do so. The HTTP program layer asks the TCP layer to set up the connection and send
the file. The TCP stack divides the file into data packets, numbers them and then forwards them
individually to the IP layer for delivery.
Although each packet in the transmission has the same source and destination IP address, packets
may be sent along multiple routes. The TCP program layer in the client computer waits until all
packets have arrived. It then acknowledges those it receives and asks for the retransmission of
any it does not, based on missing packet numbers. The TCP layer then assembles the packets into
a file and delivers the file to the receiving application.
What TCP is used for
TCP is used for organizing data in a way that ensures the secure transmission between the server
and client. It guarantees the integrity of data sent over the network, regardless of the amount. For
this reason, it is used to transmit data from other higher-level protocols that require all
transmitted data to arrive.
Secure Shell (SSH), File Transfer Protocol (FTP), Telnet: For peer-to-peer file sharing,
and, in Telnet's case, logging into another user's computer to access a file.
Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), Internet Message
Access Protocol (IMAP): For sending and receiving email.
HTTP: For web access.
These examples all exist at the application layer of the TCP/IP stack and send data downwards to
TCP on the transport layer.
2. Internet Layer
It is the second layer of the TCP/IP model and this layer is parallel to the Network Layer
of the OSI Model, in terms of the structure
Sending the data packets to their destination network is the main function of the Internet
layer
The logical transmission of data takes place at this level
There are three different protocols used in this layer. These include:
IP: One of the most important protocols as it detects the IP address of a device
which is later used for internetwork connections. It is using this protocol that the
path with which the data shall be transmitted is decided. There are two common
IP versions which are used, To know the difference between IPv4 and IPv6, visit
the linked article.
ARP: It stands for Address Resolution Protocol. The physical address from the IP
address can be determined using ARP.
ICMP: It stands for Internet Control Message Protocol and notification regarding
datagram problems can be sent back to the user using this. Any issue with the
network is immediately notified to the user by ICMP. It can only inform the user
about the errors and cannot rectify the problem.
3. Host-To-Host Layer
4. Application Layer
The topic three layers of the OSI Model: Application, Presentation and Sessions, when
combined together, they perform similar functions as the Application Layer of the
TCP/IP model
node-to-node communication based on the user-interface occurs here
Multiple protocols are present in this layer, a few common ones have been mentioned
below in brief:
As the name implies, a three-way handshake requires three different interactions, which
come in the form of three messages: SYN→SYN-ACK→ACK.
The first is the SYN segment. The sending device sends out a SYN (synchronized
sequence number) message to try to communicate with the receiving computer. It is
trying to say, "Hello! Are you available to make a connection? "
When this happens, the sending device sends an ACK segment to the receiving device,
telling it that it has acknowledged its message. Then a connection is formed, and it begins
to transfer data. When the data transmission has been confirmed and completed, the
connection is ended.
Applications of UDP:
Used for simple request-response communication when the size of data is less and
hence there is lesser concern about flow and error control.
It is a suitable protocol for multicasting as UDP supports packet switching.
UDP is used for some routing update protocols like RIP(Routing Information Protocol).
Normally used for real-time applications which can not tolerate uneven delays between
sections of a received message.
Following implementations uses UDP as a transport layer protocol:
NTP (Network Time Protocol)
DNS (Domain Name Service)
BOOTP, DHCP.
NNP (Network News Protocol)
Quote of the day protocol
TFTP, RTSP, RIP.
The application layer can do some of the tasks through UDP-
Trace Route
Record Route
Timestamp
UDP takes a datagram from Network Layer, attaches its header, and sends it to the
user. So, it works fast.
Actually, UDP is a null protocol if you remove the checksum field.
1. Reduce the requirement of computer resources.
2. When using the Multicast or Broadcast to transfer.
3. The transmission of Real-time packets, mainly in multimedia applications.
o Connectionless
The UDP is a connectionless protocol as it does not create a virtual path to transfer
the data. It does not use the virtual path, so packets are sent in different paths
between the sender and the receiver, which leads to the loss of packets or received
out of order.
In the case of UDP, the datagrams are sent in some order will be received in the
same order is not guaranteed as the datagrams are not numbered.
o Ports
The UDP protocol uses different port numbers so that the data can be sent to the
correct destination. The port numbers are defined between 0 and 1023.
o Faster transmission
o Acknowledgment mechanism
The UDP does have any acknowledgment mechanism, i.e., there is no handshaking
between the UDP sender and UDP receiver. If the message is sent in TCP, then the
receiver acknowledges that I am ready, then the sender sends the data. In the case
of TCP, the handshaking occurs between the sender and the receiver, whereas in
UDP, there is no handshaking between the sender and the receiver.
Each UDP segment is handled individually of others as each segment takes different
path to reach the destination. The UDP segments can be lost or delivered out of
order to reach the destination as there is no connection setup between the sender
and the receiver.
o Stateless
It is a stateless protocol that means that the sender does not get the
acknowledgement for the packet which has been sent.
UDP Header Format
In UDP, the header size is 8 bytes, and the packet size is upto 65,535 bytes. But this packet
size is not possible as the data needs to be encapsulated in the IP datagram, and an IP
packet, the header size can be 20 bytes; therefore, the maximum of UDP would be 65,535
minus 20. The size of the data that the UDP packet can carry would be 65,535 minus 28 as 8
bytes for the header of the UDP packet and 20 bytes for IP header.
o Source port number: It is 16-bit information that identifies which port is going t
send the packet.
o Destination port number: It identifies which port is going to accept the
information. It is 16-bit information which is used to identify application-level service
on the destination machine.
o Length: It is 16-bit field that specifies the entire length of the UDP packet that
includes the header also. The minimum value would be 8-byte as the size of the
header is 8 bytes.
o Checksum: It is a 16-bits field, and it is an optional field. This checksum field checks
whether the information is accurate or not as there is the possibility that the
information can be corrupted while transmission. It is an optional field, which means
that it depends upon the application, whether it wants to write the checksum or not.
If it does not want to write the checksum, then all the 16 bits are zero; otherwise, it
writes the checksum. In UDP, the checksum field is applied to the entire packet, i.e.,
header as well as data part whereas, in IP, the checksum field is applied to only the
header field.
Limitations
o It provides an unreliable connection delivery service. It does not provide any services
of IP except that it provides process-to-process communication.
o The UDP message can be lost, delayed, duplicated, or can be out of order.
o It does not provide a reliable transport delivery service. It does not provide any
acknowledgment or flow control mechanism. However, it does provide error control
to some extent.
UDP is faster but less reliable than TCP, another common transport protocol. In a
TCP communication, the two computers begin by establishing a connection via an
automated process called a ‘handshake.’ Only once this handshake has been
completed will one computer actually transfer data packets to the other.
UDP communications do not go through this process. Instead, one computer can
simply begin sending data to the other:
M2M and WSN Protocols
WP6 -
WP3 - Protocol suite Requirements,
Validations &
Stakeholder Interaction
WP4 -
Resolution & Identification
WP5 -
IoT Object Platforms
IP STACK
Application 1 Application 2 Application 3 Application 4
TCP/UDP
IP/ICMP
NEMO:
NEMO is an extension of Mobile IP that enables an entire network to change its
attachment point to the Internet. NEMO works by moving the mobility functionality
from Mobile IP mobile nodes to a moving network’s router. The router is able to change
its attachment point to the Internet in a manner that is transparent to attached nodes.
SENSINODE provides embedded net- working software and hardware products based
on IP-based 6LoWPAN technology for demanding enterprise applications.
NanoStack 2.0 is an advanced 6LoWPAN protocol stack software product for 2.4 GHz
radios. The NanoRouter™ 2.0 platform includes software and hardware solutions for
6LoWPAN-Internet routing infrastructure.
M2M Standardization Task Force (MSTF)
The high-level M2M architecture from MSTF does include fixed and other noncellular
wireless networks, which means it’s a generic, holistic IoT architecture even though it is called
M2M architecture
This is a more comprehensive approach than the 3GPP’s MTC effort
Considering 3GPP is only one of the SDOs in the MSTF, this makes sense and good results
are much anticipated from MSTF
Other M2M standards activities include the following:
IEEE 1451 is a set of smart transducer interface standards developed by the IEEE
Instrumentation and Measurement Society’s Sensor Technology Technical Committee that
describe a set of open, common, network-independent communication interfaces for
connecting transducers (sensors or actuators) to microprocessors, instrumentation systems,
and control/field networks. One of the key elements of these standards is the definition of
transducer electronic data sheets (TEDS) for each transducer. The TEDS is a memory
device attached to the transducer, which stores transducer identification, calibration,
correction data, and manufacturer-related information.
Cross-network (e.g., between Bluetooth and ZigBee) stan- dards are not as
proliferate in the WSN community com- pared to other computing systems, which
make most WSN systems incapable of direct communication with each other.
The Semantic Sensor Web (SSW) is an approach to annotating sensor data with
spatial, temporal,
OGC SWE (Sensor Web Enablement).
■SWE Common—common data models and schema
■SensorML—models and schema for sensor systems and processes surrounding
measurements
■Observations & Measurements (O&M)—models and schema for packaging
observation values
■Transducer Markup Language (TML)—models and schema for multiplexed
data from sensor systems
What is SCADA ?
• SCADA is normally a software package designed to display information, log data
and show alarms.
• This can be graphical and tabular and can involve words and pictures (or mimics).
• The software would normally be installed on a computer and all the various signals
would be wired back to the central point (CPU), or marshalled and gathered using some
form of bus system or direct wired.
SCADA protocols
• Modbus – A widely used protocol for connecting industrial electronic devices.
• DNP3 (Distributed Network Protocol 3) – Used in power and water utility systems.
• IEC 60870-5-104 – Common in European electrical grids.
• IEC 61850 – Used for substation automation.
• OPC UA (Open Platform Communications Unified Architecture) – A modern,
secure protocol for interoperability between industrial devices.
• Profibus/Profinet – Industrial automation protocols for field devices.
• MQTT (Message Queuing Telemetry Transport) – A lightweight IoT-friendly
protocol for SCADA applications.
• BACnet – Used in building automation systems.
SCADA software had the greatest impact for the transition from DDE (dynamic
data Exchange) to OPC OLE(object linking and embedding ) for process control
application.
OPC was designed to provide a common bridge for windows based software
applications and process control hardware.
What is RFID technology and how does it work?
An RFID or radio frequency identification system consists of two main components, a
tag attached to the object to be identified, and a reader that reads the tag.
A reader consists of a radio frequency module and an antenna that generates a
high frequency electromagnetic field. Whereas the tag is usually a passive device (it
does not have a battery). It consists of a microchip that stores and processes
information, and an antenna for receiving and transmitting a signal.
When the tag is brought close to the reader, the reader generates an
electromagnetic field. This causes electrons to move through the tag’s antenna and
subsequently powers the chip.
It defines two types of contactless cards one allows for communications at distances up
to 10 cm.
An alternative standard for contactless smart cards is ISO/IEC 15693 which allows
communications at distances up to 50 cm.
1. ISO 14443 (NFC Standard)
Type: Contactless smart card protocol.
Features:
Supports Near Field Communication (NFC).
Works at 13.56 MHz frequency.
Usage: Payment cards (Visa, Mastercard), mobile payments.
2. ISO 15693
Type: HF RFID standard for long-range applications.
Features:
Supports reading at distances up to 1.5 meters.
Usage: Library book tracking, medical device tracking.
A part from the standardization efforts that can be categorized as one of four pillars there are
also standardization efforts from major vertical IOT application such as smart grid and
telematics.
Even though some of the IOT standard organizations have cooperation and interaction.
The following two issues for the IOT standardization in particular and the ICT
standardization.
1. IOT standardization is a highly decentralized activity. How can the individual activities
of the network of extremely heterogeneous standards.
2. It will become essential to allow all interested stakeholders to participate in the
standardization process toward the IOT and to voice their respective requirements and
concerns.
1. Lack of Universal Standards
Different organizations (IEEE, ISO, IETF, W3C, etc.) define IoT protocols independently.
No single global authority governs IoT standards.
Devices from different manufacturers may not communicate seamlessly.
Example:
Zigbee and Z-Wave are both IoT wireless protocols, but they are not compatible with each
other.
2. Security and Privacy Challenges
No standardized security framework across all IoT devices.
Weak encryption and authentication mechanisms in many IoT devices.
Privacy risks due to data collection from connected devices.
Example:
Smart home devices often lack end-to-end encryption, making them vulnerable to
hacking.
3. Interoperability Issues
IoT devices use different communication protocols (MQTT, CoAP, HTTP, OPC UA).
Varying network technologies (Wi-Fi, Bluetooth, LoRaWAN, NB-IoT) cause compatibility
problems.
Example:
A smart thermostat using Zigbee cannot directly communicate with a smart light bulb using
Wi-Fi.
4. Fragmented Communication Protocols
IoT devices operate on different network layers (LPWAN, cellular, Wi-Fi, etc.).
No unified protocol for seamless communication.
Example:
LoRaWAN (Long Range Wide Area Network) is good for long-distance IoT applications,
but it doesn’t work well with Bluetooth Low Energy (BLE).
The only, or at least better, possible solution to address these chaotic situations is to try
to standardize the omni present middleware and the XML-based data representation
from across-industry
organizations such as World Wide Web Consortium (W3C),
Organization for the Advancement of Structured Information Standards (OASIS), and
others
OASIS and W3C are web-oriented standard organizations.
Their expertise makes them capable of doing high-level, segment-independent
WoT standardization.
Potential Solutions for IoT Standardization
1. Develop Global IoT Standards – IEEE, ISO, and IETF must work together to create
universal frameworks.
2. Use Open-Source Protocols – Encourage adoption of MQTT, CoAP, and OPC UA to
improve interoperability.
3. Implement Strong Security Frameworks – Enforce encryption, authentication, and data
privacy policies.
4. Adopt Unified Data Models – Define a common data structure to improve device
compatibility.
5. Governments and Industry Collaboration – Establish regulatory bodies to ensure IoT
compliance worldwide.