CSF117 Module 2 IoT Protocol Stack

Thumbnail Image
Journal Title
Journal ISSN
Volume Title
Welcome to the IoT Protocol Stack module of the IoT and Security course. This module aims to facilitate learning of basic concepts of IoT in the topics of IoT fundamentals, IOT Architecture, Platforms for IoT, Components of an IoT Solution, IoT protocol stacks, IoT technologies, and Challenges in IOT;
Hello and welcome to the IoT Protocol Stack module. Here we will learn about the layers that compose the IoT protocol stack. The purpose of the IoT protocol stack is to abstract the communication of a signal from a device all the way to the eventual destination, such as a cloud based repository, in an easy to understand and use manner. An analogy to this is the OSI model of computer network communication. We will learn of the four layers of the IoT protocol stack and experience what happens in each layer. Also we will look at the popularly used IoT network communication protocols that include Wi-Fi, BlueTooth, ZigBee, LoRaWAN, LTE CAT 1, LTE CAT M1. We will conclude this module by looking at the Challenges facing IoT. These challenges include security, privacy, standards, regulation, powering devices, bandwidth and network coverage and device compatibility. The magnitude of any of these challenges will depend on the specific IoT solution and its operating environment. The IoT Protocol stack is said to be responsible for providing quality and reliability as well as the management of error correction to the end user. It can be said to be made up of software and hardware layers. IoT Protocols enable the sending and receiving error corrected data in the form of packets and messages over a network. At the same time, IoT protocols are the network components that allows multiplexing. That way, IoT protocol stack sits between data production from sensors to data consumption by humans of other IoTs. When creating an IoT product, it is important to take advantage of the different features of the several IoT protocols. Such advantages include low energy consumption and therefore good battery life, high security, scalability and so on.