The overriding goal of this session is to help prepare the design of an IoT system starting with the device, up to the Cloud and other components between them.
Embedded systems using sensors and connectivity are not new to embedded developers. Using these elements with multiple additional Internet technologies is. Adding these new system requirements to constrained devices is a challenge. In this presentation, we will spend more time looking at the impact of specific IoT protocols.
There many IP protocols competing to become IoT protocols. We can list:
For each of these IP protocols, there are pros and cons:
Pros:
o Network bandwidth required to use the protocol
o Processor resources needed to run the protocol
o Typical payload
o Typical latency (typical real-timeness of the protocol)
o Security requirements (firewall issues, others)
o State the SDO supporting the protocol and the standard number when available (ex. IETF RFC for COAP).
Cons:
o Why and when not to use it
Use cases : some vertical markets examples
The presentation will go over these protocols and provide use cases for each one.
At the end of the presentation, a product developer should be able to take a decision on which protocol is best suited for his application.