You don’t have to be a software engineer to understand the Internet of Things. Below you’ll find simple, non-technical explanations of key IoT concepts you need to know.
A Comprehensive Guide to IoT Protocols
03.11.2022 When network entities like servers, gateways, routers, applications, and connected devices interact, protocols give them a shared language. A protocol is a set of rules both network entities must have in common in order to communicate. It governs what their interactions look like, what values and attributes can be transmitted, how they’re received and processed, what security methods will be used, and more.
IPSec vs. OpenVPN: What’s the Difference?
The more distributed your devices or employees are, and the more valuable your data, the more critical it is that your data transmissions are encrypted and secure. You want your devices and users to have access to network resources without leaving the door open to hackers.
What Is OpenVPN?
With OpenVPN, you can remotely access a private network from anywhere. emnify leverages OpenVPN to help IoT manufacturers remotely access devices and securely transport data from the device.
What Is Transport Layer Security (TLS)?
As the name implies, Transport Layer Security is a protocol that gets implemented on the transport layer of a network to encrypt data transmitted via HTTP, FTP, XMPP, etc. TLS is typically implemented in conjunction with protocols like Transmission Control Protocol (TCP), which prioritizes accuracy over speed. However, in some cases it can be used with connection less protocols like User Datagram Protocol (UDP) - then using a slight variant called DTLS.
What Is Open Charge Point Protocol (OCPP)?
Why use OCPP? OCCP defines how charge stations and central management systems transmit commands like start and stop power, as well as diagnostic data such as how much power is being consumed or if there are any errors. By standardizing these transmissions, OCCP ensures that charge stations and central management systems from different suppliers can communicate.
What Is IPsec? Internet Protocol Security Explained
Internet Protocol Security (IPsec) is one of the key layers of protocols developers use to secure the exchange of data through a network. (If you wish to know more about protocols and IoT check out our Comprehensive Guide to IoT Protocols.)
What Is USSD? Unstructured Supplementary Service Data
USSD allows you to send small data packages without a data connection and without incurring SMS costs. It’s typically used for sending short requests and commands, and these messages can only contain a maximum of 182 characters (16 bits of data). USSD doesn’t support Multimedia Messages (MMS) like audio, video, or images.
What Is Transmission Control Protocol (TCP)?
Unlike User Datagram Protocol (UDP)—another standard that applications use to exchange data—TCP is designed for accuracy, not speed. In data transport, data packets can sometimes arrive out of order or get lost. TCP numbers each packet to ensure that every piece reaches its destination and can be rearranged if needed. When packets don’t arrive within a specified timeframe, Transmission Control Protocol requests re-transmission of the lost data.
What Is User Datagram Protocol (UDP)?
When higher-level protocols need to transmit data quickly, they rely on UDP to package and distribute that data over the Internet Protocol (IP). (If you wish to know more about protocols and IoT check out our Comprehensive Guide to IoT Protocols.)