Open Access   Article Go Back

Protocol Analysis in Internet of Things for deployment strategies

umanashree Y. S1 , Suresha 2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 211-217, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.211217

Online published on Jul 31, 2018

Copyright © Sumanashree Y. S, Suresha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sumanashree Y. S, Suresha, “Protocol Analysis in Internet of Things for deployment strategies,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.211-217, 2018.

MLA Style Citation: Sumanashree Y. S, Suresha "Protocol Analysis in Internet of Things for deployment strategies." International Journal of Computer Sciences and Engineering 6.7 (2018): 211-217.

APA Style Citation: Sumanashree Y. S, Suresha, (2018). Protocol Analysis in Internet of Things for deployment strategies. International Journal of Computer Sciences and Engineering, 6(7), 211-217.

BibTex Style Citation:
@article{S_2018,
author = {Sumanashree Y. S, Suresha},
title = {Protocol Analysis in Internet of Things for deployment strategies},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {211-217},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2418},
doi = {https://doi.org/10.26438/ijcse/v6i7.211217}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.211217}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2418
TI - Protocol Analysis in Internet of Things for deployment strategies
T2 - International Journal of Computer Sciences and Engineering
AU - Sumanashree Y. S, Suresha
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 211-217
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
507 321 downloads 189 downloads
  
  
           

Abstract

With the inventions and improvement in the technology, billions of devices continuously produce or generate data. On this basis, we have designed the technique, through which data was extracted or collected from different sources. The data from the respective source was standardized and utilized to respective situations to act upon. The proposed system uses Hyper Text Transfer Protocol (HTTP) and Message Queue Telemetry Transport (MQTT) as base protocols for communication across network. The performance of both the protocols were compared for respective action and situation across varied load conditions. Thus, based on the output, the protocol would selected for different cases.

Key-Words / Index Term

HTTP, INTERNET OF THINGS (IOT), MQTT

References

[1] J. Mineraud, O. Mazhelis, X. Su, And S. Tarkoma, A Gap Analysis of Internet-ofThings Platforms. Computer Communications, 89-90, 2016, 5-16. http://dx.doi.org/10.1016/j.comcom.2016.03.015
[2] K. Ashton, That “Internet of Things” Thing: In the Real World Things Matter More than Ideas. RFID Journal.2009 http://www.rfidjournal.com/articles/view?4986
[3] A. Mahizhnan, Smart Cities: The Singapore Case. Cities, 16,1999,13-18.http://lkyspp.nus.edu.sg/wp-content/uploads/2013/04/pa_Arun_Smart-Cities-The-Singapo re-Case_99.pdf http://dx.doi.org/10.1016/S0264-2751(98)00050-X
[4] Umer Ahsen,Abdul bais ,A Review on Big Data analysis and the Internet of Things,IEEE ,13th International conference on Mobile Ad Hoc and sensor Systems(MASS) ,pp 325-330,2016
[5] D. Evans,The Internet of Things: How the Next Evolution of the Internet Is Changing Everything, 2011. http://www.cisco.com/web/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
[6] J. Arias Fernández, et al., IoT-Framework. Product Report,UppsalaUniversity,2013. http://www.it.uu.se/edu/course/homepage/projektDV/ht13/ProductReport.FINAL.pdf
[7] Anusha Bharati, Ritika Thakur, Kavita Mhatre, Protection of Industrial and Residential areas by Wireless Gas Leakage Detector using IoT and WSN,
Isroset-Journal (IJSRCSE),Vol.5, Issue.3, pp.62-67,Jun-2017

[8] D. Bhattacharya, and M. Mitra, Analytics on Big Fast Data Using Real Time Stream Data Processing Architecture. EMC Proven Professional Knowledge Sharing, 2013.
[9] S.K. Dash, J.P. Sahoo, S. Mohapatra, and S.P. Pati, Sensor-Cloud: Assimilation of Wireless Sensor Network and the Cloud. In: Meghanathan, N., Chaki, N. and Nagamalai, D., Eds., Advances in Computer Science and Information Technology. Networks and Communications, S pringer, Berlin, 2012, 455-464. http://dx.doi.org/10.1007/978-3-642-27299-8_48
[10] A. Alamri, W.S. Ansari, M.M. Hassan, M.S. Hossain, A. Alelaiwi, and M.A. Hossain,) A Survey on Sensor-Cloud: Architecture, Applications, and Approaches. International Journal of Distributed Sensor Networks, 9, 2013, Article ID: 917923. http://dx.doi.org/10.1155/2013/917923
[11] A.S. Rozik, M.A. Tolba, El-Dosuky, Design and Implementation of the Sense Egypt Platform for Real-time Analysis of IOT Data Streams.Advances in Internet of Things,2016,6,65-91. http://www.scrip.org/journal/ait
[12] D. Bhattacharya, and M. Mitra, Analytics on Big Fast Data Using Real Time Stream Data Processing Architecture. EMC Proven Professional Knowledge Sharing, 2013.
[13] D.L. Hall, and J. Llinas, An Introduction to Multisensor Data Fusion. Proceedings of the IEEE, 85, 1997, 6-23. http://dx.doi.org/10.1109/5.554205
[14] F. Ganz, P. Barnaghi, and F. Carrez, Information Abstraction for Heterogeneous Real World Internet Data. IEEE Sensors Journal, 13, 2013, 3793-3805. http://dx.doi.org/10.1109/JSEN.2013.2271562
[15] M. Eid, R. Liscano, and A. El Saddik, (A Universal Ontology for Sensor Networks Data. IEEE International Conference on Computational Intelligence for Measurement Systems and Applications, Ostuni,27-29 June 2007, 59-62. http://dx.doi.org/10.1109/cimsa.2007.4362539
[16]P.Manickam,V.MuthuGaneshan,M.Girija ,Comprehenssive approach in Studying the behaviour of Contiki RPL Protocol in Diverse Data Transmission Ranges,International Journal on Scientific Research in Network Security and Communication.