Which IoT protocol should you use for your design?
Rudy Ramos, Mouser Electronics
embedded.com (November 03, 2016)
One thing is for certain when it comes to designing an IoT (Internet of Things) device; it won't be standalone. Unlike the way most traditional embedded devices have been developed in the past, such as the old-style digital thermostat I have in my hallway, IoT devices will always feature some form of communication. In the majority of cases, this will be wireless-based, and the key determining factors in the selection of the way it will communicate will be the required range, the amount of data to be transferred, and the available power budget.
Thus, embedded developers will now find themselves needing to delve into the world of communication protocols, standards, and wireless specifications. Understanding wireless design is a specialist subject in itself; thankfully, the availability of a range of pre-certified, type-approved wireless modules greatly simplifies the task.
The first step in determining which protocol to use for your IoT device is to take a step back and review the OSI 7-layer model. Getting the terminology right and using this model as a way of understanding which protocol method fits where can help. Appreciating the role of the different layers (e.g., physical, transport, network) and their correlation to the task at hand (e.g., communications, data exchange, device management) helps to put everything into context.
To read the full article, click here
Related Semiconductor IP
- Bluetooth Low Energy 6.0 Digital IP
- Ultra-low power high dynamic range image sensor
- Flash Memory LDPC Decoder IP Core
- SLM Signal Integrity Monitor
- Digital PUF IP
Related White Papers
- Three Design Aspects you shouldn't miss while building an NB-IoT Protocol Stack
- 7 warning signs that you should be concerned about your IP provider
- Which USB is Right for Your Application? (Part 2)
- How effective use of ESL tools can increase your HW/SW system design productivity
Latest White Papers
- How Next-Gen Chips Are Unlocking RISC-V’s Customization Advantage
- Efficient Hardware-Assisted Heap Memory Safety for Embedded RISC-V Systems
- Automatically Retargeting Hardware and Code Generation for RISC-V Custom Instructions
- How Mature-Technology ASICs Can Give You the Edge
- Exploring the Latest Innovations in MIPI D-PHY and MIPI C-PHY