Unit 3
Unit 3
1
Outline
Features and Characteristics of IOT platforms
Open-source and Commercial IoT Platforms
IoT Operating Systems
Protocols For IOT
Messaging and Transport Protocols: MQTT, COAP, XMPP and DDS
protocols, Bluetooth Low Energy, Light Fidelity(Li-Fi)
Addressing and Identification: Introduction, IPv4, IPv6, IPv6-A quick
Overview: IPv6 vs IPv4, Legacy of IPv4 Devices, Switching over to IPv6,
IPv5, URI.
HEMIL PATEL
2
CKPCET, SURAT
Features and Characteristics of IoT
Platforms
Role of IoT Platforms
Central role in managing IoT devices and applications.
Key features:
Device Management,
Data Management,
Analytics,
Security.
HEMIL PATEL
3
CKPCET, SURAT
Device Management
• Provisioning and Onboarding
Process of integrating new devices into the IoT network.
Features:
Automated registration and configuration.
Authentication and authorization protocols.
HEMIL PATEL
4
CKPCET, SURAT
Contd…
•Configuration Management
Managing device settings centrally.
Features:
This ensures that device settings are managed centrally, making it easier to enforce
policies and maintain consistency across the network.
5
Data Management
• Data Collection
Gathering data from IoT devices.
Features:
High-frequency data collection.(Ensure accurate and up to date information)
Data aggregation from various sensors.
• Data Storage
Storing collected data securely.
Features:
Scalable storage solutions.
Backup and recovery mechanisms.
HEMIL PATEL
6
CKPCET, SURAT
Contd…
•Data Integration
Combining data from multiple sources.
Features:
Data fusion techniques.
Unified data repositories.
7
Analytics
• Real-Time Analytics
Processing data as it arrives.
Features:
Stream processing capabilities.
Instantaneous decision-making support.
• Historical Analysis
Analyzing past data trends.
Features:
Long-term data storage.
Trend analysis and forecasting tools.
8
Contd…
•Visualization Tools
Graphical representation of data.
Features:
Interactive dashboards.
Customizable reports and charts.
9
Security
• Authentication and Authorization
Ensuring proper access control.
Features:
Multi-factor authentication.
Role-based access controls.
Data Encryption
Protecting data confidentiality.
Features:
End-to-end encryption.
Data encryption in transit and at rest.
HEMIL PATEL
1
CKPCET, SURAT 0
Contd…
•Vulnerability Management
Managing and mitigating security vulnerabilities.
Features:
Regular updates and patches.
Vulnerability scanning and assessment.
(essential to identify and address security weaknesses, ensuring ongoing protection against cyber
threats.)
•Network Security
Safeguarding the IoT network.
Features:
Firewalls and intrusion detection systems.
Secure communication protocols.
Open-source and Commercial IoT Platforms
What is IOT?
1
2
Criteria for Comparison
1
3
Arduino IoT (Open-source)
Overview
Part of the Arduino ecosystem
Focus on hobbyists and prototyping
Features
Free and open-source
Integrated with Arduino IDE
Easy to use for beginners
Pros
Low cost
Community support
Cons
Limited scalability
May require additional tools for advanced features
1
4
AWS IoT (Commercial)
Overview
Part of Amazon Web Services
Enterprise-level IoT solution
Features
Scalable cloud infrastructure
Integration with other AWS services
Strong security and analytics capabilities
Pros
Highly scalable
Extensive support and documentation
Cons
Potentially high cost
Steeper learning curve
1
5
Microsoft Azure IoT (Commercial)
Overview
Part of Microsoft Azure cloud services
Enterprise-oriented
Features
Integration with Microsoft services
Advanced analytics and AI capabilities
Extensive security features
Pros
Comprehensive toolset
Strong support and integration with enterprise systems
Cons
Complexity and cost
Requires Azure knowledge
1
6
Google Cloud IoT (Commercial)
Overview
Part of Google Cloud Platform
Focus on data-driven IoT solutions
Features
Integration with Google’s machine learning tools
Scalable and secure infrastructure
Real-time data processing
Pros
Advanced analytics and AI integration
Scalable and flexible
Cons
Complexity and cost
May have a learning curve
1
7
Comparative Analysis
Cost Comparison
Arduino IoT: Low
AWS IoT, Azure IoT, Google Cloud IoT: Varies based on usage
Scalability
Arduino IoT: Limited
AWS, Azure, Google Cloud: High
Ease of Use
Arduino IoT: Beginner-friendly
AWS, Azure, Google Cloud: Professional and enterprise focus
Integration
Arduino IoT: Limited
AWS, Azure, Google Cloud: Extensive
Security
Arduino IoT: Basic
AWS, Azure, Google Cloud: Advanced
1
8
Use Cases
Arduino IoT
Prototyping
Educational projects
AWS IoT
Enterprise solutions
Large-scale deployments
Microsoft Azure IoT
Industrial IoT
Smart cities
Google Cloud IoT
Data-intensive applications
AI-driven insights
1
9
IoT Operating Systems
2
0
Key Differences
Resource Constraints
IoT OS: Limited memory, processing power
GPOS: Abundant resources, multitasking
Power Consumption
IoT OS: Low power, battery efficiency
GPOS: Less emphasis on power efficiency
Real-Time Capabilities
IoT OS: Real-time processing requirements
GPOS: May not meet real-time constraints
•Introduction to Contiki
• Lightweight OS for embedded systems
• Developed for low-power, low-memory devices
•Key Features
• Small memory footprint
• Built-in IPv6 support and network stack
• Support for wireless sensor networks
•Typical Use Cases
• Sensor networks
• Smart agriculture
• Home automation
2
2
Overview of TinyOS
•Introduction to TinyOS
• Modular and component-based OS
• Designed for resource-constrained devices
•Key Features
• Event-driven architecture
• Modular design for efficiency
• Real-time performance(Designed to meet the timing requirements of many embedded
systems).
•Typical Use Cases
• Wireless sensor networks
• Industrial monitoring
• Environmental sensing
2
3
Contiki vs. TinyOS
Comparison of Features
Memory Usage: Contiki’s minimal footprint vs. TinyOS’s modular approach
Programming Model: Contiki’s co-operative multitasking vs. TinyOS’s event-driven model
Network Stack: Contiki’s built-in IPv6 stack vs. TinyOS’s flexibility with custom protocols
2
4
Real-World Applications
•Contiki OS Applications
• Smart cities
• Energy-efficient buildings
•TinyOS Applications
• Environmental monitoring
• Industrial automation
2
5
Protocols For IOT(Messaging and Transport Protocols)
2
6
Message Queuing Telemetry transport(MQTT)
2
7
Characteristics of MQTT
• Publish-Subscribe is a communication
model that involves publishers, brokers
and consumers.
• Publishers are the source of data.
Publishers send the data to the topics
which are managed by the broker.
Publishers are not aware of the
consumers.
• Consumers subscribe to the topics which
are managed by the broker.
• When the broker receives data for a
topic from the publisher, it sends the
data to all the subscribed consumers.
Ex. Television or radio broadcast scenario
Once the message reach the client, the message get removed from the broker. So, the life
of the message is limited, and if there are no takers or subscribers for a particular topic, it
automatically gets deleted
3
0
MQTT Architecture
3
1
MQTT Subscribe- Implementation Exercise
The gas sensor will read the gas data in the proposed environment. The data
will sent to the NodeMCU and further to the cloud . This process of publishing
data to the cloud is referred to as Publishing. Adafruit cloud is used in this
entire process and acts as the broker.
3
2
MQTT Message Format
3
3
MQTT packet Structure
Now we will look at the packet structure or message format of the MQTT.
3
4
(Reliable messaging)
Contd…
Confirmable (CON) Message: This is like sending a registered letter that you want the recipient to confirm
they received. When a client sends a confirmable message, it expects the server to acknowledge that it got
the message.
After receiving the message, the server sends back an acknowledgment (ACK). If the client doesn't
get this acknowledgment within a certain time, it will resend the message. This ensures the message is
delivered reliably.
Example: A sensor sending important data to a server, where it needs to know the server received the data.
2. Non-Confirmable (NON) Message: This is like sending a regular letter where you don’t need
confirmation that it was received. The client sends the message and doesn’t expect an acknowledgment from
the server.
These messages are used for information that isn’t critical or time-sensitive. The message is sent,
and whether the server gets it or not, the client doesn’t wait for or require a response.
Example: A device broadcasting its presence to the network where it doesn’t need to confirm that every
other device received the message.
4
1
Contd…
3. Acknowledgment (ACK) Message: This is the response sent by the server to confirm it received a
confirmable (CON) message.
When the server gets a CON message, it sends back an ACK to let the client know the message was
received. The ACK can either include the actual response to the request or simply confirm receipt, with the
response coming later.
Example: A server acknowledging that it received a request to turn on a light, even if it hasn’t actually
turned the light on yet.
4. Reset (RST) Message:This is like saying, "I don’t understand your message" or "I didn’t request this
information."
If the server or client receives a message it can't process or didn’t expect, it sends back an RST
message to indicate it didn’t understand or didn’t accept the message.
Example: A server receives a message it wasn't expecting or doesn't recognize, so it sends an RST to the
sender to indicate this.
4
2
Contd…
1. Piggy-Backed:
In this mode of request-response approach, the client sends a request through the CON/NON-
messaging method. ACK is received immediately with corresponding token number and message
shown in Fig.. In this figure, the message is Temperature. If Temperature data is not available, the
failure code is embedded as a part of the ACK (Fig. 2).
4
5
Contd…
2. Separate Response: When a CON type message is sent to the server and in case the server is unable to
respond immediately, an Empty ACK will be reverted. After some time, when the server is able to send the
response, it sends a CON message with data. ACK is sent back from the client. Figure shows this process.
4
6
3. Non conformable Request and Response
Here Non type message is sent from the client to the server. The server does not need to give ACK and
it can send a NON type response in return. Fig. shows this process
, 2 ACK, 3RESET
1.Version (Ver, 2 bits) - CoAP version (currently 01 for RFC 7252).
5.Message ID (16 bits) Used for detecting duplicates and message matching.
6.Token (0–8 bytes) Correlates requests and responses (like HTTP cookies or IDs).
5
3
Extensible Messaging and Presence
Protocol (XMPP)
Extensible Messaging and Presence Protocol (XMPP) is meant for the messaging, chat,
video, voice calls, presence, and collaboration.
• This protocol is fundamentally based on XML (Extensible Markup Language) and it is
used for messaging services such as WhatsApp.
• X- X denotes eXtensible. The protocol is defined in open standard and XMPP is made
extensible through this open standard approach.
• M- M denotes Messaging. This is the message we send. XMPP supports sending
messages to recipients in real time. The approach used is capable PUSH mechanism.
• P- P denotes presence. It is very simple and helps in understanding the status as
"Online" or "Offline" or "Busy".
• P-The final P denotes protocol. It is the crux of XMPP. The set of underlying standards
together are termed as protocol.
5
4
Requirement of features
Any messenger requires the following features inbuilt. XMPP readily fulfils these requirements and provide
the following:
1. Message sending and receiving feature.
2. Understanding the presence/absence status.
3. Managing subscription details.
4. Maintaining and managing the contact list.
5. Message blocking services.
5
5
Features
1. Decentralized: The architecture of XMPP is very similar to that of the e-mail. Anyone can run their own XMPP
server, which means that it is decentralized. (centralized messaging platforms (like WhatsApp or Telegram)
2. Secure: Simple Authentication and Security Layer (SASL) for authentication and Transport Layer Security (TLS)
for encryption, OMEMO and OpenPGP for end-to-end encryption.
3. Stable and Functionally Proven: The initial version of Jabber (now called XMPP) came into existence in
1998. Hence, XMPP is very stable and good to use by now.
4. Standardization: the Internet Engineering Task Force (IETF), which is an organization responsible for
creating internet standards, officially recognized XMPP (Extensible Messaging and Presence Protocol) by
publishing its specifications as RFCs (Request for Comments). Specifically, RFC3920 and RFC3921 are
documents that describe how XMPP works.
5. Flexibility: XMPP is not just messaging oriented; it is flexible enough to accommodate file sharing, instant
messaging and even remote monitoring of systems (iot communication).
5
6
Implementation Details
• The initial version of the XMPP was with Transmission Control Protocol (TCP) using open-
ended XML.
• Over a period of time, as a different option to TCP transport, development of HTTP-based XMPP
was performed. The way XMPP can really work with HTTP is through polling or binding.
• With polling, the messages stored on the server shall be pulled, that is, fetched by the XMPP
client through the HTTP GET and POST requests.
• When it comes to the binding approach, Bidirectional-streams Over Synchronous HTTP
(BOSH) enables the servers to push messages to clients as and when these are sent. This
approach is seen as an effective model over polling.
Also, because of HTTP being used, the firewalls allow the post and fetch activities without any
trouble. The XMPP architecture is shown in Fig below
5
7
XMPP Architecture
5
8
XMPP Architecture
1. Core Components –
Client server Gateways
2. Communication Model –
Client-to-Server (C2S) & Server-to-Server (S2S)
3. Message Exchange –
All communication is based on streaming XML stanzas.
5
9
Data Distribution Service
Data Distribution Service (DDS) is one of the messaging protocols being used in the
Internet of Things (IoT) applications.
• DDS functions as a brokerless service.
• Developed by the Object Management Group (OMG). OMG developed it towards getting
better machine-to-machine communication.
• DDS is completely broker less.
• The approach used with DDS is the publish - subscribe model.
• DDS is a middleware protocol standard that supports enhanced data connectivity,
improved reliability and boosted scalability for industrial IoT applications.
• The applications are in vast domains starting from robotics, industrial applications,
aerospace, military applications and many more domains where real-time data exchange
is pivotal.
6
0
Architecture and Functioning
• DDS is fundamentally a publish - subscribe model based architecture. Everything including sending
and receiving data, event updates, commands within and among the nodes are all accomplished
through the publish - subscribe approach.
• Similar to MQTT, topics are also used. The publishing nodes should create the topics and publish
the data.
• Topics could ideally be pressure, temperature, humidity, etc. DDS should deliver this data (topics) to
the subscribers that have shown interest in acquiring the data (certain topic of interest).
• DDS has to take care of all the attributes of data transfer. Addressing, marshalling and
demarshalling data, control of delivery, control of flow, etc., are taken care of by DDS, which follows
a multicasting approach.
• This enables subscribers on multiple/ different platforms to receive the data from the publishers
without delay.
• Whenever a subscriber wants to acquire data, he/she should express interest on the topics. A publisher
or subscriber is allowed to join or leave the GDS at any time.
• This makes the entire workflow versatile.
6
1
Contd…
Figure presents the no broker architecture. DDS is a completely distributed global data
space(GDS). As seen from the figure, any publisher can publish the data in the GDS. This implies
that the data can be written with appropriate topic.
6
2
Protocol Stack of DDS
• Figure shows the protocol stack of DDS. The data-centric publish - subscribe (DCPS)
holds the responsibility for delivering information (data) to the subscribers. DCPS is
nothing but an API for real-time publish - subscribe activity.
9
6
3
Contd..
• The data local reconstruction layer (DLRL) provides interface to the DCPS functionalities. DLRL
helps in sharing the data within the IoT devices
• DDS V1.2 API is an API that is language independent, and hardware and operating system inde-
pendent. Ensures the code portability across various available platforms.
• DDSI V2.1 ensures the wire interoperability between different available implementations of the DDS.
• In conclusion, DDS is all about providing the right data in the right place at the right time. It
ensures that the data is not spilled all over, and delivers it at where needed
• For ex., you can only get the temperature data above 100°C, and any data entry below 100°C shall
not be sent to the receiver. This is the kind of filtering we get through DDS. Thus, the right data can
be delivered without delay.
• DDS is responsible for ensuring the real-time functioning in IoT systems. Quality of service (QoS)
policies connected to the DDS are really well thought of and they ensure the balance. QoS ensures
the right time delivery. QoS with reliability, security, persistence, priority, etc., are all covered in the
DDS.
64
Transport Protocols
Two protocols that enable transport are the traditional Bluetooth Low Energy (BLE) and Light
Fidelity (Li-Fi). BLE has become inevitable in the modern IoT era.
65
Bluetooth Low Energy
6
6
Contd…
6
7
Features of BLE
1. It is license free and hence does not add any costing related overhead to the
system.
2. There is no restriction with respect to manufacturers. Any system
manufactured by any manufacturer is fine with BLE.
3. BLE modules are inexpensive and much affordable.
4. The size of BLE chips are small as well and hence shall not occupy much space
on board.
5. Power consumption is also very minimal and hence is very suitable for IoT
applications as power is a major constraint when it comes to IoT applications.
6. The range offered by BLE is much higher and better than the previous
versions.
6
8
Components of BLE
Technically, BLE has three components from its architectural perspective
Application Block: User application is situated here and interacts directly with the
Bluetooth stack.
Apart from these, one more component needs to be understood: HCI (Host Controller
Interface). It is used to interface the controller with the host. This component enables
and makes it possible to interface variety of hosts to the controller.
69
Architecture of BLE stack
70
Contd…
7
1
Contd…
7
2
Contd…
3. Application Layer:
Application layer is the topmost layer in BLE as in OSI. Application layer in BLE is
responsible for User Interface (UI), Logic and Data Handling.
7
3
A BLE device communicates with outside world by two means:
•Broadcasting
•Connections.
74
Broadcasting
7
5
Advantages:
Low Power Consumption: Since there's no need to maintain a connection, the broadcaster
can remain in a low-power state.
Scalability: Many devices can listen to the broadcast without increasing the broadcaster's
workload.
Simple Implementation: No need for complex connection management, making it easier to
deploy in certain applications.
Limitations:
No Feedback Mechanism: Observers can’t send data back to the broadcaster, so it’s a one-
way communication.
Limited Range: The effective range is typically around 10-100 meters, depending on the
environment and BLE version.
Potential for Interference: Since broadcasting occurs in an open environment, other signals
in the 2.4 GHz band could cause interference.
7
6
Connections
Limitations:
Higher Power Consumption: Maintaining a connection requires more power, especially
for the central device.
Connection Management: Managing multiple connections can become complex and
may limit the number of devices that can be connected simultaneously.
Range Limitation: Although BLE has a range of 10-100 meters, obstacles and
interference can reduce the effective range.
7
8
Comparison and Choosing the Right One:
Broadcasting is ideal for applications where data needs to be sent out to multiple devices
without requiring a connection, such as in advertising, asset tracking, or beacons.
Connections is better suited for scenarios where two-way communication, data reliability, and
device management are crucial, such as in wearable devices, health monitoring, and smart home
systems.
7
9
Light Fidelity(LiFi)
Nowadays, too many devices are connected to the Internet and it has become a monster of
intertwined connections
There are some concerns which are very strong and must be debated.
Is the Internet through Wi-Fi safe?
1. How much would the bandwidth availability be sufficient for the devices/equipment?
2. How safe is your data? (IoT is all about data)
When the number of devices increases or is on rise, there would be congestion. How is this
handled?
8
0
• Li-Fi is believed to be the one solution of interest
• Li-Fi stands for Light Fidelity, a wireless communication technology that uses
light to transmit data.
• The LI-FI is the fastest communication protocols and it is bidirectional
• The symbol of Li-Fi is as shown in fig.
• Light is the source, that is data transfer happens through light.
• Light is generated through light bulbs, which makes it inexpensive.
It gives the following solution to the problem which one can face during these of
Wi-Fi.
1. More security than Wi-Fi.
2. More available bandwidth to connected devices or equipment's.
3. Less/No congestion when more no. of devices connected.
4. Li-Fi has phenomenal speed greater than WiFi.
8
1
Li-Fi Working
• The server
wants to transmit
the data to the
receiver with
very high speed.
The server is
connected
8
2
Functioning of Li-Fi
Components
• Light Emitting Diodes (LEDs): The primary source of light for Li-Fi systems. LEDs
can switch on and off very rapidly, making them ideal for high-speed data transmission.
• Photodetectors: These devices receive the light signals and convert them back into
electrical signals that are then decoded into data.
• Transmission
Data is transmitted by modulating the intensity of the LED light. This modulation is often
imperceptible to the human eye.
The modulated light is sent to a photodetector, which captures the light and converts it
into electrical signals.
Reception
The photodetector converts the received light signals into electrical signals.
These signals are then processed by a decoding system to reconstruct the transmitted
data.
8
3
Real time usage of Li-Fi
• The LED bulbs flicker at extremely high
speeds, imperceptible to the human eye,
to transmit data.
• Each light bulb acts as a data source.
• Receiving Data: Employees use Li-Fi-
enabled devices, which are equipped with
photodetectors that can pick up the
modulated light signals from the LED
bulbs.
• Data Access: As employees move around
the office, their devices continuously
receive data from the nearest light
source, ensuring a stable and high-speed
internet connection.
84
Applications of Li-Fi
8
5
Advantages of Li-Fi
8
6
Disadvantage of Li-Fi
•Line-of-Sight Requirement
Li-Fi requires a direct line of sight between the transmitter and receiver,
which can limit mobility and range.
•Ambient Light Interference
Ambient light sources may interfere with data transmission, affecting
performance in bright environments.
•Limited Range
The effective range is generally limited to the area covered by the light
source, which may be a drawback for some applications.
8
7
Addressing and Identification protocols
•IPv4
•IPv6
•URI(Uniform Resource Identifier)
8
8
Need for Addressing and Identification in IoT
Scalability:
Large number of devices connected
Uniqueness:
Unique identification of devices
Interoperability:
Communication between heterogeneous devices
Security:
Ensuring secure device communication
8
9
Internet Protocol Version 4(IPv4)
9
0
Classification of IP Address
9
1
Class A
9
2
Class B
9
3
Class C
Class D
• This class IP addresses work solely for multicasting. Class D in its first octet has
first bit as 1, second bit as 1, third bit as 1, and the fourth bit as 0.
• The addresses start with 224 and end at 239.
9
4
Class E
9
5
IPv5
• It was designed to address the limitations of its predecessors and to
support advanced features for modern networking needs.
• IPV5 was never officially adopted or widely implemented.
• IPV5 was proposed as a way to experiment with new ideas in network
communication.
• IPV5 was more of an experimental protocol rather than a fully
developed standard.
• It aimed to enhance support for real-time streaming data.
• IPV5 was an experimental protocol that did not become a standard
but influenced the development of networking technologies.
96
Internet Protocol Version 6
• Due to the extensive growth in number of computers and Internet devices, the
addresses got exhausted and there was a need for more addresses for utilization.
• This is the primary reason for development of IPv6 (IP version 6).
• IPv6 was developed to overcome the difficulties faced with IPv4 address
allocations.
• IPv4 IP addressing uses 32 bit IP addresses which can generate.
• 2 32 =4294967296
• The above is just a value. In fact the actual available IP addresses in IPv4 is less
than this theoretical value(may be 3,720,249,092).
• As mentioned earlier, the non-availability of IP addresses is the main challenge with
IPv4.
• IPv6 provides support for 2 128 unique IP addresses, which can generate
3.40282366920…*10 38 IP.
• The above value is very large that if we assign unique IP to every item in the world
then also it will have reserved IP addresses.
97
Features of IPv6 Addressing
In addition to more number of IP addresses, IPv6 also provides the following
features:
1.It has much better and efficient routing.
2. IPsec framework is made mandatory in IPv6, which is not so in IPv4. This
increases the security. (Now, this is optional.)
3. An additional flow label is added in the header of IPv6, which can improve the
QoS.
4. IPv6 supports new applications such as IP telephony, video/audio, interactive
games, etc., with ensured QoS.
5. Plug and play abilities have been improved in IPv6.
6. IPv6 has eliminated the need for Network Address Translation due to the huge
availability of IP addresses.
98
IPv6 Protocol Format
• IPv6 header is 40 bytes which is twice than IPv4 header format.
• The fig. shows IPv6 header format
99
Fields in the packet
• Version (4 bits):
Indicates the version of the IP protocol.
For IPv6, this field is set to 6.
• Traffic Class (8 bits):
Used for quality of service (QoS) and for identifying diff. classes or priorities.
• Flow Label (20 bits):
Used to identify and handle packets belonging to the same flow, which can be useful for QoS
and other traffic management tasks.
• Payload Length (16 bits)
Specifies the length of the payload (data) following the header, in bytes.
The maximum value is 65,535 bytes, but larger payloads are supported using an extension
header.
10
0
Contd…
1
0
IPv4 Vs IPv6
1
0
Uniform Resource Identifier(URI)
A Uniform Resource Identifier (URI) is a string of
characters used to identify a resource on the internet
or within a network.
URIs they provide a way to locate resources, such as
web pages, files, or services.
• The URI protocol was developed by IETF.
• URI has URL/URN in it.
• URN mostly provides information of unique name
without locating or retrieving the resource
information.
• URL provides locating and retrieving information
on the network.
10
3
URL
• The URL contains the information of how to fetch a resource information from
its location.
• URL always begin with protocol(HTTP).
• A URL is used when client request the server for the service.
• The sample URL and its field explained below.
10
4
URI
Uniform Resource Name (URN) gives the name of a resource and its identification.
However, it does not indicate how to spot/locate it on the Internet.
• A URN typically has the following structure:
urn:<namespace identifier>:<namespace-specific string>
• Namespace Identifier: A unique identifier for the namespace within which the
URN is defined.
• Examples include isbn, uuid, ietf, etc.
• Namespace-Specific String: A unique identifier within the specified namespace.
• Examples of URNs ISBN(International Standard Book number)
urn:isbn:0451450523
• Explanation: Identifies a book by its ISBN number. It does not provide a means to
locate the book but ensures a unique identifier within the ISBN namespace.