Table of Contents

Application Protocols

 General audience classification icon  General audience classification icon  General audience classification icon
The host layers protocols include session (SES), presentation (PRES) and application (APP) levels. In particular, the APP (application) layer in regular Internet communication is dominated by the HTTP protocol and XML-related derivatives, e.g. SoAP. Also, the FTP protocol for file transfer is ubiquitous; it has existed since the beginning of the Internet. Most of them are somehow related to the textual presentation of the information. They're referenced as “WEB” protocols.
Although advanced and more powerful IoT devices frequently use these protocols, this is problematic to implement in the constrained IoT devices world: even the simplest HTTP header occupies at least 24 + 8 + 8 + 31 bytes without payload!
There is also a problem of crossing firewall boundaries when communication between subnetworks of IoT devices is expected to occur.

Some IoT-designed protocols are reviewed below.

MQTT

MQTT protocol [1] was invented especially for constrained IoT devices and low bandwidth networks. It is located in APP layer 7 of the ISO/OSI stack but covers all layers 5–7. It is a text-based protocol yet very compact and efficient. Protocol stack implementation requires about 10 kB of RAM/flash only.

MQTT uses a TCP connection, so it requires an open connection channel (this is opposite to UDP connections, where communications work in a way: “send and forget”). It is considered a drawback of the original MQTT protocol, but MQTT variations exist for non-TCP networks, e.g. MQTT-SN. Protocol definition provides reliability and delivery ensure mechanisms.

The standard MQTT Message header is composed of just two bytes only (table 1)! There are 16 MQTT message types. Some message types require variable-length headers.

Table 1: MQTT Standard Message Header
bit 7 6 5 4 3 2 1 0
byte 1 Message Type DUP flag Qos level RETAIN
byte 2 Remaining length

MQTT requires a centralised MQTT Broker located outside firewalls and NATs, where all clients connect, send and receive messages via the publish/subscribe model. The client can act as publisher and subscriber simultaneously. Figure 1 presents a publish-subscribe model idea.

 MQTT Broker, publishers and subscribers
Figure 1: MQTT Broker, Publishers and Subscribers

MQTT Message
MQTT is a text-based protocol and is data-agnostic. A message comprises a Topic (text) and a Payload (data). The Topic is a directory-like string with a slash (“/”) delimiter. Thus, all Topics constitute (or may represent) a tree-like folder structure similar to the file system's. The subscriber can subscribe to a specific, single Topic or a variety of Topics using wildcards, where:

Example Scenario

Publishers deliver some air quality information data in separate MQTT messages and for various rooms at the department Inf of the Universities (SUT, RTU, ITMO) to the Broker:

Topic (publishers):
SUT/Inf/Room1/Sensor/Temperature
SUT/Inf/Corridor/Sensor/Temperature
SUT/Inf/Auditorium1/Sensor/Temperature
RTU/Inf/Room1/Sensor/Temperature
ITMO/Inf/Room1/Sensor/Temperature
RTU/Inf/Room1/Sensor/Humidity
SUT/Inf/Room3/Sensor/Temperature
RTU/Inf/Room1/Window/NorthSide/State

Subscriber 1 is willing to get all sensor data for SUT University, Inf (informatics) department only, for any space:

Topic (subscription):
SUT/Inf/+/Sensor/#

Subscriber 2 is willing to get only Temperature data virtually from any sensor and in any location in TalTech University:

Topic (subscription):
TalTech/#/Temperature

Subscriber 3 is willing to get any information from the sensors, but only for the RTU

Topic (subscription):
RTU/#

The message's payload (data) is also text, so if binary data is to be sent, it must be encoded (e.g., using Base64 encoding).

MQTT Broker
MQTT Broker is a server for both publishers and subscribers. The connection is initiated from the client to the Broker, so assuming the Broker is located outside a firewall, it breaks its boundaries.
The Broker provides QoS (Quality of Service) and can retain message payload. MQTT Broker QoS (supplied at the message level) has three levels.

Providing unique packet IDs in the MQTT frame is vital for Acknowledged and Assured services.

The DUP flag (byte 1, bit 3) represents information sent by the publisher, indicating whether the message is a “first try” (0) or a retransmitted one (1). This flag is primarily for internal purposes and is never propagated to the subscribers.

MQTT offers a limited set of features (options):

Interestingly, MQTT is a protocol used by Facebook Messenger [2]. It is also implemented natively in Microsoft Azure and Amazon Web Services (among many others).

MQTT security is relatively weak. The MQTT Broker can offer user and password verification sent in plain text. However, all communication between the client and Broker may be encapsulated in an SSL-encrypted stream.

A short comparison of MQTT and HTTP protocols is presented in table 2.

Table 2: MQTT vs HTTP
MQTT HTTP
Design Data-centric Document centric
Pattern Publish/Subscribe Request/response
Complexity Simple Complex
Message size Small, with 2 byte binary header Larger with text-based status
Service levels 3 QoS None
Implementation C/C++: 10–30 kB
Java ~100 kB
Depends on application but hits > MB
Data distribution models 1-to-1
1-to-N
1-to-1
CoAP

CoAP protocol (RFC7252) originates from the REST (Representational State Transfer). CoAP does not use a centralised server as MQTT does, but every single device “hosts” a server on its own to provide available resources to the clients asking for service offering distributed resources. CoAP uses UDP (compared to MQTT, which uses TCP) and is stateless; thus, it does not require memory to track the state. The CoAP implementation assumes every IoT device has a unique ID, and things can have multiple representations. It is intended to link “things” together using existing standard methods. It is resource-oriented (not document-oriented like HTTP/HTML) and designed for slow IoT networks with high packet loss. It also supports devices that are periodically offline.
CoAP uses URIs to address services:

It supports various content types, can work with proxy and can be cached.
The protocol is designed to be compact and straightforward to implement. The stack implementation takes only about 10 kB of RAM and 100 kB of storage. The header is only 4 bytes.

CoAP protocol has a binary header to decrease overhead, but the payload depends on the content type. The initial, non-exclusive list of the payload types includes:

CoAP endpoint services are identified by unique IP and port number. However, they operate on the UDP instead of TCP (like, e.g. HTML does). The transfer in CoAP is made using a non-reliable UDP network, so a message can appear duplicated, disappear, or be delivered in another order than initially sent. Because of the nature of datagram communication, messages are exchanged asynchronously between two endpoints, transporting Requests and Responses. CoAP messages can be (non-exhaustive list):

Empty RESET messages can be used to “ping” the device.

Because of the UDP network characteristics, CoAP provides an efficient yet straightforward reliability mechanism to ensure successful delivery of messages:

The request-response pair is identified by a unique “Token”. Sample request-response scenarios are presented in the images below. Sample CoAP message exchange scenarios between client and server are presented (two per image) in figure 2 and figure 3.

 CoAP scenario 1: confirmable with time delay payload answer (0 × 70) and immediate payload answer (0 × 71)
Figure 2: CoAP scenario 1: confirmable with time delay payload answer (0 × 70) and immediate payload answer (0 × 71)
 CoAP scenario 2: unrecognized request (0 × 72) and non-confirmable request (0 × 73)
Figure 3: CoAP scenario 2: unrecognized request (0 × 72) and non-confirmable request (0 × 73)

The scenario in figure 2 (left, with token 0 × 70) is executed in a situation when a CoAP server device (a node) needs some time to prepare data and cannot deliver information right away. The scenario in figure 2 (right, with token 0 × 71) is used when a CoAP server can provide information to the client immediately. The scenario in figure 3 (left, with token 0 × 72) appears when a CoAP server cannot understand the request. The scenario in figure 3 (right, with token 0 × 73) presents the situation where the request to the CoAP server was made with a non-confirmable request.

AMQP

In its principles, the AMQP (Advanced Message Queuing Protocol) somehow recalls MQTT: it is message-oriented and uses a central broker. There are data publishers and consumers (that, in the case of the MQTT, are called subscribers). Messages are routed from publishers to the Broker, where they hit so-called exchanges, and then they are copied to the queues (0, 1 or more) from which the consumer can later read. A diagram of the message's flow is present in the figure 4.

 AMQP protocol messages flow
Figure 4: AMQP protocol messages flow

AMQP uses TCP/IP. AMQP is intended to work in non-reliable networks; thus, the protocol has a message acknowledgement mechanism to ensure delivery. A message is removed from the queue only if it has been acknowledged. Besides acknowledged delivery, it is also possible to use an unacknowledged one that does not involve acknowledgements. If a message cannot be routed (for any reason), it can be returned to the publisher, dropped or placed in the “dead letter queue”. The behaviour is defined along with a message. Opposite to MQTT, in AMQP protocol, the connection status is unknown; thus, there is no mechanism to let other devices know that some node has disconnected, such as the last will in MQTT.

Queues
AMQP is a programmable protocol, so bindings are not defined by the Broker but rather by the publisher. Queues are also created on-demand via external actors (mostly consumers). Routing via bindings is provided with a message, and the Broker analyses it to provide correct message handling and delivery.
Consumers can subscribe to the exchange and define a queue. Bindings then act as filters so they receive only selected messages. A single queue is intended to handle one consumer, but there is a possibility of letting many consumers use a single queue in the round-robin model. As in the protocol version 0.9, queues have the following properties:

A queue name can be selected explicitly, or a broker may deliver one on demand. A queue has to be expressly defined. An existing queue can be silently redeclared with an exact attributes set. A declaration of the existing queue with different attributes set throws an exception code 406 (PRECONDITION_FAILED).

Exchanges
Specification 0.9 of the AMQP protocol creates 4 exchanges (exchange types):

 Direct Exchange working principles
Figure 5: Direct Exchange working principles
 Fanout Exchange working principles
Figure 6: Fanout Exchange working principles
 Topic Exchange working principles
Figure 7: Topic Exchange working principles
 Headers Exchange working principles
Figure 8: Headers Exchange working principles

Bindings
Bindings are rules defining how to route from exchange to queues. Depending on the exchange type the publisher interacts with, the messages are routed using algorithms that consider both exchange type, arguments and bindings. The publisher is responsible for providing information on which queue will receive the messages from the exchange.

Consumers
Consumers subscribe to the queue to “consume” messages. There are two ways to let consumers receive them: push API and pull API. For performance reasons, pull API should be avoided. Once subscribed to the queue, the consumer receives a unique “consumer tag” that is a string (text) and is later necessary to unsubscribe.

Messages
The essential, immutable AMQP frame size is 8 bytes, and the payload is up to 2GB. Besides the header frame, messages have several virtually freely definable attributes, but the Broker uses some predefined ones. Common attributes cover:

Header attributes (used, e.g. by the Headers Exchanges) are optional and similar to X-Headers in HTTP [3].
A payload in the AMQP message is a byte array. Broker does not process or review the content, and it can be even zero length.

Exchanges, bindings and queues are named AMQP entities. To draw an analogy to the real world:
  • a queue is like your home,
  • an exchange is a nearby train station,
  • bindings are routes from the train station to your home, and usually there are one, many, or eventually there are none.

The address of the Broker is referenced with URI, similar to the CoAP (e.g.):

Starting AMQP version 1.0, broker control is no longer in the specification; thus, it is expected to be defined in the higher-level protocols. Thus, the AMQP protocol definition seems inconsistent in the development over time.