Professional Documents
Culture Documents
Report-0.02208600 1714540535
Report-0.02208600 1714540535
Report-0.02208600 1714540535
Page 1 of 3
response. 2. Application Sending AT Commands to GSM Core and Event
Handling: ➢ AT Commands from Application: An application running on a
device (such as a smartphone or a computer) communicates with the GSM
module's core using AT commands through a communication interface (e.g.,
USB, UART, TCP/IP). ➢ AT Command Format for Core Interaction: Similar to
MCU communication, the application sends AT commands in the format
"AT+Command" to the GSM module's core. For example, "AT+CMGS" to send
an SMS. API and Event Handling: ➢ The GSM module's firmware or software
exposes an API (Application Programming Interface) that allows the
application to send AT commands and receive events or responses. Transport
Layer Security (TLS) is a cryptographic protocol designed to provide secure
communication over a network, typically the Internet. It ensures privacy, data
integrity, and authentication between communicating applications, such as
web browsers and servers, email clients and servers, and other network-
based services. TLS is the successor to the older Secure Sockets Layer (SSL)
protocol and is widely used to establish secure connections for a variety of
online transactions and data exchanges. 1. Purpose of TLS: TLS addresses the
need for secure communication in an open network environment, where
data transmitted between two parties can be intercepted, tampered with, or
eavesdropped on by malicious entities. It aims to establish a secure and
trusted channel for data transmission over potentially insecure networks,
protecting sensitive information such as passwords, financial transactions,
personal data, and more. 2. Key Features: Encryption: TLS employs strong
encryption algorithms to encrypt data exchanged between clients and
servers. This encryption ensures that even if intercepted, the data remains
unreadable without the appropriate decryption keys. Authentication: TLS
provides mechanisms for mutual authentication between parties. Both the
client (e.g., web browser) and the server (e.g., web server) can authenticate
each other's identities using digital certificates, ensuring that they are
communicating with the intended and trusted entities. Data Integrity: TLS
uses cryptographic hash functions and checksums to verify the integrity of
transmitted data. This prevents data from being altered or corrupted during
transmission, providing assurance that the data received is exactly as sent by
the sender. Message Queuing Telemetry Transport, or MQTT, is a
communications protocol designed for Internet of Things devices with
extremely high latency and restricted low bandwidth. Message Queuing
Telemetry Transport is a perfect protocol for machine-to-machine (M2M)
communication since it is designed specifically for low-bandwidth, high-
latency settings. What is Message Queue Telemetry Transport Protocol? ➢
MQTT is a simple, lightweight messaging protocol used to establish
communication between multiple devices. It is a TCP-based protocol relying
on the publish-subscribe model. This communication protocol is suitable for
transmitting data between resource-constrained devices having low
bandwidth and low power requirements. Hence this messaging protocol is
widely used for communication in the IoT Framework. Publish-Subscribe
Model: ➢ This model involves multiple clients interacting with each other,
without having any direct connection established between them. All clients
Page 2 of 3
communicate with other clients only via a third party known as a Broker.
MQTT Client and Broker: ➢ Clients publish messages on different topics to
brokers. The broker is the central server that receives these messages and
filters them based on their topics. It then sends these messages to respective
clients that have subscribed to those different topics. The heart of any
publish/subscribe protocol is the MQTT broker. A broker can handle up to
thousands of concurrently connected MQTT customers, depending on how it
is
Sources
13% Plagiarized
What is Pub/Sub Architecture? - GeeksforGeeksMessage Queue Telemetry
Transport Protocol (MQTT)
https://www.geeksforgeeks.org/introduction-of-message-queue-
telemetry-transport-protocol-mqtt/
Page 3 of 3