Communication Chain Report: Critical Analysis of Linguistic Message

Communication Chain Report

Crystal and Varley’s Communication Chain Model (1998) is a scientific framework that clarifies and explains the features of human communication. A disorder of communication may arise from a disruption to the Communication chain, for example, any difficulties with executing speech.

The Communication Chain includes 3 main stages. The first stage is production (expression) which is where a linguistic message is formed and can be conveyed (Williamson, 2014). This is where a person thinks about what their message should be and decides on their message. The second stage is reception (comprehension) which is the process that occurs once the message has been transmitted. Reception can be defined as a person making inferences about linguistic utterances. The final stage is transmission whereby the speech sound wave is transmitted through particles in the air and into the ear acoustically.

1) Pre-linguistic Stage

Primarily the pre-linguistic stage is where the message (an idea or thought can be shared or kept private). The ideas that need to be communicated are thought of (using language) in the mind, these ideas are not formed separately. So this is where David realises that he needs to ask Emma for help. David is in the pre-linguistic stage as he has thought about what he desires to say to Emma. According to Shannon and Weaver’s model of communication (1949), David would be the transmitter as he initiates the conversation and expresses his idea verbally.

2) Language Encoding

Language encoding is a cognitive skill that involves psycholinguistics to specifically form the message. In this example, this is where David plans how he is going to articulate his message to Emma. This includes the sound of the words that he will use, this information is accessed from the phonological store. Associations between the units are acknowledged to form the correct sentence structure. The words David wishes to use will also be coded in a linguistic form from the semantic store. In addition to this David decides the purpose of the question that he wants to ask Emma. We can assume that David and Emma are acquaintances so the situation is informal as they are having a casual conversation over dinner. These external factors contribute to how David encodes his message. Furthermore, the way in which this message is going to be transmitted (verbally) is also established in this stage.

3) Motor Programming

This is where the linguistic message is converted into a number of instructions to command the muscles in speech/writing (motor output system). This is so that the message can be sent to an external receiver using highly skilled movements. David moves his lips to speak to Emma and says “please can you pass me the pepper, I can’t reach it.” This requires the contraction of fine muscles in the face, therefore the motor programmer can conduct the voluntary muscle movements.

4) Motor Execution

The motor programme is executed to initiate the movement for the message to be articulated. Sensory feedback provides information of the location of the muscle and the degree of movement required to produce movement. Information from the peripheral nervous system is sent to the motor cortex along motor neurones to coordinate the movement of the muscles. David produces voice (phonation) to deliver his message fluently.

Feedback System

Auditory feedback is significant in controlling voice production (phonation) and helping the individual (David) to identify whether the message sounds the way they intended it to. Auditory feedback can occur via air conduction or bone conduction which is where we hear our voice through vibrations in the bones/tissues of the skull. David will monitor the way in which he produced his message by acknowledging the way he moves his body and his body position (kinaesthetic feedback). Proprioceptors are sensory receptors that detect sensory stimuli and relay this feedback.

5) Transmission

This is where the message is sent through a medium to another person. David’s speech is transmitted to the recipient (Emma) via sound waves through the air.

6) Reception

Reception is where the incoming message is registered by a sense organ (ears/eyes) and the process of decoding begins. Emma is the recipient so looks at David and listens to his message.

7) Perception and Recognition

Perception

The visual/acoustic characteristics of the incoming message are recognised by the brain to distinguish the sequence of the units.

Recognition

The stimulus is compared to information that is already stored. This is to determine if the input is new or an experience that the individual (Emma) is familiar with. During this stage, the input is analysed to ascertain if linguistic or non-linguistic processing is required. However, the meaning of the message is not decoded in this stage. It is very likely that Emma has experienced this before so top-down processing may occur. This allows Emma to react quickly and use motor processing (non-linguistic processing) to pass the pepper to David.

Bottom Up Processing

This type of processing is slow as it begins with the stimulus but is very accurate as the message is analysed word by word/ letter by letter. This is to form a visual mental understanding of the object/ideas received.

Top-down Processing

The information is predicted by using higher order information, this requires deeper cognition. Furthermore, this type of processing utilises the features of the sound of the message so the phonological context (Pennington, 2007). The meaning of the message is applied to the situation, so top-down processing uses semantic context.

8) Language decoding

During this stage, the connotation of the message is interpreted. The grammar and structure of the sentences are used to develop an understanding of the meaning (syntax). The structure of the words (morphology) and semantics are also used to decode the language. Emma develops an understanding of the message and registers that she is being asked to pass the pepper. According to Shannon and Weaver’s model, Emma would be the decoder as she has interpreted the message. The information is converted into a form that can be understood (syntax/morphology/semantics) (Thompson, 2011).

9) Message interpretation

Information from the environment is integrated with the data decoded during the language decoding stage to enhance Emma’s understanding of the situation. Non-verbal communication like body language, eye gaze and gestures are also comprehended to interpret the message. For example, David may be pointing to the pepper whilst asking for it. This contributes to the communication and Emma can also process this. Shannon and Weaver’s model of communication would suggest that Emma is the receiver as this is where the message terminates.

Developmental Language Disorder

Key Features

Developmental Language Disorder (DLD) may be defined as a condition that is apparent in children who experience difficulties with verbal expression and comprehension. DLD is very common and affects two children in every classroom however many people are not aware of the condition (Bishop, 2017).

Some symptoms of DLD include issues with syntax and pragmatics. For example, there may be issues with pronouncing words clearly, being unable to name certain words or learning songs. Furthermore, it may be difficult for the child to understand how to use plurals and tenses. Each child progresses through the different stages of acquiring spoken language at a different rate, however, a child with DLD progresses a lot more slowly than what is expected for their age group (Cicerchia, 2019).

Children with DLD may experience problems with socialising as they do not have the communication skills to interact like their peers. This can impact their self-esteem and confidence as of poor interactions with others. Their academic ability is also affected as they find numeracy and literacy difficult to understand. For instance, they may have problems with reading and writing (Leonard, 2014).

Primary Breakdown

The disruption in the communication chain occurs in the language encoding stage for DLD. This is because of the cognitive deficits that are present in the linguistic processing system. This means that there is an impairment in the mental processing of information that the child is presented with.

The child may also experience difficulties in forming the linguistic message and comprehending information in a written/verbal form. Language is acquired more slowly in comparison to the child’s peers. The breakdown occurs in the language encoding stage as children with DLD find it challenging to choose the sounds of the words and the structure of sentences when communicating. This phonological difficulty results in the development of an incomprehensible sound system which affects their ability to process speech (Stackhouse and Wells, 1997).

Children with DLD may also experience difficulties in making decisions about how external factors contribute to the linguistic units involved in producing language. Therefore, sentence structure may not be accurate as the linguistic units are not linked together.

The child may experience difficulties in recollecting the sequence of the auditory information presented, causing issues with listening which in turn affects their communication. The capacity of their auditory storage (which includes their short-term memory) is limited and is a reason for the deficits in auditory perception. These deficits affect the child’s ability to process language as they cannot fully comprehend the message. There is difficulty in keeping an utterance in memory for the required length of time so only part of the information will register with the child.

The child’s morphological development is also affected which impacts their ability to form phrases and clauses. The effect of this is that the child may make many errors when using words and may also have a limited vocabulary. In addition to this the child may be unable to identify or access the word that they want to use so will describe the object/concept instead.

This in turn will affect the other stages of the communication chain. For example, during the motor programming stage, the linguistic message (formed from the language encoding stage) will be converted to a form that is mediated by the motor output system.

Clinical Reasoning

A Speech and Language Therapist may discuss the sounds of words and their meanings with a child to help them manage their expressive language difficulties. Furthermore, the children are taught how to perform specific behaviours related to speech like speech sounds and sentence structure using positive and negative reinforcement (Law, Garrett and Nye, 2005).

International Classification of Functioning, Health and Disability (ICF)

The ICF provides a foundation in describing a person’s health by using a wider context like physical and environmental factors. The ICF is a tool that assesses how a person is functioning within society by considering their level of health (Wylie et al., 2013). This framework has many practical applications like purposes at a social, institutional or personal level. Disability is experienced by everyone at some point in their lives, the ICF acknowledges this and portrays disability as being universal. This framework identifies 3 levels of functioning body, activity and participation. The body is where there are issues related to structures in the body and their function. Activity is the ability of the person and competency of the person. Participation is how the individual can perform in society on a daily basis. The ICF combines biological and social explanations to form the biopsychosocial model of health (Threats, 2010).

Developmental Language Disorder impacts an individual’s ability to produce language (expression) in a written or verbal form. The difficulties lie in forming the grammatical structure of sentences and conveying a message which is meaningful. The ICF codes for language impairments as a specific mental function, which is a body function that includes attention and memory. A child with DLD will have limitations in their processing capacities so will be unable to focus on an external stimulus and remember it (Marton, Kelmenson and Pinkhasova, 2007). It may be thought that DLD is a result of differences in brain (body) structure however knowledge in this area is limited. Because of the difficulty of forming a message the activity of a child with DLD is affected, as they may not be able to communicate their issues/thoughts with peers. Resulting in difficulties forming relationships which limit social development and social confidence (Eadie et al., 2018). This will affect the child’s emotional state and could lead to depression/isolation. If the child’s social ability is affected the child may play independently which affects their early development. Therefore a child’s involvement in school will be affected leading to a lower quality of life (participation) (Westby, 2007).

Furthermore, DLD also impacts an individual’s academic performance. This is because of the delay in using grammatical morphology and language development. This affects the individual’s literacy development as they may experience word-finding and syntax acquiring difficulties. Their ability to write will be impacted (activity) causing them to achieve lower vocational qualifications. Additionally, this will influence them financially as they will only be able to gain employment in certain professions. Research has found that young people with DLD have a lower engagement with financial products. This shows how their participation in society will be affected by DLD (Westby, 2007).

Critical Analysis of Message Consequences and Communication Model

Question 1. Give examples of the following types of Biases in a sentence: Gender bias, Racial bias, Age bias, and Disability bias. How can they be avoided?

Answer: We communicate most of our ideas to others through verbal messages, i.e., through spoken or written messages. However, verbal messages have some drawbacks like the message might not be properly worded, or the message could also be misunderstood, or interpreted differently from its intended meaning. for instance, even an easy statement like ‘let’s discuss this matter tomorrow’ could be interpreted by one person as ‘let’s meet tomorrow and by another as ‘let’s discuss this over the phone.

What is Bias

Imagine you’re celebrating your kid’s 5th Birthday and invited all his friends. there’s one friend whom he knows for the last 4 years which they both play tons together aside from cycling etc. At the birthday celebration, you celebrated and enjoyed tons together with your kid and his friends. Later, at the time of return gift, you gave the expensive gift thereto a special friend and a normal gift to others, this is often biased, which may be a lack of objectivity or an inclination to favor one thing or person over another. By counting on whom you ask, bias can have a really complicated definition, but within the simplest terms, it means you’ve got a one-sided point of view about something, which tends to influence decisions and opinions about other things.

When it involves the business world, bias might be seen as simply unprofessional and will potentially have negative consequences for a business. From their reputation with clients, the final public, or staff, a corporation could suffer from not maintaining an objective non-biased presentation of knowledge. The wording in e-mails, between co-workers, memos, etc has the potential to demonstrate bad bias.

Biased language is a language that creates the use of expressions that humiliate or exclude people on the concept of their age, gender, race, ethnicity, class, or specific mental or physical characteristics. Language has the facility to arouse negative feelings if it’s not used with care. this will happen when the words used seem to be objective but actually contain an intentional or unintentional bias. While communicating we should always use bias-free language and avoid words and phrases that unfairly and even unethically categorize or stigmatize people in ways associated with gender, race, ethnicity, age, disability, or other personal characteristics. Contrary to what some may think to imagine, biased language isn’t simply about the “labels.”

There are various sorts of biases like gender bias, racial bias, age bias, and disability bias. Now I’ll be able to explain all of them with examples.

Gender Bias

As the name suggests, there shouldn’t be any bias due to the gender of a private. you ought to behave in the same manner whether you speak to a male or female. Gender bias may be a sort of prejudice and discrimination and it’s no place in business.

Example: One Sales manager asked his female assistant out for lunch to debate official matters while met male assistants within the office only.

In the above sentence, gender bias is clearly there. The manager is asking his assistant to discuss official matters which he can discuss in the office also. The male assistant met him in the office but as a female assistant there, he wants to require her out.

Example: In an interview, the interviewer told one female candidate, ‘I don’t think you’re suitable for this job because it demands to figure late night in addition.”

In the above situation, the interviewer clearly told the female candidate that, as she could also be a female, she cannot get the work as she cannot work late at night. If there was an option to choose from male or female, then he would have easily chosen that male candidate. This is often a really common case of gender bias.

Racial bias

Racial biases are a sort of implicit bias, which refers to the attitudes or stereotypes that affect a personality’s understanding, actions, and decisions in an unconscious manner. These biases, which encompass unfavorable assessments, are often activated involuntarily and without the notice or intentional control of the individual.

Example: My nephew visited London for higher studies and at some point in a college campus, some students stopped him and asked where he came from, he said India so all made fun of him.

In the above case, there’s a transparent situation of racial bias. London students aren’t happy to admit that an Indian guy is studying with them in order that they made fun of him. Here, my nephew clearly experienced the case of racial bias.

Age bias

Mention the age of an individual only if it’s relevant. Moreover, make sure of the context during which you employ words that ask age; such words carry a spread of positive and negative connotations. There are numerous cases within the workplace, where we discover that Age is the ultimate factor.

Example: One fine day, my boss called my father and told that the company isn’t doing well and we are in process of layoffs. He told that we’ll hire limited employees which too some young guys in order that company can save money.

This is also a standard case aged discrimination lately. Many companies fire old employees and hire young employees. They believe by doing this they go to avoid wasting money and young guys will get the work done faster.

Disability bias

Physical, mental, sensory, or emotional impairments should never be mentioned in business messages unless those conditions are directly relevant to the subject.

Example: At some point, our college teacher announced that we are becoming to picnic, and Anant, who was on a wheelchair, asked to not come to the picnic as he might not feel comfortable.

Here, Anant was disabled so he got this sort of order from the teacher. If he’s handicapped, then he cannot even attend a picnic together with his friends. This can be often really bad and nobody should treat disabled kids like this.

Question 2. Amazin. in has put up billboards across the main, arterial roads of Mumbai. The billboards advertise the Mega Independence Day Sale coming up. They hope their billboards can grab the attention of drivers and pedestrians on these busy roads. List the 8-steps in the Basic Communication Model and apply the model to Amazin. in’s billboard ad.

Answer: Advertising is indeed a crucial component of the fashionable economy, and it’s an integral part of any commercial transaction. The loud and shrill voice of the road hawker, the temple priest announcing the subsequent festival, and the village matchmaker visiting houses to present the eligible young boys’ and girls’ profiles are all samples of how they’re selling their products and services; these are as effective because of the highly captivating television commercials of today. It is a posh mechanism to understand advertising in its totality, but probably not difficult to search out how it works. In simple terms, advertising is also a persuasive communication that aims to vary or reinforce one’s prior attitudes that are predictive of future behavior. We aren’t born with the attitudes we hold towards various objects in our surroundings. Rather, we acquire our attitudes and notions in our infancy from our parents and environment. We then change our feelings of likes or dislikes about the objects through information about the objects (e.g. advertising), direct experience with them (e.g. tasting a replacement brand of beer), or a mix of the two.

Communication model

Irrespective of the setting during which communication takes place or the number of people that are involved, all communication consists of certain key elements. The communication model is explained below:

The idea of the message: Before conveying any message, you ought to have a clear idea about what you’ve got to tell you along with your message. Whether a communication effort will ultimately be effective starts right here and depends on the character of the thought and thus the motivation for sending it. as an example, if your motivation is to provide a solution to drag, you’ve got a far better chance of crafting a meaningful message than if your motivation is simply to complain a few problems. Within the given case, Amazin. has thought of a National holiday sale which they’ll execute this idea with communicating about this sale to the overall public via billboard advertisement. So; the first point is getting an idea that is extremely clear here.

The sender of the message: The one that starts the communication process is mostly mentioned because of the sender. he’s the one that transmits, spreads, or communicates a message with the aim of informing, persuading, influencing, or changing the attitude, opinion, or behavior of the receiver. for instance, a manager writing a letter to a consultant after a gathering or a sales manager making a presentation to the sales team. Here the manager is the sender. Here is the sales team of the Amazin. is that the sender who is sending its Independence Day sale message to the general public?

Drafting the message: The message is that the encoded idea transmitted by the sender making the formulation of the message extremely important, for an incorrect patterning can turn the receiver hostile, making him lose interest altogether. this is often any signal that triggers the response of a receiver. Messages could even be intentional (as within the instance of the sales presentation by a manager to the sales team) or unintentional (nonverbal signals like yawns that convey the message of boredom). Here message should be drafted wisely as billboard ads must catch the attention of the overall public on busy roads. Some catchy lines could also be used like Discount ki Azaadi or be independent and shop whatever you’d like.

Selecting the medium/channel: Now once you have got a clear idea about the message and everything is prepared, you’ve to pick the medium or channel you’ll be using to send your message. A medium helps the sender to convey the message to the receiver. To update your boss on the status of a project, for instance, you would possibly have a dozen or more media choices, from a call to a moment message to a slideshow presentation. As mentioned within the question, Amazin. in will advertise about its sale via billboard ad so medium or channel is already chosen. If your campaign is one among awareness and branding, billboard advertising may be a great option.

Receiving the message: A receiver is the targeted audience of the message who will receive the message and translate (decode) it to understand the important meaning and sends back the feedback (response) to the sender. within the given case, the general public will receive the message about the National holiday sale of Amazin. once they see the billboard ad.

Decoding the message: during this step, a receiver of the message will decode it and understand about the motive behind that message. After a message is received, the receiver must extract the thought from the message, a step named to as decoding. Here the public will understand that Amazin. in is arising with National holiday sale.

Response to the message: The audience responds to the message. By crafting messages in ways during which show the benefits of responding, senders can increase the probabilities that recipients will respond in positive ways. Amazin. in may track the traffic on its website and mobile application and assess the positive or negative response they’re getting due to its billboard ad.

Feedback to the sender: Most communication is two-way. Receivers generally answer messages. for instance, students may ask questions during a lecture session and an employer may tell an employee that he has possesses to believe his proposal. This response to a sender’s message is named feedback. this type of feedback is oral. Sometimes feedback also can tend during a written form. for instance, a manager can send a written response to a customer’s letter of complaint. Amazin.in will get the feedback only after the National holiday sale is over. Then only they’ll decide about the response of the purchasers.

Question 3:

  • a. You have just finished drafting a proposal for a coveted project. You want to make sure that you haven’t overlooked anything. What are the different proofreading techniques? you’d employ to make sure your proposal is error-free?
  • b. You’ve been shortlisted for an interview at your dream company. What are the different common types of Interviews you should mentally prepare yourself for?

Answer: (a)

Proofreading is the method of carefully reviewing a text for errors, especially surface errors like spelling, punctuation, grammar, formatting, and typing errors. If you don’t proofread your work, you might write “ham” rather than “harm” and confuse your reader. By the time you proofread a piece of writing, it should be almost done. It’s the very closing step of the writing process after drafting, editing, and revising.

Different techniques of proofreading :

  • Double-check high-priority items: Double-check the spelling of names and also the accuracy of dates, addresses, and any number that could cause grief if incorrect (such as telling a potential employer that you’d be happy to work for $5,000 a year when you meant to say $50,000). This stuff are very vital naturally and even a small mistake can impact any organization badly. If you’re checking anything twice then the chances of possible errors are almost eliminated.
  • Give yourself some distance: If possible, don’t proofread immediately after finishing a document; let your mind stray to new topics and then come fresh later. If your mind is fresh, your concentration level is high and you’ll easily find errors if any.
  • Be vigilant: Avoid reading large amounts of material in one sitting and take a look at to not proofreading when you’re tired because it’s very vital that you just stay alert while reading any vital document.
  • Stay focused: Consider on what you’re doing. Attempt to block out distractions and focus as completely as possible on your proofreading task.
  • Review complex digital documents on paper. Some people have trouble proofreading web pages, online reports, and other digital documents on screen. If you’ve got trouble, print the materials so you’ll review them on paper. By doing that, you’ll have easy accessibility of the documents and errors may be found easily.
  • Take your time: Quick proofreading isn’t careful proofreading. Make multiple passes. Go through the document several times, that specialize in a special aspect whenever. As an example, hunt for content errors the first time and layout errors the second time.
  • Use perceptual tricks: You’ve probably experienced the frustration of reading over something a dozen times and still missing a clear error. This happens because your brain has developed an exquisite skill of subconsciously supplying missing pieces and correcting mistakes when it knows what’s purported to get on the page. To stay your brain from tricking you, you wish to trick it by changing the way you process the visual information.

(b):

A job interview is the logical outcome of an efficient resume and canopy letter, also nearly as good performance during a GD. It has the precise purpose of determining how well the applicant will meet the work requirements and perform on the work. It is structured, since the time, venue, duration, the number of participants and matters to be discussed are all determined beforehand. It’s generally conducted during a formal manner, with the interviewer following a pre-determined agenda, like a list of inquiries to be asked.

Common types of interviews are:

  1. Campus interview: This process is incredibly common for the recruiter if the recruitment is to be done in bulk for a variety of posts. They typically visit colleges to interview students passing out of college. In this, there are three rounds of the evaluation process. The first round is referred to as the preliminary round, the candidates are screened on their educational performance and also the ineligible ones are eliminated.
  2. Face-to-face interview: During this process, the applications are received either through advertisements, references, or consultants. After this, the identical process of the interview takes place by calling the candidates over the phone and intimating them about the venue and time. During this type, the interviewer prefers to speak with the candidate directly without going through the number of tests or GD process, and then select the foremost suitable candidate once he fills his requirement.
  3. Telephonic interview: As the name suggests, the interview is conducted over the telephone if the candidate is living in a far of city, away from the place where the interviewer would conduct the interview. Generally if’s within the national boundary of one’s country, then the preliminary round of interviews is on the telephone to search out the suitability of the candidate consistent with the resume he has sent to the interviewer and also the position advertised.
  4. Behavioral interview: During this interview, the interviewer doesn’t ask any hypothetical questions to the candidate. He specifically asks what role the candidate played during things or how he reacted or what was the result. He actually tries to search out the behavior of the candidate during a given situation and might he try this in the future.
  5. Case interview: This interview is completed to work out the problem-solving skills of the candidates. A live situation is given and also the candidate is asked about his views regarding the case. It’s actually to search out that the candidate is applying his thoughts, skills, and experience to truly solve the matter. Here, the answer does not have to be right or wrong nor is the candidate required to give an ultimate solution to the problem, but to work out that he can tackle this real-life situation.
  6. Stress interview: This can be a pressure interview where the candidate is judged on how he can handle pressure jobs. It may be argumentative, controversial, or unfriendly. A candidate should not take it personally; rather he should be calm in answering the questions. If required, the candidate may raise for clarification or may answer, which he deemed slot in that situation.

Essay on Professional Communication Process: Analysis of Message, Audience, Channel, and Potential Noise

The professional communication process is used every day by everyone around the world. It makes up the way in which people communicate. This process has four main elements: the message, the audience, the channel, and the potential noise. When you are communicating with someone or a group of people, all four of these things will be present. Within this report, the importance of these particular elements will be discussed and evaluated in detail. After knowing the fundamentals of all four elements, it will then be discussed how they work in authentic situations. In simple terms, it will be discussed how each of these elements works in the professional communication process; meaning how the sender will send a message through a channel to an audience with the potential disruptions of noise. With all this taken into consideration, the Dumb Ways to Die campaign – a campaign that promoted train safety globally – which hit the Internet in November 2012 will be used to encapsulate each element.

Within the professional communication process, the message is one of the most, if not the most, important aspects. Cenere, Gill, Lawson, & Lewis (2015) suggests that within professional communication, the message is the content that is exchanged or delivered from the sender, which controls the entire communication process, (as it is their decision about the channel they choose to use which will best convey the message they are trying to produce, the actual message in which they are producing, and who the message is received by) (p. 54). This message then goes to the receiver via a channel (which will be talked about later) As Cheung (2011) suggests, everyone has an idea to express or a product or service to sell. According to Lehman & DuFrene (2011), most general communication is about informing others, but in a business context, most of the communication is about influencing others. Persuasion or influential communication may take the form of a campaign, such as ‘Dumb Ways to Die – considered the most shared public service announcement to encourage rail safety, which hit the Internet in November 2012 (Dumb Ways to Die – PSA (Dumb Ways to Die), 2013). In this campaign, Metro Trains Melbourne posted a three-minute YouTube video that included animations, a catchy song, a chilling message, as well as the first game app (Cenere et al, 2015, p. 84). Metro Trains Melbourne found that the key message of train and rail safety was one that was challenging to make it interesting to an audience that is known for rebelling against rules and regulations – Generation Y and particularly Generation Z (Cenere et al, 2015, p. 84). This is because they had to influence and project a thought-provoking message to a tough audience, however, the message was dominated by interpretations of the fact that if you engage in high-risk and dangerous behavior around trains, you could die and that death would be pointless and ‘dumb’ (Cenere et al, 2015, p. 87).

In the context of professional communication, an audience is considered the receiver or destination of the projected message, as it is their role to decode messages, which depends on numerous factors – the context of the message, the sender’s knowledge of this context, the sender’s situation at the point of time, and the audience’s beliefs, experiences and cultures (Cenere et al, 2015, p. 86). Hall, S (1973) suggests that there are three separate ways all messages are decoded – “as intended (dominant reading), as partially intended (negotiated reading), or not as intended (oppositional reading)”. Along with the three separate ways of decoding a message, there are three preeminent groups of audiences: primary, secondary, and unintentional. Cenere et al (2015) propose that the person/s in which a message is addressed to is the primary audience, while the secondary audience is those who are exposed to the message which is not targeted towards them (p. 86). In some cases, though, there can also be unintentional audiences which are those that are unintentionally exposed to the message. With these concepts in mind, as stated previously, Cenere et al (2015) suggest that the message within the Dumb Ways to Die campaign was dominated by interpretations of the fact that if you engaged in dangerous behavior in the presence of trains there is the possibility of death and that “death would be ‘dumb’” (Cenere et al, 2015, p. 87). In the campaign, the primary audience was Generation Y and Generation Z. These generations were targeted as they were renowned for rebelling against the rules and regulations, more likely to display dangerous actions in the presence of trains, to be a beginner or reckless drivers ignoring safety boom gates at rail crossings and more likely to jump train tracks rather than use provided rail crossings (Cenere et al, 2015, p. 89). Considering that the campaign became viral very quickly, it can be assumed that the people that were exposed to the campaign through forwarded links would have been the secondary audience. It can also be assumed that the people who were sent the video in its viral outbreak, as well as the people who used trains as a way of transport.

The channel is one of the most vital parts of the communication process. Cenere et al (2015) suggest that “a channel is the type of medium used to transmit a message” and is formed by two broad aspects – verbal and non-verbal communication. Verbal communication is where spoken words and written language are used, whereas non-verbal communication is where sounds and body language are used; they are not language-based (p. 55). Non-verbal communication happens more frequently than verbal communication as it takes place every time people interact with each other and is either intentional or unintentional (Gabbott & Hogg, 2000). Along with these two forms of communication, there are two components of communication – visual and non-visual (Cenere et al, 2015, p. 55). Visual components are those that can be seen whereas non-visual are those that cannot. Media richness theory assigns communication channels on a continuum of richness, which defines highly-rich channels as those that handle multiple cues together, such as using feedback, non-verbal actions, and several senses simultaneously (Gale, 2007). An example of this could be a face-to-face conference, whereas a business report is at the lower end of the continuum because of the fact that it involves only the visual senses and slow if any at all, feedback (Gale, 2007). It is evident when looking at the Dumb Ways to Die campaign, that it was considered a highly rich channel of communication. As mentioned earlier, Metro Trains Melbourne found it difficult to create a message that explains the importance of rail safety for an audience that was not stimulated by the area. However, they were able to make the campaign not appear as a safety message. Therefore, people who were not interested in safety might still be interested in the message because of the channel that was used – a YouTube video that included a catchy song and animations; then later a game application (Cenere et al, 2015, p. 84). This was the extensive channel that Metro Trains Melbourne chose to use as they thought it to be the most effective.

According to Cenere et al (2015), there are three types of noise (physical, technical or contextual) which are barriers that distort intended messages, resulting in incorrect interpretation (p. 60). “Noise can be disruptions such as a loud environment making it hard to hear others (physical), not having a high-speed internet connection resulting in conference videos lagging, (technological) or using language that means different things to both parties (contextual)” (Cenere et al, 2015, p. 60). Context allows for effective communication, as well as providing the sender with the knowledge to ensure messages do not create conflict or misinterpretation (Cenere et al, 2015, p. 61). A shared understanding of the intention of the communication is vital for both the sender and receiver to have as it allows for effective communication; they need to share the same context. Cenere et al (2015) suggest that senders and receivers interpret context from other indications around the communication – such as the location, medium, and the message itself (p. 61). Both the sender and receiver of intercultural communication must depend on a shared language in order to enhance effective communication. This usually means that one of the parties will not be using their primitive language (Noise and interference in various types of communication, Nordquist, 2019). The English language is very hard to understand and interpret if it is not a primary spoken language. Many public relations firms have attempted to globalize campaigns and slogans with disastrous consequences (Cenere et al, 2015, p. 62). Receivers who are dominant in another language to that of the sender will often misuse a word or phrase, potentially affecting their interpretation of the message (Nordquist, 2019). This type of “semantic noise” also includes jargon, slang, and professional industry-related vocabulary (Nordquist, 2019). For example, “Pepsi’s ‘Come alive with the Pepsi generation’ campaign translated to ‘Pepsi brings your ancestors back from the grave’ in some countries” (Cenere et al, 2015, p. 62). In the Dumb Ways to Die campaign, there could have been all types of noise occur due to all three types (physical, technological, and contextual) of disruptions.

This report has outlined the professional communication process and it is evident that it is used by every single person every day in every form of communication. It was proved that this process has four main elements; these being the message, the audience, the channel, and the potential distraction of noise. Within this report, the importance of these particular elements was shown through critical discussion. The professional communication process was then explained by using examples from the Dumb Ways to Die campaign, which has undoubtedly and unquestionably enhanced how these four elements of the professional communication process is used in true and actual situations. Therefore, in the summary of this report, it can be proven that the communication process is a vital aspect to professional and effective communication, especially in business settings.

To commence or enhance effective communication the following should be adhered to. The sender should be aware of the message they are producing and keep it clear, in order to have easy interpretation for the audience. The message should be complete with little to no jargon and no unnecessary information, in order to prevent confusion. The context of the audience should be considered before projecting the message, in order to prevent disastrous consequences. The channel of communication should be chosen carefully, ensuring it is appropriate for the message and audience, in order to enhance effectiveness. All forms of potential noise should be taken into consideration, in order to prevent disruptions.

References

  1. Cenere, P., Gill, R., Lawson, C., & Lewis M. (2015). Communication skills for business professionals. Cambridge, England: Cambridge University Press.
  2. Cheung, M. (2011). Factors affecting the design of electronic direct mail messages: Implications for professional communicators. IEEE Transactions on Professional Communication, 54(3), 279-298. https://doi:10.1109/TPC.2011.2161800
  3. Dumb Ways to Die. (2013). Dumb ways to die – PSA. Retrieved from https://dumbwaystodie.com/psa/
  4. Gabbott, M., & Hogg, G. (2000). An empirical investigation of the impact of non-verbal communication on service evaluation. European Journal of Marketing, 34(3/4), 384-398.
  5. Gale, T. (2007). Communication channels. Encyclopedia of Business and Finance. Retrieved from https://www.encyclopedia.com/finance/finance-and-accounting-magazines/communication-channels
  6. Hall, S. (1973). Encoding and decoding in the television discourse. Birmingham, United Kingdom: Centre for Cultural Studies, University of Birmingham.
  7. Lehman, C., & DuFrene, D. (2010). Business communication (16th ed.). Mason, Ohio: Cengage Learning.
  8. McCann. (n.d.). Dumb ways to die. Retrieved from https://mccann.com.au/project/dumb-ways-to-die/
  9. Nordquist, R. (2019). Noise and interference in various types of communication. Retrieved from https://www.thoughtco.com/noise-communication-term-1691349

A Comparative Study of Messaging Protocols: Analytical Essay

Abstract

Messaging protocols are basically formats and rules defined for exchanging messages between different parts of a messaging system. Message passing is a type of communication between processes. Message passing is a form of communication used in parallel programming and object-oriented programming. Communications are completed by the sending of messages (functions, signals, and data packets) to recipients. This work aims at studying messaging protocols like MQTT (Message Queuing Telemetry Transport), AMQP (Advanced Message Queuing Protocol), and XMPP (Extensible Messaging and Presence Protocol) based on their features, application, security aspects, limitations, and their usage in popular Social Media and messaging applications.

Keywords: MQTT, AMQP, XMPP, protocols, WhatsApp, Instagram, Facebook.

1. Introduction

Message passing is a method for invoking behavior on a computer. The invoking program sends a message to a process and depends on that process and its supporting organization to select and then run the code it selects. Message passing differs from predictable programming where a process, subroutine, or function is directly invoked by name.

Message passing is used universally in computer software. It is used as a way for the objects that make up a program to work with each other. Message passing may be implemented by various mechanisms, including channels.

A communication protocol is a set of rules that allow two or more units of a communications system to send information through any kind of variation of a physical quantity. The protocol defines the rules, syntax, semantics, and synchronization of communication and gives possible error recovery methods. Protocols may be implemented individually over hardware or software or over a combination of both.

A.MQTT

MQTT is a client-Server publish-subscribe messaging transport protocol. It is inviting, open, simple, and designed to be easy to implement by both publishers and subscribers. These characteristics make it ideal for use in most situations, including controlled environments such as for communication in Machine to Machine (M2M) and Internet of Things (IoT) contexts. As an example, Facebook Messenger is based on MQTT. Some of the positive characteristics of MQTT are its lightweight nature and binary footprint, which lead it to excel when transferring data. In comparison to some well-used protocols like Hypertext Transfer Protocol (HTTP), it only has a minimal packet overhead. Another important aspect of MQTT is that it is extremely easy to implement on the client side. This fits perfectly for constrained devices with limited resources. Its ease of implementation was one of the goals that were met when MQTT was invented.MQTT was invented in1999, with the aim of creating a protocol for minimal battery loss and minimal bandwidth usage. In a publish/subscribe pattern, a client publishes information and other clients can subscribe to only the information they want. In many cases, there is a broker between the clients who facilitates and/or filters the information. This allows for a loose coupling between entities. The decoupling can occur in a few different ways: Space, Time, and Synchronization.

  • Space: the publisher and subscriber need not reveal identities, by IP address or other ways.
  • Time: the two clients do not have to be running at the same time.
  • Synchronization: Operations are not stopped by publishing and receiving.

There are two units of communication in MQTT architecture. These units are taking the role of publishers and subscribers, client and server/broker. Clients can publish or subscribe to messages or both. The broker serves as a central component that accepts messages published by clients and delivers them to subscribed clients.

Figure 1. MQTT interaction model

Limitations of MQTT:

Analyzing the Limitations of the MQTT protocols gives us these outlooks.

  1. It operates over TCP. TCP requires more time to set up communication, which results in increased communication time and wake-up time.
  2. There is very limited support for the Retained Messages feature of MQTT messaging
  3. Subscription request from either a device or application is allocated a buffer of 5000 messages. The buffer allows for any application or device to fall into a backlog of up to 5000 pending messages for each subscription. When the buffer is full, the oldest messages are discarded when a new message is received.
  4. Some size limitations apply for the message payload on Platform Service.

Protocol Security:

MQTT features different security mechanisms, but most of them are not organized or provided by default, such as data encryption or entity authentication. Authentication processes, such as using the physical address of the device (MAC), exist and are controlled by the broker by registering a device’s information once it tries to connect. Access authorization can be done by the broker using a mechanism called an Access Control List (ACL). The ACL contains records of information such as the identifiers and passwords of the different clients that are allowed to access different objects and can also specify what functions the client can perform on these.

B. XMPP

Extensible Messaging and Presence Protocol (XMPP) is an open, XML-based protocol aimed at near-real-time, extensible instant messaging (IM) and presence information. It has been extended into the broader area of message-oriented middleware. It has been built to be extensible; the protocol has been extended with features such as Voice over IP and file transfer signaling. XMPP protocol has been used by several social networking platforms including Gtalk, WhatsApp, and Facebook; collaborative services like Google wave, and gradient; multiplayer games like chess park, and by many online live customer support and technical support services. With the speedy development of the information society, short message service is developed quickly. At the same time, the Instant Message(IM) service also become popular among users. As users now are tending to use a mobile phone at any time and place for instant messages, the interconnection of these two technologies is a new demand. XMPP which is based on Extensible Markup Language (XML) solves the problem that the Instant messaging system could not interconnect with other non-Instant Messaging systems. In XMPP, both instant messages and presence messages are based on XML. These messages use XML Stanza to switch between entities. XML is a readable text format that is flexible, extensible, and easy to create and reading. Through XML, it’s easy to build a gateway to realize the communication between the XMPP system and the non-XMPP system. XMPP gateway is the special module of the server. Its main task is to translate XMPP into the protocol which the non-XMPP system uses, and also do the reverse process. XMPP utilizes a decentralized architecture. The protocol uses a client-server model which means that clients do not talk directly to each other. By design, there is no central server. Each user on the XMPP network is given an XMPP address (JabberID) that works like an email address with an IP address/domain name and a username for the resident server. XMPP protocol is apt for any communication platform that supports the pub-sub design pattern. Pub-Sub design pattern describes how the message flows between the devices & applications. Here, the publisher sends data to the subscriber who receives the data through devoted channels. These subscribers receive a notification whenever a new message comes through these channels.

Figure 2. XMPP interaction model

Limitations of XMPP:

  • Redundancy of data transmitted: Around 60% of the information transmitted by the protocol is the presence of data, which creates excess traffic.
  • Limited scope to scalability: Because of the excessive traffic, XMPP is challenging for the creation of chat rooms and data publishing.
  • Inability to send binary data: Unchanged binary data cannot be delivered since XMPP is encoded as one long XML document.

Protocol Security:

XMPP provides numerous levels of security that are inherent in the protocol. Individual identity in XMPP is stronger compared to WebSockets. Users are required to authenticate both host servers and messages to stay away from the risk of spoofing. This helps to do away with the threat of spam. Users can put in more layers of security by requiring clients to install a suitable security certificate for identity confirmation.

The XMPP has two types of encryption. The first encryption takes place at the establishment and authentication using SASL(Simple Authentication and Security Layer). After a connection has been established, all client-server transmissions are encrypted using TLS(Transport Layer Security). This means that the danger of getting attacked is very small.

C. AMQP

AMQP(Advanced Message Queuing Protocol) comprises both a network protocol, which specifies what client applications and message servers must send over the wire to interoperate with each other and a protocol model, which specifies the semantics an AMQP implementation must obey to be interoperable with other implementations.AMQP is the result of a standardization effort by the major contributors in the messaging scene (e.g. Cisco, Microsoft, Red Hat, banks). It is designed for interoperability between different messaging systems.

There are a couple of important points to note about the AMQ protocol model. First, the chain of responsibility pattern is clearly in use. In this pattern, messages that appear to flow directly from sender to receiver actually flow through a set of message processors residing between the two. The second important point to note about the protocol model is that it enables the broker to effectively make routing decisions. It provides the definition for a binary wire protocol and a complete delivery semantic, allowing, theoretically, for an AMQP messaging client to be able to interact seamlessly with different broker implementations which are AMQP compliant. Nowadays, the adoption of the latest stable version (1.1) of the protocol is not yet extensive, but given that it is already supported by the major message brokers, a much wider implementation is expected in the upcoming years. We can map AMQP’s capabilities such that Java applications can use them through JMS APIs. For C++, Python, and Ruby applications, however, there are no popular open messaging API standards like JMS for Java, so those languages support their own AMQP APIs, which typically reflect the AMQP application-level protocol classes and methods. In AMQP message is first sent to a component of Message Broker called Exchanges. Exchanges distribute message copies to queues using rules called bindings. Then AMQP brokers either deliver messages to consumers subscribed to queues, or consumers fetch/pull messages from queues on demand.

Here is the sample interaction diagram on how AMQP works.

Figure 3. AMQP interaction model

Limitations of AMQP:

The AMQP specifications impose these limits on future extensions of AMQP:

  • Number of channels per connection: 16-bit channel number.
  • Number of protocol classes: 16-bit class id.
  • Number of methods per protocol class: 16-bit method id.

The AMQP specifications impose these limits on data:

  • Maximum size of a short string: 255 octets.
  • Maximum size of a long string or field table: 32-bit size.
  • Maximum size of a frame payload: 32-bit size.
  • Maximum size of a content: 64-bit size.

The server or client may also impose its own limits on resources such as the number of simultaneous connections, number of consumers per channel, number of queues, etc. These do not affect interoperability and are not specified.

Protocol Security:

We guard against buffer-overflow exploits by using length-specified buffers in all places. All externally provided data can be verified against the maximum allowed lengths whenever any data is read. Invalid data can be handled unambiguously, by closing the channel or the connection.

Attacks AMQP handles errors by returning a reply code and then closing the channel or connection. This avoids ambiguous states after errors. The server should be assumed that exceptional conditions during the connection negotiation stage are due to a hostile attempt to gain access to the server. The general response to any exceptional condition in the connection negotiation is to pause that connection (presumably a thread) for a period of several seconds and then to close the network connection. This includes syntax errors, oversized data, and failed attempts to authenticate. The server SHOULD log all such exceptions and flag or block clients provoking multiple failures.

Results:

Table 1. Comparison of AMQP, MQTT, XMPP

  • Criteria
  • AMQP
  • MQTT
  • XMPP
  • Format
  • Binary
  • Binary
  • Xml based
  • Aim
  1. Replacement of exclusive protocols
  2. To enable message passing in resource-constrained devices
  3. Promotes instant messaging for wider use
  • Reliability
  1. Publisher subscriber acknowledgments
  • Acknowledgments
  1. Acknowledgments and resumption
  • Security
  1. SASL, TLS/SSL
  • Header authentication
  1. SASL, TLS/SSL
  • Extensibility
  • Extension points
  • None
  • Extensible
  • API
  • Divided into classes
  1. 5 operations with 2-3 packet types for each
  2. Different XML items with multiple types
  • Transport
  1. TCP
  2. TCP
  3. TCP
  • Interaction model
  • Point to point
  • Publisher-Subscriber
  • Point to point
  • Resource discovery
  1. No
  2. No
  3. Yes
  • Message Caching
  1. Yes
  2. Yes
  3. Yes
  • Scope
  1. Device to Device
  2. Device to cloud
  3. Cloud to cloud
  4. Device to cloud
  5. Cloud to cloud
  6. Device to cloud
  7. Cloud to cloud
  • Interoperability level
  1. Structural
  2. Foundational
  3. Structural
  4. Fault tolerance
  • Implementation specific
  1. Broker in SPoF
  2. Server in SPoF

Table 2. Comparison of WhatsApp, Facebook, and Instagram

  • Criteria
  • WhatsApp
  • Facebook
  • Instagram
  • Meaning
  1. It is an application that provides users with texting services
  2. It facilitates users to connect themselves to the online community and build a social circle
  3. It allows users to build and join communities that share a common interest
  • Security
  1. End-to-end encryption by default
  2. Have to enable end-to-end encryption (secret conversation)
  3. End-to-end encryption not there
  • Features
  1. The users can chat and call their WhatsApp contacts and share photos, videos and audio, group messaging is also present
  2. The users can chat, call, post.and update pages, play games online, group conversations, etc
  3. Allows sharing of photos, videos and also has facility of direct messages, best for brand promotion, group chat facility available
  • Protocol used
  1. XMPP
  2. MQTT
  3. AMQP
  • Like and comment
  1. No
  2. Yes
  3. Yes
  • Account requirements
  1. Phone number
  2. Facebook account
  3. Instagram account

Conclusion:

Messaging is essentially a practical solution to the problem of distributed systems. In this work we have successfully surveyed application layer protocols, focusing on their application, security aspects, usage, and their limitations in a comparative, tabular format. The study found which application layer protocols are predominantly used in various social media and messaging applications. This study also puts light on the fact that some communication protocols are favored over others by developers. Based on its stability and simple construction MQTT is the protocol that has be proven to stand the test of time to have excellent performance over constrained devices. Although MQTT is suited for simple clients, any infrastructure using it is exposed to numerous security weaknesses and failure to make better use of resources. On the other hand, AMQP is suited to these cases and supports better use of resources and a practical security approach with message reliability. AMQP is a simple yet powerful enterprise messaging tool that has a bright future in enterprise messaging. XMPP is a near-end streaming instant messaging protocol that embeds field and context-sensitive information into XML enabling communication between systems and people. Thus this study congregates three major communication protocols highlighting their usage and application.

References:

  1. Bryce, R., Shaw, T., &Srivastava, G. (2018, July).Mqtt-g: A publishes/subscribe protocol with geolocation. In 2018 41st International Conference on Telecommunications and Signal Processing (TSP) (pp. 1-4).IEEE.
  2. Dinculeană, Dan. Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices. Applied Sciences.2019. 9. 848. 10.3390/app9050848.
  3. AMQP (Advanced Message Queuing Protocol) http://www.amqp.org
  4. MQTT (MQ Telemetry Transport) http://mqtt.org
  5. XMPP (Extensible Messaging and Presence Protocol) http://xmpp.org
  6. Katsikeas, S.; Fysarakis, K.; Miaoudakis, A.; Bemten, A.V.; Askoxylakis, I.; Papaefsta-thiou, I.; Plemenos, A Lightweight & Secure Industrial IoT Communications via the MQ Telemetry Transport Protocol. In Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece,3–6 July 2017.
  7. [Dizdarević, J., Carpio, F., Jukan, A., &Masip-Bruin, X. (2019). A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration. ACM Computing Surveys (CSUR), 51(6), 1-29.
  8. Griffin, L., de Leastar, E., &Botvich, D. (2011, May). Dynamic shared groups within XMPP: An investigation of the XMPP group model. In 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops (pp. 634-637).IEEE.
  9. Lu, X., Lei, W., & Zhang, W. (2012, July). The design and implementation of XMPP-based SMS gateway.In 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks (pp. 145-148).IEEE.
  10. S Vinoski, ‘Advanced Message Queuing Protocol,’ in IEEE Internet Computing, vol. 10, no. 6, pp. 87-89, Nov.-Dec. 2006.
  11. Ozturk, O. (2010, May). Introduction to XMPP protocol and developing online collaboration applications using open source software and libraries.In 2010 International Symposium on Collaborative Technologies and Systems (pp. 21-25).IEEE.
  12. Cohn, R. (2011). A comparison of AMQP and MQTT. White Paper, StormMQ.

Message Queuing Telemetry Transport: Analytical Essay

Abstract

Rapid revolution in the Region of Information Communication technology and digital things are pushing for the rapid formation of IoT (Internet of Things). In IoT, device-to-device information interchanges are considered through either Pushing or Polling convention. Push protocol is much more acceptable for IoT devices because of its High productivity and lightweight. You can find various Push protocols readily available for IoT such as XMPP, MQTT, and AMQP in which MQTT is most widely used. The vital feature of MQTT is its lightweight and bandwidth efficiency. There are various brokers implemented for the MQTT protocol but each has some restriction and nobody execute the priority of information. This paper describes the Value of MQTT in the Internet of Things.

The design of MQTT, various domains in which MQTT has been utilized, distinct brokers of MQTT, current issues in MQTT along with future trends

Keywords— Message Queuing Telemetry Transport (MQTT), Internet of Things, push protocol, Publish/Subscribe

Introduction

The network of smart devices approach was discussed in 1982, using a revised Coke machine at Carnegie Mellon University comely the very first internet-connected machine, in a position to report its catalog and whether recently loaded beverages were cold. However, the word ‘Internet of Things has been coined by British writer Kevin Ashton the executive manager of Auto-ID centre in the year 1999. These days, communicating between similar objects or dispatching instructions to home appliances isn’t thought of anymore with the development of wireless transmission mechanisms and small-scale and less-potential appliances. But the Internet of Things is really Communication involving machine to machine or human to machine. Back in IoT, message transmission between different devices is vital because an IoT appliance has to deliver education to a further appliance to handle the system. In comparison to polling protocol, Push protocol would be a suitable message communication protocol for IoT appliances since it’s constructed in a bandwidth system. MQTT, AMQP (Advanced Message Queuing Protocol), XMPP (Extensible Messaging and Presence Protocol), and CoAP (Constrained Application Protocol) protocols have been executed through these push message providers. These protocols are appropriate in accordance with different conditions. In particular, MQTT was used as part of many IoT gadgets and immediate message delivery systems because it was intended to operate on low-power machines as a lightweight protocol. IoT challenges undertakings, little organizations, and engineers with new issues to settle. While HTTP is the accepted convention for the human web, correspondence between machines at scale requires a change in perspective—controlling far from request/reaction and driving towards distribution/buy-in. This is the place the ultra-lightweight, enormously adaptable, and simple to-execute convention MQTT enters the image. The rest of the paper is arranged as follows: Section II represents the introduction of MQTT, and Section III explains the architecture of MQTT briefly. Section IV shows us the real-life applications of MQTT. Section-V represents different MQTT brokers. Section VI discusses about advantages and drawbacks of MQTT. Conclusion and Future trends in this technology is discussed in Section VII. The references are mentioned at the end of the paper.

MQTT Protocol Introduction

MQTT is a standardized publish/subscribe Push protocol. In 1999, this protocol was released by IBM. This was planned to send data accurately under the long network delay and low bandwidth network conditions.

A. Basic Concepts of MQTT

  1. 1)Publish/subscribe: In the MQTT protocol, the publisher publishes users and messages subscribing to subjects which are generally regarded as a Publish/Subscribe model Subscriber subscribes to subjects that are related to them by that receive each message are printed to these subjects. On the other hand, customers can print messages to subjects, in this manner that allows all readers to get messages of these subjects
  2. 2)Topics and subscriptions: In MQTT, publishers publish messages to subjects that could be considered as message subjects. Subscriber, so, subscribe to topics to get certain messages. The Subscriptions of subjects could be expressed, which limits the data that are collected to the topic. Topics include two wildcard levels, to get data for a variety of associated subjects.
  3. 3)Service level quality: This protocol describes the Quality of Service (QoS) levels that are a deal within two Parties of a message connected to the assurance of Supply of information. It supports three degrees of Quality of Services that are described below
  • a) QoS0: In this QoS level, the message is sent at most once and it does not provide a guarantee delivery of a message.
  • b) QoS1: In this QoS level, the data is sent at least once and it is possible to deliver a message more than once by setting the value of duplicate flag by 1.
  • c) QoS2: In these QoS level, the message is sent exactly once by using 4-way handshaking. The selection of the QoS level depends on the system like if a system needs constant data delivery, adapts QoS2 for transmission of data even if there is a time delay
  1. 4) Retained messages: In MQTT, the communications are keeps in the broker after dispersing it to all current customers. In this stage, if another membership is obtained for the identical topic, then stored messages of these subjects are transmitted into the new client.
  2. 5) Clean sessions and authentic connections: At the point when a contributor partners with the broker, a clean session association is thought of as permanent if its value is false. Within this task, consecutive messages that come outside conveying the highest QoS mission are reserved for delivery once the institution is resumed. Use of these flags is optional.
  3. 6) Wills: A customer can notify the broker that it includes a will (message) that ought to be dispersed to a specific topic or topics in the event of an abrupt detach. All these are particularly beneficial in the machine-like alarm or security configurations where supervisors are immediately notified as a sensor has a connection to the system.

MQTT Architecture

The typical MQTT structure can be split into two major components as shown in figure 1. Each component is briefly described below:

  1. 1) Client: The client could be a Publisher or Subscriber and it always establishes the network connection to the Serve (Broker). It can do the following things:
  • Publish messages for connected users.
  • Subscribe an interesting subject to receiving messages on that topic.
  • Unsubscribe to remove from the subscribed subjects.
  • Disconnect from the Broker.

Figure 1. Architecture of MQTT

  1. 2) Broker: The broker controls the supply of data and is mostly responsible for getting all messages from the writer, filtering them deciding who’s considering it, and sending the messages to all your customers. It can do the following things
  • Accept Client requests.
  • User-published messages are received
  • Processes distinctive solicitations like Subscribe and Unsubscribe from Users.
  • After receiving messages from the publisher, it sends the message to the interested Users

Figure 2. Working of MQTT

Applications Of Mqtt

MQTT is a decent decision for remote systems that experience changing dimensions of inertness because of intermittent data transfer capacity requirements or inconsistent connections. In this present reality, there are a few tasks that execute MQTT.

  1. Facebook Messenger: Facebook has utilized parts of MQTT in Facebook Messenger. it is vague whether the amount of MQTT is utilized or for what. In addition, this is a telephone application, not a sensor application.
  2. IECC Scalable Delta Rail’s most recent adaptation of their IECC Signaling Control System utilizes MQTT for interchanges inside the different pieces of the framework and different segments of the flagging framework. It gives the structure of the hidden interchange to a framework that is agreeable with the CENELEC norms for wellbeing basic correspondences.
  3. The IoT in stage utilizes MQTT as an M2M protocol for many associated items.
  4. The Open Geospatial Consortium Sensor Things API standard determination has an MQTT expansion in the standard as an extra message convention authoritative. It was shown in a US Department of Homeland Security IoT Pilot.
  5. The Open Stack Upstream Infrastructure utilizes MQTT as a bound-together message transport between administrations.
  6. Healthcare: By using MQTT, a healthcare association needed to create a flexible checking solution. The arrangement is expected to address of victim care such as keeping track of victims besides they go away from the clinic and upgrading the effectiveness of subsequent tests.

MQTT Brokers

The MQTT broker is the heart of every MQTT arrangement. It supplies connecting links between applications or physical Devices and enterprise systems. Brokers are in control of Subscription, decided sessions, missed messages, and General security, including authentication and authorization. There are different brokers available each having their unique features, functioning, and limitations. The brokers are Mosquitto, RSMB (Really small message breaker), MQTT.js (based on JavaScript), HiveMQ, and VerneMQ.

Mqtt Advantages And Drawbacks

Advantages:

MQ Telemetry Transport Protocol (MQTT) offers various points of interest over HTTP. MQTT is a lightweight publish or subscribe message protocol (utilized by Facebook Messenger, among others). HTTP is planned as a request-response protocol for customer server figuring, not really streamlined for versatile and push abilities, especially regarding battery utilization.

In the mobile usage area, reaction times, throughput, lower battery use, and lower transmission capacity are key plan criteria. Contrasted with HTTP, MQTT includes quicker reaction and throughput, and lower battery and transmission capacity use, making it appropriate to utilize situations where:

  • Connectivity is irregular
  • Bandwidth is at a higher cost than normal
  • An enterprise application needs to interface with at least one telephone applications
  • Phone or tablet applications need to send information dependably without requiring code retry logic

Another preferred standpoint of MQTT over HTTP is that it is incorporated with enterprise informing middleware, so it works with enterprise-level applications that push information to portable applications. MQTT can likewise be coordinated with IBM Work light so that designers can make portable applications utilizing HTML and JavaScript but then have the informing capacity working at the native layer, in native Java code, sent on Android.

Fundamentally, MQTT is intended for low latency, guaranteed informing, and proficient conveyance. Other preferences incorporated with the MQTT convention are held messages and various subscriptions ‘multiplexed’ more than one connection

Drawbacks:

  1. The issue with MQTT is that it utilizes TCP associations with an MQTT broker. Having a dependence on the connection will restrain the time the gadgets can be put to rest. This can be to some degree alleviated by utilizing MQTT-S, which works with UDP rather than TCP. In any case, MQTT likewise needs encryption since the convention was proposed to be lightweight and encryption would include critical overhead.
  2. In MQTT, the message is never expired. If you put a message in broker and forgot to gather it or nobody takes it, then the message will remain there forever. Many messages are forgotten like this stay there and degrade overall performance.
  3. MQTT does not support a feature called priority of messages. If any platform has more significant data then it must be instantly available to all the readers, for instance, the information which is accumulated from fire alarm system is more important than pressure or temperature sensor information so it must be available first to all recipients. So, for that priority of messages are needed then sending data in order.

Conclusion And Future Trends

IoT is supposed to present innovative connectivity of solutions, systems, and devices that goes over machine-to-machine institutions (M2M) and contains a selection of applications, protocols, and domains. MQTT’s simplicity and open source code create this protocol acceptable for constrained environments such as IoT that has reduced power, limited computation capacity, and memory, along with limited bandwidth. This paper describes the development and the value of MQTT in IoT, the generic structure of MQTT, many potential domains in which MQTT is largely used, many brokers utilized by MQTT with their constraints and attributes, and present problems which need to be addressed. Within our future work, we continue to improve the function of broker in MQTT that are going to have the ability to provide functionalities like priority of messages, ordering, and safety based on crucial policy-Attribute based encryption utilizing lightweight elliptic curve cryptography.

References

  1. Hwang, H. C., Park, J., & Shon, J. G. (2016). Design an implementation of a reliable message transmission system based on MQTT protocol in IoT. Wireless Personal Communications, 91(4), 1765-1777.
  2. Luzuriaga, J. E., Cano, J. C., Calafate, C., Manzoni, P., Perez, M., & Boronat, P. (2015, September). Handling mobility in IoT applications using the MQTT protocol. In Internet Technologies and Applications (ITA), 2015 (pp.245-250). IEEE.
  3. Singh, Meena, et al. ‘Secure MQTT for internet of things (IoT).’ Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on. IEEE, 2015.
  4. Hunkeler, U., Truong, H. L., & Stanford-Clark, A. (2008, January). MQTT-S—A publish/subscribe protocol for Wireless Sensor Networks. In Communication systems software and middleware and workshops, 2008.comsware 2008. 3rd international conference on (pp. 791-798). IEEE.