{"id":96,"date":"2023-12-14T12:41:09","date_gmt":"2023-12-14T12:41:09","guid":{"rendered":"https:\/\/plat.one\/blog\/?p=96"},"modified":"2023-12-14T12:41:09","modified_gmt":"2023-12-14T12:41:09","slug":"machine-to-machine-communication-protocols","status":"publish","type":"post","link":"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/","title":{"rendered":"Machine-to-Machine Communication Protocols"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In examining the structural organization of Machine-to-Machine (M2M) communication protocols, it\u2019s imperative to appreciate that these protocols are not monolithic but rather are segmented into hierarchical layers, each designed to fulfill distinct functions within the communication process. Comparable to the layered model of the Internet itself, the hierarchies in M2M protocols segregate tasks into manageable sections, enabling improved efficiency, better error handling, and greater flexibility.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At the lowest level of this hierarchy lies the physical layer protocols. These are primarily concerned with the actual hardware and the foundational means by which data is physically transmitted and received. This could include aspects of radio frequency communication, Ethernet connectivity, or any other medium that serves as the conduit for data transfer.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ascending from the physical, we encounter the data link layer protocols. These are tasked with the management of point-to-point frame synchronization, the physical addressing, and the error detection and correction necessary to deliver a reliable data transmission service.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft wp-image-98 \" src=\"https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/12\/OIG.HoZ0K8TKtWPZkR1lhrFg-1.jpg\" alt=\"Machine-to-Machine Communication Protocols\" width=\"613\" height=\"613\" srcset=\"https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/12\/OIG.HoZ0K8TKtWPZkR1lhrFg-1.jpg 1024w, https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/12\/OIG.HoZ0K8TKtWPZkR1lhrFg-1-300x300.jpg 300w, https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/12\/OIG.HoZ0K8TKtWPZkR1lhrFg-1-150x150.jpg 150w, https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/12\/OIG.HoZ0K8TKtWPZkR1lhrFg-1-768x768.jpg 768w\" sizes=\"(max-width: 613px) 100vw, 613px\" \/>Next comes the network layer protocols, which facilitate the routing of packets of data from source to destination across complex networks. This layer is particularly essential for ensuring the data does find the most efficient path to its endpoint, which may involve traversing multiple networks or hops. Its role is to abstract the underlying infrastructure to provide a seamless transmission process for the upper layers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The transport layer protocols follow, providing critical end-to-end communication services for data flow control, segmentation, error recovery, and the establishment of reliable or unreliable communication channels. In an M2M context, this layer adjusts to the constraints and needs of the devices, ensuring that even with limited computing resources, devices can still participate in reliable communication.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At the pinnacle of the hierarchy rest the application layer protocols. These provide the high-level APIs and service models that the applications use to communicate over a network. It is at this juncture that device-specific functionalities and the logic for applications to process and utilize data are determined. Protocols at this layer are designed to handle the vast varieties and volumes of data generated by M2M environments and turn that data into actionable insights.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Breaking Down the Protocols<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">When delving deeper into the comparison of various M2M communication protocols, it becomes apparent that each has been developed with a certain operational context in mind, reflecting a diverse set of design principles, capabilities, and suitability for particular applications.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Starting with Message Queuing Telemetry Transport (MQTT), this protocol operates on a publish-subscribe model that is incredibly effective in scenarios where message size and bandwidth need to be conserved. IoT devices with limited processing power and those operating on constrained networks benefit from MQTT&#8217;s simplicity and the elegantly efficient way it handles intermittent connections. Originally developed for oil pipelines, MQTT has evolved into a widespread protocol for all sorts of M2M communication needs. Despite its streamlined nature, MQTT can present limitations. While it handles small and simple messages well, it is not as adept at transferring larger data payloads or supporting complex network patterns without additional customization.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Constrained Application Protocol (CoAP) is designed to work in very constrained environments, and thus, is lightweight and optimized to be simple enough for basic computational nodes. This makes CoAP particularly suited for M2M applications where devices, such as sensors and actuators in home automation systems, operate with limited power resources. CoAP is structured similarly to HTTP, providing familiar methods like GET, POST, PUT, and DELETE, which facilitates ease of adoption and integration with web-based services. CoAP&#8217;s lightweight design means it could be less favorable in scenarios that demand extensive and multifaceted messaging functionalities, or in fully connected environments where the constraints it addresses are not present.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Advanced Message Queuing Protocol (AMQP) stands out for its robust and comprehensive feature set suitable for high-enterprise applications that require reliable and secure message-oriented middleware. AMQP&#8217;s complex routing and flexible queueing model make it an exceptional fit for creating sophisticated and scalable M2M ecosystems. It guarantees message delivery and transactional integrity, which are vital for business-critical operations. The comprehensive nature of AMQP also contributes to its relatively greater demand on resources compared to simpler protocols. This complexity can prove to be a hindrance when considering deployment on smaller devices or systems with stringent resource limitations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lightweight Machine-to-Machine (LwM2M) is a protocol designed to cater to the needs of device management and telemetry within the IoT landscape. Focused on addressing the application layer necessities, LwM2M offers a suite of services including remote configuration, monitoring, and management of devices over the air. It excels particularly in networks with cellular connectivity, playing a crucial role in enabling efficient communication in mobile M2M applications. The protocol adopts a model that includes the description of the interface between LwM2M Servers and LwM2M Clients, which not only aids in standardizing communication but also provides an architecture that supports lightweight and low-power operations. LwM2M reflects a newer generation of M2M protocols and, as such, may experience growing pains as it matures and establishes itself more fully in the IoT ecosystem, which can make entities cautious about its adoption in the short term.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Operational Considerations for Protocol Selection<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">When it comes to selecting the right M2M communication protocol, decision-makers must pay close attention to the operational requirements of their systems. This meticulous selection process is driven by the understanding that the optimal protocol should not only meet current needs but should also adapt to future demands and technological changes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the foremost factors to consider is power availability, which significantly affects the choice of protocol, especially in battery-operated or energy-harvesting devices. Protocols like MQTT and CoAP are designed with energy efficiency in mind, thus supporting deployments where power conservation is essential. For these devices, lightweight protocols that minimize data overhead can make the difference between frequent battery replacements and years of uninterrupted service.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><img decoding=\"async\" class=\"alignright wp-image-101 \" src=\"https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/12\/OIG.ZlRRghUzA.NDeA2BMGIt-1.jpg\" alt=\"Machine-to-Machine Communication Protocols\n\" width=\"560\" height=\"560\" srcset=\"https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/12\/OIG.ZlRRghUzA.NDeA2BMGIt-1.jpg 1024w, https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/12\/OIG.ZlRRghUzA.NDeA2BMGIt-1-300x300.jpg 300w, https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/12\/OIG.ZlRRghUzA.NDeA2BMGIt-1-150x150.jpg 150w, https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/12\/OIG.ZlRRghUzA.NDeA2BMGIt-1-768x768.jpg 768w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/>Another vital consideration is the data throughput requirement of the deployment scenario. Systems that need to handle large volumes of data or require high-speed transmission will benefit from protocols that can efficiently manage larger payloads and provide higher bandwidth. Systems that deal primarily with small, sporadic data packets might prioritize protocols that are better optimized to handle such communication patterns.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The range of the M2M communication network is also a key factor. Some protocols are better suited for short-range communication, such as those used in home automation, while others are designed for long-range applications, such as pipeline monitoring across vast distances.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Real-time data transmission is an essential requirement for certain M2M applications, particularly ones that rely on timely and synchronized data exchange. Protocols that offer low latency are vital in domains such as health monitoring systems, where the timely delivery of data can have critical implications.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security stands as a non-negotiable aspect of any M2M communication protocol. With the increasing sophistication of cyber attacks, it&#8217;s crucial that selected protocols provide robust security measures. MQTT&#8217;s use of SSL\/TLS provides secure channels, while CoAP&#8217;s use of DTLS is an asset in guarding against interceptions. AMQP&#8217;s support for SASL authentication and TLS encryption positions it as a highly secure protocol for enterprise environments. Similarly, LwM2M employs DTLS for secure device management. Each protocol\u2019s security features must be carefully analyzed not just for current threats but also for perceived future vulnerabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cost is another compelling dimension of protocol selection; it encompasses the expenses related to initial setup and long-term operational and maintenance costs. Protocols that are lightweight and designed for minimal maintenance, such as MQTT and CoAP, often lead to lower costs over time. Implementing a more complex protocol like AMQP may involve greater initial investment but can prove to be cost-efficient for enterprises needing a large-scale, reliable messaging system with fewer maintenance requirements.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Scalability is particularly critical given the rapid growth and integration of IoT devices. Protocols must be able to sustain performance even as the system expands. MQTT and CoAP are inherently designed to handle scaling in the IoT sphere, whereas AMQP&#8217;s capabilities make it adept at scaling within large-scale enterprise systems. LwM2M, tailored to manage a plethora of IoT devices, supports scalability by allowing efficient command and control message exchanges even as device networks grow.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In examining the structural organization of Machine-to-Machine (M2M) communication protocols, it\u2019s imperative to appreciate that these protocols are not monolithic but rather are segmented into hierarchical layers, each designed to fulfill distinct functions within the communication process. Comparable to the layered model of the Internet itself, the hierarchies in M2M protocols segregate tasks into manageable [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":99,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-96","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Machine-to-Machine Communication Protocols - plat.one<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Machine-to-Machine Communication Protocols - plat.one\" \/>\n<meta property=\"og:description\" content=\"In examining the structural organization of Machine-to-Machine (M2M) communication protocols, it\u2019s imperative to appreciate that these protocols are not monolithic but rather are segmented into hierarchical layers, each designed to fulfill distinct functions within the communication process. Comparable to the layered model of the Internet itself, the hierarchies in M2M protocols segregate tasks into manageable [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/\" \/>\n<meta property=\"og:site_name\" content=\"plat.one\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-14T12:41:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/12\/OIG.OvHdRHFHlt3LAvpGJy_d-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"alzanetryo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"alzanetryo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/\"},\"author\":{\"name\":\"alzanetryo\",\"@id\":\"https:\/\/plat.one\/blog\/#\/schema\/person\/e6dfb6f87def997a631128f63a691d2c\"},\"headline\":\"Machine-to-Machine Communication Protocols\",\"datePublished\":\"2023-12-14T12:41:09+00:00\",\"dateModified\":\"2023-12-14T12:41:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/\"},\"wordCount\":1384,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/plat.one\/blog\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/\",\"url\":\"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/\",\"name\":\"Machine-to-Machine Communication Protocols - plat.one\",\"isPartOf\":{\"@id\":\"https:\/\/plat.one\/blog\/#website\"},\"datePublished\":\"2023-12-14T12:41:09+00:00\",\"dateModified\":\"2023-12-14T12:41:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/plat.one\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Machine-to-Machine Communication Protocols\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/plat.one\/blog\/#website\",\"url\":\"https:\/\/plat.one\/blog\/\",\"name\":\"plat.one\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/plat.one\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/plat.one\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/plat.one\/blog\/#organization\",\"name\":\"plat.one\",\"url\":\"https:\/\/plat.one\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/plat.one\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/11\/plat-logo22.png\",\"contentUrl\":\"https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/11\/plat-logo22.png\",\"width\":375,\"height\":87,\"caption\":\"plat.one\"},\"image\":{\"@id\":\"https:\/\/plat.one\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/plat.one\/blog\/#\/schema\/person\/e6dfb6f87def997a631128f63a691d2c\",\"name\":\"alzanetryo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/plat.one\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8973169f0a5fdd237b3ffbed98eb718795ad62be5e76f40ae5236b869e0ab9fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8973169f0a5fdd237b3ffbed98eb718795ad62be5e76f40ae5236b869e0ab9fe?s=96&d=mm&r=g\",\"caption\":\"alzanetryo\"},\"sameAs\":[\"http:\/\/plat.one\/blog\"],\"url\":\"https:\/\/plat.one\/blog\/author\/alzanetryo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Machine-to-Machine Communication Protocols - plat.one","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/","og_locale":"en_US","og_type":"article","og_title":"Machine-to-Machine Communication Protocols - plat.one","og_description":"In examining the structural organization of Machine-to-Machine (M2M) communication protocols, it\u2019s imperative to appreciate that these protocols are not monolithic but rather are segmented into hierarchical layers, each designed to fulfill distinct functions within the communication process. Comparable to the layered model of the Internet itself, the hierarchies in M2M protocols segregate tasks into manageable [&hellip;]","og_url":"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/","og_site_name":"plat.one","article_published_time":"2023-12-14T12:41:09+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/12\/OIG.OvHdRHFHlt3LAvpGJy_d-1.jpg","type":"image\/jpeg"}],"author":"alzanetryo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"alzanetryo","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/#article","isPartOf":{"@id":"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/"},"author":{"name":"alzanetryo","@id":"https:\/\/plat.one\/blog\/#\/schema\/person\/e6dfb6f87def997a631128f63a691d2c"},"headline":"Machine-to-Machine Communication Protocols","datePublished":"2023-12-14T12:41:09+00:00","dateModified":"2023-12-14T12:41:09+00:00","mainEntityOfPage":{"@id":"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/"},"wordCount":1384,"commentCount":0,"publisher":{"@id":"https:\/\/plat.one\/blog\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/","url":"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/","name":"Machine-to-Machine Communication Protocols - plat.one","isPartOf":{"@id":"https:\/\/plat.one\/blog\/#website"},"datePublished":"2023-12-14T12:41:09+00:00","dateModified":"2023-12-14T12:41:09+00:00","breadcrumb":{"@id":"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/plat.one\/blog\/machine-to-machine-communication-protocols\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/plat.one\/blog\/"},{"@type":"ListItem","position":2,"name":"Machine-to-Machine Communication Protocols"}]},{"@type":"WebSite","@id":"https:\/\/plat.one\/blog\/#website","url":"https:\/\/plat.one\/blog\/","name":"plat.one","description":"","publisher":{"@id":"https:\/\/plat.one\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/plat.one\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/plat.one\/blog\/#organization","name":"plat.one","url":"https:\/\/plat.one\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/plat.one\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/11\/plat-logo22.png","contentUrl":"https:\/\/plat.one\/blog\/wp-content\/uploads\/2023\/11\/plat-logo22.png","width":375,"height":87,"caption":"plat.one"},"image":{"@id":"https:\/\/plat.one\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/plat.one\/blog\/#\/schema\/person\/e6dfb6f87def997a631128f63a691d2c","name":"alzanetryo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/plat.one\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8973169f0a5fdd237b3ffbed98eb718795ad62be5e76f40ae5236b869e0ab9fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8973169f0a5fdd237b3ffbed98eb718795ad62be5e76f40ae5236b869e0ab9fe?s=96&d=mm&r=g","caption":"alzanetryo"},"sameAs":["http:\/\/plat.one\/blog"],"url":"https:\/\/plat.one\/blog\/author\/alzanetryo\/"}]}},"_links":{"self":[{"href":"https:\/\/plat.one\/blog\/wp-json\/wp\/v2\/posts\/96","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plat.one\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/plat.one\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/plat.one\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/plat.one\/blog\/wp-json\/wp\/v2\/comments?post=96"}],"version-history":[{"count":3,"href":"https:\/\/plat.one\/blog\/wp-json\/wp\/v2\/posts\/96\/revisions"}],"predecessor-version":[{"id":102,"href":"https:\/\/plat.one\/blog\/wp-json\/wp\/v2\/posts\/96\/revisions\/102"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/plat.one\/blog\/wp-json\/wp\/v2\/media\/99"}],"wp:attachment":[{"href":"https:\/\/plat.one\/blog\/wp-json\/wp\/v2\/media?parent=96"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/plat.one\/blog\/wp-json\/wp\/v2\/categories?post=96"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/plat.one\/blog\/wp-json\/wp\/v2\/tags?post=96"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}