There are multiple approaches to IoT connectivity.
You may be interested by wireless communications technologies like Zigbe, Bluetooth, Wifi (IEEE 802.11).
You might read with interest the publicly available standards of OneM2M, which are designed to cover exactly what you are after, called M2M for machine to machine communication. From a mobile operator network perspective, which have technology standards defined at 3GPP, the terminology is MTC for machine type communication, defined as communication between devices or systems with no human needed. The 5G mobile systems aim at serving either humans, or MTC, with two extreme cases defined as mMTC or massive machine type communication (for instance smart meters, these energy or other meters which are accessed remotely for measurements like consumption, activity data) and URLLC ultra reliable low latency communication (powerful machines)
@Kajal Panda UART stands for Universal Asynchronous Receiver/Transmitter this is the protocol required for GPS module like SIM900/800 & finger print sensor uses RFID interface....@
There are standard protocols that enable different devices operating over different systems and networks to communicate with each other. One standard model goes through 7 layers of protocols every time a device communicates with another through the internet.
From the physical device, data goes through the network, is transported from the network into a session, then the presentation where the information can then be seen and finally, the application protocol where the data can be used, manipulated, and re transmitted. The bigger the IoT gets the more complex the protocols needed to ensure seamless communication get.
Constant security will eat up a lot of bandwidth and create a huge cache of stored data. When connecting devices to the IoT, how the device is used will have an impact on how those devices communicate:
Wireless connection is limited by the range of the network
Storage will depend on how much bandwidth is available – devices that store a lot of data have to account for cloud storage fees
Operating systems may have to be customized in order to work with other devices on the network
Different Anti-virus software from multiple devices can disrupt connectivity