0% found this document useful (0 votes)
40 views6 pages

Internet of Things Unit - 2

M2M communication involves machine-to-machine data transfer without human interaction, using specialized devices with low mobility. It supports closed business operations using vertical solutions. The Internet of Things is a more encompassing phenomenon that can include both M2M and human-to-machine communication. It uses generic commodity devices and supports open markets and multiple applications across devices using horizontal enablers. The shift from M2M to IoT occurred because IoT allows for more applications and devices, both business-to-business/consumer and human interaction, using standardized solutions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views6 pages

Internet of Things Unit - 2

M2M communication involves machine-to-machine data transfer without human interaction, using specialized devices with low mobility. It supports closed business operations using vertical solutions. The Internet of Things is a more encompassing phenomenon that can include both M2M and human-to-machine communication. It uses generic commodity devices and supports open markets and multiple applications across devices using horizontal enablers. The shift from M2M to IoT occurred because IoT allows for more applications and devices, both business-to-business/consumer and human interaction, using standardized solutions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

11]

loTand M2M

[ ___
2._1_:_Io_T_an_d_M_2_M_ _ --J] It is communication and
;
It is information and
device centric service centric
Q. i What It M2M communication ?
-...........·-·· ··--·---------·
AflJ· : • M2M communication .is a form of data It support closed business It support open market
coaununication that involves one or more entities that operations place ·
do not necessarily require human interaction or M2M uses vertical system loT uses Horizontal
interVention in the process of communication. solution approach enabler approach

Q.2 What are the key featura of M2M It requires specialized It requires generic
coaununlcatlon ? device solutions commodity devices
AftS. : • Some of the key features of M2M 1----------+-·~-------
Used in B28 Used in B2B and B2C
communication system ate given below :
1. Low mobility : M2M dfflces do not move and
if moves only within a certain .area. Q.5 What 1, lncill8trlal Internet of 1binp ?
2. Time controlled : Data can be send or receive Ans. : The Industrial Internet of Things (Industrial
only at certain pre-defined ~e periods. .· loT) is made up of a multitude of devices connected ·
3. Time tolerant : Sometimes data transfer can be by communications software. The resulting systems
delayed. and even the individual devices that comprise it, can
monitor, collect, exchange, analyze and instantly act
4. Packet switched : Network operator to provide on information to intelligently change their behavior
packet switched service. ,/ . or their environment-all without human intervention.
Q.3 What It M2M device ?
Q.6 Define M2M. Explain reasons of shifting &om
Ans.: • A device that runs application(s) using M2M M2M to loT.
capabilities and network domain functions. An M2M
Ans. : • M2M communication is the communication
device is either. connected straight to an access among the physical things which do not need human
network or interfaced to M2M gateways via an M2M interventi6n.
area network. ·
• M2M communication is a form of data
communication that involves one or more entities
Q.4Difference between M2M and loT.
Ans.:
that do not necessarily require human interaction or
intervention in·the process .of communication. M2M
is also named as Machine Type Communication
Machine-to-Machine Internet of Things (MTC) in 3GPP.

It support single It support multiple • M2M communication could be carried over mobile
application with single application with multiple networks (e.g. GSM-GPRS, CDMA EVDO
device · device networks). In the M2M communication, the role of
mobile network is largely confined to serve .as '.~.2t\
transport network. ''i•~(r.~~

(2 - l)
.......
--~
i_or11114A,,,,_

-
,,,,._, o[11rlngl_
-----..2-2
-----·-·-----·----·--·---···-·-"- lldl"'!!..ofl'l,ln19 ·
:;:;--
2•3
I
IDT-'MlM

• M2M 15 only a subset of IoT. IoT Is a more M2M GattwllY 6. Low power consumption : To improve the
ability of the system to efficiently service M2M

--
enoompassing phenomenon because it also includes SabJUt!I ,·;, ~cloud)
applications.
Human-to-Machine communication (H2M).
7. Loation specific trigger : I n ~ to trigger
• Radio Frequency Identification ~),
M2M device ·in a particular area e.g. wake up the

_
Location-Based Services (LBS), Lab-on-a-Chip
device.
(LOC), sensors, Augmented Reality (AR), robotics
and vehicle telematics, which are some · of the _,_ Q.10 Eliplala lr.ep appllcatlon - of M2M.
technology innovations that employ both M2M and Ana. : 1. Security : Surveillances, Alarm systems,
M2MDoma~ -Domlln ...._.Donwo
H2M communications. Access control, Car/driver security.

--
•Reasons : Fig. Q.8.1 MZM an:hlt.cture t 2. Tracking and tracing : Fleet Management, Order

1. It support multiple application with multiple Management, Pay as you drive, Asset Tracking,
• The system components of an M2M solµ:tion Ille "as Navigation, Traffic lnformation, Road tolling, ·
device. follows: · .. .. Traffic optimization/steering.
2. It is information and service centric.
1. M2M device : A device that runs applicatlon(a) 3. Payment : Point of sales, Vending machines,
3. It support open market place.
using M2M capabilities and network donialn Gaming machines.
4. loT uses horizontal enabler approach.
functions. An M2M device is either COruiectea • Fig. Q.8.2 shows generic M2M solution. 4. Health : Monitoring vital signs, Supporting the
5. It requires generic commodity devices. straight to an access network or inteifaci?d to aged or handicapped, Web Access Telemedidne
6. Used in B2B and B2C. M2M gateways via an M2M area network. points,· Remote diagnostics.

M~M Remote maintenana!/control : Sensors, -Lighting,

v~v
Q.1 Un the key featuree of M2M. 2. M2M area network : A M2M . area netJoi:k 5.
provi<ies connectivity between M2M devi~ ,and Pumps, Valves, Elevator contrbl, Vending
Ans. : Key features of M2M :
M2M gateways. Examples of M2M area betw.orks machine control, Vehicle diagnostics!
1. Low mobility : M2M devices do not move and if
include: Personal area network' technologiefsuch 6. Metering : Power, Gas, Water, Heating, Gdd
moves only .within certain area. Manufacturer A Bluetooth, Z-wave, Zlgbee Manufac:llnr 8
control, Industrial metering.
0

2. T'1me controlled : Data can be send or receive as IEEE 802.15; SRO, UWB, Zigbee, BluefuoU.: etc
only at certain pre-defined time periods. or local networks such as PLC, M-BUS;- Wire!!!&' 7. Manulacturlng : Production chain monitoritig and fri
Fig Q.8.Z Generic MZM aolullon
M-BUS. automation. . , , . .
3. Time tolerant : Sometimes data transfer can be
3. M2M · gateways :· Equipments using :/'iM2M • A number of sl1IHiets of users of M2M •·services can 8. Facility management : Home I building / campus
delayed.
4. Packet switched : Network operator to provide
capabilities to ensure ,M2M devices ·interworking be tdentified : eonsumers
in the home; ' business . automation.
and interamnection to the users and facility mllnagers,' I city ' governments,
packet switched service. l
lndustryNertical
!
application domain. The M2M gateway may ·@so · logistics businesses, energy•providers and more. Sr. No. M2M applic:atlons
5. Online small data transmissions Devices
run M2M applications. · Q;9 Uat the key featurea of M2M. . 1 Automotive Passenger vehicle anti
frequently send or receive small amounts of data.
4. M2M applications server : Applications that; ro,n Ans. : Key features of M2M : theft/remvery,
6. Low power consumption : To improve the . monitoring/
the service logic and use service capabilities 1. Low mobility : M2M devices do not move and if maintenance,
ability of the system to efficiently service M2M
accessible· via open interfaces. moves only within a certain area. safety/control,
applications.
2. Time ·controlled : Data can be ·send or receive entertainmmt.
7. Location specific trigger : Intending _ trigger 5. M2M application : The application compo~f of
the solution is a realization of the highly ·specific · . ~y at ce~ pre-defined time periods. , 2 Transportation Fleet management, asset
M2M device in a particular area e.g. w& up the
1

monitor and control process. The application. is 3. Time tolerant : Sometimes data transfer can be tracking telematics
.• device.
further integrated into the overall busineSS delayed. manufacturing and
logistics.
Q.8 Draw and uchitecture
explain and . process system
of the enterprise. 4. Packet switched : Network operator to provide
component. of M2M. · packet switched service. 3 Utilities/ Bnergy Smart metetjng, smart
Ans. : Architecture and Components of M2M 5. Online small data transmissions Devices grid, electric line ·
monitoring,
Fig. Q.8.1 shows M2M architecture. frequently send or receive small amounts of data.
gas/oil/water pipeline
monitoring.

T' TECHNICAL PIJBUCAnONS,._ An up tm,st for knowledge


~·--- T' TECHNICAL PIJBLICATIONs''· An up lflruat f o r ~

-
~ '
,,.-,o/DlfW'
2-4

customer's site so that it can be


---
-~ .
lor.,.,,~
~Thing,. 2-5
IoTIIIUIM2M
.Commercial and home maintained 11\d, s. Tasks such as provisioning change management
4 Security serviced more effectively. Proprietary
security monitoring, and de-provisioning are very time consuming Interfaces
surveillance s. Telematics to the in ,gration
of and error prone.
applications, fire alarm, telecommunications and infom1 .cs, but lllost
police/medical alert.

Point of sale (POS),


often it refers to tracking, I
entertainment applications in veh
,vigation, 11\d, ·
.es.
Software defined networking :
" ~.,,..,)\j.
5 Pinandal/Retall • Software defined networking (SON) allows network
ATM Kiosk, vending 6. Telemetry is usually associated with industrial, Control
machines, digital
engineers to support a switching fabric across
medical, and wildlife-tracking 1 •plications that
signage and handheld multi-vendor hardware and application-specific Forwarding
transmit small amounts of vehicli data.
terminals. integrated circuits.

6 Health care \ Remote monitoring of


patient after surgery
\ 2.2 : Software Defined Net¥.
tworks J • A network administrator can shape traffic from a
centralised control console without having to touch
Fig. Q.14.1 (a) A traditional switch

. .......,·-a.. ' (e-health), remote Q.12 What II eoftware defined DI ,rk? SON controller
individual switches. (Network operating system)
diagnostics, medication Ans. : Software defined netwo· is a netwofk
reminders,
tele-medidne.
architecture that separates the co1 plane from ihe • SDN is also useful for maintaining service level in a
cloud environment, by providing an APl-enabled
l! ea:trol
, ! !Management!J ·( Proprietary
· ,, Interfaces
data plane and centralizes the net controller. ·l ' '
Highway, bridge traffic approach to . manage the network and move
7 \ Public saftey
management, homeland Q.13 What la Network Function Vlrtuallzatlon ? workloads in a consistent way.
security, police, fire and Ans. : Network Function Virtual ,n (NFV) Is an Management
• The physical separation of the network control
emergency 'services.
effort to decouple the network fui ,n logic fro~ the plane from the data plane (forwarding plane), and
underlying hardware, such that the network devices, where a control plane controls several devices. Control
. lnclla Market Scenario are consolidated onto regular servers, switches, md • The centralized management facilitates
• As per projections by Bricssion, lndi;m M2M market storage. FOIWllrdlng
may rise &om 30 Million in 2013 to more than 250 optimization and configuration of a network in an
I
million in 2020. Automotive (connected vehicles) is Q.14 &plain the Umltatlon of Conventional efficient and. automated manner and provides
having a market share of 45 % and Energy (smart interoperability among heterogeneous IoT network. Fig. Q.14.1 (b) A awttch with Hparatad planN
Network an:bltectme. H- It la Hived by aoftwan
meters) 23 %. cleftnecl networking ? • SON is a frame work to allow network • SON Is basically layer architecture consists of three
• Other applications are Point of sale (POS), health Ans. : Umitation of Conventional Network administrators to automatically and dynamically layers 1) Device layer or data plane 2) Control
care, security and surveillance, intelligent architecture manage and control a large number of network plane and 3) Application layer.
- buildings, smart homes etc. · M2M applications •· In the traditional approach to networking, most devices, services, ·topology, traffic paths, and packet • The SDN architecture is commonly defined by four
will make the living smart and improve the quality network functionality is implemented in a dedicated handling policies using high-level languages and principles:
of life. APis.
appliance; i.e., switch, router, application delivery
(i) The separation of the control and data planes.
Q, 11 What are the abl plllan of M2M ? controller. • Router can be partitioned into control and data
(ii) Flow-based forwarding in the data plane.
Ans. : The six Ji!illars of M2M are as follows : • .In addition, within the dedicated appliance, mo~ of plane. Network intelligence and state are logically
(iii) Logically centralu.ed SDN controller that instructs
1. Remote monitoring is a generic term most often the · functionality is implemented in dedi~ted centralized. The underlying network in&astructure
multiple forwarding planes.
representing supervisory control, data acquisition, hardware such as an ASIC (Application specific is abstracted from the applications.
and automation ofindustrial assets. Integrated Circuit). (iv) Network programmability via the SON controller.
• Execute or run Control plane software on general
2. RFID is a data-collection technology that uses • Some of the key characteristics of this approac!i to purpose hardware. Architecture to control not just a • In the SDN architecture the control plane is
electronic tags for storing data. developing network appliances are : networking devi~ but an entire network. physically decoupled &om the data forwarding
3. A sensor network · monitors physical or plane. The data plane's forwarding behavior is
1. The ASICs that provide the network functionality • Fig. Q.14.l(a) and (b) show an abstract model of a
environmental· conditions, with sensor nodes evolve slowly. determined by a set of flow tables, and the
traditional switch and a switch with separated
acting ~peratively to . form/maintain the forwarding decisions are flow-based.
2. The evolution of ASIC functionality is undef the planes.
network. • A logically centralized SDN controller implements
control of the provider of the ,appliance.
4. The term smart seruice refers to the process • of the control plane logic and remotely controls
3. The appliances are proprietary.
networking equipment and · monitoring it at a several data planes. The SON controller builds a

------
4. Each appliance is configured individually.
T" TECHNICAL PUBUCAnONS, ._ An up thrust for knowledge
----
oKODI '
·T' TECHNICAL PUBLICAnoNs~- An up thlUot for 1rno~ DICGOI '
.....-
,,,,_.,o/'lfmlll 2 • ~- -·· - - --------- -- - - - - -.... ·-·------
lor - ...
,._.
~tofTldnp 2-7' loTIIIUIM2M
global view of the network. and offers a control • Southbound Interfaces provide a conun
logic that programs an abstract model of this view. protocol between CP and forwarding devt~callon Q.18 Draw ud explain SDN la,-..
AJIS, : • Fig. Q.16.1 shows SDN layers.
Q.15 Draw ud aplaln SDN an:bltac:tun. the SI Instruction set. oUgb
Ana. : • Fig. Q.15.1 shows SON Architecture. • Forwarding devices (routers,. switches, te .
etc.) are Interconnected through a ~ ,'.o/,aYs
medium such as wireless radio chann~-1,>~}'alca!
I 0 Appllcalfon ,
cables. !, \Viied layer

j • In SDN architecture, the


responsible for building a glo~~ .
SDN
· -~f'
·d
controller .
U:: Control
layer
,

network and providing mechanisms for . 'n~t k


I management and control. ' '·· , ' 1,,. ·•
,,. I
q.!
lnfraatructura
p, COllutJtlllf1,,,;,r,~•S , COllutHIIOf
,. . . :, . __ r£:&-;.·c}; ,···,
1,J;,~n WIIUUl1"1
u;.,,. ---~- .,,,, .;ff; (!)
• The SON architecture is endorsing a l~gically layar
a
,Ji>.\~
centralized model. How-ever, it does not mh~d
for a physically centralized implementation. ·
• The SDN architecture is : Fig. Q.18.1 SDN layara

1. Directly programmable . : Network control ;i.is • Inlrastrudure layer ads as the foundation for an SON architecture. The infrastructure consists of both physical
directly programmable because it . is · liecoupled and virtual network devices such as switches and· routers. These devices implement the OpenFlow protocol as a
Network
· Infrastructure standards-based method of implementing traffic forwarding rules.
from forwarding functions. .,
Fig. Q.15.1 SDN archn.c:ture 2. Agile : Abstracting control from forwarding•-~ • Control layer COllSists of a centralized control plane for the entire network. The control plane is decoupled from
administrators dynamically adjust netw6rl<; ~de
the underlying infrastructure to provide a.
single centralized view of the)- entire network The control layer
• SON is. a layered architecture, consisting of three utilizes OpenFlow to communicate with the infrastructure layer. ·
traffic flow to meet changing needs. ....
basic layers; application/services layer, a controller - .\JO ..
• #\ppllcation layer consists of network services. and business applications that interact with the control layer.
3. Centrally managed : Network intellige!1,_ce· is
layer, and data plane layer called forwarding layer These applications leverage open Interfaces to communicate with the control layer and the network state.
(logically) centralized In software-based','SD~
consisting of forwarding' devices.
• These SON layers communicate with each other
controllers that maintain ag1oba1 vrew,-~, the Q.17 Write •ehort DON on OpenFJow. .
Ans. : • OpenFl~W is a Layer 2 communications· protocol that gives access to the forwarding
."',. nd
'
a
network, which appears to ., applicatioili. plane of a network
via open APls called Northbound Interface (NI) API .
policy engines as a single, logical switch. '·' , switch.or router over the network. Fig. Q.17.1 shows components of an OpenFlow ~witch.
and Southbound Interface (SI) 'API. · ·
4. Progranurui.tically configured · : SDN lets . ~~_bvo/k
• Application layer (AP) : the application plane also managers configure, manage, secure;\,."and
called management plane consist of' applications optimize network resources very quicldy."via·
that leverage the functions offered· by 'the M to
dynamic, automated SDN programs, whid!.' ihey
implement network control :and operation logic.
can write themselves because · the programs do
• The Network Operating System (NOS) , facilitate not depend oil proprietary software. . ' -~
application developers · to <X>Ordinate · through these
5. Open standards-based and vendor-neutral": When
NI APis. Typically, an . M APis. abstracts the implemented · through open standards/ '~SI>N
low~level instruction sets and implementation of __ r,;;;;;:-i
simplifies network design and operatiort -~
forwarding devices.
·: instructions are provided by .SDN controllers ~Pl~ne~
• Control plane is the decoupled entity from the inste1td of multiple, vendor-specific devices and \_ Open flow IWftch
distnbuted forwarding devices and logically protocols.
centralized on a server. Fig. Q.17.1 Componenta of an OpenFlow Switch
• The number of flows a switch can handle is limited by the size of its flow table. Secure Channel (SC) is the
interface that ·connects each OpenFiow switch to controller. controller configures and manages the switch via
this Interface.
T' TECHNICAL PUBUCAnONS, ._ An up thru61 for knowledge
T I
TECHNICAL PUBLICAnONS, ._ An up thro&t for knowledge
.,_.
-~

- - - - - - -'!!.~
,,,,_.,o/111""9 _ _ ! : . ! - --
·--- I "",., ways to
implement resilience, ~Ce
Becuiity
•Jntemlf
--M o/1'11illp 2• 9 IoT iUUl M2M
• SC establishes and terminates the connection assuram:e, test and diagnostics and • Instead of installing expensive proprietary 1
• System Wide Configurations.
between Open Flow Switch and the controller using survemance- hardware, service providers can purchase
the procedures. Bach Open Flow switch has a chain 1nexpensive switches, storage and servers to run • Multiple System Configurations.
of Bow tables, and each table stores a collection of
• Facilitates innovation towards new netw- .
functions and services that are only practical
pure software network environment .a
:,k virtUal machines that perform network functions.
.This collapses multiple functions into a single
• Retrieving &t Reusing Configurations.
Bow entries. Q.20 What 19 NETCONF 'I
physical server, reducing costs and minimizing
• A Bow is defined as the set of packets that match • It is applicable to any data plane and control Plane Ans. : NETCONF is a session based network
the given properties, e.g., a particular pair of source truck rolls.
functions. Automation of management and management protocoL The NETCONF protocol is
and destination MAC addresses- configuration of functions important for NJIV ~. • If a customer wants to add a new network function, based upon remote procedure c:all, a client/server
• A Bow entry defines the forwarding/routing rules, the service provider can simply spin up a new protocol that allows one program to request a service
scale.
It consists of a bit pattem that indicates the' Bow virtual machine to perform that function. from another program without having to understand
• NFV aims to ultimately tranaform the way network
properties, a list of actions, and a set of counters. • For example, instead of _deploying a new hardware network details.
operators _architect and operate their networks •
appliance across the network to enable network
Q.11 What 19 Network Function \11rtUUzatlon? though change will be incremental Q.21 u.t the Limitations of SNMP.
encryption, encryption software can be deployed ,on
Esplain It. IMndta. • Fig. Q.18.1 shows NFV architecture. ·Ans. : • SNMP is stateless in nature and each SNMP
a standardized server or switch already in the
Ana. : • Network Function Virtualization (NFV) is an request amtains all the information to process the
• Elements of NFV archi,tecture are as follows : network.
effort to decouple the network function logic from the request.
underlying hardware, such that the network devices 1. Virtualized Network Function : It implements- • This virtualization of network functions reduces
dependency on dedicated hardware appliances for · • SNMP is a connectionless protocol which uses UDP
are consolidated onto regular servers, switches; and network function in software and it runs over
network ·operators, · and allows for improved as the transport protocoL
storage, NFV infrastructure. scalability and customization . across the entire • MIBs often lack writable objects without which
• NFV decreases costs by consolidating network 2. NFV Infrastructure : It contains network,. storagew_ network. Different from a virtualized network, ·NFV device configuration is not possible using SNMP.
services onto commodity hardware, taking and compute resources that are virtualized. It'is' seeks to offload network functions only, rather than
advantage of the economies of scale. the combination of both hardware Ja, • It is difficult to differentiate between configuration
the entire network.
• NFV is way to reduce cost and accelerate service software resourc:es which build up' ." 'the. and state data in MIBs.
Benefits:
deployment for network operators by . decoupling environment in which VNFs are deployed, , • Retrieving the current configuration &om a device
functions like a firewall or encryption from managed and executed. · ·- 1. Reduced equipment costs and reduced power
can be difficult with SNMP. Earlier versions of
dedicated hardware and moving them to virtual consumption.
3. The Network Functions Virtualisatlon SNMP did not have strong security features.
servers. 2. NFV allows to abstract underlying hardware,
Management and Orchestration (NFV-MAI~:0)
and enables elasticity, scalability and automation. Q.22 Dllcme nqalnment of Network Operator.
• NFV and SDN are complementary. One does not architectural framework has the role to manage Ans. : Requirements are as follows :_
depend upon the other. You can do SDN only, the NFVI and orchestrate the allocation . of. · 3. Iricreased speed of deployment by minimizing
NFV only, or SDN and NFV. the typical network operator cycle of innovation.. • Ease of use.
resourc:es needed by the NSs and VNFs.
• NFV allows use of a single physical platform for 4. Services . can be rapidly scaled up/down as • Distinction between configuration and state data.
different applications, users and tenants. It enables required.
,, • Fetch configuration and state data separately.
5. Improved operational efficiency.
• Configuration of the network as a whole.
Virtual Network Functions (VNF-s)
2.3 : Basics ofloT System
88888 Management with NETCOZF, YANG·
NETCONF, YANG, SNMP NETOPEER
• Configuration transactions across devices.
• Configuration deltas.
Network Functions Vlrtuallzation lnfrasiructure (NFVI) NFV • Dump and restore configurations.
Management
and
Q,19 What 19 need for loT s,.tema Management? • Configuration database schemas.
orchestration Ans. : Need for IoT Systems Management are as
• Comparing configurations.
follows:
• Automating Configuration. Q.23 Dacrlbe the NETCONF protocol layen.
• Monitoring Operational & Statistical Data. Ans. : • NETCONF .provides a programmatic

'----- -- - - - - - -- -- - - - - - - __ _,,., • Improved Reliability.


interface to a network device, eliminating the need

Fig. Q.18.1 NFV architecture


- .
T" TECHMCAL PUBLJCATIONS • An up lhtuat for knowledge --· T• TECHNICAL PUBLICATIONS,·. An up thlUst for know/edge
DICODI
2-10 IoJ;111141""'•·
,,,,.,.,llf'I1dlrp ' - -- ~ ~of__Tll_in~g,
~------
for users to understand ·proprietary CLI syntax for • y ANG modules defines the data exc1tan · --···- -·- -2•11
-·- -------------
.
- - -- loTIIIUIM2M
----
device configuration or managing operational data. between the NETCONF client and server. . &ed 7. Selective configuration/operation data retrieval
(filtering). • Management API : It used to start the NETCONF
• It leverages the ability to separate configuration • A module comprises of a number of 'leaf' nOdes. sessions, read and write configuration data, invoke
data from operational data and statistics data from which are organized into · a hierarchical tree·· 8_ Notification events. RPC, read state data·etc;
a device by providing o~tions ,for the retrieval of structure. 1 Q.28 Eiq,laln loT device · manasement with • Transacti~n Manager : It executes all the NETCONF
both data types. NETCONF-YANG.
•The . 'leaf nodes are specified using the 'leat_:Of transaction and ensures the ACID properties.
• Fig. Q.23.1 shows NETCONF protocol layers. 'leaf-list' constructs. ,,, ,Ans. : • Fig. 26.1 shows loT device management with
NETCONF-YANG. • Rollback Manager : It generate ,required transactions
YANG dell, • Leaf nodes are .organized •using 'container\ or" 'list; for rollback a current configuration to its original
• Content
(Conflg dala, notlf,) constructs. · -., • It consists of components like ·Management System, state.
.. Management API, Transaction Manager, Rollback

B
OpertalonS
(Methods) • A YANG module can import definitions &om other . • Data .Model Manager : It keep the track of all the
Manager, Data Model Manager, Configuration
modules. Constraints ·can be defined on the data YANG data model and CQrtesponding managed
RPCor Validator, Configuration ·Database, · Configuration objects.
Notification nodes, e.g. allowed values.
------------ API and Data Provider API.
Transpofl NETCONF • YANG can model both configuration data ,and state • Configuration Validator : It checks for valid
Configuration • Management System : Operator sends NETCONF configuration.

I
datastore data using the 'config' statement.
messages for configuring loT device through
• YANG defines a number of built-in data types and • Configuration Database : This database contains
management system. It also receive notification and
YANG defined · . specifies a way to construct more complex data both the configuration and operational data.
state information.
types. • Configuration API : Used for reading configuration
Fig. Q.23.1 NETCONF protoco1 laye19
• YANG node types are as follows : data from the configuration data store.

-
• The NETCONF protocol is built on a four-layer
approach : 1. Leaf node : Has a value and no child nodes. It
1) Secure Transport Layer : Authentication and can have a default value. It can be mandatory:o~ (
! t

integrity can be provided by protocols such as optional and Single instance.


TCP-based TIS and SSHv2. 2. Container : A subtree of rela_ted nodes. No data
2) Message Layer : A set . of. RPC messages and values. Only a set of child nodes.
notifications are defined for use including <rpc>, 3. List : A set. of list entries. Each list entry may
<rpc-reply> and <ipc-error>. . · ·contain many child nodes iilcluding other1, lists.
3) Operations Layer : ~ e s a set of base protocol Uniquely identified by its key value.
operations invoked by RPC methods using
XML-encoding. These include <get-config>,
<edit-config> and <get>.
4. Leaf-List : A set of leafs. Used to define · a
sequence. Leaf nodes have only one
while leaf-lists may have multiple instances.
_ce, . NETCONF Ml'V9r
Transaction
manager
Rollback
manager
4) Content Layer : NETCONF data models and
protocol operations use the YANG modeling Q.25 llet bulc featura of NetConf. Configuration Authorization and
validator Authentication
language. A data model outlines the structure, Ans. : Basic Features are as follows :
semantics and syntax of the data. 1. Separates configuration and operation dab!,
Q.24 Write ehort note on YANG. 2. Client-server architecture. YANG
modules
1--+--1 Conflgu~
database
ICon~~~n, ~data
der

AN.:• YANG (Yet Another Next Generation) is a 3. Implemented using layered model._
data, modeling language used to model configuration
4. Support multiple configuration data stores ·on
and state data manipulated by the NETCONF
managed devices. loTdevlce Managed
protocol. Applications
objects
5.. Configuration validation before commit.
• YANG modules contain the definitions of the
---- ----====F~lg:.~Q~.2~1.:=1=======~--- ./
1
ronfiguration data, state data, RPC calls that can be 6. Transactions over multiple managed devices. '-,.
wued and the format of the notifications.

.,_·
T
l
TECHMCAI.. PUSUCA TIONS • An up thlUat for knowt«lge

--
,.,.- ,
DKODI
T~TECHNICAL PUBLICATIONS' ·. An up throst for know/ed~
-

You might also like