0% found this document useful (0 votes)
9 views

Chapter 3

The document discusses various methods of internet communication including satellite, Wi-Fi, radio frequency, RFID, Bluetooth, and near field communication. It provides details on how each method works, transmission ranges, and common uses. The advantages of internet communication are also summarized such as speed, job creation, globalization, and cost effectiveness. Potential disadvantages include unemployment, privacy issues, and lack of job security due to changing technologies. The overview of the Internet Protocol notes that IP allows data to be sent between computers on the Internet using unique IP addresses and that it uses a connectionless protocol to treat each packet independently.

Uploaded by

botplusnoob97
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Chapter 3

The document discusses various methods of internet communication including satellite, Wi-Fi, radio frequency, RFID, Bluetooth, and near field communication. It provides details on how each method works, transmission ranges, and common uses. The advantages of internet communication are also summarized such as speed, job creation, globalization, and cost effectiveness. Potential disadvantages include unemployment, privacy issues, and lack of job security due to changing technologies. The overview of the Internet Protocol notes that IP allows data to be sent between computers on the Internet using unique IP addresses and that it uses a connectionless protocol to treat each packet independently.

Uploaded by

botplusnoob97
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Unit-1

Chapter 3- Internet Principles


Internet Communication

➢ Internet communication is referred to as the sharing of information, ideas, or simply words over the World
Wide Web, or the Internet.
➢ The world is ever-changing and with the advent of digital technology, it is changing at a very fast pace.
What was once taking a few months to send, now takes seconds.
➢ Today, more than ever, Internet communication has made sure to connect people from two opposite sides
of the earth with no problem at all.
➢ The Internet consists of a worldwide string of connected networks that exchanges through packet
switching using the standardized Internet Protocol Suite (TCP/IP)
➢ We can boil down the wireless communication protocols into the subsequent six standards:

l. Satellite 2. WIFI
3. Radio Frequency (RF) 4. RFID
5.
Bluetooth 6. NFC

In the following paragraphs, we are going to offer a short summary and illustration of every of the internet of
Things communication techniques, their professionals and cons, and their smartphone compatibilities.
1.Satellite: -
➢ Satellite communications change telephone communication from a phone to ensuing
➢ antenna of concerning ten to fifteen miles. they're known as GSM, GPRS, CDMA, GPRS, 2G / GSM, 3G, 4G /
LTE, EDGE et al supported property speed.
➢ In net of Things language, this manner of communication is generally named as "M2M" (Machine-to-Machine)
as a result of it permits devices like a phone to send and receive knowledge through the cell network.

2.WI-FI: -
➢ WIFI may be a wireless native space network (WLAN) that utilize the IEEE 802.11 commonplace though a pair
of 4 GHZ UHF 5 GHZ belief frequencies.
➢ Wireless local (area network WLAN wireless fidelity WiFi local area network) provides net access to devices
that are at intervals that vary about 66ft. from the access point.
➢ Wireless fidelity is beneficial for several IOT connections however such connections generally hook up and
external cloud-server and don’t seem to be directly connected to the smartphone.
3.Oftenness (RF): -
➢ Radio frequency communications are most likely the best sort of between devices. Protocols like ZigBee or
Z-Wave use a low-power RF radio embedded or retrofitted into electronic devices and systems.
➢ Z-Wave's vary is some a hundred foot (30 m). The oftenness band used is particular to its country. as an
example, Europe has Associate in Nursing 868.42 megacycle per second SRD Band, a 900 MHz ism or
908.42 megacycles per the second band (United States), a 916 megacycle per second in Israel, 919.82
megacycle per second in metropolis. 921.42 NIHz within the regions of Australia/New Zealand) and 865.2
MHz in India,
➢ ZigBee is predicated on the IEEE 802.15.4 standard. However, its low power consumption limits
transmission distances to a variety of ten to a hundred.
4.RFID: -
➢ Radio frequency identification (RFID) is the wireless use of electromagnetic fields to spot objects. sometimes
you'd install an active reader, or reading tags that contain data mostly on authentication replies. specialists call
that an active Reader Passive Tag (ARPT) system. Short-range RFID is about 10cm; however, long range will
go up to 200m. What several don't know is that Léon Theremin fabricated the RFID as a spying tool for the
Soviet Union in 1945.
➢ Active tags are called by an Active Reader Tag (ARAT) systems by using an interrogator signal from an
active reader. Bands RFID runs on: 120-150 kHz.
➢ Examples include animal identification, manufactory information collection, road tolls, and building access.
RFID tag is additionally connected to an inventory such that its production and producing progress will be half-
track through the assembly line. As illustration, pharmaceuticals will be half-track through warehouses. It is
believed that very soon the RFID technology could get replaced by near-field communication (NFC) technology
in a smartphone.
5. Bluetooth: -
➢ Bluetooth is a wireless technology standard for exchanging information over short distances. Such
communication can be done by using short-wavelength UHF radio waves within the ISM band from 2.4 to
2.485 GHz. If you check out the frequencies it's really identical as WIFI such that these two technologies
appear terribly similar, but they have totally different uses.
➢ Bluetooth is usually used to transfer audio information with telephones (i.e., with a Bluetooth headset) or
some byte information with hand-held computers (transferring files).
➢ The setup of services between devices has been changed after Bluetooth protocols came into existence.
Bluetooth devices will advertise all of the services they provide. This makes using services easier, as a result
of relative to different communication protocols, it permits larger automation like security, network address
and permission configuration.
6. Near Field Communication (NFC): -
➢ Near-field communication-uses electromagnetic-induction between 2 loop antennas set within every
other's near field, effectively forming an air-core electrical device. It operates inside the globally accessible
and unauthorized radio band of 13.56 MHz on ISO/IEC 18000-3 air interface and at rates starting from 106
kbit/s to 424 kbit/s.
➢ NFC involves an instigator and a target; the instigator actively generates an RF field which will power a
passive target (an unpowered chip referred to as a "tag"). This permits targets of NFC to require easy kind
factors like tags, stickers, key fobs, or battery-les cards. NFC peer-to-peer communication is feasible
provided each device are powered.

Advantages & Disadvantages of Internet Communication


Advantages: -

1. Speed and time: Through internet communication, time and money are saved. This is because it is much
cheaper and quicker to translate information around. It also become faster and efficient to contact a business
partner or a relative. We can now Communicate with anyone around the world through emails and text messages
instantly. The internet also provided face-to-face communication.
2. Job creation: One major advantage of internet communication is the creation of new exciting jobs. System
analysts, computer programmers, web designers, hardware software developers and many other new

opportunities created by information communication technology (ICT).


3. Globalization: The internet has indeed brought people closer, and also helped in economic growth. It has
also brought down geographical and language boundaries. The Universe become a global village due to
information technology, permitting countries such as such Japan and Ireland who are separated by language and
distance, share information and id with one another.
4. Cost effective: It is so cheap to send an email to another country than making a phone. The internet has also
helped to systematize business practice helping businesses to cut cost.
5. Improve education sector: The internet has made it possible for numerous computer programs to be shared
with different generations in different parts of the world. Important information such as health, business and
environment facts are easily available to any person with an internet connection.
6. More business opportunities: Information communication technology (ICT) has made easier for businesses
to be automated allowing customers to contact them 24/7. This met: that a company can be opened anywhere,
anytime, allowing clients to make purchases frit different countries. This makes business easier and more
convenient. For example, the use of ezTalks has helped many businesses work together instant
simultaneously. Companies using ezTalks are able to share and access large files without' delays, get updates
in real time, and ensure every staff participation no matter where they are or at what time.

Disadvantage
1. Unemployment: Though the internet has improved many sectors, it has resulted unemployment through
outsourcing, downsizing, and redundancies. For example, a can replace skilled personnel with robots can work
faster and for longer hours.
2. Privacy: Although the internet has made communication easier, quicker and convenient privacy problems
emerged. From email hacking to phone signal interceptions and more people are now troubled about their private
information.
3. Lack of job security: Since technology keeps on changing, job security has become problem. This means that
IT experts need to be continuously learning to keep up with changes if they want to retain their jobs.

Overview of IP

➢ The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on
the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely
identifies it from all other computers on the Internet.
➢ IP is a connectionless protocol, which means that there is no continuing connection between the end points
that are communicating.
➢ Each packet that travels through the Internet is treated as an independent unit of data without any relation
to any other unit of data.
➢ The main purpose and task of IP is the delivery of datagrams from the source host (source computer) to the
destination host (receiving computer) based on their addresses.
➢ To achieve this, IP includes methods and structures for putting tags (address information, which is part of
metadata) within datagrams. The process of putting these tags on datagrams is called encapsulation.
➢ The Internet Protocol also provides basic instructions for transferring packets between devices. however, it
does not actually establish the connection or define the ordering of the packets transmitted. These aspects
are handled by the Transmission Control Protocol, which works in conjunction with the Internet Protocol
to transfer data between systems on the Internet. For this reason, connections between Internet-connected
systems are often called "TCP/IP" connections.
➢ The most widely used version of IP today is Internet Protocol Version 4 (IPv4). However, IP Version 6
(IPv6) is also beginning to be supported.
➢ IPv6 provides for much longer addresses and therefore for the possibility of in any more Internet users. IPv6
includes the capabilities of 1m 4 and any server that can support IPv6 packets can also support IPv4 packets.

Overview of Transmission Control Protocol TCP

➢ Transmission control protocol (TCP) is a network communication protocol designed to send data packets over the
Internet.
➢ TCP is a transport layer protocol in the OSI layer and is used to create a connection between remote computers
by transporting and ensuring the delivery of messages over supporting nonworks and the Internet.
➢ Transmission Control Protocol is one of the most used protocols in digital network communications and is part of
the Internet protocol suite, commonly known as the TCP/IP suite.
➢ Primarily, TCP ensures end-to-end of data between distinct nodes. TCP works collaboration with Internet
Protocol, which defines the logical location of the remote node, whereas TCP transports and ensures that the data
is delivered to the correct destination.
➢ Before transmitting data, TCP creates a connection between the source and destination node and keeps it live until
the communication is active.
➢ When data is sent over a TCP connection, the protocol divides it into individually numbered packets or "segments.
" Each packet includes a header that defines the source and destination and a data section. Since packets can travel
over the Internet using multiple routes, they may arrive at the destination in a different order than they were sent.
➢ The transmission control protocol reorders the packets in the correct sequence on the receiving end.
➢ TCP also includes error checking, which ensures each packet is delivered as requested, it ensures accurate delivery
of data between system.
➢ TCP is used for transferring most type of data such as webpages and files over the internet.

TCP/IP PROTOCOL SUIT

➢ The TCP/IP model was developed prior to the OSI model.


➢ The TCP/IP model is not exactly similar to the OSI model.
➢ The TCP/IP model consists of five layers: the application layer, transport layer, network layer, data link layer
and physical layer.
➢ The first four layers provide physical standards, network interface, internetworking, and transport functions
that correspond to the first four layers of the OSI model and these four layers are represented in TCP/IP
model by a single layer called the application layer.
➢ TCP/IP is a hierarchical protocol made up of interactive modules, and each of them provides specific
functionality.
Functions of TCP/IP layers: -
1. Physical layer: -
a) TCP/IP upper layer protocol layer stack does not define any specific protocol for the physical layer.It support all
the standard protocols.
b) At this level, communication is between two hops or nodes, either a computer or router, hop-to-op
communication.
c) The unit of communication is single bit.
d) When the communication is established between two nodes, a stream of bits is flowing between them.
e) Communication is physical not logical.

2. Data Link Layer:


(a) TCP/IP upper layer protocol stack does not define any specific protocol for the data link layer. It supports
all of the standard protocol.
(b) At this level communication is between two hops or nodes. hop-to-hop communication.
(c) The unit of communication is a packet called frame.
(d) A frame is a packet that encapsulates the data received from the network layer.
(e) The head among other communication information, include MAC address of source and destination of the
frame.
(f) Communication is logical not physical

3. Network Layer:
(a) TCP/IP upper layer protocol stack define the Internet Protocol (IP) for Network LAN.
(b) At this level, the communication is host-to-host.
(c) The unit of communication is called a datagram.
(d) Datagram can travel along different routes. IP does not keep track of the routes an no facility for recording
datagram ones they arrive at their destination.
(e) Communication is logical not physical.
4. Transport Layer:
(a) TCP/IP upper layer protocol stack define the User Datagram Protocol (UDP) and Transmission Control
protocol (TCP) for transport layer.
(b) At this level, the communication is end to end.
(c) The unit of communication is called a segment or a user datagram or a packet.
(d) The transport layer is responsible for delivering the whole message, which is called a segment from A to B.
(e) Communication is logical not physical.
5. Application layer: -
a) TCP/IP upper layer protocol stack define many protocols for application layer provide services such as
electronic mail, file transfer accessing the world wide web and so on.
b) At this level of communication is end to end.
c) The unit of communication is called a message.
d) A message generated at computer A is sent to computer B without being change during the transmission.
e) Communication is logical not physical.
f) All nodes in a network need to have the network layer, only the two end computer need to have the
application layer.

UDP- User Datagram Protocol


• UDP is a Transport layer protocol. UDP is a part of internal protocol suit, referred as UDP/IP suit. Unlike TCP, it is
unreliable and connectionless protocol, so there is no need to establish connection prior to data transfer.
• UDP used to email or the normal post, with email or a written message you send your message, but have no idea
whether or not that message was received.
• UDP does not correct or recover errors in the message. Any error detection and recovery is the responsibility of the
receiving application.
• Utility applications like DNS, DHCP, RIP etc. are use UDP.
• As device kind knowledge is right for causing via UDP vs protocol, the employment of UDP is anticipated to extend
with IOT.
• UDP is used for data transferring in TCP/IP protocol suit. UDP is known as “stateless” protocol, meaning it does not
acknowledge that the packets being sent have been received. For this reason, UDP protocol is specially used for
streaming media.

i) Source port: Source Port is 2 Byte long field used to Identify port number of sources.
ii) Destination port: It is 2 Byte long field, used to identify the port
iii) Length: Length is the length of UDP including header and the data. It is 16-bit field.
iv) Checksum: complement sum of the UDP header, pseudo header of information from the data,
padded with zero octets at the end (if-necessary) to make a multiple of two octets.
IP Address

• In the most widely installed level of the Internet Protocol (IP) today, an IP bit number that identifies
each sender or receiver of information that is sent in packets across the internet.
• when we request an HTML page or send e-mail, the Internet Protocol part of includes our IP address in
the message and sends it to the IP address that is looking up the domain name in the Uniform Resource
Locator we requested or in address we're sending a note to. At the other end, the recipient can see the IP
address Web page requestor or the e-mail sender and can respond by sending another message the IP
address it received.
• An IP address has two parts: the identifier of a particular network on the identifier of the particular device
(which can be a server or a workstation) network. On the Internet itself - that is, between the router that
move packets from to another along the route - only the network part of the address is looked at.
• IP is actually versatile. It works over wireless (WiFi, WiMax, 3G, 4G, LTE, IEEE
802.15.4LoWPAN, etc.) similarly as wired (Ethernet, SONET, etc.) communications. wherever
power or distance isn't a difficulty and bigger devices are concerned, primary web access for
10T may possibly be fascinating, however not essential. Heterogeneous islands will have helpful
native computation and native networking with IP property to the solid ground.
• This is often a lot of united read of IOT. Either way, the issue to not worry regarding is whether
or not there'll be enough addresses.
• The IP address is usually expressed as four decimal numbers, each representing separated by periods.
This is sometimes known as the dot address and, more techie dotted quad notation.
The Network Part of the IP Address
l. The Internet is really the interconnection of many individual networks (it's referred to as an internetwork).
So, the Internet Protocol (IP) is basically the set of one network communicating with any other (or
occasionally, for broadcast message other networks).
2. Each network must know its own address on the Internet and that of any other networking which it
communicates. To be part of the Internet, an organization needs an Internd number, which it can request from
the Network Information Center (NIC). This network number is included in any packet sent out of the network
onto the Internet.

The Local or Host Part of the IP Address


1. In addition to the network address or number, information is needed about which machine or host in
a network is sending or receiving a message. So, the IP address both the unique network number and
a host number (which is unique within the (The host number is sometimes called a local or machine
address.)
2. Part of the local address can identify a subnetwork or subnet address, which for a network that is divided into
several physical subnetworks (for ex different local area networks or) to handle many devices.

Domain Name System (DNS)

• Domain Name System (or Service or Server), an Internet service that translates domain names into IP
addresses. Because domain names are alphabetic, they're easier to remember.
• The Internet however, is really based on IP addresses. Every time we use a domain name, therefore, a
DNS service must translate the name into the corresponding IP address. For example, the domain name
www.exannple.com might translate to 198.105.232.4.
• DNS is like a phone book the Internet. If we know a person's name but don't know their telephone
number, we can simply look it up in a phone book. DNS provides this same service to the Internet.
• The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular
domain name, it asks another one, and so on, until the correct IP address is returned.
Purpose of DNS: -
l. Resolving IP addresses into Domain Names.
2. Provides information about mail exchange with the domain.
3. In Distributed Internet Services such as content delivery networks (CDNs) and cloud computing services.
4. Providing efficient storage and distribution of IP addresses of blacklisted email hosts.

How DNS Works: -

To understand, how DNS work, consider a typical user John who is looking for a website, for example,
www.example.com (which resolves to 198.105.232.4). He launches his browser to visit this site. Then,
a) His browser sends a request to the DNS server about the IP address of, www.example.com
b) The DNS server checks its database to find IP of DeepanshuGahlaut.com. If the DNS server does not know the
IP address, it asks for another DNS server for that IP address.
c) The second DNS server passes the IP to first DNS server that is cached by this server for his future use.
d) The server returns the address to user John.
e) The browser displays the website to John.
f) The process is same for every website we visit and this entire process, from start to finish, takes only
milliseconds to complete.
g) DNS can be considered as a mechanism that resolves IP addresses, query and updates the database, replicated
the information among other servers.

Static IP Address Assignment

• Static IP address is an IP address that was manually configured for a device, versus one that was assigned via
DHCP server.
• It’s called static because it doesn’t change. It is exact opposite of a dynamic IP address which does change,
• Routers, phones, tablets, desktops, laptops, and any other device that can be configured to have a static IP
address. This might be done through the out IP addresses (like the router) or by manually typing the IP address
into the device itself.
• Static IP addresses are also sometimes referred to as fixed IP addresses.
• How do you get assigned an IP address?
• If you have bought a server-hosting package from an Internet service provider (ISP), you might typically be
given a single IP address.
• But the company itself has been given a block of addresses to assign.
• Historically, these were ranges of different sizes, typically separated into “classes” of 8 bits, 16 bits, or 24 bits:
• Class A — From 0.x.x.x
• Class B — From 128.0.x.x
• Class C — From 192.0.0.x
• The class C ranges had a mere 8 bits (256 addresses) assigned to them, while the class A ranges had many
more addresses and would therefore be given only to the very largest of Internet organizations.
• With the explosion of the number of devices connecting to the Internet we can use Classless Inter-Domain
Routing (CIDR), which allows you to specify exactly how many bits of the address are fixed.
• the class A addresses we mentioned above would be equivalent to 0.0.0.0/8, while a class C might be
208.215.179.0/24.
• In many cases, the system administrator simply assigns server numbers in order.
• He makes a note of the addresses and updates DNS records and so on to point to these addresses.
• We call this kind of address static because once assigned it won’t change again without human intervention.

______________________________________________________________________________________________

Dynamic IP Address Assignment

• A dynamic IP address is an IP address that is assigned automatically by the system to a device, account or user
when it is connected to the network; that is, it is assigned as needed rather than in advance.
• Dynamic IP addresses are assigned by the dynamic host configuration protocol (DHCP), which is one of the
key protocols in the TCP/IP protocol suite.
• Dynamic IP addresses contrast with static IP addresses, which are assigned manually and semi-permanently to
a device, account or user. With dynamic addressing, a computer, account, etc. will typically have a different IP
address every time it connects to the network.
• The main advantage of dynamically assigning IP addresses is that it allows them to be reused, thereby greatly
increasing the total number of computers and other devices use the Internet or other network.
• Another advantage is enhanced security for individual users because their IP address is different every time
they log into the network. Still benefit is simplification of network administration because the software keeps
track addresses and thus relieves the administrator from the very tedious task of having to manually assign a
unique IP address to every computer as it enters the network.
• How DHCP server assigns IP address to a host?
• DHCPDISCOVER•. When a new node is connected to the network, it DHCPDISCOVER message which
contains the source address as 0.0.0.0 to the network including server. DHCP server on receiving the message,
returns DHCPOFFER message to the requested host which contains the server address and address to the node.
• DHCPOFFER: If there are multiple servers on the network, host receives DHCPOFFER messages. It is up to
the host to select a particular message.
• DHCPREQUEST: The requested host on receiving the offer message, it again broadcast the DHCPREQUEST
message on the network with the address of the server whose message is accepted by the host. The server
which pertains to that server address sent host checks whether the address to be assigned to the node is
available in the data storage.
• DHCPACK: If the address is assigned, it marks the IP address in the storage as unavailable to ensure
consistency. Now, the server sends DHCPACK packet to the requested host contains network information (IP
address, subnet mask, gateway address). In case, address is assigned to another machine meanwhile, then the
server sends the DHCPNAK to the requested host indicating that the IP address is assigned to some other
machine.
• DHCPRELEASE: And finally, If the host wants to move to other network or finished its work, it sends the
DHCPRELEASE packet to the server indicating that to disconnect. Then the server marks the IP address as
available in the storage so that it can be assigned to another machine.

_______________________________________________________________________________________________
BSc IT (Sem V Notes) IOT Asst. Prof.Rawoot Amina O.

IPV6
• The IPv6 addresses are comprised of 128-bits (or 8 groups of 4 hexadecimal digits separated of omitting zeros
to abbreviate the full address.
• An example of IPV6 address may look like 2001 For convenience,
an IPv6 address can be re resented in shorter notation by omitting leading zeros. The example address above
can be also be ire resented as 2001: db8: 12:
• The primary function of IPv6 is to allow for more unique TCP/IP address identifiers to be created, w that we've
run out of the 4.3 billion created with IPv4. This is one of the main reasons why IPv6 s such an important
innovation for the Internet of Things (IOT).

Types of IPv6 Addresses: - IPV6 addresses are broadly classified into three categories:
1. Unicast addresses: A Unicast address acts as an identifier for a single interface. An IPv6
packet sent to a Unicast address is delivered to the interface identified by that address.
2. Multicast addresses: A Multicast address acts as an identifier for a group/set of interfaces
that may belong to the different nodes. An IPv6 packet delivered to a Multicast address is
delivered to the multiple interfaces.
3. Anycast addresses: Anycast addresses act as identifiers for a set of interfaces that may belong
to the different nodes. An IPv6 packet destined for an Anycast address is delivered to one of
the interfaces identified by the address.
• Internet-connected products are becoming increasingly popular, and while IPv4 addresses couldn't meet
the demand for 10T products, 6 gives 10T products a platform to operate on for a very long time.
Why IPv6 Is Important for the Internet of Things: -
1. SECURITY: With billions of new smart products being created every day, security thought in the
back of all 10T engineers’ minds and IPv6 offers better security solutions than its
predecessor, largely due to IPSec.IPV6 also supports more-secure name resolution. The
Secure Neighbor Discover (SEND) protocol is capable of enabling cryptographic
confirmation that a it claims to be at the time of the connection.
2. SCALABILITY: According to a report put out by Gartner, 25 billion "things" will be internet by the
year 2020. That's a pretty incredible estimation, considering report notes that 4.9 billion
devices will be connected in 2015. This purposed increase in growth in only five years
sheds some light on how much growth we can expect to see in the next 10, 20. or even 50 years-
3. CONNECTABILITY: With billions of new 10T devices entering the market each year, connect
ability i.e. allowing network-connected to "speak" to each other—is 'vital. With IPv4, there were
quite a few issues with 10T product; to speak another. Network Address Translation (NAT)
posed one of these major issues was created as a workaround for organizations who needed
multiple people and device to be able to work off of the same IPV4 address.
IPv6 and Powering Devices: -
1 We know that we can regularly charge and maintain a small handful of devices.
2 The requirements for large numbers of devices, however, are very different.
3 The devices should be low power and very reliable, while still being capable of connecting to the Internet.
4 Perhaps to accomplish this, these devices will team together in a mesh network.

9
BSc IT (Sem V Notes) IOT Asst. Prof.Rawoot Amina O.

MAC Address
• MAC Stands for "Media Access Control Address".
• MAC Addresses are unique 48-bits hardware number of a computer, which is embedded into network card
as Network Interface Card) during the time of manufacturing. MAC Address is also known as Physical
Address of a network device.
• This relates to the lowest-level “link layer” of the TCP/IP stack.
• MAC addresses are made up of six groups of two-digit hexadecimal numbers, separated by colons. For
example, an Ethernet card may have a MAC address of 00:0d:83: bl :c0:8e.
• It is used to differentiate different machines on the same physical network so that they can exchange packets.
• When an IP message is routed, it hops from node to node, and when it finally reaches a node which knows
where the physical machine is, that node passes the message to the device associated with that MAC address.
• Most devices, such as our laptop, come with the MAC address burned into their Ethernet chips. Some chips,
such as the Arduino Ethernet's WizNet, don't have a hard-coded MAC address, though. This is for production
reasons: if the chips are mass produced, they are, of course, identical. So, they can't, physically, contain a
distinctive address. The address could be stored in the chip's firmware, but this would then require every

chip to be built with custom code compiled in the firmware.


• Alternatively, one could provide a simple data chip which stores just the MAC address and have the WizNet
chip read that. most consumer devices use some similar process to ensure that the machine always starts up
with the same unique MAC address.
• The Arduino board, as a low-cost prototyping platform for developers, doesn't bother with that nicety, to
save time and cost. Yet it does come with a sticker with a IMAC address printed on it. Although this might
seem a bit odd, there is a good reason for it: that MAC address is reserved and therefore is guaranteed unique
if we to use it.

TCP/UDP Ports
• A port is a 1 6-bit number used to identify specific applications and services.
• The Transmission Control Protocol (TCP) uses a set of communication channels called ports to manage
among multiple different applications running on the same physical device.
• Unlike the physical ports on computers like USB ports or Ethernet ports, TCP ports are virtual -
programmable entries numbered between 0 and 65535.
• Most TCP ports are general-purpose channels that can be called into service as needed but otherwise sit idle.
Some lower-numbered ports, however, are dedicated to specific applications.
• Applications that provide a service (such as FTP or and HTTP servers) open a port on the
local computer and listen for connection requests.
• when you send a TCP/IP message over the Internet, you have to send it to the right port.
• AN EXAMPLE: HTTP PORTS:
• If your browser requests an HTTP page, it usually sends that request to port 80.
• The web server is “listening” to that port and therefore replies to it.
• If you send an HTTP message to a different port, one of several things will happen:
• ◾ Nothing is listening to that port, and the machine replies with an “RST” packet (a control sequence
resetting the TCP/IP connection) to complain about this.
• ◾ Nothing is listening to that port, but the firewall lets the request simply hang instead of replying.
10
BSc IT (Sem V Notes) IOT Asst. Prof.Rawoot Amina O.
The client has decided that trying to send a message to that port is a bad idea and refuses to do it. (list of
“restricted ports”.)
• The message arrives at a port that is expecting something other than an HTTP message.
• The server reads the client’s response, decides that it is garbage, and then terminates the connection.
• Ports 0–1023 are “well-known ports”, and only a system process or an administrator can connect to
them.
• Ports 1024–49151 are “registered”, so that common applications can have a usual port number.
• You see custom port numbers if a machine has more than one web server; for example, in development
you might have another server, bound to port 8080:
• http://www.example.com:8080
• The secure (encrypted) HTTPS usually runs on port 443. So these two URLs are equivalent:
• https://www.example.com
• https://www.example.com:443
• OTHER COMMON PORTS
• 22 SSH (Secure Shell)
• 23 Telnet
• 25 SMTP (outbound email)
• 110 POP3 (inbound email)
• 220 IMAP (inbound email)

Application Layer Protocols


• An application layer protocol defines how application processes running on different end systems. pass message to
each other.
• Application layer protocol defines:
(a) The types of messages. e.g. request messages and response rnessages.
(b) The syntax of the various message types, i.e., the fields in the message and how the field are declined.
(c)The semantics of the fields, i.e., the meaning of the information that the field is supposed to contain;
(d) Rules for determining when and how a process sends messages and responds to messages.
(e)This layer is implemented through a dedicated application at the device end. Like for
computer, application layer is implemented by the browser. It is the browser which
implements application layer protocols like HTTP, SMTP and FTP. Same way, there are
application layer protocols specified in context to IOT as well.
(f) This layer is responsible for data formatting and presentation. The application layer in the
(g) Internet is typically based on HTTP protocol. However, HTTP is not suitable in resource
constrained environment because it is extremely heavyweight and thus incurs a large parsing overhead.
(h) There are many alternate protocols that have been developed for IOT environments.
Some of the popular IOT application layer protocols are as follows:
MQTT SMQTT CoAP
DDS
XMPP AMQP
RESTful HTTP
MQTr-SN STOMP
SMCP
LLAP SSI
LWM2M
M3DA WPP-IOT
ONS 2.0
SOAP WebSocket
11
BSc IT (Sem V Notes) IOT Asst. Prof.Rawoot Amina O.

I. SMTP (Simple Mail Transfer Protocol):


(a) One of the most popular network services is electronic mail (e-mail).
(b) The TCP/IP protocol that supports electronic mail on the Internet is called Simple Mail Transfer Protocol
(SMTP).
(c) SMTP transfers messages from senders' mail servers to the recipients' mail servers using TCP connections.
(d) SMTP connections are secured with SSL (Secure Socket Layer). (e) SMTP uses a port number 25 of TCP.
2. FTP (File Transfer Protocol):
(a) It used to exchange files on the internet.
(b) To enable the data transfer FTP uses TCP/IP, FTP is most commonly used to upload and download files
from the internet.
(c) FTP can be invoked from the command prompt or some graphical user interface.
(d) FTP also allows to update (delete, rename, move, and copy) files at a server. (e) It uses a reserved port
no 21.
3.Telnet
(a) It is an application layer protocol, which can be used on the internet or LAN (Local Area Network).
(b) It provides a bi-directional interactive text-oriented communication service by virtual 'terminal connection.
(c) Telnet is basically a client server protocol, which is based on a reliable connect. oriented transport.
(d) It uses a port number 23, to establish the connection with TCP (Transmission Co Protocol).

HTTPS: ENCRYPTED HTTP

• Websites that use the standard HTTP protocol transmit and receive data in an un manner. This means it is
possible for someone to spy on the data being transfer between the user and the Web server.
• While this is highly unlikely, it is not a comforting thought that someone might be capturing your credit card
number or other per information that you enter on a website. Therefore, secure websites use the HTTP’s
protocol to encrypt the data being sent back and forth with SSL encryption. If someone capture the data being
transferred via HTTPS, it would be unrecognizable.
• Hypertext Transfer Protocol Secure (HTTPS) is a variant of the standard web protocol (HTTP) that adds a layer
of security on the data in transit through a secure layer (SSL) or transport layer security (TLS) protocol
connection.
• HTTPS enables encrypted communication and secure connection between a remote user the primary web server.
• HTTPS is primarily designed to provide enhanced security layer over the unsecured protocol for sensitive data
and transactions such as billing details, credit card and user login etc. HTTPS encrypts every data packet in
transition using SSL or encryption technique to avoid intermediary hackers and attackers to extract the con the
data; even if the connection is compromised.
• HTTPS is configured and supported by default in most web browsers and initiates a connection automatically if
the accessed web servers requests secure connection• works in collaboration with certificate authorities that
evaluates the security certificate of the accessed website.

HTTP PORTS

• If your browser requests an HTTP page, it usually sends that request to port 80. The web server is
"listening" to that port and therefore replies to it.
• If you send an HTTP message to a different port, one of several things will happen:

12
BSc IT (Sem V Notes) IOT Asst. Prof.Rawoot Amina O.
• Nothing is listening to that port, and the machine replies with an "RST" packet (a control sequence
resetting the TCP/IP connection) to complain about this.
• Nothing is listening to that port, but the firewall lets the request simply hang instead of replying. The
purpose of this (lack of) response is to discourage attackers from trying to find information about the
machine by scanning every port.
• The client has decided that trying to send a message to that port is a bad idea and refuses to do it.
Google Chrome does this for a fairly arbitrary list of "restricted ports".
• The message arrives at a port that is expecting something other than an HTTP message. The server
reads the client's response, decides that it is garbage, and then terminates the connection.
• Ports are "well-known ports", and only a system process or an administrator can connect to then).
• Ports 1024-49151 are "registered", so that common applications can have usual port number.
• The Internet Assigned Numbers Authority (IANA) is responsible for registering the numbers in these
ranges.
• You see Custom port numbers if a machine has more than one web server;
For example, in development you might have another server, bound to port 8080:
http://www.exampIe.com:8080
The secure (encrypted) HTTPS usually runs on port 443. So, these two URL’s are equivalent
https://www.example.com https:
http://www.exampIe.com:443

Other Common Ports

13

You might also like