Module 1 IoT
Module 1 IoT
Module 1
Basics of Networking
1.2 Network Types
Computer networks are classified according to various parameters: 1) Type of connection, 2)
physical topology, and 3) reach of the network. These classifications are helpful in deciding
the requirements of a network setup and provide insights into the appropriate selection of a
network type for the setup.
1.2.1 Connection types
Depending on the way a host communicates with other hosts, computer networks are of two
types—(Figure 1.1): Point-to-point and Point-to-multipoint.
(i) Point-to-point: Point-to-point connections are used to establish direct connections
between two hosts. Day-to-day systems such as a remote control for an air conditioner
or television is a point to point connection, where the connection has the whole
channel dedicated to it only. These networks were designed to work over duplex links
and are functional for both synchronous as well as asynchronous systems. Regarding
computer networks, point to point connections find usage for specific purposes such
as in optical networks.
(ii) Point-to-multipoint: In a point-to-multipoint connection, more than two hosts share
the same link. This type of configuration is similar to the one-to-many connection
type. Point-to-multipoint connections find popular use in wireless networks and IP
telephony. The channel is shared between the various hosts, either spatially or
temporally. One common scheme of spatial sharing of the channel is frequency
division multiple access (FDMA). Temporal sharing of channels include approaches
such as time division multiple access (TDMA). Each of the spectral and temporal
sharing approaches has various schemes and protocols for channel sharing in point-to-
multipoint networks. Point-tomultipoint connections find popular use in present-day
networks, especially while enabling communication between a massive number of
connected devices.
1
22ETC151/251 IoT Module 1
2
22ETC151/251 IoT Module 1
3
22ETC151/251 IoT Module 1
4
22ETC151/251 IoT Module 1
(iv) Transport Layer: This is layer 4 of the OSI model and is a host layer. The transport layer
is tasked with end-to-end error recovery and flow control to achieve a transparent transfer of
data between hosts. This layer is responsible for keeping track of acknowledgments during
variable-length data transfer between hosts. In case of loss of data, or when no
acknowledgment is received, the transport layer ensures that the particular erroneous data
segment is re-sent to the receiving host. The protocol data unit associated with this layer is
referred to as a segment or datagram.
(v) Session Layer: This is the OSI model’s layer 5 and is a host layer. It is responsible for
establishing, controlling, and terminating of communication between networked hosts. The
session layer sees full utilization during operations such as remote procedure calls and remote
sessions. The protocol data unit associated with this layer is referred to as data.
5
22ETC151/251 IoT Module 1
(vi) Presentation Layer: This layer is a host layer and layer 6 of the OSI model. It is mainly
responsible for data format conversions and encryption tasks such that the syntactic
compatibility of the data is maintained across the network, for which it is also referred to as
the syntax layer. The protocol data unit associated with this layer is referred to as data.
(vii) Application Layer: This is layer 6 of the OSI model and is a host layer. It is directly
accessible by an end-user through software APIs (application program interfaces) and
terminals. Applications such as file transfers, FTP (file transfer protocol), e-mails, and other
such operations are initiated from this layer. The application layer deals with user
authentication, identification of communication hosts, quality of service, and privacy. The
protocol data unit associated with this layer is referred to as data.
6
22ETC151/251 IoT Module 1
7
22ETC151/251 IoT Module 1
address resolution protocol (ARP), Internet protocol (IP), Internet control message
protocol (ICMP), and Internet group management protocol (IGMP). Traditionally,
this layer was built upon IPv4, which is gradually shifting to IPv6, enabling the
accommodation of a much more significant number of addresses and security
measures.
(iii) Transport Layer: Layer 3 of the TCP/IP protocol suite is functionally synonymous
with the transport layer of the OSI model. This layer is tasked with the functions
of error control, flow control, congestion control, segmentation, and addressing in
an end-to-end manner; it is also independent of the underlying network.
Transmission control protocol (TCP) and user datagram protocol (UDP) are the
core protocols upon which this layer is built, which in turn enables it to have the
choice of providing connection-oriented or connectionless services between two
or more hosts or networked devices.
(iv) Application Layer: The functionalities of the application layer, layer 4, of the
TCP/IP protocol suite are synonymous with the collective functionalities of the
OSI model’s session, presentation, and application layers. This layer enables an
end-user to access the services of the underlying layers and defines the protocols
for the transfer of data. Hypertext transfer protocol (HTTP), file transfer protocol
(FTP), simple mail transfer protocol (SMTP), domain name system (DNS),
routing information protocol (RIP), and simple network management protocol
(SNMP) are some of the core protocols associated with this layer.
8
22ETC151/251 IoT Module 1
Emergence of IoT
4.1 Introduction
• ATM: ATMs or automated teller machines are cash distribution machines, which are
linked to a user’s bank account. ATMs dispense cash upon verification of the identity of a
user and their account through a specially coded card. The central concept behind ATMs
was the availability of financial transactions even when banks were closed beyond their
regular work hours. These ATMs were ubiquitous money dispensers. The first ATM
became operational and connected online for the first time in 1974.
• Web: World Wide Web is a global information sharing and communication platform. The
Web became operational for the first time in 1991. Since then, it has been massively
responsible for the many revolutions in the field of computing and communication.
• Smart Meters: The earliest smart meter was a power meter, which became operational in
early 2000. These power meters were capable of communicating remotely with the power
grid. They enabled remote monitoring of subscribers’ power usage and eased the process of
billing and power allocation from grids.
• Digital Locks: Digital locks can be considered as one of the earlier attempts at connected
home-automation systems. Present-day digital locks are so robust that smartphones can be
used to control them. Operations such as locking and unlocking doors, changing key codes,
including new members in the access lists, can be easily performed, and that too remotely
using smartphones.
• Connected Healthcare: Here, healthcare devices connect to hospitals, doctors, and relatives
to alert them of medical emergencies and take preventive measures. The devices may be
9
22ETC151/251 IoT Module 1
simple wearable appliances, monitoring just the heart rate and pulse of the wearer, as well
as regular medical devices and monitors in hospitals. The connected nature of these systems
makes the availability of medical records and test results much faster, cheaper, and
convenient for both patients as well as hospital authorities.
• Connected Vehicles: Connected vehicles may communicate to the Internet or with other
vehicles, or even with sensors and actuators contained within it. These vehicles self-
diagnose themselves and alert owners about system failures.
• Smart Cities: This is a city-wide implementation of smart sensing, monitoring, and
actuation systems. The city-wide infrastructure communicating amongst themselves enables
unified and synchronized operations and information dissemination. Some of the facilities
which may benefit are parking, transportation, and others.
• Smart Dust: These are microscopic computers. Smaller than a grain of sand each, they can
be used in numerous beneficial ways, where regular computers cannot operate. For
example, smart dust can be sprayed to measure chemicals in the soil or even to diagnose
problems in the human body.
• Smart Factories: These factories can monitor plant processes, assembly lines, distribution
lines, and manage factory floors all on their own. The reduction in mishaps due to human
errors in judgment or unoptimized processes is drastically reduced.
• UAVs: UAVs or unmanned aerial vehicles have emerged as robust publicdomain solutions
tasked with applications ranging from agriculture, surveys, surveillance, deliveries, stock
maintenance, asset management, and other tasks.
10
22ETC151/251 IoT Module 1
11
22ETC151/251 IoT Module 1
From a developer’s perspective, the Web of Things (WoT) paradigm enables access
and control over IoT resources and applications. These resources and applications
are generally built using technologies such as HTML 5.0, JavaScript, Ajax, PHP,
and others. REST (representational state transfer) is one of the key enablers of WoT.
The use of RESTful principles and RESTful APIs (application program interface)
enables both developers and deployers to benefit from the recognition, acceptance,
and maturity of existing web technologies without having to redesign and redeploy
solutions from scratch. Still, designing and building the WoT paradigm has various
adaptability and security challenges, especially when trying to build a globally
uniform WoT. As IoT is focused on creating networks comprising objects, things,
people, systems, and applications, which often do not consider the unification aspect
and the limitations of the Internet, the need for WoT, which aims to integrate the
various focus areas of IoT into the existing Web is really invaluable. Technically,
WoT can be thought of as an application layer-based hat added over the network
layer. However, the scope of IoT applications is much broader; IoT also which
includes non-IP-based systems that are not accessible through the web.
12
22ETC151/251 IoT Module 1
Typically, the services offered in this layer are a combination of things and
low-power connectivity. The immediate low-power connectivity, which is
responsible for connecting the things in local implementation, may be legacy
protocols.
The range of these connectivity technologies is severely restricted; they are
responsible for the connectivity between the things of the IoT and the nearest
hub or gateway to access the Internet.
The local connectivity is responsible for distributing Internet access to
multiple local IoT deployments. This distribution may be on the basis of the
physical placement of the things, on the basis of the application domains, or
even on the basis of providers of services. Services such as address
management, device management, security, sleep scheduling, and others fall
within the scope of this plane.
In continuation, the penultimate plane of global connectivity plays a
significant role in enabling IoT in the real sense by allowing for worldwide
implementations and connectivity between things, users, controllers, and
applications. This plane also falls under the purview of IoT management as it
decides how and when to store data, when to process it, when to forward it,
and in which form to forward it. The Web, data-centers, remote servers,
Cloud, and others make up this plane.
The final plane of processing can be considered as a top-up of the basic IoT
networking framework. The continuous rise in the usefulness and penetration
of IoT in various application areas such as industries, transportation,
healthcare, and others is the result of this plane. Various computing
13
22ETC151/251 IoT Module 1
paradigms such as “big data”, “machine Learning”, and others, fall within
the scope of this domain.
(i) IoT Node: These are the networking devices within an IoT LAN. Each of
these devices is typically made up of a sensor, a processor, and a radio,
which communicates with the network infrastructure (either within the LAN
or outside it). The nodes may be connected to other nodes inside a LAN
directly or by means of a common gateway for that LAN. Connections
outside the LAN are through gateways and proxies.
(ii) IoT Router: An I oT router is a piece of networking equipment that is
primarily tasked with the routing of packets between various entities in the
IoT network; it keeps the traffic flowing correctly within the network. A
router can be repurposed as a gateway by enhancing its functionalities.
(iii) IoT LAN: The local area network (LAN) enables local connectivity within
the purview of a single gateway. Typically, they consist of short-range
connectivity technologies. IoT LANs may or may not be connected to the
Internet. Generally, they are localized within a building or an organization.
(iv) IoT WAN: The wide area network (WAN) connects various network
segments such as LANs. They are typically organizationally and
geographically wide, with their operational range lying between a few
kilometers to hundreds of kilometers. IoT WANs connect to the Internet and
enable Internet access to the segments they are connecting.
14
22ETC151/251 IoT Module 1
(v) IoT Gateway: An IoT gateway is simply a router connecting the IoT LAN to
a WAN or the Internet. Gateways can implement several LANs and WANs.
Their primary task is to forward packets between LANs and WANs, and the
IP layer using only layer 3.
(vi) IoT Proxy: Proxies actively lie on the application layer and performs
application layer functions between IoT nodes and other entities. Typically,
application layer proxies are a means of providing security to the network
entities under it ; it helps to extend the addressing range of its network.
15