Introduction To Internet of Things (Iot) : (Course Code: 22Etc15H)
Introduction To Internet of Things (Iot) : (Course Code: 22Etc15H)
Further Learning
National Programme on Technology Enhanced Learning (NPTEL)
https://onlinecourses.nptel.ac.in/noc22_cs53/preview
Course Learning Objectives
• Understand about the fundamentals of IoT and its building blocks along with
their characteristics.
• Gain insights about the current trends of Associated IoT technologies and IoT
Analytics
Course outcome (Course Skill Set)
CO1: Describe the evolution of IoT, IoT networking components, and addressing
strategies in IoT.
• The sum of two tests, two assignments, will be out of 100 marks and
• The students have to answer 5 full questions, selecting one full question from each module.
• The student has to answer for 100 marks and marks scored out of 100 shall be
Emergence of IoT: Introduction, Evolution of IoT, Enabling IoT and the Complex
Reference
• It is the way of connecting the physical objects through the internet to other devices.
• Kevin Ashton gave the term internet of things, in the year 1999.
• Internet of things means when things or objects are connected to the Internet than people.
• The things in IoT are defined as objects that can be the person or automobile with a built-in
sensor having IP addresses with the ability to collect and transfer the data over the Internet.
• Kevin Ashton (born 1968) is a British technology pioneer who cofounded the Auto-ID Center at the Massachusetts
Institute of Technology (MIT), which created a global standard system for RFID and other sensors.
• He is known for coining the term "the Internet of Things“ to describe a system where the Internet is connected to the
physical world via sensors
Introduction-IOT
• A Thing in the IoT can be a person with a heart monitor implant, a farm animal with a biochip
transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low or
any other natural or man-made object that can be assigned an IP address and is able to transfer
• Organizations in a variety of industries are using IoT to operate more efficiently, better understand
customers to deliver enhanced customer service, improve decision-making and increase the
• An IoT ecosystem consists of web-enabled smart devices that use embedded systems, such as
processors, sensors and communication hardware, to collect, send and act on data they acquire
• IoT devices share the sensor data they collect by connecting to an IoT gateway where data is
• Sometimes, these devices communicate with other related devices and act on the information
they receive.
• The devices do most of the work without human intervention, although people can interact with
the devices -- for instance, to set them up, give them instructions or access the data.
How does IoT work?
• The quality of any information depends on variety and strength of the data that generates the
information.
• Additionally, the speed at which data is updated to all members of a team dictates the advantage
• The present-day global scale of operations of various organizations the speed and nature of
• To sum it up, today’s world relies heavily on data and networking, which allows for the instant
• Networking refers to the linking of computers and communication network devices (referred to as
hosts), which interconnect through a network (Internet or Intranet) and are separated by unique
• These hosts may be connected by a single path or through multiple paths for sending and
receiving data.
• The data transferred between the hosts may be text, images, or videos, which are in the form of
binary.
Network Types
1) Type of connection
2) Physical topology
• These classifications are helpful in deciding the requirements of a network setup and
provide insights into the appropriate selection of a network type for the setup.
Network Types
1. Connection types
Depending on the way a host communicates with other hosts, computer networks are;
1. Point-to-point
2. Point-to-multipoint.
Point-to-multipoint
Network Types
1. Connection types
1. Point-to-point
• Point-to-point connections are used to establish direct connections between two hosts.
• These networks were designed to work over duplex links and are functional for both
2. Point-to-multipoint
• In a point-to-multipoint connection, more than two hosts share the same link.
• The channel is shared between the various hosts, either spatially or temporally.
• Each of the spectral and temporal sharing approaches has various schemes and protocols for
Depending on the physical manner in which communication paths between the hosts are
connected, computer networks can have the following four broad topologies
1) Star
2) Mesh
3) Bus
4) Ring
2. Physical topology Network Types
Star Mesh
Bus Ring
Network Types
1. STAR Topology
Advantages
• Easy installation and ease of fault identification within the network.
• Link failures between a host and the hub do not effect on the
network, except for the host that is affected.
Disadvantages
• In star topology, every host has a point-to-point link to a central controller or hub.
• The hosts cannot communicate with one another directly, they can only do through the central hub.
• The hub acts as the network traffic exchange.
• For large-scale systems, hub, has to be a powerful server to handle all the traffic.
• As there are fewer links (only one link per host), this topology is cheaper and easier to set up.
Network Types
2. MESH Topology
• Every host is connected to every other host using a dedicated link (in a point-to-point manner).
• This implies that for n hosts in a mesh, there are a total of n (n-1)=2 dedicated full duplex links
between the hosts.
• This massive number of links makes the mesh topology expensive.
Advantages
• Robustness and Resilience of the system.
• If a link is down, the network is still fully functional.
• Security and Privacy: Data is only seen by the intended recipients and
not by all members of the network.
• Reduced data load on a single host, as every host in this network takes
care of its traffic load.
Disadvantages
• Owing to the complexities in forming physical connections and the cost of establishing
these links, mesh networks are used very selectively, such as in backbone networks.
Network Types
3. BUS Topology
• Bus topology uses a single cable which connects all the included
nodes.
• The main cable acts as a spine / backbone for the entire network.
• One of the computers in the network acts as the computer server.
• The hosts are connected to the main bus employing drop lines or
taps.
Advantages
• Ease of installation.
• Cost of the cable is very less as compared to other topology
Disadvantages
Disadvantages
• Expensive, difficult to install and manage.
• High probability of a single point of failure & If one repeater fails,
the whole network goes down.
Table 1.1 Network topology comparison
Network reachability
Network reachability
PAN (Personal Area Network)
• The PAN, used for interconnecting the devices which are
meters.
Network reachability
LAN (Local Area Network)
• LANs range from 100 Mbps to 1000 Mbps, with very high
fault-tolerance levels.
within a city.
computer networking.
based links.
• Two of the most commonly accepted and used traditional layered network
OSI Model
systems without requiring changes to the logic of the underlying hardware &
Software.
OSI Model
Interconnection.
perform.
Device A Device B
OSI Model
Layered network models
• The network layer works for the transmission of data from one
host to the other located in different networks.
• It takes care of packet routing i.e. selection of the shortest path
to transmit the packet, from the number of routes available.
• The sender & receiver’s IP addresses are placed in the header
by the network layer.
• The primary tasks of this layer include addressing, sequencing
of packets, congestion control, error handling, and
Internetworking.
The protocol data unit associated with this layer is referred to as a segment or datagram.
Layered network models
The protocol data unit associated with this layer is referred to as data.
Layered network models
The protocol data unit associated with this layer is referred to as data.
Layered network models
The protocol data unit (PDU) associated with this layer is referred to
as data.
OSI Model
Internet Protocol suite or TCP/IP
TCP/IP model, was designed and developed by Department of Defence (DoD) in 1960s and is based on
standard protocols.
1. Process/Application Layer
2. Host-to-Host/Transport Layer
3. Internet Layer
1. Application Layer
• This layer performs the functions of top three layers of the OSI model: Application, Presentation and
Session Layer.
• It is responsible for node-to-node communication and controls user-interface specifications.
• Some of the protocols present in this layer are: HTTP, HTTPS, FTP, TFTP, Telnet, SSH, SMTP, SNMP,
NTP, DNS, DHCP, NFS, X Window, LPD.
Internet Protocol suite or TCP/IP
2. Transport Layer
The main protocols residing at this layer are: IP, ICMP & ARP.
1. IP: Internet Protocol and it is responsible for delivering packets from the source to the destination by looking at the IP
addresses in the packet headers.
• IP has 2 versions: IPv4 and IPv6.
• IPv4: most of the websites are using currently.
• IPv6 is growing as the number of IPv4 addresses are limited.
• It is the combination of Data Link Layer and Physical Layer of the OSI model.
• It looks out for hardware addresses.
• the protocols present in this layer allows for the physical transmission of data.
Difference between TCP/IP and OSI Model
TCP/IP OSI
TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection.
TCP/IP does not have very strict boundaries. OSI has strict boundaries
Transport layer in TCP/IP does not provide assurance In OSI model, transport layer provides assurance
delivery of packets delivery of packets
TCP/IP model network layer only provides connection Connection less and connection oriented both services
less services are provided by network layer in OSI model
• Relate new concepts with concepts learned earlier to make a smooth transition to IoT
• List the reasons for a prevailing universal networked paradigm, which is IoT
• Compare and correlate IoT with its precursors such as WSN (Wireless Sensor Network),
• Recognize the unique features of IoT which set it apart from other similar paradigms
Introduction
• The modern-day advent of network-connected devices, has given rise to the paradigm of the IoT.
• Each second, the present-day Internet allows massive traffic through it.
• This network traffic consists of images, videos, music, speech, text, numbers, binary codes,
machine status, banking messages, data from sensors and actuators, healthcare data, data from
vehicles, home automation system status and control messages, military communications etc.
• This huge variety of data is generated from a massive no. of connected devices, which may be
• According to statistics from the Information Handling Services the total number of connected
• The miniaturization of electronics and the cheap affordability of technology is resulting in a surge of
connected devices, which in turn is leading to an explosion of traffic flowing through the Internet.
Source: HP
Introduction
environment intelligently.
The compound annual growth rate (CAGR) of the IoT market
1974
The sequence of technological developments leading to the shaping of the modern- day IoT
magnetism, or chemicals
• Connected Vehicles: self-diagnose themselves and alert owners about system failures
• Smart Cities: implementation of smart sensing, monitoring, and actuation systems
• Smart Dust: microscopic computers
• Smart Factories: monitor plant processes, assembly lines, distribution lines, etc., all on their own
• UAV: Agriculture, surveys, surveillance, deliveries, stock maintenance, asset management
Technological interdependencies of IoT with other domains
manufacturing industry
of industrial systems.
other tasks while maintaining confidentiality and privacy of its user’s data.
• E.g: Bitcoin
IoT versus M2M
M2M IoT
M2M is about direct communication between IOT is about Sensors, Automation & Internet
Machines Platform
CPS integrate actuators & sensors with Scope of IoT is not limited to just connecting
networking technologies, work in the feedback things; it allows things to communicate and
loop using human intervention, their behaviour exchange data, which can be analysed and
could be changed based on user’s requirements. processes further into meaningful information.
IoT versus WoT
WoT IoT
Enables access and control over IoT resources IoT is a networked world of interconnected
and applications devices, objects, and people
It is a software layer to connect everything to the It is a hardware layer to connect everything to the
web using standard web protocols internet
1. Services
2. Local connectivity
3. Global connectivity
4. Processing
Enabling IoT and the Complex Interdependence of
Technologies
1. Service Plane is composed of two parts:
1) Things or Devices
2) Low-power connectivity.
Example:
• Any IoT application requires the basic setup of sensing, and a low-
power, low-range network, built upon the IEEE 802.15.4 protocol.
2. Local Connectivity
3. Global Connectivity
up this plane.
4. Processing
4. Processing
The sub-domains of this plane;
• Intelligence
information obtained)
IoT Networking Components
An IoT implementation is composed of several components, may vary with their application domains.
1. IoT node
2. IoT router
3. IoT LAN
4. IoT WAN
5. IoT gateway
6. IoT proxy.
A typical IoT network ecosystem highlighting the various networking components from IoT nodes to the Internet
IoT Networking Components
Various IoT nodes within an IoT LAN are configured to one another as well as talk to the IoT router whenever they are in
• Each IoT LAN has its own unique identifier, which is denoted by IoT LAN-x.
Figure
• A router acts as a connecting link between LAN by forwarding messages from the LAN to the IoT gateway or
• It is possible to include features such as firewalls, packet filters, and other security measures besides the
• Various gateways connect to an IoT WAN, which links these devices to the Internet.
• This network may be wired or wireless; however, IoT deployments heavily rely on wireless solutions.
• Wireless technology is the only feasible and neat-enough solution to avoid the hassles of laying wires and
IoT Node
• These are the networking devices (made up of a sensor, a processor, and a radio).
• These devices communicates with the network infrastructure (either within the LAN or outside it).
• The nodes may be connected to other nodes inside a LAN directly or by means of a common
IoT Router
IoT LAN
• The LAN enables local connectivity within the purview of a single gateway.
IoT WAN
• They are typically organizationally and geographically wide, with their operational range lies
• IoT WANs connect to the Internet and enable Internet access to the segments (LAN)
IoT Networking Components
IoT Gateway
• An IoT gateway is a router connecting the IoT LAN to a WAN or the Internet.
• Their primary task is to forward packets between LANs and WANs, and the IP layer using
only layer 3.
IoT Networking Components
IoT Proxy
• Proxies performs application layer functions between IoT nodes and other entities.
• Application layer proxies are a means of providing security to the network entities under it.