0% found this document useful (0 votes)
22 views49 pages

Modules 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views49 pages

Modules 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

Network and Protocols for IoT

Module 1
Overview of IoT

What is IoT?
The Internet of Things (IoT) describes the network of physical objects
—“things”—that are embedded with sensors, software, and other
technologies for the purpose of connecting and exchanging data with
other devices and systems over the internet.
These devices range from ordinary household objects to sophisticated
industrial tools.

https://www.oracle.com/in/internet-of-things/

09/10/24 2
Examples of IoT
Connected cars
smart dashcams, infotainment systems, or even the vehicle's connected gateway.
They collect data from the accelerator, brakes, speedometer, odometer, wheels,
and fuel tanks to monitor both driver performance and vehicle health.
Connected cars have a range of uses:

Monitoring rental car fleets to increase fuel efficiency and reduce costs.

Helping parents track the driving behavior of their children.

Notifying friends and family automatically in case of a car crash.

Predicting and preventing vehicle maintenance needs.

09/10/24 3
09/10/24 4
Benefits of connected cars

09/10/24 5
Examples of connected car apps

Automatic

Dash

Zubie

Navdy

GoFar

09/10/24 6
09/10/24 7
Other IoT Applications

Connected homes

Smart cities

Industrial IoT

Smart Energy

Health Care

Manufacturing

Retail

Agriculture

Transportation

Smart grids and meters

09/10/24 8
How does IoT work?

Smart devices
This is a device, like a television, security camera etc with computing capabilities. It
collects data and communicates data over the internet to and from its IoT application.

IoT application
An IoT application is a collection of services and software that integrates data received
from various IoT devices. It uses machine learning or artificial intelligence (AI)
technology to analyze this data and make informed decisions. These decisions are
communicated back to the IoT device and the IoT device then responds intelligently
to inputs.

A graphical user interface
IoT devices can be managed through a graphical user interface. Examples mobile
application or website to register and control smart devices.

09/10/24 9
What are IoT technologies?


Sensors and actuators:
Sensors are devices -detect changes in the environment, such as temperature,
humidity, light, motion, or pressure.
Actuators are devices that can cause physical changes in the environment, such
as opening or closing a valve or turning on a motor.
These devices are at the heart of IoT, as they allow machines and devices to
interact with the physical world. Automation is possible when sensors and
actuators work to resolve issues without human intervention.

09/10/24 10

Connectivity technologies:
To transmit IoT data from sensors and actuators to the cloud, IoT devices need to
be connected to the internet.
including wifi, Bluetooth, cellular, Zigbee, and LoRaWAN.

Cloud computing:
The cloud is where the vast amounts of data that is generated by IoT devices are
stored, processed, and analyzed.

Edge computing
It increases the computing power at the edges of an IoT network, reducing
communication latency and improving response time.

09/10/24 11

Big data analytics:
To make sense of the vast amounts of data generated by IoT devices, businesses
need to use advanced analytics tools to extract insights and identify patterns.
Include machine learning algorithms, data visualization tools and predictive
analytics models.

Security and privacy technologies:
As IoT deployments become more widespread, IoT security and privacy become
increasingly important.

Technologies such as encryption, access controls and intrusion detection
systems are used to protect IoT devices and the data they generate from
cyberthreats.

09/10/24 12
Risks and challenges in IoT

Security and privacy risks

Interoperability issues

Data overload

Cost and complexity

Regulatory and legal challenges

09/10/24 13
Network requirements
1. Reliable Internet Connection:
A reliable internet connection is crucial for IoT applications to function optimally -
includes both wired and wireless connections, such as broadband, DSL, fiber, or
cellular networks.
2. Low Latency:
Low latency is essential for real-time IoT applications, where delays can impact
critical operations. It refers to the time taken for data to travel from the source to
the destination. To achieve low latency, network infrastructure must be optimized to
minimize delays and facilitate instant data transmission.

09/10/24 14
Network requirements
3. Scalability:
IoT applications often involve a large number of devices that need to be connected
simultaneously. The network infrastructure should be scalable to accommodate
these devices, ensuring that the system can handle increased traffic and device
connections without degrading performance.
4. Data Security:
As IoT applications deal with sensitive data, network security is of utmost
importance. Implementing encryption, firewalls, and other security measures
ensures that data remains secure during transmission and storage. Additionally,
access control mechanisms should be in place to prevent unauthorized access to
IoT devices.

09/10/24 15
Network requirements
5. Interoperability:
IoT applications often involve devices from different manufacturers with varying
communication protocols. Network requirements should allow for interoperability,
enabling devices to communicate and exchange data seamlessly, regardless of
their brand or network protocol.

09/10/24 16
IoT communication models
1. Device-to-Device,
2. Device-to-Cloud,
3. Device-to-Gateway,
4. Back-End Data-Sharing

09/10/24 17
1. Device-to-Device
-represents two or more devices that directly connect and communicate
between one another.
-They can communicate over many types of networks, including IP networks or
the Internet, but most often use protocols like Bluetooth, Z-Wave, and ZigBee.
-commonly used in home automation systems to transfer small data packets of
information between devices at a relatively low data rate.
-Ex: light bulbs, thermostats, and door locks sending small amounts of
information to each other.
-”short-range radio technology [and a] one-to-one relationship between
these two devices” -Security is simplified
- wearable IoT devices like a heart monitor paired to a smartwatch

09/10/24 18
2. Device-to-Cloud
-Device-to-cloud communication involves an IoT device connecting directly to an
Internet cloud service.
-uses traditional wired Ethernet or Wi-Fi connections, but can also use cellular
technology.
-Cloud connectivity lets the user (and an application) to obtain remote access to a
device. It also potentially supports pushing software updates to the device.
-Ex: if you’re away and you want to see what’s on your webcam at home. You contact
the cloud infrastructure and then the cloud infrastructure relays to your IoT device.”
-security perspective is more complicated than Device-to-Device because it involves
two different types of credentials – the network access credentials (such as the
mobile device’s SIM card) and then the credentials for cloud access.
-interoperability is also a factor with Device-to-Cloud when attempting to integrate
devices made by different manufacturers

09/10/24 19
3. Device-to-Gateway
-IoT devices basically connect to an intermediary device to access a cloud
service. This model often involves application software operating on a local
gateway device (like a smartphone or a “hub”) that acts as an intermediary
between an IoT device and a cloud service.
- This gateway could provide security and other functionality such as data or
protocol translation.
- all your devices up to that gateway and it does something like data aggregation
or transcoding, and it either hands [off the data] locally to the home or shuffles it
off to the cloud, depending on the use case.
- Gateway devices can also potentially bridge the interoperability gap between
devices that communicate on different standards.

09/10/24 20
4. Backend Data Sharing
- Back-End Data-Sharing extends the single device-to-cloud communication
model so that IoT devices and sensor data can be accessed by authorized third
parties.
-Under this model, users can export and analyze smart object data from a cloud
service in combination with data from other sources, and send it to other
services for aggregation and analysis.
-Ex: Map My Fitness is a good example of this because it compiles fitness data
from various devices

09/10/24 21
IoT network architectures and topologies
The foundational concept in all the architectures is supporting data, process,
and the functions that endpoint devices perform.
Two of the best-known architectures

1. oneM2M IoT Standardized Architecture


2. IoT World Forum (IoTWF) Standardized Architecture

09/10/24 22
oneM2M IoT Standardized Architecture

09/10/24 23
The oneM2M architecture divides IoT functions into three major domains:
1. the application layer,
2. the services layer, and
3. the network layer
Application layer: Includes the application-layer protocols and attempts to
– standardize interaction with business intelligence (BI) systems.
Applications tend to be industry-specific and have their own sets
of data models, and thus they are shown as vertical entities.

09/10/24 24
Services layer
– This layer is shown as a horizontal framework across the vertical
industry applications.
– At this layer, horizontal modules include the physical network
that the IoT applications run on, the underlying management
protocols, and the hardware.
– Examples include backhaul communications via cellular, MPLS
networks, VPNs, and so on. Riding on top is the common
services layer.
– This conceptual layer adds APIs and middleware supporting
third-party services and applications.

09/10/24 25
Network layer:
-This is the communication domain for the IoT devices and endpoints.
- It includes the devices themselves and the communications network that
links them.
- include wireless mesh technologies, such as IEEE 802.15.4, and wireless
point-to-multipoint systems, such as IEEE 801.11ah.
- Also included are wired device connections, such as IEEE 1901 power
line communications.

09/10/24 26
The IoT World Forum (IoTWF) Standardized
Architecture

09/10/24 27
Layer 1: Physical Devices and Controllers Layer
- This layer consist of “things” in the Internet of Things, including the various
endpoint devices and sensors that send and receive information.
-The size of these “things” can range from almost microscopic sensors to giant
machines in a factory.
-Their primary function is generating data and being capable of being queried
and/or controlled over a network.
Layer 2: Connectivity Layer
- The function is the reliable and timely transmission of data. Includes transmissions
between Layer 1 devices and the network and between the network and
information processing that occurs at Layer 3 (the edge computing layer).

09/10/24 28
09/10/24 29
09/10/24 30
Layer 3: Edge Computing Layer
-Edge computing is the role of Layer 3.
- At this layer, the emphasis is on data reduction and converting network data
flows into information that is ready for storage and processing by higher layers
Upper Layers: Layers 4–7.
- The upper layers deal with handling and processing the IoT data generated by
the bottom layer.

09/10/24 31
09/10/24 32
09/10/24 33
Topologies
Topology defines the structure of the network of how all the components are
interconnected to each other. Broadly of two types.
Point-to-point topologies:
These topologies allow one point to communicate with another point.
“point-to-point” when each object establishes an individual session with the
gateway. The “point-to- point” refers to the communication structure more than
the physical topology.
Point-to-multipoint topologies: These topologies allow one point to
communicate with more than one other point.

09/10/24 34
The topology of an Internet of Things (IoT) network defines how devices communicate
with each other, and there are several types of topologies:
Star topology: Each device is connected to a central hub or switch that acts as a data
repeater.
Bus topology: All devices share a single communication line or cable, with terminators
at each end to prevent signal reflection.
Ring topology: A bus topology in a closed loop, where information flows in one
direction. Many ring networks use two rings to allow for bidirectional information flow.
Mesh topology: A common topology for IoT networking.
Hybrid topology: A combination of two or more topologies, which can improve
performance and flexibility.

09/10/24 35
09/10/24 36
OSI Model
The OSI Model (Open Systems Interconnection Model) is a conceptual
framework used to describe the functions of a networking system.
The OSI model characterizes computing functions into a universal set of
rules and requirements in order to support interoperability between
different products and software.
In the OSI reference model, the communications between a computing
system are split into seven different abstraction layers: Physical, Data
Link, Network, Transport, Session, Presentation, and Application.

09/10/24 37
The 7 Layers of the OSI Model
Physical Layer
The lowest layer of the OSI Model is concerned with electrically or optically transmitting raw unstructured data bits
across the network from the physical layer of the sending device to the physical layer of the receiving device.
It can include specifications such as voltages, pin layout, cabling, and radio frequencies.
Networking resources such as network hubs, cabling, repeaters, network adapters or modems.

Data Link Layer


At the data link layer, directly connected nodes are used to perform node-to-node data transfer where data is
packaged into frames.
The data link layer also corrects errors that may have occurred at the physical layer.
The data link layer encompasses two sub-layers of its own. The first, media access control (MAC), provides flow
control and multiplexing for device transmissions over a network. The second, the logical link control (LLC),
provides flow and error control over the physical medium as well as identifies line protocols.

09/10/24 38
Network Layer
The network layer is responsible for receiving frames from the data link layer, and delivering them to their
intended destinations among based on the addresses contained inside the frame.
The network layer finds the destination by using logical addresses, such as IP (internet protocol).
At this layer, routers route information where it needs to go between networks.

Transport Layer
The transport layer manages the delivery and error checking of data packets.
It regulates the size, sequencing, and ultimately the transfer of data between systems and hosts.
Transport layer consists of two protocols :TCP(Transmission Control Protocol) UDP (User Datagram Protocol).

Session Layer
The session layer controls the conversations between different computers.
A session or connection between machines is set up, managed, and termined at layer 5.
Session layer services also include authentication and reconnections.

09/10/24 39
Presentation Layer
The presentation layer formats or translates data for the application layer based on the
syntax or semantics that the application accepts.
This layer can also handle the encryption and decryption required by the application
layer.

Application Layer
At this layer, both the end user and the application layer interact directly with the software
application like web browser.
This layer sees network services provided to end-user applications such as a web
browser or Office 365.

09/10/24 40
OSI model

09/10/24 41
TCP/IP Model
The TCP/IP model is a fundamental framework for computer networking.
It stands for Transmission Control Protocol/Internet Protocol, which are the core
protocols of the Internet.
This model defines how data is transmitted over networks, ensuring reliable
communication between devices.
It consists of four layers: the Link Layer, the Internet Layer, the Transport Layer,
and the Application Layer.
Each layer has specific functions that help manage different aspects of network
communication, making it essential for understanding and working with modern
networks.

09/10/24 42
TCP/IP model

09/10/24 43
1. Physical Layer – Physical layer of TCP/IP model is responsible for physical connectivity of two devices. Some of the devices
used in Physical layers are,

Hubs:
Hubs are devices commonly used to connect segments of a LAN. It contains multiple input/output ports. when signal is at any
input port, this signal will be made at all output ports except the one it is coming from.
Cables:
In Wired network architecture (e.g Ethernet), cables are used to interconnect the devices. some of the types of cables are
coaxial cable, optical fiber cable, and twisted pair cable.
Modem:
Modem stands for MOdulator/DEModulator. A modem converts digital signals generated by the computer into analog
signals which, then can be transmitted over cable line and transforms incoming analog signals into digital equivalents.
Repeaters:
Repeaters are used in transmission systems to regenerate analog or digital signals. Analog repeaters can only amplify the signal
whereas a digital repeaters can reproduce a signal to near its original quality.

09/10/24 44
2. Data Link Layer – Data Link layer is responsible to transfer data hop by hop (i.e within
same LAN, from one device to another device) based on the MAC address. Some of the
devices used in Data Link layer are,
Bridges:
A bridge is a type of computer network device that provides interconnection with other
networks that use the same protocol, connecting two different networks together and
providing communication between them.
Switch: A network switch is a multiport network bridge that uses MAC addresses to forward
data at the data link layer (layer 2) of the OSI model.
Network Interface Card:
Network interface card is an electronic device that connects a computer to a computer
network, usually a LAN.

09/10/24 45
3. Network Layer – The network layer is responsible for creating routing table, and based on routing table, forwarding
of the input request. Some of the Devices used in Network Layer are,
Routers:
A router is a switch like device that routes/forwards data packets based on their IP addresses. Routers normally
connect Local Area Network (LANs) and Wide Area Network (WANs) together and have a dynamically updating
routing table based for routing the incoming packets.
4. Transport Layer – Transport layer is responsible for end-to-end communication (or process-to-process
communication). Some of the transport layer devices are,
Gateways:
In computer networking, a gateway is a component that is part of two networks, which use different protocols. The
gateway is a protocol converter which will translate one protocol into the other. A router is a special case of a
gateway.
Firewall:
A firewall is a system designed to prevent unauthorized access to or from a private network, some of the
functionalities of firewall are, packet filtering and as a proxy server.

09/10/24 46
5. Application Layer – Application layer is the top most layer of TCP/IP Model that provides the interface between
the applications and network. Application layer is used exchange messages. Some of the devices used in
Application layer are, PC’s (Personal Computer), Phones, Servers, Gateways and Firewalls
The main protocols used in the application layer:
HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to access the data over the world wide
web.
SNMP: SNMP stands for Simple Network Management Protocol. It is a framework used for managing the devices
on the internet by using the TCP/IP protocol suite.
SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol that supports the e-mail is known as a
Simple mail transfer protocol. This protocol is used to send the data to another e-mail address.
DNS: DNS stands for Domain Name System. An IP address is used to identify the connection of a host to the
internet uniquely. Therefore, the system that maps the name of web pagesto the address is known as Domain
Name System.
TELNET: It is an abbreviation for Terminal Network. It establishes the connection between the local computer and
remote computer.
FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol used for transmitting the files from
one computer to another computer.

09/10/24 47
The main protocols used in the application layer:
HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to access the data over the world wide
web. It transfers the data in the form of plain text, audio, video. It is known as a Hypertext transfer protocol as it
has the efficiency to use in a hypertext environment where there are rapid jumps from one document to another.
SNMP: SNMP stands for Simple Network Management Protocol. It is a framework used for managing the devices on
the internet by using the TCP/IP protocol suite.
SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol that supports the e-mail is known as a
Simple mail transfer protocol. This protocol is used to send the data to another e-mail address.
DNS: DNS stands for Domain Name System. An IP address is used to identify the connection of a host to the internet
uniquely. But, people prefer to use the names instead of addresses. Therefore, the system that maps the name to
the address is known as Domain Name System.
TELNET: It is an abbreviation for Terminal Network. It establishes the connection between the local computer and
remote computer in such a way that the local terminal appears to be a terminal at the remote system.
FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol used for transmitting the files from
one computer to another computer.

09/10/24 48
TCP/IP Model

In TCP/IP Network Access Layer consist of Data Link Layer and the Physical Layer
09/10/24 49

You might also like