cc
cc
Computer Networks
A computer network is a cluster of computers over a shared communication path that works
to share resources from one computer to another, provided by or located on the network
nodes. In this article, we will discuss computer networks and their types.
3 Mobile Users
Text messaging or texting
Smart phones,
GPS (Global Positioning System)
m-commerce
NFC (Near Field Communication)
4 Social Issues
With the good comes the bad, as this new-found freedom brings with it
many unsolved social, political, and ethical issues.
Social networks, message boards, content sharing sites, and a
host of other applications allow people to share their views with like-
minded individuals. As long as the subjects are restricted to technical
topics or hobbies like gardening, not too many problems will arise.
The trouble comes with topics that people actually care about, like
politics, religion, or sex. Views that are publicly posted may be deeply
offensive to some people. Worse yet, they may not be politically correct.
Furthermore, opinions need not be limited to text; high-resolution color
photographs and video clips are easily shared over computer networks.
Some people take a live-and-let-live view, but others feel that posting
certain material (e.g., verbal attacks on particular countries or religions,
pornography, etc.) is simply unacceptable and that such content must
be censored. Different countries have different and conflicting laws in
this area. Thus, the debate rages.
Computer networks make it very easy to communicate. They also
make it easy for the people who run the network to snoop on the traffic.
This sets up conflicts over issues such as employee rights versus
employer rights. Many people read and write email at work. Many
employers have claimed the right to read and possibly censor employee
messages, including messages sent from a home computer outside
working hours. Not all employees agree with this, especially the latter
part.
Another conflict is centered around government versus citizen’s rights.
A new twist with mobile devices is location privacy. As part of the
process of providing service to your mobile device the network
operators learn where you are at different times of day. This allows
them to track your movements. They may know which nightclub you
frequent and which medical center you visit.
F P L C M W
u e o a e i
l r c m t d
l s a p r e
o l u o
N n s p A
a a A o r
m l r A l e
e e r i a
A a e t
r a a N
e N n e
a e N t
t e A w
N w t r o
e o w e r
t r o a k
w k r
o k N
r e
k t
w
o
r
k
P P L C M W
a A A A A A
r N N N N N
a
m
e
t
e
r
s
T B E E F L
e l t t D e
c u h h D a
h e e e I s
n t r r , e
o o n n d
l o e e C
o t t t D L
g h D i
y , & i n
. e
I W ,
r i A
D f T D
A i M i
, a
Z l
i -
g U
b p
e
e
P P L C M W
a A A A A A
r N N N N N
a
m
e
t
e
r
s
R 1 U 1 5 A
a - p - b
n 1 t – 5 o
g 0 o 0 v
e 0 5 e
2 k
m k k m 5
m m 0
k
m
T V V H A L
r e e i v o
a r r g e w
n y y h r
s a
m H H g
i i i e
s g g
s h h
i
o
n
S
p
e
e
d
P P L C M W
a A A A A A
r N N N N N
a
m
e
t
e
r
s
O P P P P P
w r r r r r
n i i i i i
e v v v v v
r a a a a a
s t t t t t
h e e e e e
i
p o o
r r
P P
u u
b b
l l
i i
c c
M V E M D V
a e a o i e
i r s d f r
n y y e f y
t r i
e E a c D
n a t u i
a s e l f
n y t f
c i
e c
u
l
t
P P L C M W
a A A A A A
r N N N N N
a
m
e
t
e
r
s
C V L M H V
o e o o i e
s r w d g r
t y e h y
r
L a H
o t i
w e g
h
o The bus topology is designed in such a way that all the stations are connected
through a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly
connected to the backbone cable.
o When a node wants to send a message over the network, it puts a message over
the network. All the stations available in the network will receive the message
whether it has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
o The configuration of a bus topology is quite simpler as compared to other
topologies.
o The backbone cable is considered as a "single lane" through which the message
is broadcast to all the stations.
o The most common access method of the bus topologies is CSMA (Carrier Sense
Multiple Access).
CSMA: It is a media access control used to control the data flow so that data
integrity is maintained, i.e., the packets do not get lost. There are two alternative
ways of handling the problems that occur when two nodes send the messages
simultaneously.
o CSMA CD: CSMA CD (Collision detection) is an access method used to detect the
collision. Once the collision is detected, the sender will stop transmitting the
data. Therefore, it works on "recovery after the collision".
o CSMA CA: CSMA CA (Collision Avoidance) is an access method used to avoid
the collision by checking whether the transmission media is busy or not. If busy,
then the sender waits until the media becomes idle. This technique effectively
reduces the possibility of the collision. It does not work on "recovery after the
collision".
Advantages of Bus topology:
o Low-cost cable: In bus topology, nodes are directly connected to the cable
without passing through a hub. Therefore, the initial cost of installation is low.
o Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-
based networks that support upto 10 Mbps.
o Familiar technology: Bus topology is a familiar technology as the installation and
troubleshooting techniques are well known, and hardware components are easily
available.
o Limited failure: A failure in one node will not have any effect on other nodes.
Disadvantages of Bus topology:
o Extensive cabling: A bus topology is quite simpler, but still it requires a lot of
cabling.
o Difficult troubleshooting: It requires specialized test equipment to determine the
cable faults. If any fault occurs in the cable, then it would disrupt the
communication for all the nodes.
o Signal interference: If two nodes send the messages simultaneously, then the
signals of both the nodes collide with each other.
o Reconfiguration difficult: Adding new devices to the network would slow down
the network.
o Attenuation: Attenuation is a loss of signal leads to communication issues.
Repeaters are used to regenerate the signal.
2) Ring Topology
3) Star Topology
o Star topology is an arrangement of the network in which every node is connected
to the central hub, switch or a central computer.
o The central computer is known as a server, and the peripheral devices attached
to the server are known as clients.
o Coaxial cable or RJ-45 cables are used to connect the computers.
o Hubs or Switches are mainly used as connection devices in a physical star
topology.
o Star topology is the most popular topology in network implementation.
Advantages of Star topology
o Efficient troubleshooting: Troubleshooting is quite efficient in a star topology as
compared to bus topology. In a bus topology, the manager has to inspect the
kilometers of cable. In a star topology, all the stations are connected to the
centralized network. Therefore, the network administrator has to go to the single
station to troubleshoot the problem.
o Network control: Complex network control features can be easily implemented in
the star topology. Any changes made in the star topology are automatically
accommodated.
o Limited failure: As each station is connected to the central hub with its own
cable, therefore failure in one cable will not affect the entire network.
o Familiar technology: Star topology is a familiar technology as its tools are cost-
effective.
o Easily expandable: It is easily expandable as new stations can be added to the
open ports on the hub.
o Cost effective: Star topology networks are cost-effective as it uses inexpensive
coaxial cable.
o High data speeds: It supports a bandwidth of approx 100Mbps. Ethernet
100BaseT is one of the most popular Star topology networks.
Disadvantages of Star topology
o A Central point of failure: If the central hub or switch goes down, then all the
connected nodes will not be able to communicate with each other.
o Cable: Sometimes cable routing becomes difficult when a significant amount of
routing is required.
4) Tree topology
o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected
with each other in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other nodes
are the descendants of the root node.
o There is only one path exists between two nodes for the data transmission. Thus,
it forms a parent-child hierarchy.
Advantages of Tree topology
o Support for broadband transmission: Tree topology is mainly used to provide
broadband transmission, i.e., signals are sent over long distances without being
attenuated.
o Easily expandable: We can add the new device to the existing network. Therefore,
we can say that tree topology is easily expandable.
o Easily manageable: In tree topology, the whole network is divided into segments
known as star networks which can be easily managed and maintained.
o Error detection: Error detection and error correction are very easy in a tree
topology.
o Limited failure: The breakdown in one station does not affect the entire network.
o Point-to-point wiring: It has point-to-point wiring for individual segments.
Disadvantages of Tree topology
o Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult
to troubleshoot the problem.
o High cost: Devices required for broadband transmission are very costly.
o Failure: A tree topology mainly relies on main bus cable and failure in main bus
cable will damage the overall network.
o Reconfiguration difficult: If new devices are added, then it becomes difficult to
reconfigure.
5) Mesh topology
o Mesh technology is an arrangement of the network in which computers are
interconnected with each other through various redundant connections.
o There are multiple paths from one computer to another computer.
o It does not contain the switch, hub or any central computer which acts as a
central point of communication.
o The Internet is an example of the mesh topology.
o Mesh topology is mainly used for WAN implementations where communication
failures are a critical concern.
o Mesh topology is mainly used for wireless networks.
o Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2;
Where n is the number of nodes that represents the network.
Mesh topology is divided into two categories:
o Fully connected mesh topology
o Partially connected mesh topology
o Full Mesh Topology: In a full mesh topology, each computer is connected to all
the computers available in the network.
o Partial Mesh Topology: In a partial mesh topology, not all but certain computers
are connected to those computers with which they communicate frequently.
Advantages of Mesh topology:
Reliable: The mesh topology networks are very reliable as if any link breakdown
will not affect the communication between connected computers.
Fast Communication: Communication is very fast between the nodes.
Easier Reconfiguration: Adding new devices would not disrupt the
communication between other devices.
Disadvantages of Mesh topology
o Cost: A mesh topology contains a large number of connected devices such as a
router and more transmission media than other topologies.
o Management: Mesh topology networks are very large and very difficult to
maintain and manage. If the network is not monitored carefully, then the
communication link failure goes undetected.
o Efficiency: In this topology, redundant connections are high that reduces the
efficiency of the network.
6) Hybrid Topology
o The combination of various different topologies is known as Hybrid topology.
o A Hybrid topology is a connection between different links and nodes to transfer
the data.
o When two or more different topologies are combined together is termed as Hybrid
topology and if similar topologies are connected with each other will not result in
Hybrid topology. For example, if there exist a ring topology in one branch of ICICI
bank and bus topology in another branch of ICICI bank, connecting these two
topologies will result in Hybrid topology.
Advantages of Hybrid Topology
o Reliable: If a fault occurs in any part of the network will not affect the functioning
of the rest of the network.
o Scalable: Size of the network can be easily expanded by adding new devices
without affecting the functionality of the existing network.
o Flexible: This topology is very flexible as it can be designed according to the
requirements of the organization.
o Effective: Hybrid topology is very effective as it can be designed in such a way
that the strength of the network is maximized and weakness of the network is
minimized.
Disadvantages of Hybrid topology
o Complex design: The major drawback of the Hybrid topology is the design of the
Hybrid network. It is very difficult to design the architecture of the Hybrid
network.
o Costly Hub: The Hubs used in the Hybrid topology are very expensive as these
hubs are different from usual Hubs used in other topologies.
o Costly infrastructure: The infrastructure cost is very high as a hybrid network
requires a lot of cabling, network devices, etc.
Wired Personal Area Network: Wired Personal Area Network is created by using the USB.
o Security issue: A WAN network has more security issues as compared to LAN and
MAN network as all the technologies are combined together that creates the
security problem.
o Needs Firewall & antivirus software: The data is transferred on the internet
which can be changed or hacked by the hackers, so the firewall needs to be used.
Some people can inject the virus in our system so antivirus is needed to protect
from such a virus.
o High Setup cost: An installation cost of the WAN network is high as it involves
the purchasing of routers, switches.
o Troubleshooting problems: It covers a large area so fixing the problem is
difficult.
Internetwork
o An internetwork is defined as two or more computer network LANs or WAN or
computer network segments are connected using devices, and they are configured
by a local addressing scheme. This process is known as internetworking.
o An interconnection between public, private, commercial, industrial, or government
computer networks can also be defined as internetworking.
o An internetworking uses the internet protocol.
o The reference model used for internetworking is Open System
Interconnection(OSI).
Types Of Internetwork:
1. Extranet: An extranet is a communication network based on the internet protocol such
as Transmission Control protocol and internet protocol. It is used for information
sharing. The access to the extranet is restricted to only those users who have login
credentials. An extranet is the lowest level of internetworking. It can be categorized
as MAN, WAN or other computer networks. An extranet cannot have a single LAN, atleast it
must have one connection to the external network.
2. Intranet: An intranet is a private network based on the internet protocol such
as Transmission Control protocol and internet protocol. An intranet belongs to an
organization which is only accessible by the organization's employee or members. The
main aim of the intranet is to share the information and resources among the organization
employees. An intranet provides the facility to work in groups and for teleconferences.
Intranet advantages:
o Communication: It provides a cheap and easy communication. An employee of
the organization can communicate with another employee through email, chat.
o Time-saving: Information on the intranet is shared in real time, so it is time-
saving.
o Collaboration: Collaboration is one of the most important advantage of the
intranet. The information is distributed among the employees of the organization
and can only be accessed by the authorized user.
o Platform independency: It is a neutral architecture as the computer can be
connected to another device with different architecture.
o Cost effective: People can see the data and documents by using the browser and
distributes the duplicate copies over the intranet. This leads to a reduction in the
cost.
Network topologies describe the arrangement of networks and the relative location of traffic flows.
Administrators can use network topology diagrams to determine the best placements for
each node and the optimal path for traffic flow. With a well-defined and planned-out network
topology, an organization can more easily locate faults and fix issues, improving its data transfer
efficiency.
Network geometry can be defined as the physical topology and the logical topology. Network topology
diagrams are shown with devices depicted as network nodes and the connections between them as
lines. The type of network topology differs depending on how the network needs to be arranged.
A well-defined network topology makes it easier for network admins to locate faults, troubleshoot
issues and to allocate network resources. Diagrams are an important reference point in helping to
diagnose network issues, as they can represent physical and logical layouts.
1) Bus Topology
o The bus topology is designed in such a way that all the stations are connected
through a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly
connected to the backbone cable.
o When a node wants to send a message over the network, it puts a message over
the network. All the stations available in the network will receive the message
whether it has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
o The configuration of a bus topology is quite simpler as compared to other
topologies.
o The backbone cable is considered as a "single lane" through which the message
is broadcast to all the stations.
o The most common access method of the bus topologies is CSMA (Carrier Sense
Multiple Access).
CSMA: It is a media access control used to control the data flow so that data integrity is
maintained, i.e., the packets do not get lost. There are two alternative ways of handling the
problems that occur when two nodes send the messages simultaneously.
2) Ring Topology
3) Star Topology
o Star topology is an arrangement of the network in which every node is connected
to the central hub, switch or a central computer.
o The central computer is known as a server, and the peripheral devices attached to
the server are known as clients.
o Coaxial cable or RJ-45 cables are used to connect the computers.
o Hubs or Switches are mainly used as connection devices in a physical star
topology.
o Star topology is the most popular topology in network implementation.
4) Tree topology
o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected
with each other in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other nodes
are the descendants of the root node.
o There is only one path exists between two nodes for the data transmission. Thus, it
forms a parent-child hierarchy.
5) Mesh topology
PauseNext
Mute
Current Time 0:05
/
Duration 18:10
Loaded: 0.73%
Fullscreen
Advertisement
o Full Mesh Topology: In a full mesh topology, each computer is connected to all
the computers available in the network.
o Partial Mesh Topology: In a partial mesh topology, not all but certain computers
are connected to those computers with which they communicate frequently.
Easier Reconfiguration: Adding new devices would not disrupt the communication
between other devices.
6) Hybrid Topology
Network Protocols
Network Protocols are a set of rules governing exchange of information
in an easy, reliable and secure way. Before we discuss the most common
protocols used to transmit and receive data over a network, we need to
understand how a network is logically organized or designed. The most
popular model used to establish open communication between two
systems is the Open Systems Interface (OSI) model proposed by ISO.
OSI Model
OSI model is not a network architecture because it does not specify the
exact services and protocols for each layer. It simply tells what each
layer should do by defining its input and output data. It is up to network
architects to implement the layers according to their needs and
resources available.
Physical layer −It is the first layer that physically connects the two
systems that need to communicate. It transmits data in bits and manages
simplex or duplex transmission by modem. It also manages Network
Interface Card’s hardware interface to the network, like cabling, cable
terminators, topography, voltage levels, etc.
Data link layer − It is the firmware layer of Network Interface Card. It
assembles datagrams into frames and adds start and stop flags to each
frame. It also resolves problems caused by damaged, lost or duplicate
frames.
Network layer − It is concerned with routing, switching and controlling
flow of information between the workstations. It also breaks down
transport layer datagrams into smaller datagrams.
Transport layer − Till the session layer, file is in its own form. Transport
layer breaks it down into data frames, provides error checking at network
segment level and prevents a fast host from overrunning a slower one.
Transport layer isolates the upper layers from network hardware.
Session layer − This layer is responsible for establishing a session
between two workstations that want to exchange data.
Presentation layer − This layer is concerned with correct representation
of data, i.e. syntax and semantics of information. It controls file level
security and is also responsible for converting data to network standards.
Application layer − It is the topmost layer of the network that is
responsible for sending application requests by the user to the lower
levels. Typical applications include file transfer, E-mail, remote logon,
data entry, etc.
It is not necessary for every network to have all the layers. For example,
network layer is not there in broadcast networks.
At the physical layer, the data is actually transferred and received by the
physical layer of the destination workstation. There, the data proceeds to
upper layers after processing till it reaches application layer.
At the application layer, data or request is shared with the workstation.
So each layer has opposite functions for source and destination
workstations. For example, data link layer of the source workstation adds
start and stop flags to the frames but the same layer of the destination
workstation will remove the start and stop flags from the frames.
TCP/IP
Application layer − Application layer protocols like HTTP and FTP are
used.
Transport layer − Data is transmitted in form of datagrams using the
Transmission Control Protocol (TCP). TCP is responsible for breaking up
data at the client side and then reassembling it on the server side.
Network layer − Network layer connection is established using Internet
Protocol (IP) at the network layer. Every machine connected to the
Internet is assigned an address called IP address by the protocol to easily
identify source and destination machines.
Data link layer − Actual data transmission in bits occurs at the data link
layer using the destination address provided by network layer.
FTP
PPP
Point to Point Protocol or PPP is a data link layer protocol that enables
transmission of TCP/IP traffic over serial connection, like telephone line.
A framing method to clearly define end of one frame and start of another,
incorporating errors detection as well.
Link control protocol (LCP) for bringing communication lines up,
authenticating and bringing them down when no longer needed.
Network control protocol (NCP) for each network layer protocol
supported by other networks.
Using PPP, home users can avail Internet connection over telephone
lines.
Any device that does not need to remain at one place to carry out its
functions is a mobile device. So laptops, smartphones and personal
digital assistants are some examples of mobile devices. Due to their
portable nature, mobile devices connect to networks wirelessly. Mobile
devices typically use radio waves to communicate with other devices and
networks. Here we will discuss the protocols used to carry out mobile
communication.
GSM
GSM stands for Global System for Mobile communications. GSM is one of
the most widely used digital wireless telephony system. It was developed
in Europe in 1980s and is now international standard in Europe, Australia,
Asia and Africa. Any GSM handset with a SIM (Subscriber Identity
Module) card can be used in any country that uses this standard. Every
SIM card has a unique identification number. It has memory to store
applications and data like phone numbers, processor to carry out its
functions and software to send and receive messages
CDMA
CDMA stands for Code Division Multiple Access. It was first used by the
British military during World War II. After the war its use spread to
civilian areas due to high service quality. As each user gets the entire
spectrum all the time, voice quality is very high. Also, it is automatically
encrypted and hence provides high security against signal interception
and eavesdropping.
WLL
WLL system consists of user handsets and a base station. The base
station is connected to the central exchange as well as an antenna. The
antenna transmits to and receives calls from users through terrestrial
microwave links. Each base station can support multiple handsets
depending on its capacity.
GPRS
In order for computer networks and the internet to function seamlessly, we have a
bunch of Network Protocols. These protocols define a set of rules and standards
that devices must follow to communicate effectively. The TCP/IP is one of the
most widely used protocols which defines how data is transmitted across
networks. Other key protocols include the HTTP for web browsing, SMTP for email
delivery, SNMP for network management, and many more.
In this beginner’s guide, let us take a closer look at different types of network
protocols. We will begin with the basics of OSI Model and how protocols interact at
different layers. Then we will move on to different types of Network Protocols in
each layer of the OSI Model. As a bonus, we will take a brief overview of types of
Network Protocols based on functionality.
Without these standardized rules, devices with varying hardware and software
cannot interpret each other’s signals and would struggle to communicate
effectively.
When data flows between two points or devices, network protocols manage the
flow by breaking it into manageable packets before transmitting. This not only
impacts the direction and order of data transmission but also validates the
accuracy of the transferred data (to minimize errors).
In this way, protocols help optimize data transmission and make actions like
downloading a file or streaming video fast and efficient. Without them, network
traffic would be chaotic and vulnerable to interruptions.
Protocols like Transmission Control Protocol (TCP) and Internet Protocol (IP) are
the pillars of internet communication. TCP breaks data into packets while IP
addresses each packet and directs it to the correct destination. Without these
protocols, the internet as we know it would not function.
Many protocols incorporate encryption techniques to protect data from
unauthorized access. This is very important when we transmit sensitive data
(personal or financial information) through the internet. Protocols like HTTPS and
SSL/TLS, for example, make web browsing more secure.
Network protocols come in different types and we can classify them in three ways:
Each layer has a specific function and they interact through different network
protocols. In this model, each layer provides a service to the layer above it and
relies only on the layer below it.
At each step, the corresponding layer adds headers and information specific to its
function (IP addresses or error-checking codes). Upon receiving the data, the
layers at the destination process it in reverse order. They strip away the added
information until it reaches the application layer.
Types Of Network Protocols Based On OSI
Model
Physical Layer Protocols
The Physical Layer is the foundation for all network communication as it deals
with the physical connection between devices. Instead of protocols, the physical
layer defines the hardware specifications for how data transmits over physical
mediums like cables, fiber optics, or wireless signals. This layer manages how bits
(1’s and 0’s) are converted into electrical or radio signals that travel across a
network.
The Data Link Layer is responsible for node-to-node data transfer. It focuses on
data framing, addressing, and error detection. It acts as an intermediary, passing
data between the physical layer and the network layer, while also managing
access to the shared physical medium.
MAC: Media Access Control or MAC defines how devices identify themselves
on a network. Every device/network interface has a unique MAC address.
The network uses this MAC address to know where to send or receive data.
PPP: The Point-to-Point Protocol provides communication between two
routers in a direct connection (for internet dial-up access).
Ethernet: Ethernet can belong to both the data link layer and the physical
layer, depending on its configuration.
ARP: Address Resolution Protocol maps IP addresses to MAC addresses so
that devices can find each other on a local network. This function is very
important in delivering data between routers and devices.
The Network Layer handles packet forwarding, routing, and addressing. This layer
breaks large amounts of data into smaller packets, assigns addresses, and directs
those packets to their final destinations across multiple networks.
IP: One of the widely-used protocols, the Internet Protocol (IP), is the heart
of this layer. It provides the mechanism for addressing and routing packets.
It determines the path that data takes from source to destination. IPv4, the
most widely used version, uses a 32-bit addressing system and offers
around 4.3 billion unique IP addresses. However, the exhaustion of IPv4
addresses led to the development of IPv6, which uses a 128-bit system and
provides an almost limitless number of unique addresses, 340 undecillion, to
be precise. IPv6 adoption has seen a quick rise in the recent past.
ICMP: Internet Control Message Protocol plays a huge role in network
diagnostics (ping and traceroute commands, for example) and error
handling. It operates alongside IP and communicates error messages and
operational information. When a packet fails to reach its destination, ICMP
notifies the sender through an error message.
IGMP: The Internet Group Management Protocol manages membership in
multicast groups. Multicasting allows a single packet to reach multiple
destinations simultaneously (streaming media and online gaming).
TCP: The Transmission Control Protocol (TCP) is one of the most widely used
transport layer protocols. It provides a reliable, ordered, and error-checked
delivery of data. TCP is ideal for applications where accurate data transfer is
necessary (web browsing, email, and file downloads). The internet is built on
the combination of TCP and IP protocols.
UDP: In contrast, the User Datagram Protocol (UDP) is a lightweight and
connectionless alternative to TCP. It is suitable for time-sensitive
applications like video streaming and online gaming, where small data
losses can be tolerated for better performance.
SCTP: Another important protocol is Stream Control Transmission Protocol
(SCTP). It supports multiple data streams within a single connection to
reduce the risk of congestion and packet loss.
The Session Layer manages the dialog between two communicating devices. It
coordinates the opening, maintaining, and closing of communication sessions.
RPC: Remote Procedure Call allows one computer to execute a procedure or
function on another system. This protocol simplifies complex operations by
abstracting remote communication.
NetBIOS: Network Basic Input Output System or NetBIOS, on the other
hand, provides services like name resolution and session management on
local area networks, particularly in older Windows-based systems.
PPTP: The Point-to-Point Tunneling Protocol enables secure communication
through virtual private networks (VPNs). It creates encrypted tunnels for
data transfer between endpoints.
Security Protocols
The need to protect data as it travels across networks is at an all-time high and
security protocols help with this. These protocols offer encryption, authentication,
and confidentiality measures to safeguard information from unauthorized access.
Here is a small list of security protocols:
Irrespective of the type of network, you should be able to monitor and control the
performance, reliability, and overall health of network devices. This is where
network management protocols come into play. The two popular protocols in this
category are:
SNMP (Simple Network Management Protocol)
ICMP (Internet Control Message Protocol)
Routing Protocols
The job of routing protocols is to determine the best path for data to travel across
interconnected networks. By analyzing network topology, these protocols direct
data packets to their destination through the most efficient route. Example of
routing protocols are:
As the name suggests, file transfer protocols help in the movement of files
between devices. They provide different methods for secure and efficient data
exchange.
Conclusion
Network protocols are fundamental for a structured and reliable communication
across all types of networks. These protocols define the rules on how devices
interact, transmitting data across various network layers. Without such protocols,
communication would lack the consistency and structure required for modern
digital activities.
Despite the variety of existing protocols, the rise of 5G, IoT, and AI-driven
networks will demand significant changes in protocol design. With 5G expected to
reach over 1.5 billion connections by 2025, networks must handle higher speeds,
increased data volumes, and more complex device interactions. Protocols that
support low-latency communication and tight security will become key.
Difference Between Connection-oriented and Connection-less Services
In computer networks, communication between devices occurs using two types of
services: connection-oriented and connectionless. These services define how data is
transferred between a source and a destination. Connection-oriented services establish a
dedicated connection before data transfer, ensuring reliability. In contrast, connectionless
services do not establish a connection, sending data without acknowledgment or error
correction.
What is a Connection-Oriented Service?
Connection-oriented services involve setting up a dedicated path between the source and
destination before data transfer begins. These services ensure that data is delivered in the
correct sequence and without errors. In a connection-oriented service, the Handshake method
is used to establish the connection between sender and receiver. Before data transmission
starts, connection-oriented services create a dedicated communication channel between the
sender and the recipient. As the connection is kept open until all data is successfully
transferred, this guarantees dependable data delivery. One example is TCP (Transmission
Control Protocol), which ensures error-free and accurate data packet delivery.
Examples of Connection-Oriented Services
TCP (Transmission Control Protocol) in the TCP/IP suite.
Telephone calls in traditional telecommunication systems.
Includes error detection, correction, and No error handling; errors are not
retransmission. corrected.
Ensures data is delivered in the correct order. Data may arrive out of order or not at all.
Less scalable due to the need for maintaining Highly scalable for large networks with
connections. many users.
Connection-oriented Service Connection-less Service
Ex: TCP (Transmission Control Protocol) Ex: UDP (User Datagram Protocol)
Conclusion
Both connection-oriented and connectionless services are essential for modern networking,
each suited to different applications:
Connection-Oriented Services: Prioritize reliability, sequencing, and error correction,
making them ideal for applications like file transfers, email, and telecommunication.
Connectionless Services: Focus on speed and efficiency, perfect for time-sensitive
applications like DNS lookups, VoIP, and online gaming.
The choice of service depends on the specific requirements of the application, such as
reliability, speed, and data size.
Let us understand the differences between the above given two services:
In this type of service, a prior connection needs to In this type of service, no prior
be established. connection is needed.
Connection-Oriented Services Connection Less Services
These services are suitable for long and These services are suitable
steady transmissions. for bursty transmissions.
Transmission media refers to the physical medium through which data is transmitted from one
device to another within a network. These medium can be wired or wireless. The choice of
medium depends on factors like distance, speed, and interference. In this article, we will
discuss the transmission media. In this article we will see types of transmission media in detail.
What is Transmission Media in Computer Networks?
A transmission medium is a physical path between the transmitter and the receiver i.e. it is the
channel through which data is sent from one device to another. Transmission Media is broadly
classified into the following types:
1. Guided Media
Guided Media is also referred to as Wired or Bounded transmission media. Signals being transmitted are directed and
confined in a narrow pathway by using physical links.
Features:
High Speed
Secure
It consists of 2 separately insulated conductor wires wound about each other. Generally, several such pairs are
bundled together in a protective sheath. They are the most widely used Transmission Media. Twisted Pair is of two
types:
Unshielded Twisted Pair (UTP):UTP consists of two insulated copper wires twisted around one another. This
type of cable has the ability to block interference and does not depend on a physical shield for this purpose. It
is used for telephonic applications.
Least expensive
Easy to install
High-speed capacity
Shielded Twisted Pair (STP): Shielded Twisted Pair (STP) cable consists of a special jacket (a copper braid covering or a
foil shield) to block external interference. It is used in fast-data-rate Ethernet and in voice and data channels of
telephone lines.
Comparatively faster
More expensive
Bulky
Coaxial Cable
Coaxial cable has an outer plastic covering containing an insulation layer made of PVC or Teflon and 2 parallel
conductors each having a separate insulated protection cover. The coaxial cable transmits information in two modes:
Baseband mode(dedicated cable bandwidth) and Broadband mode(cable bandwidth is split into separate ranges).
Cable TVs and analog television networks widely use Coaxial cables.
It is easy to install.
Optical Fibre Cable uses the concept total internal reflection of light through a core made up of glass. The core is
surrounded by a less dense glass or plastic covering called the coating. It is used for the transmission of large volumes
of data. The cable can be unidirectional or bidirectional. The WDM (Wavelength Division Multiplexer) supports two
modes, namely unidirectional and bidirectional mode.
Lightweight
High cost
Industrial Purpose: Used for lighting purposes and safety measures in designing the interior and exterior of
automobiles.
Stripline
Stripline is a transverse electromagnetic (TEM) transmission line medium invented by Robert M. Barrett of the Air
Force Cambridge Research Centre in the 1950s. Stripline is the earliest form of the planar transmission line. It uses a
conducting material to transmit high-frequency waves it is also called a waveguide. This conducting material is
sandwiched between two layers of the ground plane which are usually shorted to provide EMI immunity.
Microstripline
A microstripline is a type of transmission media used to carry high-frequency signals, commonly found in microwave
and radio frequency circuits. It consists of a flat, narrow conducting strip (usually made of metal) placed on top of a
dielectric material (an insulating layer), with a metal ground plane on the other side.
2. Unguided Media
It is also referred to as Wireless or Unbounded transmission media . No physical medium is required for the
transmission of electromagnetic signals.
Less Secure
Radio Waves
Radio waves are easy to generate and can penetrate through buildings. The sending and receiving antennas need not
be aligned. Frequency Range:3KHz – 1GHz. AM and FM radios and cordless phones use Radio waves for transmission.
Radiowave
Microwaves
It is a line of sight transmission i.e. the sending and receiving antennas need to be properly aligned with each other.
The distance covered by the signal is directly proportional to the height of the antenna. Frequency Range:1GHz –
300GHz. Micro waves are majorly used for mobile phone communication and television distribution.
Advanges:
Disadvanges:
Insecure communication.
Out-of-phase signal.
Bandwidth is limited.
Infrared
Infrared waves are used for very short distance communication. They cannot penetrate through obstacles. This
prevents interference between systems. Frequency Range:300GHz – 400THz. It is used in TV remotes, wireless mouse,
keyboard, printer, etc.
These are
These are omni-directional in These are unidirectional in
unidirectional in
nature. nature.
Direction nature.
Transmission impairment refers to the loss or distortion of signals during data transmission, leading to errors or
reduced quality in communication. Common causes include signal distortion, attenuation, and noise all of which can
affect the clarity and reliability of transmitted data.
Transmission Impairment
Attenuation: It means loss of energy. The strength of signal decreases with increasing distance which causes
loss of energy in overcoming resistance of medium. This is also known as attenuated signal. Amplifiers are
used to amplify the attenuated signal which gives the original signal back and compensate for this loss.
Distortion: It means changes in the form or shape of the signal. This is generally seen in composite signals
made up with different frequencies. Each frequency component has its own propagation speed travelling
through a medium. And thats why it delay in arriving at the final destination Every component arrive at
different time which leads to distortion. Therefore, they have different phases at receiver end from what they
had at senders end.
Noise: The random or unwanted signal that mixes up with the original signal is called noise. There are several
types of noise such as induced noise, crosstalk noise, thermal noise and impulse noise which may corrupt the
signal.
Bandwidth: Assuming all other conditions remain constant, the greater a medium’s bandwidth, the faster a
signal’s data transmission rate.
Transmission Impairment : Transmission Impairment occurs when the received signal differs from the
transmitted signal. Signal quality will be impacted as a result of transmission impairment.
Interference: Interference is defined as the process of disturbing a signal as it travels over a communication
medium with the addition of an undesired signal.
Transmission media in computer networks are used to connect devices and transfer data. Here are some common
applications:
Shielded Twisted Pair (STP) Industrial networks, environments with high interference
Conclusion
In conclusion, transmission media are fundamental ways for data transmission in networks, and they are classified as
directed (wired) or unguided (wireless). Guided media, such as twisted pair cables, coaxial cables, and optical fibers,
provide secure, fast, and dependable data transmission over short distances. Unguided media, such as radio waves,
microwaves, and infrared, provide wireless communication at various distances, with security and attenuation trade-
offs. The choice of transmission media is determined by bandwidth, transmission impairment, and interference.
2. Optical signals: Electrical signals are changed into light pulses to carry data.
3. Wireless signals: Data is sent through the air using infrared, microwaves, or radio waves.
What refers to the various types of media used to carry the signal between computers?
Transmission media are the physical ways data travels from one device to another in a network. These paths can be
either wired, like cables, or wireless, using signals through the air.
Optical fibre connections use light to transmit data, providing high bandwidth, minimal signal attenuation, immunity
to electromagnetic interference. These characteristics make them excellent for long-distance and high-volume data
transmission.
Understanding Network Models: OSI and TCP/IP
Introduction
In the world of networking, two models play a vital role in describing the communication and
data transfer processes between hosts: the OSI/ISO model and the TCP/IP model. These
models provide a framework for understanding how information flows through a network and
enable efficient data transmission. In this article, we will explore the fundamental concepts of
these models and their significance in networking.
By
Kinza Yasar, Technical Writer
The internet of things, or IoT, is a network of interrelated devices that connect and exchange data with other IoT devices
and the cloud. IoT devices are typically embedded with technology such as sensors and software and can include
mechanical and digital machines and consumer objects.
These devices encompass everything from everyday household items to complex industrial tools. Increasingly,
organizations in a variety of industries are using IoT to operate more efficiently, deliver enhanced customer service,
improve decision-making and increase the value of the business.
With IoT, data is transferable over a network without requiring human-to-human or human-to-computer interactions.
A thing in the internet of things can be a person with a heart monitor implant, a farm animal with a biochip transponder,
an automobile that has built-in sensors to alert the driver when tire pressure is low, or any other natural or man-made
object that can be assigned an Internet Protocol address and can transfer data over a network.
IoT systems function by gathering data from sensors embedded in IoT devices, which is then transmitted through an IoT
gateway for analysis by an application or back-end system.
Download1
The following four elements are incorporated into an IoT ecosystem for it to function:
Sensors or devices
An IoT ecosystem consists of web-enabled smart devices that use embedded systems, such as processors, sensors and
communication hardware to collect, send and act on data acquired from their environments.
Connectivity
IoT devices can communicate with one another through a network over the internet. These devices share sensor data by
connecting to an IoT gateway, which acts as a central hub where IoT devices can send data. Before the data is shared, it
can also be sent to an edge device where it is analyzed locally.
Data analysis
Only the relevant data is used to identify patterns, offer recommendations and identify potential issues before they
escalate. Analyzing data locally reduces the volume of data sent to the cloud, which minimizes bandwidth consumption.
Sometimes, these devices communicate with other related devices and act on the information they get from one
another. The devices do most of the work without human intervention, although people can interact with the devices.
For example, they can set them up, give them instructions or access the data. The connectivity, networking and
communication protocols used with these web-enabled devices largely depend on the specific IoT applications
deployed.
IoT can also use artificial intelligence and machine learning to make data collection processes easier and more dynamic.
A graphical user interface (UI) is typically used to manage IoT devices. For example, a website or a mobile app can be
used as an UI to manage, control and register smart devices.
Consumer, enterprise and
industrial IoT devices include smart TVs and smart sensors outfitted for conference rooms and assembly line machines.
IoT helps people live and work smarter. Consumers, for example, can use IoT-embedded devices -- such as cars,
smartwatches or thermostats -- to improve their lives. For example, when a person arrives home, their car could
communicate with the garage to open the door; their thermostat could adjust to a preset temperature; and their
lighting could be set to a lower intensity and color.
In addition to offering smart devices to automate homes, IoT is essential to business. It provides organizations with a
real-time look into how their systems work, delivering insights into everything from the performance of machines
to supply chain and logistics operations.
IoT enables machines to complete tedious tasks without human intervention. Companies can automate processes,
reduce labor costs, cut down on waste and improve service delivery. IoT helps make it less expensive to manufacture
and deliver goods and offers transparency into customer transactions.
IoT continues to advance as more businesses realize the potential of connected devices to keep them competitive.
IoT offers several benefits to organizations. It encourages companies to rethink how they approach their businesses and
gives them the tools to improve their business strategies.
Some benefits of IoT are industry-specific while others are applicable across multiple industries. Generally, industrial
internet of things (IIoT) is most abundant in manufacturing, transportation and utility organizations that use sensors and
other IoT devices; however, it also has use cases for organizations within the agriculture, infrastructure and home
automation industries, leading some organizations toward digital transformation.
Agriculture. IoT can benefit farmers by making their jobs easier. For example, sensors can collect data on
rainfall, humidity, temperature and soil content and IoT can help automate farming techniques. Additionally, IoT
devices can be used to oversee the health of livestock, monitor equipment and streamline supply chain
management.
Construction. IoT can help monitor operations surrounding infrastructure. Sensors, for example, can monitor
events or changes within structural buildings, bridges and other infrastructure that could potentially
compromise safety. This provides benefits such as improved incident management and response, reduced
operations costs and improved service quality.
Home automation. A home automation business can use IoT to monitor and manipulate mechanical and
electrical systems in a building. Homeowners can also remotely control and automate their home environment
by using IoT devices, including smart thermostats, lighting systems, security cameras and voice assistants such as
Alexa and Siri for increased comfort and energy efficiency.
Smart buildings and cities. Smart cities can help citizens reduce waste and energy consumption. They can
reduce energy costs using sensors that detect how many occupants are in a room and turning the air conditioner
on if sensors detect a conference room is full or lowering the heat if everyone in the office has gone home.
Urban consumption systems. IoT technologies can also be used to monitor and manage urban consumption
such as traffic lights, parking meters, waste management systems and public transportation networks.
Healthcare monitoring. IoT devices such as remote patient monitoring systems, smart medical devices and
medication trackers let healthcare providers monitor patients' health status, manage chronic conditions and
provide timely interventions. IoT gives providers the ability to monitor patients more closely by analyzing the
generated data. Hospitals also often use IoT systems to complete tasks such as inventory management for both
pharmaceuticals and medical instruments.
Retail. IoT sensors and beacons in retail stores can track customer movement, analyze shopping patterns,
manage inventory levels and personalize marketing messages. This enhances the shopping experience for
customers and optimizes store operations.
Transportation. IoT devices help the transportation industry by monitoring vehicle performance, optimizing
routes and tracking shipments. For example, the fuel efficiency of connected cars can be monitored to reduce
fuel costs and improve sustainability. IoT devices can also monitor the condition of cargo so it reaches its
destination in optimal condition.
Wearable devices. Wearable devices with sensors and software can collect and analyze user data, sending
messages to other technologies about the users to make their lives easier and more comfortable. Wearable
devices are also used for public safety -- for example, by improving first responders' response times during
emergencies by providing optimized routes to a location or by tracking construction workers' or firefighters' vital
signs at life-threatening sites.
Energy management. IoT-enabled smart grids, smart meters and energy management systems let utility
companies and consumers monitor and optimize energy usage, manage demand-response programs and
integrate renewable energy sources more efficiently. For example, the data collected by the IoT devices and
sensors helps identify patterns, peak usage times and areas of inefficiency.
IIoT infrastructure
components include the IoT or edge gateway, sensors, actuators and edge nodes.
Easy accessibility. IoT provides easy access to information from anywhere at any time on any device. For
example, IoT enhances the accessibility of information by providing real-time data and insights, intuitive
interfaces and proactive alerts.
Improves communication. IoT improves communication between connected electronic devices. It achieves this
by enabling efficient data exchange, extending network reach, conserving energy and prioritizing critical
communications. For example, if a motion sensor in a smart home ecosystem detects activity at the front door,
it triggers a communication alert with the smart lighting system to turn on the outdoor lights.
Saves time and money. IoT enables the transfer of data packets over a connected network, which can save time
and money. Predictive maintenance in industrial settings is another good example of this. IoT sensors installed
on machinery continuously monitor parameters such as temperature, vibration and operating conditions in real-
time. Data gathered from these sensors is analyzed using machine learning algorithms to detect patterns that
show potential flaws or degradation in performance which helps in saving both time and money.
Optimizes supply chain. IoT data can be used to optimize supply chain and inventory management processes,
enabling manufacturers to reduce costs and enhance customer satisfaction. By tracking goods and materials in
real-time, manufacturers can keep track of low stock, reduce excess inventory and streamline logistics
operations.
Improves efficiency. IoT analyzes data at the edge, reducing the amount of data that needs to be sent to the
cloud. Edge computing enables physical devices to communicate more efficiently by processing data locally and
exchanging only relevant information with other devices or cloud services.
Provides automation. IoT automates tasks to improve the quality of a business's services and reduces the need
for human intervention. For example, in agriculture, IoT-enabled irrigation systems can automatically adjust
watering schedules based on soil moisture levels, weather forecasts and crop requirements.
Improves customer experience. IoT enables the development of personalized products and services tailored to
individual preferences and needs. Smart home devices, wearable technology and personalized
recommendations in retail are examples of how IoT enhances the customer experience.
Provides flexibility. IoT options can be scaled according to changing needs of a business. Whether it's adding
new devices, expanding operations or integrating with existing systems, IoT provides the flexibility to scale and
evolve with business requirements.
Enables better business decisions. IoT generates vast amounts of data that can be analyzed to gain valuable
insights into operations, consumer behavior and market trends. By harnessing and analyzing big data, businesses
can make data-driven decisions, optimize processes and identify new revenue opportunities.
Offers environmental sustainability. IoT enables efficient use of resources and reduces the negative
environmental effects through initiatives such as smart energy management, waste reduction and sustainable
agriculture practices. By optimizing resource utilization and minimizing waste, IoT contributes to environmental
sustainability.
Along with its various advantages, IoT comes with some potential drawbacks including the following:
Security concerns. IoT increases the attack surface as the number of connected devices grows. As more
information is shared between devices, the potential for a hacker to steal confidential information increases.
Complex management. Device management becomes more challenging as the number of IoT devices increases.
Organizations might eventually have to deal with a massive number of IoT devices, and collecting and managing
the data from all those devices could be difficult.
Corruption of connected devices. IoT has the potential to corrupt other devices connected to the internet if
there's a bug in the system.
Compatibility issues. IoT increases compatibility issues between devices, as there's no international standard of
compatibility for IoT, which causes platform fragmentation. Platform fragmentation refers to the proliferation of
diverse and incompatible IoT platforms, protocols and standards, which can hinder interoperability and
integration between different devices and systems. For example, many IoT vendors develop proprietary
platforms and protocols that are tailored to their specific products and ecosystems. This results in a lack of
standardization and interoperability, as devices from different manufacturers use incompatible technologies.
Job displacements. Due to decreased human intervention in various tasks, IoT can result in job displacement for
low-skilled workers. For example, automated inventory tasks and the use of ATMs have reduced the need for
manual labor, leading to job losses and job insecurity for those currently employed in such roles.
Regulatory and legal hurdles. With the proliferation of IoT devices, legal hurdles are also increasing. Businesses
must adhere to diverse data protection, privacy and cybersecurity regulations, which can differ from one
country to another.
IoT security best practices
also ensure IoT privacy.
Notable organizations involved in the development of IoT standards include the following:
Thread Group.
IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) is an open standard defined by the Internet
Engineering Task Force (IETF). This standard lets any low-power radio communicate with the internet, including
804.15.4, Bluetooth Low Energy and Z-Wave for home automation. In addition to home automation, this
standard is also used in industrial monitoring and agriculture.
Zigbee is a low-power, low-data rate wireless network used mainly in home and industrial settings. ZigBee is
based on the IEEE 802.15.4 standard. The ZigBee Alliance created Dotdot, the universal language for IoT that
enables smart objects to work securely on any network and understand each other.
Data Distribution Service (DDS) was developed by the Object Management Group and is an IIoT standard for
real-time, scalable and high-performance machine-to-machine (M2M) communication.
IoT standards often use specific protocols for device communication. A chosen protocol dictates how IoT device data is
transmitted and received. Some example IoT protocols include the following:
Constrained Application Protocol. CoAP is a protocol designed by the IETF that specifies how low-power,
compute-constrained devices can operate in IoT.
Advanced Message Queuing Protocol. The AMQP is an open source published standard for asynchronous
messaging by wire. AMQP enables encrypted and interoperable messaging between organizations and
applications. The protocol is used in client-server messaging and in IoT device management.
Long-Range Wide Area Network (LoRaWAN). This protocol for WANs is designed to support huge IoT networks,
such as smart cities, with millions of low-power devices.
MQ Telemetry Transport. MQTT is a lightweight protocol used for remote control and remote monitoring
applications. It's suitable for devices with limited resources.
Amazon Web Services (AWS) IoT is a cloud computing platform for IoT released by Amazon. This framework is
designed to enable smart devices to easily connect and securely interact with the AWS cloud and other
connected devices.
Arm Mbed IoT is an open source platform to develop apps for IoT based on Arm microcontrollers. The goal of
this IoT platform is to provide a scalable, connected and secure environment for IoT devices by integrating Mbed
tools and services.
Microsoft Azure IoT Suite platform is a set of services that let users interact with and receive data from their IoT
devices, as well as perform various operations over data -- such as multidimensional analysis, transformation
and aggregation -- and visualize those operations in a way that's suitable for business.
IoT connects billions of devices to the internet and involves the use of billions of data points, all of which must be
secured. Due to its expanded attack surface, IoT security and IoT privacy are cited as major concerns.
One of the most notorious IoT attacks happened in 2016. The Mirai botnet infiltrated domain name server provider Dyn,
resulting in major system outages for an extended period of time. Attackers gained access to the network by exploiting
poorly secured IoT devices. This is one of the largest distributed denial-of-service attacks ever seen and Mirai is still
being developed today.
Because IoT devices are closely connected, a hacker can exploit one vulnerability to manipulate all the data, rendering it
unusable. Manufacturers that don't update their devices regularly -- or at all -- leave them vulnerable to cybercriminals.
Additionally, connected devices often ask users to input their personal information, including name, age, address, phone
number and even social media accounts -- information that's invaluable to hackers.
Hackers aren't the only threat to IoT; privacy is another major concern. For example, companies that make and
distribute consumer IoT devices could use those devices to obtain and sell user personal data. To ensure the safe and
responsible use of IoT devices, organizations must provide education and awareness about security systems and best
practices.
Many technological advancements have accelerated IoT. A few key advancements include the following:
Sensors and actuators. Environmental changes such as temperature, humidity, light, motion or pressure is
detected by sensors, while actuators cause physical changes such as opening a valve or turning on a motor.
Connectivity and network protocols. The availability of a host of network protocols for the internet has made it
easy to connect sensors to the cloud and to other devices, facilitating efficient data transfer. IoT employs a range
of connectivity technologies, including WiFi, Bluetooth, cellular, Zigbee and LoRaWAN.
Low cost and low power sensor technology. More manufacturers now have access to IoT technology due to the
availability of dependable and reasonably priced sensors. These sensors make it possible to gather data from the
real world, which is then transferred to and analyzed in the digital domain.
AI and NLP. Due to the developments in neural networks, IoT devices now feature natural language processing,
which makes them appealing and useful for a wide range of uses, such as conversational AI assistants and digital
personal assistants.
Microservices and wireless technologies. IoT has evolved from the convergence of wireless technologies,
microelectromechanical systems and microservices. All these advancements have facilitated seamless
connectivity and data exchange between devices and the cloud.
Kevin Ashton, co-founder of the Auto-ID Center at the Massachusetts Institute of Technology (MIT), first mentioned the
internet of things in a presentation he made in 1999 to Procter & Gamble (P&G). Wanting to bring radio frequency ID to
the attention of P&G's senior management, Ashton called his presentation "Internet of Things" to incorporate the cool
new trend of 1999: the internet. MIT professor Neil Gershenfeld's book, When Things Start to Think, also appeared in
1999. Although the book didn't use the exact term, it provided a clear vision of where IoT was headed.
IoT has evolved from the convergence of wireless technologies, microelectromechanical systems, microservices and the
internet. This convergence helped tear down the silos between operational technology and information technology,
enabling unstructured machine-generated data to be analyzed for insights to drive improvements.
Although Ashton was the first to mention IoT, the idea of connected devices has been around since the 1970s, under the
monikers embedded internet and pervasive computing.
The first internet appliance, for example, was a Coke machine at Carnegie Mellon University in the early 1980s. Using the
web, programmers could check the status of the machine and determine whether there would be a cold drink awaiting
them, should they decide to make the trip to the machine.
IoT evolved from M2M communication with machines connecting via a network without human interaction. M2M refers
to connecting a device to the cloud, managing it and collecting data.
Taking M2M to the next level, IoT is a sensor network of billions of smart devices that connect people, computer
systems and other applications to collect and share data. As its foundation, M2M offers the connectivity that enables
IoT.
IoT is also a natural extension of supervisory control and data acquisition (SCADA), a category of software application
programs for process control, the gathering of data in real time from remote locations to control equipment and
conditions. SCADA systems include hardware and software components. The hardware gathers and feeds data into a
desktop computer that has SCADA software installed, where it's then processed and presented in a timely manner. Late-
generation SCADA systems developed into first-generation IoT systems.
The concept of the IoT ecosystem, however, didn't come into its own until 2010 when, in part, the government of China
said it would make IoT a strategic priority in its five-year plan.
The following are some key milestones and current and future outlooks of IoT:
Between 2010 and 2019, IoT evolved with broader consumer use. People increasingly used internet-connected
devices, such as smartphones and smart TVs, which were all connected to one network and could communicate
with each other.
In 2020, the number of IoT devices continued to grow along with cellular IoT, which worked on 2G, 3G, 4G
and 5G, as well as LoRaWAN and long-term evolution (LTE-M ) for machines.
In 2023, billions of internet-connected devices collected and shared data for consumer and industry use. IoT has
been an important aspect in the creation of digital twins -- which is a virtual representation of a real-world entity
or process. The physical connections between the entity and its twin are most often IoT sensors, and a well-
configured IoT implementation is often a prerequisite for digital twins.
According to Forbes, in 2024, the IoT healthcare market is predicted to grow to around $150 billion with an
expected valuation of $289 billion by 2028. Likewise, IoT in healthcare has expanded its use of wearables and in-
home sensors that can remotely monitor a patient's health.
By 2035, autonomous cars are expected to yield revenue between $300 billion and $400 billion. As IoT advances,
there's a move from a single-device model to a modular, microservices approach. Connectivity technologies such
as 5G, Wi-Fi 6, LPWAN and satellites are enhancing IoT adoption, while wearable devices such as smartwatches,
earbuds and AR/VR headsets are increasingly evolving.
Related Terms
A generative model uses AI and statistical and probabilistic methods to create representations or abstractions of
observed ... See complete definition
SCADA (supervisory control and data acquisition) is a category of industrial control systems (ICS) that remotely gathers
data in ... See complete definition
Synthetic data is information that's artificially manufactured rather than generated by real-world
events. See complete definition
smart sensor
The Power of Dell OEM for Your Edge Operations–Dell Technologies and Intel
See More
Vendor Resources
Latest TechTargetresources
CIO
Security
Networking
Data Center
Data Management
Search CIO
U.S. lawmakers are taking steps to ban DeepSeek from government devices, which should signal to enterprises the
inherent risks of...
RFI vs. RFP vs. RFQ: How they differ and which is best for you
RFIs, RFPs and RFQs all help software buying teams gather different information, and teams usually only send out one or
two. ...
As trade tensions escalate, business leaders will be faced with tough decisions about product sourcing moving forward.
About Us
Contact Us
Photo Stories
Advertisers
Partner with Us
Media Kit
Corporate Site
Contributors
Reprints
Events
E-Products
Privacy Policy
Do Not Sell or Share My Personal Information
This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and
connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5
Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St.
Newton, MA 02466.