0% found this document useful (0 votes)
3 views

UNIT I IOT (1)

The document provides an overview of Internet layers, protocols, and services, focusing on the Internet of Things (IoT) and its architecture, applications, and components. It discusses the TCP/IP model, peer-to-peer networks, sensor networks, multimedia systems, and the performance parameters relevant to networking. Additionally, it highlights the significance of IoT in various sectors and outlines the components and architecture necessary for IoT systems.

Uploaded by

Boomika G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

UNIT I IOT (1)

The document provides an overview of Internet layers, protocols, and services, focusing on the Internet of Things (IoT) and its architecture, applications, and components. It discusses the TCP/IP model, peer-to-peer networks, sensor networks, multimedia systems, and the performance parameters relevant to networking. Additionally, it highlights the significance of IoT in various sectors and outlines the components and architecture necessary for IoT systems.

Uploaded by

Boomika G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

UNIT I

Introduction: Internet Layers - Protocols - Packets - Services - Performance parameters -


Peer-to-peer networks - Sensor networks - Multimedia - IOT Definitions and Functional
Requirements –Motivation – Architecture - Web 3.0 View of IoT– Ubiquitous IoT
Applications – Four Pillars of IoT – DNA of IoT - The Toolkit Approach for End-user
Participation in the Internet of Things. Middleware for IoT: Overview – Communication
middleware for IoT –IoT Information Security.
INTERNET LAYERS
TCP/IP model layers
TCP/IP functionality is divided into four layers, each of which include specific protocols.

• •The application layer provides applications with standardized data exchange. Its
protocols include the Hypertext Transfer Protocol (HTTP), File Transfer Protocol
(FTP), Post Office Protocol 3 (POP3), Simple Mail Transfer Protocol (SMTP) and
Simple Network Management Protocol (SNMP).
• The transport layer is responsible for maintaining end-to-end communications across
the network. TCP handles communications between hosts and provides flow control,
multiplexing and reliability. The transport protocols include TCP and User Datagram
Protocol (UDP), which is sometimes used instead of TCP for special purposes.
• •The network layer, also called the internet layer, deals with packets and connects
independent networks to transport the packets across network boundaries. The
network layer protocols are the IP and the Internet Control Message Protocol (ICMP),
which is used for error reporting.
• •The physical layer consists of protocols that operate only on a link -- the network
component that interconnects nodes or hosts in the network. The protocols in this
layer include Ethernet for local area networks (LANs) and the Address Resolution
Protocol (ARP).
PROTOCOL

• A network protocol defines rules and conventions for communication between


network devices.
Types of Protocols TCP.
1. TCP/IP (Transmission Control Protocol/Internet Protocol) suite.
2. ARP (Address Resolution Protocol)
3. DHCP (Dynamic Host Configuration Protocol)
4. DNS (Domain Name System)
5. FTP (File Transfer Protocol)
6. HTTP (Hyper Text Transfer Protocol)
7. HTTPS (Hypertext Transfer Protocol Secure)
PACKET
➢ A packet is the unit of data that is routed between an origin and a destination on the
Internet or any other packet-switched network.
➢ Each of these packets is separately numbered and includes the Internet address of the
destination.
➢ The individual packets for a given file may travel different routes through the Internet.
When they have all arrived, they are reassembled into the original file (by the TCP
layer at the receiving end).
➢ A packet-switching scheme is an efficient way to handle transmissions on a
connectionless network such as the Internet.
➢ An alternative scheme, circuit-switched, is used for networks allocated for voice
connections.
➢ In circuit-switching, lines in the network are shared among many users as with
packet-switching, but each connection requires the dedication of a particular path for
the duration of the connection. "Packet" and "datagram" are similar in meaning.
SERVICES
 In computer networking, a network service is an application running at the network
application layer and above, that provides data storage, manipulation, presentation,
communication or other capability which is often implemented using a client-server
or peer-to-peer architecture based on application layer network protocols.
 Each service is usually provided by a server component running on one or more
computers (often a dedicated server computer offering multiple services) and
accessed via a network by client components running on other devices.
 Examples are the Domain Name System (DNS) which translates domain names to
Internet protocol (IP) addresses and the Dynamic Host Configuration Protocol
(DHCP) to assign networking configuration information to network hosts.
PERFORMANCE PARAMETERS

• Bandwidth commonly measured in bits/second is the maximum rate that information can be
transferred

• Throughput is the actual rate that information is transferred

• Latency the delay between the sender and the receiver decoding it, this is mainly a function
of the signals travel time, and processing time at any nodes the information traverses Jitter
variation in packet delay at the receiver of the information

• Error rate the number of corrupted bits expressed as a percentage or fraction of the total
sent
Latency Refers to the amount of time (usually measured in milliseconds) it takes for data to
travel from one location to another across a network (or across the Internet, which is a
network itself).
Bandwidth and throughput

• These two terms are sometimes used interchangeably, and though they are related, they‘re
not quite the same. They both refer to the amount of data transferred between two points on a
network in a given period of time.
Uptime or responsiveness

• Uptime, sometimes referred to as availability or responsiveness, refers to the amount of


time that a computer or a network connection is functioning and usable.
Hardware and software

• Your network relies on switches, servers, routers and firewalls, so network monitors can
usually track metrics such as CPU utilization, remaining hard drive space and memory use.
PEER-TO-PEER NETWORKS

• A peer-to-peer (P2P) network is created when two or more PCs are connected and
share resources without going through a separate server computer.
• A P2P network can be an ad hoc connection—a couple of computers connected via a
Universal Serial Bus to transfer.
• A P2P network also can be a permanent infrastructure that links a half-dozen
computers in a small office over copper wires.
• The initial use of P2P networks in business followed the deployment in the early
1980s of free-standing PCs.
Characteristics of a Peer Network

• Peer-to-peer networking is common on small local area networks (LANs), particularly


home networks. Both wired and wireless home networks can be configured as peer-
to-peer environments. Computers in a peer-to-peer network run the same networking
protocols and software.
• Peer networks devices are often situated physically near one another, typically in
homes, small businesses and schools.
• Some peer networks, however, utilize the internet and are geographically dispersed
worldwide.
• Home networks that use broadband routers are hybrid peer-to-peer and client-server
environments.
• In a P2P environment, access rights are governed by setting sharing permissions on
individual machines.
Benefits of a Peer-To-Peer Network

• P2P networks are robust.


• Peer networks allow data to be shared easily in both directions, whether for
downloads to your computer or uploads from your computer on the internet.
• peer-to-peer networks handle a high volume of file-sharing traffic by distributing the
load across many computers.
• Peer-to-peer networks are relatively easy to expand. As the number of devices in the
network increases, the power of the P2P network increases
Security Concerns

• each device participates in routing traffic through the network, hackers can easily
launch denial of service attacks.
• P2P software acts as server and client, which makes peer-to-peer networks more
vulnerable to remote attacks than client-server networks.
• Data that is corrupt can be shared on P2P networks by modifying files that are already
on the network to introduce malicious code.
SENSOR NETWORKS

• Sensor networks are highly distributed networks of small, lightweight wireless nodes,
deployed in large numbers to monitor the environment or system by the measurement
of physical parameters such as temperature, pressure, or relative humidity.
• Building sensors has been made possible by the recent advances in micro-electro
mechanical systems (MEMS) technology.
• Each node of the sensor network consists of three subsystems: the sensor subsystem
which senses the environment, the processing subsystem which performs local
computations on the sensed data, and the communication subsystem which is
responsible for message exchange with neighboring sensor nodes.
• The two most important operations in a sensor network are data dissemination, that is,
the propagation of data/queries throughout the network, and data gathering, that is, the
collection of observed data from the individual sensor nodes to a sink.
• Sensor nodes can be used in military, health, chemical processing, and disaster relief
scenarios.
• Finally, some sensor-network specific issues such as energy-efficient hardware
design, synchronization, transport layer protocols, security, and real-time
communication are discussed.
Applications of Sensor Networks

• Sensor nodes are used in a variety of applications which require constant monitoring
and detection of specific events.
• The military applications of sensor nodes include battlefield surveillance and
monitoring, guidance systems of intelligent missiles, and detection of attack by
weapons of mass destruction, such as chemical, biological, or nuclear.
• Sensors are also used in environmental applications such as forest fire and flood
detection, and habitat exploration of animals.
• Sensors can be extremely useful in patient diagnosis and monitoring.
• Patients can wear small sensor devices that monitor their physiological data such as
heart rate or blood pressure.
MULTIMEDIA

• Multimedia is the field of Computer Science that integrates different forms of


information and represents in the form of audio, video, and animation along with the
traditional media, i.e., text, graphics/drawings, images, etc.
Multimedia Computer System

• Multimedia computer system has high capacity to integrate different media including
text, image, graphics, audio, and video.
• The multimedia computer system stores, represents, processes, manipulates, and
makes available to users.
Significant Features of Multimedia Computer System

• Its Central Processing Unit (CPU) is very fast, as it needs to process large amount of
data.
• It has huge storage capacity.
• It has huge memory power that helps in running heavy data programs.
• It has high capacity graphic card that helps in displaying graphics, animation, video,
etc.
• The sound system makes it easy to listen to audio.
• With all these features (discussed above), a computer system is known as high end
• multimedia computer system.
• However, all the features listed above are not essentially required for every
multimedia
• computer system, but rather the features of a multimedia computer system are
configured as
• per the need of respective user.
Multimedia Components
➢ Text
It contains alphanumeric and some other special characters. Keyboard is usually used
for input of text; however, there are some internal (inbuilt) features to include such text.
➢ Graphics
It is technology to generate, represent, process, manipulate, and display pictures. It is one
of the most important components of multimedia application. The development of graphics is
supported by different software.
➢ Animation
Computer animation is a modern technology, which helps in creating, developing,
sequencing, and displaying a set of images (technically known as ‗frames‘). Animation gives
visual effects or motion very similar to that of a video file.
➢ Audio
This technology records, synthesizes, and plays audio (sound). There are many learning
courses and different instructions that can be delivered through this medium appropriately.
➢ Video
This technology records, synthesizes, and displays images (known as frames) in such
sequences (at a fixed speed). In order to watch a video without any interruption, video
device must display 25 to 30 frames/second.
IOT DEFINITIONS AND FUNCTIONAL REQUIREMENTS
➢ The interconnection via the Internet of computing devices embedded in everyday
➢ objects, enabling them to send and receive data.
➢ The internet of things (IoT) is the network of physical devices, vehicles, buildings
➢ and other items—embedded with electronics, software, sensors, and network
connectivity that enables these objects to collect and exchange data.
➢ The Internet of things refers to the devices like sensors and actuators, but the term
➢ The Internet of Everything used by Cisco is broader and encompasses the devices,
data, people and processes.
➢ The devices e.g sensors will send data. This data will then be processed and used by
➢ people or by machines to control the devices or other devices.
➢ For example: A temperature sensor sends temperature data to a process which
determines that the room temperature is too hot and so sends a signal to turn on the air
conditioning.
Internet of Things (IOT) Sectors
The IOT will affect many areas of day to day life. Some of the main sectors are:
 Home
 Health medical
 Fitness and wellness
 factory and industry
 Agriculture
 Cars and roads
 Cities
 IOT Development Phases
 The growth of the IOT is expected to go through several stages of development.
 Passive – RFID sensors etc –
IOT Components
An IOT system comprises three basic Components.
1. The things -sensors actuators
2. The Network
3. The Platforms,Apps and services
1. The Things – Sensors and Devices
➢ In contrast to computers and tablets which are the main devices currently connected to
the Internet.
➢ Internet of things devices will mainly be:
➢ Low Power- Power usage and computational Power.
➢ Low cost
➢ Wireless
Examples are Simple sensors – temperature, pressure etc
➢ To turn an everyday object like a house or a car into a smart house or car or a ―thing‖
will require that the object has:
➢ A unique address – IPv6 address
➢ A way to connect to a network – Wireless sensors e.g temperature,light,speed etc
2. IOT Networks
➢ The Internet of things will utilize the existing networking infrastructure, technologies
and protocols currently used in homes/offices and on the Internet, and will introduce
many more.
➢ Protocols are designed to operate at a particular level in the networking stack. TCP/IP
uses a 4 level model and we will discuss IOT networking using this model.
➢ Wi-Fi and Bluetooth are being actively developed for low powered applications and
there are new connection technologies like LPWAN, ZigBee, 6LoWpan and Thread.
➢ At the networking level IPv6 is set to become the standard, but in the intermediate
time frame IPv4 will also be used. See IPV6 Basics and IPv4 addressing basics
➢ At the application level there are a host of new protocols. Some have been available
for a long time like , HTTP and MQTT, whereas others have been developed
especially for the IOT. e.g. COAP.
3. IOT Platforms,Apps and Services
An IOT platform combines several IOT functions in one.
It can collect and distribute data, convert data between protocols, store and analyse data.
They are available as cloud based and standalone platforms and are available from many
companies -large and small.
Examples

• Amazon Web services (AWS)


• IBM Watson Bluemix
• Microsoft Azure
• ThingWrox
• See this article –20 IOT platforms
• Architecture of IoT
IOT ARCHITECTURE
IoT architecture varies from solution to solution, based on the type of solution which we
intend to build. IoT as a technology majorly consists of four main components, over which
an architecture is framed.

• Sensors
• Devices
• Gateway
• Cloud
Stage 1:

• Sensors: Sensors collect data from the environment or object under measurement
• and turn it into useful data.
• For example: gyroscope in mobiles
• Actuators: Actuators can also intervene to change the physical conditions that
• generate the data.
• An actuator might, for example, shut off a power supply, adjust an air flow valve,
• or move a robotic gripper in an assembly process.
• Sensing/Actuating stage covers everything
• Example: Industrial devices to robotic camera systems, water-level detectors, air
• quality sensors, accelerometers, and heart rate monitors
Stage 2:

• The stage 2 systems often sit in close proximity to the sensors and actuators.
• For Example: a pump
Stage 3:

• Once IoT data has been digitized and aggregated, it's ready to cross into the
• realm of IT
• However, the data may require further processing before it enters the data centre
• This is where edge IT systems, which perform more analysis, come into play
• Edge IT processing systems may be located in remote offices or other edge
• locations, but generally these sit in the facility or location where the sensors reside
• closer to the sensors, such as in a wiring closet
Stage 4:

• The data from Stage 3 is forwarded to physical data centre or cloud-based


• systems, where more powerful IT systems can analyse, manage, and securely store
• the data
• It takes longer to get results when you wait until data reaches Stage 4, but you
• can execute a more in-depth analysis, as well as combine your sensor data with
• data from other sources for deeper insights
• Stage 4 processing may take place on-premises, in the cloud, or in a hybrid cloud
• system, but the type of processing executed in this stage remains the same,
• regardless of the platform
WEB 3.0 VIEW OF IOT

• By Vangie Beal The term used to describe the evolution of the Web as an extension
• of Web 2.0. This definition of Web 3.0 is the popular view held by Tim O'Reilly. In
contrast,
• Nova Spivack defines Web 3.0 as connective intelligence; connecting data, concepts,
• applications and ultimately people.
• Originally thought of as the semantic Web, Web 3.0 is more characteristic of
• ubiquitous computing (also known as "everyware") in that it marks the era of the
arrival of cloud computing, specifically the thin client running against cloud-based
data and services.
The world of the web

• The web was originally a tool used for military, scientific, and academic purposes, but
since the early 1990s, it has become a huge part of our everyday lives.
• As technology has progressed and as more people have begun using the Internet, the
web has has gone through (and continues to go through) dominant shifts, specifically
Web 2.0, Web 3.0, and the Internet of Things.
• As the Cretaceous, Jurassic, and Triassic periods delineate the time of the dinosaurs,
so too do the Web 2.0 era, Web 3.0 era, and Internet of Things era identify the shifts in
our technologies and how they affect our lives.
Web 3.0
Web 3.0, or the Semantic Web, is the web era we are (arguably) currently in, or perhaps the
era we are currently creating. Web 3.0, with its use of semantics and artificial intelligence is
meant to be a ―smarter web‖—one that knows what content you want to see and how you
want to see it so that it saves you time and improves your life.

UBIQUITOUS IOT APPLICATIONS


1. Smart home
More companies are active in smart home than any
other application in the field of IoT. This list includes prominent startup names such as Nest
or AlertMe as well as a number of multinational corporations like Philips, Haier, or Belkin.
2. Wearables
like the Sony Smart B Trainer, the Myo gesture control, or LookSee bracelet.
3. Smart City
Smart city spans a wide variety of use cases, from traffic management to water distribution,
to waste management, urban security and environmental monitoring.
4. Smart grids
Smart grids is a special one. A future smart grid promises to use information about the
behaviors of electricity suppliers and consumers in an automated fashion to improve the
efficiency, reliability, and economics of electricity.
5. Industrial internet
The industrial internet is also one of the special Internet of Things applications. While many
market researches such as Gartner or Cisco see the industrial internet as the IoT concept with
the highest overall potential, its popularity currently doesn‘t reach the masses like smart
home or wearables do.
6. Smart retail
Proximity-based advertising as a subset of smart retail is starting to take off. But the
popularity ranking shows that it is still a niche segment.
7. Smart farming
Smart farming is an often overlooked business-case for the internet of Things because it does
not really fit into the well-known categories such as health, mobility, or industrial.
FOUR PILLARS OF IOT
Internet of Things (IoT) is defined as an interconnection of objects embedded with sensing,
computing, communication and limited analytical capabilities. The four essential capabilities
are the four pillars of Internet of Things technology.
Things:

• the IoT will include all types of objects, including objects and devices that are not
traditionally connected. In fact, Cisco estimates
• that 99 percent of physical objects will one day be connected.
• These objects contain embedded technology to interact with internal servers and the
external environment.
• These objects are network-capable, and can communicate across a secure,
• reliable and available network platform. However, the IoT refers to a single
technology
• transition; the ability to connect objects that were previously unconnected so those
objects can communicate across the network.
Connecting devices

• For the IoE to function, all of the devices that are part of the intended IoE solution
must be
• connected together so that they can communicate.
There are two ways to connect devices:

• wired or wirelessly.
• The most common types of wireless communication are Wi-Fi, Cellular, Bluetooth,
and near field communication (NFC).
• Some devices, such as smartphones and tablets use a combination of wireless
communication methods to connect to different devices.
Sensors

• Sensors are one way to collect data from non-computers. They convert physical
aspects of our environment into electrical signals that can be processed by computers.
Some examples are soil moisture sensors, air temperature sensors, radiation sensors, and
motion sensors.
DNA of IoT
DNA comprised of three building blocks:
D – Digital Transformation
N – Networks
A – Applications
It’s an utmost important factor to get the mindset ready with their strategy in adopting Digital
Services within the company.
Taking control of your assets utilization and understand how your customer use your products
are very important.
Get ready to transform your new process workflow.
THE TOOLKIT APPROACH FOR END-USER PARTICIPATION IN THE
INTERNET OF THINGS:

• The IoT Toolkit is an open source project to develop a set of tools for building multi-
protocol
• Internet of Things gateways and service gateways that enable horizontal co-operation
• between multiple different protocols and cloud services. The project consists of the
Smart Object API, gateway service, and related tools.
• The foundation of the platform is purely bottom up, based on applying best practices
• and standards in modern web architecture to the problem of interoperability of IoT
data models.
• The IoT Toolkit is a platform to connect applications and a mixture of devices using
• various connected protocols.
• It‘s real power lies in its broader use, where it can span across all of our connected
resources in industry, ranging from commerce, education, transportation,
environment, and us.
• It‘s a horizontal platform intended to drive Internet of Things more widely as an
eventual de facto standard, built for the people who are interested in building out
Internet of Things products and services based on broad interoperability.
MIDDLEWARE FOR IOT: OVERVIEW:
➢ Middleware connects different, often complex and already existing programs that
➢ were not originally designed to be connected.
➢ The essence of the Internet of Things is making it possible for just about anything
(any Thing) to be connected and to communicate data over a network.
➢ Middleware is part of the architecture enabling connectivity for huge numbers of
diverse Things by providing a connectivity layer for sensors and also for the
application layers that provide services that ensure effective communications among
software.
➢ Mulesoft, Oracle, RedHat and WSO2 are among the companies that offer IoT
middleware. These products provide API management as well as basic messaging,
routing and message transformation.
Types of Middleware

• Message Oriented Middleware.


• Object Middleware.
• Remote Procedure Call (RPC) Middleware.
• Database Middleware.
• Transaction Middleware.
• Portals.
• Embedded Middleware.
• Content-Centric Middleware.
Need for middleware
1.Middleware implies the need for integration, transmission and security.
2.These actions could generate alerts or invoke corrective processes before routine issues
snowball into disaster.
3.Middleware is needed for integration before data can be analyzed.
Role of middleware

• IoT middleware deals with the structure, format and encoding of the information that
is being exchanged between different layers, devices and sensors.
• It will act as a common standard amongst the diversity of devices, sensors, OS and
applications that will make up the IoT ecosystem architecture.
COMMUNICATION MIDDLEWARE FOR IOT
A communication middleware framework provides an environment that enables two
applications to set up a conversation and exchange data.
Typically, this exchange of data will involve the triggering of one or more transactions
along the way.
As the next evolutionary step, communication infrastructures encapsulated the technical
complexity of such low-level communication mechanisms by insulating the application
developer from the details of the technical base of the communication.
A communication middleware framework enables you to access a remote application
without knowledge of technical details such as operating systems, lower-level
information of the network protocol, and the physical network address.
A good middleware framework increases the flexibility, interoperability, portability, and
maintainability of distributed applications.
IOT INFORMATION SECURITY:
IoT security is the area of endeavor concerned with safeguarding connected devices and
networks in the Internet of things (IoT). To improve security, an IoT device that needs to be
directly accessible over the Internet, should be segmented into its own network and have
network access restricted.
The Internet of Things (IoT) – Threats and Countermeasures

• Insecure Web Interface.


• Insufficient Authentication/Authorisation.
• Insecure Network Services.
• Lack of Transport Encryption.
• Privacy Concerns.
• Insecure Cloud Interface.
• Insecure Mobile Interface.
• Insufficient Security Configurability.
IoT security has become the subject of scrutiny after a number of high-profile incidents
where a common IoT device was used to infiltrate and attack the larger network.

You might also like