You are on page 1of 18

Internet of Things (IoTE 540)

L-T-P-[C] 4-0-0-[4]

Outline of the course

Introduction to IoT, need, technologies used in IoT,


benefits of IoTs, IoT Implementation Challenges,
Applications, IoT structure, IoT Components, Working
process of IoT, IoT Networking – IoT Architecture,
Reference model, IoT Service Oriented Architecture,
challenges, Components of internet of things, - Sensor,
Actuator…

IoT Protocols – IEEE 804.14.5, ZigBee, Connectivity


(6LowPAN, RPL), Communication / Transport (Wi-Fi,
Bluetooth, LPWAN), Discovery Protocols (Physical Web,
mDNS, DNS-SD), Data Protocol (MQTT, CoAP, AMQP,
Web Socket, Node), Device Management (TR-069,
OMA-DM), Semantic (JSON-LD, Web Thing Model)

1
Courseware and Reference Books
Text Books:
 Mayur Ramgir, Internet of Things- Architecture, Implementation, and Security, Pearson Education India,
2019.
Reference Books:
1. Raj Kamal, INTERNET OF THINGS Architecture and Design Principles, McGraw Hill Education
(India) Private Limited, 2017.
2. S. Misra, A. Mukherjee, and A. Roy, Introduction to IoT, Cambridge University Press, 2020.
3. S. Misra, C. Roy, and A. Mukerjee, 2020, Introduction to Industrial Internet of Things and Industry 4.0,
CRC Press, 2020
4. Research Papers.

2
Lecture No 7

IoT Networking

Objective:

To discuss the basics of networking aspects of internet


of things.

Question:

Proxy and VPN

Both VPNs and proxies enable a higher degree of


privacy.

A proxy acts as a gateway – it’s ideal for basic functions


like anonymous web browsing and managing (or
circumventing or by-passing) content restrictions.

Proxy servers excel at IP masking and misdirection,


making them good for viewing geographically limited
content.

3
They allow users to bypass content restrictions and
monitoring, or enforce website content restrictions – so
that you can’t log into certain web pages on company
time.

A VPN client on your computer establishes a secure


tunnel with the VPN server, replacing your local ISP
routing.

VPN connections encrypt and secure all of your network


traffic, not just the HTTP or SOCKS calls from your
browser like a proxy server.

VPNs are great when you need to use the Wi-Fi at a local
railway station or coffee shop: using a VPN instead of the
potentially completely unencrypted local Wi-Fi adds
another layer of privacy – who knows who is lurking
(waiting) on that network, just sitting in the corner sipping
coffee and waiting to steal your credit card digits?

4
Proxy and VPN Benefits
The biggest argument to use a VPN instead of a proxy is
the total encryption for all traffic you get with the VPN.

A VPN is more secure than a similarly priced proxy.

VPN providers maintain their own networks and you use


their IP addresses for your connections.

The top VPN providers advertise a logless policy, which


means they don’t have data to provide to anyone about
your browsing habits.

Logless VPNs don't keep a record of their users' activity–at least not with any
personally-identifiable information.

5
Convergence of domains

https://www.researchgate.net/figure/Innovation-Matrix-of-IERC--Internet-of-Things-European-
Research-Cluster_fig2_272943881

Semantic interoperability

 Interoperability remains a significant burden to the


developers of Internet of Things’ Systems.

6
 This is due to the fact that the IoT devices are highly
heterogeneous in terms of underlying
communication protocols, data formats, and
technologies.

 Semantic Interoperability is the exchange of


information with meaningful and understandable
meanings.

 It includes semantics in data by adding self-


described information packages.

 Semantic Interoperability is used to ensure


that IoT devices from different vendors
are interoperable.

7
 For example, let us see that a temperature sensor,
it might be given the data as temp, another
temperature sensor as temperature, another
temperature sensor the third one. So, there has to
be interoperability between all these different
collisions, but they are all different to the same
temperature, right.

 So, this is basically taken care of by things like


semantic interoperability.

Energy Harvesting towards Self-Powered IoT Devices - MDPI


https://www.mdpi.com

 Energy harvesting based on a renewable source is


a promising field that enables IoT devices to
generate electrical energy by absorbing
energy from the environment.

8
 This technology will overcome the replacement and
maintenance of the batteries resulting in more
reliable and long-lasting solution.

 Again there has been lot of research, you know


energy harvesting through different renewable
sources such as wind energy, solar, etc.

 How these can harvest, you know how these


deferent renewable sources from these how energy
can be harvested to power the different nodes and
IoT, these are very small powered you know small
sized nodes with very limited power.

9
 Disruptive innovation for example virtual reality,
augmented reality.

 So, in terms of IoT basic research, there has been


a lot of research on the nanotechnology, the use of
nanotechnology, the use of quantum teleportation.

 Quantum teleportation basically means that how


the different information at the atomic level is sent
from one point to another.

 So, it is transported from one point to another at the


atomic level and nanotechnology, it involves things
like nano IoT, nano nodes, nano networking, and
nano sensor nodes.

10
 That means, at the nanoscale forming a network
which can be for different purposes, nano networks
are used for different purposes in the human, inside
the human body at the molecular level nano
networks can be used.

 So, these are all like you know involvement of these


incorporation into the IoT network, there has been
lot of research on this particular front and things like
cloud big data, these are like sustaining
technologies for IoT.

 Again there has been lot of work on these


technologies as well.

11
IoT architecture

http://jin.ece.ufl.edu/papers/HASS2018_IoT_Survey.pdf

12
 IoT architecture can be conveniently viewed as an
abstraction of several hierarchical layers.

 Three key layers in the abstraction are the application


layer, the network layer, and the perception layer.

 The technologies of each layer are different, even


though the technology used by the device of the same
layer may be heterogeneous.

 The devices and technology in the IoT are used to


provide a diversity of services, each with its own
requirements, constraints, and trade-offs.

 Furthermore, the technologies and devices


themselves are highly heterogeneous.

This makes their management a difficult and complex


enterprise.
13
 To address this challenge, a middleware layer is also
sometimes added to manage different types of
service, shielding the underlying implementation
details.

 The task of the middleware layer is to collect


information from the network layer and store them into
the cloud and database.

 Besides, the middleware layer also provides data


processing ability.

The foundational concept in all these architectures is


supporting data, process, and the functions that
endpoint devices perform.

Two of the best-known architecture are those


supported by oneM2M and the IoT World Forum
(IoTWF).
14
Modified OSI Model for the IoT/M2M Systems

Architectural layers in a modified OSI model for Internet


of smart streetlights application

Gather + Enrich + Stream + (Manage + Acquire +


Organise + Analyse)
= IoT Applications and Services

Modifications are also at the data-link layer 2 (L2) and


physical layer 1 (L1). The new layers are data-adaptation
(new L2) and physical cum data-link (new L1).

The data-adaptation layer includes a gateway.

15
The gateway enables communication between the
devices network and the web.

 L1: It consists of smart sensing and data-link circuits


with each streetlight transferring the sensed data to
L2.

 L2: It consists of a group-controller which receives


data of each group through Bluetooth or ZigBee,
aggregates and compacts the data for
communication to the Internet, and controls the
group streetlights as per the program commands
from a central station.

 L3: It communicates a network stream on the Internet


to the next layer.

 L4: The transport layer does device identity


management, identity registry and data routing to the
next layer
16
 L5: The application-support layer does data
managing, acquiring, organising and analysing, and
functionalities of standard protocols such as CoAP,
UDP and IP.
Constrained Application Protocol (CoAP) is a specialized Internet Application
Protocol for constrained devices, as defined in RFC 7252.

 L6: The application layer enables remote


programming and issue of central station directions
to switch on-off and commands of services to the
controllers along with monitoring each group of
streetlights in the whole city.

17
Summary

We learnt

(i) Difference between Proxy and VPN


(ii) Convergence of Domain
(iii) IoT Architecture

18

You might also like