You are on page 1of 50

Course: Internet of Things (IoT)

eAcademy.ps Internet of Things


Course: Internet of Things (IoT)

Notes:
• This course is heavily based on the Cisco Networking
Academy course: IoT Fundamentals: Connecting Things
version 2.01. It is recommended to enroll in this course
to gain full access to online materials.
• Parts of this content is copyrighted by Cisco.
• Main changes from original course:
• Removed the business canvas model
• Added a project instead of the hackathon.

eAcademy.ps Internet of Things 2


Course: Internet of Things (IoT)

Session 5
Fog Networks and Cloud Computing

eAcademy.ps Internet of Things


Fog Networks and Cloud Computing

Session Outline

• 5.1 The Role of the Network


• 5.2 Wireless Technologies
• 5.3 Fog and Cloud Services
• 5.4 Big Data
• 5.5 Security Concerns in the IoT
• 5.6 Summary

eAcademy.ps Internet of Things 4


Fog Networks and Cloud Computing

5.1 The Role of the Network

Image by Wilgengebroed on Flickr - Cropped and sign removed from Internet of things signed by the author.jpg, CC BY 2.0,
https://commons.wikimedia.org/w/index.php?curid=32745645

eAcademy.ps Internet of Things 5


Fog Networks and Cloud Computing
The Role of the Network
Network Types
• The path from source to destination can be a single cable or a
collection of networks.
• A Personal Area Network (PAN) is a type of network that usually
spans a few meters around an individual and is often used in IoT.
• A Local Area Network (LAN) is a type of network infrastructure that
spans a small geographical area and is used to connect end devices.
• A LAN is normally a high-speed network under the control of a single
administrative entity.
• LANs often connect machines in the factory plant.
• A Wide Area Network (WAN) is a type of network infrastructure
that spans a wide geographical area and is used to connect LANs.
• A WAN is normally a low-speed network and may include portions
from different Internet Service Providers (ISPs)
• WAN devices have evolved to create Low Power Wide Area
Networks (LPWAN) for use in the IoT.

eAcademy.ps Internet of Things 6


Fog Networks and Cloud Computing
The Role of the Network
Network Devices
• Network devices are devices that
connect to each other through a
network:
• Traditionally: Computers, Phones, etc.
• IoT: House-hold devices, cars, etc.
• An end device is either the source or
destination of a message transmitted
over the network.
• Intermediary devices connect the
individual end devices to the network
and can connect multiple individual
networks to form an internetwork.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
• Network addresses are used to
uniquely identify devices on a network.

eAcademy.ps Internet of Things 7


Fog Networks and Cloud Computing
The Role of the Network
Communication Media
• Network media provide the physical channel over which
the message travels from source to destination.
• Metallic wires within cables -
data is encoded into electrical
impulses

• Glass or plastic fibers (fiber-


optic cable) –
data is encoded as pulses of
light

• Wireless transmission - data is


encoded using radio waves © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 8


Fog Networks and Cloud Computing
The Role of the Network
Network Protocols
• Devices must conform to common protocols before
they can communicate.
• Two very important network protocols are Ethernet
and IP.
• Ethernet rules enable communication between local
devices.
• IP enables communication between remote devices.

© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 9


Fog Networks and Cloud Computing
The Role of the Network
Basic Routing

• Network packets must


often transverse several
networks to get to the
destination.
• Routing is the process of
directing a network
packet to its destination.
• Routers are intermediary
network devices that
perform routing. © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

• Routers use routing protocols to exchange information


about networks and to select the best routing path.

eAcademy.ps Internet of Things 10


Fog Networks and Cloud Computing
The Role of the Network
LANs, WANs and the Internet

• Single router designs


are common in small
office or home office
(SOHO).
• The single router
connects SOHO
devices to the
Internet.
• The single router is
the default gateway
for all SOHO devices.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 11


Fog Networks and Cloud Computing
The Role of the Network
IoT Devices
• IoT Devices are often embedded devices designed to
work in sub-optimal conditions.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 12


Fog Networks and Cloud Computing
The Role of the Network
IoT Protocols
• Because of their restrictions, IoT devices require
specialized protocols to function with low power and
limited connectivity.
• Examples of specialized IoT protocols:
• CoAP (Constrained Application Protocol)
• MQTT (Message Queuing Telemetry Transport)

eAcademy.ps Internet of Things 13


Fog Networks and Cloud Computing
The Role of the Network
CoAP (Constrained Application Protocol)
• CoAP is a protocol intended for resource-constrained IoT
devices and enables them to communicate with the
Internet.
• CoAP Characteristics:
• Works on microcontrollers with as low as 10 KB of RAM and 100
KB of storage space while also providing strong security.
• Based on HTTP and the REST model where resources are
retrieved from a server using URIs/URLs.
• Clients use the well-known methods of GET, PUT, POST, and
DELETE to manipulate these resources.
• Multicast support.
• Low overhead.
• Simplicity.

eAcademy.ps Internet of Things 14


Fog Networks and Cloud Computing
The Role of the Network
MQTT (Message Queuing Telemetry Transport)
• MQTT is a lightweight protocol that is best suited for
systems that rely on low bandwidth connections and
require code with a small footprint.
• MQTT protocols uses the concept of publish-subscribe
communications among nodes:
• Requires the presence of an intermediate node called a message
broker.
• Every source of data must publish the data element on the
broker node indicating to which “topic” the data belongs.
• Nodes interested in receiving data on a specific topic must
subscribe to that topic on the broker.
• Broker will then distribute the messages to interested clients
based on the topic of a message.
• More information about MQTT can be found at
http://mqtt.org/

eAcademy.ps Internet of Things 15


5.2 Wireless Technologies
802.11ax (WiFi 6)
High BW 802.11ac (WiFi 5) 5G
802.11n (WiFi 4)

4G
802.11g
802.11a
3G
802.11b VSAT
Medium BW
2G

ZigBee/
Bluetooth BLE
802.15.4
WBAN
Low BW 802.15.6 WPAN LPWAN
802.15.3
RFID/NFC

Short Range Medium Range Long Range


© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things


Fog Networks and Cloud Computing
Wireless Technologies
New Wireless Technologies

• Wireless connectivity is the biggest growth area.


• New protocols created/updated to support diverse IoT
devices:
• ZigBee
• Bluetooth
• 4G/5G
• LoRaWAN
• Protocols created for short, medium, and wide ranges
• Low-Power Wide-Area Networks (LPWAN) are designed to
support long range communications for low bit rate
devices such as sensors, actuators, and controllers

eAcademy.ps Internet of Things 17


Fog Networks and Cloud Computing
Wireless Technologies
Wireless Technologies Characteristics
• System designers will select the wireless technology based
on the range of coverage, bandwidth requirements,
power consumption, and deployment location.
• The table compares wireless topologies based on these
criteria.

© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 18


Fog Networks and Cloud Computing
Wireless Technologies
ZigBee
• A low-energy, low-power, low-data rate wireless protocol
specification used to create personal area networks.
• Areas of utilization:
• home automation,
• medical device data collection,
• other low-power low-bandwidth needs.
• 250 kbps transfer rate best suited for
intermittent data transmissions.
• The ZigBee specification relies on a main device
called a ZigBee Coordinator that manages all ZigBee client devices.
• The ZigBee Coordinator, is responsible for the creation and maintenance of the ZigBee
network.
• The coordinator can talk to up to eight endpoints or routers in any combination.
• If an endpoint is too far away from the controller, a ZigBee router can be used to
bridge data between the coordinator and the endpoint.

eAcademy.ps Internet of Things 19


Fog Networks and Cloud Computing
Wireless Technologies
ZigBee Topologies

© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 20


Fog Networks and Cloud Computing
Wireless Technologies
ZigBee Application Profile ID
• Every ZigBee data request uses an Application Profile Identification Number.
• Application profile ID numbers - 16-bit numbers that relate to public profiles,
manufacturing profiles, or private profiles.
• Example: home automation public application profile:
• Defines ZigBee networked devices intended for use in the home, such as wall
switches, thermostats, heaters, air conditioners, and keyless entry systems.
• This profile ensures that devices from one manufacturer will interact with
devices from another.
• Private profiles are used for applications where different vendor devices do not
need to interact.

eAcademy.ps Internet of Things 21


Fog Networks and Cloud Computing
Wireless Technologies
Bluetooth
• Wireless protocol used for data communication over short distances (PAN)
• Supported by almost all mobile devices and accessories - the defacto
standard for audio between mobile devices.
• Bluetooth Low Energy (BLE) - very popular because of the smartphone
industry and new applications in healthcare, fitness, and beacons.
• operates in the 2.4 GHz ISM band
• Has a very fast connection rate (milliseconds) and a very high data rate (1 Mbps).
• The BLE device then goes into “sleep mode” until a connection is reestablished –
lengthens the battery life for several years.
• Beacons use BLE technology - positioned on buildings, in
coffee shops, and on light posts to provide location
services.

eAcademy.ps Internet of Things 23


Fog Networks and Cloud Computing
Wireless Technologies
Bluetooth 5
• Bluetooth 5 was announced by the Bluetooth SIG in June 2016.
• Version 5 has four times the range as v4.2 (120m vs 30m)
• Version 5 is twice as fast as earlier versions.
• Version 5 has the ability to transmit audio to two devices at the same
time.
• When operating in low energy mode, Bluetooth 5
achieves an eight-fold increase in data broadcasting
capacity over Bluetooth 4.x. This is very important
for IoT devices which rely on constricted power
sources.
• Bluetooth 5 bandwidth is defined at 2 Mbps but
allows for bandwidth that can be adjusted
depending on the application.

eAcademy.ps Internet of Things 24


Fog Networks and Cloud Computing
Wireless Technologies
Cellular networks
• Cellular-based data networks designed to take advantage of
communications over large geographic areas

1980s 2000s 2020s


(1G) (3G) (5G)

1990s 2010s
(2G) (4G)

eAcademy.ps Internet of Things 25


Fog Networks and Cloud Computing
Wireless Technologies
4G/5G
• High mobility bandwidth (trains and cars) of 4G system is 100 Mbps
• Low mobility (pedestrians and stationary users) of 4G systems is 1 Gbps
• 4G provides support for voice, IP telephony, mobile Internet access,
video calling, gaming services, cloud computing, high-definition mobile
TV, and mobile 3D TV.
• Long Term Evolution (LTE) and WiMAX (IEEE 802.16e) are two popular
4G systems.
• LTE 4G technology release 13e
includes the standardization of
Narrow Band IoT (NB-IoT) - an
LPWAN technology.
• Next Generation Mobile Networks
Alliance defining the standards
and requirements for 5G

© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 26


Fog Networks and Cloud Computing
Wireless Technologies
LoRaWAN
• Wireless technology designed to provide wireless WAN
connections to power constricted devices.
• Targets key requirements of IoT such as secure bi-directional
communication, mobility and localization services.
• Architecture is often an extended star topology in which gateways
relay messages between end-devices and a central network server
is located in the backend.
• Data rates range from 0.3 kbps to 50 kbps
• Security is built into the LoRaWAN standard, implemented in a
multi-layer encryption scheme.
• Unique keys are used in the Application, Network,
and Device layers.
https://www.youtube.com/watch?v=2Y0bMX3TVi0

eAcademy.ps Internet of Things 27


Fog Networks and Cloud Computing

Activities

• Packet Tracer - Explore the Smart Home


• Packet Tracer - Build a Connected Factory Solution
• Packet Tracer - Securing Cloud Services in the IoT

eAcademy.ps Internet of Things 28


Fog Networks and Cloud Computing

Packet Tracer - Explore the Smart Home

© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 29


Fog Networks and Cloud Computing

Packet Tracer - Build a Connected Factory Solution

© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 30


Fog Networks and Cloud Computing

Packet Tracer - Securing Cloud Services in the IoT

© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 31


Fog Networks and Cloud Computing

5.3 Fog and Cloud Services

© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 32


Fog Networks and Cloud Computing
Fog and Cloud Services
Cloud Computing Model
• On-demand access to a shared pool of configurable computing
resources.
• Resources can be made available quickly with minimal
management effort.
• Cloud service providers use data centers for their cloud services
and cloud-based resources.
• “Pay-as-you-go” model treats computing and storage expenses as
a utility.
• Enables access to organizational data and applications anywhere
and at any time.
• Reduces cost for equipment, energy, physical plant requirements,
and personnel training needs.

eAcademy.ps Internet of Things 33


Fog Networks and Cloud Computing
Fog and Cloud Services
Cloud Service Models
• Infrastructure as a Service (IaaS)
• Hardware including servers and other infrastructure
components are supplied by a provider and adjusted on-
demand. The provider handles system maintenance, backups
and continuity planning.
• Platform as a Service (PaaS)
• A provider provides the platform, servers, storage, and OSs
for users to develop and launch applications.
• Mobile PaaS (mPaaS)
• Providers supply development capabilities for mobile
application designers and developers.
• Software as a Service (SaaS)
• Software, such as messaging, IoT data processing, payroll
processing, gaming, and tax preparation is licensed on a
subscription basis and hosted on cloud servers.

eAcademy.ps Internet of Things 34


Fog Networks and Cloud Computing
Fog and Cloud Services
Cloud Services
• Cloud customers have access to a shared pool of
configurable computing resources that can be rapidly
provisioned and released with minimal management
effort.
• Extends functionality of an IoT system: data processing
and storage done in the cloud instead of in the IoT
devices.
• Data and resources - always
available to any device in the
system as long as the device
has Internet connectivity.
• Cloud service providers are
also very serious about
security, ensuring customer
data is kept safe and secure.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 35


Fog Networks and Cloud Computing
Fog and Cloud Services
Cloud Services Examples
• Amazon AWS
• a cloud service that provides cloud-hosted, on-demand
computing as a service.
• IFTTT
• Short for 'If This Then That', IFTTT allows for special resource
URLs to be created and mapped to specific IFTTT actions.
• Zapier
• Similar to IFTTT, Zapier also allows for cloud-based automation.
• Built.io
• Similar to IFTTT and Zapier but offers advanced functionality.
• Webex Teams
• Collaboration suite for teams to create, meet, message, call,
whiteboard, and share, regardless of whether they’re together
or apart - in one continuous workstream before, during, and
after meetings.

eAcademy.ps Internet of Things 36


Fog Networks and Cloud Computing
Fog and Cloud Services
Cloud Services Limitations
• Network Dependency: You need to always have Internet
access to be able to benefit from cloud services.
• Latency: Data has to travel to remote servers before
being able to act upon it.
• Loss of Control: A third party is controlling your data.
• Solving Technical Issues: If technical issues arise you
have to relay on the service provider to solve them.
• Limited Flexibility: You are limited to the features that
are provided by the service provider.
• Security: There have been several incidents of security
issues involving various cloud services.

eAcademy.ps Internet of Things 37


Fog Networks and Cloud Computing
Fog and Cloud Services
Fog Computing Model
• Distributed computing infrastructure closer to the network edge.
• Edge devices run applications locally and make immediate
decisions.
• Reduces the data burden on networks as raw data not sent over
network connections.
• Enhances security - keeping sensitive data from being
transported beyond the edge
where it is needed.
• Fog applications monitor or
analyze real-time data from
network-connected things and
then take action such as
locking a door, changing
equipment settings, applying
the brakes on a train, zooming
in with a video camera.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 38


Fog Networks and Cloud Computing

5.4 Big Data

© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 39


Fog Networks and Cloud Computing
Big Data
Data in Motion and Data at Rest
• Data in motion is a term used to refer to the process of
extracting value from data while it is being generated.
• This data may or may not eventually be stored.
• It is possible to think of data in motion as telling a story
as it happens.
• Data at rest is data that has been stored.

• https://www.youtube.com/watch?v=3C02F-YRsgY

eAcademy.ps Internet of Things 40


Fog Networks and Cloud Computing
Big Data
Data Growth
• Number of sensors and other IoT end devices growing
exponentially and collecting a constant stream of data.
• Consumer behavior is changing; requires anytime,
anywhere, on-demand access. E.g. fitness monitors,
smartphones, medical devices.
• Smart cities and smart
grids, connected trains,
cars – growing in frequency.
• Problems arise in terms
of the requirements for
storage, analysis, and
security.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 41


Fog Networks and Cloud Computing
Big Data
It is all about the Data
• Big data is data that is so vast and complex it is difficult
to store, process, and analyze using traditional data
storage and analytics applications.
• Typically characterized in three dimensions: volume,
velocity, and variety
• Volume - the amount of data being transported and stored.
• Velocity - the rate at which this data is generated.
• Variety - the type of data, which is rarely in a state that is
perfectly ready for processing and analysis.
• Apache Hadoop, Webex Teams, Cassandra, and Kafka –
examples of open source projects dealing with Big Data.

eAcademy.ps Internet of Things 42


Fog Networks and Cloud Computing

5.5 Security Concerns in the IoT

© 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 43


Fog Networks and Cloud Computing
The Role of the Network
Securing the IoT Network

• IoT devices are integrated


into all aspects of daily life.
• IoT applications carry
traceable signatures and
carry confidential data.
• IoT devices must adhere to
a secure framework
(Authentication,
Authorization, Network
Enforced Policy, Secure
Analytics). © 2007 – 2010, Cisco Systems, Inc. All rights reserved.

eAcademy.ps Internet of Things 44


Fog Networks and Cloud Computing
Wireless Technologies
Securing the Wireless Network
• Wireless networks have no clear boundaries.
• Securing wireless communications requires strong encryption,
authentication, and secure protocols.
• Several security protocols exist:
• Wired Equivalent Privacy (WEP)
• Wi-Fi Protected Access (WPA)
• Wi-Fi Protected Access II (WPA2):
• WPA2 uses AES encryption and is more secure than the other protocols.
A pass phrase larger than 21 chars should be used.
• It is recommended that security in the form of data authentication
and encryption is implemented as part of the application using
technologies such as VPNs and TLS/SSL.
• Video highlighting the vulnerability of using an insecure wireless
hotspot in a coffee shop:
https://www.youtube.com/watch?v=mW1LCmASQEQ

eAcademy.ps Internet of Things 45


Fog Networks and Cloud Computing
Security Concerns in the IoT
Data Storage
• IoT devices may store data for a period of time before
sending it out for processing – especially for devices that do
not maintain constant connections to their gateways or
controllers.
• Critical that all IoT storage devices encrypt data for storage
to avoid data tampering or theft.
• Self-encrypting drives have encryption capability built into
the drive controller – encryption and decryption done by
the drive itself, independent of the operating system.
• Self-encrypting flash memory – manufacturers beginning to
release new devices with self-encrypting flash memory.

eAcademy.ps Internet of Things 46


Fog Networks and Cloud Computing
Security Concerns in the IoT
Data Transmission
• If data is not properly secured through encryption, it can be
intercepted, captured or manipulated while in transit.
• Modern encryption algorithms may require more
processing power than what is available in the IoT device.
• As well as physical security, IoT devices must be able to
protect its own firmware and the data it transmits.
• Ensure that IoT devices are running the latest version of
their firmware and protocols.
• Common attack: trick devices into using sub-optimal
security parameters under which the connection can be
exploited.
• Servers, cloud endpoints, intermediary devices should also
be secured and use strong encryption algorithms before
communicating with IoT devices.

eAcademy.ps Internet of Things 47


Software is Everywhere

5.6 Summary
• Personal information related to health, location, wealth, personal
preferences and behaviors is passing through the IoT devices in increasing
volumes. This increase in volume elevates the relevance of increasing the
attention on data privacy and data protection.
• New wireless technologies and protocols, such as ZigBee, Bluetooth,
4G/5G, and LoRaWAN, have been developed to accommodate the
diversity of IoT devices. Wireless technology is selected based on the
range of coverage, bandwidth requirements, power consumption, and
deployment location.
• Wireless security considerations include: selecting a secure protocol,
protection for management frames, identification of frequency jamming,
detecting rogue access points, and using security at the application layer.
• Cloud computing is a service that offers off-premise, on-demand access
to a shared pool of configurable computing resources. Cloud computing
offers services such as IaaS, PaaS, mPaaS and SaaS.
eAcademy.ps Internet of Things 48
Software is Everywhere

5.6 Summary (Cont.)


• A fog computing model identifies a distributed computing
infrastructure closer to the network edge. It enables edge devices to
run applications locally and make immediate decisions.
• The proliferation of devices in the IoT is one of the primary reasons for
the exponential growth in data generation. Data can be deemed at rest
or in motion. Big Data is typically characterized in three dimensions:
volume, velocity, and variety.
• Data stored in servers must be encrypted to avoid data tampering or
theft. Regular backups are mandatory to minimize losses in case of a
disaster
• IoT devices should run the latest version of firmware and protocols and
any communication between devices should be done using protocols
that provide secure encryption by default.

eAcademy.ps Internet of Things 49


Software is Everywhere

References

1. Cisco Networking Academy course: IoT Fundamentals:


Connecting Things version 2.01, Chapter 4.
2. http://mqtt.org/

eAcademy.ps Internet of Things 50


Software is Everywhere

Thank you

eAcademy.ps Internet of Things 51

You might also like