You are on page 1of 142

Advance Networking

Negalign Wake Hundera (Ph.D.)

Researcher at UESTC | Network security Engineer


| Information Security Engineer | Cryptographer |
Cloud Engineer | IoT Cloud Engineer| Cybersecurity
Engineer | Postdoctoral Fellowship at Zhejiang
Normal University

E-mail: nigaccna21@gmail.com
Lecture Outline

• Overview and Introduction to networking


• The network Ecosystem
• The network Architecture
• Ethernet , Wi-Fi and 3G/4G/5G cellular Networks
• Cloud Computing
• Internet of Things
• Network Converging

2
Chapter 1:Element of Modern
Network

What is Networking

What is Computer Networking

What are the Elements of Modern Networking


Chapter 1:Element of Modern
Network
What is Networking

Networking is the exchange of information and ideas among people


with a common profession or special interest, usually in an informal
social setting.

What is Computer Networking


A computer network is a set of devices connected through links. A
node can be computer, printer, or any other device capable of
sending or receiving the data. The links connecting the nodes are
known as communication channels.

Networking facilitates everything from telephone calls to text


messaging to streaming video to the internet of things (IoT).
Interconnecting our Lives
What is a Computer Network?
 Computer Network is a group of computers connected
with each other through wires, optical fibres or optical
links so that various devices can interact with each
other through a network.

 The aim of the computer network is the sharing of


resources among various devices.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Chapter 1:Element of Modern
Network

What are the elements of Modern


Networking
Networks are comprised of four basic elements:
hardware, software, protocols and the
connection medium. All data networks are
comprised of these elements, and cannot
function without them.
Chapter 1:Element of Modern Network
Hardware
The backbone of any network is the hardware that runs it. Network
hardware includes network cards, routers or network switches, modems and
Ethernet repeaters. Without this hardware, computers have no means of
accessing a network.
Software
In order for the hardware to interact with the network, it needs software to
issue commands. The primary form of networking software is protocols --
software that instructs network devices on how to connect to the network and
how to interact with one another.
Connection Media
Without connections, a network cannot function. The medium used to
connect the nodes of a network varies with the type of network.
Interconnecting our Lives
Networking impacts in our daily lives
 Networks Support the Way We Learn

 Networks Support the Way We Communicate

 Networks Support the Way We Work

 Networks Support the Way We Play

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Providing Resources in a Network
Networks of Many Sizes
 In the case of computer network
technology, there are several types of
networks that vary from simple to
complex level.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Providing Resources in a Network
Networks of Many Sizes

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Providing Resources in a Network
Computer Network Architecture
Computer Network Architecture is defined as the
physical and logical design of the software,
hardware, protocols, and media of the
transmission of data. Simply we can say that how
computers are organized and how tasks are
allocated to the computer.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Providing Resources in a Network
Computer Network Architecture
Network architecture refers to a network’s structural and
logical layout. It describes how the network devices are
connected and the rules that govern data transfer between
them.
The two types of network architectures are used:
• Peer-To-Peer network

• Client/Server network

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Providing Resources in a Network
Peer-to-Peer
•Peer-To-Peer network is a network in which all the
computers are linked together with equal privilege and
responsibilities for processing the data.
•Peer-To-Peer network is useful for small environments,
usually up to 10 computers.
•Peer-To-Peer network has no dedicated server.
•Special permissions are assigned to each computer for
sharing the resources, but this can lead to a problem if the
computer with the resource is down.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Providing Resources in a Network
Peer-to-Peer

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Providing Resources in a Network
Peer-to-Peer
Advantages Of Peer-To-Peer Network:
•It is less costly as it does not contain any dedicated server.
•If one computer stops working but, other computers will not
stop working.
•It is easy to set up and maintain as each computer manages
itself.
Disadvantages Of Peer-To-Peer Network:
•In the case of Peer-To-Peer network, it does not contain
the centralized system . Therefore, it cannot back up the
data as the data is different in different locations.
•It has a security issue as the device is managed itself.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
• Client/Server network is a network model designed for the
end users called clients, to access the resources such as
songs, video, etc. from a central computer known as Server.
• The central controller is known as a server while all other
computers in the network are called clients.
• A server performs all the major operations such as
security and network management.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
• A server is responsible for managing all the resources such
as files, directories, printer, etc.
• All the clients communicate with each other through a
server. For example, if client1 wants to send some data to
client 2, then it first sends the request to the server for
the permission. The server sends the response to the
client 1 to initiate its communication with the client 2.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Advantages Of Client/Server network:
• A Client/Server network contains the centralized
system. Therefore we can back up the data easily.
• A Client/Server network has a dedicated server that
improves the overall performance of the whole system.
• Security is better in Client/Server network as a single
server administers the shared resources.
• It also increases the speed of the sharing resources.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Disadvantages Of Client/Server network:
• Client/Server network is expensive as it requires the
server with large memory.
• A server has a Network Operating System(NOS) to
provide the resources to the clients, but the cost of
NOS is very high.
• It requires a dedicated network administrator to
manage all the resources.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
 Devices Equipment that connects to a network,
 Media
the communication channels used to
 Services interconnect nodes on a computer network.

application running at the network


application layer and above

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Components of a Network
Network Representations

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Components of a Network
Topology Diagrams

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Computer Network Architecture

This section introduces two example network


architectures, and with them some of the
networking terminology in common use

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
A Global Network Architecture

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
We begin with an architecture that
could represent an enterprise
network of national or global
extent, or a portion of the Internet
with some of its associated
networks.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
At the center of the figure is an IP backbone,
or core, network, which could represent a
portion of the Internet or an enterprise IP
network. Typically, the backbone consists of
high-performance routers, called core
routers, interconnected with high-volume
optical links.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
an IP backbone are routers that provide
connectivity to external networks and users.
These routers are sometimes referred to as
edge routers or aggregation routers.
An edge router is a specialized router located
at a network boundary that enables an internal
network to connect to external networks. They
are primarily used at two demarcation points:
the wide area network (WAN) and the internet.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
The upper part of Figure depicts a portion of what
might be a large enterprise network. The figure
shows two sections of the network connected via a
private high-speed WAN, with switches
interconnected with optical links. MPLS using IP is
a common switching protocol used for such WANs;
wide-area Ethernet is another option.

Multiprotocol Label Switching (MPLS) enables


Enterprises and Service Providers to build next-
generation intelligent networks that deliver a
wide variety of advanced, value-added services
over a single infrastructure.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
The lower portion of Figure also shows an individual
residential user connected to an Internet service
provider (ISP) through some sort of subscriber
connection. Common examples of such a connection are a
DSL, which provides a high-speed link over telephone
lines and requires a special DSL modem, and a cable TV
facility, which requires a cable modem, or some type of
wireless connection.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
DSL (Digital Subscriber Line) is a modem technology that uses
existing telephone lines to transport high-bandwidth data,
such as multimedia and video, to service subscribers.

Finally, mobile devices, such as smartphones and


tablets, can connect to the Internet through the
public cellular network, which has a high-speed
connection, typically optical, to the Internet.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
A Global Network Architecture

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
A Global Network Architecture

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
enterprises often design their network facilities in a
three-tier hierarchy: access, distribution, and core.

an access network is a local-area network (LAN) or campus-


wide network that consisting of LAN switches (typically
Ethernet switches) and, in larger LANs, IP routers that
provide connectivity among the switches. The access

network supports end user equipment, such as desktop and

laptop computers and mobile devices.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
The distribution network connects access networks with
each other and with the core network. An edge router in
the distribution network connects to an edge router in an
access network to provide connectivity.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
The core network, also referred to as a backbone network,
connects geographically isolated distribution networks as well
as providing access to other networks that are not part of
the enterprise network. Typically, the core network will use
very high-performance routers, high-capacity transmission
lines, and multiple interconnected routers for increased
redundancy and capacity. The core network may also connect
to high-performance, high-capacity servers, such as large
database servers and private cloud facilities.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
A computer network can be categorized by their size. A
computer network is mainly of six types:

1. LAN(Local Area Network)


2. PAN(Personal Area Network)
3. MAN(Metropolitan Area Network)
4. WAN(Wide Area Network)
5. Wireless LAN (WLAN)
6. Storage Area Network (SAN)

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
LANs and WANs
Local Area Networks (LAN)

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
LANs and WANs
Personal Area Networks (PAN)

• Personal Area Network is a network arranged within an individual person,


typically within a range of 10 meters.
• Personal Area Network is used for connecting the computer devices of
personal use is known as Personal Area Network.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
LANs and WANs
Personal Area Networks (PAN)
There are two types of Personal Area Network:

• Wired Personal Area Network


• Wireless Personal Area Network

Wireless Personal Area Network: Wireless Personal Area


Network is developed by simply using wireless technologies
such as WiFi, Bluetooth. It is a low range network.

Wired Personal Area Network: Wired Personal Area Network


is created by using the USB.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
LANs and WANs
Wide Area Networks (WAN)

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
A wireless LAN is a wireless computer
Local Area Network (LAN) network that links two or more devices
using wireless communication to form a
Wide Area Network (WAN). local area network within a limited area
such as a home, school, computer
laboratory, campus, or office building.

Other types of networks include: A metropolitan area network is a


computer network that interconnects
users with computer resources in a
Metropolitan Area Network (MAN) geographic region of the size of a
metropolitan area.
Wireless LAN (WLAN)
A storage area network (SAN) is a
Storage Area Network (SAN) dedicated, independent high-speed
network that interconnects and delivers
shared pools of storage devices to
multiple servers.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Internetwork

An interconnection between public, private, commercial,


industrial, or government computer networks can also be
defined as internetworking.

The Internet is the global system of interconnected


computer networks that uses the Internet Protocol suite
(TCP/IP) to communicate between networks and devices.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
LANs, WANs, and Internets
The Internet

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
The Internet
Intranet and Extranet

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Extranet: An extranet is a communication network based
on the internet protocol such as Transmission Control
protocol and internet protocol. The access to the
extranet is restricted to only those users who have login
credentials.

Intranet: An intranet is a private network based on


the internet protocol such as Transmission Control
protocol and internet protocol. An intranet belongs to
an organization which is only accessible by the
organization's employee or members.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Network convergence refers to the
coexistence of three networks within a
single network: video transmission, a
telephone network and data
communication.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
As networks evolve, we are discovering that there are four
basic characteristics that the underlying architectures
need to address in order to meet user expectations:

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Security
Network allows the security by ensuring that the user has
the right to access the certain files and applications.
Scalability
Scalability means that we can add the new components on
the network. Network must be scalable so that we can
extend the network by adding new devices. But, it decreases the
speed of the connection and data of the transmission speed also decreases, this
increases the chances of error occurring. This problem can be
overcome by using the routing or switching devices.
Reliability
Computer network can use the alternative source for the
data communication in case of any hardware failure.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Reliable Network
Providing (QoS)
Examples of priority decisions for an organization might
include:
Time-sensitive communication - increase priority for services
like telephony or video distribution.
Non time-sensitive communication - decrease priority for web
page retrieval or email.
High importance to organization - increase priority for
production control or business transaction data.
Undesirable communication - decrease priority or block
unwanted activity, like peer-to-peer file sharing or live
entertainment

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Cloud Computing

Customer oriented definition


A storage that helps us to access its services anytime ,
anywhere, with any devices through the internet.

Business oriented definition


It is universal access, scalable services and a new
application services model (pay - as - you – go ).
Cloud Computing

It is the delivery of on-demand computing services


over the Internet on a pay - as - you - go basis.

Example: Gmail, hotmail, Google…etc


Why Cloud Computing
 High pay less scalability  Pay for what you use
 A lot of huge space for thee  Scale- up pay more
server  Scale –down pay less
 Appointee teams for  No server space required
hardware and software  No expert are required
maintenance  Automatic software update
 No automatic software  High flexibility
update  Data can be accessed
 Lack of flexibility remotely
 Data can’t be access  Better security
remotely
 Poor data security
Cloud Computing Application
Cloud computing is applied in almost all the fields like
 Business
 entertainment
 Data storage
 Social network
 Education
 Management
For example Social network

Facebook: It provides social networking sevces. On Fb we


can share photo , video, files and more ….
Twitter
LinkedIn
E.t.c…
Challenges in Cloud Computing

Cloud computing is an emerging technology and has many


challenges in various aspect of information handling.
Some of the challenges are
Challenges in Cloud Computing
Challenges in Cloud Computing

Security and Privacy: They are the main challenge in cloud


computing.
 These challenges can reduced by using security
applications, encrypted file systems, data loss software.
Challenges in Cloud Computing

Interoperability: The application on one platform should be


able to incorporate services from the other platform. This is
known as Interoperability.
• It is becoming possible through web services, but to
develop such web services is complex.
Challenges in Cloud Computing

Portability: The applications running on one cloud platform


can be moved to new cloud platform and it should operate
correctly without making any changes in design, coding.
• The portability is not possible, because each of the cloud
providers uses different standard languages for their
platform.
Challenges in Cloud Computing

Computing Performance: High network bandwidth is


needed for data intensive applications on cloud, this results in
high cost.
• In cloud computing, low bandwidth does not meet the
desired computing performance.
Challenges in Cloud Computing

Computing Performance: High network bandwidth is


needed for data intensive applications on cloud, this results in
high cost.
• In cloud computing, low bandwidth does not meet the
desired computing performance.
Challenges in Cloud Computing

Reliability and Availability: Most of the businesses are


dependent on services provided by third-party, hence it is
mandatory for the cloud systems to be reliable and robust.
Cloud Computing Architecture
Cloud Computing Architecture

The cloud computing architecture is made up of several


interlinked cloud components.
We can broadly divide the cloud architecture into two parts:

 Front End
 Back End
Each of the ends is connected through a network, usually Internet.
The following diagram shows the graphical view of cloud
computing architecture:
Cloud Computing Architecture

 Front End: It refers to the client part of cloud computing system. It

consists of interfaces and applications that are required to access the cloud
computing platforms, Example - Web Browser.

 Back End: It refers to the cloud itself. It consists of all the resources

required to provide cloud computing services.


 It contains of huge data storage, virtual machines, security mechanism,
services, deployment models, servers, etc.
Types of Cloud Computing
Deployment Models

Deployment models define the type of access to the cloud,


i.e., how the cloud is located? Cloud can have any of the four
types of access: Public, Private, Hybrid and Community.
Deployment Models
PUBLIC CLOUD

The Public Cloud allows systems and services to be


easily accessible to the general public.

The IT giants such as Google, Amazon and Microsoft offer


cloud services via Internet.
The Public Cloud Model
Benefits of Public Cloud
The following diagram shows some of those benefits:
Benefits of Public Cloud
Benefits Disadvantages
 Cost Effective  Low Security
 Since public cloud shares same
 In public cloud model, data
resources with large number of
customers it turns out
is hosted off-site and
inexpensive. resources are shared
 Reliability
publicly, therefore does not
 If any of the resources fails, public cloud ensure higher level of
can employ another one. security.
 Flexibility
 The public cloud can smoothly integrate
 Less customizable
with private cloud, which gives
customers a flexible approach.
 Location independence:
 Utility style costing
 High scalability
PRIVATE CLOUD

The Private Cloud allows systems and services to be


accessible within an organization. It offers increased security
because of its private nature.

• It can be managed internally by the organization


itself or by third-party.
The Private Cloud Model
Benefits of Private Cloud
The following diagram shows some of those benefits:
Benefits of Private Cloud
Benefits Disadvantages
 High Security and Privacy  Restricted Area of Operation
 Private cloud operations are not
available to general public and resources  The private cloud is only accessible
are shared from distinct pool of
locally and is very difficult to deploy
resources. Therefore, it ensures high
security and privacy. globally.
 More Control
 High Priced
 The private cloud has more control on its
resources and hardware than public  Purchasing new hardware in order to
cloud because it is accessed only within
an organization. fulfill the demand is a costly transaction.

 Cost and Energy Efficiency  Limited Scalability


 The private cloud resources are not as
cost effective as resources in public  Additional Skills
clouds but they offer more efficiency
than public cloud resources.  In order to maintain cloud deployment,
organization requires skilled expertise.
Hybrid Cloud

Hybrid Cloud is a mixture of public and private cloud.

Non-critical activities are performed using public


cloud while the critical activities are performed using
private cloud.
The Hybrid Cloud Model
Benefits of Hybrid Cloud
The following diagram shows some of those benefits:
Benefits of Hybrid Cloud
Benefits Disadvantages
 Scalability  Networking Issues
 It offers features of both, the public
cloud scalability and the private cloud  Networking becomes complex due to
scalability.
presence of private and public cloud.
 Flexibility
 It offers secure resources and scalable  Security Compliance
public resources.
 Cost Efficiency  It is necessary to ensure that cloud
 Public clouds are more cost effective services are compliant with security
than private ones. Therefore, hybrid policies of the organization.
clouds can be cost saving.
 Security  Infrastructure Dependency
 The private cloud in hybrid cloud  The hybrid cloud model is dependent on
ensures higher degree of security.
internal IT infrastructure, therefore it is
necessary to ensure redundancy across data
centers..
Community Cloud

Community Cloud allows system and services to be

accessible by group of organizations. It shares the


infrastructure between several organizations from a
specific community. It may be managed internally by
organizations or by the third-party.
The Community Cloud Model
Benefits of Hybrid Cloud
The following diagram shows some of those benefits:
Benefits of Community Cloud
Benefits
 Cost Effective
 Community cloud offers same
advantages as that of private cloud at
low cost.

 Sharing Among
Organizations
 Community cloud provides an
infrastructure to share cloud resources
and capabilities among several
organizations.
 Security
 The community cloud is comparatively
more secure than the public cloud but
less secured than the private cloud.
Service Models

Service Models are the reference models on which the Cloud


Computing is based. These can be categorized into three
basic service models as listed below:
Service Models

1.Infrastructure as a Service (IaaS)


2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)
Service Models
Individual Assignment

Please prepare an individual assignment that briefly


demonstrate an understanding of the fundamentals of
Cloud Computing and its architectures. And evaluate the
deployment models, service models and technological
drivers of Cloud Computing and validate their use
Group Assignment

Please prepare a group technical document about the


following topics
1. Green Cloud Computing
2. Edge Computing
3. Cloud Cryptography
4. Big Data and IoT
97
Plan of Presentation
 What is Internet of Things?
 How IoT Works?
 Current Status & Future Prospect of IoT
 Knowledge Management – From Data to Wisdom
 The Future of IoT
 The Potential of IoT
 Few Applications of IoT
 Technological Challenges of IoT
 Criticisms & Controversies of IoT
 References
98
What is IoT?
The Internet of Things (IoT) is the network of physical
objects or "things" embedded with electronics, software,
sensors, and network connectivity, which enables these
objects to collect and exchange data.
IoT allows objects to be sensed and controlled remotely
across existing network infrastructure, creating
opportunities for more direct integration between the
physical world and computer-based systems, and resulting
in improved efficiency, accuracy and economic benefit.

99
"Things," in the IoT sense, can refer to a wide variety
of devices such as heart monitoring implants, biochip
transponders on farm animals, electric clams in coastal
waters, automobiles with built-in sensors, DNA
analysis devices for environmental/food/pathogen
monitoring or field operation devices that assist fire-
fighters in search and rescue operations.
These devices collect useful data with the help of
various existing technologies and then autonomously
flow the data between other devices.
100
History of IoT
The concept of the Internet of Things first became
popular in 1999, through the Auto-ID Center at MIT and
related market-analysis publications. R
Radio-frequency identification (RFID) was seen as a
prerequisite for the IoT at that point. If all objects and
people in daily life were equipped with identifiers,
computers could manage and inventory them. Besides
using RFID, the tagging of things may be achieved through
such technologies as near field communication, barcodes,
QR codes, bluetooth, and digital watermarking.
101
How IoT Works?
Internet of Things is not the result of a single novel
technology; instead, several complementary technical
developments provide capabilities that taken together help
to bridge the gap between the virtual and physical world.
These capabilities include:
 Communication and cooperation
 Addressability
 Identification
 Sensing
 Actuation
 Embedded information processing
 Localization
 User interfaces
102
How IoT Works?

RFID Sensor Smart Tech Nano Tech

To identify To collect To enhance To make the


and track and process the power of smaller and
the data the data to the network smaller
of things detect the by devolving things have
changes in processing the ability to
the physical capabilities to connect and
status of different part interact.
things of the
network.

103
The Structure of IoT
The IoT can be viewed as a gigantic network
consisting of networks of devices and computers
connected through a series of intermediate technologies
where numerous technologies like RFIDs, wireless
connections may act as enablers of this connectivity.

 Tagging Things : Real-time item traceability and addressability


by RFIDs.
 Feeling Things : Sensors act as primary devices to collect data
from the environment.
 Shrinking Things : Miniaturization and Nanotechnology has
provoked the ability of smaller things to interact and connect
within the “things” or “smart devices.”
 Thinking Things : Embedded intelligence in devices through
sensors has formed the network connection to the Internet. It
can make the “things” realizing the intelligent control.
104
Current Status & Future Prospect of IoT

“Change is the only thing permanent in this world”


105
IoT as a Network of Networks:

These networks connected with added security, analytics, and


management capabilities. This will allow IoT to become even
more powerful in what it can help people achieve.
106
The Future of IoT

"The Sky's not the limit. It's only the beginning with IoT."
107
Applications of IoT

"The Ultimate Goal of IOT is to Automate Human Life."


108
Few Applications of IoT
Building and Home automation
Manufacturing
Medical and Healthcare systems
Media
Environmental monitoring
Infrastructure management
Energy management
Transportation
Better quality of life for elderly
... ... ...
You name it, and you will have it in IoT!
109
110
111
112
Sensors in even the holy cow!

In the world of IoT, even the cows will be connected


and monitored. Sensors are implanted in the ears of cattle.
This allows farmers to monitor cows’ health and track their
movements, ensuring a healthier, more plentiful supply of
milk and meat for people to consume. On average, each
cow generates about 200 MB of information per year. 113
Of course, we know nothing remains static, especially
when it comes to the Internet. Initiatives and advances,
such as Cisco‘s Planetary Skin, GE’s Industrial Internet,
HP‘s central nervous system for the earth (CeNSE), and
smart dust, have the potential to add millions—even
billions—of sensors to the Internet.
As cows, water pipes, people, and even shoes, trees,
and animals become connected to IoT, the world has the
potential to become a better place.
“With a trillion sensors embedded in the
environment—all connected by computing systems,
software, and services—it will be possible to hear the
heartbeat of the Earth, impacting human interaction with
the globe as profoundly as the Internet has revolutionized
communication.” - Peter Hartwell, Senior Researcher, HP
Labs.

“How much more IoT can do is only left to your


imagination”
114
Internet of Things is the next stage of the
information revolution and referenced the inter-
connectivity of everything from urban transport to
medical devices to household appliances.
Integration with the Internet implies that devices
will use an IP address as a unique identifier. However,
due to the limited address space of IPv4 (which allows
for 4.3 billion unique addresses), objects in the IoT will
have to use IPv6 to accommodate the extremely large
address space required.
Objects in the IoT will not only be devices with
sensory capabilities, but also provide actuation
capabilities (e.g., bulbs or locks controlled over the
Internet).
115
On the other hand, IoT systems could also be
responsible for performing actions, not just sensing
things. Intelligent shopping systems, for example,
could monitor specific users' purchasing habits in a
store by tracking their specific mobile phones. These
users could then be provided with special offers on
their favourite products, or even location of items that
they need, which their fridge has automatically
conveyed to the phone.

Additional examples of sensing and actuating are


reflected in applications that deal with heat, electricity
and energy management, as well as cruise-assisting
transportation systems. Other applications that the
Internet of Things can provide is enabling extended
home security features and home automation.
116
117
118
119
IoT helps you in LIFE LOGGING 120
TECHNOLOGICAL CHALLENGES OF IoT
At present IoT is faced with many challenges, such as:
 Scalability
 Technological Standardization
 Inter operability
 Discovery
 Software complexity
 Data volumes and interpretation
 Power Supply
 Interaction and short range communication
 Wireless communication
 Fault tolerance
121
122
Network Protocols and
Communications

• Rules of Communication
• Network Protocols and Standards
• Moving Data in the Network
• Summary

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
The Rules
What is Communication?

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
The Rules
Establishing the Rules
Establishing the Rules

An identified sender and receiver


Agreed upon method of communicating (face-to-face,
telephone, letter, photograph)
Common language and grammar
Speed and timing of delivery
Confirmation or acknowledgement requirements

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
The Rules
Message Encoding

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
The Rules
Message Formatting and Encapsulation
Example: Personal letter contains the following elements:
 An identifier of the recipient
 A salutation or greeting
 The message content
 A closing phrase
 An identifier of the sender

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 127
The Rules
Message Delivery Options

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
Protocols
Network Protocols
 How the message is formatted or structured
 The process by which networking devices share information
about pathways with other networks
 How and when error and system messages are passed
between devices
 The setup and termination of data transfer sessions

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
Protocol Suites
TCP/IP Protocol Suite and Communication

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
Reference Models
Comparing the OSI and TCP/IP Models

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Data Encapsulation
Communicating the Messages
 Segmenting message benefits
Different conversations can be interleaved
Increased reliability of network communications

 Segmenting message disadvantage


Increased level of complexity

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
Data Encapsulation
Protocol Data Units (PDUs)
 Data
 Segment
 Packet
 Frame
 Bits

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
Data Encapsulation
Encapsulation

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
Data Encapsulation
De-encapsulation

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
Moving Data in the Network
Accessing Local Resources

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
Accessing Local Resources
Network Addresses & Data Link addresses
 Network Address
Source IP address
Destination IP address

 Data Link Address


Source data link address
Destination data link address

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
Accessing Local Resources
Communicating with Device / Same Network

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
Accessing Local Resources
MAC and IP Addresses

R1
192.168.1.1
11-11-11-11-11-11
ARP
Request
PC1 S1 R1
192.168.1.110
AA-AA-AA-AA-AA-AA

PC2
192.168.1.111
BB-BB-BB-BB-BB-BB

FTP Server
192.168.1.9
CC-CC-CC-CC-CC-CC

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
Accessing Remote Resources
Default Gateway

PC 1 R2
R1 172.16.1.99
192.168.1.110 192.168.1.1
AA-AA-AA-AA-AA-AA 22-22-22-22-22-22
11-11-11-11-11-11

Web Server
172.16.1.99
AB-CD-EF-12-34-56

PC 2 FTP Server
192.168.1.111 192.168.1.9
BB-BB-BB-BB-BB-BB CC-CC-CC-CC-CC-CC

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
Accessing Remote Resources
Communicating Device / Remote Network

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 142

You might also like