* Enables communication between
internetworking devices and applications
Internet of Things * Physical objects communicate through
internetfinition of |
* Internet is a global network of connected
servers, computers and mobiles that is governed
by standard protocols.
Internet of Things
+ Thing is a word used to refer a physical object, an.
action or an activity.
s means a network of physical
* Internet of T
things sending, receiving or communicating
information using the internet.* Things become smart and function like living
entities by sensing, computing and communicate.
Teer aeL mT ey For Example:
Face recognition
Face mask detection
Traffic management
Voice recognition
Food tap dustbinreesei coi foe ced
* Hyperconne y Means use of multiple systems
and devices to remain constantly connected to
social networks and streams of information.
Internet of Things
§ are devices with computing and
communication capabilities that can constantly
connect to networks.
= Streetlight's monitoring
= RFIDSmart and Hyper connected Devices
ai teet st mela aeLearning Outcome:
Describe new
technologies which
ECM Coll
CelSaraliayal collTechnology behind loT
* Following entities provide a various IoT
technologies:
Hardware
IDE for developing device software
Protocols
Communication
Network backbone
Software
Internet eloud platforms / Data Centre
Machine Leaming algorithms and softwareTechnology behind loTIDE for developing device software :
+ Each device has separate IDE environment
Protocols:
Technology behind loT apraaes auiina Esco)
* CoAP (Constrained Application Protocol)
+ REST (Representational State Transfer)
* HTTP (Hyper Text Transfer Protocol)
* MOTT (Message Queuing Telemetry Transfer)
+ XMPP (Extensible Messaging and Presence Protocol)‘Communication:
+ Ethernet
+ RFID
* NEC (Near - Field Communication)
Technology behind loT
6LowPAN (Low -Power Wireless Personal Area Networks)
UWB (Ultra Wide Band)
ZigBee (Zonal Intercommunication Global-standard)
Bluetooth
i
Max (Worldwide Interoperability for Microwave Access)
2G3GAGTechnology behind loT
‘Network backbone:
IPv4 (Internet Protocol Version 4)
IPV6 (Internet Protocol Version 6)
UDP (User Datagram Protocol)
GLowPAN (Low -Power Wireless Personal Area Networks)
Software:
RIOT OS
Contiki OS
‘Thing Square mist firmware
Eclipse loTTechnology behind loT
Internet cloud platforms / Data Centre:
+ Sense
+ ThingWorx
+ Nimbits
+ Xively
+ OpenHAB
+ AWS ToT (Amazon web services)
+ IBM BlueMix
* CISCO loT
* Tox and Fog
+ Were
* TCS CUPMachine Learning algorithms and software:
+ Knime.
+ Accord.net.
+ Scikit-Leam.
Technology behind loT + TensorFlow.
+ Weka,
+ Pytorch.
+ RapidMiner,
* Google Cloud AutoML.Five Levels behind an loT System:
+ Device Platform
+ Connecting and Internetworking
* Servers & Web services
Technology behind loT * Cloud platform to store data
* OLTP, OLAP, data analytics, Knowledge discoveryMajor components of IOT system
+ Physical bject with embedded software into a hardware,
* Hardware consisting of a microcontroller, firmware,
sensors, control unit, actuators and communication module.
Technology behind loT > canna
jon_module: Software consisting of device
APIs and device interface for communication aver the
network and communication cireuit/pori(s),
* Software for actions on messages, information and
commands using glowing LEDs, robotic hand movement
ete.Microcontroller
Interal Pash and Firmware
Timers || Programmable 10 Ponts | [ General Purpose 10 Pons | [ Serial 10 Pons
PWM ADC | Communication
(Pulse Width Modulator) (Analog to Digital Converter) Network Interfacesrons acs noe
Sener aoe ve igre Mer Daylo Server for Manage, Acquire, Organise and Analyse
Integration, Collaboration and Processes (Involving people and business processes) and Services
tion (Reporting, Analysis, Control)
Edge Computing
Data Analysis Data Abstraction (Aggregation and Access) Data Accumulation (Storage) and Management
‘Connectivity (Communication and Processing Units)
Te Device Sofware for Gather Data, Harich apd Commonication
Edge Computing (Data Element Analysis and Transformation)
ToT device Hardware
Physical Devices and Controliers (the Things in to)
[Sensors Machines, Devices, Intelligent Edge Nodes of Different Types]Major components of IOT system
+ Physical bject with embedded software into a hardware,
* Hardware consisting of a microcontroller, firmware,
sensors, control unit, actuators and communication module.
Technology behind loT > canna
jon_module: Software consisting of device
APIs and device interface for communication aver the
network and communication cireuit/pori(s),
* Software for actions on messages, information and
commands using glowing LEDs, robotic hand movement
ete.Elaalla) >a) ){=Io4
Categorise the
cto oo) mol
DevelopmentSources of loT
le of RFID and loT Applicatior
RFID enables tracking and inventory control, identification
‘in supply chain systems, access to buildings and road tolls,
RFID networks have new applications in factory design,
3PL-management, brand protection, and anti-counterfeiting
in mew business processes for payment, leasing, insurance
and quality management.Sources of loT
Wireless Sensor Networks (WSNs)
‘Sensors can be networked using wireless technology and can
‘cooperatively monitor physical or environmental conditions.
‘Sensors acquite data from remote locations, which may not
‘be easily accessible. Each wireless sensor also has
communication abilities for which it uses a radio-frequency
‘transceiver.Sources of loT
Wireless Sensor Networks (WSNs)
Wireless Sensor Network (WSN) is defined as a network in
which each sensor node connects wirelessly and has
capabilities of computations for data compaction,
aggregation and analysis plus communication and
networking,
‘WSN node is autonomous.Internet Connectivity Principles
Application Layer
ProtocolsInternet is a global network with a set of
connectivity protocols for
+ Connected devices gateway for
sending the data frames of the
devices or to the devices.
+ The data communicate over the
network as packets, which
communicate through a set of
routers at the Internet. |
+ The devices perform the controlling
and monitoring functions using the
messages, data-stacks and commands
sent through the Internet by the
applications, services or business
processes.Introducti:
Header
IP header
TCP header
Protocol Data Unit (PDU)
TCP stream
Maximum Transferable Unit
(MTU)
Packet
TP packet
Data segment
Network interface!
Data Flow Graph (DFG)
Acyclic Data Flow Graph (ADFG)
Directed Acyclic Graph (DAG)|Introduction
IP header
‘TCP header
Protocol Data Unit (PDU)
TCP stream
Maximum Transferable Unit — sueceeding lower layer.
(MTU)
Packet
IP packet
which are required for processing a
received data stack at a layer and which
envelopes the data stack of the preceding
upper layer before transfer to the
Data segment
Network interface)Header
Introduction
1P heades ————,
‘TCP header
Protocol Data Unit (PDU)
TCP stream
Maximum — Transferable
(MTU)
Packet
TP packet
Data segment
Network interface)
Unit
which comprise parameters and_ their
encodings as per the IP protocol. IP is
Internet layer protocol at the source or
dest"
aHeader
IP eae» ————, octet
‘TCP header
Protocol Data Unit (PDU)
TCP stream
Maximum — Transferable
(MTU)
Packet
IP packet
Data segment
Network interface)
Unit
Introduction
4
_—
icin tans |
ee
=m
[sees
(|
“OptionsIntroduction
Header
IP header
‘TCP heads —______.. | Containing parameters whose encoding is
Protocol Data Unit (PDU) as per the TCP protocol. TCP is transport
TCP stream aes
layer protocol at the source or destination.
Maximum Transferable Unit
(MTU)
Packet
TP packet
Data segment
Network interface)Introduction
Header
IP header
TCP header =
Protocol Data Unit (PDU) —————
mae Foo] oye eT |
TCP stream raw lise (BRIS IS Aa teeter ese
Maximum Transferable Unit = (eet Paner
(MTU) ani
el
Packet
IP packet i shea
Data segment aaa
Network interface)Header
IP header
TCP header
TCP stream
Maximum — Transferable
(MTU)
Packet
IP packet
Data segment
Network interface)
Introduction
Unit
Unit of data stack maximum number of
bytes, which can be processed at a layer asIntroduction
Header
IP header
‘TCP header
Protocol Data Unit (PDU)
‘reste
Maximum Transferable Unit
(MTU)
Packet
IP packet
Data segment
Network interface)
sequence of bytes or words in the data
stack created at the transport layer that
transmits to the destination-end transport
layer.Introduction
Header q
IP header al = =—_
TCP header
Protocol Data Unit (PDU)
TCP stream
Maximum “Transferable “Unit | Unit of data-stack maximum number of
aru) bytes,
Pack
ake which can be transferred from a higher
IP packet
Banat layer to lower layer or physical network.
Network interface)Introduction
Header
IP header
TCP header
Protocol Data Unit (PDU)
TCP stream
Maximum Transferable Unit
(MTU)
IP packet
Data segment
Network interface)
Set of bytes with a fixed maximum
specified size that transfers from network
layer and communicates from one router to
another, until it reaches at physical, data-
link and network layer at the receiver's
andIntroduction
Header
IP header
TCP header
Protocol Data Unit (PDU)
TCP stream
Maximum Transferable Unit
(MTU)
Packet
TP packet address through the routers to the
Eainlengenit _ | destination IP address.
IP packet is a data stack, which includes IP
header. It communicates from a source IP
Network interface!Introduction
Header
IP header
TCP header
Protocol Data Unit (PDU)
TCP stream
Maximum ‘Transferable Unit
(MTU)
Packet
IP packet. ——————___+
Network interface)
Data segment refers to data stack from
application-support layer for transport.
Application data is divided into the
segments when its size is more than the
transportable limit.Introduction ;
Header
IP header
‘TCP header
Protocol Data Unit (PDU)
TCP stream
Maximum Transferable Unit
(MTU)
Packet
IP packet
Data segment §$——+
Sa treet
a
Network interface is a system software
component or hardware for facilitating
communication between two protocol
layers/computers/nodes in a network. An
interface can be addressed by a unique port
number/ socket name/node id.Introducti:
Header
IP header
TCP header
Protocol Data Unit (PDU)
TCP stream
Maximum Transferable Unit
(MTU)
Packet
TP packet
Data segment
Network interface!
Data Flow Graph (DFG)
Acyclic Data Flow Graph (ADFG)
Directed Acyclic Graph (DAG)|Introduction
Port —————_- Portis an interface to the network using
Socket
Host
IP host
‘Subnet
a protocol that sends an application
layer data stack to the lower layer for
transmission.
Routing Prefix The port receives the data stack at the
Host Identifier
Data Flow Graph (DFG)
Acyclic Data Flow Graph’
(ADEG) i
Directed Acyclic Graph (DAG))
receiver's end from the lower layer.
For example, Port 80 is assigned number
to HTTP, an application layer protocol.Introduction
Port 5
Host
IP host
‘Subnet
Routing Prefix
Host Identifier
Data Flow Graph (DFG)
Acyclic Data Flow Graph’
(ADEG) i
Directed Acyclic Graph (DAG)
Socket is a software interface to the
network that links to data stack using a
port protocol and an IP address,
Internet data can be considered as
communicating between the sockets.
Application data can be considered to
flow between the sockets at sender and
receiver.Introduction
Port
Socket
‘Host | Host is a device or node that connects to a
TP host network of computers. It provides
‘Subnet
information,
Routing Prefix i
id | |resources, services and applications to the
Host Identifier i EP
Data Flow Graph (DFG) -Jother nodes on the network. A network
Acyclic Data Flow Graph’ layer assigns a host address to each host.
(ADF) i
Directed Acyclic Graph (DAG))Introduction
Port
Socket
Host
‘IP host ————————" | IP host is the one that uses the Internet
‘Subnet
| protocol suite. An IP host has one or more
Routing Prefix i
_ [IP addresses for the network interfaces.
Host Identifier i
Data Flow Graph (DFG)
Acyclic Data Flow Graph’
(ADFG) i
Directed AcyclicGraph (DAG) —Port
Socket
Host
IP host
Routing Prefix
Host Identifier
Data Flow Graph (DFG)
Acyclic Data Flow Graph
(ADF)
Directed Acyclic Graph (DAG)
Introduction
Which is logical and visible subdivision of
in IP network. Subdivision enables
dressing a set of networked computers
in the subnet using a common and
identical IP address.Port
Socket
Host
IP host
Routing Prefix
‘Host Identifier
Data Flow Graph (DFG)
Acyclic Data Flow Grapl
(ADF)
Directed Acyclic Graph (DAG)Port
Socket
Host
IP host
Subnet
Routing Profie
Host Iden
Data Flow Graph (DFG)
Acyclic Data Flow Graph:
(ADFG)
Directed Acyclic Graph (DAG)
Introduction
Thirty-two bits IP address can be divided into
the msbs consisting of 8, 16 or 24 bits and
remaining Isbs. The division results in the
| |logical division of an IP address into two
| |fields—a network address or routing prefix
field and a rest field or host identifier. The rest
| |field is an identifier for a specific host or
network interface.IP host
Subnet
‘Routing Prfis
‘Host Identifier
‘Data Flow Graph (DFG)
Acyclic Data Flow Grapt
(ADFG)
Directed Acyclic Graph (DAG)
network interface.Introduction
Port
Socket
Host
IP host
‘Subnet
Routing Prefix The rest field may also have two sub-
Data Flow Graph (DFG) .
host identifier. When a network subdivides
Acyclic Data Flow Graph
(ADF)
Directed AcyclicGraph (DAG), hosts.
into subnets and subnet has a number ofPort
Socket
Host
IP host
Subnet
Routing Prefix
Host Identifier
Acyclic Data Flow Graph
(ADF)
Directed Acyclic Graph (DAG)
Introduction
A graphical representation using arrows from
‘Data Flow Graph (DEG}——+
‘jone stage to another. A circle represents a
‘| stage and arrow characterizes the direction of
flow of data.Port
Socket
Host
IP host
‘Subnet
Routing Prefix
Host Identifier
Data Flow Graph (DFG)
Directed Acyclic Graph (DAG))
Introduction
DFG where only one set of inputs generate
only one set of outputs for the given input-
set in the DFG model.Introduction
Port
sus @)
i CH-ELO - Cs)
IP host {(«")
‘Subnet
Routing Prefix
Host Identifier
iin Blow Coup (GQ) ||An ADFG in which none of the output
Acyclic Data Flow Graph | ¢yeles back to a previous processing stage
(ADFG) or level or rank as an input during data
‘Directed AeyelicGraph(DAG) f1owIntroducti:
Header
IP header
TCP header
Protocol Data Unit (PDU)
TCP stream
Maximum Transferable Unit
(MTU)
Packet
TP packet
Data segment
Network interface!
Data Flow Graph (DFG)
Acyclic Data Flow Graph (ADFG)
Directed Acyclic Graph (DAG)|Internet connec
+ Internet connectivity is through a set of routers in a global network of routers which
carry data packets as per IP protocol from a source end to another and vice versa,
+ A source sends data packets to a destination using IETF standardized formats)‘Source-end IP Address
st Application Layer
TCP Application Protocole
I
“Transport Layer TCPAP,
Smart Sener
Applicaton
Framework
wnanisaion | —Gareway
Contd
fs Framework
“Application
Tnceo I
ot
rk Cte
‘oxnmunicati Framework
Framework
Source End IP AddressSource-end IP Address IoT Application Layer
Smart Sensor 7 TCP/IP Application Protocols
set of IP
‘Application routers
Framework
‘Transport Layer TCP/AP
——+—_
Gateway Set of IP
Routers Network Layer
Data “ Destination End IP Address.
Consolidation :
deere 2 Data-link Layer
Set of IP
Rouse Physical Layer
oT f
ommunication)
Framework
Set of IP
Routers
Source End IP Address‘Source-end IP Address
st Application Layer
TCP Application Protocole
I
“Transport Layer TCPAP,
Smart Sener
Applicaton
Framework
wnanisaion | —Gareway
Contd
fs Framework
“Application
Tnceo I
ot
rk Cte
‘oxnmunicati Framework
Framework
Source End IP AddressPion Application Layer Protocols
+ TCP/IP suite consists of a number application layer
protocols.
+ For example, HTTP, HTTPS, FTP, Telnet and others. |Pion Application Layer Protocols
+ TCP/IP suite consists of a number application layer
protocols.
+ For example, HTTP, HTTPS, FTP, Telnet and others. |Application Layer Protocols
It is a protocol used to access the
data on the World Wide Web
(www),
The HTTP protocol can be used to
transfer the data in the form of plain
text, hypertext, audio, video, and so
on,
Its efficiency that allows us to use in
a hypertext environment where
there are rapid jumps from one
HTTP is like the FTP as it also transfers
the files from one host to another host,
But HTTP is simpler than FTP.
HTTP is like SMTP as the data
‘transferred between client and server.
SMTP:
forwarded while HTTP messages are
messages are stored and
delivered immediately.)Application Layer Protocols
Features of HTTP:
Port number is 80.
HTTP is the standard protocol for
requesting a URL defined web-page
resource, and for sending a response
to the web server.
The connection between client and
server exist only during the current
request and response time only.)
Stateless: HTTP is a stateless protocol as
both the client and server know each
‘other only during the current request.
‘Due to this nature of the protocol, both
the client and server do not retain the
information between various requests of
the web pages.)Application Layer Protocols
Features of HTTP:
Port number is 80.
HTTP is the standard protocol for
requesting a URL defined web-page
resource, and for sending a response
to the web server.
The connection between client and
server exist only during the current
request and response time only.)
Stateless: HTTP is a stateless protocol as
both the client and server know each
‘other only during the current request.
‘Due to this nature of the protocol, both
the client and server do not retain the
information between various requests of
the web pages.)Application Layer Protocols
= a aa =a
A blank tine A blank ineApplication Layer Protocols
+ Status codes add in the response and
caching of a resource provided at a
server (and proxy).
+ For example, status code returned as
response when 400 means a bad
request (the request not responding),
+ 401 unauthorized request
402 means request requires a
payment before response feasible,
403 means request is for a forbidden
resource and
404 means URL resource not found
by the server.)Application Layer Protocols
* A client that wants to access the
document in an internet needs an
address and to facilitate the access of
documents, the HTTP uses the
concept of ‘orm — Resource
Locator (URL).
‘The URL defines four parts: method,
host computer, port, and path.)
URL.
Uniform Resource Locator
(uiteenea)~ (zeal: Uc ialApplication Layer Protocols
Method: The method is the protocol
used to retrieve the document from a
server. For example, HTTP.
HIGSE The host is the computer where
the information is stored, Web pages
are mainly stored in the computers and
the computers are given an alias name
that begins with the characters "www".Application Layer Protocols
Port: The URL can also contain the port
number of the server, but it's an
optional field
BBG Path is the pathname of the file
where the information is stored. The
path itself contain slashes that separate
the directories from the subdirectories
and files,Application Layer Protocols
HTTPS
Transfer Protocol Secure. It is highly
stands for Hyper Text
advanced and secure version of
HTTP.
It uses the port no. 443 for Data
Communication.
It allows the secure transactions by
encrypting the entire
communication with SSL. It is a
rambinatinn af S81/TES nrotoral
HTTP also allows you to create a
secure encrypted connection
between the server and the browser.
It offers the bi-directional security of
Data. This helps you to protect
sensitive
potentially information
from being stolen.)Application Layer Protocols
In most cases, sites running over
HTTPS will have a redirect in place.
Therefore, even if you type in
HTTP:// it will redirect to an https
over a secured connection
It allows users to perform secure e-
commerce transaction, such as
online banking.
SSL technology protects any users
and builds trust
An independent authority verifies
the identity of the certificate owner.
So, each SSL Certificate contains
unique, authenticated information
about the certificate owner.Application Layer Protocols
Limitations of HTTPS:
HTTPS protocol can't stop stealing
confidential information from the
pages cached on the browser
SSL data can be encrypted only
during transmission on the network.
So, it can't clear the text in the
browser memory
HTTPS can increase computational
overhead as well as network
overhead of the organization
—[————
SS pont oe —s
natnesco SS ayApplication Layer Protocols
FTP is a standard internet protocol
TCP/IP used for
transmitting the files from one host to
provided — by
another.
It is mainly used for transferring, the
web page files
It is also used for downloading the
files to computer from other servers,
+ It-provides the sharing of files
* It is used to encourage the use of
remote computers,
+ It transfers the data more reliably and
efficiently.Application Layer Protocols
=)Application Layer Protocols
+ The control connection uses very
simple rules for communication.
Through control connection,
* The control connection remains
aaa connected during the —_ entire
| exon | interactive FTP session,Application Layer Protocols
* The Data Connection uses very
complex rules as data types may
vary.
* The data connection opens when a
| exon | command comes for transferring the
files and closes when the file is
transferred.Application Layer Protocols
Advantages:
+ BBB he FTP is one of the fastest way
to transfer the files.
+ EERBRRE We do not need to complete
all the operations to get the entire file,
+ BRBBBRG To access the FIP server, we
need to login with the username and
password.
+ GREE: Send some
information to all and they all send
information back on the same server.
FTP serves two operation
, to
send and receive large files on a
network.
It also doesn't allow you to run
simultaneous transfers to. multiple
receivers.
Passwords and file contents are sent
in clear text that allows unwanted
eavesdropping,
It is
not compatible with everyApplication Layer Protocols
The main task of the internet is to
provide services to users,
For example, users want to run different
application programs at the remote site
and transfers a result to the local site.
This requires a client-server program
such as FTP, SMTP, But this would not
allow us to create a specific program for
each demand
‘The better solution is to provide a
general client-server program that
lets the user access any appli
program on a remote computer.
‘Therefore, a program that allows a
user to log on to.a remote computer.
A
Popular client-server program Telnet
is used to meet such demands. Telnet
is an abbreviation for TerminalApplication Layer Protocols
There are two types of login:
+ Local Login
+ Remote Login}
Operating
systemApplication Layer Protocols
There are two types of login:
+ Local Login
= Remote Login}Application Layer Protocols
cca Unencrypted data exchange
* Telnet client is versatile
* Full access makes it easier for hackers
+ Can be used cross-platform
‘Only few servers can be reached via
+ Unlimited access to target resources
Telnet