You are on page 1of 78
* Enables communication between internetworking devices and applications Internet of Things * Physical objects communicate through internet finition of | * Internet is a global network of connected servers, computers and mobiles that is governed by standard protocols. Internet of Things + Thing is a word used to refer a physical object, an. action or an activity. s means a network of physical * Internet of T things sending, receiving or communicating information using the internet. * Things become smart and function like living entities by sensing, computing and communicate. Teer aeL mT ey For Example: Face recognition Face mask detection Traffic management Voice recognition Food tap dustbin reesei coi foe ced * Hyperconne y Means use of multiple systems and devices to remain constantly connected to social networks and streams of information. Internet of Things § are devices with computing and communication capabilities that can constantly connect to networks. = Streetlight's monitoring = RFID Smart and Hyper connected Devices ai teet st mela ae Learning Outcome: Describe new technologies which ECM Coll CelSaraliayal coll Technology behind loT * Following entities provide a various IoT technologies: Hardware IDE for developing device software Protocols Communication Network backbone Software Internet eloud platforms / Data Centre Machine Leaming algorithms and software Technology behind loT IDE for developing device software : + Each device has separate IDE environment Protocols: Technology behind loT apraaes auiina Esco) * CoAP (Constrained Application Protocol) + REST (Representational State Transfer) * HTTP (Hyper Text Transfer Protocol) * MOTT (Message Queuing Telemetry Transfer) + XMPP (Extensible Messaging and Presence Protocol) ‘Communication: + Ethernet + RFID * NEC (Near - Field Communication) Technology behind loT 6LowPAN (Low -Power Wireless Personal Area Networks) UWB (Ultra Wide Band) ZigBee (Zonal Intercommunication Global-standard) Bluetooth i Max (Worldwide Interoperability for Microwave Access) 2G3GAG Technology behind loT ‘Network backbone: IPv4 (Internet Protocol Version 4) IPV6 (Internet Protocol Version 6) UDP (User Datagram Protocol) GLowPAN (Low -Power Wireless Personal Area Networks) Software: RIOT OS Contiki OS ‘Thing Square mist firmware Eclipse loT Technology behind loT Internet cloud platforms / Data Centre: + Sense + ThingWorx + Nimbits + Xively + OpenHAB + AWS ToT (Amazon web services) + IBM BlueMix * CISCO loT * Tox and Fog + Were * TCS CUP Machine Learning algorithms and software: + Knime. + Accord.net. + Scikit-Leam. Technology behind loT + TensorFlow. + Weka, + Pytorch. + RapidMiner, * Google Cloud AutoML. Five Levels behind an loT System: + Device Platform + Connecting and Internetworking * Servers & Web services Technology behind loT * Cloud platform to store data * OLTP, OLAP, data analytics, Knowledge discovery Major components of IOT system + Physical bject with embedded software into a hardware, * Hardware consisting of a microcontroller, firmware, sensors, control unit, actuators and communication module. Technology behind loT > canna jon_module: Software consisting of device APIs and device interface for communication aver the network and communication cireuit/pori(s), * Software for actions on messages, information and commands using glowing LEDs, robotic hand movement ete. Microcontroller Interal Pash and Firmware Timers || Programmable 10 Ponts | [ General Purpose 10 Pons | [ Serial 10 Pons PWM ADC | Communication (Pulse Width Modulator) (Analog to Digital Converter) Network Interfaces rons acs noe Sener aoe ve igre Mer Day lo Server for Manage, Acquire, Organise and Analyse Integration, Collaboration and Processes (Involving people and business processes) and Services tion (Reporting, Analysis, Control) Edge Computing Data Analysis Data Abstraction (Aggregation and Access) Data Accumulation (Storage) and Management ‘Connectivity (Communication and Processing Units) Te Device Sofware for Gather Data, Harich apd Commonication Edge Computing (Data Element Analysis and Transformation) ToT device Hardware Physical Devices and Controliers (the Things in to) [Sensors Machines, Devices, Intelligent Edge Nodes of Different Types] Major components of IOT system + Physical bject with embedded software into a hardware, * Hardware consisting of a microcontroller, firmware, sensors, control unit, actuators and communication module. Technology behind loT > canna jon_module: Software consisting of device APIs and device interface for communication aver the network and communication cireuit/pori(s), * Software for actions on messages, information and commands using glowing LEDs, robotic hand movement ete. Elaalla) >a) ){=Io4 Categorise the cto oo) mol Development Sources of loT le of RFID and loT Applicatior RFID enables tracking and inventory control, identification ‘in supply chain systems, access to buildings and road tolls, RFID networks have new applications in factory design, 3PL-management, brand protection, and anti-counterfeiting in mew business processes for payment, leasing, insurance and quality management. Sources of loT Wireless Sensor Networks (WSNs) ‘Sensors can be networked using wireless technology and can ‘cooperatively monitor physical or environmental conditions. ‘Sensors acquite data from remote locations, which may not ‘be easily accessible. Each wireless sensor also has communication abilities for which it uses a radio-frequency ‘transceiver. Sources of loT Wireless Sensor Networks (WSNs) Wireless Sensor Network (WSN) is defined as a network in which each sensor node connects wirelessly and has capabilities of computations for data compaction, aggregation and analysis plus communication and networking, ‘WSN node is autonomous. Internet Connectivity Principles Application Layer Protocols Internet is a global network with a set of connectivity protocols for + Connected devices gateway for sending the data frames of the devices or to the devices. + The data communicate over the network as packets, which communicate through a set of routers at the Internet. | + The devices perform the controlling and monitoring functions using the messages, data-stacks and commands sent through the Internet by the applications, services or business processes. Introducti: Header IP header TCP header Protocol Data Unit (PDU) TCP stream Maximum Transferable Unit (MTU) Packet TP packet Data segment Network interface! Data Flow Graph (DFG) Acyclic Data Flow Graph (ADFG) Directed Acyclic Graph (DAG)| Introduction IP header ‘TCP header Protocol Data Unit (PDU) TCP stream Maximum Transferable Unit — sueceeding lower layer. (MTU) Packet IP packet which are required for processing a received data stack at a layer and which envelopes the data stack of the preceding upper layer before transfer to the Data segment Network interface) Header Introduction 1P heades ————, ‘TCP header Protocol Data Unit (PDU) TCP stream Maximum — Transferable (MTU) Packet TP packet Data segment Network interface) Unit which comprise parameters and_ their encodings as per the IP protocol. IP is Internet layer protocol at the source or dest" a Header IP eae» ————, octet ‘TCP header Protocol Data Unit (PDU) TCP stream Maximum — Transferable (MTU) Packet IP packet Data segment Network interface) Unit Introduction 4 _— icin tans | ee =m [sees (| “Options Introduction Header IP header ‘TCP heads —______.. | Containing parameters whose encoding is Protocol Data Unit (PDU) as per the TCP protocol. TCP is transport TCP stream aes layer protocol at the source or destination. Maximum Transferable Unit (MTU) Packet TP packet Data segment Network interface) Introduction Header IP header TCP header = Protocol Data Unit (PDU) ————— mae Foo] oye eT | TCP stream raw lise (BRIS IS Aa teeter ese Maximum Transferable Unit = (eet Paner (MTU) ani el Packet IP packet i shea Data segment aaa Network interface) Header IP header TCP header TCP stream Maximum — Transferable (MTU) Packet IP packet Data segment Network interface) Introduction Unit Unit of data stack maximum number of bytes, which can be processed at a layer as Introduction Header IP header ‘TCP header Protocol Data Unit (PDU) ‘reste Maximum Transferable Unit (MTU) Packet IP packet Data segment Network interface) sequence of bytes or words in the data stack created at the transport layer that transmits to the destination-end transport layer. Introduction Header q IP header al = =—_ TCP header Protocol Data Unit (PDU) TCP stream Maximum “Transferable “Unit | Unit of data-stack maximum number of aru) bytes, Pack ake which can be transferred from a higher IP packet Banat layer to lower layer or physical network. Network interface) Introduction Header IP header TCP header Protocol Data Unit (PDU) TCP stream Maximum Transferable Unit (MTU) IP packet Data segment Network interface) Set of bytes with a fixed maximum specified size that transfers from network layer and communicates from one router to another, until it reaches at physical, data- link and network layer at the receiver's and Introduction Header IP header TCP header Protocol Data Unit (PDU) TCP stream Maximum Transferable Unit (MTU) Packet TP packet address through the routers to the Eainlengenit _ | destination IP address. IP packet is a data stack, which includes IP header. It communicates from a source IP Network interface! Introduction Header IP header TCP header Protocol Data Unit (PDU) TCP stream Maximum ‘Transferable Unit (MTU) Packet IP packet. ——————___+ Network interface) Data segment refers to data stack from application-support layer for transport. Application data is divided into the segments when its size is more than the transportable limit. Introduction ; Header IP header ‘TCP header Protocol Data Unit (PDU) TCP stream Maximum Transferable Unit (MTU) Packet IP packet Data segment §$——+ Sa treet a Network interface is a system software component or hardware for facilitating communication between two protocol layers/computers/nodes in a network. An interface can be addressed by a unique port number/ socket name/node id. Introducti: Header IP header TCP header Protocol Data Unit (PDU) TCP stream Maximum Transferable Unit (MTU) Packet TP packet Data segment Network interface! Data Flow Graph (DFG) Acyclic Data Flow Graph (ADFG) Directed Acyclic Graph (DAG)| Introduction Port —————_- Portis an interface to the network using Socket Host IP host ‘Subnet a protocol that sends an application layer data stack to the lower layer for transmission. Routing Prefix The port receives the data stack at the Host Identifier Data Flow Graph (DFG) Acyclic Data Flow Graph’ (ADEG) i Directed Acyclic Graph (DAG)) receiver's end from the lower layer. For example, Port 80 is assigned number to HTTP, an application layer protocol. Introduction Port 5 Host IP host ‘Subnet Routing Prefix Host Identifier Data Flow Graph (DFG) Acyclic Data Flow Graph’ (ADEG) i Directed Acyclic Graph (DAG) Socket is a software interface to the network that links to data stack using a port protocol and an IP address, Internet data can be considered as communicating between the sockets. Application data can be considered to flow between the sockets at sender and receiver. Introduction Port Socket ‘Host | Host is a device or node that connects to a TP host network of computers. It provides ‘Subnet information, Routing Prefix i id | |resources, services and applications to the Host Identifier i EP Data Flow Graph (DFG) -Jother nodes on the network. A network Acyclic Data Flow Graph’ layer assigns a host address to each host. (ADF) i Directed Acyclic Graph (DAG)) Introduction Port Socket Host ‘IP host ————————" | IP host is the one that uses the Internet ‘Subnet | protocol suite. An IP host has one or more Routing Prefix i _ [IP addresses for the network interfaces. Host Identifier i Data Flow Graph (DFG) Acyclic Data Flow Graph’ (ADFG) i Directed AcyclicGraph (DAG) — Port Socket Host IP host Routing Prefix Host Identifier Data Flow Graph (DFG) Acyclic Data Flow Graph (ADF) Directed Acyclic Graph (DAG) Introduction Which is logical and visible subdivision of in IP network. Subdivision enables dressing a set of networked computers in the subnet using a common and identical IP address. Port Socket Host IP host Routing Prefix ‘Host Identifier Data Flow Graph (DFG) Acyclic Data Flow Grapl (ADF) Directed Acyclic Graph (DAG) Port Socket Host IP host Subnet Routing Profie Host Iden Data Flow Graph (DFG) Acyclic Data Flow Graph: (ADFG) Directed Acyclic Graph (DAG) Introduction Thirty-two bits IP address can be divided into the msbs consisting of 8, 16 or 24 bits and remaining Isbs. The division results in the | |logical division of an IP address into two | |fields—a network address or routing prefix field and a rest field or host identifier. The rest | |field is an identifier for a specific host or network interface. IP host Subnet ‘Routing Prfis ‘Host Identifier ‘Data Flow Graph (DFG) Acyclic Data Flow Grapt (ADFG) Directed Acyclic Graph (DAG) network interface. Introduction Port Socket Host IP host ‘Subnet Routing Prefix The rest field may also have two sub- Data Flow Graph (DFG) . host identifier. When a network subdivides Acyclic Data Flow Graph (ADF) Directed AcyclicGraph (DAG), hosts. into subnets and subnet has a number of Port Socket Host IP host Subnet Routing Prefix Host Identifier Acyclic Data Flow Graph (ADF) Directed Acyclic Graph (DAG) Introduction A graphical representation using arrows from ‘Data Flow Graph (DEG}——+ ‘jone stage to another. A circle represents a ‘| stage and arrow characterizes the direction of flow of data. Port Socket Host IP host ‘Subnet Routing Prefix Host Identifier Data Flow Graph (DFG) Directed Acyclic Graph (DAG)) Introduction DFG where only one set of inputs generate only one set of outputs for the given input- set in the DFG model. Introduction Port sus @) i CH-ELO - Cs) IP host {(«") ‘Subnet Routing Prefix Host Identifier iin Blow Coup (GQ) ||An ADFG in which none of the output Acyclic Data Flow Graph | ¢yeles back to a previous processing stage (ADFG) or level or rank as an input during data ‘Directed AeyelicGraph(DAG) f1ow Introducti: Header IP header TCP header Protocol Data Unit (PDU) TCP stream Maximum Transferable Unit (MTU) Packet TP packet Data segment Network interface! Data Flow Graph (DFG) Acyclic Data Flow Graph (ADFG) Directed Acyclic Graph (DAG)| Internet connec + Internet connectivity is through a set of routers in a global network of routers which carry data packets as per IP protocol from a source end to another and vice versa, + A source sends data packets to a destination using IETF standardized formats) ‘Source-end IP Address st Application Layer TCP Application Protocole I “Transport Layer TCPAP, Smart Sener Applicaton Framework wnanisaion | —Gareway Contd fs Framework “Application Tnceo I ot rk Cte ‘oxnmunicati Framework Framework Source End IP Address Source-end IP Address IoT Application Layer Smart Sensor 7 TCP/IP Application Protocols set of IP ‘Application routers Framework ‘Transport Layer TCP/AP ——+—_ Gateway Set of IP Routers Network Layer Data “ Destination End IP Address. Consolidation : deere 2 Data-link Layer Set of IP Rouse Physical Layer oT f ommunication) Framework Set of IP Routers Source End IP Address ‘Source-end IP Address st Application Layer TCP Application Protocole I “Transport Layer TCPAP, Smart Sener Applicaton Framework wnanisaion | —Gareway Contd fs Framework “Application Tnceo I ot rk Cte ‘oxnmunicati Framework Framework Source End IP Address Pion Application Layer Protocols + TCP/IP suite consists of a number application layer protocols. + For example, HTTP, HTTPS, FTP, Telnet and others. | Pion Application Layer Protocols + TCP/IP suite consists of a number application layer protocols. + For example, HTTP, HTTPS, FTP, Telnet and others. | Application Layer Protocols It is a protocol used to access the data on the World Wide Web (www), The HTTP protocol can be used to transfer the data in the form of plain text, hypertext, audio, video, and so on, Its efficiency that allows us to use in a hypertext environment where there are rapid jumps from one HTTP is like the FTP as it also transfers the files from one host to another host, But HTTP is simpler than FTP. HTTP is like SMTP as the data ‘transferred between client and server. SMTP: forwarded while HTTP messages are messages are stored and delivered immediately.) Application Layer Protocols Features of HTTP: Port number is 80. HTTP is the standard protocol for requesting a URL defined web-page resource, and for sending a response to the web server. The connection between client and server exist only during the current request and response time only.) Stateless: HTTP is a stateless protocol as both the client and server know each ‘other only during the current request. ‘Due to this nature of the protocol, both the client and server do not retain the information between various requests of the web pages.) Application Layer Protocols Features of HTTP: Port number is 80. HTTP is the standard protocol for requesting a URL defined web-page resource, and for sending a response to the web server. The connection between client and server exist only during the current request and response time only.) Stateless: HTTP is a stateless protocol as both the client and server know each ‘other only during the current request. ‘Due to this nature of the protocol, both the client and server do not retain the information between various requests of the web pages.) Application Layer Protocols = a aa =a A blank tine A blank ine Application Layer Protocols + Status codes add in the response and caching of a resource provided at a server (and proxy). + For example, status code returned as response when 400 means a bad request (the request not responding), + 401 unauthorized request 402 means request requires a payment before response feasible, 403 means request is for a forbidden resource and 404 means URL resource not found by the server.) Application Layer Protocols * A client that wants to access the document in an internet needs an address and to facilitate the access of documents, the HTTP uses the concept of ‘orm — Resource Locator (URL). ‘The URL defines four parts: method, host computer, port, and path.) URL. Uniform Resource Locator (uiteenea)~ (zeal: Uc ial Application Layer Protocols Method: The method is the protocol used to retrieve the document from a server. For example, HTTP. HIGSE The host is the computer where the information is stored, Web pages are mainly stored in the computers and the computers are given an alias name that begins with the characters "www". Application Layer Protocols Port: The URL can also contain the port number of the server, but it's an optional field BBG Path is the pathname of the file where the information is stored. The path itself contain slashes that separate the directories from the subdirectories and files, Application Layer Protocols HTTPS Transfer Protocol Secure. It is highly stands for Hyper Text advanced and secure version of HTTP. It uses the port no. 443 for Data Communication. It allows the secure transactions by encrypting the entire communication with SSL. It is a rambinatinn af S81/TES nrotoral HTTP also allows you to create a secure encrypted connection between the server and the browser. It offers the bi-directional security of Data. This helps you to protect sensitive potentially information from being stolen.) Application Layer Protocols In most cases, sites running over HTTPS will have a redirect in place. Therefore, even if you type in HTTP:// it will redirect to an https over a secured connection It allows users to perform secure e- commerce transaction, such as online banking. SSL technology protects any users and builds trust An independent authority verifies the identity of the certificate owner. So, each SSL Certificate contains unique, authenticated information about the certificate owner. Application Layer Protocols Limitations of HTTPS: HTTPS protocol can't stop stealing confidential information from the pages cached on the browser SSL data can be encrypted only during transmission on the network. So, it can't clear the text in the browser memory HTTPS can increase computational overhead as well as network overhead of the organization —[———— SS pont oe —s natnesco SS ay Application Layer Protocols FTP is a standard internet protocol TCP/IP used for transmitting the files from one host to provided — by another. It is mainly used for transferring, the web page files It is also used for downloading the files to computer from other servers, + It-provides the sharing of files * It is used to encourage the use of remote computers, + It transfers the data more reliably and efficiently. Application Layer Protocols =) Application Layer Protocols + The control connection uses very simple rules for communication. Through control connection, * The control connection remains aaa connected during the —_ entire | exon | interactive FTP session, Application Layer Protocols * The Data Connection uses very complex rules as data types may vary. * The data connection opens when a | exon | command comes for transferring the files and closes when the file is transferred. Application Layer Protocols Advantages: + BBB he FTP is one of the fastest way to transfer the files. + EERBRRE We do not need to complete all the operations to get the entire file, + BRBBBRG To access the FIP server, we need to login with the username and password. + GREE: Send some information to all and they all send information back on the same server. FTP serves two operation , to send and receive large files on a network. It also doesn't allow you to run simultaneous transfers to. multiple receivers. Passwords and file contents are sent in clear text that allows unwanted eavesdropping, It is not compatible with every Application Layer Protocols The main task of the internet is to provide services to users, For example, users want to run different application programs at the remote site and transfers a result to the local site. This requires a client-server program such as FTP, SMTP, But this would not allow us to create a specific program for each demand ‘The better solution is to provide a general client-server program that lets the user access any appli program on a remote computer. ‘Therefore, a program that allows a user to log on to.a remote computer. A Popular client-server program Telnet is used to meet such demands. Telnet is an abbreviation for Terminal Application Layer Protocols There are two types of login: + Local Login + Remote Login} Operating system Application Layer Protocols There are two types of login: + Local Login = Remote Login} Application Layer Protocols cca Unencrypted data exchange * Telnet client is versatile * Full access makes it easier for hackers + Can be used cross-platform ‘Only few servers can be reached via + Unlimited access to target resources Telnet

You might also like