You are on page 1of 61

Unit 2

IOT Metwork

1.1
DATA COMMUNICATIONS

Communication means exchange of Information


between two objects. The object can be humans,
computer to computer, computer to printer, acessimg
some information by using internet. The word data refers
to information presented in whatever form is agreed
upon by the parties creating and using the data. Data
communications are the exchange of data between two
devices via some form of transmission medium such as a
wire cable.
Criteria of Effectiveness of Data Communication
Delivery:
Data must arrive at the correct destination.
Data only arrive at the right destination.

Accuracy:
Data must be correct without any error.

Timeliness:
Data must be delivered in timely manner

Jitter:
Variation in the data arrival time at the detonation

Different applications have different requirements on these criteria


Figure 1.1 Five components of data communication

• Message
• Sender
• Receiver
• Transmission medium
• Protocol
Data Representation: Text

 ASCII code: includes definitions for 128 characters


 33 are non-printing control characters (now mostly
obsolete) that affect how text and space is processed
 95 printable characters, including the space

 Unicode: current prevalent coding system for text


 32 bits to represent a symbol or char in any language in
the world
 First 127 characters are ASCII code
 Details can be found at Appendix A in the textbook

1.5
Data flow (simplex, half-duplex, and full-duplex)
Data Flow Examples

 Simplex mode
 Keyboard, mouse, traditional monitor
 GPS device

 Half duplex
 Walkie-talkie
 Citizen band radio
 Advantage: entire bandwidth can be used for
transmission
 Cons: not suitable for high interactive application
 Full duplex
1-2 NETWORKS

A network is a set of devices (often referred to as nodes)


connected by communication links. A node can be a
computer, printer, or any other device capable of sending
and/or receiving data generated by other nodes on the
network.

1.8
Communication Devices: Examples
Non-common communication devices
Common communication devices

Bluetooth watches

switch

Wireless router Bluetooth alarm clock


Network Criteria

• Performance:
• Throughput: average rate of successful
message delivery
• Delay
• Other criteria
• Reliability: frequency of failure, recover time,
robustness
• Security
• becoming more important now

1.10
Figure 1.3 Types of connections: point-to-point and multipoint

Whether the link capacity is shared or not

1.11
Figure 1.4 Categories of topology

1.12
Figure 1.5 A fully connected mesh topology (five devices)

3
1

4
5 n(n-1) half-duplex links
n(n-1)/2 duplex links

Pro: robustness
Con: many cabling/installation and need many I/O ports on nodes

1.13
Figure 1.6 A star topology connecting four stations

Example: Ethernet switch/hub, Wifi access point


Pro: robust against a node’s failure or a link failure
Con: single point of failure at the hub

1.14
Figure 1.7 A bus topology connecting three stations

Example: first generation Ethernet that using cable for wiring


Con: any tap device failure will cause the whole system fail

1.15
Figure 1.8 A ring topology connecting six stations

Example: IBM token ring LAN (less popular now).

1.16
Figure 1.9 A hybrid topology: a star backbone with three bus networks

1.17
Categories of Networks

Categories of
Networks

Local Area Metropolitan Wide Area


Networks Area Networks Networks
(LAN) (MAN) (WAN)

IEEE 802.3 High-speed DSL


Frame Relay
IEEE 802.4 Cable TV
ATM
IEEE 802.5 network

1.18
Figure 1.10 An isolated LAN connecting 12 computers to a hub in a closet

1.19
Figure 1.11 WANs: a switched WAN and a point-to-point WAN

1.20
Figure 1.12 A heterogeneous network made of four WANs and two LANs

1.21
1-3 THE INTERNET

Internet: Interconnection of Networks

Before Internet:
 Many isolated Local Area Networks (LANs) existed
 Those LANs had very different hardware and network
protocols
 Protocol example: TCP/IP, IPX (from Novell)

Topics discussed in this section:


A Brief History
The Internet Today (ISPs-Internet Service Providers)

1.22
A Brief History

1961: Kleinrock - queueing theory shows effectiveness of


packet-switching
1964: Baran - packet-switching in military nets
1967: ARPAnet conceived by Advanced Research Projects
Agency
1969: first ARPAnet node operational
1972:
ARPAnet demonstrated publicly
NCP (Network Control Protocol) first host-host
protocol
first e-mail program
ARPAnet has 15 nodes

1.23
Figure 1.13 Hierarchical organization of the Internet now

1.24
OSI (Open Systems Interconnection)
Reference Model
Internet Protocol (IP)

The Internet Protocol is responsible for


 Addressing host interfaces,
 Encapsulating data into datagrams
(including fragmentation and reassembly)
 Routing datagrams from a source host
interface to a destination host interface
across one or more IP networks. 
 The Internet Protocol defines the format of
packets and provides an addressing
system.
IP Packet Format or IP Header

Datagram
• Version — Indicates the version of IP currently
used. IP v4 or IP v6 -> IP4 or IP6.
IP4:32 Bits, 4.29×109 address space
IP6: 28 Bits, 3.4×1038 address space
• IP Header Length (IHL) – 4 Bit — Indicates the
datagram header length in 32-bit words
• Priority and Type of Service – specifies how the
datagram should be handled. The first 3 bits are
the priority bits.
• Total length – the length of the entire packet
(header + data). The minimum length is 20 bytes,
and the maximum is 65,535 bytes.
• Identification – used to differentiate fragmented
packets from different datagrams.
• Flags – used to control or identify fragments.
• Fragmented offset – used for fragmentation
and reassembly if the packet is too large to
put in a frame.
• Time to live – limits a datagram’s lifetime. If
the packet doesn’t get to its destination before
the TTL expires, it is discarded.
• Protocol – defines the protocol used in the
data portion of the IP datagram. For example,
TCP is represented by the number 6 and UDP
by 17.
• Header checksum – used for error-
checking of the header. If a packet arrives at
a router and the router calculates a different
checksum than the one specified in this
field, the packet will be discarded.
• Source IP address – the IP address of the
host that sent the packet.
• Destination IP address – the IP address of
the host that should receive the packet.
• Options – used for network testing,
debugging, security, and more. This field is
usually empty.
• Video Link – 1. https://youtu.be/xtrWSWbEYWE?t=129
• 2. https://youtu.be/7Zf203Vmbig?t=3
IP Addressing

• Provide unique address for nodes in network.


• 32 bit word grouped in to 4 group of 8 bits.
• Formation www.xxxx.yyyy.zzzz is called as dotted
decimal notation.
• Valid addresses can range from 0.0.0.0 to
255.255.255.255
• Theoretically, a total of » 4.3 billion addresses are
available since 232 = 4,294,967,29610.
• Each address consists of two parts
• The network address.
• The host address.
IP Address Classes
• IP addressing supports five different address
classes: A, B,C, D, and E.
• Only classes A, B, and C are available for
commercial use.
• The left-most (high-order) bits indicate the
network class.
• Selection of class depend on number of nodes or
hosts and networks required
Class A IP Address
• Format: N.H.H.H N -> Network and H -> Host
• Identified by first bit is always ‘0’ 1-126 i.e.
00000000 to 01111111.
• Also represented as No. Bits for Network/No. Bits
for Hosts – 7/24
• Rage of IP address 1.0.0.0 to 126.0.0.0
• Total 127 network ID available.
• 0 can not be used as Net ID and 127 is reserved
for loop back functions 126 Different Networks
16.777.214 Hosts per Network
Decimal
128 64 32 16 8 4 2 1
Number

0 0 0 0 0 0 0 0 0

0 1 1 1 1 1 1 1 127

So total 127 Network and


Total 1,67,77,214 Hosts Available
1 address is reserve for broadcast
Address and 1 for Network so 1,67,77,212
Host can be connected
Class B IP Address

• Format: N.N.H.H N -> Network and H -> Host


• Identified by first two bit is always ‘1 0’ i.e. Total
128- 191 network ID available.
• Also represented as No. Bits for Network/No. Bits
for Hosts – 14/16
• Range of address: 128.1.0.0 to 191.254.0.0
• 14 higher bits are for Network Id and 16 lower bits
are for Host ID
• Address Range is 128.1.0.0 to 191.254.0.0
Deci
12 12 mal
64 32 16 8 4 2 1 64 32 16 8 4 2 1
8 8 Num
ber

1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 128

191.2
1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1
55

So total 127 Network and


Total 65,536 Hosts Available
1 address is reserve for broadcast
Address and 1 for Network
Class C IP Address
• Format: N.N.N.H N -> Network and H -> Host
• Identified by first bit is always 110.
• Total 2,097152 (221) network ID and 256 Host ID
are available.
• Also represented as No. Bits for Network/No. Bits
for Hosts – 22/8
• IP address range: 192.0.1.0 to 223.255.254.0
• 21 higher bits are for Network Id and 8 lower bits
are for Host ID
Class D and E are Reserve and their start bits
are 1110 and 1111 respectively

Subnetwork:
• In a big network it will be always
beneficia; to divide network in small
network for better administration and
service.
• It also help network administrator to
identify location of host.
Subnet Mask:
• When computer or any device is on network
using IP n/w has an IP address is in two
pieces
• The client or host address
• Server or Network address
• Let us say 165.125.10.10 is an address of
particular host. Which include host as well
as network ID. This address is of class B.
• Subnet mask is a 32 bit number which is
obtained by setting host bits to ‘0’ and
network bits to ‘1’
• The subnet mask for class A, B, C are
• Class A: 255.0.0.0
• Class B: 255.255.0.0
• Class C:255.255.255.0
Sub-networking
IP networks can be divided into smaller networks
called subnetworks (or subnets).
Subnetting provides the network administrator with
several benefits, including extra flexibility, more
efficient use of network addresses, and the capability
to contain broadcast traffic (a broadcast will not
cross a router).
Subnets are under local administration. As such, the
outside world sees an organization as a single
network and has no detailed knowledge of the
organization’s internal structure.
A given network address can be broken up into many
subnetworks, e.g. 72.16.1.0, 172.16.2.0, 172.16.3.0,
and 172.16.4.0 are all subnets within network
171.16.0.0. (All 0s in the host portion of an address
specifies the entire network.)

Subnet Mask:
A subnet address is created by “borrowing” bits
from the host field.
Designating them as the subnet field.
The number of borrowed bits varies and is
specified by the subnet mask field.
The subnet mask has binary 1’s in all bits
specifying the network and subnetwork fields,
and binary 0’s in all bits specifying the host field
Determination of Network ID
Machine to Machine- M2M
• M2M systems began with use of data transmission
systems by the Russian army in 1845.
• It was the most basic form of a wired data transfer
network.
• It was followed by the invention of two-way radio
networks in the 1900s.
• The technology fast moved from telephone lines to
weather balloons to aerospace telemetry through the
mid-90s. 
• It was the most basic form of a wired data transfer
network. It was followed by the invention of two-way
radio networks in the 1900s. The technology fast
moved from telephone lines to weather balloons to
aerospace telemetry through the mid-90s. 
• M2M is the foundation of the sophisticated device
connectivity that we enjoy today.
• An M2M connection is a point-to-point connection
between two network devices that allows them to
transmit information via public networking
technologies such as Ethernet and cellular
networks.
• Sensor telemetry is one of the original uses of
M2M communication. For decades, businesses
have used M2M to remotely monitor factors like
temperature, energy consumption, moisture,
pressure and more through sensors. 
• ATMs offer another great example of M2M
technology.
• The ATM’s internal computer is constantly
communicating with a host processor that
routes transactions to the appropriate banks
and accounts.
• The banks then send back approval codes
through the host processor, allowing
transactions to be completed. 
• What makes this an example of M2M
technology is that the entire transaction
happens remotely and without any need for a
human operator on the bank’s side.
• Machines communicate smoothly, efficiently and
automatically, allowing transactions to be authorized
in seconds.
• M2M technology has a decades-long track record of
improving the world’s ability to communicate and
execute transactions effectively across long distances
and in real time. 
M2M Architecture
M2M ecosystem is organized in a 3 – Layer
model
1. Network Service Layer –Provide by the Network Service
Provider
2. M2M Service Layer – Based on IP and provide by M2M
service Provider – key focus on standardization of M2M
communication
3. Application Layer: Provided by application Service
Provider catering to End User Applications

Ref: Technical Report M2M Gateway and Architecture TEC-TR-S&D – M2M-001-01, Department of Telecommunication,
Ministry of Communications and Information Technology
M2M Architecture Model
• Device:
• sensors, actuators, etc.
• Generating information (content, data) pertaining
to the environment which is the field of observation
or some actuations without human intervention.
• They generally communicate with a Gateway
entity to send the sensed/informed or receive
commands to perform some actions.
• Gateway:
• Entities which are responsible to aggregate the
device information and provide them to the
Platform.
• It is also responsible to communicate the
commands received from the Platform to the
devices.
• Platform:
• Represents some common set of services which
perform control, application support and
management functions in a M2M service
environment. e.g.,
Device management – Firmware Upgrade, Wireless
signal strength optimization, configuration of device
without human interference
Service management, Location management,
Discovery, Application Routing, Security,
Charging, Service Exposure APIs, etc.
• The platform shall support services which cater
to different vertical applications (Home, Health,
Industrial Automation, Transport, Power, etc.)
• Head-end Applications: It represents the end
user applications for the concerned use cases
of respective verticals (Home, Health, Industrial
Automation, Transport, Power, etc.).
• Underlying Network: It represents entities
which provide network related services. (E.g.
PAN, IP-CAN, Charging, Device triggering,
location, etc.)
Physical interfaces in the General M2M Network
Architecture framework can be represented as:
• IDG: It facilitates interactions between the
Device and the Gateway.
• IGP: It facilitates interactions between the
Gateway and the Platform. This is IP based
communication.
• IGG: It facilitates interactions between two
Gateways. This is IP based communication.
• IPA: It facilitates interactions between the Platform
and the Application. This is IP based
communication.
• IPP: It facilitates interactions between two Platforms.
Also facilitate interactions between different M2M
service providers. This is IP based communication.
• IMN: It facilitates interactions between the M2M
layer and the Underlying network.
• The Device and Gateway domain entities may have
more than one type of underlying network
connectivity which can be used for communication
with the Platform.
• The underlying networks may provide common
services like location, charging, device triggering,
• The Device and Gateway domain entities may
have more than one type of underlying network
connectivity which can be used for
communication with the Platform.
• The underlying networks may provide common
services like location, charging, device triggering,
etc to the M2M layer and will utilize the respective
interfaces defined in 3GPP, IETF, etc.
Communication Protocol Used

Between M2M nodes within M2M area network


• ZigBee
• Bluetooth
• ModBus
• M-Bus
• Power-Line Communcation
• 6LowPAN
• IEEE 802.15.4 -
low-rate wireless personal area networks
 (LR-WPANs)

• To communicate between remote M2M local


area network M2M gateways are used
Difference between M2M and IOT
• Communication Protocols
• M2M and IoT can differ in how the communication
between the machines or devices happens.
• M2M uses either proprietary or non-IP based
communication protocols for communication
within the M2M area networks.
• Machines in M2M vs Things in IoT
• The "Things" in IoT refers to physical objects that
have unique identifiers and can sense and
communicate with their external environment (and
user applications) or their internal physical states.
• M2M systems, in contrast to IoT, typically have
homogeneous machine types within an M2M area
network.
• Hardware vs Software Emphasis-
• emphasis of M2M is more on hardware with
embedded modules,
• emphasis of IoT is more on software.
• Data Collection & Analysis-
• M2M data is collected in point solutions and often in
on-premises storage infrastructure.
• In contrast to M2M, the data in IoT is collected in the
cloud (can be public, private or hybrid cloud).
• Applications
• • M2M data is collected in point solutions and can be
accessed by on-premises applications such as
• diagnosis applications,
• service management applications,
• onpremisis
• enterprise applications.
• IoT data is collected in the cloud and can be
accessed by cloud applications such as
• analytics applications, enterprise applications,
remote diagnosis and managementapplications,
etc.

You might also like