Professional Documents
Culture Documents
Unit 1 - Overview of
IoT
08-Mar-20 2
1.1 The Internet of Things: An
What is IoT ? Overview
The Internet of Things (IoT) refers to a system of interrelated, internet-
connected objects that are able to collect and transfer data over a
wireless network without human intervention.
08-Mar-20 3
Are mobile phones/Computer/Laptop Internet of things?
As long as the device is able to connect to the internet and has sensors
that
transmit data, it can be considered an IoT device.
Although your smartphone can do both, it's not an IoT device.
Advantages of IoT
Easy access.
Speed.
Adapting new standards.
Better time management.
Disadvantages of IoT
Data Breach.
Dependence.
Complexity.
To Sum Up (security).
08-Mar-20 5
1.2 The Flavour of the Internet of Things
Example of IoT:
(i) Home Security
The Internet of Things is the key driver behind a completely smart and
secure home.
IoT connects a variety of sensors, alarms, cameras, lights, and microphones
to provide 24/7/365 security—all of which can be controlled from a smart
phone.
08-Mar-20 7
(v) Self-Healing Machines
Relying on arrays of thousands of sensors, artificial intelligence, and
machine
learning, manufacturing equipment can be designed to recognize variances
in its own operation, and correct them, before they turn into problems that
require downtime and repair.
This saves companies time and money and frees up employees who would
normally monitor equipment and undertake maintenance to work on
higher- level tasks.
08-Mar-20 14
IoT Sensor Node Block RFID – Radio-frequency
Diagram identification NFC - Near-Field
Communication WiFi - Wireless
Fidelity
Source: https://www.mouser.in/applications/internet-of-things-block-diagr
08-Mar-20 am/ 15
Sensor Node
A sensor node, also known as a mote (chiefly in North America), is a node in
a sensor network that is capable of performing some processing, gathering
sensory information and communicating with other connected nodes in
the
network.
A mote is a node but a node is not always a mote.
Bill Gates’s famous vision in 1977 of “a computer on every desk and in every
home” and again with the earlier notion of a computer as an astonishingly
expensive and specialised machine, accessible only to universities, some
forward thinking global corporations, and the military.
Technology’s great drivers have initially been fundamental needs, such
as food and water, warmth, safety, and health.
Resources for these things are not always distributed where and when
one might like, technological advances progress with enabling and
controlling the movement of people, their possessions, livestock, and other
resources.
Trade develops as a movement of goods from a place where they are
plentiful and cheap to one where they are rare and valuable.
08-Mar-20 17
Storage is a form of movement in time.
The development of language to communicate technology to others.
Travellers might pass on messages as well as goods and services, and an oral
tradition allows this information to pass through time as well as space.
As technology has progressed, new categories of objects have been
created:
in the electronic age, they have included telephones, radios, televisions,
computers, and smart phones.
A television screen would originally have physically dominated a living
room.
Today’s flat-screen panels more compact, but the technology is so ubiquitous
that a high resolution screen capable of displaying television content can be
embedded into a door frame or a kitchen unit.
Even smaller screens can find their way into music players and mobile
phones.
08-Mar-20
Since, so cheap to produce a general purpose microchip in devices that your18
The cash register at the supermarket may run on Windows, and your video
player may run a version of Apple’s OS X.
Computing power linked on the one hand to electronic sensors and actuators
which interact with the real world and on the other to the Internet.
The rapid sharing and processing of information with services or other
consumers is a huge differentiator.
Modern cars
The computers that exist in modern cars may have myriad sensors to
determine how well the car is running—from oil gauge and tyre pressure to
the internals of your engine.
Computerized brakes may assist the driver when the processor spots
conditions such as the wheels locking or spinning out of control.
The local information will be processed, analysed, and it will be limited to
whatever
08-Mar-20
the car manufacturer has programmed. 19
Car also tracks your location using GPS: this is external (although not
necessarily Internet-related) data.
High-end cars may communicate the location back to a tracking service for
insurance and anti-theft purposes.
The car carries computing equipment that is able to not just passively
consume data but also to have a dialogue with an external service.
The car’s computer is connected to the Internet (regularly or permanently),
it enables services such as responding to traffic conditions in real time by
rerouting around them.
The GPS might already supply such data, but now it can be created in real
time by “social route planning” based on the data aggregated from what
other
connected drivers nearby are doing.
08-Mar-20
Previously internal data gets connected to the Internet, it can be processed,20
There is a real change to an object or appliance when you embed computing
power into it and another real change when you connect that power to
the Internet.
When the Internet moved out of academia and the military, with the first
commercial Internet service providers (ISPs) opening for business in the
late 1980s.
The early adopters of the consumer Internet may have first gone online
with
a computer running an Intel 486 chip, costing around £ 1500, or around
the price of a small car.
A microchip with equivalent power might set you back around £ 0.50, or
the
price of a chocolate bar today.
08-Mar-20
The rapid rise of processing power, and the consequent cost decreases 21
Moore’s law
The rule of thumb, suggested by the co-founder of Intel.
The number of transistors you can fit on a silicon chip will double
every 18 months.
Qualitative Vs Quantitative change.
Manufacturers of electronic products have started to incorporate
general- purpose computer CPUs into their products, from washing machines
to cars, as they have seen that it has become, in many cases, cheaper to do
this than to create custom chips.
The wealth of programming and debugging resources available for
these platforms has made them attractive to hobbyists and the prototyping
market,
leading to the proliferation of the microcontrollers.
Nowadays, Internet connectivity is also cheaper and more
08-Mar-20 22
Wired Ethernet provides a fairly plug-and-play networking experience, but
most home routers today also offer WiFi, which removes the need for
running cables everywhere.
A fixed network connection isn’t readily available, mobile phone
connectivity
is widespread.
The whitespace network are available to use the airspace from the old
analogue TV networks to fill gaps.
Application Programming Interface (API) programming, which allows
other
programs, rather than just users, to interact with and use the services
on offer.
Web services frameworks such as Python and Django or Ruby on Rails allow
easy prototyping of the online component.
08-Mar-20 23
1.5 Enchanted Objects
The best known of Arthur C. Clarke’s “three laws of prediction” states
16-Mar-21 33
Interface Between Layers
The data and network information passing down through the layers of the
sending device and back up through the layers of the receiving device is
made possible by an interface between each pair of adjacent layers.
Each interface defines the information and services a layer must provide
for the layer above it.
Well-defined interfaces and layer functions provide modularity to a
network.
As long as a layer provides the expected services to the layer above it, the
specific implementation of its functions can be modified or replaced without
requiring changes to the surrounding layers.
Organization of Layers
The seven layers can be thought of three subgroups.
Layers 1, 2, and 3 – physical, data link, and network – are the network
support layers.
* They deal with the physical aspects of moving data from one device
to another (such as electrical specifications, physical connections, physical
16-Mar-21 34
addressing, and transport timing and reliability).
Layers 5, 6 and 7 – session, presentation, and application layers can
be
thought of as the user support layers.
* they allow interoperability among unrelated software systems.
Layer 4, the transport layer, links the two subgroups and ensures that what
the lower layers have transmitted is in a form that the upper layer can use.
The upper OSI layers are almost always implemented in software.
Lower layers are the combination of hardware and software, except for the
physical layer, which is mostly hardware.
In Fig. 1.15,
The data portion of a packet at level N-1 carries the whole packet (data and
header and maybe trailer) from level N is called encapsulation; which is
performed for sending operation.
The data portion of a packet at level N-1 carries the whole packet
(data and
header and maybe trailer) to level N is called decapsulation; which
is performed for receiving operation.
A network device have an capability transmit and receive the data in
parallel; since the device support for full-duplex.
Level N-1 is not aware of which part of the encapsulated packet is data and
which part is the header or trailer.
For level N-1, the whole packet coming from level N is treated as one
integral
unit.
Note:
A packet
16-Mar-21 (header and data) at level 7 is encapsulated in a packet at level 6. 37
LAYERS IN THE OSI MODEL
Physical Layer
The physical layer coordinates the functions required to carry a bit over a
physical medium.
It deals with the mechanical and electrical specifications of the interface and
transmission medium.
Also defines the procedures and functions that physical devices and
interfaces have to perform for transmission to occur.
Fig.1.4 shows the position of the physical layer with respect to the
transmission media and the data link layer.
16-Mar-21 39
Data Link
Layer
Data link layer transforms the physical layer, a raw transmission facility, to a reliable
link.
It makes the physical layer appear error-free to the upper-layer (network layer).
Figure 1.5 shows the relationship of the data link layer to the network layer and
physical layers.
16-Mar-21
Figure 1.6 Hop-to-hop 41
delivery
Fig. 1.6
Communication at the data link layer occurs between two adjacent nodes.
To send data from A to F, three partial deliveries are made.
First, the data link layer at A sends a frame to the data link layer at B (a
router).
Second, the data link layer at B sends a new frame to the data link
layer at E.
Finally, the data link layer at E sends a new frame to the data link layer
at F.
Note:
The frames are exchanged between the three nodes have different values in the
Frame from A to B - B Destination address & A Source
headers.
> Frame from B to E address. E Destination address & B Source
-> Frame from E to F address. F Destination address & E Source
The values
-> of the trailers can also be different if error checking includes the
address.
header of the frame.
16-Mar-21 42
Network
Layer
Network layer is responsible for the source-to-destination (point of origin to its final
destination) delivery of a packet possibly across multiple networks (links).
If two systems are connected to the same link, there is usually no need for a
network-layer.
If two systems are attached to different networks (links) with connecting
devices
between the networks (links), the network layer is needed for to accomplish
source-to-
destination delivery.
Figure 1.7 shows the relationship of the network layer to the data link layer and
transport layers.
16-Mar-21
Figure 1.7 Network 43
layer
Other responsibilities of the network layer include the
following:
Logical addressing
The network layer adds a header to the packet coming from the upper
layer, which includes the logical addresses of the sender and receiver.
Routing
When independent networks or links are connected to create
internetworks (networks of networks) or a large network, the connecting
devices (called routers or switches) route or switch the packets to their final
destination.
Fig. 1.8
The network layer at end system A sends the packet to the network layer
at
Intermediate system B.
When the packet arrives at router B, the router makes a decision based
on the final destination F of the packet.
Router B uses its routing table to find that the next hop is router E.
16-Mar-21 44
The network layer at B, sends the packet to the network layer at E.
Fig. 1.8 illustrates end-to-end delivery by the network layer.
16-Mar-21
Figure 1.11 Session 48
layer
Other responsibilities of the session layer include the following:
Dialog control (allows two systems to enter into a dialog).
Synchronization (add checkpoints, or synchronization points, to
a stream of data).
E.g.,
16-Mar-21 49
Presentation
Layer
Presentation layer is concerned with the syntax and semantics of the
information exchanged between two systems.
Fig. 1.12 shows the relationship between the presentation layer and the
application and session layers.
16-Mar-21
Figure 1.13 Application layer 52
Fig. 1.13 show the relationship of the application layer to the user and the
presentation layer.
Among many services, few services are:
X.400 (message-handling services).
X.500 (directory services).
File transfer, access and management (FTAM).
16-Mar-21 53
Summary of
Layers
Hierarchical
Hierarchical means that each upper-level protocol is supported
by
one or more lower-level protocols.
Note:
The OSI model specifies which functions belong to each of its layers.
TCP/IP protocol suite contain relatively independent protocols that can be
mixed and matched depending on the needs of the system.
16-Mar-21 57
Physical and Data Link Layers
16-Mar-21 59
Address Resolution Protocol (ARP)
ARP is used to associate a logical address with a physical address.
ARP finds the physical address of the node when its Internet address is
known.
On a typical physical network, such as LAN, each device on a link is
identified
by a physical or station address, usually imprinted on the network
interface
card (NIC).
Reverse Address Resolution Protocol (RARP)
RARP allows host to discover its internet address when it knows only
its
physical address.
RARP is used when a computer is connected to a network for the first time
or when a diskless computer is booted.
Internet Control Message Protocol (ICMP)
16-Mar-21 60
ICMP mechanism is used by the hosts and gateways to send notification of
Internet Group Message Protocol
(IGMP)
IGMP is used to facilitate the simultaneous transmission of a message to
a group of recipients.
Note:
Transport Layer
16-Mar-21 61
User Datagram Protocol (UDP)
UDP is a process-to-process protocol that adds only port address,
checksum, error control, and length information to the data from the upper
layer.