Professional Documents
Culture Documents
• The protocols can be removed from this layer easily as they only
receives services from Transport layer but does not provide any service
to that layer.
• The protocols used in the first four layers of the TCP/IP suite need to
be standardized and documented. So, normally comes with Operating
Systems (OS).
• 1970s and 1980s: classic text-based applications - text email, remote access
to computers, file transfers, newsgroups.
• Since 2000: voice and video applications, including: voice-over-IP (VoIP) and
video conferencing over IP such as Skype; user-generated video distribution
such as YouTube;.
• Several traditional services are still using this paradigm, e.g., WWW,
HTTP, FTP, E-mail, and so on.
• Problems:
– the server should be a powerful computer
– there should be a service provider willing to accept the cost and create
a powerful server for a specific service
• Advantages:
– easily scalable and cost-effective in eliminating the need for expensive
servers to be running and maintained all the time
• Challenges:
– more difficult to create secure communication between distributed
services
Two remote application processes in a network can communicate mainly in two different ways:
● Peer-to-peer: Both remote processes are executing at same level and they exchange data using some
shared resource.
● Client-Server: One remote process acts as a Client and requests some resource from another
application process acting as Server.
• Client Server Model:
• The client-server model is a network architecture that describes how servers share
resources and interact with network devices.
• Client/server is a model of interaction in which a program sends a request to another
program and awaits a response.
• The requesting program is called a client; the answering program is called a server.
• Although the client/server model can be used between programs in a single computer,
the term typically refers to a network.
• In client-server model, any process can act as Server or Client. It is not the type of
machine, size of the machine, or its computing power which makes it server; it is the
ability of serving request that makes a machine a server.
The client server relationship communicates in a
request–response messaging pattern and must
adhere to a common communications protocol,
which formally defines the rules, language, and
dialog patterns to be used. Client-server
communication typically adheres to the TCP/IP
protocol suite.
Components of Client Server Model
All client-server frameworks contain three primary ingredients: clients, servers, and the networking devices to connect
the two segments.
Clients
A client is a computer that connects to and uses the resources of a remote computer, or server.
Many corporate networks comprise a client computer for each employee, each of which connects to the corporate
server.
The server provides resources like files, information, Internet and intranet access, and external processing power. In the
case of processing, any work done on the server is referred to as "server-side" work.
Any work done on the local client is similarly called "client-side. "
Servers
A system that provides services to other systems in its network.
There are file servers, boot servers, database servers, license servers, print servers, installation servers, and even
servers for particular applications.
Networking Devices
The framework calls for physical or wireless networking devices like hubs, switches, and routers to connect
servers, clients, and resources.
With the connection between clients and servers established, administrators can configure how client devices
make requests and designate servers to complete specific tasks.
Working of Client-Server Model
1. Mail Servers: Email servers can be used for sending & receiving emails. Different software allows email handling.
2. File Servers: They are the centralized location for the files. For example, cloud services for Microsoft Office and
Google docs will be accessed from your devices, and files that you save from the computer will be accessed from
your phone. In this way, file stores will be centralized and accessed by multiple clients.
3. Web Servers: These servers will host different websites and these are high-performance computers where websites
get hosted. The client is using, and the web server is a server system, which hosts these websites. The user or client
● Centralized: Centralized back-up is possible in client-server networks, i.e., all the data is stored in a
server.
● Security: These networks are more secure as all the shared resources are centrally administered.
● Performance: The use of the dedicated server increases the speed of sharing resources. This increases the
performance of the overall system.
● Scalability: We can increase the number of clients and servers separately, i.e., the new element can be
added, or we can add a new node in a network at any time.
Disadvantages of Client-Server model:
● Clients are prone to viruses, Trojans and worms if present in the Server or uploaded into the Server.
● Server are prone to Denial of Service (DOS) attacks.
● Data packets may be spoofed or modified during transmission.
● Phishing or capturing login credentials or other useful information of the user are common and MITM(Man in
the Middle) attacks are common.
Introduction to Internet of Things
• The first telemetry system was rolled out in Chicago way back in 1912. It is said to have used telephone lines to
monitor data from power plants.
• Telemetry expanded to weather monitoring in the 1930s, when a device known as a radiosonde became widely
used to monitor weather conditions from balloons.
• In 1957 the Soviet Union launched Sputnik, and with it the Space Race. This has been the entry of aerospace
telemetry that created the basis of our global satellite communications today.
• Broad adoption of Machine 2 Machine technology began in the 1980s with wired
connections for SCADA (supervisory control and data acquisition) on the factory floor and in
home and business security systems.
• In the 1990s, M2M began moving toward wireless technologies. ADEMCO built their own
private radio network to address intrusion and smoke detection because budding cellular
connectivity was too expensive.
• In 1995, Siemens introduced the first cellular module built for M2M.
History of IoT
Introduction to IoT
IoT Definition
Introduction to IoT
SENSORS AND ACTUATORS
Sensor:
Sensor is a device used for the conversion of physical events or characteristics into the
electrical signals. This is a hardware device that takes the input from environment and gives to
the system by converting it.
For example, a thermometer takes the temperature as physical characteristic and then converts it
into electrical signals for the system.
Actuator:
Actuator is a device that converts the electrical signals into the physical events or characteristics.
It takes the input from the system and gives output to the environment.
For example, motors and heaters are some of the commonly used actuators.
IoT Gateway
IoT gateway is a physical device or virtual platform that connects sensors, IoT modules, and smart
devices to the cloud. Gateways serve as a wireless access portal to give IoT devices access to the Internet.
IOT Architecture
In essence, an IoT architecture is the system of numerous elements that range from sensors,
protocols, actuators, to cloud services, and layers. Besides, devices and sensors the Internet of
Things (IoT) architecture layers are distinguished to track the consistency of a system through
protocols and gateway
IoT Architecture
Sensor
Protocol
Wireless link
WiFi Ethernet
IoT Architecture: services
Graphing
Machine Learning
Alerting
Network Connectivity
Key aspects when considering network connectivity:
• Range - are you deploying to a single office floor
or an entire city?
• Data Rate - how much bandwidth do you require?
How often does your data change?
• Power - is your sensor running on mains or
battery?
• Frequency - have you considered channel
blocking and signal interference?
• Security - will your sensors be supporting mission
critical applications?
Introduction to IoT
Introduction to IoT Source: http://www.postscapes.com/what-exactly-is-the-internet-of-things-infographic/
• Single Tier or 1-Tier Architecture:
• It is the simplest one as it is equivalent to running the application on the
personal computer. All of the required components for an application to run
are on a single application or server.
• Presentation layer, Business logic layer, and data layer are all located on a
single machine.
• 2-Tier Architecture:
• It is like Client-Server architecture, where communication takes place
between client and server.
• In this type of software architecture, the presentation layer or user interface
layer runs on the client side while dataset layer gets executed and stored on
server side.
• There is no Business logic layer or immediate layer in between client and
server.
• 3-Tier Architecture
• By looking at the below diagram, you can easily identify that 3-tier
architecture has three different layers.
• Presentation layer
• Business Logic layer
• Database layer