You are on page 1of 40

MODULE 5

Application Layer- Introduction, providing services,


Application layer paradigms, Client server model
Introduction to Internet of Things, Introduction to Sensors,
Actuator, Transducers, Gateway, IOT Architecture
Basi
c
Application layer provides services to
the user, and takes services from
Transport layer.

Communication is provided using a


logical connection.

The actual communication takes place


through several physical devices (Alice,
R2, R4, R5, R7, and
Bob) and channels.

15-01-2018 Dr. Manas Khatua 3


Providing
Services
• Application layer provides services to the user, and takes services from
Transport layer.

• The application layer, however, is somewhat different from other


layers.

• The protocols can be removed from this layer easily as they only
receives services from Transport layer but does not provide any service
to that layer.

• The protocols used in the first four layers of the TCP/IP suite need to
be standardized and documented. So, normally comes with Operating
Systems (OS).

• There are several application-layer protocols that have been


standardized and documented by the Internet authority.
E.g., DHCP, SMTP, FTP, HTTP, TELNET

15-01-2018 Dr. Manas Khatua 4


Popular Applications
• The applications have been the driving force behind the Internet’s success

• 1970s and 1980s: classic text-based applications - text email, remote access
to computers, file transfers, newsgroups.

• mid-1990s: World Wide Web, encompassing Web surfing, search, and


electronic commerce (buying & selling of goods and services).

• end-1990s: instant messaging and P2P file sharing

• Since 2000: voice and video applications, including: voice-over-IP (VoIP) and
video conferencing over IP such as Skype; user-generated video distribution
such as YouTube;.

• Recently: multi-player online games (e.g. World of Warcraft), social


networking applications, such as Facebook and Twitter, and movies on
demand such as Netflix.

15-01-2018 Dr. Manas Khatua 5


Application Architecture
• designed by the application developer

• It dictates how the application is structured over the


various end systems
• What the relationship should be between these two
programs?

• We use two predominant architectural paradigms


– client-server
• there is an always-on host, called the server, which services requests
from many other hosts, called clients.
• Classic example: Web, FTP, Telnet and e-mail.
– Peer-to-peer (P2P)
• the application exploits direct communication between pairs of
intermittently connected hosts, called peers
• Classic example: Internet Telephony (e.g., Skype), file sharing (e.g.,
BitTorrent), and IPTV
15-01-2018 Dr. Manas Khatua 6
Client-Server Paradigm
• Server process runs continuously, waiting for another application
program, called the client process, to make a connection through
the Internet and ask for service.

• The server process must be running all the time;


• the client process starts when the client needs to receive service.

• Several traditional services are still using this paradigm, e.g., WWW,
HTTP, FTP, E-mail, and so on.

• Problems:
– the server should be a powerful computer
– there should be a service provider willing to accept the cost and create
a powerful server for a specific service

15-01-2018 Dr. Manas Khatua 7


Peer-to-Peer Paradigm
• There is no need for a server process to be running all the time and
waiting for the client processes to connect.

• The responsibility is shared between peers.

• E.g.: Internet telephony, BitTorrent, Skype, IPTV

• Advantages:
– easily scalable and cost-effective in eliminating the need for expensive
servers to be running and maintained all the time

• Challenges:
– more difficult to create secure communication between distributed
services

• Few instant messaging application use both client-server and P2P

15-01-2018 Dr. Manas Khatua 9


Client-Server & P2P architectures

15-01-2018 Dr. Manas Khatua 11


Client Server Model:

Two remote application processes in a network can communicate mainly in two different ways:
● Peer-to-peer: Both remote processes are executing at same level and they exchange data using some
shared resource.
● Client-Server: One remote process acts as a Client and requests some resource from another
application process acting as Server.
• Client Server Model:

• The client-server model is a network architecture that describes how servers share
resources and interact with network devices.
• Client/server is a model of interaction in which a program sends a request to another
program and awaits a response.
• The requesting program is called a client; the answering program is called a server.
• Although the client/server model can be used between programs in a single computer,
the term typically refers to a network.

• In client-server model, any process can act as Server or Client. It is not the type of
machine, size of the machine, or its computing power which makes it server; it is the
ability of serving request that makes a machine a server.
The client server relationship communicates in a
request–response messaging pattern and must
adhere to a common communications protocol,
which formally defines the rules, language, and
dialog patterns to be used. Client-server
communication typically adheres to the TCP/IP
protocol suite.
Components of Client Server Model

All client-server frameworks contain three primary ingredients: clients, servers, and the networking devices to connect
the two segments.

Clients
A client is a computer that connects to and uses the resources of a remote computer, or server.
Many corporate networks comprise a client computer for each employee, each of which connects to the corporate
server.
The server provides resources like files, information, Internet and intranet access, and external processing power. In the
case of processing, any work done on the server is referred to as "server-side" work.
Any work done on the local client is similarly called "client-side. "
Servers
A system that provides services to other systems in its network.

There are file servers, boot servers, database servers, license servers, print servers, installation servers, and even
servers for particular applications.

Networking Devices
The framework calls for physical or wireless networking devices like hubs, switches, and routers to connect
servers, clients, and resources.

With the connection between clients and servers established, administrators can configure how client devices
make requests and designate servers to complete specific tasks.
Working of Client-Server Model

An operational client-server architecture facilitates the following process:

1. The client submits a request through a network-enabled device.


2. The network server receives and processes the request.
3. The server delivers a response to the client.

Working of Client - Server Architecture


Examples:

1. Mail Servers: Email servers can be used for sending & receiving emails. Different software allows email handling.

2. File Servers: They are the centralized location for the files. For example, cloud services for Microsoft Office and

Google docs will be accessed from your devices, and files that you save from the computer will be accessed from

your phone. In this way, file stores will be centralized and accessed by multiple clients.

3. Web Servers: These servers will host different websites and these are high-performance computers where websites

get hosted. The client is using, and the web server is a server system, which hosts these websites. The user or client

requests resources or server’s site data through high-speed internet.


Advantages of Client Server Architecture

● Centralized: Centralized back-up is possible in client-server networks, i.e., all the data is stored in a
server.
● Security: These networks are more secure as all the shared resources are centrally administered.
● Performance: The use of the dedicated server increases the speed of sharing resources. This increases the
performance of the overall system.
● Scalability: We can increase the number of clients and servers separately, i.e., the new element can be
added, or we can add a new node in a network at any time.
Disadvantages of Client-Server model:

● Clients are prone to viruses, Trojans and worms if present in the Server or uploaded into the Server.
● Server are prone to Denial of Service (DOS) attacks.
● Data packets may be spoofed or modified during transmission.
● Phishing or capturing login credentials or other useful information of the user are common and MITM(Man in
the Middle) attacks are common.
Introduction to Internet of Things
• The first telemetry system was rolled out in Chicago way back in 1912. It is said to have used telephone lines to
monitor data from power plants.
• Telemetry expanded to weather monitoring in the 1930s, when a device known as a radiosonde became widely
used to monitor weather conditions from balloons.
• In 1957 the Soviet Union launched Sputnik, and with it the Space Race. This has been the entry of aerospace
telemetry that created the basis of our global satellite communications today.

• Broad adoption of Machine 2 Machine technology began in the 1980s with wired
connections for SCADA (supervisory control and data acquisition) on the factory floor and in
home and business security systems.
• In the 1990s, M2M began moving toward wireless technologies. ADEMCO built their own
private radio network to address intrusion and smoke detection because budding cellular
connectivity was too expensive.
• In 1995, Siemens introduced the first cellular module built for M2M.
History of IoT

Introduction to IoT
IoT Definition

Introduction to IoT
SENSORS AND ACTUATORS
Sensor:
Sensor is a device used for the conversion of physical events or characteristics into the
electrical signals. This is a hardware device that takes the input from environment and gives to
the system by converting it.
For example, a thermometer takes the temperature as physical characteristic and then converts it
into electrical signals for the system.
Actuator:
Actuator is a device that converts the electrical signals into the physical events or characteristics.
It takes the input from the system and gives output to the environment.
For example, motors and heaters are some of the commonly used actuators.
IoT Gateway
IoT gateway is a physical device or virtual platform that connects sensors, IoT modules, and smart
devices to the cloud. Gateways serve as a wireless access portal to give IoT devices access to the Internet.
IOT Architecture
In essence, an IoT architecture is the system of numerous elements that range from sensors,
protocols, actuators, to cloud services, and layers. Besides, devices and sensors the Internet of
Things (IoT) architecture layers are distinguished to track the consistency of a system through
protocols and gateway
IoT Architecture

Node Gateway Services


IoT Architecture: node

Sensor

Protocol
Wireless link

Controller, Memory, Power Management


IoT Architecture: Access point

WiFi Ethernet
IoT Architecture: services

Graphing
Machine Learning
Alerting
Network Connectivity
Key aspects when considering network connectivity:
• Range - are you deploying to a single office floor
or an entire city?
• Data Rate - how much bandwidth do you require?
How often does your data change?
• Power - is your sensor running on mains or
battery?
• Frequency - have you considered channel
blocking and signal interference?
• Security - will your sensors be supporting mission
critical applications?
Introduction to IoT
Introduction to IoT Source: http://www.postscapes.com/what-exactly-is-the-internet-of-things-infographic/
• Single Tier or 1-Tier Architecture:
• It is the simplest one as it is equivalent to running the application on the
personal computer. All of the required components for an application to run
are on a single application or server.
• Presentation layer, Business logic layer, and data layer are all located on a
single machine.

• 2-Tier Architecture:
• It is like Client-Server architecture, where communication takes place
between client and server.
• In this type of software architecture, the presentation layer or user interface
layer runs on the client side while dataset layer gets executed and stored on
server side.
• There is no Business logic layer or immediate layer in between client and
server.
• 3-Tier Architecture
• By looking at the below diagram, you can easily identify that 3-tier
architecture has three different layers.
• Presentation layer
• Business Logic layer
• Database layer

You might also like