Introduction to IoT (Basics of Networking & Emergence of IoT).pptx
3,020 views
95 slides
Feb 13, 2024
Slide 1 of 95
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
About This Presentation
Basics of Networking: Introduction, Network Types, Layered network models.
Emergence of IoT: Introduction, Evolution of IoT, Enabling IoT and the Complex Interdependence of Technologies, IoT Networking Components.
Size: 5.8 MB
Language: en
Added: Feb 13, 2024
Slides: 95 pages
Slide Content
Introduction to Internet of Things (IoT) Department of Robotics & Automation JSS Academy of Technical Education, Bangalore-560060 (Course Code: 22ETC15H)
Books Sudip Misra , Anandarup Mukherjee, Arijit Roy, “Introduction to IoT”, Cambridge University Press 2021. Reference S. Misra , C. Roy, and A. Mukherjee, 2020. Introduction to Industrial Internet of Things and Industry 4.0. CRC Press. Vijay Madisetti and Arshdeep Bahga , “Internet of Things (A Hands-on-Approach)”,1st Edition, VPT, 2014. Francis daCosta , “Rethinking the Internet of Things: A Scalable Approach to Connecting Everything”, 1st Edition, Apress Publications, 2013. https://onlinecourses.nptel.ac.in/noc22_cs53/preview Further Learning National Programme on Technology Enhanced Learning ( NPTEL )
Course Learning Objectives Understand about the fundamentals of IoT and its building blocks along with their characteristics. Understand the recent application domains of IoT in everyday life. Gain insights about the current trends of Associated IoT technologies and IoT Analytics
Course outcome (Course Skill Set) CO1: Describe the evolution of IoT, IoT networking components, and addressing strategies in IoT. CO2: Classify various sensing devices and actuator types. CO3: Demonstrate the processing in IoT. CO4: Explain Associated IoT Technologies. CO5: Illustrate architecture of IoT Applications. At the end of the course, students will be able to,
Continuous Internal Evaluation (CIE) Two Unit Tests each of 30 Marks (duration 01 hour ) Two assignments each of 20 Marks The sum of two tests, two assignments , will be out of 100 marks and will be scaled down to 50 marks.
Semester End Examination(SEE) The question paper shall be set for 100 marks. The duration of SEE is 03 hours. The question paper will have 10 questions . 2 questions per module . Each question is set for 20 marks . The students have to answer 5 full questions , selecting one full question from each module. The student has to answer for 100 marks and marks scored out of 100 shall be proportionally reduced to 50 marks .
Internet of Things CHAPTER 1: Basics of Networking
Basics of Networking: Introduction, Network Types, Layered network models. Emergence of IoT: Introduction, Evolution of IoT, Enabling IoT and the Complex Interdependence of Technologies, IoT Networking Components. Reference Textbook1: Chapter 1- 1.1 to 1.3 Chapter 4 – 4.1 to 4.4 Module 1
Learning Outcomes Understand the basic principles of computer networking List the basic terminologies and technologies Relate new concepts of IoT with the basics of networking Discuss various network configurations and topologies Explain various OSI (open systems interconnections) and TCP/IP (transmission control protocol/Internet protocol) layers and their associated uses Describe basics of network addressing
Introduction-IOT IoT known as the Internet of things. It is the way of connecting the physical objects through the internet to other devices . Kevin Ashton gave the term internet of things, in the year 1999. Internet of things means when things or objects are connected to the Internet than people . The things in IoT are defined as objects that can be the person or automobile with a built-in sensor having IP addresses with the ability to collect and transfer the data over the Internet . Kevin Ashton (born 1968) is a British technology pioneer who cofounded the Auto-ID Center at the Massachusetts Institute of Technology (MIT), which created a global standard system for RFID and other sensors. He is known for coining the term "the Internet of Things “ to describe a system where the Internet is connected to the physical world via sensors
Introduction-IOT A Thing in the IoT can be a person with a heart monitor implant , a farm animal with a biochip transponder , an automobile that has built-in sensors to alert the driver when tire pressure is low or any other natural or man-made object that can be assigned an IP address and is able to transfer data over a network
Why IOT? Organizations in a variety of industries are using IoT to operate more efficiently , better understand customers to deliver enhanced customer service , improve decision-making and increase the value of the business
How does IoT work? An IoT ecosystem consists of web-enabled smart devices that use embedded systems , such as processors, sensors and communication hardware , to collect, send and act on data they acquire from their environments . IoT devices share the sensor data they collect by connecting to an IoT gateway where data is either sent to the cloud to be analysed or analysed locally . Sometimes, these devices communicate with other related devices and act on the information they receive . The devices do most of the work without human intervention , although people can interact with the devices -- for instance, to set them up , give them instructions or access the data .
How does IoT work? E xample of an IoT system
I oT Lifecycle Devices & Sensors e.g. H ome Car Office, etc., S end Data / Information over network e .g. Cloud platform D ata center Visualizing the data Build reports Communicate with other machine (m2m) Send notification ( sms , email etc.,)
Applications of IOT
Applications of IOT
Introduction In the present era of data and information centric operations , right from agriculture to military operations relies heavily on information. The quality of any information depends on variety and strength of the data that generates the information. Additionally, the speed at which data is updated to all members of a team dictates the advantage that the team has over others The present-day global scale of operations of various organizations the speed and nature of information are crucial for maintaining an edge over others. To sum it up, today’s world relies heavily on data and networking , which allows for the instant availability of information from anywhere on the earth at any moment .
Networking refers to the linking of computers and communication network devices (referred to as hosts), which interconnect through a network ( Internet or Intranet ) and are separated by unique device identifiers (Internet protocol, IP addresses and MAC addresses ). These hosts may be connected by a single path or through multiple paths for sending and receiving data . The data transferred between the hosts may be text, images, or videos, which are in the form of binary . Networking
Network Types Computer networks are classified according to various parameters: Type of connection Physical topology Reach of the network These classifications are helpful in deciding the requirements of a network setup and provide insights into the appropriate selection of a network type for the setup .
Network Types 1. Connection types Depending on the way a host communicates with other hosts, computer networks are; Point-to-point Point-to-multipoint. Point-to-multipoint
Network Types 1. Connection types Point-to-point Point-to-point connections are used to establish direct connections between two hosts . Example : Remote control for an AC or TV. These networks were designed to work over duplex links and are functional for both synchronous as well as asynchronous systems .
Network Types 1. Connection types 2. Point-to-multipoint In a point-to-multipoint connection, more than two hosts share the same link. Point-to-multipoint connections: popular use in wireless networks and IP telephony . The channel is shared between the various hosts, either spatially or temporally. Spatial sharing of the channel is frequency division multiple access (FDMA). Temporal sharing of channels includes time division multiple access (TDMA). Each of the spectral and temporal sharing approaches has various schemes and protocols for channel sharing in point-to-multipoint networks.
2. Physical topology Network Types Depending on the physical manner in which communication paths between the hosts are connected, computer networks can have the following four broad topologies Star Mesh Bus Ring
2. Physical topology Network Types Star Mesh Bus Ring
1. STAR Topology Network Types In star topology, every host has a point-to-point link to a central controller or hub. The hosts cannot communicate with one another directly , they can only do through the central hub. The hub acts as the network traffic exchange . For large-scale systems , hub, has to be a powerful server to handle all the traffic . As there are fewer links (only one link per host), this topology is cheaper and easier to set up . Easy installation and ease of fault identification within the network. Link failures between a host and the hub do not effect on the network, except for the host that is affected. Disadvantages If the hub fails, the whole network fails. Advantages
2. MESH Topology Network Types Every host is connected to every other host using a dedicated link (in a point-to-point manner). This implies that for n hosts in a mesh, there are a total of n (n-1)=2 dedicated full duplex links between the hosts. This massive number of links makes the mesh topology expensive. Robustness and Resilience of the system. If a link is down , the network is still fully functional . Security and Privacy : Data is only seen by the intended recipients and not by all members of the network. Reduced data load on a single host, as every host in this network takes care of its traffic load. Disadvantages Owing to the complexities in forming physical connections and the cost of establishing these links , mesh networks are used very selectively, such as in backbone networks. Advantages
3. BUS Topology Network Types Bus topology uses a single cable which connects all the included nodes. The main cable acts as a spine / backbone for the entire network. One of the computers in the network acts as the computer server . The hosts are connected to the main bus employing drop lines or taps . Ease of installation . Cost of the cable is very less as compared to other topology Disadvantages Difficulty in fault localization within the network. Advantages
4. RING Topology Network Types Ring topology is a computer network configuration where the devices are connected to each other in a circular form / closed loop. Every device/node is connected to exactly two other nodes one on either side of it in closed loop fashion . Each packet is sent around the ring until it reaches its final destination. Ease of installation . Cost of the cable is very less as compared to other topology Disadvantages Expensive, difficult to install and manage. High probability of a single point of failure & If one repeater fails, the whole network goes down. Advantages
Table 1.1 Network topology comparison
Network reachability
Network reachability PAN (Personal Area Network) The PAN, used for interconnecting the devices which are centred on a person’s workspace . This Network provides data transmission among devices such as computers, smartphones, tablets , personal digital assistants, Printers, wireless headphones etc., PANs are wireless networks, which make use of low-range and low-power technologies such as Bluetooth. The reachability of PANs lies in the range of a few cm to a few meters.
Network reachability LAN (Local Area Network) The LAN is a computer network which interconnects the computer within the limited area such as a residence, school laboratory, university campus or office building. LAN spans a relatively small area . LANs range from 100 Mbps to 1000 Mbps, with very high fault-tolerance levels. Commonly used network components in a LAN are servers, hubs, routers, switches, terminals, and computers.
Network reachability MAN (Metropolitan Area Network) The MAN is a computer network which is similar to the LAN but spans an entire city or campus. Example of a MAN is an Internet service provider (ISP) supplying Internet connectivity to various organizations within a city. Typical networking devices/components in MANs are modems and cables. MANs tend to have moderate fault tolerance levels.
Network reachability WAN (Wide Area Network) WANs typically connect diverse geographic locations . WAN is the telecommunication network which extends over the large geographical area for the primary purpose of computer networking . Typically, WANs connecting two LANs or MANs may use public switched telephone networks (PSTNs) or satellite-based links. Due to the long transmission ranges , WANs tend to have more errors and noise during transmission and are very costly to maintain . Also, WAN have Low fault tolerance .
Layered Network Model The intercommunication between hosts in any computer network , is built upon the premise of various task-specific layers. Two of the most commonly accepted and used traditional layered network models are the open systems interconnection (OSI) developed by the International Organization for Standardization (ISO-OSI) reference model and the Internet protocol suite.
Layered Network Model O SI Model The purpose of OSI model is to facilitate communication between different systems without requiring changes to the logic of the underlying hardware & Software.
OSI Model OSI stands for Open Systems Interconnection . Developed by ISO in the year 1984. It is a 7 layer architecture with each layer having specific functionality to perform . All these 7 layers work collaboratively to transmit the data from one person to another across the globe.
OSI Model Device A Device B
OSI Model
Layered network models The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual physical connection between the devices. The physical layer contains information in the form of bits . It is responsible for transmitting individual bits from one node to the next. When receiving data , this layer will get the signal received and convert it into 0s and 1s and send them to the Data Link layer, which will put the frame back together. 1. Physical Layer (Layer 1):
Layered network models The data link layer is responsible for the node-to-node delivery of the message. Main function of this layer is to make sure data transfer is error-free from one node to another, over the physical layer. When a packet arrives in a network, it is the responsibility of DLL to transmit it to the Host using its MAC address . 2. Data Link Layer (Layer 2): *Packet in Data Link layer is referred to as Frame.
Layered network models Data Link Layer is divided into two sublayers: Logical Link Control (LLC) Media Access Control (MAC) MAC is responsible for access control and permissions for connecting networked devices ; LLC is mainly tasked with error checking , flow control , and frame synchronization. 2. Data Link Layer (Layer 2): * Packet in Data Link layer is referred to as Frame .
Layered network models The network layer works for the transmission of data from one host to the other located in different networks . It takes care of packet routing i.e. selection of the shortest path to transmit the packet , from the number of routes available . The sender & receiver’s IP addresses are placed in the header by the network layer. The primary tasks of this layer include addressing , sequencing of packets, congestion control, error handling , and Internetworking . 3. Network Layer (Layer 3): *The protocol data unit with this layer is referred to as a packet .
Layered network models The transport layer provides services to the application layer and takes services from the network layer. The data in the transport layer is referred to as Segments. It is responsible for the End to End Delivery of the complete message. The transport layer also provides the acknowledgement of the successful data transmission and re-transmits the data if an error is found. 4. Transport Layer (Layer 4): The protocol data unit associated with this layer is referred to as a segment or datagram .
Layered network models This layer is responsible for the establishment of connection , maintenance of sessions , authentication , and also ensures security. 5. Session (Layer 5): The protocol data unit associated with this layer is referred to as data.
Layered network models 5. Session (Layer 5): The protocol data unit associated with this layer is referred to as data. The functions of the session layer are : Session establishment, maintenance, and termination . Synchronization: This layer allows a process to add checkpoints (synchronization points ) into the data. These synchronization points help to identify the error so that the data is re-synchronized properly, and ends of the messages are not cut prematurely and data loss is avoided. Dialog Controller: The session layer allows two systems to start communication with each other.
Layered network models The presentation layer is also called the Translation layer. The data from the application layer is extracted here and manipulated as per the required format to transmit over the network. The functions of the presentation layer are; Translation Encryption/ Decryption: Compression 6. Presentation Layer (Layer 6): The protocol data unit associated with this layer is referred to as data.
Layered network models Application layer which is implemented by the network applications. These applications produce the data, which has to be transferred over the network. This layer also serves as a window for the application services to access the network and for displaying the received information to the user. 7. Application Layer (Layer 7): The protocol data unit (PDU) associated with this layer is referred to as data. Example: Application – Browsers, Skype Messenger, etc.
OSI Model
Internet Protocol suite or TCP/IP TCP/IP model, was designed and developed by Department of Defence (DoD) in 1960s and is based on standard protocols . It stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise version of the OSI model . It contains four layers , unlike seven layers in the OSI model. The layers are: Process/Application Layer Host-to-Host/Transport Layer Internet Layer Network Access/Link Layer
Internet Protocol suite or TCP/IP
This layer performs the functions of top three layers of the OSI model: Application, Presentation and Session Layer. It is responsible for node-to-node communication and controls user-interface specifications . Some of the protocols present in this layer are: HTTP, HTTPS, FTP, TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X Window, LPD. 1. Application Layer Internet Protocol suite or TCP/IP
2. Transport Layer Internet Protocol suite or TCP/IP This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-end communication and error-free delivery of data. It shields the upper-layer applications from the complexities of data. The two main protocols present in this layer are : Transmission Control Protocol (TCP) It provides reliable and error-free communication between end systems. It performs sequencing and segmentation of data. It has acknowledgment feature and controls the flow of the data 2. User Datagram Protocol (UDP) UDP does not provide features such as error free communications, no acknowledgement etc. It is the go-to protocol It is very cost-effective. TCP is connection-oriented protocol, UDP is connectionless.
This layer parallels the functions of OSI’s Network layer . It defines the protocols which are responsible for logical transmission of data over the entire network. The main protocols residing at this layer are: IP, ICMP & ARP. 3. Internet / Network Layer Internet Protocol suite or TCP/IP 1. IP: Internet Protocol and it is responsible for delivering packets from the source to the destination by looking at the IP addresses in the packet headers . IP has 2 versions: IPv4 and IPv6 . IPv4: most of the websites are using currently. IPv6 is growing as the number of IPv4 addresses are limited . 2. ICMP: Internet Control Message Protocol. It is encapsulated within IP datagrams Responsible for providing hosts with information about network problems. 3. ARP: Address Resolution Protocol. Its job is to find the hardware address of a host from a known IP address .
4. Network Access Layer / Link Layer / Network Interface Layer Internet Protocol suite or TCP/IP It is the combination of Data Link Layer and Physical Layer of the OSI model. It looks out for hardware addresses . the protocols present in this layer allows for the physical transmission of data .
Difference between TCP/IP and OSI Model TCP/IP OSI TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection. TCP/IP has 4 layers OSI has 7 layers TCP/IP is more reliable OSI is less reliable TCP/IP does not have very strict boundaries. OSI has strict boundaries TCP/IP follow a horizontal approach OSI follows a vertical approach TCP/IP uses both session and presentation layer in the application layer itself OSI uses different session and presentation layers Transport layer in TCP/IP does not provide assurance delivery of packets In OSI model, transport layer provides assurance delivery of packets TCP/IP model network layer only provides connection less services Connection less and connection oriented both services are provided by network layer in OSI model Protocols cannot be replaced easily in TCP/IP model While in OSI model, Protocols are better covered and is easy to replace with the change in technology
Emergence of IoT Introduction, Evolution of IoT, Enabling IoT and the Complex Interdependence of Technologies, IoT Networking Components
Explain the chronology for the evolution of Internet of Things (IoT) Relate new concepts with concepts learned earlier to make a smooth transition to IoT List the reasons for a prevailing universal networked paradigm , which is IoT Compare and correlate IoT with its precursors such as WSN (Wireless Sensor Network), M2M, and CPS List the various enablers of IoT Understand IoT networking components and various networking topologies Recognize the unique features of IoT which set it apart from other similar paradigms Learning Outcomes
The modern-day advent of network-connected devices, has given rise to the paradigm of the IoT. Each second, the present-day Internet allows massive traffic through it. This network traffic consists of images, videos, music, speech, text, numbers, binary codes, machine status, banking messages, data from sensors and actuators , healthcare data, data from vehicles, home automation system status and control messages, military communications etc. This huge variety of data is generated from a massive no. of connected devices , which may be directly connected to the Internet or connected through gateway devices . According to statistics from the Information Handling Services the total number of connected devices globally is estimated to be around 25 billion . Introduction
Source: HP Year No. of connected devices 1990 0.3 million 1999 90 million 2010 5 billion 2013 9 billion 2025 1 trillion The miniaturization of electronics and the cheap affordability of technology is resulting in a surge of connected devices , which in turn is leading to an explosion of traffic flowing through the Internet. Introduction
IoT is an anytime, anywhere, and anything network of Internet-connected physical devices systems capable of sensing an environment and affecting the sensed environment intelligently. The three characteristic features anytime, anywhere, and anything highlight the robustness and dynamic nature of IoT. Introduction
The compound annual growth rate (CAGR) of the IoT market Source: International Data Corporation
Source: International Data Corporation The IoT market share across various industries
Image Source: Nokia Insight Evolution of IoT
Image Source: Nokia Insight Evolution of IoT
Evolution of IoT The sequence of technological developments leading to the shaping of the modern- day IoT 1974 1991 ATM: Financial transactions Web: Global information sharing and communication platform Smart Meters: communicating remotely with the power grid, Remote monitoring of power usage Digital Locks: locking and unlocking doors, changing key codes Connected Healthcare: devices connect to hospitals, doctors, and relatives Connected Vehicles: self-diagnose themselves and alert owners about system failures Smart Cities: implementation of smart sensing, monitoring, and actuation systems Smart Dust: microscopic computers Smart Factories: monitor plant processes, assembly lines, distribution lines, etc., all on their own UAV : Agriculture, surveys, surveillance, deliveries, stock maintenance, asset management Smart dust is a system of many tiny microelectromechanical systems such as sensors, robots, or other devices, that can detect, for example, light, temperature, vibration, magnetism, or chemicals
Technological interdependencies of IoT with other domains M2M: System of connected machines and devices, which can talk amongst themselves without human intervention. E .g: Stocks, health, power status CPS : Cyber physical system implies a closed loop control , from sensing, processing, and actuation using a feedback mechanism. IoE: Internet of Environment concerned with minimizing and reversing the ill-effects of Internet-based technologies on the environment. E.g. Smart and sustainable farming, sustainable and energy-efficient habitats, enhancing the energy efficiency of systems and processes
Technological interdependencies of IoT with other domains Industry 4.0: 4 th industrial revolution : digitization in the manufacturing industry E .g: Smart factories: M2M Better resource and workforce management, optimization of production time and resources, and better upkeep and lifetimes of industrial systems. IoP : Decentralization of online social interactions, payments, transactions, and other tasks while maintaining confidentiality and privacy of its user’s data. E .g: Bitcoin
IoT versus M2M M2M IoT M2M is about direct communication between Machines IOT is about Sensors, Automation & Internet Platform Supports Point to Point communication Supports cloud communication Devices do not necessarily rely on internet connection Devices rely on Internet connection Device can be connected through mobile / other network Data delivery depends on the IP network Limited Scalability / Scope More scalable / Capable of connecting billions of devices. E.g. Sensors and data information E.g. Smart wearables, smart cities, smart cars, smart homes
IoT versus M2M
IoT versus CPS CPS IoT CPS consists of a collection of computing devices that communicate with each other and interact with the physical world via sensors and actuators in a feedback loop . IoT is a networked world of interconnected devices, objects, and people. Focus on how physical systems can be controlled and monitored using the cyber space. Focus on how these physical objects can be connected to the internet to do something meaningful. CPS are smart embedded systems that integrate sensor networks with embedded computing to monitor the physical environment. IoT is purely automation (without no Human Intervention) CPS integrate actuators & sensors with networking technologies, work in the feedback loop using human intervention, their behaviour could be changed based on user’s requirements. Scope of IoT is not limited to just connecting things ; it allows things to communicate and exchange data , which can be analysed and processes further into meaningful information.
IoT versus WoT WoT IoT Enables access and control over IoT resources and applications IoT is a networked world of interconnected devices, objects, and people It is a software layer to connect everything to the web using standard web protocols It is a hardware layer to connect everything to the internet Deals with protocols and web servers Deals with sensors, actuators computation & communication interfaces. WoT makes it easy by using single protocol for multiple IoT devices Different protocol for each & every IoT devices WoT Programming is easier Hard to program due to multiple protocols Can be accessed anywhere, anytime IoT standards and protocol are not public. Privately funded & are not publicly accessible.
Enabling IoT and the Complex Interdependence of Technologies IoT is a paradigm built upon complex interdependencies of technologies (both legacy and modern) the IoT paradigm is divided into four planes: Services Local connectivity Global connectivity Processing
Enabling IoT and the Complex Interdependence of Technologies 1. Service Plane is composed of two parts: Things or Devices Low-power connectivity. Example: Any IoT application requires the basic setup of sensing , and a low-power, low-range network , built upon the IEEE 802.15.4 protocol. Things: Wearables, computers, smartphones, household appliances, smart glasses, factory, machinery, vending machines, vehicles, UAVs, robots etc. LPC: Responsible for connecting the things in local implementation, may be legacy protocols such as WiFi , Ethernet, or cellular . M odern Day Technologies : are mainly wireless and programmable E.g. Zigbee, RFID, Bluetooth, 6LoWPAN, LoRA , DASH, Insteon , and others
Enabling IoT and the Complex Interdependence of Technologies The service plane is composed of two parts: Things or Devices Low-power connectivity . They are responsible for the connectivity between the things of the IoT and the nearest hub or gateway to access the Internet.
Enabling IoT and the Complex Interdependence of Technologies 2. Local Connectivity : is responsible for distributing Internet access to multiple local IoT deployments. Distribution may be on the basis of; Physical placement of the things, Application domains Service providers. Services such as address management , device management, security, sleep scheduling , etc, fall within the scope of this plane .
Enabling IoT and the Complex Interdependence of Technologies 2. Local Connectivity E.g.: Smart Home Environment Smart home environment have local IoT implementations, which have various things connected to the network via low-power, low-range connectivity technologies. The traffic from these devices merges into a single router or a gateway. The total traffic from these devices leaves through a single gateway or router, which may be assigned a single global IP address (for the whole house). This helps in the significant conservation of already limited global IP addresses. ( IoT Mgmt.)
3. Global Connectivity Enables IoT in the real sense by allowing for worldwide implementations and connectivity between things, users, controllers and applications. It decides how and when to store data , when to process it , when to forward it, and in which form to forward it. The Web, data- centers , remote servers, Cloud , etc, make up this plane. The paradigm of “fog computing” lies between the planes of local connectivity and global connectivity. Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud. Enabling IoT and the Complex Interdependence of Technologies
Enabling IoT and the Complex Interdependence of Technologies 4 . Processing Basic IoT networking framework. The continuous rise in the use of IoT in various application areas such as industries, transportation, healthcare, etc., is the result of this plane. This plane is termed as IoT tools , as they wring-out useful and human-readable information from all the raw data that various IoT devices.
4 . Processing The sub-domains of this plane; Intelligence Conversion (Data and Format conversion, Data cleaning) Learning (Making sense of temporal and spatial data patterns) Cognition (Recognizing patterns and mapping it to known patterns) Algorithms (Control and monitoring algorithms) Visualization (rendering in the form of trends, graphs, charts, etc.) Analysis (Estimating the usefulness of the generated information, estimating future trends based on past and present patterns of information obtained) Enabling IoT and the Complex Interdependence of Technologies
IoT Networking Components An IoT implementation is composed of several components, may vary with their application domains. The broad categories of IoT networking components. IoT node IoT router IoT LAN IoT WAN IoT gateway IoT proxy.
A typical IoT network ecosystem highlighting the various networking components from IoT nodes to the Internet
Various IoT nodes within an IoT LAN are configured to one another as well as talk to the IoT router whenever they are in the range of it. The devices have locally unique (LU-x) device identifiers . These identifiers are unique only within a LAN. These identifiers may be repeated in a new LAN. Each IoT LAN has its own unique identifier , which is denoted by IoT LAN-x. IoT Networking Components
Figure A router acts as a connecting link between LAN by forwarding messages from the LAN to the IoT gateway or the IoT proxy . The proxy is an application layer device. It is possible to include features such as firewalls, packet filters , and other security measures besides the regular routing operations . Various gateways connect to an IoT WAN , which links these devices to the Internet . The gateway or the proxy may directly connect to the Internet . This network may be wired or wireless; however, IoT deployments heavily rely on wireless solutions . Wireless technology is the only feasible and neat-enough solution to avoid the hassles of laying wires and dealing with the restricted mobility
IoT Networking Components These are the networking devices (made up of a sensor , a processor , and a radio ). These devices communicates with the network infrastructure (either within the LAN or outside it). The nodes may be connected to other nodes inside a LAN directly or by means of a common gateway for that LAN. Connections outside the LAN are through gateways and proxies. IoT Node
IoT Networking Components An IoT router is a networking equipment . Purpose: Routing of packets between various entities in the IoT network. It keeps the traffic flowing correctly within the network. A router can be used as a gateway by enhancing its functionalities. IoT Router
IoT Networking Components The LAN enables local connectivity within the purview of a single gateway . Typically, they consist of short-range connectivity technologies . IoT LANs may or may not be connected to the Internet. Generally, they are localized within a building or an organization. IoT LAN
IoT Networking Components The WAN connects various network segments such as LANs. They are typically organizationally and geographically wide , with their operational range lies between a few KM to hundreds of KMS. IoT WANs connect to the Internet and enable Internet access to the segments (LAN) IoT WAN
IoT Networking Components An IoT gateway is a router connecting the IoT LAN to a WAN or the Internet. Gateways can implement several LANs and WANs. Their primary task is to forward packets between LANs and WANs , and the IP layer using only layer 3 . IoT Gateway
IoT Networking Components Proxies actively lies on the application layer . Proxies performs application layer functions between IoT nodes and other entities. Application layer proxies are a means of providing security to the network entities under it. It helps to extend the addressing range of its network. IoT Proxy