Iot Module 1 Notes
Iot Module 1 Notes
CHAPTER 1
Basics of Networking
1.1 DEFINITION: Networking refers to the linking of computers and communication network
devices (also referred to as hosts), which interconnect through a network (Internet or Intranet)
and are separated by unique device identifiers (Internet protocol, IP addresses and media access
control, MAC addresses).
1.2 Network Types
Computer networks are classified according to various parameters:
1) Type of connection
2) Physical Topology
3) Reach of the Network.
1.2.1 Connection Types
Depending on the way a host communicates with other hosts, computer networks are of two
types Point-to-point and Point-to-multipoint.
i. Point-To-Point
➢ Point-to-point connections are used to establish direct connections between two
hosts.
➢ These networks were designed to work over duplex links and are functional for
both synchronous as well as asynchronous systems.
➢ Point to point connections find usage for specific purposes such as in optical
networks.
Advantages:
➢ This is faster and highly reliable than other types of connections since there is a direct
connection.
➢ No need for a network operating system
➢ Does not need an expensive server as individual workstations are used to access the
files
➢ No need for any dedicated network technicians because each user sets their permissions
Disadvantages:
➢ The biggest drawback is that it only be used for small areas where computers are in
close proximity.
➢ You cannot back up files and folders centrally
DEPARTMENT OF CSE 1
INTRODUCTION TO IOT
➢ There is no security besides the permissions. Users often do not require to log onto their
workstations.
ii. Point-To-Multipoint
➢ In a point-to-multipoint connection, more than two hosts share the same link.
➢ Point-to-multipoint connections find popular use in wireless networks and IP
telephony.
➢ The channel is shared between the various hosts either spatially or temporally.
➢ One common scheme of spatial sharing of the channel is frequency division
multiple access (FDMA).
➢ Temporal sharing of channels include approaches such as time division multiple
access (TDMA).
Advantage:
➢ Easily deployed when compared to the deployment of a point-to-point network because
the equipment must be deployed only at the new subscriber's site.
Disadvantage:
➢ All the remote sites must come within the visibility and range of the base station.
DEPARTMENT OF CSE 2
INTRODUCTION TO IOT
DEPARTMENT OF CSE 3
INTRODUCTION TO IOT
ii. Mesh
➢ The mesh topology has a unique network design in which each computer on the network
connects to every other.
➢ It is develops a P2P (point-to-point) connection between all the devices of the network.
➢ This implies that for n hosts in a mesh, there are a total of n(n−1)/2 dedicated full duplex
links between the hosts
Advantages:
➢ The network can be expanded without disrupting current users.
➢ Need extra capable compared with other LAN topologies.
➢ No traffic problem as nodes has dedicated links.
➢ Dedicated links help you to eliminate the traffic problem.
➢ A mesh topology is robust.
➢ It has multiple links, so if any single route is blocked, then other routes should be used
for data communication.
➢ P2P links make the fault identification isolation process easy.
➢ It helps you to avoid the chances of network failure by connecting all the systems to a
central node.
➢ Every system has its privacy and security.
Disadvantages:
➢ Installation is complex because every node is connected to every node.
➢ It is expensive due to the use of more cables. No proper utilization of systems.
➢ Complicated implementation.
➢ It requires more space for dedicated links.
➢ Because of the amount of cabling and the number of input-outputs, it is expensive to
implement.
➢ It requires a large space to run the cables.
DEPARTMENT OF CSE 4
INTRODUCTION TO IOT
iii. Bus
➢ A bus topology follows the point-to-multipoint connection. A backbone cable or bus
serves as the primary traffic pathway between the hosts.
➢ The hosts are connected to the main bus employing drop lines or taps.
➢ The bus topology has a simple cabling procedure in which a single bus (backbone cable)
can be used for an organization.
➢ Multiple drop lines and taps can be used to connect various hosts to the bus.
Advantages:
➢ Cost of the cable is very less as compared to other topology, so it is widely used to build
small networks.
➢ Famous for LAN network because they are inexpensive and easy to install.
➢ It is widely used when a network installation is small, simple, or temporary.
➢ It is one of the passive topologies. So computers on the bus only listen for data being
sent, that are not responsible for moving the data from one computer to others.
Disadvantages:
➢ In case if the common cable fails, then the entire system will crash down.
➢ When network traffic is heavy, it develops collisions in the network.
➢ Whenever network traffic is heavy, or nodes are too many, the performance time of the
network significantly decreases.
➢ Cables are always of a limited length.
iv. Ring
➢ A ring topology works on the principle of a point-to-point connection.
➢ Each host is configured to have a dedicated point-to-point connection with its two
immediate neighbouring hosts on either side of it through repeaters at each host.
➢ The repetition of this system forms a ring.
DEPARTMENT OF CSE 5
INTRODUCTION TO IOT
➢ The repeaters at each host capture the incoming signal intended for other hosts,
regenerates the bit stream, and passes it onto the next repeater.
Advantages:
➢ Easy to install and reconfigure.
➢ Adding or deleting a device in-ring topology needs you to move only two connections.
➢ The troubleshooting process is difficult in a ring topology.
➢ Failure of one computer can disturb the whole network.
➢ Offers equal access to all the computers of the networks
➢ Faster error checking and acknowledgment.
Disadvantages:
➢ Unidirectional traffic.
➢ Break in a single ring can risk the breaking of the entire network
➢ Modern days high-speed LANs made this topology less popular.
➢ In the ring, topology signals are circulating at all times, which develops unwanted
power consumption.
➢ It is very difficult to troubleshoot the ring network.
➢ Adding or removing the computers can disturb the network activity.
DEPARTMENT OF CSE 6
INTRODUCTION TO IOT
DEPARTMENT OF CSE 7
INTRODUCTION TO IOT
➢ LAN will indeed save cost because of shared computer resources, but the initial cost of
installing Local Area Networks is quite high.
➢ The LAN admin can check personal data files of every LAN user, so it does not offer
good privacy.
➢ Unauthorized users can access critical data of an organization in case LAN admin is
not able to secure centralized data repository.
➢ Local Area Network requires a constant LAN administration as there are issues related
to software setup and hardware failures
iii. Metropolitan Area Networks (MAN)
➢ The reachability of a MAN lies between that of a LAN and a WAN.
➢ MANs connect various organizations or buildings within a given geographic
location or city.
➢ Networking devices/components in mans are modems and cables.
➢ MANs tend to have moderate fault tolerance levels It mostly covers towns and
cities in a maximum 50 km range.
➢ Mostly used medium is optical fibers, cables.
➢ Data rates adequate for distributed computing applications.
Advantages
➢ It offers fast communication using high-speed carriers, like fiber optic cables.
➢ It provides excellent support for an extensive size network and greater access to WANs.
➢ The dual bus in MAN network provides support to transmit data in both directions
concurrently.
➢ A MAN network mostly includes some areas of a city or an entire city.
Disadvantages
➢ More cables are required to establish MAN connection from one place to another.
➢ MAN, network it is tough to make the system secure from hackers
iv. Wide Area Networks (WAN)
➢ Wans typically connect diverse geographic locations
➢ They are restricted within the boundaries of a state or country.
➢ The data rate of WANs is in the order of a fraction of LAN’s data rate.
➢ WANs connecting two LANs or mans may use public switched telephone
networks (pstns) or satellite-based links.
DEPARTMENT OF CSE 8
INTRODUCTION TO IOT
Due to the long transmission ranges, WANs tend to have more errors and noise during
transmission and are very costly to maintain. The fault tolerance of WANs are also
generally low.
Advantages
➢ WAN helps you to cover a larger geographical area.
➢ Contains devices like mobile phones, laptop, tablet, computers, gaming consoles, etc.
➢ WLAN connections work using radio transmitters and receivers built into client
devices.
Disadvantages
➢ The initial setup cost of investment is very high.
➢ It is difficult to maintain the WAN network. You need skilled technicians and network
administrators.
➢ There are more errors and issues because of the wide coverage and the use of different
technologies.
➢ It requires more time to resolve issues because of the involvement of multiple wired
and wireless technologies.
➢ Offers lower security compared to other types of networks in computer.
1.3 Layered Network Models
The intercommunication between hosts in any computer network, be it a large-scale or a small-
scale one, is built upon the premise of various task-specific layers.
Two of the most accepted and used traditional layered network models are the open systems
interconnection developed by the International Organization of Standardization (ISO-OSI)
reference model and the Internet protocol suite.
1.3.1 OSI Model
The ISO-OSI model is a conceptual framework that partitions any networked communication
device into seven layers of abstraction, each performing distinct tasks based on the underlying
technology and internal structure of the hosts.
These seven layers, from bottom-up, are as follows:
1. Physical layer
2. Data link layer
3. Network layer
4. Transport layer
5. Session layer
DEPARTMENT OF CSE 9
INTRODUCTION TO IOT
6. Presentation layer
7. Application layer
(i) Physical Layer
➢ This is a media layer and is also referred to as layer 1 of the OSI model.
➢ The physical layer is responsible for taking care of the electrical and mechanical
operations of the host at the actual physical level.
➢ The protocol data unit associated with this layer is referred to as a symbol.
Functions of physical layer:
➢ Line Configuration: It defines the way how two or more devices can be connected
physically.
➢ Data Transmission: It defines the transmission mode whether it is simplex, half-duplex
or full-duplex mode between the two devices on the network.
➢ Topology: It defines the way how network devices are arranged (star, mesh, bus, or
ring)
➢ Signals: It determines the type of the signal used for transmitting the information(signal
generation, signal transfer and signal loss)
(ii) Data Link Layer: This is a media layer and layer 2 of the OSI model.
➢ The data link layer is mainly concerned with the establishment and termination of the
connection between two hosts and the detection and correction of errors during
communication between two or more connected hosts.
➢ The protocol data unit associated with this layer is referred to as a frame.
It contains two sub-layers:
Logical Link Control Layer
➢ It is responsible for transferring the packets to the Network layer of the receiver that is
receiving.
➢ It identifies the address of the network layer protocol from the header
➢ It also provides flow control, error checking frame synchronization
Media Access Control Layer
➢ A Media access control layer is a link between the Logical Link Control layer and the
network's physical layer.
➢ It is used for transferring the packets over the network.
➢ It provides the access control and permissions for connecting networked devices
DEPARTMENT OF CSE 10
INTRODUCTION TO IOT
DEPARTMENT OF CSE 11
INTRODUCTION TO IOT
(iv) Transport Layer: This is layer 4 of the OSI model and is a host layer.
➢ The transport layer is tasked with end-to-end error recovery and flow control to achieve
a transparent transfer of data between hosts.
➢ This layer is responsible for keeping track of acknowledgments during variable-length
data transfer between hosts.
➢ In case of loss of data, or when no acknowledgment is received, the transport layer
ensures that the erroneous data segment is re-sent to the receiving host.
➢ The protocol data unit associated with this layer is referred to as a segment or datagram.
(v) Session Layer: This is the OSI model’s layer 5 and is a host layer.
➢ It is responsible for establishing, controlling, and terminating of communication
between networked hosts.
➢ The session layer sees full utilization during operations such as remote procedure calls
and remote sessions.
DEPARTMENT OF CSE 12
INTRODUCTION TO IOT
➢ The protocol data unit associated with this layer is referred to as data.
(vi) Presentation Layer: This layer is a host layer and layer 6 of the OSI model.
➢ It is mainly responsible for data format conversions and encryption tasks such that the
syntactic compatibility of the data is maintained across the network, for which it is also
referred to as the syntax layer.
➢ The protocol data unit associated with this layer is referred to as data.
(vii) Application Layer: This is layer 6 of the OSI model and is a host layer.
➢ It is directly accessible by an end-user through software APIs (application program
interfaces) and terminals.
DEPARTMENT OF CSE 13
INTRODUCTION TO IOT
➢ Applications such as file transfers, FTP (file transfer protocol), e-mails, and other such
operations are initiated from this layer.
➢ The application layer deals with user authentication, identification of communication
hosts, quality of service and privacy.
➢ The protocol data unit associated with this layer is referred to as data.
DEPARTMENT OF CSE 14
INTRODUCTION TO IOT
A networked communication between two hosts following the OSI model is shown in Figure
1.3
DEPARTMENT OF CSE 15
INTRODUCTION TO IOT
range of technologies such as the Ethernet, wireless LAN, and the asynchronous
transfer mode (ATM).
ii. Internet Layer
➢ Layer 2 of the TCP/IP protocol suite is somewhat synonymous to the network
layer of the OSI model.
➢ It is responsible for addressing, address translation, data packaging, data
disassembly and assembly, routing, and packet delivery tracking operations.
➢ Some core protocols associated with this layer are address resolution protocol
(ARP), Internet protocol (IP), Internet control message protocol (ICMP), and
Internet group management protocol (IGMP). Traditionally, this layer was built
upon IPv4, which is gradually shifting to IPv6, enabling the accommodation of
a much more significant number of addresses and security measures.
iii. Transport Layer
➢ Layer 3 of the TCP/IP protocol suite is functionally synonymous with the
transport layer of the OSI model.
➢ This layer is tasked with the functions of error control, flow control, congestion
control, segmentation, and addressing in an end-to-end manner; it is also
independent of the underlying network.
➢ Transmission control protocol (TCP) and user datagram protocol (UDP) are the
core protocols upon which this layer is built, which in turn enables it to have the
choice of providing connection-oriented or connectionless services between two
or more hosts or networked devices.
iv. Application Layer
➢ The functionalities of the application layer, layer 4, of the TCP/IP protocol suite
are synonymous with the collective functionalities of the OSI model’s session,
presentation, and application layers.
➢ This layer enables an end-user to access the services of the underlying layers
and defines the protocols for the transfer of data.
➢ Protocols used in the application layer are Hypertext transfer protocol (HTTP),
file transfer protocol (FTP), simple mail transfer protocol (SMTP), domain
name system (DNS), routing information protocol (RIP) and simple network
management protocol (SNMP) are some of the core protocols associated with
this layer.
DEPARTMENT OF CSE 16
INTRODUCTION TO IOT
A networked communication between two hosts following the TCP/IP model is shown in
Figure 1.4
DEPARTMENT OF CSE 17
INTRODUCTION TO IOT
frames. On the other hand, the physical layer should lay down the physical
characteristics of transmission. A proper model should segregate the two layers.
➢ It was originally designed and implemented for wide area networks. It is not optimized
for small networks like LAN (local area network) and PAN (personal area network).
DEPARTMENT OF CSE 18
INTRODUCTION TO IOT
Chapter 4
Emergence of IoT
Definition: “The Internet of Things (IoT) is the network of physical objects that contain
embedded technology to communicate and sense or interact with their internal states or the
external environment.”
4.1 Introduction
➢ Miniaturization of electronics and the cheap affordability of technology
➢ Connected devices → Internet Traffic • Example : Smart Phone
➢ IoT is an anytime, anywhere and anything network of Internet -connected physical
devices or systems capable of sensing an environment and affecting the sensed
environment intelligently
Characteristics
➢ Efficient, Scalable and associated Architectures.
➢ No ambiguity in naming and addressing.
➢ Massive number of constrained devices, sleeping nodes, mobile devices and non-IP
devices.
➢ Intermittent and often unstable connectivity.
Application
Smart parking, smartphone detection, traffic congestion, smart lighting, waste management,
smart roads, structural health, urban noise maps, river floods, water flow, silos stock
calculation, water leakages, radiation levels, explosive and hazardous gases, perimeter access
control, snow level monitoring, liquid presence, forest fire detection, air pollution, smart grid,
Tank level, photovoltaic installations, NFC (near-field communications) payments, Intelligent
shopping applications, landslide and avalanche prevention, early detection of earthquakes,
supply chain control, smart product management and others.
DEPARTMENT OF CSE 19
INTRODUCTION TO IOT
➢ ATM
▪ ATMs or automated teller machines are cash distribution machines, which are
linked to a user’s bank account.
▪ ATMs dispense cash upon verification of the identity of a user and their account
through a specially coded card.
▪ The central concept behind ATMs was the availability of financial transactions
even when banks were closed beyond their regular work hours.
▪ The first ATM became operational and connected online for the first time in
1974.
➢ Web
▪ World Wide Web is a global information sharing and communication platform.
The Web became operational for the first time in 1991.
▪ It has been massively responsible for the many revolutions in the field of
computing and communication.
➢ Smart Meters
▪ The earliest smart meter was a power meter, which became operational in early
2000.
▪ These power meters were capable of communicating remotely with the power
grid.
▪ They enabled remote monitoring of subscribers’ power usage and eased the
process of billing and power allocation from grids
➢ Digital Locks
DEPARTMENT OF CSE 20
INTRODUCTION TO IOT
▪ Digital locks can be considered as one of the earlier attempts at connected home-
automation systems.
▪ Operations such as locking and unlocking doors, changing key codes, including
new members in the access lists, can be easily performed and that too remotely
using smartphones.
➢ Connected Healthcare
▪ Healthcare devices connect to hospitals, doctors, and relatives to alert them of
medical emergencies and take preventive measures.
▪ The devices may be simple wearable appliances, monitoring just the heart rate
and pulse of the wearer, as well as regular medical devices and monitors in
hospitals.
▪ The connected nature of these systems makes the availability of medical records
and test results much faster, cheaper, and convenient for both patients as well
as hospital authorities.
➢ Connected Vehicles
▪ Connected vehicles may communicate to the Internet or with other vehicles, or
even with sensors and actuators contained within it.
▪ These vehicles self-diagnose themselves and alert owners about system failures.
➢ Smart Cities
▪ This is a city-wide implementation of smart sensing, monitoring, and actuation
systems.
▪ The city-wide infrastructure communicating amongst themselves enables
unified and synchronized operations and information dissemination.
➢ Smart Dust
▪ These are microscopic computers.
▪ Smaller than a grain of sand each, they can be used in numerous beneficial ways,
where regular computers cannot operate.
▪ For example, smart dust can be sprayed to measure chemicals in the soil or even
to diagnose problems in the human body.
➢ Smart Factories
➢ These factories can monitor plant processes, assembly lines, distribution lines,
and manage factory floors all on their own.
DEPARTMENT OF CSE 21
INTRODUCTION TO IOT
➢ UAVs
▪ UAVS or unmanned aerial vehicles have emerged as robust public
▪ Domain solutions tasked with applications ranging from agriculture,
surveys, surveillance, deliveries, stock maintenance, asset management,
and other tasks.
The various technological interdependencies of IOT with other domains and networking
paradigms such as M2M, CPS, the Internet of environment (IOE), the Internet of people (IOP),
and Industry 4.0
➢ M2M
▪ The M2M or the machine-to-machine paradigm signifies a system of connected
machines and devices, which can talk amongst themselves without human
intervention.
▪ The communication between the machines can be for updates on machine status
(stocks, health, power status, and others), collaborative task completion, overall
knowledge of the systems and the environment, and others.
DEPARTMENT OF CSE 22
INTRODUCTION TO IOT
➢ CPS
▪ The CPS or the cyber physical system paradigm insinuates a closed control loop
from sensing, processing and finally to actuation using a feedback mechanism.
▪ CPS helps in maintaining the state of an environment through the feedback
control loop, which ensures that until the desired state is attained, the system
keeps on actuating and sensing.
➢ IOE
▪ The IoE paradigm is mainly concerned with minimizing and even reversing the
ill-effects of the permeation of Internet-based technologies on the environment.
▪ The major focus areas of this paradigm include smart and sustainable farming,
sustainable and energy-efficient habitats, enhancing the energy efficiency of
systems and processes, and others.
➢ Industry 4.0
▪ Industry 4.0 is commonly referred to as the fourth industrial revolution
pertaining to digitization in the manufacturing industry.
▪ The previous revolutions chronologically dealt with mechanization, mass
production, and the industrial revolution, respectively.
▪ The digitization and connectedness in Industry 4.0 translate to better resource
and workforce management, optimization of production time and resources, and
better upkeep and lifetimes of industrial systems.
➢ IOP
▪ IOP is a new technological movement on the Internet which aims to decentralize
online social interactions, payments, transactions and other tasks while
maintaining confidentiality and privacy of its user’s data.
▪ A famous site for IOP states that as the introduction of the Bitcoin has severely
limited the power of banks and governments, the acceptance of IOP will limit
the power of corporations, governments, and their spy agencies.
IoT versus M2M
➢ M2M refers to communications and interactions between machines and devices.
➢ These interactions occur in cloud computing infrastructure
➢ M2M collects data from machinery and sensors, also enabling device management and
device interaction. Telecommunication services providers introduced the term M2M
DEPARTMENT OF CSE 23
INTRODUCTION TO IOT
DEPARTMENT OF CSE 24
INTRODUCTION TO IOT
➢ IOT is focused on creating networks comprising objects, things, people, systems and
applications, which do not consider the unification aspect and the limitations of the
Internet, the need for WOT is to integrate the various areas of IoT into the existing Web.
➢ WoT can be thought of as an application layer-based hat added over the network layer.
DEPARTMENT OF CSE 25
INTRODUCTION TO IOT
1) Things or Devices
2) Low -Power Connectivity
➢ Services are a combination of things and low power connectivity.
➢ IoT application requires the basic setup of Sensing , processing and a low -power, low
-range network, which is built upon the IEEE 802 .15 . 4 protocol
➢ The things may be wearables, computers, smartphones, household appliances, smart
glasses
Low power connectivity: WiFi , Ethernet or cellular are used for connecting the things in
local implementation. Modern day technologies such has Zigbee, RFID, Bluetooth are also
used.
2. Local connectivity
➢ The local connectivity is responsible for distributing Internet access to multiple
local IoT deployments.
➢ Services such as address management, device management, security, sleep
scheduling, and others fall in this plane.
➢ For example, in smart home, the first floor and the ground floor have local IoT
implementations, which have various things connected to the network via low -
power, low -range connectivity technologies, the traffic from these two floors
merges into a single router or a gateway .
➢ The total traffic intended for the Internet from a smart home leaves this single
gateway or router, which is assigned a single global IP address to help the
conservation of limited global IP addresses .
➢ The local connectivity plane falls under IoT management as it directly deals with
strategies to use/reuse addresses based on things and applications.
➢ Edge Computing is deployed in conjunction with these first two planes : services
and local connectivity .
3. Global Connectivity
➢ The global connectivity plays a significant role in enabling IoT in the real sense
by allowing for worldwide implementations and connectivity between things,
users, controllers, and applications.
➢ This plane also falls under IoT management as it decides how and when to store
data, when to process it, when to forward it, and in which form to forward it .
➢ The Web, data -centres, remote servers, Cloud and others make up this plane .
DEPARTMENT OF CSE 26
INTRODUCTION TO IOT
➢ The paradigm of “fog computing” lies between the planes of local connectivity
and global connectivity.
➢ It serves to manage the load of global connectivity infrastructure by offloading
the computation nearer to the source of the data itself to reduce the traffic load
on the global Internet.
4. Processing
➢ The processing plane is at the top-up of the basic IoT networking framework .
➢ The continuous rise in the usefulness and penetration of IoT in various application areas
such as industries, transportation, healthcare and others is the result of this plane .
➢ The members in this plane are termed as IoT tools, because they provide useful and
human -readable information from all the raw data received from IoT devices and
deployments .
➢ The various sub -domains of this plane include Conversion (data and format conversion
& cleaning), Learning (making sense of temporal &spatial data patterns), Cognition
(recognizing patterns & mapping to known patterns) Algorithms (various control and
monitoring algorithms), Visualization (form of collective trends, graphs, charts &
projections) Analysis (estimating the usefulness of the generated information, making
sense of the information with respect to the application and place of data generation &
estimating future trends based on past and present patterns of information obtained) .
➢ Various computing paradigms such as “big data”, “machine Learning”, and others, fall
within the scope of this domain.
4.4 IoT Networking Components
IoT implementation is composed of several components, which may vary with their application
domains the broad components that come into play during the establishment of any IoT
network, into six types:
i. IoT node
ii. IoT router
iii. IoT LAN
iv. IoT WAN
v. IoT gateway
vi. IoT proxy
A typical IoT implementation from a networking perspective is shown in Figure 4.9. The
individual components are briefly described here:
DEPARTMENT OF CSE 27
INTRODUCTION TO IOT
DEPARTMENT OF CSE 28
INTRODUCTION TO IOT
In the above figure the various IoT nodes within an IoT LAN are configured to one another as
well as talk to the IoT router whenever they are in the range of it.
➢ The devices have locally unique (LU-x) device identifiers.
➢ These identifiers are unique only within a LAN.
➢ There is a high chance that these identifiers may be repeated in a new LAN.
➢ Each IOT LAN has its own unique identifier, which is denoted by IOT LAN-x in
Figure.
➢ A router acts as a connecting link between various LANS by forwarding messages from
the LANS to the IOT gateway or the IOT proxy.
➢ The proxy is an application layer device, it is additionally possible to include features
such as firewalls, packet filters, and other security measures besides the regular routing
operations. Various gateways connect to an IOT WAN, which links these devices to
the Internet.
➢ There may be cases where the gateway or the proxy may directly connect to the Internet.
➢ This network may be wired or wireless however, IOT deployments heavily rely on
wireless solutions. This is mainly attributed to the large number of devices that are
integrated into the network.
➢ Wireless technology is the only feasible and neat-enough solution to avoid the hassles
of laying wires and dealing with the restricted mobility rising out of wired connections.
DEPARTMENT OF CSE 29