Introduction To IoT (Internet of Things) Chapter 1 Notes
Introduction To IoT (Internet of Things) Chapter 1 Notes
UNIT 1
Introduction to Internet of Things:
The Internet of Things is a popular concept that grew out of the rise of devices that can
connect to networks (IoT). Modern Internet lets a lot of different kinds of traffic through it
every second. This network traffic includes images, videos, music, speech,
text,numbers, binary codes, machine status, banking messages, data from sensors and
actuators, healthcare data, data from vehicles, status and control messages from home
automation systems, military communications, and a lot more. This huge variety of data
comes from all the devices connected to the Internet. These devices may be connected
directly to the Internet or through gateway devices. According to data from the
Information Handling Services, there will be about 25 billion connected devices
worldwide by 2020. This number is expected to triple in just 5 years by 2025. The below
figure shows the global trend for connected devices and how they are expected to
change in the future.
Both old and new systems can be responsible for the traffic that flows through the
Internet. Because technology is getting smaller and cheaper, more and more devices
can connect to the Internet. This is causing a huge increase in traffic on the
Internet.One of the best examples is how smartphones have changed over time. In the
late 1990s, cell phones were still expensive and could only be bought by a small few.
Also,these devices only had the most basic features, like making voice calls, sending
text messages, and sharing low-quality multimedia. Within the next 10 years, cell
phones were widely used and easy to afford, these gadgets' features changed, and as
time went on, more and more applications and services that ran on them needed
packet-based Internet access.Modern cell phones often called "smartphones," are
mostly based on the Internet.
Many apps on these devices, like messaging, video calls, e-mails, games, music
streaming, video streaming, and others, can only be used with Internet access or WiFi
from a network provider.
Most people who use smartphones today usually carry more than one of these devices.
In line with this trend, the number of other connected devices has grown quickly, and
now there are more devices than people on Earth by a large number. Now imagine that
as all technologies and fields move toward smart management of systems, the number
of systems based on sensors and actuators is growing quickly. With time, the need for
access to systems that are being watched and controlled from anywhere keeps
growing. This makes the number of devices that can connect to the Internet go up even
more.The Internet was first made to send simple messages, but now it is connected to
all kinds of "Things." These can be old devices, new computers, sensors, actuators,
home appliances, toys, clothes, shoes, cars, cameras, and anything else that can make
a
product better by making it smarter, more accurate, or even look better.
Basics of networking
Definition:
Computer networking refers to the linking of computers and communication network
devices (also referred to as hosts), which interconnect through a network that can
exchange data & share resources with each other.
Basic components of computer networks: The main network components are:
❖ Computer (clients, servers)
❖ Channels (wired or wireless)
❖ Interface or connecting devices (Router, Switch, etc)
❖ Software (Protocols, System Software, Application Software, etc.)
Network Types:
Computer networks are classified according to various parameters. They are
❖ Type of connection.
❖ Physical topology.
❖ Reach of the network.
Type of Connection:
There are two types of connection used. They are
❖ Point-to-point
❖ Point-to-multipoint.
Point-to-point:
This type is used to establish direct connections between two devices, for example, a
remote control for an AC or TV. The connected channel is dedicated to it only. These
networks were designed to work over duplex links and are functional for both
synchronous as well as asynchronous systems. These types of connected networks are
used for specific applications.
Point-to-Multipoint:
In this connection type, more than two computers (hosts) share the same link as shown
in figure 3. It finds popular use in wireless networks. Multiple access technology like
frequency division multiple access (FDMA), Time division multiple access (TDMA) are
used to share the channel by many hosts simultaneously. This connection finds popular
use in enabling communication between massive numbers of connected devices.
Physical topology: Topology defines the structure of the network of how all the
components are interconnected to each other. Network topologies are often represented
as a graph of the network. Computer networks can have the following four broad
topologies: Star, Mesh, Bus, and Ring.
(i) Star: In a star topology,
★ Every host has a point-to-point link to a central controller or hub.
★ Direct communication cannot be possible between the devices; they can only do
so through the
★ central controller.
★ The hub acts as the network traffic exchange.
★ Only one link per host as shown in the figure below
Advantages:
★ Star topology is simple and easier to install.
★ Easy fault detection because the link is often easily identified.
★ Centralized network management, so safe to use.
★ Itis very reliable — if one cable or device fails then all the others will still
★ work, and not have a big effect on the network performance.
★ Itis high-performing as no data collisions can occur
★ Disadvantages:
★ Requires more cables than a linear bus, hence expensive.
★ If the hub fails, the whole network fails
Disadvantages:
★ Requires more cables than a linear bus, hence expensive.
★ If the hub fails, the whole network fails
(ii) Mesh:In a mesh topology,Every host is connected to every other host using a
dedicated link.This implies that for n devices in a mesh, there are a total of n(n-1)/2
dedicated full duplex links between the hosts.Every node features a point-to-point
connection to the opposite node. (see fig 5) .The connections within the mesh are often
wired or wireless.
Advantages:
★ More robustness and resilience of the system.
★ It reduced data load on a single host.
★ It provides high privacy and security.
★ Failure during a single device won’t break the network.
★ Adding new devices won't disrupt data transmissions.
Disadvantages:
★ More complex and costly topology.
★ Installation is more difficult in the mesh.
★ Mesh networks are used very selectively, such as in backbone networks.
★ Power requirement is higher as all the nodes remain active all the time.
★ High challenging of maintenance.
1.Physical Layer:
★ This is a media layer and is also referred to as layer 1 of the OSI model.
★ This layer is responsible for taking care of the electrical and mechanical
operations of the host.
★ It defines the hardware, cabling wiring, signal generation, signal transfer,
voltages, the layout of cables, physical port layout, etc.
★ This layer is responsible for the topological layout of the network (star, mesh,
bus, or ring), communication mode (simplex, duplex,) and speed of bit rate.
★ The protocol data unit associated with this layer is referred to as a “bit”.
★ This layer is mainly concerned with the establishment and termination of the
connection between two hosts (devices).
★ This layer is responsible for reading and writing data from and onto the line.
★ Perform error detection and correction during communication between two or
more connected hosts.
★ The protocol data unit associated with this layer is referred to as a “frame”.
★ This layer is further into TWO sub-layers
a. Medium access control (MAC) Layer: It is responsible for access control
and permissions for connecting networked devices.
b. Logical link control (LLC) Layer: It is responsible for error checking, flow
control, and frame synchronization.
3. Network Layer:
★ This layer is responsible for address assignment and routing data to various
devices connected to different networks through logical paths.
★ These logical paths may pass through other intermediate hosts (nodes) before
reaching the actual destination host.
★ The primary tasks of this layer include addressing, sequencing of
packets,congestion control, error handling, and Internetworking.
★ The protocol data unit associated with this layer is referred to as a “Packet”.
4. Transport Layer:
★ This layer is responsible for end-to-end delivery between hosts.
★ Perform error recovery and flow control with acknowledgments for data transfer.
★ The protocol data unit associated with this layer is referred to as a “datagram”.
5. Session Layer:
★ This layer maintains sessions between remote hosts. Ex. video conference.
★ It is responsible for establishing, controlling, and terminating communication
between networked hosts.
6. Presentation Layer:
★ It is mainly responsible for data format conversions and encryption tasks.
★ Provide syntactic compatibility of the data maintained across the network. This
layer is also referred to as the syntax layer.
★ The protocol data unit associated with this layer is referred to as “data”.
7. Application Layer:
★ This layer is responsible for providing an interface to the application user.
★ Applications such as file transfers, FTP (file transfer protocol), e-mails, and other
such operations are initiated from this layer.
★ This layer encompasses protocols that directly interact with the user.
★ This layer deals with user authentication, identification of communication hosts,
quality of service,and privacy.
★ The protocol data unit associated with this layer is referred to as “data”.
Internet protocol suite (TCP/IP: Transmission Control Protocol /
Internet protocol)
★ It is a four-layer model. It is derived from the OSI reference model. The TCP/IP
model is created to allow communication over long distances possible between
two devices. TCP/IP is the international standard for internet communication.
★ The Internet protocol suite is a conceptual framework that provides levels of
abstraction for ease of understanding and development of communication and
networked systems on the Internet. The protocol suite comprises the following 04
layers:
1. Link Layer :
★ It is the lowest layer of the TCP/IP model. It is also Known as the network
interface layer.
★ This layer is the combination of the Physical layer and Data Link layer defined in
the OSI reference model.
★ It defines how the data should be sent physically through the network.
★ This layer is mainly responsible for the transmission of the data between two
devices on the same network.
★ According to its design principles, the link layer is independent of the medium in
use, frame format, and network access, enabling it to be used with a wide range
of technologies such as the Ethernet, wireless LAN etc.
2. Internet Layer:
★ An internet layer is the second layer of the TCP/IP model. An internet layer is
also known as the network layer. It is responsible for addressing, address
translation, data packaging, data disassembly and assembly, routing, and packet
delivery tracking operations.
★ The protocols associated with this layer are
○ Internet Protocol (IP)
○ Address Resolution Protocol (ARP).
○ Internet Control Message Protocol (ICMP).
○ Internet Group Management Protocol (IGMP).
3. Transport Layer:
★ The transport layer is responsible for the reliability, segmentation, flow control,
and error control of data that is being sent over the network.
★ The two main protocols of this layer are Transmission Control Protocol (TCP) and
User Datagram Protocol (UDP) to take care of connection-oriented or
connectionless services respectively between two or more hosts or networked
devices.
4. Application Layer:
★ An application layer is a topmost layer in the TCP/IP model.
★ This layer enables an end-user to access the services of the underlying layers
and defines the protocols for the transfer of data.
★ The core protocols associated with this layer are
○ Hypertext Transfer Protocol (HTTP)
○ File Transfer Protocol (FTP)
○ Simple Mail Transfer Protocol (SMTP)
○ Domain Name System (DNS)
○ Routing Information Protocol (RIP Etc.
A networked communication between two hosts following the TCP/IP model is shown in
the Figure 1.4 below