0% found this document useful (0 votes)
67 views

Introduction To IoT (Internet of Things) Chapter 1 Notes

The document provides an introduction to the Internet of Things (IoT). It states that the number of connected devices worldwide is expected to grow from 25 billion in 2020 to 75 billion by 2025. These connected devices generate a huge variety of network traffic, including data from sensors, home automation systems, and vehicles. As technology gets smaller and cheaper, more devices are connecting to the Internet, greatly increasing network traffic. The Internet was originally designed for simple messaging but is now connected to all kinds of "Things" like appliances, sensors, cars, and other smart devices.

Uploaded by

kpadmaja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views

Introduction To IoT (Internet of Things) Chapter 1 Notes

The document provides an introduction to the Internet of Things (IoT). It states that the number of connected devices worldwide is expected to grow from 25 billion in 2020 to 75 billion by 2025. These connected devices generate a huge variety of network traffic, including data from sensors, home automation systems, and vehicles. As technology gets smaller and cheaper, more devices are connecting to the Internet, greatly increasing network traffic. The Internet was originally designed for simple messaging but is now connected to all kinds of "Things" like appliances, sensors, cars, and other smart devices.

Uploaded by

kpadmaja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Introduction to IoT(Internet of Things) notes

UNIT 1
Introduction to Internet of Things:
The Internet of Things is a popular concept that grew out of the rise of devices that can
connect to networks (IoT). Modern Internet lets a lot of different kinds of traffic through it
every second. This network traffic includes images, videos, music, speech,
text,numbers, binary codes, machine status, banking messages, data from sensors and
actuators, healthcare data, data from vehicles, status and control messages from home
automation systems, military communications, and a lot more. This huge variety of data
comes from all the devices connected to the Internet. These devices may be connected
directly to the Internet or through gateway devices. According to data from the
Information Handling Services, there will be about 25 billion connected devices
worldwide by 2020. This number is expected to triple in just 5 years by 2025. The below
figure shows the global trend for connected devices and how they are expected to
change in the future.

Both old and new systems can be responsible for the traffic that flows through the
Internet. Because technology is getting smaller and cheaper, more and more devices
can connect to the Internet. This is causing a huge increase in traffic on the
Internet.One of the best examples is how smartphones have changed over time. In the
late 1990s, cell phones were still expensive and could only be bought by a small few.
Also,these devices only had the most basic features, like making voice calls, sending
text messages, and sharing low-quality multimedia. Within the next 10 years, cell
phones were widely used and easy to afford, these gadgets' features changed, and as
time went on, more and more applications and services that ran on them needed
packet-based Internet access.Modern cell phones often called "smartphones," are
mostly based on the Internet.
Many apps on these devices, like messaging, video calls, e-mails, games, music
streaming, video streaming, and others, can only be used with Internet access or WiFi
from a network provider.

Most people who use smartphones today usually carry more than one of these devices.
In line with this trend, the number of other connected devices has grown quickly, and
now there are more devices than people on Earth by a large number. Now imagine that
as all technologies and fields move toward smart management of systems, the number
of systems based on sensors and actuators is growing quickly. With time, the need for
access to systems that are being watched and controlled from anywhere keeps
growing. This makes the number of devices that can connect to the Internet go up even
more.The Internet was first made to send simple messages, but now it is connected to
all kinds of "Things." These can be old devices, new computers, sensors, actuators,
home appliances, toys, clothes, shoes, cars, cameras, and anything else that can make
a
product better by making it smarter, more accurate, or even look better.

Basics of networking
Definition:
Computer networking refers to the linking of computers and communication network
devices (also referred to as hosts), which interconnect through a network that can
exchange data & share resources with each other.
Basic components of computer networks: The main network components are:
❖ Computer (clients, servers)
❖ Channels (wired or wireless)
❖ Interface or connecting devices (Router, Switch, etc)
❖ Software (Protocols, System Software, Application Software, etc.)

Importance of Computer networks: Today’s world relies heavily on data and


networking, which allows for the instant availability of information from anywhere on the
earth at any moment. Presently the world depends on data and information-centric
operations, everything right from agriculture to military operations relies heavily on
information. The main contributions of networks might be in economic productivity,
health care, education, quality of life etc.
The main features/advantages of computer networks are:

❖ Cost-effective resource sharing.


❖ Fast and reliable way of sharing information and resources.
❖ Streamline communication
❖ Provides secured and authorized data storage.
❖ Provides remote access to data. etc.

Network Types:
Computer networks are classified according to various parameters. They are

❖ Type of connection.
❖ Physical topology.
❖ Reach of the network.

Type of Connection:
There are two types of connection used. They are

❖ Point-to-point
❖ Point-to-multipoint.
Point-to-point:
This type is used to establish direct connections between two devices, for example, a
remote control for an AC or TV. The connected channel is dedicated to it only. These
networks were designed to work over duplex links and are functional for both
synchronous as well as asynchronous systems. These types of connected networks are
used for specific applications.
Point-to-Multipoint:
In this connection type, more than two computers (hosts) share the same link as shown
in figure 3. It finds popular use in wireless networks. Multiple access technology like
frequency division multiple access (FDMA), Time division multiple access (TDMA) are
used to share the channel by many hosts simultaneously. This connection finds popular
use in enabling communication between massive numbers of connected devices.

Physical topology: Topology defines the structure of the network of how all the
components are interconnected to each other. Network topologies are often represented
as a graph of the network. Computer networks can have the following four broad
topologies: Star, Mesh, Bus, and Ring.
(i) Star: In a star topology,
★ Every host has a point-to-point link to a central controller or hub.
★ Direct communication cannot be possible between the devices; they can only do
so through the
★ central controller.
★ The hub acts as the network traffic exchange.
★ Only one link per host as shown in the figure below
Advantages:
★ Star topology is simple and easier to install.
★ Easy fault detection because the link is often easily identified.
★ Centralized network management, so safe to use.
★ Itis very reliable — if one cable or device fails then all the others will still
★ work, and not have a big effect on the network performance.
★ Itis high-performing as no data collisions can occur
★ Disadvantages:
★ Requires more cables than a linear bus, hence expensive.
★ If the hub fails, the whole network fails
Disadvantages:
★ Requires more cables than a linear bus, hence expensive.
★ If the hub fails, the whole network fails

(ii) Mesh:In a mesh topology,Every host is connected to every other host using a
dedicated link.This implies that for n devices in a mesh, there are a total of n(n-1)/2
dedicated full duplex links between the hosts.Every node features a point-to-point
connection to the opposite node. (see fig 5) .The connections within the mesh are often
wired or wireless.
Advantages:
★ More robustness and resilience of the system.
★ It reduced data load on a single host.
★ It provides high privacy and security.
★ Failure during a single device won’t break the network.
★ Adding new devices won't disrupt data transmissions.
Disadvantages:
★ More complex and costly topology.
★ Installation is more difficult in the mesh.
★ Mesh networks are used very selectively, such as in backbone networks.
★ Power requirement is higher as all the nodes remain active all the time.
★ High challenging of maintenance.

(iii) Bus: In bus topology.


★ Follows the point-to-multipoint connection.
★ A backbone cable/ bus serves as the primary traffic pathway between the hosts.
★ The hosts are connected to the main bus employing drop lines or taps.
Advantages:
★ Installation is very easy and cheap to expand.
★ Supports multiple peripherals
★ Independent work by each device
★ No hubs or switches are required
Disadvantages:
★ Difficulty in fault localization within the network.
★ Size limitations- additional devices slow the network
★ Limited security options
★ Less reliable topology

(iv) Ring: In a ring topology,


★ Network configuration where device connections create a circular data path.
★ Works on the principle of a dedicated point-to-point connection.
★ The repetition of this system forms a ring.
★ Several repeaters are used for ring topology with a large number of nodes to
send data and prevent data loss in the network.
Advantages:
★ It is cheap to install and expand.
★ Fault identification is quite straightforward.
★ Here data flows in one direction will reduce the chance of packet collisions.
★ Equal access to resources.
Disadvantages:
★ High probability of a single point of failure.
★ If even one repeater fails, the whole network goes down.
★ Difficult to troubleshoot the ring.
(C) Network reachability: Computer networks are divided into four broad
categories based on network reachability:
1. Personal Area Networks (PAN)
2. Local Area Networks (LAN)
3. Wide Area Networks (WAN)
4. Metropolitan Area Networks (MAN)
Personal Area Networks (PAN):
It is the computer network that connects computers/devices within the range of a
person. It provides a network range within a person’s range typically range of 10
meters.Examples of PANs may be connected wireless headphones, wireless speakers,
printers, laptops, smartphones, wireless keyboards, wireless mouse, and entertainment
devices like speakers, video game consoles, etc (see fig. 7)

Local Area Networks (LAN):


It is a collection of hosts linked to a single network through wired or wireless
connections. LANs are restricted to buildings, organizations, or campuses.LANs cover a
range limited to a few kilometers and are privately owned.Commonly used network
components in a LAN are servers, hubs, routers, switches, terminals, and computers.
Typically, the data speed of LANs ranges from 10Mbps to 1000 Mbps
Metropolitan Area Networks (MAN):

★ It connects various organizations or buildings within a given geographic location


or city as shown in figure 8.
★ It connects two or more computers that are apart but reside in the same or
different cities. An example of a MAN is an Internet service provider (ISP)
supplying Internet connectivity to various organizations within a city.
★ MAN is designed for customers who need high-speed connectivity. Speeds of
MAN range in terms of Mbps.
★ Typical networking devices/components in MANs are modems and cables.
Wide Area Networks (WAN): It is a collection of local-area networks (LANs) or
other networks that communicate with one another.
★ WAN is a computer network that extends diverse geographic locations. However,
they are restricted within the boundaries of a state or country. The data rate of
WANs is in the order of a fraction of LAN’s data rate.
★ Typically, WANs connecting two LANs or MANs may use public switched
telephone networks (PSTNs) or satellite-based links. Due to the long
transmission ranges, WANs tend to have more errors and noise during
transmission and are very costly to maintain.
★ The fault tolerance of WANs is also generally low and moderate speed.

Layered Network Models:


A model is a systematic description of an object or phenomenon that shares important
characteristics. The model is often smaller than the object it represents.The network
model is a database model conceived as a flexible way of representing objects and their
relationships. In the layered architecture of the Network Model, one whole network
process is divided into small tasks. Each small task is then assigned to a particular layer
which works dedicatedly to process the task only. Two of the most commonly accepted
and used traditional layered network models are
1. OSI (Open System Interconnection) Model
2. Internet protocol suite (TCP/IP: Transmission Control Protocol / Internet
Protocol)

OSI (Open Systems Interconnection) Model:

It is a 7-layer standardized model. This model was developed by ISO (International


Standard Organization).Open System Interconnect is an open standard for all
communication systems. It is a conceptual framework that partitions any networked
communication device into SEVEN layers of abstraction, each performing distinct tasks
based on the underlying technology and internal structure of the hosts. These seven
layers, from bottom-up, are as follows: (figure 1.3)

1.Physical Layer:

★ This is a media layer and is also referred to as layer 1 of the OSI model.
★ This layer is responsible for taking care of the electrical and mechanical
operations of the host.
★ It defines the hardware, cabling wiring, signal generation, signal transfer,
voltages, the layout of cables, physical port layout, etc.
★ This layer is responsible for the topological layout of the network (star, mesh,
bus, or ring), communication mode (simplex, duplex,) and speed of bit rate.
★ The protocol data unit associated with this layer is referred to as a “bit”.

2. Data Link Layer:

★ This layer is mainly concerned with the establishment and termination of the
connection between two hosts (devices).
★ This layer is responsible for reading and writing data from and onto the line.
★ Perform error detection and correction during communication between two or
more connected hosts.
★ The protocol data unit associated with this layer is referred to as a “frame”.
★ This layer is further into TWO sub-layers
a. Medium access control (MAC) Layer: It is responsible for access control
and permissions for connecting networked devices.
b. Logical link control (LLC) Layer: It is responsible for error checking, flow
control, and frame synchronization.

3. Network Layer:

★ This layer is responsible for address assignment and routing data to various
devices connected to different networks through logical paths.
★ These logical paths may pass through other intermediate hosts (nodes) before
reaching the actual destination host.
★ The primary tasks of this layer include addressing, sequencing of
packets,congestion control, error handling, and Internetworking.
★ The protocol data unit associated with this layer is referred to as a “Packet”.

4. Transport Layer:
★ This layer is responsible for end-to-end delivery between hosts.
★ Perform error recovery and flow control with acknowledgments for data transfer.
★ The protocol data unit associated with this layer is referred to as a “datagram”.

5. Session Layer:
★ This layer maintains sessions between remote hosts. Ex. video conference.
★ It is responsible for establishing, controlling, and terminating communication
between networked hosts.

6. Presentation Layer:
★ It is mainly responsible for data format conversions and encryption tasks.
★ Provide syntactic compatibility of the data maintained across the network. This
layer is also referred to as the syntax layer.
★ The protocol data unit associated with this layer is referred to as “data”.

7. Application Layer:
★ This layer is responsible for providing an interface to the application user.
★ Applications such as file transfers, FTP (file transfer protocol), e-mails, and other
such operations are initiated from this layer.
★ This layer encompasses protocols that directly interact with the user.
★ This layer deals with user authentication, identification of communication hosts,
quality of service,and privacy.
★ The protocol data unit associated with this layer is referred to as “data”.
Internet protocol suite (TCP/IP: Transmission Control Protocol /
Internet protocol)
★ It is a four-layer model. It is derived from the OSI reference model. The TCP/IP
model is created to allow communication over long distances possible between
two devices. TCP/IP is the international standard for internet communication.
★ The Internet protocol suite is a conceptual framework that provides levels of
abstraction for ease of understanding and development of communication and
networked systems on the Internet. The protocol suite comprises the following 04
layers:
1. Link Layer :
★ It is the lowest layer of the TCP/IP model. It is also Known as the network
interface layer.
★ This layer is the combination of the Physical layer and Data Link layer defined in
the OSI reference model.
★ It defines how the data should be sent physically through the network.
★ This layer is mainly responsible for the transmission of the data between two
devices on the same network.
★ According to its design principles, the link layer is independent of the medium in
use, frame format, and network access, enabling it to be used with a wide range
of technologies such as the Ethernet, wireless LAN etc.
2. Internet Layer:
★ An internet layer is the second layer of the TCP/IP model. An internet layer is
also known as the network layer. It is responsible for addressing, address
translation, data packaging, data disassembly and assembly, routing, and packet
delivery tracking operations.
★ The protocols associated with this layer are
○ Internet Protocol (IP)
○ Address Resolution Protocol (ARP).
○ Internet Control Message Protocol (ICMP).
○ Internet Group Management Protocol (IGMP).
3. Transport Layer:
★ The transport layer is responsible for the reliability, segmentation, flow control,
and error control of data that is being sent over the network.
★ The two main protocols of this layer are Transmission Control Protocol (TCP) and
User Datagram Protocol (UDP) to take care of connection-oriented or
connectionless services respectively between two or more hosts or networked
devices.
4. Application Layer:
★ An application layer is a topmost layer in the TCP/IP model.
★ This layer enables an end-user to access the services of the underlying layers
and defines the protocols for the transfer of data.
★ The core protocols associated with this layer are
○ Hypertext Transfer Protocol (HTTP)
○ File Transfer Protocol (FTP)
○ Simple Mail Transfer Protocol (SMTP)
○ Domain Name System (DNS)
○ Routing Information Protocol (RIP Etc.
A networked communication between two hosts following the TCP/IP model is shown in
the Figure 1.4 below

You might also like