[go: up one dir, main page]

0% found this document useful (0 votes)
35 views96 pages

Unit-1 IOT

The document discusses the fundamentals of the Internet of Things (IoT). It introduces IoT, describing its characteristics and key concepts like physical design, functional blocks, sensing, actuation and communication protocols. It also covers topics like IoT applications and communication models.

Uploaded by

mohith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views96 pages

Unit-1 IOT

The document discusses the fundamentals of the Internet of Things (IoT). It introduces IoT, describing its characteristics and key concepts like physical design, functional blocks, sensing, actuation and communication protocols. It also covers topics like IoT applications and communication models.

Uploaded by

mohith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 96

FUNDAMENTALS

OF INTERNET
OF THINGS
UNIT-1
INTRODUCTION TO INTERNET OF THINGS
 INTRODUCTION OF IOT
 CHARACTERISTICS OF IOT
 PHYSICAL DESIGN OF IOT
 FUNCTIONAL BLOCKS OF IOT
 SENSING
 ACTUATION
 BASICS OF NETWORKING
 COMMUNICATION PROTOCOLS
 SENSOR NETWORKING
INTRODUCTION

 “Internet of Things” was coined by Kevin Ashton in


1999, and it has recently become more relevant to the
practical world largely because of the growth of mobile
devices, embedded and ubiquitous communication,
cloud computing and data analytics.

 Internet of Things would be a $8.9 trillion market in


2020.
INTRODUCTION-CONT

 Imagine a world where billions of objects can sense,


communicate and share information, all interconnected
over public or private Internet Protocol (IP) networks.
 These interconnected objects have data regularly
collected, analyzed and used to initiate action,
providing a wealth of intelligence for planning,
management and decision making.
 This is the world of the Internet of Things.
 IOT comprises things that have unique identities and
are connected to the Internet.
 While many existing devices, such as networked
computers or 4G enabled mobile phones.
 The focus on IOT is in the configuration, control and
networking via Internet devices or Things that are
traditionally not associated with the Internet.
 These include devices such as thermostats, utility
meters, Bluetooth-connected headset, irrigation pumps,
and sensors or control circuits for an electric car’s
engine.
FIG: 1 INFERRING INFORMATION AND KNOWLEDGE FROM DATA
 The scope of IOT is not limited to just connecting things
(devices, appliances, machines) to the Internet.
 IOT allows these things to communicate and exchange
data (control & Information, that could include data
associated with users) while executing meaning full
applications towards a common user or machine goal.
 Data itself does not have a meaning until it is
contextualized processed into useful information.
 Applications on IoT networks extract and create
information from lower level data by filtering,
processing, categorizing, condensing and contextualizing
the data.
 This information obtained is then organized and
structured to infer knowledge about the system or its
users, its environment, and its operations and progress
towards its objectives, allowing a smarter performnce.
APPLICATIONS OF IOT
DEFINITION AND CHARACTERISTICS OF IOT

 Definition :
The Internet of things refers to a type of network to connect
anything with the Internet based on stipulated protocols
through information sensing equipments to conduct
information exchange and communications in order to
achieve smart recognitions, positioning, tracing, monitoring,
and administration.
 A dynamic global network infrastructure with self-
configuring capabilities based on standard and interoperable
communication protocols where physical and virtual "things"
have identities, physical attributes and virtual personalities,
use intelligent interfaces, are seamlessly integrated into the
information network, and often communicate data associated
with users and their environments .
CHARACTERISTICS OF IOT

 Dynamic & Self-Adapting

 Self-Configuring

 Interoperable Communication Protocols

 Unique Identity

 Integrated into Information Network


DYNAMIC & SELF-ADAPTING
 IoT devices and systems may have the capability to
dynamically adapt with the contexts and take actions
based on their operating conditions, users context, or
sensed environment.

 The state of devices change dynamically, e.g., sleeping


and waking up, connected and/or disconnected as well as
the context of devices including location and speed.

 Ex: surveillance Cameras

 Moreover, the number of devices can change dynamically


SELF-CONFIGURING
 IoT devices may have self-configuring
capability, allowing large number of devices
to work together to provide certain
functionality(such as weather monitoring).

 These devices have the ability configure


themselves setup the networking and fetch
latest software upgrades with minimal
manual or user intervention.
INTEROPERABLE COMMUNICATION
PROTOCOLS
 IoT devices may support a number of
interoperable communication protocols and
can communicate with other devices and also
with the infrastructure.

 Ex: TCP, Udp, IPv4,IPv6,802.3 ethernet,


802.11-wifi, 2G/3G/LTE Cellular…etc..
UNIQUE IDENTITY
 Each IoT device has a unique identity and a unique
identifier (such as IP address or URI).

 IoT systems may have intelligent interfaces which


adapt based on the context, allowing with users and the
environmental contexts.

 IoT device interfaces allows user to query the devices,


monitor their status, and control them remotely, in
association with the control, configuration and
management infrastructure.
INTEGRATED INTO INFORMATION NETWORK

 IoT devices are usually integrated into the information


network that allows them to communicate and
exchange data with other devices and systems.

 IoT devices can be dynamically discovered in the


network , by the other devices and/or the network, and
have the capability to describe themselves to other
devices or user applications.

 Ex: weather monitoring


PHYSICAL DESIGN OF IOT
 The "Things" in IoT usually refers to IoT devices which
have unique identities and can perform remote sensing,
actuating and monitoring capabilities.
 IoT devices can:
 Exchange data with other connected devices and
applications (directly or indirectly). (Or)
 Collect data from other devices and process the data
locally or Send the data to centralized servers (or)
 cloud-based application back-ends for processing the
data, (or)
 Perform some tasks locally and other tasks within the
IoT infrastructure, based on temporal and space
constraints.(i.e; memory, processing capabilities,
communication latencies, and speeds and deadlines)
GENERIC BLOCK DIAGRAM OF AN IOT DEVICE

• An IoT device may consist


of several interfaces for
connections to other
devices, both wired and
wireless.
• I/O interfaces for sensors
• Interfaces for
Internet
connectivity
• Memory and
storage
interfaces
• Audio/video
interfaces.
IOT DEVICES

 IoT devices can also be varied types, instance,


wearable sensors, smart watches, LED lights,
automobiles and industrial machines.

 All most all IoT devices generate data in some


form or the other which when processed by data
analytics system leads to useful information to
guide further actions locally or remotely.

 Ex: Soil Moisture monitoring device


FUNCTIONAL BLOCK OF IOT
 The functional block of the system provides the
capabilities for identification, sensing,
actuation, communication and management.
Various components of IoT functional block are
as follows.
 • Device
 • Communications
 • Services
 • Management
 • Security
 • Application
FUNCTIONAL BLOCK OF IOT
FUNCTIONAL BLOCK OF IOT
 Device:
 I. IoT i.e Internet of things, where things refer to the IoT devices
which have unique identities and can perform remote sensing,
actuating and monitoring capabilities and control functions (ex:
combination of sensors, actuators, Arduino, relay and non IoT
devices).
 II. The IoT devices can share information with as well as collect
information from other connected devices and applications
(directly and indirectly).
 III. They can process the data locally or in the cloud to find
greater insights and put them into action based on temporal and
space constraints (i.e space memory, processing capabilities,
communication latencies and speeds and deadlines).
 IV. IoT devices can be of varied types. For ex: wearable
sensors, smart watches, LED lights, automobiles and industrial
machines.
FUNCTIONAL BLOCK OF IOT
 Communications: It refers to various communication
protocols which allows different devices to communicate
with each other by sharing some information. It also allows
interoperability among different devices.

 Services: IoT system provides various services such as


device monitoring, device control services, data publishing
services, and services for device discovery.

 Management: Various management functions to govern


the IoT system.
FUNCTIONAL BLOCK OF IOT
 Security: It secures the IoT system by providing
authentication, authorization, message and content integrity
and data security.

 Application:
I. IoT applications provide an interface that the users can
use to control and monitor various aspects of the IoT
system.
II. It also allows viewing the system status and view or
analysing the processed data.
IOT COMMUNICATION MODEL
 1. Request-Response communication model

 2. Publish-Subscribe communication model

 3. Push-Pull communication model

 4. Exclusive Pair communication model


1. REQUEST-RESPONSE COMMUNICATION MODEL

 Request-Response is a
communication model in
which the client sends
requests to the server and the
server responds to the
requests.

 When the server receives a


request, it decides how to
respond, fetches the data,
retrieves resource
representations, prepares the
response, and then sends the
response to the client.
2.PUBLISH-SUBSCRIBE COMMUNICATION MODEL

 Publish-Subscribe is a
communication model that
involves publishers, brokers and
consumers.
 Publishers are the source of data.
Publishers send the data to the
topics which are managed by the
broker. Publishers are not aware
of the consumers.
 Consumers subscribe to the
topics which are managed by the
broker.
 When the broker receives data
for a topic from the publisher, it
sends the data to all the
subscribed consumers
Push-Pull communication
model
 Push-Pull is a communication
model in which the data
producers push the data to queues
and the consumers pull the data
from the queues. Producers do
not need to be aware of the
consumers.
 Queues help in decoupling the
messaging between the producers
and consumers.
 Queues also act as a buffer which
helps in situations when there is a
mismatch between the rate at
which the producers push data
and the rate at which the
consumers pull data.
4. EXCLUSIVE PAIR COMMUNICATION MODEL

 Exclusive Pair is a
bidirectional, fully duplex
communication model that
uses a persistent
connection between the
client and server.
 Once the connection is
setup it remains open until
the client sends a request
to close the connection.
 Client and server can send
messages to each other
after connection setup.
IOT COMMUNICATION API’S
 1. REST-based Communication APIs

 2. WebSocket-based Communication APIs

 3. Exclusive Pair communication model


1. REST-BASED COMMUNICATION APIS

 Representational State Transfer


(REST) is a set of architectural
principles by which you can
design web services and web
APIs that focus on a system’s
resources and how resource
states are addressed and
transferred.
 REST APIs follow the request-
response communication model.
 The REST architectural
constraints apply to the
components, connectors, and
data elements, within a
distributed hypermedia system.
WEBSOCKET-BASED COMMUNICATION APIS
 WebSocket APIs
allow bi-directional,
full duplex
communication
between clients and
servers.

 WebSocket APIs
follow the exclusive
pair communication
model
EXCLUSIVE PAIR COMMUNICATION MODEL
 Exclusive Pair is a
bidirectional, fully duplex
communication model that
uses a persistent
connection between the
client and server.
 Once the connection is
setup it remains open until
the client sends a request
to close the connection.
 Client and server can send
messages to each other
after connection setup.
SENSING
 Sensors play an important role in creating solutions
using IoT. Sensors are devices that detect external
information, replacing it with a signal that humans and
machines can distinguish.

 The main purpose of sensors is to collect data from


the surrounding environment. Sensors, or 'things' of
the IoT system, form the front end.

 These are connected directly or indirectly


to IoT networks after signal conversion and
processing.
SENSING

Sensors measure or identify a particular quantity
Convert physical quantities to electrical signals understood by

machines
SENSING
 An IoT system consists of sensors/devices which “talk” to
the cloud through some kind of connectivity. Once the data
gets to the cloud, software processes it and then might
decide to perform an action, such as sending an alert or
automatically adjusting the sensors/devices without the
need for the user
Types of sensor:
 Temperature Sensor.

 Proximity Sensor.

 Accelerometer.

 IR Sensor (Infrared Sensor)

 Pressure Sensor.

 Light Sensor.

 Ultrasonic Sensor.

 Smoke, Gas and Alcohol Sensor.

 Etc…
TYPE OF SENSORS
PICTURES OF SENSORS
TOP APPLICATIONS OF SENSORS

 1. Automotive
 Braking and Traction control
 Air Bags
 Engine Data
 Heating
 ventilation
 Air-condition
 Navigation
 Safety Features
 Security
 Remote locking
TOP APPLICATIONS OF SENSORS
2. Manufacturing

 Predictive maintenance of the machinery, Assembly


equipment using the data collected from sensors in
the machines.
 Optimal utilization of Machines by continuously
monitoring .
 Fine-tuning the Quality systems and enhance the
quality standards using the data collected from
sensors. Design notifications and alerts in case of a
deterioration of quality and process standards.
 Agility in reacting to market demands.
TOP APPLICATIONS OF SENSORS
 3. Aviation
 Sensors deployed in the aviation industry
measures the data during navigation of
aircraft, monitoring various systems, and
controlling instruments. These data are
utilized inefficient flight operations, improve
aircraft performance and design
improvements.
TOP APPLICATIONS OF SENSORS
 3. Aviation
 Sensors deployed in the aviation industry
measures the data during navigation of
aircraft, monitoring various systems, and
controlling instruments. These data are
utilized inefficient flight operations, improve
aircraft performance and design
improvements.
TOP APPLICATIONS OF SENSORS
4. Medical & Healthcare
 Signals generated by Sensors in Medical equipment,

surgical instruments and devices are used for diagnosis,


treatment and control functions by Doctors.
 Some of the applications are:
 Blood pressure monitoring (self).

 Continuous glucose monitoring by Individuals.

 Automatic measurement of vitals of the patient and

sending it to the patient’s doctor.


 More home care facilities and ambulatory treatments.

 Automatic detection of visitors spreading the disease to

patients in hospitals.
 Decentralized laboratories.

 Robotics in Operation Theater.


TOP APPLICATIONS OF SENSORS
5. Marine
 Sensors in ship measures fuel tank levels,
liquid cargo levels, tank
pressure/temperature. Pitch, roll, speed and
other vessel moments are also measured and
monitored with sensors’ help. There are a lot
of sensors in Engines measuring typical
attributes of internal combustion
parameters.
SENSORS MEASURE THE FOLLOWING PROPERTIES
 1. Distance  13.Altitude
 2. Temperature  14. Motion
 3. Sound Intensity  15. Crushing
 4. Pressure  16. Conductivity
 5. Proximity  17. Flow
 6. Speed  18. Level
 7. Velocity  19. Force
 8. Torque  20. Hydro Carbon
 9. Tilt  21. Microwave
 10.Oxygen Radiation and many
 11. Acceleration more
MOBILE PHONE : A SENSOR HUB
Example:

47
ACTUATION
 Sensor generates electrical signals while
an actuator results in the production of
energy in the form of heat or motion.

 Magnetometer, cameras, microphones are


some of the examples in which the sensor is
used. In contrast, actuators are used in the
LED, loudspeaker, motor controllers, laser
etc...
ACTUATION-ACTUATOR
 An actuator is a component of a machine that is
responsible for moving and controlling a
mechanism or system, for example by opening a
valve. In simple terms, it is a "mover".
An actuator requires a control signal and a
source of energy.

 In simple terms, an actuator operates in the


reverse direction of a sensor. It takes an
electrical input and turns it into physical action.
For instance, an electric motor, a hydraulic
system, and a pneumatic system are all different
types of actuators.
ACTUATION-ACTUATOR
 An actuator is a machine component or system
that moves or controls the mechanism or the
system. Sensors in the device sense the
environment, then control signals are generated
for the actuators according to the actions needed
to perform.

 A servo motor is an example of an actuator. They


are linear or rotatory actuators, can move to a
given specified angular or linear position. We can
use servo motors for IoT applications and make
the motor rotate to 90 degrees, 180 degrees,
etc., as per our need.
EXAMPLE
The following diagram shows what actuators do, the controller
directs the actuator based on the sensor data to do the work.
The control system acts upon an environment through the
actuator. It requires a source of energy and a control signal.
When it receives a control signal, it converts the source of
energy to a mechanical operation.
HYDRAULIC ACTUATORS
1. Hydraulic Actuators –
 A hydraulic actuator uses hydraulic
power to perform a mechanical
operation. They are actuated by a
cylinder or fluid motor. The
mechanical motion is converted to
rotary, linear, or oscillatory
motion, according to the need of
the IoT device. Ex- construction
equipment uses hydraulic
actuators because hydraulic
actuators can generate a large
amount of force.
Advantages :
 Used in welding, clamping, etc.
 Used for lowering or raising the
vehicles in car transport carriers.
PNEUMATIC ACTUATORS
2. Pneumatic Actuators –
 A pneumatic actuator uses energy
formed by vacuum or compressed
air at high pressure to convert into
either linear or rotary motion.
Example- Used in robotics, use
sensors that work like human
fingers by using compressed air.
Advantages :
 They are a low-cost option and are
used at extreme temperatures
where using air is a safer option
than chemicals.
 They need low maintenance, are
durable, and have a long
operational life.
 It is very quick in starting and
stopping the motion.
ELECTRICAL ACTUATORS
 3. Electrical Actuators –
 An electric actuator uses
electrical energy, is usually
actuated by a motor that
converts electrical energy
into mechanical torque. An
example of an electric
actuator is a solenoid based
electric bell.
 Advantages :
 It has many applications in
various industries as it can
automate industrial valves.
 It produces less noise and is
safe to use since there are no
fluid leakages.
ACTUATOR
A device that takes the actions as per the input command, pulse, state (1/0), set of
1s and 0s or control signal. An attached motor, speaker, LED or an output device
converts electrical energy into physical action.
Piezoelectric vibrator : Piezoelectric crystals when applied varying electric
voltages at input generate vibrations
Motor : can be dc/ac; I/O modules available to receive control digital inputs
of 1/0 deliver high currents. A cam converts rotator motion into linear motion
when motor rotates.
Relay Switch : An electronic switch can be controlled by 1/0 from the port pin of
microcontroller. A relay switch makes mechanical contact when input magnetizes
with a control circuit and pulls a lever to make the contact
ACTUATOR IN IOT
 In a typical IoT system, a
sensor may collect
information and route to a
control center. There,
previously defined logic
dictates the decision. As a
result, a corresponding
command controls
an actuator in response to
that sensed input. Thus,
sensors and actuators in IoT
work together from opposite
ends. Later, we will discuss
where the control center
resides in the greater IoT
system.
IOT PROTOCOLS
• Link Layer
• 802.3 – Ethernet
• 802.11 – WiFi
• 802.16 – WiMax
• 802.15.4 – LR-
WPAN
• 2G/3G/4G
• Network/Internet
Layer
• IPv4
• IPv6
• 6LoWPAN
• Transport Layer
• TCP
• UDP
• Application Layer
• HTTP
• CoAP
• WebSocket
• MQTT
• XMPP
• DDS
• AMQP
LINK LAYER:
 Link Layer: Link Layer protocols determine how the
data is physically sent over the networks physical layer
or medium(example copper wire, electrical cable, or
radio wave).

 The Scope of The Link Layer is the Last Local Network


connections to which host is attached. Host on the same
link exchange data packets over the link layer using the
link layer protocol.

 Link layer determines how the packets are coded and


signaled by the hardware device over the medium to
which the host is attached.
 802.3 Ethernet: 802.3 is a collections of wired Ethernet
standards for the link layer. For example 802.3 10BASE5
Ethernet that uses coaxial cable as a shared medium, 802.3.i is
standard for 10 BASET Ethernet over copper twisted pair
connection, Standards provide data rates from 10 Mb/s to 40
gigabits per second and the higher.

 The shared medium in Ethernet can be a coaxial cable , twisted


pair wire or and Optical fiber. Shared medium carries the
communication for all the devices on the network.

 802.1- WI-FI: IEEE 802.3 is a collections of wireless Local area


network.(WLAN) communication standards, including extensive
descriptions of the link layer. For example 802.11a operate in the
5 GHz band, 802.11b and 802.11g operate in the 2.4 GHz band.
802.11ac operates in the 5G hertz band.
 802.16 wiMAX: IEEE 802.16 is a collection of wirless
broadband and Standards, including extensive descriptions for
the link layer also called WiMAX.

 wimax standard provides a data rates from from 1.5 Mb/s to


1Gb/s the recent update provides data rates of hundred megabits
per second for mobile station.

 802.15.4 LR-WPAN: IEEE 802.1 5.4 is a collections of


standard for low rate wireless personal area network(LRWPAN).

 These standard form the basis of specifications for high level


communication Zigbee. LR-WPAN standards provide data rates
from 40 k b/ s. These standards provide low cost and low speed
Communications for power constrained devices.
 2G / 3G / 4G mobile communications: These are
the different generations of mobile communication
standards including second generation (2G
including GSM and CDMA). 3rd Generation (3G
including UMTS and CDMA2000) and 4th
generation 4G including LTE.
NETWORK / INTERNET LAYER :
 Network / internet layer : The network layer are
responsible for sending of IP datagrams from the source
network to the destination network. This layer Performs the
host addressing and packet routing.
 The datagrams contains a source and destination address
which are used to route them from the source to the
destination across multiple networks. Host Identification is
done using the hierarchy IP addressing schemes such as
ipv4 or IPv6.
 IPV4: Internet protocol versions for open parents close
(IPV4) is there most deployed internet protocol that is used
to identify the device is on a network using a hierarchy
latest schemes. It uses 32 bit addresses scheme that allows
total of 2 32 address. As more and more devices got
connected to the internet. The Ipv4 has succeeded by IPv6.

 IPv6: It is the newest versions of internet protocol and


successor to IPv4. IPv6 uses 128 bit address schemes that
are lost total of 2 128 are 3.4* 10 38 address.

 6LoWPAN: IPv6 over low power wireless personal area


networks brings IP protocol to the low power device which
have limited processing capability it operate in the 2.4 GHz
frequency range and provide the data transfer rate off to 50
kb/s.
TRANSPORT LAYER
 Transport layer : The Transport layer protocols provides end-
to-end message transfer capability independent of the
underlying network.
 The message transfer capability can be set up on connections,
either using handshake or without handshake
acknowledgements. Provides functions such as error control ,
segmentation, flow control and congestion control.
 TCP: Transmission control protocol is the most widely used to
transport layer protocol that is used by the web browsers along
with HTTP , HTTPS application layer protocols email program
(SMTP application layer protocol) and file transfer protocol.
 TCP is a connection Oriented and stateful protocol while IP
protocol deals with sending packets, TCP ensures reliable
transmissions of packets in order.
 TCP also provide error deduction capability so that
duplicate packets can be discarded and low packets
are retransmitted.
 The flow control capability ensures that the rate at which
the sender since the data is now to too to high for the
receiver to process.

 UDP: unlike TCP, which requires carrying out an initial


setup procedure, UDP is a connection less protocol. UDP
is useful for time sensitive application they have very
small data units to exchange and do not want the overhead
of connection setup.

 UDP is a transactions oriented and stateless protocol. UDP


does not provide guaranteed delivery, ordering of
messages and duplicate eliminations.
APPLICATION LAYER

 Application layer : Application layer protocol define how


the application interfaces with the lower layer protocols to
send the data over the network.

 Data are typically in files, is encoded by the application


layer protocol and encapsulated in the transport layer
protocol .Application layer protocol enable process-to-
process connection using ports.

 Http: Hypertext transfer protocol is the application layer


protocol that forms the foundations of world wide web http
includes, ,commands such as GET, PUT, POST, DELETE,
HEAD, TRACE, OPTIONS etc.
 The protocol follows a request response model where are
client sends request to server using the http, commands.

 Http is a stateless protocol and each http request is


independent father request and http client can be a
browser or an application running on the client example
and application running on an IoT device ,mobile mobile
applications or other software.

 CoAP: Constrained application protocol is an application


layer protocol for machine to machine application M2M
meant for constrained environment with constrained
devices and constrained networks..
 Like http CoAP is a web transfer protocol and uses a
request- response model, however it runs on the top of the
UDP instead of TCP. CoAP uses a client –server
architecture where client communicate with server using
connectionless datagrams. It is designed to easily interface
with http like http, CoAP supports method such as GET,
PUT, DELETE .

 Websocket: Websocket protocol allows full duplex


communication over a single socket connections for
sending message between client and server. Websocket is
based on TCP and Allows streams of messages to be sent
back and forth between the client and server while keeping
the TCP connection open. The client can be a browser, a
mobile application and IoT device
 MQTT :Message Queue Telemetry Transport it is a lightweight
message protocol based on public -subscribe model. MQTT uses
a client server Architecture where the clients connect to the
server and publishes message to topic on the server. The broker
forward the message to the clients subscribed to topics.
 MQTT is well suited for constrained and environments where
the devices have limited processing and memory resources and
the network bandwidth is low.

 XMPP: Extensible Messaging and Presence Protocol it is a


protocol for real-time communication and streaming XML data
between network entities XMPP powers wide range of
applications including messaging, presence, data syndication,
gaming multiparty chat and voice / voice calls.
 XMPP Allows sending small chunks of XML data from one
network entity to another in real time. XMPP supports both
client to server and server –client communication path.
 DDS: Data distribution service is the date centric
middleware standard for deviceto-device machine to
machine communication DDS uses a publish subscribe
model where publisher create topics to which subscribers
can subscribe.
 publisher is an object responsible for data distributions
and the subscriber responsible for receiving published
data. DDS provide quality of service (QoS) control and
configurable reliability
 AMQP: Advanced Message Queuing protocols. it is an
open application layer protocol for business messaging.
AMQP support point to point and publisher/subscriber
models, routing and queuing.
 AMQP broker receive message from publishers and
about them over connections to consumers. publishers
publish the message to exchange which then distribute
message copies to queues.
7. BASICS OF NETWORKING

Introduction:

 Switches, routers, and wireless access points


are the essential networking basics. Through
them, devices connected to your network
can communicate with one another and with
other networks, like the Internet. Switches,
routers, and wireless access points perform
very different functions in a network.
SWITCHES
 Switches are the foundation
of most business networks. A
switch acts as a controller,
connecting computers,
printers, and servers to a
network in a building or a
campus.

 Switches allow devices on your


network to communicate with
each other, as well as with
other networks, creating a
network of shared resources.
Through information sharing
and resource allocation,
switches save money and
increase productivity.
TYPES OF SWITCHES
 There are two basic types of switches to choose
from as part of your networking basics: on-
premises and cloud-managed.

 A managed on-premises switch lets you configure


and monitor your LAN, giving you tighter control
of your network traffic.

 Have a small IT team? A cloud-managed switch


can simplify your network management. You get a
simple user interface, multisite full-stack
management, and automatic updates delivered
directly to the switch.
ROUTERS
 Routers connect multiple
networks together. They also
connect computers on those
networks to the Internet. Routers
enable all networked computers
to share a single Internet
connection, which saves money.
 A router acts a dispatcher. It
analyzes data being sent across a
network, chooses the best route
for data to travel, and sends it on
its way.
 Routers connect your business to
the world, protect information
from security threats, and can
even decide which computers
receive priority over others.
ROUTERS

 Beyond those basic networking functions,


routers come with additional features to
make networking easier or more secure.
Depending on your security needs, for
example, you can choose a router with a
firewall, a virtual private network (VPN), or
an Internet Protocol (IP) communications
system.
ACCESS POINT

 An access point allows devices to


connect to the wireless network
without cables. A wireless
network makes it easy to bring
new devices online and provides
flexible support to mobile
workers.

 An access point acts like an


amplifier for your network.
While a router provides the
bandwidth, an access point
extends that bandwidth so that
the network can support many
devices, and those devices can
access the network from farther
away.
7.1 WIRELESS NETWORKING

 To create your wireless network, you can


choose between three types of deployment:
centralized deployment, converged
deployment, and cloud-based deployment
1. CENTRALIZED DEPLOYMENT

 The most common type of


wireless network system,
centralized deployments are
traditionally used in campuses
where buildings and networks
are in close proximity.

 This deployment consolidates


the wireless network, which
makes upgrades easier and
facilitates advanced wireless
functionality. Controllers are
based on-premises and are
installed in a centralized
location.
2. CONVERGED DEPLOYMENT

 For small campuses or


branch offices,
converged deployments
offer consistency in
wireless and wired
connections.

 This deployment
converges wired and
wireless on one network
device—an access switch
—and performs the dual
role of both switch and
wireless controller.
3. CLOUD-BASED DEPLOYMENT

 This system uses the


cloud to manage
network devices
deployed on-premises
at different locations.
The solution requires
Cisco Meraki cloud-
managed devices,
which provide full
visibility of the
network through their
dashboards.
TYPES OF NETWORKS

 Types of Networks
1.PERSONAL AREA NETWORK (PAN)

 The smallest and most


basic type of network, a
PAN is made up of a
wireless modem, a
computer or two, phones,
printers, tablets, etc., and
revolves around one
person in one building.

 These types of networks
are typically found in small
offices or residences, and
are managed by one
person or organization
from a single device.
2.LOCAL AREA NETWORK (LAN)

Local Area Network (LAN)


 LANs connect groups of
computers and low-voltage
devices together across short
distances (within a building or
between a group of two or
three buildings in close
proximity to each other) to
share information and
resources. Enterprises typically
manage and maintain LANs.

 Using routers, LANs can


connect to wide area networks
(WANs, explained below) to
rapidly and safely transfer
data.
3. METROPOLITAN AREA NETWORK (MAN)

 These types of networks


are larger than LANs but
smaller than WANs – and
incorporate elements from
both types of networks.
MANs span an entire
geographic area (typically
a town or city, but
sometimes a campus).

 Ownership and
maintenance is handled by
either a single person or
company (a local council, a
large company, etc.).
4.WIDE AREA NETWORK (WAN)
 Slightly more complex
than a LAN, a WAN
connects computers
together across longer
physical distances.

 This allows computers


and low-voltage devices
to be remotely
connected to each other
over one large network
to communicate even
when they’re miles
apart.
OTHER TYPES OF NETWORKS
1. Wireless Local Area Network (WLAN)
 Functioning like a LAN, WLANs make use of wireless network
technology, such as Wi-Fi. Typically seen in the same types of
applications as LANs, these types of networks don’t require that
devices rely on physical cables to connect to the network.
2. Campus Area Network (CAN)
 Larger than LANs, but smaller than metropolitan area networks
(MANs, explained below), these types of networks are typically
seen in universities, large K-12 school districts or small
businesses.
3. Storage-Area Network (SAN)
 As a dedicated high-speed network that connects shared pools of
storage devices to several servers, these types of networks don’t
rely on a LAN or WAN. Instead, they move storage resources away
from the network and place them into their own high-
performance network
OTHER TYPES OF NETWORKS
4. System-Area Network (also known as SAN)
 This term is fairly new within the past two decades. It is used to explain a
relatively local network that is designed to provide high-speed connection
in server-to-server applications (cluster environments), storage area
networks (called “SANs” as well) and processor-to-processor applications

5. Passive Optical Local Area Network (POLAN)


 As an alternative to traditional switch-based Ethernet LANs, POLAN
technology can be integrated into structured cabling to overcome
concerns about supporting traditional Ethernet protocols and network
applications such as PoE (Power over Ethernet.

6. Enterprise Private Network (EPN)


 These types of networks are built and owned by businesses that want to
securely connect its various locations to share computer resources.
8.COMMUNICATION PROTOCOLS
 LIST OF PROTOCOLS
 Transmission Control Protocol (TCP)
 Internet Protocol (IP)
 User Datagram Protocol (UDP)
 Post office Protocol (POP)
 Simple mail transport Protocol (SMTP)
 File Transfer Protocol (FTP)
 Hyper Text Transfer Protocol (HTTP)
 Hyper Text Transfer Protocol Secure (HTTPS)
 Telnet
 Gopher
COMMUNICATION PROTOCOLS
 Transmission Control Protocol (TCP): TCP is a popular communication
protocol which is used for communicating over a network. It divides any
message into series of packets that are sent from source to destination
and there it gets reassembled at the destination.
 Internet Protocol (IP): IP is designed explicitly as addressing protocol.
It is mostly used with TCP. The IP addresses in packets help in routing
them through different nodes in a network until it reaches the
destination system. TCP/IP is the most popular protocol connecting the
networks.
 User Datagram Protocol (UDP): UDP is a substitute communication
protocol to Transmission Control Protocol implemented primarily for
creating loss-tolerating and low-latency linking between different
applications.
 Post office Protocol (POP): POP3 is designed for receiving incoming E-
mails.
 Simple mail transport Protocol (SMTP): SMTP is designed to send and
distribute outgoing E-Mail.
COMMUNICATION PROTOCOLS
 File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to
another. Types of files may include program files, multimedia files, text files, and
documents, etc.

 Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext
among two or more systems. HTML tags are used for creating links. These links
may be in any form like text or images. HTTP is designed on Client-server
principles which allow a client system for establishing a connection with the
server machine for making a request. The server acknowledges the request
initiated by the client and responds accordingly.

 Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text
Transfer Protocol Secure is a standard protocol to secure the communication
among two computers one using the browser and other fetching data from web
server. HTTP is used for transferring data between the client browser (request)
and the web server (response) in the hypertext format, same in case of HTTPS
except that the transferring of data is done in an encrypted format. So it can be
said that https thwart hackers from interpretation or modification of data
throughout the transfer of packets.
SENSOR NETWORK
 A sensor network comprises a group of small,
powered devices, and a wireless or wired networked
infrastructure.

 They record conditions in any number of environments


including industrial facilities, farms, and hospitals. The
sensor network connects to the internet or computer
networks to transfer data for analysis and use.

 Sensor network nodes cooperatively sense and control


the environment. They enable interaction between
persons or computers and the surrounding environment.
SENSOR NETWORK
 Operation of a Sensor Network
 Sensor networks typically include sensor nodes, actuator
nodes, gateways, and clients. Sensor nodes group inside
the sensor field and form networks of different topologies.
The following process describes how sensor networks
operate:
 A sensor node monitors the data collected by the sensor
and transmits this to other sensor nodes.
 During the transmission process, data may be handled by
multiple nodes as it reaches a gateway node.
 The data is then transferred to the management node.
 The management node is managed by the user and
determines the monitoring required and collects the
monitored data.
SENSOR NETWORK
SENSOR NETWORK
 Sensor Nodes
 There are many nodes in a sensor network. These nodes
are the detection stations. There is a sensor/transducer,
microcontroller, transceiver, and power source:
 A sensor senses the physical condition, and if there is any
change, it generates electrical signals.
 The signals go to the microcontroller for processing.
 A central processor sends commands to the transceiver and
data is transmitted to a computer.
SENSORS USING SELF –DRIVING
CAR
THANK YOU

You might also like