






































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
It's a easy Summary on IOT which will help you in passing your college exams
Typology: Cheat Sheet
1 / 46
This page cannot be seen from the preview
Don't miss anything!
The Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. Why is IOT important? Over the past few years, IoT has become one of the most important technologies of the 21st century. Now that we can connect everyday objects—kitchen appliances, cars, thermostats, baby monitors—to the internet via embedded devices, seamless communication is possible between people, processes, and things. By means of low-cost computing, the cloud, big data, analytics, and mobile technologies, physical things can share and collect data with minimal human intervention. In this hyperconnected world, digital systems can record, monitor, and adjust each interaction between connected things. The physical world meets the digital world—and they cooperate.
Connectivity: Connectivity is an important requirement of the IoT infrastructure. Things of IoT should be connected to the IoT infrastructure. Anyone, anywhere, anytime can connect, this should be guaranteed at all times. Intelligence and Identity: The extraction of knowledge from the generated data is very important. For example, a sensor generates data, but that data will only be useful if it is interpreted properly. Each IoT device has a unique identity. This identification is helpful in tracking the equipment and at times for querying its status. Scalability: The number of elements connected to the IoT zone is increasing day by day. Hence, an IoT setup should be capable of handling the massive expansion. The data generated as an outcome is enormous, and it should be handled appropriately.
Dynamic and Self-Adapting: IoT devices should dynamically adapt themselves to the changing contexts and scenarios. Assume a camera meant for surveillance. It should be adaptable to work in different conditions and different light situations. Architecture: IoT architecture cannot be homogeneous in nature. It should be hybrid, supporting different manufacturers ‘ products and multiple domains to function in the IoT network. Safety: There is a danger of the sensitive personal details of the users getting compromised when all his/her devices are connected to the internet. This can cause a loss to the user. Hence, data security is the major challenge. Besides, the equipment involved is huge. IoT networks may also be at risk. Self Configuring: This is one of the most important characteristics of IoT. IoT devices are able to upgrade their software in accordance with requirements with a minimum of user participation. Additionally, they can set up the network, allowing for the addition of new devices to an already-existing network. Interoperability: (IMP This was discussed during the lecture) IoT devices use standardized protocols and technologies to ensure that they can communicate with each other and with other systems. Interoperability is one of the key characteristics of the Internet of Things (IoT). It refers to the ability of different IoT devices and systems to communicate and exchange data with each other, regardless of the underlying technology or manufacturer. Interoperability is critical for the success of IoT, as it enables different devices and systems to work together seamlessly and provides a seamless user experience. Without interoperability, IoT systems would be limited to individual silos of data and devices, making it difficult to share information and create new services and applications.
Quick Talk< There is no specific architecture of IoT, there are different architectures proposed by different people, the architecture which is mentioned below is widely used and was there on all the major computer science edu sites like GeeksforGeeks, InterviewBit and the Tutorialspoint.
includes various software and applications such as mobile apps, web portals, and other user interfaces that are designed to interact with the underlying IoT infrastructure. It also includes middleware services that allow different IoT devices and systems to communicate and share data seamlessly. Architectural View of IOT (CISCO) This was also given in the ppt, this is actually the Cisco Reference Architecture for IoT, or also called the seven layered reference model.
A physical design of an IoT system refers to the individual node devices and their protocols that are utilized to create a functional IoT ecosystem. Each node device can perform tasks such as remote sensing, actuating, monitoring, etc., by relying on physically connected devices. It may also be capable of transmitting information through different types of wireless or wired connections. The things/devices in the IoT system are used for: ● Building connections ● Data processing ● Providing storage ● Providing interfaces ● Providing graphical interfaces
The devices generate data, and the data is used to perform analysis and do operations for improving the system.
IoT Protocols Should also Satisfy These Requirements ● Allow communication among various devices simultaneously. ● IoT is being used in critical areas like health, industries, home surveillance, etc. hence communication security needs to be ensured. ● Transport data efficiently. ● IoT devices can be added or removed from the IoT network. Hence protocols must provide scalability. IoT Network Protocols: IoT network protocols are used to connect devices over the network. These are the set of communication protocols typically used over the Internet. Following are the various IoT Network protocols: HTTP (HyperText Transfer Protocol) HyperText Transfer Protocol is the best example of IoT network protocol. This protocol has formed the foundation of data communication over the web. It is the most common protocol that is used for IoT devices when there is a lot of data to be published. However, the HTTP protocol is not preferred because of its cost, battery-life, energy saving, and more constraints. LoRaWan (Long Range Wide Area Network) It is a long-range low power protocol that provides signal detection below the noise level. LoRaWan connects battery operated things wirelessly to the Internet in either private or global networks. This communication protocol is mainly used by smart cities, where there are millions of devices that function with less power.
to the client in HTTP. For light-weight implementation, it makes use of UDP (User Datagram Protocol) and reduces space usage. The protocol uses binary data format EXL (Efficient XML Interchanges). CoAP protocol is used mainly in automation, mobiles, and microcontrollers. The protocol sends a request to the application endpoints such as appliances at homes and sends back the response of services and resources in the application. Advanced Message Queuing Protocol (AMQP) AMQP is a software layer protocol for message-oriented middleware environment which provides routing and queuing. It is used for reliable point-to-point connection and supports the seamless and secure exchange of data between the connected devices and the cloud. AMQP consists of three separate components namely Exchange, Message Queue, and Binding. All these three components ensure a secure and successful exchange and storage of messages. It also helps in establishing the relationship of one message with the other. AMQP protocol is mainly used in the banking industry. Whenever a message is sent by a server, the protocol tracks the message until each message is delivered to the intended users/destinations without failure. Machine-to-Machine (M2M) Communication Protocol It is an open industry protocol built to provide remote application management of IoT devices. M2M communication protocols are cost-effective and use public networks. It creates an environment where two machines communicate and exchange data. This protocol supports the self-monitoring of machines and allows the systems to adapt according to the changing environment. M2M communication protocols are used for smart homes, automated vehicle authentication, vending machines, and ATM machines. Extensible Messaging and Presence Protocol (XMPP) The XMPP is uniquely designed. It uses a push mechanism to exchange messages in real-time. XMPP is flexible and can integrate with the changes seamlessly. Developed using open XML (Extensible Markup Language), XMPP works as a presence indicator showing the availability status of the servers or devices transmitting or receiving messages. Other than the instant messaging apps such as Google Talk and WhatsApp, XMPP is also used in online gaming, news websites, and Voice over Internet Protocol (VoIP).
(this is also a very important topic) It is important and useful to understand how various IoT devices communicate with each other. Communication models used in IoT have great value. The IoTs allows people and things to be connected any time, any space, with anything and anyone, using any network and any service. I’ve added easy to understand diagrams. Request & Response Model ● The communication takes place between a client and a server. ● Whenever required, the client will request information from the server. This request is usually in the encoded format. ● So in this model, basically a client sends requests to the server and the server responds to the requests. That is why it is called request - response model. ● After receiving the request from the client, the server decides how to respond, fetches the data from the database and its resource representation, prepares a response and ultimately sends the response to the client. ● Request - Response model is a stateless model. Each request-response pair is independent of others. ● Example is HTTP. HTTP operates as a query-response protocol between a client and a server. A web browser can be the client, and an application on a computer that supports a website can be the server. The client(browser) submits an HTTP request to the server and the server will return a response back to the client. ● Other Example(s):- CoAP (Constrained Application Protocol)
Exclusive Pair ● It's a bi-directional, full duplex communication model in which a dedicated communication link is set between the client and the server. ● The connection remains open until the client sends a request to close the connection. ● The client and server can send messages to one another after configuring the connection. As soon as the connection is terminated, no exchange of messages would take place between the client and the server. ● The Server has the record of all the connections which has been opened. ● This model is a stateful type. ● Example(s):- Websockets.
What are APIs? ● An API is an interface used by programs to access an application. ● It enables a program to send commands to another program and receive replies from the app. ● IoT APIs are the interface points between an IoT device and the Internet and/or other network components. Websocket based APIs ● Websocket APIs enable bi-directional and duplex communication between customers and servers. ● It works on the principle of the exclusive pair model. Can you recall it? Yes. Once a connection is set up, there is a constant exchange of messages between the client and the server. All we need is to establish a dedicated connection to start the process. the communication goes on unless the connection is terminated. ● It is a stateful type.
● Due to one time dedicated connection setup, there is less overhead, lower traffic and less latency and high throughput. ● So Web socket is the most suitable IoT Communication APIs for IoT System. REST-based APIs (not so important topic) ● Representational state transfer (REST) is a set of architectural principles by which you can design Web services, the Web APIs that focus on the system's resources and how resource states are addressed and transferred. ● URIs(example:- example.com/api/tasks) are used to depict resources in the RESTful web service. ● Client tries to access these resources via URIs using commands like GET, PUT, POST, DELETE and so on that are defined by HTTP. ● In response, the server responds with a JSON object or XML file. ● The REST APIs follow the request-response model.
IoT primarily exploits standard protocols and networking technologies. However, the major enabling technologies and protocols of IoT are RFID, NFC, low-energy Bluetooth, low-energy wireless, low-energy radio protocols, LTE-A, and WiFi-Direct. These technologies support the specific networking functionality needed in an IoT system in contrast to a standard uniform network of common systems. NFC and RFID RFID (radio-frequency identification) and NFC (near-field communication) provide simple, low energy, and versatile options for identity and access tokens, connection bootstrapping, and payments. RFID technology employs 2-way radio transmitter-receivers to identify and track tags associated with objects. NFC consists of communication protocols for electronic devices, typically a mobile device and a standard device. Low-Energy Bluetooth This technology supports the low-power, long-use need of IoT function while exploiting a standard technology with native support across systems. Low-Energy Wireless This technology replaces the most power hungry aspect of an IoT system. Though sensors and other elements can power down over long periods, communication links (i.e., wireless) must remain in listening mode. Low-energy wireless not only reduces consumption, but also extends the life of the device. Radio Protocols
M2M stands for Machine to Machine communication. It is a direct communication system between the devices using wired or wireless communications channels without any human interaction. It collects the data and shares it with other connected devices. It is a technology that allows devices without the use of the internet to connect between devices. Various applications, such as defense, monitoring and tracking, production and facility management, are provided by M2M communications. M2M technology may be present in offices, shopping malls, houses, and many other places. A common example of a machine to machine is controlling electrical devices like fans and bulbs using Bluetooth from the smartphone. Here, the smartphone and electrical devices are the two interacting devices with each other (now you can elaborate this).
Difference between SDN and Traditional Networking SDN Architecture is? DIRECTLY PROGRAMMABLE Network control is directly programmable because it is decoupled from forwarding functions. AGILE Abstracting control from forwarding lets administrators dynamically adjust network-wide traffic flow to meet changing needs. CENTRALLY MANAGED Network intelligence is (logically) centralized in software-based SDN controllers that maintain a global view of the network, which appears to applications and policy engines as a single, logical switch. PROGRAMMATICALLY CONFIGURED SDN lets network managers configure, manage, secure, and optimize network resources very quickly via dynamic, automated SDN programs, OPEN STANDARDS-BASED AND VENDOR-NEUTRAL When implemented through open standards, SDN simplifies network design and operation because instructions are provided by SDN controllers instead of multiple, vendor-specific devices and protocols. Different Models in SDN Open SDN: Network administrators use a protocol like OpenFlow to control the behavior of virtual and physical switches at the data plane level. SDN by APIs: Instead of using an open protocol, application programming interfaces control how data moves through the network on each device.
SDN Overlay Model: Another type of software-defined networking runs a virtual network on top of an existing hardware infrastructure, creating dynamic tunnels to different on-premise and remote data centers. Hybrid SDN: This model combines software-defined networking with traditional networking protocols in one environment to support different functions on a network.
Network functions virtualization (NFV) allows service providers and operators to abstract network services, such as firewalling and load balancing, into software that runs on basic servers. NFV virtualizes the network services and applications that once ran on hardware appliances. In fact, network functions virtualization could replace many network devices with more flexible software running on bare metal servers, enabling a new kind of service chaining. Network functions virtualization (NFV) is the replacement of network appliance hardware with virtual machines. The virtual machines use a hypervisor to run networking software and processes such as routing and load balancing. Hypervisor: (A hypervisor, also known as a virtual machine monitor or VMM, is software that creates and runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its resources, such as memory and processing. Hypervisors make it possible to use more of a system’s available resources and provide greater IT mobility since the guest VMs are independent of the host hardware.) NFV Architecture An individual proprietary hardware component, such as a router, switch, gateway, firewall, load balancer, or intrusion detection system, performs a specific networking function in a typical network architecture. A virtualized network substitutes software programs that operate on virtual machines for these pieces of hardware to carry out networking operations. Three components make up an NFV architecture: Centralized virtual network infrastructure: The foundation of an NFV infrastructure can be either a platform for managing containers or a hypervisor that abstracts the resources for computation, storage, and networking. Applications: Software delivers many forms of network functionality by substituting for the hardware elements of a conventional network design (virtualized network functions).
White Box: uses network devices, such as switches and routers, that as based on “generic” merchant silicon networking networking chipset available for anyone to buy, as opposed to proprietary silicon chips designed by and for a single networking vendor. Difference between SDN and NFV
IoT collects data from smart devices, environmental sensors, smartphones, intelligent vehicles, and all kinds of sensors. The data can then be sent over the network with common standard protocols such as MQTT, CoAP, and HTTP to the edge gateway (the edge gateway provides functionalities, such as sensor data aggregation, pre-processing of the data, and securing connectivity to the cloud) and then the data is sent to the cloud where it is stored for short-term and
long-term applications. In the cloud, there are various database management systems built for IoT applications. The systems can store and manage those enormous amounts of data for further applications. IOT can generate a massive amount of data and that data can be very useful when we use the concepts of data analytics and data science. This data is used to create actionable insights to unlock data-driven business intelligence, optimize operations, engage more customers, control processes automatically, fitness goals, etc.
One component that improves the success of the Internet of Things is Cloud Computing. Cloud computing enables users to perform computing tasks using services provided over the Internet. The use of the Internet of Things in conjunction with cloud technologies has become a kind of catalyst: the Internet of Things and cloud computing are now related to each other. These are true technologies of the future that will bring many benefits. Cloud Platforms for IoT: Microsoft Azure IoT Suite Microsoft Azure provides multiple services to create IoT solutions. It enhances your profitability and productivity with pre-built connected solutions. Google Cloud’s IoT Platform Google's platform is among the best platforms we currently have. Google has an end-to-end platform for Internet-of-Things solutions. It allows you to easily connect, store, and manage IoT data. IBM Watson IoT Platform IBM Watson is a powerful platform backed by IBM ’s the Bluemix and hybrid cloud PaaS (platform as a service) development platform. By providing easy sample apps and interfaces for IoT services, they make it accessible to beginners. AWS IoT Platform Amazon made it much easier for developers to collect data from sensors and Internet-connected devices. They help you collect and send data to the cloud and analyze that information to provide the ability to manage devices. Cisco IoT Cloud Connect Cisco Internet of Things accelerates digital transformation and actions from your data. Cisco IoT Cloud Connect is a mobile, cloud-based suite. It offers solutions for