Iote
Iote
Definition: The Internet of things (IoT) describes the network of physical things or objects
that are embedded with sensors, software, and other technologies for the purpose of
connecting and exchanging data with other devices and systems over the Internet.
Characteristics of IoT:
Massive number of constrained devices, sleeping nodes, mobile devices, and non-
IP devices.
Depending on the way a host communicates with other hosts, computer networks are
Connection has the whole channel dedicated to it only. These networks were
Designed to work over duplex links and are functional for both synchronous as
Share the same link. This type of configuration is similar to the one-to-many
Networks and IP telephony. The channel is shared between the various hosts,
Each of the spectral and temporal sharing approaches has various schemes
Depending on the physical manner in which communication paths between the hosts
Are connected, computer networks can have the following four broad topologies—
(i) Star: In a star topology, every host has a point-to-point link to a central controller
Or hub. The hosts cannot communicate with one another directly; they can only
Do so through the central hub. The hub acts as the network traffic exchange. For
Large-scale systems, the hub, essentially, has to be a powerful server to handle
All the simultaneous traffic flowing through it. However, as there are fewer
Links (only one link per host), this topology is cheaper and easier to set up. The
Main advantages of the star topology are easy installation and the ease of fault
Link failures between a host and the hub do not have a big effect on the network,
Except for the host that is affected. However, the main disadvantage of this
Topology is the danger of a single point of failure. If the hub fails, the whole
Network fails.
(ii) Mesh: In a mesh topology, every host is connected to every other host using a
Dedicated link (in a point-to-point manner). This implies that for n hosts in a
Mesh, there are a total of n(n−1)/2 dedicated full duplex links between the hosts.
This massive number of links makes the mesh topology expensive. However,
It offers certain specific advantages over other topologies. The first significant
Advantage is the robustness and resilience of the system. Even if a link is down
Or broken, the network is still fully functional as there remain other pathways
For the traffic to flow through. The second advantage is the security and privacy
Of the traffic as the data is only seen by the intended recipients and not by all
Members of the network. The third advantage is the reduced data load on a
Single host, as every host in this network takes care of its traffic load. However,
The cost of establishing these links, mesh networks are used very selectively, such
As in backbone networks.
Cable or bus serves as the primary traffic pathway between the hosts. The hosts
Are connected to the main bus employing drop lines or taps. The main advantage
Of this topology is the ease of installation. However, there is a restriction
On the length of the bus and the number of hosts that can be simultaneously
Connected to the bus due to signal loss over the extended bus. The bus topology
Has a simple cabling procedure in which a single bus (backbone cable) can be
Used for an organization. Multiple drop lines and taps can be used to connect
Various hosts to the bus, making installation very easy and cheap. However, the
Main drawback of this topology is the difficulty in fault localization within the
Network.
Each host. The repetition of this system forms a ring. The repeaters at each host
Capture the incoming signal intended for other hosts, regenerates the bit stream,
And passes it onto the next repeater. Fault identification and set up of the ring
Of this system is the high probability of a single point of failure. If even one
Computer networks are divided into four broad categories based on network
Reachability: personal area networks, local area networks, wide area networks, and
(i) Personal Area Networks (PAN): PANs, as the name suggests, are mostly
Keyboards, wireless mouse, and printers within a house. Generally, PANs are
To a few meters.
(ii) Local Area Networks (LAN): A LAN is a collection of hosts linked to a single
To the Internet provide web access to the whole organization or a campus; the
Lines are further redistributed to multiple hosts within the LAN enabling hosts.
The hosts are much more in number than the actual direct lines to the Internet to
Access the web from within the organization. This also allows the organization
To define various access control policies for web access within its hierarchy.
Typically, the present-day data access rates within the LANs range from 100
Mbps to 1000 Mbps, with very high fault-tolerance levels. Commonly used
(iii) Metropolitan Area Networks (MAN): The reachability of a MAN lies between
To various organizations within a city. As MANs are costly, they may not
(iv) Wide Area Networks (WAN): WANs typically connect diverse geographic
Data rate. Typically, WANs connecting two LANs or MANs may use public
Switched telephone networks (PSTNs) or satellite-based links. Due to the
Long transmission ranges, WANs tend to have more errors and noise during
Transmission and are very costly to maintain. The fault tolerance of WANs are
Question 4:
Communication device into seven layers of abstraction, each performing distinct tasks
Based on the underlying technology and internal structure of the hosts. These seven
Layers, from bottom-up, are as follows: 1) Physical layer, 2) Data link layer, 3) Network
Layer, 4) Transport layer, 5) Session layer, 6) Presentation layer, and 7) Application layer.
The major highlights of each of these layers are explained in this section.
(i) Physical Layer: This is a media layer and is also referred to as layer 1 of the
OSI model. The physical layer is responsible for taking care of the electrical and
Mechanical operations of the host at the actual physical level. These operations
Include or deal with issues relating to signal generation, signal transfer, voltages,
The layout of cables, physical port layout, line impedances, and signal loss. This
Layer is responsible for the topological layout of the network (star, mesh, bus, or
Ring), communication mode (simplex, duplex, full duplex), and bit rate control
Operations. The protocol data unit associated with this layer is referred to as a
Symbol.
(ii) Data Link Layer: This is a media layer and layer 2 of the OSI model. The data
Link layer is mainly concerned with the establishment and termination of the
Connection between two hosts, and the detection and correction of errors during
Communication between two or more connected hosts. IEEE 802 divides the
OSI layer 2 further into two sub-layers [2]: Medium access control (MAC) and
Logical link control (LLC). MAC is responsible for access control and permissions
For connecting networked devices; whereas LLC is mainly tasked with error
Checking, flow control, and frame synchronization. The protocol data unit
Associated with this layer is referred to as a frame.
(iii) Network Layer: This layer is a media layer and layer 3 of the OSI model.
Networks through logical paths called virtual circuits. These logical paths
May pass through other intermediate hosts (nodes) before reaching the actual
Destination host. The primary tasks of this layer include addressing, sequencing
(iv) Transport Layer: This is layer 4 of the OSI model and is a host layer. The
Transport layer is tasked with end-to-end error recovery and flow control to
Achieve a transparent transfer of data between hosts. This layer is responsible for
The receiving host. The protocol data unit associated with this layer is referred to
As a segment or datagram.
(v) Session Layer: This is the OSI model’s layer 5 and is a host layer. It is responsible
Networked hosts. The session layer sees full utilization during operations such
As remote procedure calls and remote sessions. The protocol data unit associated
(vi) Presentation Layer: This layer is a host layer and layer 6 of the OSI model. It
Is mainly responsible for data format conversions and encryption tasks such
That the syntactic compatibility of the data is maintained across the network, for
Which it is also referred to as the syntax layer. The protocol data unit associated
Interfaces) and terminals. Applications such as file transfers, FTP (file transfer
Protocol), e-mails, and other such operations are initiated from this layer. The
Hosts, quality of service, and privacy. The protocol data unit associated with this
Over a few decades. The technologies that laid the foundation of connected systems
By achieving easy integration to daily lives, popular public acceptance, and massive
Benefits by using connected solutions can be considered as the founding solutions for
The development of IoT. Figure 4.6 shows the sequence of technological advancements
For shaping the IoT as it is today. These sequence of technical developments toward
ATM: ATMs or automated teller machines are cash distribution machines, which
Are linked to a user’s bank account. ATMs dispense cash upon verification of
The identity of a user and their account through a specially coded card. The
Central concept behind ATMs was the availability of financial transactions even
When banks were closed beyond their regular work hours. These ATMs were
Ubiquitous money dispensers. The first ATM became operational and connected
Platform. The Web became operational for the first time in 1991. Since then, it has
Been massively responsible for the many revolutions in the field of computing
And communication.
• Smart Meters: The earliest smart meter was a power meter, which became
Remotely with the power grid. They enabled remote monitoring of subscribers’
Power usage and eased the process of billing and power allocation from grids.
Digital Locks: Digital locks can be considered as one of the earlier attempts at
That smartphones can be used to control them. Operations such as locking and
Unlocking doors, changing key codes, including new members in the access lists,
And relatives to alert them of medical emergencies and take preventive measures.
The devices may be simple wearable appliances, monitoring just the heart
Rate and pulse of the wearer, as well as regular medical devices and monitors
In hospitals. The connected nature of these systems makes the availability of
Medical records and test results much faster, cheaper, and convenient for both
With other vehicles, or even with sensors and actuators contained within it.
These vehicles self-diagnose themselves and alert owners about system failures.
• Smart Dust: These are microscopic computers. Smaller than a grain of sand each,
They can be used in numerous beneficial ways, where regular computers cannot
Operate. For example, smart dust can be sprayed to measure chemicals in the soil
• Smart Factories: These factories can monitor plant processes, assembly lines,
Distribution lines, and manage factory floors all on their own. The reduction
Drastically reduced.
The present-day IoT spans across various domains and applications. The major
Enabler. Multiple domains can be supported and operated upon simultaneously over
Vivid and diverse areas such as smart parking, smartphone detection, traffic
Urban noise maps, river floods, water flow, silos stock calculation, water leakages,
Radiation levels, explosive and hazardous gases, perimeter access control, snow level
monitoring, liquid presence, forest fire detection, air pollution, smart grid,
their application domains. Various established works such as that by Savolainen et al.
[2] generally outline five broad categories of IoT networking components. However,
we outline the broad components that come into play during the establishment of
any IoT network, into six types: 1) IoT node, 2) IoT router, 3) IoT LAN, 4) IoT WAN,
5) IoT gateway, and 6) IoT proxy. A typical IoT implementation from a networking
perspective is shown in Figure 4.9. The individual components are briefly described
here:
(i) IoT Node: These are the networking devices within an IoT LAN. Each of
communicates with the network infrastructure (either within the LAN or outside
it). The nodes may be connected to other nodes inside a LAN directly or by means of a
common gateway for that LAN. Connections outside the LAN are
Tasked with the routing of packets between various entities in the IoT network;
It keeps the traffic flowing correctly within the network. A router can be
(iii) IoT LAN: The local area network (LAN) enables local connectivity within the
Technologies. IoT LANs may or may not be connected to the Internet. Generally,
Kilometers. IoT WANs connect to the Internet and enable Internet access to the
(vi) IoT Gateway: An IoT gateway is simply a router connecting the IoT LAN to a
WAN or the Internet. Gateways can implement several LANs and WANs. Their
Primary task is to forward packets between LANs and WANs, and the IP layer
(vii) IoT Proxy: Proxies actively lie on the application layer and performs application
Layer functions between IoT nodes and other entities. Typically, application layer
IoT Routers connect multiple LANs, directing data towards an IoT Gateway or IoT Proxy.
IoT Gateways and IoT WANs enable Internet connectivity, extending the network beyond
local boundaries.
By integrating these components, IoT networks facilitate seamless data exchange, remote
monitoring, automation, and enhanced decision-making across industries.
Question 7 planes
The Internet of Things (IoT) is a vast ecosystem built upon a complex interdependence of
various technologies—both legacy and modern—that work together to enable seamless
connectivity, data exchange, and intelligent processing.
The IoT paradigm can be divided into four key planes, each playing a crucial role in shaping
IoT-enabled solutions. These planes are:
1. Services Plane
The services plane is the foundation of IoT, consisting of:
Things (Devices): The physical objects embedded with sensors, actuators, and processors,
such as wearables, smartphones, household appliances, factory machinery, UAVs, smart
glasses, and vehicles.
Low-Power Connectivity: These are the communication protocols that enable devices to
connect within a local IoT network. This includes:
Modern wireless protocols: Zigbee, RFID, Bluetooth, 6LoWPAN, LoRa, DASH, Insteon.
These protocols allow short-range communication between devices and the nearest hub,
router, or gateway, acting as the first level of IoT connectivity.
The local connectivity plane is responsible for managing and distributing IoT
communication within a localized space.
Purpose: It enables multiple IoT devices within a home, building, or industrial facility to
connect to the network through a single router or gateway.
Key Features:
Example: In a smart home, devices across different floors communicate through local IoT
networks, which then merge into a single gateway that provides Internet access.
It enables data processing closer to the source, reducing latency and offloading tasks from
centralized cloud systems.
3. Global Connectivity Plane
This plane is crucial for enabling worldwide connectivity for IoT devices, allowing them to
communicate across networks, service providers, and cloud platforms.
Components:
The Web
Data centers
Remote servers
4. Processing Plane
The processing plane sits at the top of the IoT framework and is responsible for
transforming raw IoT data into actionable insights.
Key Functions:
Data Conversion & Cleaning: Ensures uniform formatting and removes errors.
Key Technologies:
Conclusion
The IoT ecosystem is built on a multi-layered framework where services, connectivity, and
processing technologies work together to enable intelligent and automated solutions. With
advancements in edge computing, fog computing, AI, and machine learning, IoT continues
to evolve, offering unprecedented connectivity and automation across industries.
The Internet protocol suite is yet another conceptual framework that provides levels
OSI model and provides only four levels of abstraction: 1) Link layer, 2) Internet layer,
Referred to as the TCP/IP protocol suite as the foundation technologies of this suite are
Transmission control protocol (TCP) and Internet protocol (IP) [3], [4], [6]. The TCP/IP
(i) Link Layer: The first and base layer of the TCP/IP protocol suite is also known as
The network interface layer. This layer is synonymous with the collective physical
And data link layer of the OSI model. It enables the transmission of TCP/IP
Packets over the physical medium. According to its design principles, the link
Layer is independent of the medium in use, frame format, and network access,
(ii) Internet Layer: Layer 2 of the TCP/IP protocol suite is somewhat synonymous
To the network layer of the OSI model. It is responsible for addressing, address
Translation, data packaging, data disassembly and assembly, routing, and packet
Delivery tracking operations. Some core protocols associated with this layer
Are address resolution protocol (ARP), Internet protocol (IP), Internet control
Traditionally, this layer was built upon IPv4, which is gradually shifting to IPv6,
Synonymous with the transport layer of the OSI model. This layer is tasked with
Network. Transmission control protocol (TCP) and user datagram protocol (UDP)
Are the core protocols upon which this layer is built, which in turn enables it
(iv) Application Layer: The functionalities of the application layer, layer 4, of the
TCP/IP protocol suite are synonymous with the collective functionalities of the
OSI model’s session, presentation, and application layers. This layer enables an
End-user to access the services of the underlying layers and defines the protocols
For the transfer of data. Hypertext transfer protocol (HTTP), file transfer protocol
(FTP), simple mail transfer protocol (SMTP), domain name system (DNS),
(SNMP) are some of the core protocols associated with this layer.
In contrast, the TCP/IP (Internet Protocol) model, also known as the Internet protocol suite,
is a four-layer framework: Link, Internet, Transport, and Application. It predates the OSI
model and is practically implemented, forming the backbone of the modern Internet. While
OSI separates concerns into distinct layers, TCP/IP integrates some functionalities (e.g.,
OSI’s Session, Presentation, and Application layers merge into the TCP/IP Application
layer).
OSI is protocol-independent and mainly used for teaching and conceptualization, while
TCP/IP is protocol-driven, relying on core protocols like IP, TCP, UDP, HTTP, and DNS.
Additionally, OSI follows a strict top-down approach, whereas TCP/IP was designed with a
flexible, real-world-oriented architecture that allows efficient data transmission across
networks.
Question 10 The interdependence and reach of IoT over various application domains and
networking paradigms
be for updates on machine status (stocks, health, power status, and others),
(ii) CPS: The CPS or the cyber physical system paradigm insinuates a closed control
feedback control loop, which ensures that until the desired state is attained, the
system keeps on actuating and sensing. Humans have a simple supervisory role
Environment [3]. The major focus areas of this paradigm include smart and
Energy efficiency of systems and processes, and others. In brief, we can safely
Assume that any aspect of IoT that concerns and affects the environment, falls
(v) Industry 4.0: Industry 4.0 is commonly referred to as the fourth industrial
Concept of smart factories, where machines talk to one another without much
(vi) IoP: IoP is a new technological movement on the Internet which aims to
While maintaining confidentiality and privacy of its user’s data. A famous site
For IoP states that as the introduction of the Bitcoin has severely limited the
Power of banks and governments, the acceptance of IoP will limit the power
Between various machines and devices. These interactions can be enabled through a
Cloud computing infrastructure, a server, or simply a local network hub. M2M collects
Data from machinery and sensors, while also enabling device management and device
Networks (e.g., 3G, 4G, 5G, satellite, public networks). M2M is part of the IoT and is
Considered as one of its sub-domains, as shown in Figure 4.7. M2M standards occupy
A core place in the IoT landscape. However, in terms of operational and functional
Scope, IoT is vaster than M2M and comprises a broader range of interactions
Such as the interactions between devices/things, things, and people, things and
To the IoT theme but is not necessarily focused on the use of telecom networks.
Cyber physical systems (CPS) encompasses sensing, control, actuation, and feedback
As a complete package. In other words, a digital twin is attached to a CPS-based
While the model represents the mathematical model or representation of the physical
Physical system, especially in CPS as it allows for the comparison of the physical
System’s output, performance, and health. Based on feedback from the digital twin,
Desirable outputs. In contrast, the IoT paradigm does not compulsorily need feedback
Or a digital twin system. IoT is more focused on networking than controls. Some of the
Instruments and networks) may include feedback and controls too. In this light, CPS
From a developer’s perspective, the Web of Things (WoT) paradigm enables access
And control over IoT resources and applications. These resources and applications
Are generally built using technologies such as HTML 5.0, JavaScript, Ajax, PHP, and
Others. REST (representational state transfer) is one of the key enablers of WoT. The use
Of RESTful principles and RESTful APIs (application program interface) enables both
Developers and deployers to benefit from the recognition, acceptance, and maturity of
Existing web technologies without having to redesign and redeploy solutions from
Scratch. Still, designing and building the WoT paradigm has various adaptability
And security challenges, especially when trying to build a globally uniform WoT. As
IoT is focused on creating networks comprising objects, things, people, systems, and
Applications, which often do not consider the unification aspect and the limitations of
The Internet, the need for WoT, which aims to integrate the various focus areas of IoT
Into the existing Web is really invaluable. Technically, WoT can be thought of as an
Application layer-based hat added over the network layer. However, the scope of IoT
Applications is much broader; IoT also which includes non-IP-based systems that are