0% found this document useful (0 votes)
3 views53 pages

Module 1

The document serves as an introduction to the Internet of Things (IoT) and covers the basics of networking, including network types, topologies, and layered network models. It discusses the emergence of IoT, its networking components, and the classification of computer networks based on reachability. Additionally, it outlines the OSI model and the Internet protocol suite, detailing the functions of each layer involved in network communication.

Uploaded by

tb7pwhwtsz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views53 pages

Module 1

The document serves as an introduction to the Internet of Things (IoT) and covers the basics of networking, including network types, topologies, and layered network models. It discusses the emergence of IoT, its networking components, and the classification of computer networks based on reachability. Additionally, it outlines the OSI model and the Internet protocol suite, detailing the functions of each layer involved in network communication.

Uploaded by

tb7pwhwtsz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Introduction To Internet of Things

Module1

NALINA S B
ASST.PROF,DEPT.OF ECE
JNNCE,SHIVAMOGGA

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 1


Contents
Basics of Networking
✔ Introduction
✔ Network Types
✔ Layered network models
Emergence of IoT
✔ Introduction, Evolution of IoT
✔Enabling IoT and the Complex Interdependence of Technologies
✔ IoT Networking Components

Textbook 1: Chapter 1- 1.1 to 1.3 Chapter 4 – 4.1 to 4.4

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 2


Basics of Networking
▪ Typically, networking refers to the linking of computers and
communication network devices (also referred to as hosts), which
interconnect through a network (Internet or Intranet) and are separated
by unique device identifiers (Internet protocol, IP addresses and media
access control, MAC addresses).
▪These hosts may be connected by a single path or through multiple
paths for sending and receiving data.
▪The data transferred between the hosts may be text, images, or videos,
which are typically in the form of binary bit streams

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 3


Network Types
▪ Computer networks are classified according to various parameters:
▪1)Type of connection,
2) Physical topology
3) Reach of the network.
These classifications are helpful in deciding the requirements of a network
setup and provide insights into
the appropriate selection of a network type for the setup.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 4


Connection types
▪ Depending on the way a host communicates with other
hosts, computer networks are of two types :
1. Point-to-point
2. Point-to-multipoint.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 5


Point-to-point
▪ Point-to-point connections are used to establish direct connections between two hosts.
Ex: remote control for an air conditioner or television
▪ These networks were designed to work over duplex links and are functional for both synchronous as
well as asynchronous systems.
▪ Regarding computer networks, point to point connections find usage for specific purposes such as in
optical networks.

Point-to-multipoint
▪ In a point-to-multipoint connection, more than two hosts share the same link.
▪This type of configuration is similar to the one-to-many connection type.
▪ Point-to-multipoint connections find popular use in wireless networks and IP telephony.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 6


NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 7
Physical topology
Depending on the physical manner in which communication paths between the
hosts
are connected, computer networks can have the following four broad topologies
1. Star
2. Mesh
3. Bus
4. Ring

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 8


Star:
▪ In a star topology, every host has a point-to-point link to a central
controller or hub.
▪The hosts cannot communicate with one another directly; they can only
do so through the central hub.
▪The hub acts as the network traffic exchange.
▪For large-scale systems, the hub, essentially, has to be a powerful
server to handle all the simultaneous traffic flowing through it.
Advantages:
1.Cheap
2.Ease of installation
3.Ease of fault identification
Disadvantages:
1.Single point of failure(because if the hub fails,the whole network fails.
2.Traffic visible to network entities.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 9


Mesh
▪In a mesh topology, every host is connected to every other host using a dedicated link
(in a point-to-point manner).

▪ This implies that for n hosts in a esh, there are a total of n(n-11)/2 dedicated full
duplex links between the hosts.

Advantages:
1.Resistive against single point of failure.
2.Scalable.
3.Traffic privacy and security.

Disadvantages:
1.Costlt
2. Complex connections

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 10


Bus:
▪ A bus topology follows the point-to-multipoint connection. A
backbone cable or bus serves as the primary traffic pathway
between the hosts.
▪ The hosts are connected to the main bus employing drop lines
or taps.
Advantages:
1.Ease of installation
2.It is very cheap
Disadvantages:
1.Length of backbone cable limited.
2.Number of hosts limited.
3.Hard to localize faults.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 11


Ring ▪ A ring topology works on the principle of a
point-to-point connection.
▪ Here, each host is configured to have a dedicated
point-to-point connection with its two immediate
neighboring hosts on either side of it through
repeaters at each host.

▪ The repetition of this system forms a ring.


▪ The repeaters at each host capture the incoming signal intended for other hosts,
regenerates the bit stream, and passes it onto the next repeater.
Advantages:
1.Ease of installation. Disadvantages:
2.It is cheap. 1.High probability of a single point of failure
3.Fault identification ease.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 12


Network Topology Comparison

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 13


Network reachability

Computer networks are divided into four broad categories based on


network reachability:
✔Personal area networks
✔Local area networks
✔ Wide area networks
✔Metropolitan area networks.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 14


Personal Area Networks (PAN):
PANs, as the name suggests, are mostly restricted to individual usage.
A good example of PANs may be connected wireless headphones, wireless
speakers, laptops, smartphones, wireless keyboards, wireless mouse, and printers
within a house.
Generally, PANs are wireless networks, which make use of low-range and low-power
technologies such as Bluetooth.
The reachability of PANs lies in the range of a few centimeters to a few meters.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 15


Local Area Networks (LAN):
A LAN is a collection of hosts linked to a single network through wired or
wireless connections. However, LANs are restricted to buildings,
organizations, or campuses.
Typically, a few leased lines connected to the Internet provide web access
to the whole organization or a campus; the lines are further redistributed to
multiple hosts within the LAN enabling hosts.
The hosts are much more in number than the actual direct lines to the
Internet to access the web from within the organization. This also allows
the organization to define various access control policies for web access
within its hierarchy.
Typically, the present-day data access rates within the LANs range
from 100 Mbps to 1000 Mbps, with very high fault-tolerance levels.
Commonly used network components in a LAN are servers, hubs, routers,
switches, terminals, and computers.
NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 16
Metropolitan Area Networks (MAN):

▪ The reachability of a MAN lies between that of a LAN and a WAN.


▪ Typically, MANs connect various organizations or buildings within a given
geographic location or city.
▪ An excellent example of a MAN is an Internet service provider (ISP)
supplying Internet connectivity to various organizations within a city.
▪ As MANs are costly, they may not be owned by individuals or even single
organizations.
▪ Typical networking devices/components in MANs are modems and
cables. MANs tend to have moderate fault tolerance levels.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 17


Wide Area Networks
(WAN):
WANs typically connect diverse geographic locations. However, they are restricted
within the boundaries of a state or country.
The data rate of WANs is in the order of a fraction of LAN’s data rate.
Typically, WANs connecting two LANs or MANs may use public switched telephone
networks (PSTNs) or satellite-based links.
Due to the long transmission ranges, WANs tend to have more errors and noise
during transmission and are very costly to maintain.
The fault tolerance of WANs are also generally low.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 18


Layered Network Models
▪The intercommunication between hosts in any computer network, be it a
large-scaleor a small-scale one, is built upon the premise of various task-specific
layers.
▪Two of the most commonly accepted and used traditional layered network models
are
the open systems interconnection developed by the International Organization of
Standardization (ISO-OSI) reference model and the Internet protocol suite.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 19


OSI Model
The ISO-OSI model is a conceptual framework that partitions any networked communication
device into seven layers of abstraction, each performing distinct tasks based on the underlying
technology and internal structure of the hosts. ISO-OSI (the open
systemsinterconnection developed by the International Organization of
Standardization)
These seven layers, from bottom-up, are as follows:
1) Physical layer
2) Data link layer
3) Network layer
4) Transport layer
5) Session layer
6) Presentation layer
7) Application layer

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 20


Physical
Layer:
▪ This is a media layer and is also referred to as layer 1 of the OSI model.
▪The physical layer is responsible for taking care of the electrical and mechanical
operations of the host at the actual physical level.
▪These operations include or deal with issues relating to signal generation, signal
transfer, voltages, the layout of cables, physical port layout, line impedances,
and signal loss.
▪This layer is responsible for the topological layout of the network (star, mesh,
bus, or
ring), communication mode (simplex, duplex, full duplex), and bit rate control
Operations.
▪The protocol data unit associated with this layer is referred to as an symbol.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 21


Data Link Layer:
▪This is a media layer and layer 2 of the OSI model.
▪The data link layer is mainly concerned with the establishment and
termination of the connection between two hosts, and the detection and
correction of errors during communication between two or more
connected hosts.
▪ IEEE 802 divides the OSI layer 2 further into two sub-layers :
Medium access control (MAC) and
logical link control (LLC).
▪ MAC is responsible for access control and permissions for connecting networked devices;
whereas LLC is mainly tasked with error checking, flow control, and frame synchronization.
▪The protocol data unit associated with this layer is referred to as a frame.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 22


Network Layer:
▪This layer is a media layer and layer 3 of the OSI model.
▪It provides a means of routing data to various hosts connected to different networks
through logical paths called virtual circuits.
▪These logical paths may pass through other intermediate hosts (nodes) before
reaching the actual destination host.
▪ The primary tasks of this layer include addressing, sequencing of packets,
congestion control, error handling, and Internetworking.
▪ The protocol data unit associated with this layer is referred to as a packet.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 23


Transport Layer:
▪This is layer 4 of the OSI model and is a host layer.
▪The transport layer is tasked with end-to-end error recovery and flow control
to
achieve a transparent transfer of data between hosts.
▪This layer is responsible for keeping track of acknowledgments during
variable-length data transfer between hosts.
▪ In case of loss of data, or when no acknowledgment is received, the
transport layer ensures that the particular erroneous data segment is
re-sent to the receiving host.
▪ The protocol data unit associated with this layer is referred to as a segment
or datagram.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 24


Session Layer:

▪This is the OSI model’s layer 5 and is a host layer.


▪ It is responsible for establishing, controlling, and
terminating of communication between networked
hosts.
▪ The session layer sees full utilization during operations
such as remote procedure calls and remote sessions.
▪ The protocol data unit associated with this layer is
referred to as data.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 25


Presentation Layer:
▪This layer is a host layer and layer 6 of the OSI model.
▪ It is mainly responsible for data format conversions and
encryption tasks such that the syntactic compatibility of
the data is maintained across the network, for which it is
also referred to as the syntax layer.
▪ The protocol data unit associated with this layer is
referred to as data.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 26


Application Layer:
▪This is layer 7 of the OSI model and is a host layer.

▪ It is directly accessible by an end-user through software APIs (application program interfaces) and
terminals.

▪ Applications such as file transfers, FTP (file transfer protocol), e-mails, and other such operations are
initiated from this layer.

▪The application layer deals with user authentication, identification of communication hosts, quality of
service, and privacy.

▪ The protocol data unit associated with this layer is referred to as data.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 27


NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 28
NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 29
Internet protocol suite
▪ The Internet protocol suite is yet another conceptual framework that provides levels of abstraction for
ease of understanding and development of communication and networked systems on the Internet.

▪ However, the Internet protocol suite predates the OSI model and provides only four levels of
abstraction:

▪1) Link layer

2) Internet layer

3) transport layer

4) application layer

▪ This collection of protocols is commonly referred to as the TCP/IP protocol suite as the
foundation technologies of this suite are transmission control protocol (TCP) and Internet
protocol (IP). NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 30
Link Layer:
▪The first and base layer of the TCP/IP protocol suite is also known as the network
interface layer.

▪This layer is synonymous with the collective physical and data link layer of the OSI
model.

▪ It enables the transmission of TCP/IP packets over the physical medium.

▪ According to its design principles, the link layer is independent of the medium in use,
frame format, and network access, enabling it to be used with a wide range of
technologies such as the Ethernet, wireless LAN, and the asynchronous transfer
mode (ATM).

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 31


Internet Layer:

▪ Layer 2 of the TCP/IP protocol suite is somewhat synonymous to the network layer of the

OSI model.

▪ It is responsible for addressing, address translation, data packaging, data disassembly and
assembly, routing, and packet delivery tracking operations.

▪ Some core protocols associated with this layer are address resolution protocol (ARP),
Internet protocol (IP), Internet control message protocol (ICMP), and Internet group
management protocol (IGMP).

▪Traditionally, this layer was built upon IPv4, which is gradually shifting to IPv6, enabling the
accommodation of a much more significant number of addresses and security measures.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 32


Transport Layer:
▪Layer 3 of the TCP/IP protocol suite is functionally synonymous with the transport
layer of the OSI model.

▪This layer is tasked with the functions of error control, flow control, congestion control,
segmentation, and addressing in an end-to-end manner; it is also independent of the
underlying network.

▪Transmission control protocol (TCP) and user datagram protocol (UDP) are the core
protocols upon which this layer is built, which in turn enables it to have the choice of
providing connection-oriented or connectionless services between two or more hosts
or networked devices.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 33


Application Layer:
▪The functionalities of the application layer, layer 4, of the TCP/IP protocol suite are
synonymous with the collective functionalities of the OSI model’s session, presentation, and
application layers.

▪This layer enables an end-user to access the services of the underlying layers and defines the
protocols for the transfer of data.

▪Hypertext transfer protocol (HTTP), file transfer protocol (FTP), simple mail transfer
protocol (SMTP), domain name system (DNS), routing information protocol (RIP), and
simple network management protocol (SNMP) are some of the core protocols
associated with this layer.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 34


NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 35
Emergence of IoT
Introduction
The Internet of Things (IoT) is the network of physical objects
that contain embedded technology to communicate and sense
or interact with their internal states or the external environment."
-Gartner Research
▪ IoT is an anytime, anywhere, and anything network of Internet-connected
physical devices or systems capable of sensing an environment and affecting the
sensed environment intelligently.
▪ This is generally achieved using low-power and low-form-factor embedded
processors on-board the “things” connected to the Internet.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 36


▪ In other words, IoT may be considered to be made up of connecting devices,
machines, and tools; these things are made up of sensors/actuators and processors,
which connect to the Internet through wireless technologies

Typically, IoT systems can be characterized by the following features:


• Associated architectures, which are also efficient and scalable.
• No ambiguity in naming and addressing.
• Massive number of constrained devices, sleeping nodes, mobile devices, and
non-IP devices.
• Intermittent and often unstable connectivity

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 37


NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 38
NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 39
Evolution of IoT

Fig: The sequence of technological developments leading to the shaping of the


modern day IoT
ATM: ATMs or automated teller machines are cash distribution machines, which are
linked to a user’s bank account.
▪ ATMs dispense cash upon verification of the identity of a user and their account
through a specially coded card.
▪The central concept behind ATMs was the availability of financial transactions even
when banks were closed beyond their regular work hours.
▪These ATMs were ubiquitous money dispensers. The first ATM became operational
and connected online for the first time in 1974.
NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA
40
Web:
▪ World Wide Web is a global information sharing and communication platform. The
Web became operational for the first time in 1991.
▪Since then, it has been massively responsible for the many revolutions in the field of
computing and communication.
Smart Meters: The earliest smart meter was a power meter, which became
operational in early 2000.
▪These power meters were capable of communicating remotely with the power grid.
They enabled remote monitoring of subscribers’ power usage and eased the process
of billing and power allocation from grids.
Digital Locks: Digital locks can be considered as one of the earlier attempts at
connected home-automation systems.
▪Present-day digital locks are so robust that smartphones can be used to control them.
Operations such as locking and unlocking doors, changing key codes, including new
members in the access lists, can be easily performed, and that too remotely using
smartphones. 41
NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA
Connected Healthcare: Here, healthcare devices connect to hospitals, doctors,
and relatives to alert them of medical emergencies and take preventive measures.
▪The devices may be simple wearable appliances, monitoring just the heart rate and
pulse of the wearer, as well as regular medical devices and monitors in hospitals.
▪ The connected nature of these systems makes the availability of medical records and
test results much faster, cheaper, and convenient for both patients as well as hospital
authorities.
Connected Vehicles: Connected vehicles may communicate to the Internet or with
other vehicles, or even with sensors and actuators contained within it.
▪ These vehicles self-diagnose themselves and alert owners about system failures .

Smart Cities: This is a city-wide implementation of smart sensing, monitoring, and


actuation systems.
▪The city-wide infrastructure communicating amongst themselves enables unified and
synchronized operations and information dissemination.
▪ Some of the facilities which may benefit are parking, transportation, and others.
NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 42
Smart Dust: These are microscopic computers. Smaller than a grain of sand each,
they can be used in numerous beneficial ways, where regular computers cannot operate.
For example, smart dust can be sprayed to measure chemicals in the soil or even
to diagnose problems in the human body.
Smart Factories: These factories can monitor plant processes, assembly lines,
distribution lines, and manage factory floors all on their own. The reduction in mishaps
due to human errors in judgment or unoptimized processes is drastically reduced.
UAVs: UAVs or unmanned aerial vehicles have emerged as robust public domain
solutions tasked with applications ranging from agriculture, surveys, surveillance,
deliveries, stock maintenance, asset management, and other tasks.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 43


cyber physical system

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 44


Enabling IoT and the Complex Interdependence of Technologies

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 45


The IoT model is divided into 4 Planes
1.Services
2.Local connectivity
3.Global connectivity
4.Prosessing
▪The service plane :
composed of two parts: 1) things or devices and 2) low-power connectivity.
The things may be wearables, computers, smartphones, household appliances, smart
glasses, factory machinery, vending machines, vehicles, UAVs, robots, and other such
contraptions (which may even be just a sensor).
▪ The immediate low-power connectivity, which is responsible for connecting the things in
local implementation, may be legacy protocols such as WiFi, Ethernet, or cellular.
▪ In contrast, modern-day technologies are mainly wireless and often programmable such
as Zigbee, RFID, Bluetooth, 6LoWPAN, LoRA, Insteon, and others.
NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 46
The local connectivity is responsible for distributing Internet access to multiple local
IoT deployments.
▪This distribution may be on the basis of the physical placement of the things, on the
basis of the application domains, or even on the basis of providers of services.
▪Services such as address management, device management, security, sleep
scheduling, and others fall within the scope of this plane.

▪ For example, in a smart home environment, the first floor and the
ground floor may have local IoT implementations, which have various
things connected to the network via low-power, low-range connectivity
technologies.
▪ The traffic from these two floors merges into a single router or a
gateway. The total traffic intended for the Internet from a smart home
leaves through a single gateway or router, which may be assigned a
single global IP address (for the whole house).
NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 47
Global connectivity
▪Plays a significant role in enabling IoT in the real sense by
allowing for worldwide implementations and connectivity
between things, users, controllers, and applications.
▪This plane also falls under the purview of IoT management as
it decides how and when to store data, when to process it,
when to forward it, and in which form to forward it.
▪The Web, data-centers, remote servers, Cloud, and others
make up this plane.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 48


Processing Plane
▪ Can be considered as a top-up of the basic IoT networking framework.
▪ The continuous rise in the usefulness and penetration of IoT in various
application areas such as industries, transportation, healthcare, and
others is the result of this plane.
▪Various computing paradigms such as “big data”, “machine Learning”,
and others,
fall within the scope of this domain

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 49


IoT Networking Components

The devices
have locally
unique (LU-x)
device
identifiers.
These
identifiers are
unique only
within
a LAN.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 50


▪An IoT implementation is composed of several components, which
may vary with their application domains.

There are six broad components of IoT network:


1)IoT node,
2) IoT router,
3) IoT LAN,
4) IoT WAN,
5) IoT gateway,
6) IoT proxy.

NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 51


IoT Node: These are the networking devices within an IoT LAN.
Each of these devices is typically made up of a sensor, a
processor, and a radio, which communicates with the
network infrastructure.
IoT Router: An I oT router is a piece of networking equipment that is
primarily
tasked with the routing of packets between various entities in the IoT
network;
it IoT
keeps theThe
LAN: traffic flowing
local area correctly within the
network (LAN) network.
enables local connectivity within
▪ Atherouter can be repurposed as a gateway by enhancing its functionalities.
purview of a single gateway.
▪Typically, they consist of short-range connectivity technologies. IoT
LANs may or may not be connected to the Internet. Generally, they are
localized within a building or an organization.
NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 52
IoT WAN: The wide area network (WAN) connects various network
segments such as LANs.
▪ They are typically organizationally and geographically wide, with their
operational range lying between a few kilometers to hundreds of
kilometers. IoT WANs connect to the Internet and enable Internet access to
the segments they are connecting.
IoT Gateway: An IoT gateway is simply a router connecting the IoT LAN to
a WAN or the Internet.
▪ Gateways can implement several LANs and WANs. Their primary task is to
forward packets between LANs and WANs, and the IP layer using only
layer 3.
IoT Proxy: Proxies actively lie on the application layer and performs
application layer functions between IoT nodes and other entities.
▪ Typically, application layer proxies are a means of providing security to the
network entities under it ; it helps to extend the addressing range of its
network NALINA S B ,ASST.PROFESSOR,DEPT.OF ECE,JNNCE,SHIVAMOGGA 53

You might also like