Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
31 views15 pages

ICPA Notes

this Document contain cloud Processing techniques

Uploaded by

devi.g
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views15 pages

ICPA Notes

this Document contain cloud Processing techniques

Uploaded by

devi.g
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Unit1

IoT devices
Internet of things (IoT) devices are nonstandard computing
hardware -- such as sensors, actuators or appliances -- that
connect wirelessly to a network and can transmit data.

IoT extends internet connectivity beyond typical computing


devices -- such as desktops, laptops, smartphones and tablets
-- to any range of traditionally dumb or non-internet-enabled
physical devices and everyday objects. Embedded with
technology, these devices can communicate and interact over
the internet, and can be remotely monitored and controlled.

IoT devices have both industrial and consumer uses and are
typically integrated into other tools such as mobile devices,
industrial equipment and medical devices. Over a broad range,
they can also be used in smart cities. They're then used to send
data or interact with other IoT devices over a network.

IoT and IoT devices aid in making daily activities faster, easier
or more convenient for consumers while also providing real-
time data for industrial or enterprise use cases.

Examples of an IoT device

Connected devices are part of an ecosystem in which every


device talks to other related devices in the environment to
automate home and industry tasks. They can transmit sensor
data to users, businesses and other intended parties. The
Unit1
devices can be categorized into three main groups: consumer,
enterprise and industrial.

Consumer-connected devices include smart TVs, smart


speakers such as Google Home, toys, wearables and smart
appliances. In a smart home, for example, IoT devices are
designed to sense and respond to a person's presence. When a
person arrives home, their car communicates with the garage
to open the door. Once inside, the thermostat is already
adjusted to a preset temperature, and the lighting is set to a
lower intensity and color. Other smart home devices include
sprinklers that adjust the amount of water distributed on the
lawn based on the weather forecast and robotic vacuum
cleaners that learn which areas of the home must be cleaned
most often.

Enterprise IoT devices are edge devices designed for


businesses. There are a wide variety of enterprise IoT devices
available. These devices vary in capabilities but tend to be
geared toward maintaining a facility or improving operational
efficiency. Some options include smart locks, smart
thermostats, smart lighting and smart security. Consumer
versions of these technologies exist as well.

In the enterprise, smart devices can help with meetings. Smart


sensors located in a conference room can help an employee
locate and schedule an available room for a meeting, ensuring
the proper room type, size and features are available.
Unit1

Consumer, enterprise and industrial IoT devices include


smart TVs and smart sensors outfitted for conference rooms
and assembly line machines.

How do IoT devices work?

IoT devices vary in terms of functionality, but also have some


similarities in how they work. First, IoT devices are physical
objects designed to interact with the real world in some way.
The device might be a sensor on an assembly line or an
intelligent security camera. In either case, the device senses
what's happening in its surrounding environment.

The devices themselves typically include an integrated CPU,


firmware and a network adapter. In most cases, IoT devices
Unit1
connect to a Dynamic Host Configuration Protocol server and
acquire an IP address that it can use to function on the
network. Some IoT devices are directly accessible over the
public internet, but most are designed to operate exclusively on
private networks.

Although not an absolute requirement, many IoT devices are


configured and managed through a software application. Some
devices, however, have integrated web servers, eliminating the
need for an external application.

Once an IoT device has been configured and begins to operate,


most of its traffic is outbound. A security camera, for example,
streams video data. Likewise, an industrial sensor streams
sensor data. Some IoT devices such as smart lights, however,
do accept inputs.

Networking basics
Switches, routers, and wireless access points are the
essential networking basics. Through them, devices connected
to your network can communicate with one another and with
other networks, like the Internet. Switches, routers, and
wireless access points perform very different functions in a
network.

Switches
Switches are the foundation of most business networks. A
switch acts as a controller, connecting computers, printers, and
Unit1
servers to a network in a building or a campus. Switches allow
devices on your network to communicate with each other, as
well as with other networks, creating a network of shared
resources. Through information sharing and resource allocation,
switches save money and increase productivity.

There are two basic types of switches to choose from as part of


your networking basics: on-premises and cloud-managed.
 A managed on-premises switch lets you configure and
monitor your LAN, giving you tighter control of your network
traffic.
 A cloud-managed switch can simplify your network
management. You get a simple user interface, multisite full-
stack management, and automatic updates delivered directly
to the switch.
Routers
Routers connect multiple networks together. They also connect
computers on those networks to the Internet. Routers enable all
networked computers to share a single Internet connection,
which saves money.

A router acts a dispatcher. It analyzes data being sent


across a network, chooses the best route for data to travel, and
sends it on its way. Routers connect your business to the world,
protect information from security threats, and can even decide
which computers receive priority over others.

Beyond those basic networking functions, routers come


with additional features to make networking easier or more
Unit1
secure. Depending on your security needs, for example, you
can choose a router with a firewall, a virtual private network
(VPN), or an Internet Protocol (IP) communications system.

Access Points
An access point* allows devices to connect to the wireless
network without cables. A wireless network makes it easy to
bring new devices online and provides flexible support to
mobile workers. Stay connected from anywhere with
wireless access points.
An access point acts like an amplifier for your network. While a
router provides the bandwidth, an access point extends that
bandwidth so that the network can support many devices, and
those devices can access the network from farther away.

But an access point does more than simply extend Wi-Fi. It can
also give useful data about the devices on the network, provide
proactive security, and serve many other practical purposes.

Access points support different IEEE standards. Each standard


is an amendment that was ratified over time. The standards
operate on varying frequencies, deliver different bandwidth,
and support different numbers of channels.

Wireless Networking
To create your wireless network, you can choose between three
types of deployment: centralized deployment, converged
deployment, and cloud-based deployment.
Unit1
1. Centralized deployment

The most common type of wireless network system, centralized


deployments are traditionally used in campuses where
buildings and networks are in close proximity. This deployment
consolidates the wireless network, which makes upgrades
easier and facilitates advanced wireless functionality.
Controllers are based on-premises and are installed in a
centralized location.

2. Converged deployment

For small campuses or branch offices, converged deployments


offer consistency in wireless and wired connections. This
deployment converges wired and wireless on one network
device—accesses switch—and perform the dual role of both
switch and wireless controller.

3. Cloud-based deployment

This system uses the cloud to manage network devices


deployed on-premises at different locations. The solution
requires Cisco Meraki cloud-managed devices, which provide
full visibility of the network through their dashboards.
Want to learn more?

IoT networking connectivity


protocols
The Internet of Things (IoT) is about the network of sensor
devices to the web in real-time. IoT devices communicate with
Unit1
each other over the network, so certain standards and rules
need to be set to determine how data is exchanged. These
rules are called IoT Network Protocols. Today, a wide variety of
IoT devices are available, and therefore different protocols have
been designed.

IoT Protocols Should Satisfy These Requirements


 Allow communication among various devices
simultaneously.
 IoT is being used in critical areas like health, industries,
home surveillance, etc. hence communication security
needs to be ensured.
 Transport data efficiently.
 IoT devices can be added or removed from the IoT
network. Hence protocols must provide scalability.

There are many such protocols developed for IoT. One way
to decide which protocol to use is to consider the environment
for which these protocols are designed. Some are designed for
small ranges; some are for wide ranges, high data rates, low
data rates, etc. They vary based on power consumption, range,
cost, data rate, etc.

Short Range Communication, Low Data Rate, Low Power


Unit1
Bluetooth

Bluetooth works in a frequency range of 2.4GHz. It covers a


range of 10m to 100m, and its data rate goes up to 1MBPS. It
supports two network topologies – point-to-point and mesh. It is
suitable to send a small amount of data to personal devices like
speakers, earphones, smart watches, smart shoes, etc. This
protocol can also be used for Smart Homes, including Alarms,
HVAC, lighting, etc.

Zigbee

This is based on the IEEE802.15.4 standard. Its frequency range


is the same as that of Bluetooth, which is 2.4GHz. Its range is
up to 100 meters, and the data rate is a maximum of 250KBPS.
Zigbee protocol can transmit small amounts of data within a
short range. This can be used in systems that require high
authentication and robustness. It supports star topology, mesh
topology, and cluster tree topology. Major applications
observed are sensing device health in industries, smart homes,
etc.,

6LoWPAN

PAN stands for Personal Area Network, and 6LoWPAN refers to


IPV6 Low Power PAN. It works in a frequency ranging from 900
to 2400MHz. The data rate is 250KBPS, supporting two network
topologies - star and mesh.

Short Range Communication, High Data Rate


Unit1
WirelessLAN - Wi-Fi

Wi-Fi has high bandwidth and allows a data rate of 54MBPS and
goes up to 600MBPS. Covers a range of 50m in the local area
where providing private antennas goes to 30 km. IoT devices
can be easily connected using Wi-Fi and share a large amount
of data. This protocol is used in smart homes, smart cities,
offices, etc

Long Range Communication, High Data Rate, Low power

LoRaWAN

This stands for Long Range Wide Area Network. Its range is
approximately 2.5km and can go up to 15km. The data rate is
very low, which is 03, and KBPS and goes up to a maximum of
50KBPS. It can support many connected devices and is used in
applications like Smart City, Supply Chain Management, etc.

LTE-M

LTE-M stands for Long Term Evolution for Machines. This is a


type of LPWAN – Low Power Wide Area Network. This is used
along with cellular networks to provide security. LTE-M works in
a frequency range of 1.4MHz-5MHz, and the data rate can go
up to 4MBPS.

Long Range, Low Data Rate, Low Power Consumption


Unit1
Sigfox

Sigfox is used when wide area coverage is required with


minimum power consumption. It aims at connecting billions of
IoT devices. This protocol’s frequency range is 900MHZ,
covering a range of 3km to 50km. The maximum data rate is
very low, which is 1KBPS.

Long Range, Low Data Rate, High Power Consumption

Cellular

This is also known as a mobile network. Cellular networks are


2G, 3G, 4G, and 5G. It Has frequency ranges – 900MHz,
1.8/1.9/2.1 GHz. The range is approximately 35km and goes up
to 200km. The average data rate is 35KBPS – 170KBPS. Cellular
networks consume high power. This protocol is not used for
most IoT devices due to frequency and security issues. It can
be used with IoT applications like connected cars.

IoT networking data


messaging protocols
The Session Layer manages the connection between two
endpoints of a network by controlling data between sender and
receiver whereas session layer protocols are responsible for the
actual transmission of data in the IoT ecosystem. That’s why
these Session Layer protocols are called IoT Messaging
Protocols sometimes referred to as IoT Data Protocols. Most
Unit1
IoT applications use TCP and UDP for transport and these
messaging protocols can operate over TCP or UDP.

Types of Session Layer Messaging


Protocols
Different types of messaging protocols are present by different
standardization organizations and depending upon their
implementations they are used. Below are some of the popular
IoT Messaging protocols used in the IoT ecosystem.

1. Message Queue Telemetry Transport


(MQTT)
Message Queue Telemetry Transport is most widely adopted
M2M(machine-to-machine) messaging protocol which was
introduced by IBM in 1999. It uses a Publisher-Subscriber
mechanism to operate means Publishers are lightweight sensors
that collect data and connect to a mediation layer i.e. to a
broker(or dealer) to send their data. Then subscribers are
applications that collect required sensory data from the broker.
This mechanism minimizes the payload. It is mainly used when a
huge network of low-power small devices or where IoT devices
may have limited bandwidth and need to be monitored or
managed via the Internet.
Unit1

MQTT

2. Advanced Message Queuing Protocol


(AMQP)
Advanced Message Queuing Protocol is an open standard
session layer protocol useful for sending transnational messages
that is why mainly used in the financial industry. It runs over TCP
(Transmission Control Protocol) or UDP (User Datagram
Protocol) which is nearly similar to that of MQTT. But only
difference is that Broker(Dealer) contains Exchange and Queues
as a result it is focused on not losing messages. The exchange
receives messages from publishers and distributes them to
respective queues. Different subscribers collect topic wise
sensory data from respective topic queues.

3. Constrained Application Protocol (CoAP)


Constrained Application Protocol is a session layer protocol
that uses RESTful architecture which is a standard interface
between HTTP clients and servers. It uses UDP (User Datagram
Protocol) protocol for lightweight implementation so it is based
Unit1
on two sublayers i.e messaging and request/response for
interaction. This protocol is designed to address IoT systems
based on HTTP protocols. So, CoAP utilizes all HTTP methods like
GET, PUT, PUSH, DELETE for message transmission, and
accessing resources. It is a specialized web transfer protocol
which uses constrained nodes/devices on same constrained
networks in Internet of Things.

4. Secure Message Queue Telemetry


Transport (SMQTT)
SMQTT works as an extension to MQTT protocol. It is based on an
encryption messaging mechanism that’s why it provides a secure
messaging standard. In this protocol, subscriber sends encrypted
messages to all nodes and nodes receive encrypted message
and use message after decryption. The encryption and
decryption activities are carried out by using master key. This
protocol follows four main stages i.e., Setup, Encryption,
Publish, Decryption.
 In Setup, both publisher and subscriber register themselves
near broker and get master keys.
 In the Encryption stage, broker encrypts published message.
 In the Published stage, broker gives encrypted data to
subscribers.
 In the Decryption stage which is last stage, data /message is
decrypted by subscriber using that master key.

5. Data Distribution Service (DDS)


Data Distribution Service is another publish-subscribe protocol
but it is different from MQTT which connects them to server but
here DDS protocol is a Broker-less architecture that’s why it is a
Unit1
high speed and high-performance protocol than MQTT as it is not
dependent upon any intermediary system. It is designed by the
OMG (Object Management Group) for device to device
communications. This protocol has two fundamental sublayers
i.e., Data-Centric Publish-Subscribe (DCPS) and Data Local
Reconstruction Layer (DLRL). The DCPS layer is responsible for
message delivering to subscriber and DLRL layer is responsible
for simple integration of DDS in application layer but it is
optional.

6. XMPP (Extensible Messaging and


Presence Protocol)
XMPP is a short form for Extensible Messaging Presence Protocol .
It’s protocol for streaming XML elements over a network in order
to exchange messages and present information in close to real-
time. Let’s dive into each character of word XMPP:
 X : It means eXtensible. XMPP is an open-source project which
can be changed or extended according to the need.
 M : XMPP is designed for sending messages in real time. It has
very efficient push mechanism compared to other protocols.
 P : It determines whether you are online/offline/busy. It
indicates the state.
 P : XMPP is a protocol, that is, a set of standards that allow
systems to communicate with each other.

You might also like