SlideShare a Scribd company logo
Internet of Things
(20CS002)
Department of Computer Science and Engineering
Vignan's Foundation for Science, Technology & Research
• Internet Of Things: A Hands-On Approach by Arsheep
Bahga, Vijay Madisetti
• Computer Networking: A Top-Down Approach by James
Kurose, Keith Ross
• DATA COMMUNICATIONS AND NETWORKING by Behrouz
A. Forouzan
References
Network Components
Networking hardware includes all computers, peripherals, interface
cards and other equipment needed to perform data-processing and
communications within the network.
Network Components
• MODEM
• Hub
• Router
• Gateway
• Switch
• Bridge
• Repeater
Modem
• MODEM network device consists of two words MO from
modulator and DEM from demodulator.
• Modem converts digital signal to analog signal then this
process is called modulation. Again, when modem
converts analog signal to digital signal then this process is
called demodulation.
Types of MODEM
1. Acoustic coupler modem gives a slower speed. This
network device may remain built in in your PC. It is not
expensive but no more uses now a days.
2. Direct modem gives more speed than acoustic coupler
modem. It is connected with computer port using USB port.
This is more expensive network device than acoustic
coupler modem.
Hub
• To establish a local area network, we need a central device which
can connect all the computer is called Hub.
• Active hub increases the value of signal and remove unnecessary
signal is called active hub. Moreover, it can also process the signal.
Sometimes, this type of hub is called intelligent hub.
• Passive hub doesn’t increase the value of signal. Passive hub only
helps to exchange information from computer to computer. This
type of network devices are connected with active devices.
Merits of hub
• It is not expensive.
• It can connect various medium.
Demerits of hub
• Increase the network traffic.
• Increase collision among data.
• Data filtering can’t possible.
Router
Routers connect LANs and WANs together and have a
dynamically updating routing table based on which they
make decisions on routing the data packets.
Merits of router
• Router has the power to connect different network.
• It removes the restriction to exchange data.
• It can filter broadcast data.
Demerits of router
• Router gives a slower speed.
• Gives complex configuration.
• It can’t connect network of different protocol.
Gateway
Gateway is being used to connect different network. When a
network has different protocol then gateway is used to
connect that device with the network.
Merits of gateway
• Gateway reduces data collision rate.
• Send data according to receiver’s protocol.
• It can connect network from different protocol.
Demerits of gateway
• More expensive than router.
• It has a complex configuration.
• Its speed is comparatively slow.
Switch
Switch is a network device of many ports which helps to
flow information. Though it looks like hub but it exchanges
data in a different manner among clients. Switch increases
the performance of network and can communicate among
many computers at a time.
Merits of switch
• Switch reduces the collision rate of data.
• It is possible to control broadcast using virtual LAN.
Demerit of switch
• It is more expensive than hub.
• Not possible to filter data.
Bridge and Repeater
• A bridge is a repeater, with add on the functionality of
filtering content by reading the MAC addresses of source
and destination.
• It is also used for interconnecting two LANs working on the
same protocol.
• It has a single input and single output port, thus making it
a 2 port device
• Repeater regenerate the signal over the same network
before the signal becomes too weak or corrupted so as to
extend the length to which the signal can be transmitted
over the same network.
• Repeaters did not amplify the signal. When the signal
becomes weak, they copy the signal bit by bit and
regenerate it at the original strength. It is a 2 port device.
Network
What’s the Internet:“nuts and bolts” view
 billions of connected
computing devices:
• hosts = end systems
• running network apps
 communication links
• fiber, copper, radio,
satellite
• transmission rate:
bandwidth
 packet switches: forward
packets (chunks of data)
• routers and switches
wired
links
wireless
links
router
smartphone
PC
server
wireless
laptop
mobile network
global ISP
regional ISP
home
network
institutional
network
 Internet: “network of networks”
• Interconnected ISPs
 protocols control sending, receiving
of messages
• e.g.,TCP, IP, HTTP, Skype, 802.11
 Internet standards
• RFC: Request for comments
• IETF: Internet Engineering Task Force
What’s the Internet:“nuts and bolts” view
mobile network
global ISP
regional ISP
home
network
institutional
network
What’s a protocol?
human protocols:
 “what’s the time?”
 “I have a question”
 introductions
… specific messages sent
… specific actions taken
when messages
received, or other
events
network protocols:
 machines rather than
humans
 all communication activity
in Internet governed by
protocols
protocols define format, order of
messages sent and received
among network entities, and
actions taken on message
transmission, receipt
a human protocol and a computer network protocol:
Hi
Hi
Got the
time?
2:00
TCP connection
response
Get http://www.awl.com/kurose-ross
<file>
time
TCP connection
request
What’s a protocol?
A closer look at network structure:
 network edge:
• hosts: clients and servers
• servers often in data
centers
 access networks, physical
media: wired, wireless
communication links
 network core:
• interconnected routers
• network of networks
mobile network
global ISP
regional ISP
home
network
institutional
network
Access networks and physical media
Q: How to connect end
systems to edge router?
 residential access nets
 institutional access
networks (school, company)
 mobile access networks
keep in mind:
 bandwidth (bits per second)
of access network?
 shared or dedicated?
ISP
Access network: digital subscriber line (DSL)
central office telephone
network
DSLAM
voice, data transmitted
at different frequencies over
dedicated line to central office
 use existing telephone line to central office DSLAM
• data over DSL phone line goes to Internet
• voice over DSL phone line goes to telephone net
 < 2.5 Mbps upstream transmission rate (typically < 1 Mbps)
 < 24 Mbps downstream transmission rate (typically < 10 Mbps)
DSL
modem
splitter
DSL access
multiplexer
ISP
data, TV transmitted at different
frequencies over shared cable
distribution network
cable
modem
splitter
…
cable headend
CMTS
cable modem
termination system
 HFC: hybrid fiber coax
• asymmetric: up to 30Mbps downstream transmission rate, 2
Mbps upstream transmission rate
 network of cable, fiber attaches homes to ISP router
• homes share access network to cable headend
• unlike DSL, which has dedicated access to central office
Access network: cable network
Access network: home network
to/from headend or
central office
cable or DSL modem
router, firewall, NAT
wired Ethernet (1 Gbps)
wireless access
point (54 Mbps)
wireless
devices
often combined
in single box
Enterprise access networks (Ethernet)
 typically used in companies, universities, etc.
 10 Mbps, 100Mbps, 1Gbps, 10Gbps transmission rates
 today, end systems typically connect into Ethernet switch
Ethernet
switch
institutional mail,
web servers
institutional router
institutional link to
ISP (Internet)
Wireless access networks
 shared wireless access network connects end system to router
• via base station aka “access point”
wireless LANs:
 within building (100 ft.)
 802.11b/g/n (WiFi): 11, 54, 450
Mbps transmission rate
wide-area wireless access
 provided by telco (cellular)
operator, 10’s km
 between 1 and 10 Mbps
 3G, 4G: LTE
to Internet
to Internet
Host: sends packets of data
host sending function:
 takes application message
 breaks into smaller
chunks, known as packets,
of length L bits
 transmits packet into
access network at
transmission rate R
• link transmission rate,
aka link capacity, aka
link bandwidth
R: link transmission rate
host
1
2
two packets,
L bits each
packet
transmission
delay
time needed to
transmit L-bit
packet into link
L (bits)
R (bits/sec)
= =
A
B
How do loss and delay occur?
packets queue in router buffers
 packet arrival rate to link (temporarily) exceeds output link
capacity
 packets queue, wait for turn
packet being transmitted (delay)
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
Four sources of packet delay
dproc: nodal processing
 check bit errors
 determine output link
 typically < msec
dqueue: queueing delay
 time waiting at output link
for transmission
 depends on congestion
level of router
propagation
nodal
processing queueing
dnodal = dproc + dqueue + dtrans + dprop
A
B
transmission
dtrans: transmission delay:
 L: packet length (bits)
 R: link bandwidth (bps)
 dtrans = L/R
dprop: propagation delay:
 d: length of physical link
 s: propagation speed (~2x108
m/sec)
 dprop = d/s
Four sources of packet delay
dtrans and dprop
very different
propagation
nodal
processing queueing
dnodal = dproc + dqueue + dtrans + dprop
A
B
transmission
Packet loss
 queue (aka buffer) preceding link in buffer has finite
capacity
 packet arriving to full queue dropped (aka lost)
 lost packet may be retransmitted by previous node, by
source end system, or not at all
A
B
packet being transmitted
packet arriving to
full buffer is lost
buffer
(waiting area)
Throughput
 throughput: rate (bits/time unit) at which bits
transferred between sender/receiver
• instantaneous: rate at given point in time
• average: rate over longer period of time
server, with
file of F bits
to send to client
link capacity
Rs bits/sec
link capacity
Rc bits/sec
server sends bits
(fluid) into pipe
pipe that can carry
fluid at rate
Rs bits/sec)
pipe that can carry
fluid at rate
Rc bits/sec)
Internet structure: network of networks
Question: given millions of access ISPs, how to connect them
together?
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
…
…
…
…
…
…
Internet structure: network of networks
Option: connect each access ISP to every other access ISP?
access
net
access
net
…
…
…
…
…
…
…
…
connecting each access ISP
to each other directly doesn’t
scale: O(N2
) connections.
access
net
access
net
access
net
access
net
access
net
access
net …
access
net
access
net
access
net
access
net
…
access
net
access
net
access
net
access
net
…
Internet structure: network of networks
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
…
…
…
…
…
…
Option: connect each access ISP to one global transit ISP?
Customer and provider ISPs have economic agreement.
global
ISP
ISP C
ISP B
ISP A
Internet structure: network of networks
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
…
…
…
…
…
…
But if one global ISP is viable business, there will be competitors
….
access
net
ISP C
ISP B
ISP A
Internet structure: network of networks
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
…
…
…
…
…
…
access
net
But if one global ISP is viable business, there will be competitors
…. which must be interconnected
IXP
peering link
Internet exchange point
IXP
ISP C
ISP B
ISP A
Internet structure: network of networks
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
…
…
…
…
…
…
access
net
IXP
IXP
access
net
access
net
access
net
regional net
… and regional networks may arise to connect access nets to
ISPs
ISP C
ISP B
ISP A
Internet structure: network of networks
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
…
…
…
…
…
…
access
net
IXP
IXP
access
net
access
net
access
net
regional net
Content provider network
… and content provider networks (e.g., Google, Microsoft,
Akamai) may run their own network, to bring services, content
close to end users
Internet structure: network of networks
 at center: small # of well-connected large networks
• “tier-1” commercial ISPs (e.g., Level 3, Sprint,AT&T, NTT), national &
international coverage
• content provider network (e.g., Google): private network that connects
it data centers to Internet, often bypassing tier-1, regional ISPs
IXP IXP IXP
Tier 1 ISP Tier 1 ISP Google
Regional ISP Regional ISP
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
IoT Communication Models
Request - Response Model:
• Client sends request to the server and
the server responds to the requests
• When the server receives a request, it
decides how to respond, fetches the
data, retrieves resource
representations, prepares
the response, and then sends the
response to the client
• Request-response model is a stateless
communication model and each
request-response pair is independent
of others.
Request and Response model
Publish-Subscribe model
• Publish-Subscribe is a
communication model that involves
publishers, brokers and consumers​
• Publishers are the source of data​
• Publishers send the data to the topics
which are managed by the brokers​
• Publishers are not aware of the
consumers​
• Consumers subscribe to the topics
which are managed by the broker​
• When the broker receives data for a
topic from the publisher, it sends the
data to all the subscribed consumers​
Push-Pull model
• Push-Pull is a communication
model in which the data
producers push the data to
queues and the consumers pull
the data from the queues
• Producers do not need to be
aware of the consumers
• Queues help in decoupling the
messaging between the
producers and consumers
• Queues also act as a buffer
which helps in situations when
there is a mismatch between the
rate at which the producers
push data and the rate at which
the consumers pull data
Exclusive-Pair model
• Exclusive pair is a Bi-directional, fully
duplex communication model that uses
a persistent connection between the
client and server
• Once the connection is setup it remains
open until the client sends a request to
close the connection
• Client and server can send messages to
each other after connection setup
• Exclusive pair is a stateful
communication model and the server
is aware of all the open connections
IoT Communication APIs
• Application Programming Interface (API) referring to standard framework collection, protocols,
and resources dictating the generic web and mobile application. It defines the communication rules
that every application component must follow while exchanging information with each other.
• An API is an interface used by programs to access an application. IoT APIs are the interface points
between an IoT device and the Internet and/or other network components.
• APIs that are used in the creation of IoT solutions are known as IoT APIs. They are the web services
application programming interfaces.
IoT Communication APIs
API vendors for the Internet of Things
• Withings API developers involved in the development of measurement devices can be benefitted
hugely as the API can share the collected data over the internet. Most commonly, the collected
information by this API vendor is ECG and EKG, body weight, and sleep cycles.
• Garmin Health API is perfect choice for developers involved in developing the IoT appliances
operating in the health care and activity industry, Garmin Health APIs can monitor around 30 types of
activities. Data related to total sleep hours, steps walked, stress level, heart rate, and many more.
• Google Assistant API capable of being integrated into IoT devices easily and supports operations like
voice control, natural language processing, and many other facilities. Using the API, developers can
easily make IoT devices voice-controlled by phones, displays, watches, TV, laptops, and Google Home
Devices.
• Apple HomeKit API serves as a doable platform for connecting Siri and iPhone with the Apple-based
home devices and appliances. Accessible with the help of Apple iOS8 SDK, the APIs can make devices
like lights, garages, doors, TV, and many more to be controlled directly via voice.
REST based Communication APIs
• Representational State Transfer (REST) APIs is a set of architectural principles by which you
can design Web services the Web APIs that focus on the system's resources and how resource
states are addressed and transferred.
• Uniform Resource Identifier (URI) are used to depict resources in the RESTful web service.
• Client tries to access these resources via URIs using commands like GET, PUT, POST,
DELETE and so on that are defined by HTTP.
• In response, the server responds with a JSON object or XML file.
• The REST architectural constraints are
• Client-Server
• Stateless
• Cache-able
• Layered system
• Uniform Interface
• Code on demand
REST based Communication APIs
• Client-Server: The principle behind the client-server constraint is the separation
of concerns.​
1. Client should not interfere the storage of data from server​
2. Server should not be concerned about the user interface​
• Stateless: Each request from client to server must contain all the information
necessary to understand the request, and cannot take advantage of any sored
context on the server​
. The session state is kept entirely on the client​
• Cache-able: Cache constraint requires that the data within a response to a request
be implicitly or explicitly labeled as cache-able or non-cache-able​
1. If a response is cache-able, then a client cache is given the right to reuse that
response data for later, equivalent requests.​
2. Catching can partially or completely eliminate some interactions and improve
efficiency and scalability.
REST based Communication APIs
• Layered System: A layered system defines the boundaries of the components
within each specific layer. For example, A client is unable to tell whether it is
connected to the end server or an intermediate node.
• Uniform Interface: This constraint requires that the method of communication
between a client and a server must be uniform
• When a client holds a representation of a resource it has all the information
required to update or delete the resource
• Each message includes enough information to describe how to process the
message
• Code on demand: Servers can provide executable code or scripts for clients to
execute in their context (it is optional).
REST based Communication APIs
WebSocket based Communication APIs
• WebSocket APIs enable bi-directional and duplex communication between
customers and servers. It is a stateful type.
• Unlike REST, There is no need to set up a connection every now and then to send
messages between a client and a server.
• It works on the principle of the exclusive pair model.
• WebSocket APIs reduce the network traffic and latency as there is no overhead for
connection setup and termination requests for each message
• Due to one time dedicated connection setup, there is less overhead, lower traffic and
less latency and high throughput.
WebSocket based Communication APIs
REST vs WebSocket APIs
Levels of IoT
An IoT system comprises of the following components:
• Device: Allows identification, remote sensing, actuating and remote monitoring
capabilities. IoT devices include wireless sensors, software, actuators, and computer
devices operates through the internet, enabling the transfer of data among objects
automatically without human intervention.
• Resource: Every IoT has a software module for the entry, processing, and storage of
sensor data. They are therefore used to control actuators connected to devices.
• Controller Service: It acts as a connector between web service and device. The
controller service sends data from the system to the web service and receives
commands for controlling the device from the application (via web services).
Levels of IoT
• Database: It is the repository for all data provided by IoT devices. It is either held
locally or on the cloud in the form of a database.
• Web Service: It connect the IoT computer, application, database, and research
components. Web services may be implemented either using HTTP and REST
concepts (REST service) or the WebSocket protocol (WebSocket service).
• Analysis Component: It retrieves data from the IoT device's database and turns it
into useful information. This module analyses data, produce results and presents them
in a user-friendly format using various algorithms. This analysis can be performed
locally or in the cloud, and the resulting data can be stored locally or in the cloud.
• Application: IoT applications have a user-friendly interface to track and manage
different IoT device aspects. Users will access the monitor system and the data
generated.
IoT Level - 1
• IoT system consists of a single device performs
sensing or actuations, stores data, analyses it
and hosts the application.
• The data sensed is processed locally.
• Data processing is performed locally.
Example: Consider an IoT device that monitors
the lights in a house. The lights are controlled
through switches. Status of each light is maintained
in a local database.
REST services deployed locally allow retrieving
and updating state of each light in the database and
triggers the switches accordingly.
Application has a user interface for controlling the
lights or applications locally.
IoT Level - 2
• A node performs sensing / actuation and
local analysis. Data is stored in the cloud.
• It is useful for solutions where the data is
large, but the primary analysis criterion is
not computationally intensive and can be
performed locally.
Example: A single node monitors the soil
moisture in the field. This is sent to the
database on cloud using REST APIs.
Controller service continuously monitors
moisture levels. Cloud based application is
used for monitoring and controlling the IoT
system.
IoT Level - 3
A single node monitors the environment and
stores data in the cloud. Application is cloud
based. This is suitable where data is voluminous
and analysis is computationally intensive.
Example: A node is monitoring a package
using devices like accelerometer and gyroscope.
These devices track vibration levels.
Controller service sends sends sensor data to
cloud in real time using WebSocket API.
Data is stored in cloud and visualised using
cloud-based application. Analysis component
triggers alert if vibration levels cross a
threshold.
IoT Level - 4
Multiple nodes collect information and store in
the cloud. A cloud based application controls
the system.
Local and remote observer nodes are present
that subscribe to and receive information
collected in cloud from various devices.
Observer nodes can process information and use
it for applications but do not perform control
functions.
Example: Noise monitoring of a area requires
various nodes functioning independent of each
other. Each has its own controller service. Data
is stored in cloud database. Analysis is done on
the cloud and the entire IOT system is
monitored on the cloud using an application.
IoT Level - 5
Nodes present locally are of two types, end
nodes and coordinator nodes. End nodes collect
data and perform sensing or actuation or both.
Coordinator nodes collect data from end nodes
and sends it to cloud.
Data is stored and analysed in cloud and
application is cloud based.
Example: A monitoring system has various
components: end nodes collect various data
from the environment and send it to coordinator
node. Coordinator node acts as gateway and
allows the data to be transferred to cloud
storage using REST API. Controller service on
the coordinator node sends data to the cloud.
IoT Level - 6
Multiple independent end nodes perform sensing
and actuation and send data to cloud. Data is
stored in cloud and application is cloud based.
The analytics components analyses the data and
stores the results in the cloud database. The
results are visualized with cloud based
application.
The centralized controller is aware of the status of
all the end nodes and sends control commands to
the nodes.
Example: Weather monitoring consists of sensors
that monitor different aspects of a system. The
end nodes send data to cloud storage. Analysis
component, application and storage are in cloud.
Centralized controller controls all nodes and
provides inputs.
Levels Suitability
Level 1 Low- cost and low-complexity solutions where the data involved is not big and the
analysis requirements are not computationally intensive.
Level 2 The data involved is big, however, the primary analysis requirement is not
computationally intensive and can be done locally itself.
Level 3 The data involved is big and the analysis requirements are computationally
intensive.
Level 4 Suitable for solutions where multiple nodes are required, the data involved is big
and the analysis requirements are computationally intensive.
Level 5 Suitable for solutions based on wireless sensor networks, in which the data
involved is big and the analysis requirements are computationally intensive.
Level 6 System that has multiple independent end nodes that perform sensing and/or
actuation and send data to the cloud.

More Related Content

PPTX
Business models for business processes on IoT
FabMinds
 
PDF
iot enabling technologies for IOT subject
KotiBabu7
 
PPT
WSN IN IOT
skumartarget
 
PPTX
Data enrichment
FabMinds
 
PPTX
networking device router,switches & bridges
keyur Nandaniya
 
PPT
Mobile Computing UNIT-7
Ramesh Babu
 
PPTX
Transport layer protocol
N.Jagadish Kumar
 
Business models for business processes on IoT
FabMinds
 
iot enabling technologies for IOT subject
KotiBabu7
 
WSN IN IOT
skumartarget
 
Data enrichment
FabMinds
 
networking device router,switches & bridges
keyur Nandaniya
 
Mobile Computing UNIT-7
Ramesh Babu
 
Transport layer protocol
N.Jagadish Kumar
 

What's hot (20)

PPTX
Routing Protocols in WSN
Darpan Dekivadiya
 
PPTX
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
MeghaShree665225
 
PPTX
dsl (digital subscriber line)
waheed iqbal
 
PPTX
Distributed file system
Anamika Singh
 
PPTX
Csc341 – Lecture 1 network management
Kabul Education University
 
PPT
Network devices
Aryan Kabra
 
PPT
802 15-4 tutorial
SHUBHAM MORGAONKAR
 
PPTX
wireless sensor network
A. Shamel
 
PPT
Switching
Shankar Gangaju
 
PDF
Prototyping Embedded Devices_Internet of Things
alengadan
 
PPTX
CLOUD COMPUTING UNIT-1
Dr K V Subba Reddy
 
PPTX
Data management issues
Neha Bansal
 
PPT
WAN Technologies slide show
NavleshKumar singh
 
PDF
MQTT and CoAP
ITVoyagers
 
PPTX
IOT PROTOCOLS.pptx
DRREC
 
PDF
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
 
PPTX
Wsn unit-1-ppt
Swathi Ch
 
PPT
Mobile Computing UNIT-6
Ramesh Babu
 
PPTX
Qos Quality of services
HayderThary
 
PPTX
CoAP - Web Protocol for IoT
Aniruddha Chakrabarti
 
Routing Protocols in WSN
Darpan Dekivadiya
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
MeghaShree665225
 
dsl (digital subscriber line)
waheed iqbal
 
Distributed file system
Anamika Singh
 
Csc341 – Lecture 1 network management
Kabul Education University
 
Network devices
Aryan Kabra
 
802 15-4 tutorial
SHUBHAM MORGAONKAR
 
wireless sensor network
A. Shamel
 
Switching
Shankar Gangaju
 
Prototyping Embedded Devices_Internet of Things
alengadan
 
CLOUD COMPUTING UNIT-1
Dr K V Subba Reddy
 
Data management issues
Neha Bansal
 
WAN Technologies slide show
NavleshKumar singh
 
MQTT and CoAP
ITVoyagers
 
IOT PROTOCOLS.pptx
DRREC
 
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
 
Wsn unit-1-ppt
Swathi Ch
 
Mobile Computing UNIT-6
Ramesh Babu
 
Qos Quality of services
HayderThary
 
CoAP - Web Protocol for IoT
Aniruddha Chakrabarti
 
Ad

Similar to Internet of Things Communication API and Levels (20)

PDF
1 introduction
TageleBerihun
 
PPTX
Chapter_1_v8.1.pptx computer network chaptee 1
ChetanLunthi
 
PDF
Computer Network notes L1 - Introduction.pdf
workbdevraj
 
PDF
lec1.pdf lecturehsjjdbdbdjkxndbnsjskdndb
NMadhu5
 
PPTX
1-Introduction.pptx cccccccccccccccccccccc
taheenaamir
 
PPT
Sept 2017 introduction
shahin raj
 
PPT
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
nesarahmad37
 
PPTX
ComputerNetwork_Introductions_C1_en.pptx
huypmg22git
 
PPTX
About the uses of internet & benefits of internet
samiulmahmood999
 
PPT
1st Talk
Aniruddha Das
 
PDF
Lec 2(intoduction of computer networkes)
maamir farooq
 
PPT
networking.ppt
suchita74
 
PPTX
unit 1- Basics of Computer communication and networks.pptx
shwethavbhat
 
PPTX
Computer Networks
Mark Rotondella
 
PPT
Lecture 02-Computer Networks Network Edge & Core.ppt
itzjokerehere2002
 
PPTX
Networking devices
Ravi KC
 
PPTX
Lecture 12
Anwal Mirza
 
PDF
computernetworking.pdf
MariaChristinaTagle1
 
PPT
Chapter1
guest0af0cf
 
PPTX
Network Components
Ifrad Mahbub
 
1 introduction
TageleBerihun
 
Chapter_1_v8.1.pptx computer network chaptee 1
ChetanLunthi
 
Computer Network notes L1 - Introduction.pdf
workbdevraj
 
lec1.pdf lecturehsjjdbdbdjkxndbnsjskdndb
NMadhu5
 
1-Introduction.pptx cccccccccccccccccccccc
taheenaamir
 
Sept 2017 introduction
shahin raj
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
nesarahmad37
 
ComputerNetwork_Introductions_C1_en.pptx
huypmg22git
 
About the uses of internet & benefits of internet
samiulmahmood999
 
1st Talk
Aniruddha Das
 
Lec 2(intoduction of computer networkes)
maamir farooq
 
networking.ppt
suchita74
 
unit 1- Basics of Computer communication and networks.pptx
shwethavbhat
 
Computer Networks
Mark Rotondella
 
Lecture 02-Computer Networks Network Edge & Core.ppt
itzjokerehere2002
 
Networking devices
Ravi KC
 
Lecture 12
Anwal Mirza
 
computernetworking.pdf
MariaChristinaTagle1
 
Chapter1
guest0af0cf
 
Network Components
Ifrad Mahbub
 
Ad

More from AvinashAvuthu2 (20)

PPTX
Block chain and its basic terminology include mining
AvinashAvuthu2
 
PPTX
Different Internet of Things Applications
AvinashAvuthu2
 
PPTX
Computer Networks Packet Switchings.pptx
AvinashAvuthu2
 
PPTX
Game Programming Module - 6 AR and VR.pptx
AvinashAvuthu2
 
PPT
Information Security Analysis and Audit 1
AvinashAvuthu2
 
PPT
Security issues in the wireless networks.ppt
AvinashAvuthu2
 
PPTX
M.Tech Internet of Things Unit - III.pptx
AvinashAvuthu2
 
PPTX
M.Tech Internet of Things Unit - IV.pptx
AvinashAvuthu2
 
PPTX
M.Tech Internet of Things Embeed Systems
AvinashAvuthu2
 
PPTX
III CSE Internet of Things Unit - II.pptx
AvinashAvuthu2
 
PPT
Information Security Audit and Analysis Module
AvinashAvuthu2
 
PPT
Module - 2 - Security Device Management.ppt
AvinashAvuthu2
 
PPT
Module - 3 - Device Configuration ISM.ppt
AvinashAvuthu2
 
PPT
Module - 6 - Data and Information Management.ppt
AvinashAvuthu2
 
PPT
Module - 5 - Managing Health and Safety.ppt
AvinashAvuthu2
 
PPT
Module - 4 - Team Work and Communication.ppt
AvinashAvuthu2
 
PPTX
Internet of Things Basics and its protocols
AvinashAvuthu2
 
PPTX
Cyber Security Hacking and Attack Tree Analysis
AvinashAvuthu2
 
PPTX
Cyber Security Penetration Testing Tools
AvinashAvuthu2
 
PPTX
Game Programming Module for Sprite, Scripting
AvinashAvuthu2
 
Block chain and its basic terminology include mining
AvinashAvuthu2
 
Different Internet of Things Applications
AvinashAvuthu2
 
Computer Networks Packet Switchings.pptx
AvinashAvuthu2
 
Game Programming Module - 6 AR and VR.pptx
AvinashAvuthu2
 
Information Security Analysis and Audit 1
AvinashAvuthu2
 
Security issues in the wireless networks.ppt
AvinashAvuthu2
 
M.Tech Internet of Things Unit - III.pptx
AvinashAvuthu2
 
M.Tech Internet of Things Unit - IV.pptx
AvinashAvuthu2
 
M.Tech Internet of Things Embeed Systems
AvinashAvuthu2
 
III CSE Internet of Things Unit - II.pptx
AvinashAvuthu2
 
Information Security Audit and Analysis Module
AvinashAvuthu2
 
Module - 2 - Security Device Management.ppt
AvinashAvuthu2
 
Module - 3 - Device Configuration ISM.ppt
AvinashAvuthu2
 
Module - 6 - Data and Information Management.ppt
AvinashAvuthu2
 
Module - 5 - Managing Health and Safety.ppt
AvinashAvuthu2
 
Module - 4 - Team Work and Communication.ppt
AvinashAvuthu2
 
Internet of Things Basics and its protocols
AvinashAvuthu2
 
Cyber Security Hacking and Attack Tree Analysis
AvinashAvuthu2
 
Cyber Security Penetration Testing Tools
AvinashAvuthu2
 
Game Programming Module for Sprite, Scripting
AvinashAvuthu2
 

Recently uploaded (20)

PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
DOCX
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 

Internet of Things Communication API and Levels

  • 1. Internet of Things (20CS002) Department of Computer Science and Engineering Vignan's Foundation for Science, Technology & Research
  • 2. • Internet Of Things: A Hands-On Approach by Arsheep Bahga, Vijay Madisetti • Computer Networking: A Top-Down Approach by James Kurose, Keith Ross • DATA COMMUNICATIONS AND NETWORKING by Behrouz A. Forouzan References
  • 3. Network Components Networking hardware includes all computers, peripherals, interface cards and other equipment needed to perform data-processing and communications within the network.
  • 4. Network Components • MODEM • Hub • Router • Gateway • Switch • Bridge • Repeater
  • 5. Modem • MODEM network device consists of two words MO from modulator and DEM from demodulator. • Modem converts digital signal to analog signal then this process is called modulation. Again, when modem converts analog signal to digital signal then this process is called demodulation. Types of MODEM 1. Acoustic coupler modem gives a slower speed. This network device may remain built in in your PC. It is not expensive but no more uses now a days. 2. Direct modem gives more speed than acoustic coupler modem. It is connected with computer port using USB port. This is more expensive network device than acoustic coupler modem.
  • 6. Hub • To establish a local area network, we need a central device which can connect all the computer is called Hub. • Active hub increases the value of signal and remove unnecessary signal is called active hub. Moreover, it can also process the signal. Sometimes, this type of hub is called intelligent hub. • Passive hub doesn’t increase the value of signal. Passive hub only helps to exchange information from computer to computer. This type of network devices are connected with active devices. Merits of hub • It is not expensive. • It can connect various medium. Demerits of hub • Increase the network traffic. • Increase collision among data. • Data filtering can’t possible.
  • 7. Router Routers connect LANs and WANs together and have a dynamically updating routing table based on which they make decisions on routing the data packets. Merits of router • Router has the power to connect different network. • It removes the restriction to exchange data. • It can filter broadcast data. Demerits of router • Router gives a slower speed. • Gives complex configuration. • It can’t connect network of different protocol.
  • 8. Gateway Gateway is being used to connect different network. When a network has different protocol then gateway is used to connect that device with the network. Merits of gateway • Gateway reduces data collision rate. • Send data according to receiver’s protocol. • It can connect network from different protocol. Demerits of gateway • More expensive than router. • It has a complex configuration. • Its speed is comparatively slow.
  • 9. Switch Switch is a network device of many ports which helps to flow information. Though it looks like hub but it exchanges data in a different manner among clients. Switch increases the performance of network and can communicate among many computers at a time. Merits of switch • Switch reduces the collision rate of data. • It is possible to control broadcast using virtual LAN. Demerit of switch • It is more expensive than hub. • Not possible to filter data.
  • 10. Bridge and Repeater • A bridge is a repeater, with add on the functionality of filtering content by reading the MAC addresses of source and destination. • It is also used for interconnecting two LANs working on the same protocol. • It has a single input and single output port, thus making it a 2 port device • Repeater regenerate the signal over the same network before the signal becomes too weak or corrupted so as to extend the length to which the signal can be transmitted over the same network. • Repeaters did not amplify the signal. When the signal becomes weak, they copy the signal bit by bit and regenerate it at the original strength. It is a 2 port device.
  • 12. What’s the Internet:“nuts and bolts” view  billions of connected computing devices: • hosts = end systems • running network apps  communication links • fiber, copper, radio, satellite • transmission rate: bandwidth  packet switches: forward packets (chunks of data) • routers and switches wired links wireless links router smartphone PC server wireless laptop mobile network global ISP regional ISP home network institutional network
  • 13.  Internet: “network of networks” • Interconnected ISPs  protocols control sending, receiving of messages • e.g.,TCP, IP, HTTP, Skype, 802.11  Internet standards • RFC: Request for comments • IETF: Internet Engineering Task Force What’s the Internet:“nuts and bolts” view mobile network global ISP regional ISP home network institutional network
  • 14. What’s a protocol? human protocols:  “what’s the time?”  “I have a question”  introductions … specific messages sent … specific actions taken when messages received, or other events network protocols:  machines rather than humans  all communication activity in Internet governed by protocols protocols define format, order of messages sent and received among network entities, and actions taken on message transmission, receipt
  • 15. a human protocol and a computer network protocol: Hi Hi Got the time? 2:00 TCP connection response Get http://www.awl.com/kurose-ross <file> time TCP connection request What’s a protocol?
  • 16. A closer look at network structure:  network edge: • hosts: clients and servers • servers often in data centers  access networks, physical media: wired, wireless communication links  network core: • interconnected routers • network of networks mobile network global ISP regional ISP home network institutional network
  • 17. Access networks and physical media Q: How to connect end systems to edge router?  residential access nets  institutional access networks (school, company)  mobile access networks keep in mind:  bandwidth (bits per second) of access network?  shared or dedicated?
  • 18. ISP Access network: digital subscriber line (DSL) central office telephone network DSLAM voice, data transmitted at different frequencies over dedicated line to central office  use existing telephone line to central office DSLAM • data over DSL phone line goes to Internet • voice over DSL phone line goes to telephone net  < 2.5 Mbps upstream transmission rate (typically < 1 Mbps)  < 24 Mbps downstream transmission rate (typically < 10 Mbps) DSL modem splitter DSL access multiplexer
  • 19. ISP data, TV transmitted at different frequencies over shared cable distribution network cable modem splitter … cable headend CMTS cable modem termination system  HFC: hybrid fiber coax • asymmetric: up to 30Mbps downstream transmission rate, 2 Mbps upstream transmission rate  network of cable, fiber attaches homes to ISP router • homes share access network to cable headend • unlike DSL, which has dedicated access to central office Access network: cable network
  • 20. Access network: home network to/from headend or central office cable or DSL modem router, firewall, NAT wired Ethernet (1 Gbps) wireless access point (54 Mbps) wireless devices often combined in single box
  • 21. Enterprise access networks (Ethernet)  typically used in companies, universities, etc.  10 Mbps, 100Mbps, 1Gbps, 10Gbps transmission rates  today, end systems typically connect into Ethernet switch Ethernet switch institutional mail, web servers institutional router institutional link to ISP (Internet)
  • 22. Wireless access networks  shared wireless access network connects end system to router • via base station aka “access point” wireless LANs:  within building (100 ft.)  802.11b/g/n (WiFi): 11, 54, 450 Mbps transmission rate wide-area wireless access  provided by telco (cellular) operator, 10’s km  between 1 and 10 Mbps  3G, 4G: LTE to Internet to Internet
  • 23. Host: sends packets of data host sending function:  takes application message  breaks into smaller chunks, known as packets, of length L bits  transmits packet into access network at transmission rate R • link transmission rate, aka link capacity, aka link bandwidth R: link transmission rate host 1 2 two packets, L bits each packet transmission delay time needed to transmit L-bit packet into link L (bits) R (bits/sec) = =
  • 24. A B How do loss and delay occur? packets queue in router buffers  packet arrival rate to link (temporarily) exceeds output link capacity  packets queue, wait for turn packet being transmitted (delay) packets queueing (delay) free (available) buffers: arriving packets dropped (loss) if no free buffers
  • 25. Four sources of packet delay dproc: nodal processing  check bit errors  determine output link  typically < msec dqueue: queueing delay  time waiting at output link for transmission  depends on congestion level of router propagation nodal processing queueing dnodal = dproc + dqueue + dtrans + dprop A B transmission
  • 26. dtrans: transmission delay:  L: packet length (bits)  R: link bandwidth (bps)  dtrans = L/R dprop: propagation delay:  d: length of physical link  s: propagation speed (~2x108 m/sec)  dprop = d/s Four sources of packet delay dtrans and dprop very different propagation nodal processing queueing dnodal = dproc + dqueue + dtrans + dprop A B transmission
  • 27. Packet loss  queue (aka buffer) preceding link in buffer has finite capacity  packet arriving to full queue dropped (aka lost)  lost packet may be retransmitted by previous node, by source end system, or not at all A B packet being transmitted packet arriving to full buffer is lost buffer (waiting area)
  • 28. Throughput  throughput: rate (bits/time unit) at which bits transferred between sender/receiver • instantaneous: rate at given point in time • average: rate over longer period of time server, with file of F bits to send to client link capacity Rs bits/sec link capacity Rc bits/sec server sends bits (fluid) into pipe pipe that can carry fluid at rate Rs bits/sec) pipe that can carry fluid at rate Rc bits/sec)
  • 29. Internet structure: network of networks Question: given millions of access ISPs, how to connect them together? access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net … … … … … …
  • 30. Internet structure: network of networks Option: connect each access ISP to every other access ISP? access net access net … … … … … … … … connecting each access ISP to each other directly doesn’t scale: O(N2 ) connections. access net access net access net access net access net access net … access net access net access net access net … access net access net access net access net …
  • 31. Internet structure: network of networks access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net … … … … … … Option: connect each access ISP to one global transit ISP? Customer and provider ISPs have economic agreement. global ISP
  • 32. ISP C ISP B ISP A Internet structure: network of networks access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net … … … … … … But if one global ISP is viable business, there will be competitors …. access net
  • 33. ISP C ISP B ISP A Internet structure: network of networks access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net … … … … … … access net But if one global ISP is viable business, there will be competitors …. which must be interconnected IXP peering link Internet exchange point IXP
  • 34. ISP C ISP B ISP A Internet structure: network of networks access net access net access net access net access net access net access net access net access net access net access net access net … … … … … … access net IXP IXP access net access net access net regional net … and regional networks may arise to connect access nets to ISPs
  • 35. ISP C ISP B ISP A Internet structure: network of networks access net access net access net access net access net access net access net access net access net access net access net access net … … … … … … access net IXP IXP access net access net access net regional net Content provider network … and content provider networks (e.g., Google, Microsoft, Akamai) may run their own network, to bring services, content close to end users
  • 36. Internet structure: network of networks  at center: small # of well-connected large networks • “tier-1” commercial ISPs (e.g., Level 3, Sprint,AT&T, NTT), national & international coverage • content provider network (e.g., Google): private network that connects it data centers to Internet, often bypassing tier-1, regional ISPs IXP IXP IXP Tier 1 ISP Tier 1 ISP Google Regional ISP Regional ISP access ISP access ISP access ISP access ISP access ISP access ISP access ISP access ISP
  • 37. IoT Communication Models Request - Response Model: • Client sends request to the server and the server responds to the requests • When the server receives a request, it decides how to respond, fetches the data, retrieves resource representations, prepares the response, and then sends the response to the client • Request-response model is a stateless communication model and each request-response pair is independent of others.
  • 39. Publish-Subscribe model • Publish-Subscribe is a communication model that involves publishers, brokers and consumers​ • Publishers are the source of data​ • Publishers send the data to the topics which are managed by the brokers​ • Publishers are not aware of the consumers​ • Consumers subscribe to the topics which are managed by the broker​ • When the broker receives data for a topic from the publisher, it sends the data to all the subscribed consumers​
  • 40. Push-Pull model • Push-Pull is a communication model in which the data producers push the data to queues and the consumers pull the data from the queues • Producers do not need to be aware of the consumers • Queues help in decoupling the messaging between the producers and consumers • Queues also act as a buffer which helps in situations when there is a mismatch between the rate at which the producers push data and the rate at which the consumers pull data
  • 41. Exclusive-Pair model • Exclusive pair is a Bi-directional, fully duplex communication model that uses a persistent connection between the client and server • Once the connection is setup it remains open until the client sends a request to close the connection • Client and server can send messages to each other after connection setup • Exclusive pair is a stateful communication model and the server is aware of all the open connections
  • 42. IoT Communication APIs • Application Programming Interface (API) referring to standard framework collection, protocols, and resources dictating the generic web and mobile application. It defines the communication rules that every application component must follow while exchanging information with each other. • An API is an interface used by programs to access an application. IoT APIs are the interface points between an IoT device and the Internet and/or other network components. • APIs that are used in the creation of IoT solutions are known as IoT APIs. They are the web services application programming interfaces.
  • 43. IoT Communication APIs API vendors for the Internet of Things • Withings API developers involved in the development of measurement devices can be benefitted hugely as the API can share the collected data over the internet. Most commonly, the collected information by this API vendor is ECG and EKG, body weight, and sleep cycles. • Garmin Health API is perfect choice for developers involved in developing the IoT appliances operating in the health care and activity industry, Garmin Health APIs can monitor around 30 types of activities. Data related to total sleep hours, steps walked, stress level, heart rate, and many more. • Google Assistant API capable of being integrated into IoT devices easily and supports operations like voice control, natural language processing, and many other facilities. Using the API, developers can easily make IoT devices voice-controlled by phones, displays, watches, TV, laptops, and Google Home Devices. • Apple HomeKit API serves as a doable platform for connecting Siri and iPhone with the Apple-based home devices and appliances. Accessible with the help of Apple iOS8 SDK, the APIs can make devices like lights, garages, doors, TV, and many more to be controlled directly via voice.
  • 44. REST based Communication APIs • Representational State Transfer (REST) APIs is a set of architectural principles by which you can design Web services the Web APIs that focus on the system's resources and how resource states are addressed and transferred. • Uniform Resource Identifier (URI) are used to depict resources in the RESTful web service. • Client tries to access these resources via URIs using commands like GET, PUT, POST, DELETE and so on that are defined by HTTP. • In response, the server responds with a JSON object or XML file. • The REST architectural constraints are • Client-Server • Stateless • Cache-able • Layered system • Uniform Interface • Code on demand
  • 45. REST based Communication APIs • Client-Server: The principle behind the client-server constraint is the separation of concerns.​ 1. Client should not interfere the storage of data from server​ 2. Server should not be concerned about the user interface​ • Stateless: Each request from client to server must contain all the information necessary to understand the request, and cannot take advantage of any sored context on the server​ . The session state is kept entirely on the client​ • Cache-able: Cache constraint requires that the data within a response to a request be implicitly or explicitly labeled as cache-able or non-cache-able​ 1. If a response is cache-able, then a client cache is given the right to reuse that response data for later, equivalent requests.​ 2. Catching can partially or completely eliminate some interactions and improve efficiency and scalability.
  • 46. REST based Communication APIs • Layered System: A layered system defines the boundaries of the components within each specific layer. For example, A client is unable to tell whether it is connected to the end server or an intermediate node. • Uniform Interface: This constraint requires that the method of communication between a client and a server must be uniform • When a client holds a representation of a resource it has all the information required to update or delete the resource • Each message includes enough information to describe how to process the message • Code on demand: Servers can provide executable code or scripts for clients to execute in their context (it is optional).
  • 48. WebSocket based Communication APIs • WebSocket APIs enable bi-directional and duplex communication between customers and servers. It is a stateful type. • Unlike REST, There is no need to set up a connection every now and then to send messages between a client and a server. • It works on the principle of the exclusive pair model. • WebSocket APIs reduce the network traffic and latency as there is no overhead for connection setup and termination requests for each message • Due to one time dedicated connection setup, there is less overhead, lower traffic and less latency and high throughput.
  • 51. Levels of IoT An IoT system comprises of the following components: • Device: Allows identification, remote sensing, actuating and remote monitoring capabilities. IoT devices include wireless sensors, software, actuators, and computer devices operates through the internet, enabling the transfer of data among objects automatically without human intervention. • Resource: Every IoT has a software module for the entry, processing, and storage of sensor data. They are therefore used to control actuators connected to devices. • Controller Service: It acts as a connector between web service and device. The controller service sends data from the system to the web service and receives commands for controlling the device from the application (via web services).
  • 52. Levels of IoT • Database: It is the repository for all data provided by IoT devices. It is either held locally or on the cloud in the form of a database. • Web Service: It connect the IoT computer, application, database, and research components. Web services may be implemented either using HTTP and REST concepts (REST service) or the WebSocket protocol (WebSocket service). • Analysis Component: It retrieves data from the IoT device's database and turns it into useful information. This module analyses data, produce results and presents them in a user-friendly format using various algorithms. This analysis can be performed locally or in the cloud, and the resulting data can be stored locally or in the cloud. • Application: IoT applications have a user-friendly interface to track and manage different IoT device aspects. Users will access the monitor system and the data generated.
  • 53. IoT Level - 1 • IoT system consists of a single device performs sensing or actuations, stores data, analyses it and hosts the application. • The data sensed is processed locally. • Data processing is performed locally. Example: Consider an IoT device that monitors the lights in a house. The lights are controlled through switches. Status of each light is maintained in a local database. REST services deployed locally allow retrieving and updating state of each light in the database and triggers the switches accordingly. Application has a user interface for controlling the lights or applications locally.
  • 54. IoT Level - 2 • A node performs sensing / actuation and local analysis. Data is stored in the cloud. • It is useful for solutions where the data is large, but the primary analysis criterion is not computationally intensive and can be performed locally. Example: A single node monitors the soil moisture in the field. This is sent to the database on cloud using REST APIs. Controller service continuously monitors moisture levels. Cloud based application is used for monitoring and controlling the IoT system.
  • 55. IoT Level - 3 A single node monitors the environment and stores data in the cloud. Application is cloud based. This is suitable where data is voluminous and analysis is computationally intensive. Example: A node is monitoring a package using devices like accelerometer and gyroscope. These devices track vibration levels. Controller service sends sends sensor data to cloud in real time using WebSocket API. Data is stored in cloud and visualised using cloud-based application. Analysis component triggers alert if vibration levels cross a threshold.
  • 56. IoT Level - 4 Multiple nodes collect information and store in the cloud. A cloud based application controls the system. Local and remote observer nodes are present that subscribe to and receive information collected in cloud from various devices. Observer nodes can process information and use it for applications but do not perform control functions. Example: Noise monitoring of a area requires various nodes functioning independent of each other. Each has its own controller service. Data is stored in cloud database. Analysis is done on the cloud and the entire IOT system is monitored on the cloud using an application.
  • 57. IoT Level - 5 Nodes present locally are of two types, end nodes and coordinator nodes. End nodes collect data and perform sensing or actuation or both. Coordinator nodes collect data from end nodes and sends it to cloud. Data is stored and analysed in cloud and application is cloud based. Example: A monitoring system has various components: end nodes collect various data from the environment and send it to coordinator node. Coordinator node acts as gateway and allows the data to be transferred to cloud storage using REST API. Controller service on the coordinator node sends data to the cloud.
  • 58. IoT Level - 6 Multiple independent end nodes perform sensing and actuation and send data to cloud. Data is stored in cloud and application is cloud based. The analytics components analyses the data and stores the results in the cloud database. The results are visualized with cloud based application. The centralized controller is aware of the status of all the end nodes and sends control commands to the nodes. Example: Weather monitoring consists of sensors that monitor different aspects of a system. The end nodes send data to cloud storage. Analysis component, application and storage are in cloud. Centralized controller controls all nodes and provides inputs.
  • 59. Levels Suitability Level 1 Low- cost and low-complexity solutions where the data involved is not big and the analysis requirements are not computationally intensive. Level 2 The data involved is big, however, the primary analysis requirement is not computationally intensive and can be done locally itself. Level 3 The data involved is big and the analysis requirements are computationally intensive. Level 4 Suitable for solutions where multiple nodes are required, the data involved is big and the analysis requirements are computationally intensive. Level 5 Suitable for solutions based on wireless sensor networks, in which the data involved is big and the analysis requirements are computationally intensive. Level 6 System that has multiple independent end nodes that perform sensing and/or actuation and send data to the cloud.

Editor's Notes

  • #59: IoT levels- Important concept that will be recalled throughout the course for every application. They are totally 6 templates we have in IoT deployment. Each template is varied based on the requirement of an user application. If we look into the table it can clearly show which level is suitable to which context.