22EC901 Introduction To Internet of Things: Dr. K. K. Thyagharajan Professor & Dean (Research) R.M.D. Engineering College
22EC901 Introduction To Internet of Things: Dr. K. K. Thyagharajan Professor & Dean (Research) R.M.D. Engineering College
Dr. K. K. THYAGHARAJAN
Professor & Dean (Research)
R.M.D. Engineering College
Scan the QR code and it will provide the link to all videos. It is a trusted link and safe.
https://www.youtube.com/c/KKTVirtualLearning
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 1
UNIT I INTRODUCTION TO IoT
Internet of Things - Physical Design- Logical Design- IoT
Enabling Technologies - IoT Levels & Deployment Templates -
Domain Specific IoTs - IoT and M2M.
1. Explain in detail about the IOT communication model in the
logical design of IoT. Slides 24-34
2. Illustrate the Internet of Things enabling Technologies in detail.
Slides 36-43
3. Discuss in detail software-defined networking (SDN) and network
function virtualization(NFV) with their applications for IoT. Slides
65-71
Refer to the Digital Notes for Part-A Questions & Other Part-B Questions
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 2
Internet
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 3
IoT Definitions & Characteristics
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 4
IoT Definitions:
Internet of Things (IoT) comprises things (mobile phones, networked
computers or embedded systems or anything) that have unique identities
and are connected to the internet. The “Things” in IoT usually refers to IoT
devices which have unique identities and can perform remote sensing,
Actuating and monitoring capabilities.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 5
IoT Characteristics:
Unique Identity:
Each IoT device has a unique identity and a unique identifier such as IP address, URI-Uniform
resource Identifier.
Dynamic and self-Adapting:
IoT devices and systems may have the capability to dynamically adapt with the changing contexts
and take actions based on their operating conditions. Ex: Surveillance cameras can adapt their
modes based on whether it is day or night.
Self – Configuring:
IoT devices may have self-configuring capability allowing a large number of devices to work
together to provide certain functionality .
Interoperable communication protocols:
IoT Devices may support a number of interoperable communication protocols and can
communicate with other devices and also with the infrastructure.
Integrated into information network:
IoT devices are usually integrated into the information network that allows them to communicate
and exchange data with other devices and systems.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 6
1. General Block diagram / Physical
Design
of IOT Device
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 7
Physical Design of IOT Device – Block Diagram
IoT devices can exchange data with other connected devices and applications (directly or
indirectly). They can collect data from other devices and either process it locally or send it to
centralized servers or back-end systems for processing, especially if they are cloud-based
applications. These actions depend on temporal and spatial constraints such as memory,
processing capacity, communication latencies, speed, and deadlines within the IoT infrastructure.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 8
Physical Design of IoT - Interfaces
UART (Universal Asynchronous Receiver/Transmitter): RS-232 is a common electrical
standard (protocol) used for UART serial communication, though other standards like TTL and
RS-485 are also used.
SPI (Serial Peripheral Interface): This is a synchronous serial communication protocol
commonly used in embedded systems for short-distance communication between integrated
circuits
I2C(Inter-Integrated Circuit): Serial Communication Protocol used for short-distance
communication between integrated circuits.
CAN (Controller Area Network): High-speed, robust serial bus system designed for real-time
control applications
NB:
Not given in the notes
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 9
Physical Design of IOT - Interfaces
High-Definition Multimedia Interface (HDMI): It's a standard for transmitting high-quality
uncompressed video and audio data from a source device (like a Blu-ray player, gaming console,
or computer) to a display device (like a TV, monitor, or projector).
3.5 mm Audio: It's a small, round connector with a diameter of 3.5 millimeters, commonly found
on headphones, earphones, microphones, and audio devices.
RCA Video: This is a common type of analog video connection. It uses a standard RCA
connector.
NB:
Not given in the notes
SD (Secure Digital) card: It's a type of flash memory card commonly used in portable electronic
devices. SD stands for Secure Digital.
MMC (Multimedia card): Type of multimedia card similar to SD
SDIO (Secure Digital Input/Output): This uses the same physical interface of SD but enables the
connection of devices like Bluetooth modules, GPS receivers, and digital cameras to a host device.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 10
3. Physical Design - IoT Layers &
Protocols
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 11
IoT Layers & Protocols
Link Layer:
Link Layer protocols determine how the data is
physically sent over the networks physical layer or
medium (example copper wire, electrical cable, or radio
wave). The Scope of The Link Layer is the Last Local
Network connections to which host is attached. Host on
the same link exchange data packets over the link layer
using the link layer protocol. Link layer determines how
the packets are coded and signalled by the hardware
device over the medium to which the host is attached.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 12
IoT Layers & Protocols
802.3 Ethernet:
This is the communication standards for wired network and it allows
data rates ranging from 10 Mb/s to 40 Gb/s and higher. The shared
medium in Ethernet can be a coaxial cable, twisted pair wire, or optical
fiber. For example,
802.3 (10BASE5 Ethernet) uses coaxial cable as a shared medium and
802.3i (10BASE-T Ethernet) uses copper twisted pair connections.
802.11 (WI-FI):
IEEE 802.11 is a collections of wireless communication standards for
Local area network (WLAN), including extensive descriptions of the link
layer. For example,
802.11a operate in the 5 GHz band,
802.11b and 802.11g operate in the 2.4 GHz band.
802.11ac operates in the 5GHz band.
IEEE 802.16 (WiMax):
This is a collection of wireless broadband standards, including
extensive descriptions for the link layer. It provides data rates from
1.5 Mb/s to 1Gb/s.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 13
IoT Layers & Protocols
802.15.4 LR-WPAN:
IEEE 802.15.4 is the standards for Low Rate Wireless for
Personal Area Network (LR-WPAN). These standards provide
low cost and low speed Communications for power
constrained devices and form the basis of specifications for
high level communication ZigBee. It provide data rates from 40
kb/s.
2G / 3G / 4G mobile communications:
These are the different generations of mobile communication
standards including second generation (2G including GSM
and CDMA). 3rd Generation (3G including UMTS and
CDMA2000) and 4th generation 4G including LTE.
Note:
GSM-Global System for Mobile Communications: It's a standard for digital cellular
networks used in mobile phones
CDMA stands for Code Division Multiple Access: It's a digital cellular technology that
allows multiple users to share a single communication channel simultaneously.
UMTS stands for Universal Mobile Telecommunications System: It's a 3G mobile
technology that provides significantly higher data rates than its predecessors, GSM and
CDMA.
LTE Long-Term Evolution: 4G wireless broadband technology
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 14
IoT Layers & Protocols
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 16
IoT Layers & Protocols
NB:
Not given in the notes.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 17
IoT Layers & Protocols
Transport Layer:
The Transport layer protocols provides end-to-end
message transfer capability independent of the
underlying network. The message transfer capability
can be set up on connections, either using
handshake or without handshake acknowledgements.
This layer also provides functions such as
segmentation, error control, flow control and
congestion control.
There are two protocols used 1. TCP, 2. UDP
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 18
IoT Layers & Protocols
TCP (Transmission control protocol): It is widely used protocol by the web browsers along with
HTTP , HTTPS application layer protocols, email program (SMTP application layer protocol) and
file transfer protocol. It requires an initial setup procedure. TCP is a Connection Oriented (i.e.
connection is persistent and requires initial setup) and stateful protocol. TCP ensures reliable
transmissions of packets in the order. TCP also provides error deduction capability so that
duplicate packets be discarded and lost packets are retransmitted. Flow control ensures that the
data rate is matched to the receiver's processing capacity and hence prevents data overload.
Request-response method.
UDP (User Datagram Protocol): This does not require any initial setup procedure because it is a
connection less protocol. UDP is a transactions oriented and stateless protocol. UDP does not
provide guaranteed delivery, ordering of messages and duplicate eliminations. UDP is useful for
time sensitive applications because they have very small data units to exchange and do not want
the overhead of connection setup.
NB:
Stateless: The server doesn't store information about past interactions
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 19
IoT Layers & Protocols
Application Layer:
Application layer protocol defines how the application
interfaces with the lower layer protocols to send the
data over the network. Data is encoded by the
application layer protocol and encapsulated in the
transport layer protocol. Application layer protocol
enable process-to-process connection using ports.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 20
IoT Layers & Protocols
HTTP (Hyper Text Transfer protocol): It forms the foundations of
world wide web and it includes, commands such as GET, PUT,
POST, DELETE, HEAD, TRACE, OPTIONS etc. The protocol
follows a request-response model where the client sends request to
server using the http commands. The HTTP is a stateless protocol,
and each HTTP request is independent of any other request. An
HTTP client can be a browser or an application running on the client,
such as an application running on an IoT device, a mobile
application, or other software.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 21
IoT Layers & Protocols
Web socket: Web socket protocol allows full duplex communication
over a single socket connections. Web socket is based on TCP and
allows streams of messages to be sent back and forth between the
client and server by establishing a TCP connection. The client can be
a browser, a mobile application and IoT device
MQTT (Message Queue Telemetry Transport): MQTT is a lightweight
messaging protocol based on the publish/subscribe model. It uses a
client-server architecture where clients, such as IoT devices, connect to
a server known as the MQTT broker. Clients publish messages to topics
on the broker, and the broker forwards these messages to clients
subscribed to those topics. MQTT is well-suited for constrained
environments.
XMPP (Extensible Messaging and Presence Protocol): It is a protocol for real-time
communication and streaming XML data between network entities. The XMPP powers wide
range of applications including messaging, data syndication, gaming multiparty chat and
voice / voice calls. XMPP allows sending small chunks of XML data from one network entity to
another in real time. XMPP supports both client to server and server to client communication
path.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 22
IoT Layers & Protocols
DDS (Data Distribution Service): It is a data-centric middleware
standard for device-to-device and machine-to-machine
communication. It uses a publish/subscribe model where publishers,
such as devices that generate data, create topics to which subscribers
can subscribe. A publisher is responsible for data distribution, while a
subscriber is responsible for receiving published data. DDS provides
Quality of Service (QoS) control and configurable reliability.
AMQP (Advanced Message Queuing protocols): It is an open
application layer protocol for business messaging. It supports both
point-to-point and publish/subscribe routing and queuing models. An
AMQP broker receives messages from publishers, such as devices or
applications that generate data, and routes them over connections to
consumers. Publishers send messages to an exchange, which then
distributes copies of the messages to queues.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 23
Logical Design of IoT
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 24
Logical Design of IoT
Logical design of an IoT system refers to an abstract representation of the entities and process
without going into low level specification of the implementations. The function blocks are
Devices: provide sensing, actuation, monitoring and
control function
Communication: handles the communication
systems
Services: services for device monitoring, device
control services, data publishing services and
services for device Discovery.
Management: provides various functions to govern
the IoT system
Security: provides functions such as application
authorization message and content integrity and
data security.
Application: provides interfaces to the user to
control and monitor various aspects of the IoT
system. This also allow users to view the system
status and view or analyze the processed data.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 25
3 Communication Models in
Logical Design
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 26
Communication Models in Logical Design of IoT
Communication:
The devices can communicate by using any one of the following four models.
1. Request-Response Communication Model
2. Publish-Subscribe Communication Model
3. Push pull Communication Model
4. Exclusive Pair Communication Model
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 27
1. Request-Response Communication Model: The request-response model is a
communication paradigm in which a client sends a request to a server, and the server responds
to the request. Upon receiving a request, the server determines how to respond, retrieves the
necessary data or resource definitions, and then sends the response back to the client. This
model is stateless, meaning each request-response pair is independent of others, with no
persistent state maintained between interactions.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 28
2. Publish-Subscribe Communication Model: This communication model involves
publishers, brokers, and consumers. Publishers are the sources of data, sending data to topics
managed by the broker. Publishers are not aware of the consumers. Consumers subscribe to
the topics managed by the broker. When the broker receives data for a topic from a publisher,
it sends the data to all the subscribed consumers.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 29
3. Push pull Communication Model: In this model, data producers push data to queues, and
consumers pull data from the queues. Producers do not need to be aware of the consumers.
Queues help decouple the messaging between producers and consumers, acting as buffers that
handle mismatches between the rate at which producers push data and the rate at which
consumers pull data.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 30
4. Exclusive Pair Communication Model: This is a bi-directional, full-duplex communication
model that uses persistent connections between the client and the server. Once the connection
is established, it remains open until the client requests to close it. After the connection setup,
both the client and server can send messages to each other. Exclusive pair is a stateful
communication model, and the server keeps track of all open connections.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 31
Logical Design of IoT- Communication APIs
1. REST (REpresentational State Transfer) - Based Communication API: REST
API follows the request-response communication model. This is used to design web
services and Web APIs that has constraints on a system resources. The REST
architectural constraints apply to the components, connectors, and data elements.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 32
Logical Design of IoT- Communication APIs
For example, client should not be concerned with the storage of data which is the
concern of the server. Similarly the server should not be concerned about the user
interface which is a concern of the client. separation allows client and server to be
independently deployed and updated.
Stateless: This constraint impose that the present request should not require any
information from the previous request. Each request from client must contain all the
information necessary to understand the request.
Cacheable: The cache constraint requires that the data within the response to a
request be explicitly or implicitly labeled as cacheable or non-cacheable. When data
is labeled as cacheable, a client cache can reuse that response data for later
equivalent requests. This reuse can reduce the need for repeated server
interactions, improving efficiency and scalability.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 33
Logical Design of IoT- Communication APIs
Layered system: The layered system constraint requires to organize the
architecture into hierarchical layers. Each component can only interact with the layer
immediately adjacent to it. This means a client cannot tell whether it is directly
connected to the end server or if there are intermediary servers in between. This
structure enhances scalability, as intermediaries can handle requests, cache
responses, or perform other functions without the client needing to interact directly
with the end server.
Uniform interface: Uniform interface constraints requires that the method of
communication between client and server must be uniform. Resources are identified
in the request and are separate from the representation of the resource that are
returned to the client. When a client holds a representation of a resource it has all the
information required to update or delete the resource
Code on demand: Service can provide executable code script for clients to execute
in their context.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 34
Logical Design of IoT- Communication APIs
2. Web Socket based communication API:
Web Socket API allows bi directional, full
duplex communication between client and
server. This does not require new
connection to be set up for each message to
be sent. Web socket communication begins
with connection setup request sent through
http protocol by the client to the server. The
server responds to the client with a
handshake signal to indicate that the
connection set up was over. The client and
the server can now send data or messages
to each other in full duplex model. Web
Socket API reduce network traffic and
latency as there is no overhead for
connection setup and determination records
to each message.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 35
4 IoT Enabling Technologies
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 36
4. IoT Enabling Technologies
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 37
4. IoT Enabling Technologies
1. Wireless sensor network ( WSN):
It comprises of distributed devices with the sensor which are used to monitor the
environmental and physical conditions.
A WSN consists of a number of end nodes and routers and a coordinator.
End nodes have several sensors attached to them.
End node can also act as a routers. Routers are responsible for routing the data
packet from end nodes to the coordinator.
The coordinator node collect the data from all the nodes and it also acts as a Gateway
that connects the WSN to the internet.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 38
4. IoT Enabling Technologies
IoT systems with WSN:
Weather monitoring system using WSN in which the nodes collect temperature, humidity and
other data which is aggregated and analyzed .
Indoor air quality monitoring system using WSN to collect data on the indoor air quality and
connections of various gases.
Soil moisture monitoring system using WSN to monitor soil moisture at various locations.
Surveillance systems (detects motion of an object) use WSN for collecting surveillance data
Smart grid use wireless sensor network for monitoring the grid at various point.
Structural monitoring systems use WSN to monitor the structure condition by writing vibration
data from sensor nodes deployed at various points in the structure.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 39
4. IoT Enabling Technologies
2. Cloud computing
Cloud Computing involves delivering applications and services over the internet.
Cloud Computing involves providing of computing networking and storage resources on
demand as metered services to the users in a “ pay as you go” model.
Cloud Computing provides platform-independent access to heterogeneous client platforms
such as workstations, laptops, tablets and smartphones.
Cloud Computing serves multiple users using the same physical hardware.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 40
4. IoT Enabling Technologies
Infrastructure as a service(IAAS) : Computing and storage resources are provided to the
users as virtual machine instances and virtual storage. Users can start, stop configure and
manage the virtual machines instance on the virtual storage. They can deploy operating
systems and applications on their choice on the actual resources allotted in the cloud.
Platform as a service(PaaS) : This service provides the user the ability to develop and deploy
application in the cloud using the application programming interfaces API, software libraries and
services provided by the Cloud Service Provider. The Cloud Service Provider manages the
underlying cloud infrastructure including servers, network, operating systems and storage.
Software as a service(SaaS) : This service provides the user a complete software application.
The Cloud Service Provider manages the underlying cloud infrastructure including server,
network storage and application software. Applications are provided to the user through a thin
client interface. SaaS applications are accessed from various clients such as smartphones
running different operating system.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 41
4. IoT Enabling Technologies
3. Big data analytics
Big data is defined as collections of data set whose volume, velocity in terms of its temporal
variations or variety is so large that it is difficult to store, manage, process and analyze the data
using traditional database and data processing tools.
Big Data Analytics involving several steps starting from Data cleaning, data mining, data
processing and visualization.
Some examples of big data generated by IoT systems are
1. Sensor data generated by IoT system such as weather monitoring stations
2. Machine sensor data collected from sensors embedded in Industrial and energy system for
monitoring their files and protecting failure
3. Health and fitness data generated by IoT devices such as wearable fitness band.
4. Data generated by IoT system for Location tracking of vehicle.
5. Data generated by retail inventory monitoring system.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 42
4. IoT Enabling Technologies
Characteristics of big data:
Volume: Though there is no fixed threshold for volume of data to be considered as big data,
the term big data is used for massive scale data that is difficult to store, manage and process
using traditional data bases and data processing architecture. The volume of data generated
by modern IT, industrial and Healthcare systems is growing exponentially driven by the
lowering cost of data storage and processing architectures and the need to extract valuable
insights from the data to improve business processes, efficiency and services to consumer.
Velocity: It indicates how fast the data is generated and how frequently it varies. Modern IT
Industrial and other systems are generating data at highest speeds.
Variety: Variety refers to the forms of the data such as structured or unstructured data
including text data, audio, video and sensor data .
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 43
4. IoT Enabling Technologies
4. Embedded Systems
An Embedded system is computer system that has computer hardware with software embedded
in it to perform a specific task.
In contrast to general purpose computers or personal computers which can perform various
types of tasks, embedded systems are designed to perform a specific set of tasks.
Embedded system includes a Microprocessor or Microcontroller, memories RAM, ROM, Cache
memory, networking units (Ethernet WI-FI adaptor), input/output unit, display and keyboard.
Some embedded system have specialized processor such as digital signal processor, graphic
processor etc.
5. Communication protocols
Communications protocols form the backbone for IoT systems. They allow devices to
communicate with each other. Protocols define the data exchange formats, data encoding and
addressing schemes for devices. Protocols also provide flow control, error control, and other
functions.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 44
4 IoT Levels
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 45
4. IoT Levels
IoT Level 1 System (Uses Internet):
This has a single node / device that performs sensing and/or actuation,
stores data, reforms analysis and the host to the application.
Level 1 IoT systems are suitable for modeling low cost and low complexity
solutions where the data is not big and the analysis requirements are not
computationally intensive.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 46
The application which is deployed locally
has a user interface to instruct the system for
controlling the lights or appliances.
The status information of each light or
appliance is maintained in a local database.
REST service deployed locally allow retrieving
and updating the state of the each light or
appliances in the status database.
The controller continuously monitor the state
of each light or appliance and triggers the
relay switches accordingly.
Since the device is connected to the
internet, the application can be accessed
remotely as well.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 47
IoT Level 2 System (Uses Cloud):
This also has a single node that performs sensing and/or actuation and local analysis.
Data is stored in the cloud and application is usually cloud based systems.
These are suitable for the systems where the data is big.
However the primary analysis requirement is
not computationally intensive and
can be done local itself.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 48
The system consists of the single node that
collects soil moisture data from sensor, monitors
the soil moisture level and controls the irrigation
system.
The controller service continuously monitor the
moisture level. If the moisture level drops below a
threshold ‘t’ , the irrigation system is turned on.
For controlling the irrigation system actuators
such as solenoid valve can be used.
Rest Web Services is used for storing and
retrieving data in the cloud database.
A cloud based application is used for visualizing
the moisture level over a period of time, which
can help in making decisions about irrigation
schedules.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 49
IoT Level 3 System:
This also has a single node. Data is stored and analyzed in the cloud.
Suitable for solutions where the data involved is big and analysis is done in the cloud because of intensive
computational requirements.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 52
Example: Noise Monitoring
Sound sensor may be used to
measure the noise.
subscribes to cloud
The system consists of multiple
nodes placed in different locations
for monitoring noise level in an area.
Nodes are independent of each
other
Each node runs one controller
service that sends the data to the
cloud.
The data is stored in a cloud
database
The analysis of the data collected
from a number of notes is done in
the cloud
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 53
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 54
IoT Level 5 System:
IoT Level 5 system has
multiple end nodes that
perform sensing and / or
actuation
One coordinator node
collects data and send to the
cloud.
Data is stored and analyzed
in the cloud and applications
is cloud based.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 55
Level 5 IoT system are
suitable for forest fire
detection. The system
consists of multiple nodes
placed in different locations
for monitoring temperature,
humidity and carbon dioxide
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 56
IoT Level 6 System:
IoT Level 6 system has multiple Independent nodes that perform
sensing and / or actuations and send data to the cloud.
Data is stored in the cloud and applications is cloud based .
The analytics component analyze the data and store the results in the
cloud database.
The results are visualized with the cloud based application.
The centralized controller is aware of the status of all the end nodes
and send control commands to the nodes.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 57
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 58
Example - weather monitoring System:
The system consists of multiple nodes placed
in different location for monitoring
temperature, humidity and pressure in an
area.
The end nodes are equipped with various
sensors such as temperature ,pressure and
humidity.
The end nodes send the data to the cloud in
real time using a web socket service.
The data is stored in a cloud database.
The analysis of the data is done in the cloud
to aggregate the data and make predictions.
A cloud based applications is used for
visualizing the data.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 59
5. IoT and M2M
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 60
M2M (Machine to machine)
refers to networking of
Machines for remote
monitoring and control and
data exchange.
M2M Node has embedded
hardware module for
sensing, actuation and
communication
As a proxy, M2M Gateway
translates the different
(native) communication
protocols of M2M nodes into
an IP protocol (general) so
that they can communicate
seamlessly and interact within
an M2M network also.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 61
The end-to-end architecture for M2M systems comprising of M2M area networks,
Communications Network and Application domain.
M2M Area Network comprises of many M2M Nodes
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 63
M2M and IoT Difference:
M2M emphasis more on hardware with embedded modules, but IoT
emphasis more on software.
IoT devices run special software for sensor data collection, data analysis
and interfacing with cloud through IP based communication.
M2M data is collected in point solutions and often in on-premises storage
infrastructure. But in IoT data is connected in the cloud. The analytical
component analysis the data, and stores the result in the cloud database.
Data and analysis results are visualized with the cloud based applications.
The centralized controller is aware of the status of all the nodes and send
Control Commands to the nodes.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 64
Conventional Networks and
Software Defined Networking (SDN)
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 65
Limitations of Conventional Networks and Need for Software
Defined Networking (SDN)
The limitations of the conventional network architecture:
Complex network devices with specialized hardware (switches, router etc.) are required.
Network devices use proprietary hardware and software and have slow product lifecycle limiting
innovations .
Network managers find it difficult to manage multiple network devices and interfaces from
multiple vendors. Up gradation of network configuration requires changes in multiple devices.
Interoperability is limited due to the lack of standard and open interfaces.
The conventional networks were well suited for static traffic pattern and had a large number of
products available for specific applications.
Due to complexity of conventional network devices, making changes in the networks to meet the
dynamic traffic pattern of cloud computing is difficult.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 66
Limited scalability:
IoT applications hosted in the cloud are distributed across multiple virtual machines, necessitating
the exchange of traffic.
The virtualization technologies used in cloud computing environments have increased the number
of hosts requiring network access.
Components of IoT applications run distributed algorithms on a large number of virtual machines
that require huge amounts of data exchange between virtual machines.
Such computing environment require highly scalable and easy to manage network
architectures with minimal manual configuration which is difficult with a conventional networks.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 67
Software Defined Networks (SDN):
The SDN architecture proposes programmable open APIs (Application Program Interface) for
interfacing between the SDN application and control layers.
Using these open APIs, various network services such as routing, quality of service, and access
control can be implemented.
This accelerates innovation since the network managers don’t need to wait for device vendors to
embed features in their proprietary hardware.
With separated control and the data plan and centralized network controller, the network
administrator can rapidly configure the network.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 68
SDN architecture separates the control plan from the data plan and centralizes the network
controller.
Control plan is the part of the network that carries the signal and routing message traffic.
Data plan is a part of network that carries the payload data traffic.
Southbound APIs refer to the interfaces that exist
between the SDN controller and the network
devices (such as switches, routers, and firewalls)
below it. These APIs allow the controller to
communicate with the devices to enforce policies,
manage traffic flows, and gather data on the state
of the network.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 70
Network Function Virtualization (NFV):
A Virtual Network Function (VNF) is a software implementation of a network function that can run over a
virtualized infrastructure.
It is a technology that leverages virtualization to consolidate the heterogeneous network devices on
to industry standard high-volume service switches and storage.
NFV is complementary to SDN as NFV can provide the infrastructure on which SDN can run.
NFV and SDN mutually beneficial to each other but not dependent.
Network functions can be virtualized without SDN which is very beneficial to each other.
NFV Infrastructure refers to the compute, network,
and storage resources that are virtualized to
support the deployment and operation of Network
Functions Virtualization (NFV). These resources
collectively provide the necessary environment for
hosting virtual network functions (VNFs), which
replace traditional hardware-based network
functions such as routers, firewalls, and load
balancers with software-based solutions that can
be deployed on standard server hardware..
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 71
NFV Management and Orchestration
(MANO) focuses on the management tasks
specific to virtualization and covers the
orchestration and lifecycle management of
both physical and software resources that
support the infrastructure. Additionally,
MANO handles the lifecycle management of
Virtual Network Functions (VNFs).
NFV can be used to virtualize the Home
Gateway. The NFV infrastructure in the
cloud hosts a virtualized Home Gateway.
The virtualized gateway provides private IP
addresses to the devices in the home. The
virtualized gateway also connects to network
services such as VoIP and IPTV.
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 72
5. Domain Specific IoTs
(Refer Digital Notes)
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 73
IoT Applications
1. Home Automation
2. Smart Cities
3. Environment Monitoring
4. Energy Management
5. Retail Management
6. Logistics
7. Smart Agriculture
8. Industry
9. Health & Lifestyle
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 74
THANK YOU
05-09-2024 https://www.youtube.com/c/KKTVirtualLearning 75