SlideShare a Scribd company logo
1 of 23
1
UNIT –III
Chapter 3 & 4
Topic: - IoT and M2M
IoT System Management with
NETCONF-YANG
2
Content
No Topic Page
No
I IoT and M2M
1 Machine-to-Machine 3
2 Difference betweenIoT and M2M 5
3 Software DefinedNetworking (SDN) 7
4 Network FunctionVirtualization(NFV) 10
II IoT System Management with NETCONF-YANG
5 Needfor IoT Systems Management 12
6 Simple Network Management Protocol (SNMP) 14
7 Network Operator Requirements 15
8 NETCONF 17
9 YANG 18
10 IoT Systems Management withNETCONF –YANG 20
3
IoT and M2M
&
IoT System Management with NETCONF – YANG
INTRODUCTION
Machine-to-machine (M2M) is a technology that uses a device attached to a
machine to capture an event which is relayed through a mobile phone or fixed line
network to an application that translates the event into meaningful information. The
Internet of Things (IoT) is the next generation of the Internet based on the Internet
Protocol(IP).
• Term which is often synonymous with IoTis Machine-to-Machine(M2M).
• IoTand M2M are often used interchangeably.
M2M
Machine to Machine (M2M) refers to networking of machines or devices for the
purposeof remote monitoring and control and data exchange.
M2M SystemArchitecture:
The following diagram shows the end-to-end architecture of M2M systems
comprises of M2M area networks, communication networks and application domain.
 An M2M area network comprises of machines (or M2M nodes) which have
embedded hardwaremodules for sensing, actuation and communication.
4
 Various communication protocols can be used for M2M LAN such as ZigBee,
Bluetooth, M-bus, Wireless M-Bus, Powerline communication (PLC), 6LoWPAN,
IEEE 802.15.4 etc.., These protocols provide connectivity between M2M nodes
within an M2M area network.
 The communication network provides connectivity to remote M2M area
networks. The communication network can use either wired or wireless network.
While the M2M are networks use proprietary or non-IP based communication
protocols, the communication network uses IP-based network. Since non-IP
based protocols are used within M2M area network, the M2M nodes within one
network cannot communicate with nodes in an external network.
Block diagram of an M2M gateway:
The below diagram shows a block diagram of M2M gateway.
M2M area networks:
 Bluetooth
 Zigbee
 802.15.4
 6IoWPAN
 M-Bus,Wireless M-Bus
 UWB
 Modbus
 Z-wave
M2M Gateway
Virtual Node
Virtual Node
The communication between M2M nodes and the M2M gateway is based on the
communication protocols which are naive to the M2M are network. M2M gateway
performs protocol translations to enable IP-connectivity for M2M are networks.
M2M gateway acts as a proxy performing translations from/to native protocols
to/from Internet Protocol (IP). With an M2M gateway, each mode in an M2M area
network appears as a virtualized node for external M2M area networks. M2M data
is gathered into point solutions such as Enterprise applications, service
M2M Node
M2M Node
Native
Protocol
Protocol
Translation
Proxy
Native
Protocol
Protocol
Translation
Proxy
IP Routing
5
management applications, and Remote monitoring applications. M2M has various
applications domain such as smart metering, Home automation, Industrial
automation, smart Grids etc. M2M solution designs (such as data collection and
storage architecture and application apps) are specific to the M2M application
domain.
Difference betweenIoTand M2M
i) CommunicationProtocols:
 M2M and IoT can differ in how the communication between the machines or
devices happens.
 Commonly uses M2M protocols include ZigBee, Bluetooth, ModBus, M-Bus,
WirelessM-Bustec.,
 In IoTuses HTTP, CoAP, WebSocket, MQTT, XMPP, DDS, AMQPetc.,
 M2M uses either proprietary or non-IP based communication
 The focus of communication in M2M is usually on the protocols below the network
layer.
 The focus of communication in IoT is usually on the protocols above the network
layer.
ii) Machines inM2M Vs Things in IoT:
 The “Things” in IoT refers to physical objects have unique identifier and can
sense and communicate with their external environment and user applications or
their inter physical state. The unique identifier for the things in IoT is the IP
6
addresses MAC addresses. Things have software components for accessing and
processing and storing sensor information, or controlling actuators connectors.
 Machines in M2M will be homogenous whereas Things in IoT will be
heterogeneous. (eg. Home automation, Fire alarms, Door Alarms, Lighting
control devices etc.
 M2M systems, in contrast to IoT, typically have homogeneous machine types
within an M2M area network.
iii) Hardware Vs Software Emphasis:
 The emphasis of M2M is moreon hardwarewith embedded modules
 The emphasis of IoTis more on software.
 IOT spends specialized software for sensor data collection, Data analysis and
interfacing with the cloud through IP based communications
iv) Data Collection&Analysis:
•M2M data is collected in point solutions and often in on-premises storage
infrastructure.
•The data in IoTis collected in the cloud (can be public, private or hybrid cloud).
 The analytics components analyses the data and stores the result in the cloud
database. The centralized IoT data and analysis result are visualized with the
cloud-based applications. The centralized controller is aware of the status of all
the end nodes and sends control commands to the nodes. Observer nodes can
process information. And use it for various applications; however observer nodes
do not performany control functions.
v) Applications:
 M2M data is collected in point solutions and can be accessed by on-premises
applications such as diagnosis applications, service management applications, and
on premises enterpriseapplications.
 IoT data is collected in the cloud and can be accessed by cloud applications such
as analytics applications, enterprise applications, remote diagnosis and
management applications, etc.
7
 The scale of collected data in IoT is massive, cloud based real Time and batch data
analysis framework areused for data analysis.
3.3 SOFTWAREDEFINED NETWORKING FOR IOT
 Software Defined Networking (SDN) is a networking architecture that separates
the controlplane fromthe data plane and centralizes the network controller.
 Software-based SDN controllers maintain a unified view of the network and make
configuration, management and provisioning simpler.
 The underlying infrastructure in SDN uses simple packet forwarding hardware as
opposed to specialized hardwarein conventional networks.
 Control plane is the partof the network that carries the payload data traffic.
Limitations of Conventional Network:
Complex Network Devices:
Conventional Network is getting increasingly complex with more and more
protocols being implemented to improve link speeds and reliability. Interoperability is
limited due to the lack of standard and open interfaces. Network devices use
proprietary hardware and software and have slow product life cycles limiting
innovation. The conventional network were well suited for static traffic patterns and
had large number of protocols designed for specific applications.
Management Overhead:
Conventional network involves significant management overhead. Network
manager find it increasingly difficult to manage multiple network devices and
interfaces from multiple vendors. Upgradation of network requires configuration
changes in multiple devices (switches, routers, firewalls etc.)
LimitedScalability:
The virtualization technology used in cloud computing environment has
increase the number of virtual hosts requiring network access. IoT applications hosted
in the cloud are distributed across multiple virtual machines that require exchange of
traffic. The analytics components of IoT applications run distributed algorithms on a
large number of virtual machines and require huge amount of data exchange between
virtual machines.
8
SDN Architecture
Figure shows the SDN Architecture and SDN Layers in which the control and data planes
are decoupled and the network controller is centralized.
SDN LAYERS
Programmable Open APIs
(Northbound Interface)
Control & Data PlaneProgrammable
Interface (Southbound Interface)
9
Key elements of SDN:
 CentralizedNetwork Controller
With decoupled control and data planes and centralized network controller,
the network administrators can rapidly configure the network. SDN applications can be
deployed through programmable open APIs. This speeds up innovation as the network
administrator no longer need to wait for the device vendors to embed new features in
their proprietary hardware.
 Programmable OpenAPIs
SDN architecture supports programmable open APIs for interface between the
SDN application and control layers (Northbound interface). With these open APIs
various network services can be implemented, such as routing, quality of service (QOS)
access control etc.,
 Standard CommunicationInterface (OpenFlow)
SDN architecture uses a standard communication interface between the control
and infrastructure layers (Southbound interface). OpenFlow, which is defined by the
Open Networking Foundation (ONF), is the broadly accepted SDN protocol for the
southbound interface. With openflow, the forwarding plane of the network devices
can be directly access and manipulated. Openflow uses the concept of flows to identify
network traffic based on predefined match rules.
OpenFlowSwitch
SDNController
Open Flow
Channel
Group Table
Flow Table Flow Table
OpenFlow
Prortocol
Pipeline
OpenFlow Switch
10
OpenFlow flow table
Network FunctionVirtualization
• Network Function Virtualization (NFV) is a technology that leverages virtualization
to consolidate the heterogeneous network.
• Devices onto industry standard high-volumeservers, switches and storage.
•NFV is complementary to SDN as NFV can provide the infrastructure on which SDN
can run
• NFV and SDNare mutually beneficial to each other but not dependent.
• Network functions can be virtualized without SDN similarly SDN can run without
NFV
Rule Action Stats
Switch
port
MAC
src
MAC
dst
Eth
type
VLAN
ID
IP src IP dst IP Port TCP
Sport
TCP
dport
1. Forward packet to port
2. Encapsulate & forward to
controller
3. Drop packet
4. Send to normal processing
pipeline
Packet + byte counters
11
Key elements of NFV
• Virtualized Network Function (VNF):
VNF is a softwareimplementation of a network function which is capable of
running over the NFV Infrastructure(NFVI).
• NFV Infrastructure(NFVI):
NFVI includes compute, network and storageresources that are virtualized.
• NFV Management and Orchestration:
NFV Management and Orchestration focuses on all virtualization-specific
management tasks and covers the orchestration and life-cycle management of physicaland/or
softwareresources thatsupportthe infrastructurevirtualization, and the life-cycle
management of VNFs.
NFVUse Case
 NFV can be used to virtualize the Home Gateway.
 The NFV infrastructurein the cloud hosts a virtualized Home Gateway.
 The virtualized gateway provides privateIP addresses to the devices in the home.
 The virtualized gateway also connects to network services such as VoIP and IPTV.
12
3.5 NEED FOR IOT SYSTEMS MANAGEMENT:
Internet of Things (IoT) systems can have complex software, hardware and
deployment designs including sensors, actuators, software and network resources,
data collection and analysis services and user interfaces.
IoT systems can have distributed deployments comprising of a number of IoT
devices which collect data fromsensors or performactuation.
Managing multiple devices within a single requires advanced management
capabilities. The need for managing IoTsystems is described as follows:
 Automating Configuration
 Monitoring Operational& Statistical Data
 Improved Reliability
 SystemWide Configurations
 Multiple SystemConfigurations
 Retrieving & Reusing Configurations.
Automating Configuration:
 IoT system management capabilities can help in automating the
systemconfigurations.
 System management interfaces provide predictable and easy to use
management capability and the ability to automate systemconfiguration.
 Automation becomes even more important when a system consists
of multiple devices or nodes.
Monitoring Operational andStatistical Data:
 Operational data is the data which is related to the system’s
operating parameters and is collected by the systemat runtime.
 Statistical data is the data which describes the system performance
(e.g. CPU and memory usage).
 Management systems can help in monitoring operational and
statistical data of a system. This data can be used for fault diagnosis or prognosis.
ImprovedReliability:
 A management system that allows validating the system
configurations before they are put into effect can help in improving the system
reliability.
13
SystemWide Configuration:
 IoT system that consists of multiple devices or nodes, ensuring
system-wideconfiguration can be critical for the correctfunctioning of the system.
 Management approaches in which each device is configured
separately (either through a manual or automated process) can result in system
faults or undesirable outcomes. This happens when some devices are running on an
old configuration while others start running on new configuration. To avoid this
system wide configuration is required where all devices are configured in a single
atomic transaction.
Multiple SystemConfigurations:
 Some systems it may be desirable to have multiple valid
configurations which are applied at differenttimes or in certain conditions.
Retrieving andReusing Configurations:
 Management systems which have the capability of retrieving
configurations from devices can help in reusing the configurations for other devices
of these of the same type.
3.6 Simple Network Management Protocol (SNMP)
SNMP is a well-known and widely use network management protocol that
allows monitoring and configuration network devices such as routers, switches,
servers, printers etc.
SNMP component include
• Network Management Station (NMS)
 Managed Device
• Management Information Base(MIB)
• SNMP Agent that runs on the device
14
3.6.1 Limitations of SNMP
SNMP is stateless in nature and each SNMP request contains all the
information to process the request.
The application needs to be intelligent to manage the device.
• SNMP is a connectionless protocol which uses UDP as the transport
protocol, making it unreliable as there was no support for acknowledgement of
requests.
• MIBs often lack writable objects without which device configuration is
not possibleusing SNMP.
• It is difficult to differentiate between configuration and state data in
MIBs.
• Retrieving the current configuration from a device can be difficult with
SNMP.
• Earlier versions of SNMP did not have strong security features.
3.7 NETWORKOPERATOR REQUIREMENTS
The following points provide a brief overview of the operator requirements.
 Ease of use
 Distinction between configuration and state data
 Fetch configuration and state data separately
 Configuration of the network as a whole
 Configuration transactions across devices
 Configuration deltas
 Dump and restore configurations
 Configuration validation
15
 Configuration database schemas
 Comparing configurations
 Role-based access control
 Consistency of access control lists
 Multiple configuration sets
 Supportfor both data-oriented
Ease of Use:
 Ease of useis the key requirement for any network management technology.
Distinctionbetweenconfigurationandstate data:
 Configuration data is the set of writable data that is required to transform the
systemfromits initial state to its current.
 State data is the data which is not configurable. It includes operational data which
is collected by the system at runtime and statistical data which describes the
systemperformance.
FetchConfigurationand state dataseparately:
 To fetch the configuration and state data separately from the managed device
help to make a clear distinction between configuration and state data.
Configurationof the network as a whole:
 Operator can configurethe network as a whole rather than individual device.
 It is important for systems which have multiple devices and configuring them
within one network wide transaction is required to ensure the correct operation of
the system.
Configurationtransactionacross devices:
 Configuration transactions across multiple devices should be supported.
Configurationdeltas:
 To generate the operations necessary for going from on configuration state to
another.
 The devices should supportconfiguration deltas with minimal state changes.
Dump and restore configurations:
16
 To dump configurations from devices and restore configurations from devices and
restoreconfigurations to devices.
ConfigurationValidation:
 Itshould be possibleto validate configurations.
Configuration database schemas:
 There is a need for standardized configuration database schemas or data models
across operators.
Comparing Configurations:
 Devices should not arbitrarily reorder data, so that it is possible to use text
processing tools such as diff to compare configurations.
Role-basedaccess control:
 Devices should support role-based access control model, so that a user is given
the minimum access necessary to performa required task.
Consistency of access control lists:
 It should be possible to do consistency checks of access control lists across
devices.
Multiple configurations set:
 There should be support for multiple configurations sets on devices. This way a
distinction can be provided between candidate and active configurations.
Support for both data-orientedandtask-orientedaccess control:
 While SNMP access control is data-oriented, CLI access control is usually task
oriented. There should be supportfor both types of access control.
NETCONF
 Network Configuration Protocol (NETCONF) is a session-based network
management protocol. NETCONF allows retrieving state or configuration data and
manipulating configuration data on network devices.
17
• NETCONF works on SSH transportprotocol.
 Transport layer provides end-to-end connectivity and ensure reliable delivery
messages.
 NETCONF uses XML-encoded Remote Procedure Calls (RPCs) for framing request
and responsemessages.
 The RPC layer provides mechanismfor encoding of RPC calls and notifications.
 NETCONF provides various operations to retrieve and edit configuration data
fromnetwork devices.
 The Content Layer consists of configuration and state data which is XML-encoded.
 The schema of the configuration and state data is defined in a data modeling
language called YANG.
 NETCONF provides a clear separation of the configuration and state data.
 The configuration data resides within a NETCONF configuration datastore on the
server.
YANG Defined
18
List of commonly used NETCONF RPC methods
Operation Description
connect Connect to a NETCONF server
get Retrieve the running configuration and state information
get-coding Retrieve all or a portion of a configuration datastore
edit-config Loads all or part of a specified configuration to the specified target
configuration
copy-config Create or replace an entire target configuration datastore with a
complete sourceconfiguration
delete-config Delete the contents of a configuration datastore
lock Lock a configuration datastorefor exclusively edits by a client
unlock Release the lock on a configuration datastore
get-schema This operation is used to retrieve a schema from the NETCONF
server
commit Commit the candidate configuration as the devices new current
configuration
close-session Gradually terminate a NETCONF session
kill-session Forcefully terminate a NETCONF session
3.9 YANG
 YANG is a data modeling language used to model configuration and state data
manipulated by the NETCONF protocol.
• YANG modules contain the definitions of the configuration data, state data,
RPC calls that can be issued and the formatof the notifications.
 YANG modules define the data exchanged between the NETCONF client and
server.
• A module comprises of a number of 'leaf' nodes which are organized into a
hierarchical tree structure.
YANG Module Example
• The 'leaf' nodes are specified using the 'leaf' or 'leaf-list' constructs.
• Leaf nodes are organized using 'container' or 'list' constructs.
• A YANG module can importdefinitions from other modules.
• Constraints can be defined on the data nodes, e.g. allowed values.
• YANG can model both configuration data and state data using the 'config'
statement. This YANG module is a YANG version of the toaster MIB
19
• The toaster YANG module begins with the header information followed by
identity declarations which define various bread types.
• The leaf nodes (‘toasterManufacturer’,‘toasterModelNumber’ and
‘toasterStatus’) aredefined in the toaster container.
• Each leaf node definition has a type and optionally a description and default
value.
• The module has two RPC definitions (‘make-toast’ and ‘cancel-toast’).
YANG Node Types
Node Type Description
Leaf Nodes Contain simple data structures such as an integer or a sting. Leaf has
exactly one value of a particular type and no child nodes
Leaf-List Nodes Is a sequence of leaf nodes with exactly one value of a particular
type per leaf.
Container
Nodes
Used to group related nodes in a subtree. A container has only child
nodes and no value. A container may contain any number of child
nodes of any type (including leafs, lists, containers and leaf-lists).
List Nodes Defines a sequenceof list entries. Each entry is like a structureor a
record instance, and is uniquely identified by the values of its key
leafs. A list can define multiple key leaf and may contain any number
of child nodes of any type.
Visual Representation the Toaster YANG Module
20
3.10 IoT Systems Management withNETCONF –YANG
NETCONF provides various operations to retrieve and edit configuration data
fromnetwork devices.
Look at the roles of the various components:
Management System:
The operator uses a Management System to send NETCONF messages to
configure the IoT device and receives state information and notifications from the
device as NETCONF messages.
Management API:
Management API allows management applications to start NETCONF sessions,
read and write configuration data, read state data, retrieve configurations, and
invokeRPCs, programmatically, in the sameway as an operator can.
TransactionManager:
Transaction Manager executes all the NETCONF transactions and ensure that the
ACID (Atomicity, Consistency, Isolation, and Durability) properties hold true for the
transactions.
21
Atomicity property ensures that a transaction is executed either completely or not
at all.
Consistency property ensures that a transaction brings the device configuration
fromone valid state to another.
Isolation property ensures that concurrent execution of transactions results in the
same device configuration as if transactions wereexecuted serially in order.
Durability property ensures that a transaction once committed will persist.
Rollback Manager:
Rollback manager is responsible for generating all the transactions necessary to
rollback a current configuration to its original state.
Data Model Manager:
The Data Model Manager keeps track of all the YANG data models and the
corresponding managed objects. The Data Model manager also keeps track of the
applications which providedata for each part of a data model.
ConfigurationValidator:
Configuration validator checks if the resulting configuration after applying a
transaction would be a valid configuration.
ConfigurationDatabase:
This databasecontains both the configuration and operational data.
ConfigurationAPI:
Using the configuration API the applications on the IoT device can read
configuration data from the configuration datastore and write operational data to
the operational datastore.
Data Provider API:
Applications on the IoT device can register for callbacks for various events using
the Data Provider API. Through the Data Provider API, the applications can report
statistics and operational data.
22
3.11 NETOPEER:
Netopeer is set of open sourceNETCONF tools built on the Libnetconf library.
Netopeer-server:
Netopeer-server is a NETCOBNF protocol server that runs on the managed-device.
Netopeer-server provides an environment for configuring the device using
NETCONF RPC operations and also retrieving the state data fromthe device.
Netopeer-agent:
Netopeer agent is the NETCONF protocol agent running as a SSH/TLS subsystem.
Netopeer-agent accepts incoming NETCONF connection and passes the NETCONF
RPC operations received fromthe NETCONF client to the Netopper-server.
Netopper-cli:
Netopper-cli is a NETCONF client that provides a command line interface for
interacting with the Netopper-server. The operator can use the Netopper-client
from the management system to send NETCONF RPC operations for configuring
the device retrieving the state information.
Netopper-manager:
Netopper-manager allows managing the YANG and Libnetconf Transaction API
(TransAPI) modules on the Netopeer-server. With Netopeer-manager modules
can be loaded or removed from the server.
Netopeer-configurator:
Netopeer-configurator is a tool that can be used to configure the Netopper-
server.
23
THANK YOU

More Related Content

What's hot

Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualizationGokulnath S
 
Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)FabMinds
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computinggaurav jain
 
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdfUnit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdfJayanthi Kannan MK
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computingSohailAliMalik
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application ArchitectureUC San Diego
 
IoT Physical Devices and End Points.pdf
IoT Physical Devices and End Points.pdfIoT Physical Devices and End Points.pdf
IoT Physical Devices and End Points.pdfGVNSK Sravya
 
Multilayer & Back propagation algorithm
Multilayer & Back propagation algorithmMultilayer & Back propagation algorithm
Multilayer & Back propagation algorithmswapnac12
 
Content addressable network(can)
Content addressable network(can)Content addressable network(can)
Content addressable network(can)Amit Dahal
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxDRREC
 
Fundamental design concepts
Fundamental design conceptsFundamental design concepts
Fundamental design conceptssrijavel
 
Dr. Rajeshree Khande :Introduction to Java AWT
Dr. Rajeshree Khande :Introduction to Java AWTDr. Rajeshree Khande :Introduction to Java AWT
Dr. Rajeshree Khande :Introduction to Java AWTDrRajeshreeKhande
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile ComputingJAINIK PATEL
 
Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)Robert Grossman
 

What's hot (20)

Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualization
 
Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
 
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdfUnit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application Architecture
 
IoT Physical Devices and End Points.pdf
IoT Physical Devices and End Points.pdfIoT Physical Devices and End Points.pdf
IoT Physical Devices and End Points.pdf
 
Unit 4
Unit 4Unit 4
Unit 4
 
Aneka platform
Aneka platformAneka platform
Aneka platform
 
Multilayer & Back propagation algorithm
Multilayer & Back propagation algorithmMultilayer & Back propagation algorithm
Multilayer & Back propagation algorithm
 
Content addressable network(can)
Content addressable network(can)Content addressable network(can)
Content addressable network(can)
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
 
Fundamental design concepts
Fundamental design conceptsFundamental design concepts
Fundamental design concepts
 
Dr. Rajeshree Khande :Introduction to Java AWT
Dr. Rajeshree Khande :Introduction to Java AWTDr. Rajeshree Khande :Introduction to Java AWT
Dr. Rajeshree Khande :Introduction to Java AWT
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
Introduction to .NET Framework
Introduction to .NET FrameworkIntroduction to .NET Framework
Introduction to .NET Framework
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)
 

Similar to IoT System Management with NETCONF-YANG

ioT and Machine 2 Machine Computing
ioT and Machine 2 Machine ComputingioT and Machine 2 Machine Computing
ioT and Machine 2 Machine ComputingVikram Nandini
 
Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdfvenui2
 
iot course a hand on approach internet of things
iot course a hand on approach internet of thingsiot course a hand on approach internet of things
iot course a hand on approach internet of thingsYOYOFRX
 
IoT, M2M and IoT System Management
IoT, M2M and IoT System ManagementIoT, M2M and IoT System Management
IoT, M2M and IoT System ManagementVikram Nandini
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Petr Nemec
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoTGanesh Awati
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationCHAKER ALLAOUI
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 

Similar to IoT System Management with NETCONF-YANG (20)

ioT and Machine 2 Machine Computing
ioT and Machine 2 Machine ComputingioT and Machine 2 Machine Computing
ioT and Machine 2 Machine Computing
 
Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdf
 
Chapter-3.pptx
Chapter-3.pptxChapter-3.pptx
Chapter-3.pptx
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
IoT Heap 2
IoT Heap 2IoT Heap 2
IoT Heap 2
 
iot course a hand on approach internet of things
iot course a hand on approach internet of thingsiot course a hand on approach internet of things
iot course a hand on approach internet of things
 
IoT, M2M and IoT System Management
IoT, M2M and IoT System ManagementIoT, M2M and IoT System Management
IoT, M2M and IoT System Management
 
Chapter-3.pdf
Chapter-3.pdfChapter-3.pdf
Chapter-3.pdf
 
Chapter-3.pdf
Chapter-3.pdfChapter-3.pdf
Chapter-3.pdf
 
What is SDN.pdf
What is SDN.pdfWhat is SDN.pdf
What is SDN.pdf
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
 
IOT_UNIT-1.pptx
IOT_UNIT-1.pptxIOT_UNIT-1.pptx
IOT_UNIT-1.pptx
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
2.pdf
2.pdf2.pdf
2.pdf
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Iot
IotIot
Iot
 

More from Dr.M.Karthika parthasarathy

IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...
IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...
IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...Dr.M.Karthika parthasarathy
 
Unit 1 Introduction to Artificial Intelligence.pptx
Unit 1 Introduction to Artificial Intelligence.pptxUnit 1 Introduction to Artificial Intelligence.pptx
Unit 1 Introduction to Artificial Intelligence.pptxDr.M.Karthika parthasarathy
 

More from Dr.M.Karthika parthasarathy (20)

IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...
IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...
IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...
 
Linux Lab Manual.doc
Linux Lab Manual.docLinux Lab Manual.doc
Linux Lab Manual.doc
 
Unit 2 IoT.pdf
Unit 2 IoT.pdfUnit 2 IoT.pdf
Unit 2 IoT.pdf
 
Unit 1 Introduction to Artificial Intelligence.pptx
Unit 1 Introduction to Artificial Intelligence.pptxUnit 1 Introduction to Artificial Intelligence.pptx
Unit 1 Introduction to Artificial Intelligence.pptx
 
Unit I What is Artificial Intelligence.docx
Unit I What is Artificial Intelligence.docxUnit I What is Artificial Intelligence.docx
Unit I What is Artificial Intelligence.docx
 
Introduction to IoT - Unit II.pptx
Introduction to IoT - Unit II.pptxIntroduction to IoT - Unit II.pptx
Introduction to IoT - Unit II.pptx
 
IoT Unit 2.pdf
IoT Unit 2.pdfIoT Unit 2.pdf
IoT Unit 2.pdf
 
Chapter 3 heuristic search techniques
Chapter 3 heuristic search techniquesChapter 3 heuristic search techniques
Chapter 3 heuristic search techniques
 
Ai mcq chapter 2
Ai mcq chapter 2Ai mcq chapter 2
Ai mcq chapter 2
 
Introduction to IoT unit II
Introduction to IoT  unit IIIntroduction to IoT  unit II
Introduction to IoT unit II
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
Internet of things Unit 1 one word
Internet of things Unit 1 one wordInternet of things Unit 1 one word
Internet of things Unit 1 one word
 
Unit 1 q&a
Unit  1 q&aUnit  1 q&a
Unit 1 q&a
 
Overview of Deadlock unit 3 part 1
Overview of Deadlock unit 3 part 1Overview of Deadlock unit 3 part 1
Overview of Deadlock unit 3 part 1
 
Examples in OS synchronization for UG
Examples in OS synchronization for UG Examples in OS synchronization for UG
Examples in OS synchronization for UG
 
Process Synchronization - Monitors
Process Synchronization - MonitorsProcess Synchronization - Monitors
Process Synchronization - Monitors
 
.net progrmming part4
.net progrmming part4.net progrmming part4
.net progrmming part4
 
.net progrmming part3
.net progrmming part3.net progrmming part3
.net progrmming part3
 
.net progrmming part1
.net progrmming part1.net progrmming part1
.net progrmming part1
 
.net progrmming part2
.net progrmming part2.net progrmming part2
.net progrmming part2
 

Recently uploaded

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 

Recently uploaded (20)

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

IoT System Management with NETCONF-YANG

  • 1. 1 UNIT –III Chapter 3 & 4 Topic: - IoT and M2M IoT System Management with NETCONF-YANG
  • 2. 2 Content No Topic Page No I IoT and M2M 1 Machine-to-Machine 3 2 Difference betweenIoT and M2M 5 3 Software DefinedNetworking (SDN) 7 4 Network FunctionVirtualization(NFV) 10 II IoT System Management with NETCONF-YANG 5 Needfor IoT Systems Management 12 6 Simple Network Management Protocol (SNMP) 14 7 Network Operator Requirements 15 8 NETCONF 17 9 YANG 18 10 IoT Systems Management withNETCONF –YANG 20
  • 3. 3 IoT and M2M & IoT System Management with NETCONF – YANG INTRODUCTION Machine-to-machine (M2M) is a technology that uses a device attached to a machine to capture an event which is relayed through a mobile phone or fixed line network to an application that translates the event into meaningful information. The Internet of Things (IoT) is the next generation of the Internet based on the Internet Protocol(IP). • Term which is often synonymous with IoTis Machine-to-Machine(M2M). • IoTand M2M are often used interchangeably. M2M Machine to Machine (M2M) refers to networking of machines or devices for the purposeof remote monitoring and control and data exchange. M2M SystemArchitecture: The following diagram shows the end-to-end architecture of M2M systems comprises of M2M area networks, communication networks and application domain.  An M2M area network comprises of machines (or M2M nodes) which have embedded hardwaremodules for sensing, actuation and communication.
  • 4. 4  Various communication protocols can be used for M2M LAN such as ZigBee, Bluetooth, M-bus, Wireless M-Bus, Powerline communication (PLC), 6LoWPAN, IEEE 802.15.4 etc.., These protocols provide connectivity between M2M nodes within an M2M area network.  The communication network provides connectivity to remote M2M area networks. The communication network can use either wired or wireless network. While the M2M are networks use proprietary or non-IP based communication protocols, the communication network uses IP-based network. Since non-IP based protocols are used within M2M area network, the M2M nodes within one network cannot communicate with nodes in an external network. Block diagram of an M2M gateway: The below diagram shows a block diagram of M2M gateway. M2M area networks:  Bluetooth  Zigbee  802.15.4  6IoWPAN  M-Bus,Wireless M-Bus  UWB  Modbus  Z-wave M2M Gateway Virtual Node Virtual Node The communication between M2M nodes and the M2M gateway is based on the communication protocols which are naive to the M2M are network. M2M gateway performs protocol translations to enable IP-connectivity for M2M are networks. M2M gateway acts as a proxy performing translations from/to native protocols to/from Internet Protocol (IP). With an M2M gateway, each mode in an M2M area network appears as a virtualized node for external M2M area networks. M2M data is gathered into point solutions such as Enterprise applications, service M2M Node M2M Node Native Protocol Protocol Translation Proxy Native Protocol Protocol Translation Proxy IP Routing
  • 5. 5 management applications, and Remote monitoring applications. M2M has various applications domain such as smart metering, Home automation, Industrial automation, smart Grids etc. M2M solution designs (such as data collection and storage architecture and application apps) are specific to the M2M application domain. Difference betweenIoTand M2M i) CommunicationProtocols:  M2M and IoT can differ in how the communication between the machines or devices happens.  Commonly uses M2M protocols include ZigBee, Bluetooth, ModBus, M-Bus, WirelessM-Bustec.,  In IoTuses HTTP, CoAP, WebSocket, MQTT, XMPP, DDS, AMQPetc.,  M2M uses either proprietary or non-IP based communication  The focus of communication in M2M is usually on the protocols below the network layer.  The focus of communication in IoT is usually on the protocols above the network layer. ii) Machines inM2M Vs Things in IoT:  The “Things” in IoT refers to physical objects have unique identifier and can sense and communicate with their external environment and user applications or their inter physical state. The unique identifier for the things in IoT is the IP
  • 6. 6 addresses MAC addresses. Things have software components for accessing and processing and storing sensor information, or controlling actuators connectors.  Machines in M2M will be homogenous whereas Things in IoT will be heterogeneous. (eg. Home automation, Fire alarms, Door Alarms, Lighting control devices etc.  M2M systems, in contrast to IoT, typically have homogeneous machine types within an M2M area network. iii) Hardware Vs Software Emphasis:  The emphasis of M2M is moreon hardwarewith embedded modules  The emphasis of IoTis more on software.  IOT spends specialized software for sensor data collection, Data analysis and interfacing with the cloud through IP based communications iv) Data Collection&Analysis: •M2M data is collected in point solutions and often in on-premises storage infrastructure. •The data in IoTis collected in the cloud (can be public, private or hybrid cloud).  The analytics components analyses the data and stores the result in the cloud database. The centralized IoT data and analysis result are visualized with the cloud-based applications. The centralized controller is aware of the status of all the end nodes and sends control commands to the nodes. Observer nodes can process information. And use it for various applications; however observer nodes do not performany control functions. v) Applications:  M2M data is collected in point solutions and can be accessed by on-premises applications such as diagnosis applications, service management applications, and on premises enterpriseapplications.  IoT data is collected in the cloud and can be accessed by cloud applications such as analytics applications, enterprise applications, remote diagnosis and management applications, etc.
  • 7. 7  The scale of collected data in IoT is massive, cloud based real Time and batch data analysis framework areused for data analysis. 3.3 SOFTWAREDEFINED NETWORKING FOR IOT  Software Defined Networking (SDN) is a networking architecture that separates the controlplane fromthe data plane and centralizes the network controller.  Software-based SDN controllers maintain a unified view of the network and make configuration, management and provisioning simpler.  The underlying infrastructure in SDN uses simple packet forwarding hardware as opposed to specialized hardwarein conventional networks.  Control plane is the partof the network that carries the payload data traffic. Limitations of Conventional Network: Complex Network Devices: Conventional Network is getting increasingly complex with more and more protocols being implemented to improve link speeds and reliability. Interoperability is limited due to the lack of standard and open interfaces. Network devices use proprietary hardware and software and have slow product life cycles limiting innovation. The conventional network were well suited for static traffic patterns and had large number of protocols designed for specific applications. Management Overhead: Conventional network involves significant management overhead. Network manager find it increasingly difficult to manage multiple network devices and interfaces from multiple vendors. Upgradation of network requires configuration changes in multiple devices (switches, routers, firewalls etc.) LimitedScalability: The virtualization technology used in cloud computing environment has increase the number of virtual hosts requiring network access. IoT applications hosted in the cloud are distributed across multiple virtual machines that require exchange of traffic. The analytics components of IoT applications run distributed algorithms on a large number of virtual machines and require huge amount of data exchange between virtual machines.
  • 8. 8 SDN Architecture Figure shows the SDN Architecture and SDN Layers in which the control and data planes are decoupled and the network controller is centralized. SDN LAYERS Programmable Open APIs (Northbound Interface) Control & Data PlaneProgrammable Interface (Southbound Interface)
  • 9. 9 Key elements of SDN:  CentralizedNetwork Controller With decoupled control and data planes and centralized network controller, the network administrators can rapidly configure the network. SDN applications can be deployed through programmable open APIs. This speeds up innovation as the network administrator no longer need to wait for the device vendors to embed new features in their proprietary hardware.  Programmable OpenAPIs SDN architecture supports programmable open APIs for interface between the SDN application and control layers (Northbound interface). With these open APIs various network services can be implemented, such as routing, quality of service (QOS) access control etc.,  Standard CommunicationInterface (OpenFlow) SDN architecture uses a standard communication interface between the control and infrastructure layers (Southbound interface). OpenFlow, which is defined by the Open Networking Foundation (ONF), is the broadly accepted SDN protocol for the southbound interface. With openflow, the forwarding plane of the network devices can be directly access and manipulated. Openflow uses the concept of flows to identify network traffic based on predefined match rules. OpenFlowSwitch SDNController Open Flow Channel Group Table Flow Table Flow Table OpenFlow Prortocol Pipeline OpenFlow Switch
  • 10. 10 OpenFlow flow table Network FunctionVirtualization • Network Function Virtualization (NFV) is a technology that leverages virtualization to consolidate the heterogeneous network. • Devices onto industry standard high-volumeservers, switches and storage. •NFV is complementary to SDN as NFV can provide the infrastructure on which SDN can run • NFV and SDNare mutually beneficial to each other but not dependent. • Network functions can be virtualized without SDN similarly SDN can run without NFV Rule Action Stats Switch port MAC src MAC dst Eth type VLAN ID IP src IP dst IP Port TCP Sport TCP dport 1. Forward packet to port 2. Encapsulate & forward to controller 3. Drop packet 4. Send to normal processing pipeline Packet + byte counters
  • 11. 11 Key elements of NFV • Virtualized Network Function (VNF): VNF is a softwareimplementation of a network function which is capable of running over the NFV Infrastructure(NFVI). • NFV Infrastructure(NFVI): NFVI includes compute, network and storageresources that are virtualized. • NFV Management and Orchestration: NFV Management and Orchestration focuses on all virtualization-specific management tasks and covers the orchestration and life-cycle management of physicaland/or softwareresources thatsupportthe infrastructurevirtualization, and the life-cycle management of VNFs. NFVUse Case  NFV can be used to virtualize the Home Gateway.  The NFV infrastructurein the cloud hosts a virtualized Home Gateway.  The virtualized gateway provides privateIP addresses to the devices in the home.  The virtualized gateway also connects to network services such as VoIP and IPTV.
  • 12. 12 3.5 NEED FOR IOT SYSTEMS MANAGEMENT: Internet of Things (IoT) systems can have complex software, hardware and deployment designs including sensors, actuators, software and network resources, data collection and analysis services and user interfaces. IoT systems can have distributed deployments comprising of a number of IoT devices which collect data fromsensors or performactuation. Managing multiple devices within a single requires advanced management capabilities. The need for managing IoTsystems is described as follows:  Automating Configuration  Monitoring Operational& Statistical Data  Improved Reliability  SystemWide Configurations  Multiple SystemConfigurations  Retrieving & Reusing Configurations. Automating Configuration:  IoT system management capabilities can help in automating the systemconfigurations.  System management interfaces provide predictable and easy to use management capability and the ability to automate systemconfiguration.  Automation becomes even more important when a system consists of multiple devices or nodes. Monitoring Operational andStatistical Data:  Operational data is the data which is related to the system’s operating parameters and is collected by the systemat runtime.  Statistical data is the data which describes the system performance (e.g. CPU and memory usage).  Management systems can help in monitoring operational and statistical data of a system. This data can be used for fault diagnosis or prognosis. ImprovedReliability:  A management system that allows validating the system configurations before they are put into effect can help in improving the system reliability.
  • 13. 13 SystemWide Configuration:  IoT system that consists of multiple devices or nodes, ensuring system-wideconfiguration can be critical for the correctfunctioning of the system.  Management approaches in which each device is configured separately (either through a manual or automated process) can result in system faults or undesirable outcomes. This happens when some devices are running on an old configuration while others start running on new configuration. To avoid this system wide configuration is required where all devices are configured in a single atomic transaction. Multiple SystemConfigurations:  Some systems it may be desirable to have multiple valid configurations which are applied at differenttimes or in certain conditions. Retrieving andReusing Configurations:  Management systems which have the capability of retrieving configurations from devices can help in reusing the configurations for other devices of these of the same type. 3.6 Simple Network Management Protocol (SNMP) SNMP is a well-known and widely use network management protocol that allows monitoring and configuration network devices such as routers, switches, servers, printers etc. SNMP component include • Network Management Station (NMS)  Managed Device • Management Information Base(MIB) • SNMP Agent that runs on the device
  • 14. 14 3.6.1 Limitations of SNMP SNMP is stateless in nature and each SNMP request contains all the information to process the request. The application needs to be intelligent to manage the device. • SNMP is a connectionless protocol which uses UDP as the transport protocol, making it unreliable as there was no support for acknowledgement of requests. • MIBs often lack writable objects without which device configuration is not possibleusing SNMP. • It is difficult to differentiate between configuration and state data in MIBs. • Retrieving the current configuration from a device can be difficult with SNMP. • Earlier versions of SNMP did not have strong security features. 3.7 NETWORKOPERATOR REQUIREMENTS The following points provide a brief overview of the operator requirements.  Ease of use  Distinction between configuration and state data  Fetch configuration and state data separately  Configuration of the network as a whole  Configuration transactions across devices  Configuration deltas  Dump and restore configurations  Configuration validation
  • 15. 15  Configuration database schemas  Comparing configurations  Role-based access control  Consistency of access control lists  Multiple configuration sets  Supportfor both data-oriented Ease of Use:  Ease of useis the key requirement for any network management technology. Distinctionbetweenconfigurationandstate data:  Configuration data is the set of writable data that is required to transform the systemfromits initial state to its current.  State data is the data which is not configurable. It includes operational data which is collected by the system at runtime and statistical data which describes the systemperformance. FetchConfigurationand state dataseparately:  To fetch the configuration and state data separately from the managed device help to make a clear distinction between configuration and state data. Configurationof the network as a whole:  Operator can configurethe network as a whole rather than individual device.  It is important for systems which have multiple devices and configuring them within one network wide transaction is required to ensure the correct operation of the system. Configurationtransactionacross devices:  Configuration transactions across multiple devices should be supported. Configurationdeltas:  To generate the operations necessary for going from on configuration state to another.  The devices should supportconfiguration deltas with minimal state changes. Dump and restore configurations:
  • 16. 16  To dump configurations from devices and restore configurations from devices and restoreconfigurations to devices. ConfigurationValidation:  Itshould be possibleto validate configurations. Configuration database schemas:  There is a need for standardized configuration database schemas or data models across operators. Comparing Configurations:  Devices should not arbitrarily reorder data, so that it is possible to use text processing tools such as diff to compare configurations. Role-basedaccess control:  Devices should support role-based access control model, so that a user is given the minimum access necessary to performa required task. Consistency of access control lists:  It should be possible to do consistency checks of access control lists across devices. Multiple configurations set:  There should be support for multiple configurations sets on devices. This way a distinction can be provided between candidate and active configurations. Support for both data-orientedandtask-orientedaccess control:  While SNMP access control is data-oriented, CLI access control is usually task oriented. There should be supportfor both types of access control. NETCONF  Network Configuration Protocol (NETCONF) is a session-based network management protocol. NETCONF allows retrieving state or configuration data and manipulating configuration data on network devices.
  • 17. 17 • NETCONF works on SSH transportprotocol.  Transport layer provides end-to-end connectivity and ensure reliable delivery messages.  NETCONF uses XML-encoded Remote Procedure Calls (RPCs) for framing request and responsemessages.  The RPC layer provides mechanismfor encoding of RPC calls and notifications.  NETCONF provides various operations to retrieve and edit configuration data fromnetwork devices.  The Content Layer consists of configuration and state data which is XML-encoded.  The schema of the configuration and state data is defined in a data modeling language called YANG.  NETCONF provides a clear separation of the configuration and state data.  The configuration data resides within a NETCONF configuration datastore on the server. YANG Defined
  • 18. 18 List of commonly used NETCONF RPC methods Operation Description connect Connect to a NETCONF server get Retrieve the running configuration and state information get-coding Retrieve all or a portion of a configuration datastore edit-config Loads all or part of a specified configuration to the specified target configuration copy-config Create or replace an entire target configuration datastore with a complete sourceconfiguration delete-config Delete the contents of a configuration datastore lock Lock a configuration datastorefor exclusively edits by a client unlock Release the lock on a configuration datastore get-schema This operation is used to retrieve a schema from the NETCONF server commit Commit the candidate configuration as the devices new current configuration close-session Gradually terminate a NETCONF session kill-session Forcefully terminate a NETCONF session 3.9 YANG  YANG is a data modeling language used to model configuration and state data manipulated by the NETCONF protocol. • YANG modules contain the definitions of the configuration data, state data, RPC calls that can be issued and the formatof the notifications.  YANG modules define the data exchanged between the NETCONF client and server. • A module comprises of a number of 'leaf' nodes which are organized into a hierarchical tree structure. YANG Module Example • The 'leaf' nodes are specified using the 'leaf' or 'leaf-list' constructs. • Leaf nodes are organized using 'container' or 'list' constructs. • A YANG module can importdefinitions from other modules. • Constraints can be defined on the data nodes, e.g. allowed values. • YANG can model both configuration data and state data using the 'config' statement. This YANG module is a YANG version of the toaster MIB
  • 19. 19 • The toaster YANG module begins with the header information followed by identity declarations which define various bread types. • The leaf nodes (‘toasterManufacturer’,‘toasterModelNumber’ and ‘toasterStatus’) aredefined in the toaster container. • Each leaf node definition has a type and optionally a description and default value. • The module has two RPC definitions (‘make-toast’ and ‘cancel-toast’). YANG Node Types Node Type Description Leaf Nodes Contain simple data structures such as an integer or a sting. Leaf has exactly one value of a particular type and no child nodes Leaf-List Nodes Is a sequence of leaf nodes with exactly one value of a particular type per leaf. Container Nodes Used to group related nodes in a subtree. A container has only child nodes and no value. A container may contain any number of child nodes of any type (including leafs, lists, containers and leaf-lists). List Nodes Defines a sequenceof list entries. Each entry is like a structureor a record instance, and is uniquely identified by the values of its key leafs. A list can define multiple key leaf and may contain any number of child nodes of any type. Visual Representation the Toaster YANG Module
  • 20. 20 3.10 IoT Systems Management withNETCONF –YANG NETCONF provides various operations to retrieve and edit configuration data fromnetwork devices. Look at the roles of the various components: Management System: The operator uses a Management System to send NETCONF messages to configure the IoT device and receives state information and notifications from the device as NETCONF messages. Management API: Management API allows management applications to start NETCONF sessions, read and write configuration data, read state data, retrieve configurations, and invokeRPCs, programmatically, in the sameway as an operator can. TransactionManager: Transaction Manager executes all the NETCONF transactions and ensure that the ACID (Atomicity, Consistency, Isolation, and Durability) properties hold true for the transactions.
  • 21. 21 Atomicity property ensures that a transaction is executed either completely or not at all. Consistency property ensures that a transaction brings the device configuration fromone valid state to another. Isolation property ensures that concurrent execution of transactions results in the same device configuration as if transactions wereexecuted serially in order. Durability property ensures that a transaction once committed will persist. Rollback Manager: Rollback manager is responsible for generating all the transactions necessary to rollback a current configuration to its original state. Data Model Manager: The Data Model Manager keeps track of all the YANG data models and the corresponding managed objects. The Data Model manager also keeps track of the applications which providedata for each part of a data model. ConfigurationValidator: Configuration validator checks if the resulting configuration after applying a transaction would be a valid configuration. ConfigurationDatabase: This databasecontains both the configuration and operational data. ConfigurationAPI: Using the configuration API the applications on the IoT device can read configuration data from the configuration datastore and write operational data to the operational datastore. Data Provider API: Applications on the IoT device can register for callbacks for various events using the Data Provider API. Through the Data Provider API, the applications can report statistics and operational data.
  • 22. 22 3.11 NETOPEER: Netopeer is set of open sourceNETCONF tools built on the Libnetconf library. Netopeer-server: Netopeer-server is a NETCOBNF protocol server that runs on the managed-device. Netopeer-server provides an environment for configuring the device using NETCONF RPC operations and also retrieving the state data fromthe device. Netopeer-agent: Netopeer agent is the NETCONF protocol agent running as a SSH/TLS subsystem. Netopeer-agent accepts incoming NETCONF connection and passes the NETCONF RPC operations received fromthe NETCONF client to the Netopper-server. Netopper-cli: Netopper-cli is a NETCONF client that provides a command line interface for interacting with the Netopper-server. The operator can use the Netopper-client from the management system to send NETCONF RPC operations for configuring the device retrieving the state information. Netopper-manager: Netopper-manager allows managing the YANG and Libnetconf Transaction API (TransAPI) modules on the Netopeer-server. With Netopeer-manager modules can be loaded or removed from the server. Netopeer-configurator: Netopeer-configurator is a tool that can be used to configure the Netopper- server.