SlideShare a Scribd company logo
1 of 50
Download to read offline
eAcademy.ps Internet of Things
Course: Internet of Things (IoT)
eAcademy.ps Internet of Things
Course: Internet of Things (IoT)
2
Notes:
• This course is heavily based on the Cisco Networking
Academy course: IoT Fundamentals: Connecting Things
version 2.01. It is recommended to enroll in this course
to gain full access to online materials.
• Parts of this content is copyrighted by Cisco.
• Main changes from original course:
• Removed the business canvas model
• Added a project instead of the hackathon.
eAcademy.ps Internet of Things
Session 5
Fog Networks and Cloud Computing
Course: Internet of Things (IoT)
eAcademy.ps Internet of Things
• 5.1 The Role of the Network
• 5.2 Wireless Technologies
• 5.3 Fog and Cloud Services
• 5.4 Big Data
• 5.5 Security Concerns in the IoT
• 5.6 Summary
4
Session Outline
Fog Networks and Cloud Computing
eAcademy.ps Internet of Things
5.1 The Role of the Network
5
Fog Networks and Cloud Computing
Image by Wilgengebroed on Flickr - Cropped and sign removed from Internet of things signed by the author.jpg, CC BY 2.0,
https://commons.wikimedia.org/w/index.php?curid=32745645
eAcademy.ps Internet of Things
Network Types
6
Fog Networks and Cloud Computing
The Role of the Network
• The path from source to destination can be a single cable or a
collection of networks.
• A Personal Area Network (PAN) is a type of network that usually
spans a few meters around an individual and is often used in IoT.
• A Local Area Network (LAN) is a type of network infrastructure that
spans a small geographical area and is used to connect end devices.
• A LAN is normally a high-speed network under the control of a single
administrative entity.
• LANs often connect machines in the factory plant.
• A Wide Area Network (WAN) is a type of network infrastructure
that spans a wide geographical area and is used to connect LANs.
• A WAN is normally a low-speed network and may include portions
from different Internet Service Providers (ISPs)
• WAN devices have evolved to create Low Power Wide Area
Networks (LPWAN) for use in the IoT.
eAcademy.ps Internet of Things
Network Devices
7
Fog Networks and Cloud Computing
The Role of the Network
• Network devices are devices that
connect to each other through a
network:
• Traditionally: Computers, Phones, etc.
• IoT: House-hold devices, cars, etc.
• An end device is either the source or
destination of a message transmitted
over the network.
• Intermediary devices connect the
individual end devices to the network
and can connect multiple individual
networks to form an internetwork.
• Network addresses are used to
uniquely identify devices on a network.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
Communication Media
8
Fog Networks and Cloud Computing
The Role of the Network
• Network media provide the physical channel over which
the message travels from source to destination.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
• Metallic wires within cables -
data is encoded into electrical
impulses
• Glass or plastic fibers (fiber-
optic cable) –
data is encoded as pulses of
light
• Wireless transmission - data is
encoded using radio waves
eAcademy.ps Internet of Things
Network Protocols
9
Fog Networks and Cloud Computing
The Role of the Network
• Devices must conform to common protocols before
they can communicate.
• Two very important network protocols are Ethernet
and IP.
• Ethernet rules enable communication between local
devices.
• IP enables communication between remote devices.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
Basic Routing
10
Fog Networks and Cloud Computing
The Role of the Network
• Network packets must
often transverse several
networks to get to the
destination.
• Routing is the process of
directing a network
packet to its destination.
• Routers are intermediary
network devices that
perform routing. © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
• Routers use routing protocols to exchange information
about networks and to select the best routing path.
eAcademy.ps Internet of Things
LANs, WANs and the Internet
11
Fog Networks and Cloud Computing
The Role of the Network
• Single router designs
are common in small
office or home office
(SOHO).
• The single router
connects SOHO
devices to the
Internet.
• The single router is
the default gateway
for all SOHO devices.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
IoT Devices
12
Fog Networks and Cloud Computing
The Role of the Network
• IoT Devices are often embedded devices designed to
work in sub-optimal conditions.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
IoT Protocols
13
Fog Networks and Cloud Computing
The Role of the Network
• Because of their restrictions, IoT devices require
specialized protocols to function with low power and
limited connectivity.
• Examples of specialized IoT protocols:
• CoAP (Constrained Application Protocol)
• MQTT (Message Queuing Telemetry Transport)
eAcademy.ps Internet of Things
CoAP (Constrained Application Protocol)
14
Fog Networks and Cloud Computing
The Role of the Network
• CoAP is a protocol intended for resource-constrained IoT
devices and enables them to communicate with the
Internet.
• CoAP Characteristics:
• Works on microcontrollers with as low as 10 KB of RAM and 100
KB of storage space while also providing strong security.
• Based on HTTP and the REST model where resources are
retrieved from a server using URIs/URLs.
• Clients use the well-known methods of GET, PUT, POST, and
DELETE to manipulate these resources.
• Multicast support.
• Low overhead.
• Simplicity.
eAcademy.ps Internet of Things
MQTT (Message Queuing Telemetry Transport)
15
Fog Networks and Cloud Computing
The Role of the Network
• MQTT is a lightweight protocol that is best suited for
systems that rely on low bandwidth connections and
require code with a small footprint.
• MQTT protocols uses the concept of publish-subscribe
communications among nodes:
• Requires the presence of an intermediate node called a message
broker.
• Every source of data must publish the data element on the
broker node indicating to which “topic” the data belongs.
• Nodes interested in receiving data on a specific topic must
subscribe to that topic on the broker.
• Broker will then distribute the messages to interested clients
based on the topic of a message.
• More information about MQTT can be found at
http://mqtt.org/
eAcademy.ps Internet of Things
5.2 Wireless Technologies
High BW
Medium BW
Low BW
Short Range Medium Range Long Range
802.11g
802.11a
802.11b
802.11ax (WiFi 6)
802.11ac (WiFi 5)
802.11n (WiFi 4)
2G
3G
4G
5G
VSAT
Bluetooth BLE
RFID/NFC
ZigBee/
802.15.4
WBAN
802.15.6 WPAN
802.15.3
LPWAN
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
New Wireless Technologies
17
Fog Networks and Cloud Computing
Wireless Technologies
• Wireless connectivity is the biggest growth area.
• New protocols created/updated to support diverse IoT
devices:
• ZigBee
• Bluetooth
• 4G/5G
• LoRaWAN
• Protocols created for short, medium, and wide ranges
• Low-Power Wide-Area Networks (LPWAN) are designed to
support long range communications for low bit rate
devices such as sensors, actuators, and controllers
eAcademy.ps Internet of Things
Wireless Technologies Characteristics
18
Fog Networks and Cloud Computing
Wireless Technologies
• System designers will select the wireless technology based
on the range of coverage, bandwidth requirements,
power consumption, and deployment location.
• The table compares wireless topologies based on these
criteria.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
ZigBee
19
Fog Networks and Cloud Computing
Wireless Technologies
• A low-energy, low-power, low-data rate wireless protocol
specification used to create personal area networks.
• Areas of utilization:
• home automation,
• medical device data collection,
• other low-power low-bandwidth needs.
• 250 kbps transfer rate best suited for
intermittent data transmissions.
• The ZigBee specification relies on a main device
called a ZigBee Coordinator that manages all ZigBee client devices.
• The ZigBee Coordinator, is responsible for the creation and maintenance of the ZigBee
network.
• The coordinator can talk to up to eight endpoints or routers in any combination.
• If an endpoint is too far away from the controller, a ZigBee router can be used to
bridge data between the coordinator and the endpoint.
eAcademy.ps Internet of Things
ZigBee Topologies
20
Fog Networks and Cloud Computing
Wireless Technologies
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
ZigBee Application Profile ID
21
Fog Networks and Cloud Computing
Wireless Technologies
• Every ZigBee data request uses an Application Profile Identification Number.
• Application profile ID numbers - 16-bit numbers that relate to public profiles,
manufacturing profiles, or private profiles.
• Example: home automation public application profile:
• Defines ZigBee networked devices intended for use in the home, such as wall
switches, thermostats, heaters, air conditioners, and keyless entry systems.
• This profile ensures that devices from one manufacturer will interact with
devices from another.
• Private profiles are used for applications where different vendor devices do not
need to interact.
eAcademy.ps Internet of Things
Bluetooth
23
Fog Networks and Cloud Computing
Wireless Technologies
• Wireless protocol used for data communication over short distances (PAN)
• Supported by almost all mobile devices and accessories - the defacto
standard for audio between mobile devices.
• Bluetooth Low Energy (BLE) - very popular because of the smartphone
industry and new applications in healthcare, fitness, and beacons.
• operates in the 2.4 GHz ISM band
• Has a very fast connection rate (milliseconds) and a very high data rate (1 Mbps).
• The BLE device then goes into “sleep mode” until a connection is reestablished –
lengthens the battery life for several years.
• Beacons use BLE technology - positioned on buildings, in
coffee shops, and on light posts to provide location
services.
eAcademy.ps Internet of Things
Bluetooth 5
24
Fog Networks and Cloud Computing
Wireless Technologies
• Bluetooth 5 was announced by the Bluetooth SIG in June 2016.
• Version 5 has four times the range as v4.2 (120m vs 30m)
• Version 5 is twice as fast as earlier versions.
• Version 5 has the ability to transmit audio to two devices at the same
time.
• When operating in low energy mode, Bluetooth 5
achieves an eight-fold increase in data broadcasting
capacity over Bluetooth 4.x. This is very important
for IoT devices which rely on constricted power
sources.
• Bluetooth 5 bandwidth is defined at 2 Mbps but
allows for bandwidth that can be adjusted
depending on the application.
eAcademy.ps Internet of Things
Cellular networks
25
Fog Networks and Cloud Computing
Wireless Technologies
• Cellular-based data networks designed to take advantage of
communications over large geographic areas
1980s
(1G)
1990s
(2G)
2000s
(3G)
2010s
(4G)
2020s
(5G)
eAcademy.ps Internet of Things
4G/5G
26
Fog Networks and Cloud Computing
Wireless Technologies
• High mobility bandwidth (trains and cars) of 4G system is 100 Mbps
• Low mobility (pedestrians and stationary users) of 4G systems is 1 Gbps
• 4G provides support for voice, IP telephony, mobile Internet access,
video calling, gaming services, cloud computing, high-definition mobile
TV, and mobile 3D TV.
• Long Term Evolution (LTE) and WiMAX (IEEE 802.16e) are two popular
4G systems.
• LTE 4G technology release 13e
includes the standardization of
Narrow Band IoT (NB-IoT) - an
LPWAN technology.
• Next Generation Mobile Networks
Alliance defining the standards
and requirements for 5G
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
LoRaWAN
27
Fog Networks and Cloud Computing
Wireless Technologies
• Wireless technology designed to provide wireless WAN
connections to power constricted devices.
• Targets key requirements of IoT such as secure bi-directional
communication, mobility and localization services.
• Architecture is often an extended star topology in which gateways
relay messages between end-devices and a central network server
is located in the backend.
• Data rates range from 0.3 kbps to 50 kbps
• Security is built into the LoRaWAN standard, implemented in a
multi-layer encryption scheme.
• Unique keys are used in the Application, Network,
and Device layers.
https://www.youtube.com/watch?v=2Y0bMX3TVi0
eAcademy.ps Internet of Things
Activities
• Packet Tracer - Explore the Smart Home
• Packet Tracer - Build a Connected Factory Solution
• Packet Tracer - Securing Cloud Services in the IoT
28
Fog Networks and Cloud Computing
eAcademy.ps Internet of Things
Packet Tracer - Explore the Smart Home
29
Fog Networks and Cloud Computing
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
Packet Tracer - Build a Connected Factory Solution
30
Fog Networks and Cloud Computing
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
Packet Tracer - Securing Cloud Services in the IoT
31
Fog Networks and Cloud Computing
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
5.3 Fog and Cloud Services
32
Fog Networks and Cloud Computing
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
Cloud Computing Model
33
Fog Networks and Cloud Computing
Fog and Cloud Services
• On-demand access to a shared pool of configurable computing
resources.
• Resources can be made available quickly with minimal
management effort.
• Cloud service providers use data centers for their cloud services
and cloud-based resources.
• “Pay-as-you-go” model treats computing and storage expenses as
a utility.
• Enables access to organizational data and applications anywhere
and at any time.
• Reduces cost for equipment, energy, physical plant requirements,
and personnel training needs.
eAcademy.ps Internet of Things
Cloud Service Models
34
Fog Networks and Cloud Computing
Fog and Cloud Services
• Infrastructure as a Service (IaaS)
• Hardware including servers and other infrastructure
components are supplied by a provider and adjusted on-
demand. The provider handles system maintenance, backups
and continuity planning.
• Platform as a Service (PaaS)
• A provider provides the platform, servers, storage, and OSs
for users to develop and launch applications.
• Mobile PaaS (mPaaS)
• Providers supply development capabilities for mobile
application designers and developers.
• Software as a Service (SaaS)
• Software, such as messaging, IoT data processing, payroll
processing, gaming, and tax preparation is licensed on a
subscription basis and hosted on cloud servers.
eAcademy.ps Internet of Things
Cloud Services
35
Fog Networks and Cloud Computing
Fog and Cloud Services
• Cloud customers have access to a shared pool of
configurable computing resources that can be rapidly
provisioned and released with minimal management
effort.
• Extends functionality of an IoT system: data processing
and storage done in the cloud instead of in the IoT
devices.
• Data and resources - always
available to any device in the
system as long as the device
has Internet connectivity.
• Cloud service providers are
also very serious about
security, ensuring customer
data is kept safe and secure.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
Cloud Services Examples
36
Fog Networks and Cloud Computing
Fog and Cloud Services
• Amazon AWS
• a cloud service that provides cloud-hosted, on-demand
computing as a service.
• IFTTT
• Short for 'If This Then That', IFTTT allows for special resource
URLs to be created and mapped to specific IFTTT actions.
• Zapier
• Similar to IFTTT, Zapier also allows for cloud-based automation.
• Built.io
• Similar to IFTTT and Zapier but offers advanced functionality.
• Webex Teams
• Collaboration suite for teams to create, meet, message, call,
whiteboard, and share, regardless of whether they’re together
or apart - in one continuous workstream before, during, and
after meetings.
eAcademy.ps Internet of Things
Cloud Services Limitations
37
Fog Networks and Cloud Computing
Fog and Cloud Services
• Network Dependency: You need to always have Internet
access to be able to benefit from cloud services.
• Latency: Data has to travel to remote servers before
being able to act upon it.
• Loss of Control: A third party is controlling your data.
• Solving Technical Issues: If technical issues arise you
have to relay on the service provider to solve them.
• Limited Flexibility: You are limited to the features that
are provided by the service provider.
• Security: There have been several incidents of security
issues involving various cloud services.
eAcademy.ps Internet of Things
Fog Computing Model
38
Fog Networks and Cloud Computing
Fog and Cloud Services
• Distributed computing infrastructure closer to the network edge.
• Edge devices run applications locally and make immediate
decisions.
• Reduces the data burden on networks as raw data not sent over
network connections.
• Enhances security - keeping sensitive data from being
transported beyond the edge
where it is needed.
• Fog applications monitor or
analyze real-time data from
network-connected things and
then take action such as
locking a door, changing
equipment settings, applying
the brakes on a train, zooming
in with a video camera.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
5.4 Big Data
39
Fog Networks and Cloud Computing
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
Data in Motion and Data at Rest
40
Fog Networks and Cloud Computing
Big Data
• Data in motion is a term used to refer to the process of
extracting value from data while it is being generated.
• This data may or may not eventually be stored.
• It is possible to think of data in motion as telling a story
as it happens.
• Data at rest is data that has been stored.
• https://www.youtube.com/watch?v=3C02F-YRsgY
eAcademy.ps Internet of Things
Data Growth
41
Fog Networks and Cloud Computing
Big Data
• Number of sensors and other IoT end devices growing
exponentially and collecting a constant stream of data.
• Consumer behavior is changing; requires anytime,
anywhere, on-demand access. E.g. fitness monitors,
smartphones, medical devices.
• Smart cities and smart
grids, connected trains,
cars – growing in frequency.
• Problems arise in terms
of the requirements for
storage, analysis, and
security.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
It is all about the Data
42
Fog Networks and Cloud Computing
Big Data
• Big data is data that is so vast and complex it is difficult
to store, process, and analyze using traditional data
storage and analytics applications.
• Typically characterized in three dimensions: volume,
velocity, and variety
• Volume - the amount of data being transported and stored.
• Velocity - the rate at which this data is generated.
• Variety - the type of data, which is rarely in a state that is
perfectly ready for processing and analysis.
• Apache Hadoop, Webex Teams, Cassandra, and Kafka –
examples of open source projects dealing with Big Data.
eAcademy.ps Internet of Things
5.5 Security Concerns in the IoT
43
Fog Networks and Cloud Computing
© 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
Securing the IoT Network
44
Fog Networks and Cloud Computing
The Role of the Network
• IoT devices are integrated
into all aspects of daily life.
• IoT applications carry
traceable signatures and
carry confidential data.
• IoT devices must adhere to
a secure framework
(Authentication,
Authorization, Network
Enforced Policy, Secure
Analytics). © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
eAcademy.ps Internet of Things
Securing the Wireless Network
45
Fog Networks and Cloud Computing
Wireless Technologies
• Wireless networks have no clear boundaries.
• Securing wireless communications requires strong encryption,
authentication, and secure protocols.
• Several security protocols exist:
• Wired Equivalent Privacy (WEP)
• Wi-Fi Protected Access (WPA)
• Wi-Fi Protected Access II (WPA2):
• WPA2 uses AES encryption and is more secure than the other protocols.
A pass phrase larger than 21 chars should be used.
• It is recommended that security in the form of data authentication
and encryption is implemented as part of the application using
technologies such as VPNs and TLS/SSL.
• Video highlighting the vulnerability of using an insecure wireless
hotspot in a coffee shop:
https://www.youtube.com/watch?v=mW1LCmASQEQ
eAcademy.ps Internet of Things
Data Storage
46
Fog Networks and Cloud Computing
Security Concerns in the IoT
• IoT devices may store data for a period of time before
sending it out for processing – especially for devices that do
not maintain constant connections to their gateways or
controllers.
• Critical that all IoT storage devices encrypt data for storage
to avoid data tampering or theft.
• Self-encrypting drives have encryption capability built into
the drive controller – encryption and decryption done by
the drive itself, independent of the operating system.
• Self-encrypting flash memory – manufacturers beginning to
release new devices with self-encrypting flash memory.
eAcademy.ps Internet of Things
Data Transmission
47
Fog Networks and Cloud Computing
Security Concerns in the IoT
• If data is not properly secured through encryption, it can be
intercepted, captured or manipulated while in transit.
• Modern encryption algorithms may require more
processing power than what is available in the IoT device.
• As well as physical security, IoT devices must be able to
protect its own firmware and the data it transmits.
• Ensure that IoT devices are running the latest version of
their firmware and protocols.
• Common attack: trick devices into using sub-optimal
security parameters under which the connection can be
exploited.
• Servers, cloud endpoints, intermediary devices should also
be secured and use strong encryption algorithms before
communicating with IoT devices.
eAcademy.ps Internet of Things
5.6 Summary
• Personal information related to health, location, wealth, personal
preferences and behaviors is passing through the IoT devices in increasing
volumes. This increase in volume elevates the relevance of increasing the
attention on data privacy and data protection.
• New wireless technologies and protocols, such as ZigBee, Bluetooth,
4G/5G, and LoRaWAN, have been developed to accommodate the
diversity of IoT devices. Wireless technology is selected based on the
range of coverage, bandwidth requirements, power consumption, and
deployment location.
• Wireless security considerations include: selecting a secure protocol,
protection for management frames, identification of frequency jamming,
detecting rogue access points, and using security at the application layer.
• Cloud computing is a service that offers off-premise, on-demand access
to a shared pool of configurable computing resources. Cloud computing
offers services such as IaaS, PaaS, mPaaS and SaaS.
48
Software is Everywhere
eAcademy.ps Internet of Things
5.6 Summary (Cont.)
• A fog computing model identifies a distributed computing
infrastructure closer to the network edge. It enables edge devices to
run applications locally and make immediate decisions.
• The proliferation of devices in the IoT is one of the primary reasons for
the exponential growth in data generation. Data can be deemed at rest
or in motion. Big Data is typically characterized in three dimensions:
volume, velocity, and variety.
• Data stored in servers must be encrypted to avoid data tampering or
theft. Regular backups are mandatory to minimize losses in case of a
disaster
• IoT devices should run the latest version of firmware and protocols and
any communication between devices should be done using protocols
that provide secure encryption by default.
49
Software is Everywhere
eAcademy.ps Internet of Things
References
1. Cisco Networking Academy course: IoT Fundamentals:
Connecting Things version 2.01, Chapter 4.
2. http://mqtt.org/
50
Software is Everywhere
eAcademy.ps Internet of Things
Thank you
51
Software is Everywhere

More Related Content

What's hot

Scania: A DevOps Journey in an Automotive Enterprise  
Scania: A DevOps Journey in an Automotive Enterprise  Scania: A DevOps Journey in an Automotive Enterprise  
Scania: A DevOps Journey in an Automotive Enterprise  Perforce
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...Edge AI and Vision Alliance
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1Irsandi Hasan
 
FIWARE: an open standard platform for smart cities
FIWARE: an open standard platform for smart citiesFIWARE: an open standard platform for smart cities
FIWARE: an open standard platform for smart citiesJuanjo Hierro
 
Overview of IntelePeer and Cloud Communications
Overview of IntelePeer and Cloud CommunicationsOverview of IntelePeer and Cloud Communications
Overview of IntelePeer and Cloud CommunicationsIntelePeer
 
Operating electrical devices with PIR sensor. No coding, No controller
Operating electrical devices with PIR sensor. No coding, No controllerOperating electrical devices with PIR sensor. No coding, No controller
Operating electrical devices with PIR sensor. No coding, No controllerSantosh Kumar Kar
 
Accelerating the AIoT @ the EDGE
Accelerating the AIoT @ the EDGE Accelerating the AIoT @ the EDGE
Accelerating the AIoT @ the EDGE Amazon Web Services
 
ChatGPT, Foundation Models and Web3.pptx
ChatGPT, Foundation Models and Web3.pptxChatGPT, Foundation Models and Web3.pptx
ChatGPT, Foundation Models and Web3.pptxJesus Rodriguez
 
2014 ETERNITY Level 1 Module
2014 ETERNITY Level 1 Module2014 ETERNITY Level 1 Module
2014 ETERNITY Level 1 ModuleMatrixcomsec Ttg
 
Presentation dahua 2019.04.29
Presentation dahua 2019.04.29Presentation dahua 2019.04.29
Presentation dahua 2019.04.29Ghomsi Adrien
 
16 camera cctv quotation bangladesh
16 camera cctv quotation bangladesh16 camera cctv quotation bangladesh
16 camera cctv quotation bangladeshJamField Solution
 
Ip Cameras
Ip CamerasIp Cameras
Ip CamerasirisZH21
 
Using Generative AI in the Classroom .pptx
Using Generative AI in the Classroom .pptxUsing Generative AI in the Classroom .pptx
Using Generative AI in the Classroom .pptxJonathanDietz3
 
Introduction to 6G, prepare now training
Introduction to 6G, prepare now trainingIntroduction to 6G, prepare now training
Introduction to 6G, prepare now trainingTonex
 

What's hot (20)

شهادة الأمن
شهادة الأمنشهادة الأمن
شهادة الأمن
 
802.11ac
802.11ac802.11ac
802.11ac
 
LPWA network
LPWA networkLPWA network
LPWA network
 
Scania: A DevOps Journey in an Automotive Enterprise  
Scania: A DevOps Journey in an Automotive Enterprise  Scania: A DevOps Journey in an Automotive Enterprise  
Scania: A DevOps Journey in an Automotive Enterprise  
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1
 
FIWARE: an open standard platform for smart cities
FIWARE: an open standard platform for smart citiesFIWARE: an open standard platform for smart cities
FIWARE: an open standard platform for smart cities
 
5 G Wireless Technology
5 G Wireless Technology5 G Wireless Technology
5 G Wireless Technology
 
Overview of IntelePeer and Cloud Communications
Overview of IntelePeer and Cloud CommunicationsOverview of IntelePeer and Cloud Communications
Overview of IntelePeer and Cloud Communications
 
Internet of things cisco
Internet of things   ciscoInternet of things   cisco
Internet of things cisco
 
Operating electrical devices with PIR sensor. No coding, No controller
Operating electrical devices with PIR sensor. No coding, No controllerOperating electrical devices with PIR sensor. No coding, No controller
Operating electrical devices with PIR sensor. No coding, No controller
 
Accelerating the AIoT @ the EDGE
Accelerating the AIoT @ the EDGE Accelerating the AIoT @ the EDGE
Accelerating the AIoT @ the EDGE
 
ChatGPT, Foundation Models and Web3.pptx
ChatGPT, Foundation Models and Web3.pptxChatGPT, Foundation Models and Web3.pptx
ChatGPT, Foundation Models and Web3.pptx
 
2014 ETERNITY Level 1 Module
2014 ETERNITY Level 1 Module2014 ETERNITY Level 1 Module
2014 ETERNITY Level 1 Module
 
Presentation dahua 2019.04.29
Presentation dahua 2019.04.29Presentation dahua 2019.04.29
Presentation dahua 2019.04.29
 
16 camera cctv quotation bangladesh
16 camera cctv quotation bangladesh16 camera cctv quotation bangladesh
16 camera cctv quotation bangladesh
 
Ip Cameras
Ip CamerasIp Cameras
Ip Cameras
 
PROFINET - applying the Ethernet standard to industral automation - Peter Th...
PROFINET  - applying the Ethernet standard to industral automation - Peter Th...PROFINET  - applying the Ethernet standard to industral automation - Peter Th...
PROFINET - applying the Ethernet standard to industral automation - Peter Th...
 
Using Generative AI in the Classroom .pptx
Using Generative AI in the Classroom .pptxUsing Generative AI in the Classroom .pptx
Using Generative AI in the Classroom .pptx
 
Introduction to 6G, prepare now training
Introduction to 6G, prepare now trainingIntroduction to 6G, prepare now training
Introduction to 6G, prepare now training
 

Similar to ch5-Fog Networks and Cloud Computing

Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxssuser52b751
 
Communication Technologies in IOT.pptx
Communication Technologies in IOT.pptxCommunication Technologies in IOT.pptx
Communication Technologies in IOT.pptx20CE112YASHPATEL
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6Irsandi Hasan
 
communication_technologies_Internet of things topic
communication_technologies_Internet of things topiccommunication_technologies_Internet of things topic
communication_technologies_Internet of things topicDurgaDeviP2
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxDRREC
 
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Duncan Purves
 
Introduction to Internet of Things.pdf
Introduction to Internet of Things.pdfIntroduction to Internet of Things.pdf
Introduction to Internet of Things.pdfGVNSK Sravya
 
Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux – Unified IoT Pl...
Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux –  Unified IoT Pl...Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux –  Unified IoT Pl...
Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux – Unified IoT Pl...mCloud
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptxssuserf7cd2b
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersITExamAnswers.net
 
ch2-What are Connections?
ch2-What are Connections?ch2-What are Connections?
ch2-What are Connections?ssuser06ea42
 

Similar to ch5-Fog Networks and Cloud Computing (20)

Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
Communication Technologies in IOT.pptx
Communication Technologies in IOT.pptxCommunication Technologies in IOT.pptx
Communication Technologies in IOT.pptx
 
module 3.pptx
module 3.pptxmodule 3.pptx
module 3.pptx
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
 
communication_technologies_Internet of things topic
communication_technologies_Internet of things topiccommunication_technologies_Internet of things topic
communication_technologies_Internet of things topic
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
 
Ens
EnsEns
Ens
 
1.pptx
1.pptx1.pptx
1.pptx
 
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
 
Introduction to Internet of Things.pdf
Introduction to Internet of Things.pdfIntroduction to Internet of Things.pdf
Introduction to Internet of Things.pdf
 
IoT _protocols.ppt
IoT _protocols.pptIoT _protocols.ppt
IoT _protocols.ppt
 
Sgcp14phillips
Sgcp14phillipsSgcp14phillips
Sgcp14phillips
 
Unit 4
Unit 4Unit 4
Unit 4
 
Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux – Unified IoT Pl...
Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux –  Unified IoT Pl...Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux –  Unified IoT Pl...
Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux – Unified IoT Pl...
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
 
ch2-What are Connections?
ch2-What are Connections?ch2-What are Connections?
ch2-What are Connections?
 
intro to iot.pdf
intro to iot.pdfintro to iot.pdf
intro to iot.pdf
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

ch5-Fog Networks and Cloud Computing

  • 1. eAcademy.ps Internet of Things Course: Internet of Things (IoT)
  • 2. eAcademy.ps Internet of Things Course: Internet of Things (IoT) 2 Notes: • This course is heavily based on the Cisco Networking Academy course: IoT Fundamentals: Connecting Things version 2.01. It is recommended to enroll in this course to gain full access to online materials. • Parts of this content is copyrighted by Cisco. • Main changes from original course: • Removed the business canvas model • Added a project instead of the hackathon.
  • 3. eAcademy.ps Internet of Things Session 5 Fog Networks and Cloud Computing Course: Internet of Things (IoT)
  • 4. eAcademy.ps Internet of Things • 5.1 The Role of the Network • 5.2 Wireless Technologies • 5.3 Fog and Cloud Services • 5.4 Big Data • 5.5 Security Concerns in the IoT • 5.6 Summary 4 Session Outline Fog Networks and Cloud Computing
  • 5. eAcademy.ps Internet of Things 5.1 The Role of the Network 5 Fog Networks and Cloud Computing Image by Wilgengebroed on Flickr - Cropped and sign removed from Internet of things signed by the author.jpg, CC BY 2.0, https://commons.wikimedia.org/w/index.php?curid=32745645
  • 6. eAcademy.ps Internet of Things Network Types 6 Fog Networks and Cloud Computing The Role of the Network • The path from source to destination can be a single cable or a collection of networks. • A Personal Area Network (PAN) is a type of network that usually spans a few meters around an individual and is often used in IoT. • A Local Area Network (LAN) is a type of network infrastructure that spans a small geographical area and is used to connect end devices. • A LAN is normally a high-speed network under the control of a single administrative entity. • LANs often connect machines in the factory plant. • A Wide Area Network (WAN) is a type of network infrastructure that spans a wide geographical area and is used to connect LANs. • A WAN is normally a low-speed network and may include portions from different Internet Service Providers (ISPs) • WAN devices have evolved to create Low Power Wide Area Networks (LPWAN) for use in the IoT.
  • 7. eAcademy.ps Internet of Things Network Devices 7 Fog Networks and Cloud Computing The Role of the Network • Network devices are devices that connect to each other through a network: • Traditionally: Computers, Phones, etc. • IoT: House-hold devices, cars, etc. • An end device is either the source or destination of a message transmitted over the network. • Intermediary devices connect the individual end devices to the network and can connect multiple individual networks to form an internetwork. • Network addresses are used to uniquely identify devices on a network. © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 8. eAcademy.ps Internet of Things Communication Media 8 Fog Networks and Cloud Computing The Role of the Network • Network media provide the physical channel over which the message travels from source to destination. © 2007 – 2010, Cisco Systems, Inc. All rights reserved. • Metallic wires within cables - data is encoded into electrical impulses • Glass or plastic fibers (fiber- optic cable) – data is encoded as pulses of light • Wireless transmission - data is encoded using radio waves
  • 9. eAcademy.ps Internet of Things Network Protocols 9 Fog Networks and Cloud Computing The Role of the Network • Devices must conform to common protocols before they can communicate. • Two very important network protocols are Ethernet and IP. • Ethernet rules enable communication between local devices. • IP enables communication between remote devices. © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 10. eAcademy.ps Internet of Things Basic Routing 10 Fog Networks and Cloud Computing The Role of the Network • Network packets must often transverse several networks to get to the destination. • Routing is the process of directing a network packet to its destination. • Routers are intermediary network devices that perform routing. © 2007 – 2010, Cisco Systems, Inc. All rights reserved. • Routers use routing protocols to exchange information about networks and to select the best routing path.
  • 11. eAcademy.ps Internet of Things LANs, WANs and the Internet 11 Fog Networks and Cloud Computing The Role of the Network • Single router designs are common in small office or home office (SOHO). • The single router connects SOHO devices to the Internet. • The single router is the default gateway for all SOHO devices. © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 12. eAcademy.ps Internet of Things IoT Devices 12 Fog Networks and Cloud Computing The Role of the Network • IoT Devices are often embedded devices designed to work in sub-optimal conditions. © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 13. eAcademy.ps Internet of Things IoT Protocols 13 Fog Networks and Cloud Computing The Role of the Network • Because of their restrictions, IoT devices require specialized protocols to function with low power and limited connectivity. • Examples of specialized IoT protocols: • CoAP (Constrained Application Protocol) • MQTT (Message Queuing Telemetry Transport)
  • 14. eAcademy.ps Internet of Things CoAP (Constrained Application Protocol) 14 Fog Networks and Cloud Computing The Role of the Network • CoAP is a protocol intended for resource-constrained IoT devices and enables them to communicate with the Internet. • CoAP Characteristics: • Works on microcontrollers with as low as 10 KB of RAM and 100 KB of storage space while also providing strong security. • Based on HTTP and the REST model where resources are retrieved from a server using URIs/URLs. • Clients use the well-known methods of GET, PUT, POST, and DELETE to manipulate these resources. • Multicast support. • Low overhead. • Simplicity.
  • 15. eAcademy.ps Internet of Things MQTT (Message Queuing Telemetry Transport) 15 Fog Networks and Cloud Computing The Role of the Network • MQTT is a lightweight protocol that is best suited for systems that rely on low bandwidth connections and require code with a small footprint. • MQTT protocols uses the concept of publish-subscribe communications among nodes: • Requires the presence of an intermediate node called a message broker. • Every source of data must publish the data element on the broker node indicating to which “topic” the data belongs. • Nodes interested in receiving data on a specific topic must subscribe to that topic on the broker. • Broker will then distribute the messages to interested clients based on the topic of a message. • More information about MQTT can be found at http://mqtt.org/
  • 16. eAcademy.ps Internet of Things 5.2 Wireless Technologies High BW Medium BW Low BW Short Range Medium Range Long Range 802.11g 802.11a 802.11b 802.11ax (WiFi 6) 802.11ac (WiFi 5) 802.11n (WiFi 4) 2G 3G 4G 5G VSAT Bluetooth BLE RFID/NFC ZigBee/ 802.15.4 WBAN 802.15.6 WPAN 802.15.3 LPWAN © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 17. eAcademy.ps Internet of Things New Wireless Technologies 17 Fog Networks and Cloud Computing Wireless Technologies • Wireless connectivity is the biggest growth area. • New protocols created/updated to support diverse IoT devices: • ZigBee • Bluetooth • 4G/5G • LoRaWAN • Protocols created for short, medium, and wide ranges • Low-Power Wide-Area Networks (LPWAN) are designed to support long range communications for low bit rate devices such as sensors, actuators, and controllers
  • 18. eAcademy.ps Internet of Things Wireless Technologies Characteristics 18 Fog Networks and Cloud Computing Wireless Technologies • System designers will select the wireless technology based on the range of coverage, bandwidth requirements, power consumption, and deployment location. • The table compares wireless topologies based on these criteria. © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 19. eAcademy.ps Internet of Things ZigBee 19 Fog Networks and Cloud Computing Wireless Technologies • A low-energy, low-power, low-data rate wireless protocol specification used to create personal area networks. • Areas of utilization: • home automation, • medical device data collection, • other low-power low-bandwidth needs. • 250 kbps transfer rate best suited for intermittent data transmissions. • The ZigBee specification relies on a main device called a ZigBee Coordinator that manages all ZigBee client devices. • The ZigBee Coordinator, is responsible for the creation and maintenance of the ZigBee network. • The coordinator can talk to up to eight endpoints or routers in any combination. • If an endpoint is too far away from the controller, a ZigBee router can be used to bridge data between the coordinator and the endpoint.
  • 20. eAcademy.ps Internet of Things ZigBee Topologies 20 Fog Networks and Cloud Computing Wireless Technologies © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 21. eAcademy.ps Internet of Things ZigBee Application Profile ID 21 Fog Networks and Cloud Computing Wireless Technologies • Every ZigBee data request uses an Application Profile Identification Number. • Application profile ID numbers - 16-bit numbers that relate to public profiles, manufacturing profiles, or private profiles. • Example: home automation public application profile: • Defines ZigBee networked devices intended for use in the home, such as wall switches, thermostats, heaters, air conditioners, and keyless entry systems. • This profile ensures that devices from one manufacturer will interact with devices from another. • Private profiles are used for applications where different vendor devices do not need to interact.
  • 22. eAcademy.ps Internet of Things Bluetooth 23 Fog Networks and Cloud Computing Wireless Technologies • Wireless protocol used for data communication over short distances (PAN) • Supported by almost all mobile devices and accessories - the defacto standard for audio between mobile devices. • Bluetooth Low Energy (BLE) - very popular because of the smartphone industry and new applications in healthcare, fitness, and beacons. • operates in the 2.4 GHz ISM band • Has a very fast connection rate (milliseconds) and a very high data rate (1 Mbps). • The BLE device then goes into “sleep mode” until a connection is reestablished – lengthens the battery life for several years. • Beacons use BLE technology - positioned on buildings, in coffee shops, and on light posts to provide location services.
  • 23. eAcademy.ps Internet of Things Bluetooth 5 24 Fog Networks and Cloud Computing Wireless Technologies • Bluetooth 5 was announced by the Bluetooth SIG in June 2016. • Version 5 has four times the range as v4.2 (120m vs 30m) • Version 5 is twice as fast as earlier versions. • Version 5 has the ability to transmit audio to two devices at the same time. • When operating in low energy mode, Bluetooth 5 achieves an eight-fold increase in data broadcasting capacity over Bluetooth 4.x. This is very important for IoT devices which rely on constricted power sources. • Bluetooth 5 bandwidth is defined at 2 Mbps but allows for bandwidth that can be adjusted depending on the application.
  • 24. eAcademy.ps Internet of Things Cellular networks 25 Fog Networks and Cloud Computing Wireless Technologies • Cellular-based data networks designed to take advantage of communications over large geographic areas 1980s (1G) 1990s (2G) 2000s (3G) 2010s (4G) 2020s (5G)
  • 25. eAcademy.ps Internet of Things 4G/5G 26 Fog Networks and Cloud Computing Wireless Technologies • High mobility bandwidth (trains and cars) of 4G system is 100 Mbps • Low mobility (pedestrians and stationary users) of 4G systems is 1 Gbps • 4G provides support for voice, IP telephony, mobile Internet access, video calling, gaming services, cloud computing, high-definition mobile TV, and mobile 3D TV. • Long Term Evolution (LTE) and WiMAX (IEEE 802.16e) are two popular 4G systems. • LTE 4G technology release 13e includes the standardization of Narrow Band IoT (NB-IoT) - an LPWAN technology. • Next Generation Mobile Networks Alliance defining the standards and requirements for 5G © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 26. eAcademy.ps Internet of Things LoRaWAN 27 Fog Networks and Cloud Computing Wireless Technologies • Wireless technology designed to provide wireless WAN connections to power constricted devices. • Targets key requirements of IoT such as secure bi-directional communication, mobility and localization services. • Architecture is often an extended star topology in which gateways relay messages between end-devices and a central network server is located in the backend. • Data rates range from 0.3 kbps to 50 kbps • Security is built into the LoRaWAN standard, implemented in a multi-layer encryption scheme. • Unique keys are used in the Application, Network, and Device layers. https://www.youtube.com/watch?v=2Y0bMX3TVi0
  • 27. eAcademy.ps Internet of Things Activities • Packet Tracer - Explore the Smart Home • Packet Tracer - Build a Connected Factory Solution • Packet Tracer - Securing Cloud Services in the IoT 28 Fog Networks and Cloud Computing
  • 28. eAcademy.ps Internet of Things Packet Tracer - Explore the Smart Home 29 Fog Networks and Cloud Computing © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 29. eAcademy.ps Internet of Things Packet Tracer - Build a Connected Factory Solution 30 Fog Networks and Cloud Computing © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 30. eAcademy.ps Internet of Things Packet Tracer - Securing Cloud Services in the IoT 31 Fog Networks and Cloud Computing © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 31. eAcademy.ps Internet of Things 5.3 Fog and Cloud Services 32 Fog Networks and Cloud Computing © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 32. eAcademy.ps Internet of Things Cloud Computing Model 33 Fog Networks and Cloud Computing Fog and Cloud Services • On-demand access to a shared pool of configurable computing resources. • Resources can be made available quickly with minimal management effort. • Cloud service providers use data centers for their cloud services and cloud-based resources. • “Pay-as-you-go” model treats computing and storage expenses as a utility. • Enables access to organizational data and applications anywhere and at any time. • Reduces cost for equipment, energy, physical plant requirements, and personnel training needs.
  • 33. eAcademy.ps Internet of Things Cloud Service Models 34 Fog Networks and Cloud Computing Fog and Cloud Services • Infrastructure as a Service (IaaS) • Hardware including servers and other infrastructure components are supplied by a provider and adjusted on- demand. The provider handles system maintenance, backups and continuity planning. • Platform as a Service (PaaS) • A provider provides the platform, servers, storage, and OSs for users to develop and launch applications. • Mobile PaaS (mPaaS) • Providers supply development capabilities for mobile application designers and developers. • Software as a Service (SaaS) • Software, such as messaging, IoT data processing, payroll processing, gaming, and tax preparation is licensed on a subscription basis and hosted on cloud servers.
  • 34. eAcademy.ps Internet of Things Cloud Services 35 Fog Networks and Cloud Computing Fog and Cloud Services • Cloud customers have access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. • Extends functionality of an IoT system: data processing and storage done in the cloud instead of in the IoT devices. • Data and resources - always available to any device in the system as long as the device has Internet connectivity. • Cloud service providers are also very serious about security, ensuring customer data is kept safe and secure. © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 35. eAcademy.ps Internet of Things Cloud Services Examples 36 Fog Networks and Cloud Computing Fog and Cloud Services • Amazon AWS • a cloud service that provides cloud-hosted, on-demand computing as a service. • IFTTT • Short for 'If This Then That', IFTTT allows for special resource URLs to be created and mapped to specific IFTTT actions. • Zapier • Similar to IFTTT, Zapier also allows for cloud-based automation. • Built.io • Similar to IFTTT and Zapier but offers advanced functionality. • Webex Teams • Collaboration suite for teams to create, meet, message, call, whiteboard, and share, regardless of whether they’re together or apart - in one continuous workstream before, during, and after meetings.
  • 36. eAcademy.ps Internet of Things Cloud Services Limitations 37 Fog Networks and Cloud Computing Fog and Cloud Services • Network Dependency: You need to always have Internet access to be able to benefit from cloud services. • Latency: Data has to travel to remote servers before being able to act upon it. • Loss of Control: A third party is controlling your data. • Solving Technical Issues: If technical issues arise you have to relay on the service provider to solve them. • Limited Flexibility: You are limited to the features that are provided by the service provider. • Security: There have been several incidents of security issues involving various cloud services.
  • 37. eAcademy.ps Internet of Things Fog Computing Model 38 Fog Networks and Cloud Computing Fog and Cloud Services • Distributed computing infrastructure closer to the network edge. • Edge devices run applications locally and make immediate decisions. • Reduces the data burden on networks as raw data not sent over network connections. • Enhances security - keeping sensitive data from being transported beyond the edge where it is needed. • Fog applications monitor or analyze real-time data from network-connected things and then take action such as locking a door, changing equipment settings, applying the brakes on a train, zooming in with a video camera. © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 38. eAcademy.ps Internet of Things 5.4 Big Data 39 Fog Networks and Cloud Computing © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 39. eAcademy.ps Internet of Things Data in Motion and Data at Rest 40 Fog Networks and Cloud Computing Big Data • Data in motion is a term used to refer to the process of extracting value from data while it is being generated. • This data may or may not eventually be stored. • It is possible to think of data in motion as telling a story as it happens. • Data at rest is data that has been stored. • https://www.youtube.com/watch?v=3C02F-YRsgY
  • 40. eAcademy.ps Internet of Things Data Growth 41 Fog Networks and Cloud Computing Big Data • Number of sensors and other IoT end devices growing exponentially and collecting a constant stream of data. • Consumer behavior is changing; requires anytime, anywhere, on-demand access. E.g. fitness monitors, smartphones, medical devices. • Smart cities and smart grids, connected trains, cars – growing in frequency. • Problems arise in terms of the requirements for storage, analysis, and security. © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 41. eAcademy.ps Internet of Things It is all about the Data 42 Fog Networks and Cloud Computing Big Data • Big data is data that is so vast and complex it is difficult to store, process, and analyze using traditional data storage and analytics applications. • Typically characterized in three dimensions: volume, velocity, and variety • Volume - the amount of data being transported and stored. • Velocity - the rate at which this data is generated. • Variety - the type of data, which is rarely in a state that is perfectly ready for processing and analysis. • Apache Hadoop, Webex Teams, Cassandra, and Kafka – examples of open source projects dealing with Big Data.
  • 42. eAcademy.ps Internet of Things 5.5 Security Concerns in the IoT 43 Fog Networks and Cloud Computing © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 43. eAcademy.ps Internet of Things Securing the IoT Network 44 Fog Networks and Cloud Computing The Role of the Network • IoT devices are integrated into all aspects of daily life. • IoT applications carry traceable signatures and carry confidential data. • IoT devices must adhere to a secure framework (Authentication, Authorization, Network Enforced Policy, Secure Analytics). © 2007 – 2010, Cisco Systems, Inc. All rights reserved.
  • 44. eAcademy.ps Internet of Things Securing the Wireless Network 45 Fog Networks and Cloud Computing Wireless Technologies • Wireless networks have no clear boundaries. • Securing wireless communications requires strong encryption, authentication, and secure protocols. • Several security protocols exist: • Wired Equivalent Privacy (WEP) • Wi-Fi Protected Access (WPA) • Wi-Fi Protected Access II (WPA2): • WPA2 uses AES encryption and is more secure than the other protocols. A pass phrase larger than 21 chars should be used. • It is recommended that security in the form of data authentication and encryption is implemented as part of the application using technologies such as VPNs and TLS/SSL. • Video highlighting the vulnerability of using an insecure wireless hotspot in a coffee shop: https://www.youtube.com/watch?v=mW1LCmASQEQ
  • 45. eAcademy.ps Internet of Things Data Storage 46 Fog Networks and Cloud Computing Security Concerns in the IoT • IoT devices may store data for a period of time before sending it out for processing – especially for devices that do not maintain constant connections to their gateways or controllers. • Critical that all IoT storage devices encrypt data for storage to avoid data tampering or theft. • Self-encrypting drives have encryption capability built into the drive controller – encryption and decryption done by the drive itself, independent of the operating system. • Self-encrypting flash memory – manufacturers beginning to release new devices with self-encrypting flash memory.
  • 46. eAcademy.ps Internet of Things Data Transmission 47 Fog Networks and Cloud Computing Security Concerns in the IoT • If data is not properly secured through encryption, it can be intercepted, captured or manipulated while in transit. • Modern encryption algorithms may require more processing power than what is available in the IoT device. • As well as physical security, IoT devices must be able to protect its own firmware and the data it transmits. • Ensure that IoT devices are running the latest version of their firmware and protocols. • Common attack: trick devices into using sub-optimal security parameters under which the connection can be exploited. • Servers, cloud endpoints, intermediary devices should also be secured and use strong encryption algorithms before communicating with IoT devices.
  • 47. eAcademy.ps Internet of Things 5.6 Summary • Personal information related to health, location, wealth, personal preferences and behaviors is passing through the IoT devices in increasing volumes. This increase in volume elevates the relevance of increasing the attention on data privacy and data protection. • New wireless technologies and protocols, such as ZigBee, Bluetooth, 4G/5G, and LoRaWAN, have been developed to accommodate the diversity of IoT devices. Wireless technology is selected based on the range of coverage, bandwidth requirements, power consumption, and deployment location. • Wireless security considerations include: selecting a secure protocol, protection for management frames, identification of frequency jamming, detecting rogue access points, and using security at the application layer. • Cloud computing is a service that offers off-premise, on-demand access to a shared pool of configurable computing resources. Cloud computing offers services such as IaaS, PaaS, mPaaS and SaaS. 48 Software is Everywhere
  • 48. eAcademy.ps Internet of Things 5.6 Summary (Cont.) • A fog computing model identifies a distributed computing infrastructure closer to the network edge. It enables edge devices to run applications locally and make immediate decisions. • The proliferation of devices in the IoT is one of the primary reasons for the exponential growth in data generation. Data can be deemed at rest or in motion. Big Data is typically characterized in three dimensions: volume, velocity, and variety. • Data stored in servers must be encrypted to avoid data tampering or theft. Regular backups are mandatory to minimize losses in case of a disaster • IoT devices should run the latest version of firmware and protocols and any communication between devices should be done using protocols that provide secure encryption by default. 49 Software is Everywhere
  • 49. eAcademy.ps Internet of Things References 1. Cisco Networking Academy course: IoT Fundamentals: Connecting Things version 2.01, Chapter 4. 2. http://mqtt.org/ 50 Software is Everywhere
  • 50. eAcademy.ps Internet of Things Thank you 51 Software is Everywhere