2. eAcademy.ps Internet of Things
Course: Internet of Things (IoT)
2
Notes:
• This course is heavily based on the Cisco Networking
Academy course: IoT Fundamentals: Connecting Things
version 2.01. It is recommended to enroll in this course
to gain full access to online materials.
• Parts of this content is copyrighted by Cisco.
• Main changes from original course:
• Removed the business canvas model
• Added a project instead of the hackathon.
3. eAcademy.ps Internet of Things
Session 5
Fog Networks and Cloud Computing
Course: Internet of Things (IoT)
4. eAcademy.ps Internet of Things
• 5.1 The Role of the Network
• 5.2 Wireless Technologies
• 5.3 Fog and Cloud Services
• 5.4 Big Data
• 5.5 Security Concerns in the IoT
• 5.6 Summary
4
Session Outline
Fog Networks and Cloud Computing
5. eAcademy.ps Internet of Things
5.1 The Role of the Network
5
Fog Networks and Cloud Computing
Image by Wilgengebroed on Flickr - Cropped and sign removed from Internet of things signed by the author.jpg, CC BY 2.0,
https://commons.wikimedia.org/w/index.php?curid=32745645
6. eAcademy.ps Internet of Things
Network Types
6
Fog Networks and Cloud Computing
The Role of the Network
• The path from source to destination can be a single cable or a
collection of networks.
• A Personal Area Network (PAN) is a type of network that usually
spans a few meters around an individual and is often used in IoT.
• A Local Area Network (LAN) is a type of network infrastructure that
spans a small geographical area and is used to connect end devices.
• A LAN is normally a high-speed network under the control of a single
administrative entity.
• LANs often connect machines in the factory plant.
• A Wide Area Network (WAN) is a type of network infrastructure
that spans a wide geographical area and is used to connect LANs.
• A WAN is normally a low-speed network and may include portions
from different Internet Service Providers (ISPs)
• WAN devices have evolved to create Low Power Wide Area
Networks (LPWAN) for use in the IoT.
13. eAcademy.ps Internet of Things
IoT Protocols
13
Fog Networks and Cloud Computing
The Role of the Network
• Because of their restrictions, IoT devices require
specialized protocols to function with low power and
limited connectivity.
• Examples of specialized IoT protocols:
• CoAP (Constrained Application Protocol)
• MQTT (Message Queuing Telemetry Transport)
14. eAcademy.ps Internet of Things
CoAP (Constrained Application Protocol)
14
Fog Networks and Cloud Computing
The Role of the Network
• CoAP is a protocol intended for resource-constrained IoT
devices and enables them to communicate with the
Internet.
• CoAP Characteristics:
• Works on microcontrollers with as low as 10 KB of RAM and 100
KB of storage space while also providing strong security.
• Based on HTTP and the REST model where resources are
retrieved from a server using URIs/URLs.
• Clients use the well-known methods of GET, PUT, POST, and
DELETE to manipulate these resources.
• Multicast support.
• Low overhead.
• Simplicity.
15. eAcademy.ps Internet of Things
MQTT (Message Queuing Telemetry Transport)
15
Fog Networks and Cloud Computing
The Role of the Network
• MQTT is a lightweight protocol that is best suited for
systems that rely on low bandwidth connections and
require code with a small footprint.
• MQTT protocols uses the concept of publish-subscribe
communications among nodes:
• Requires the presence of an intermediate node called a message
broker.
• Every source of data must publish the data element on the
broker node indicating to which “topic” the data belongs.
• Nodes interested in receiving data on a specific topic must
subscribe to that topic on the broker.
• Broker will then distribute the messages to interested clients
based on the topic of a message.
• More information about MQTT can be found at
http://mqtt.org/
17. eAcademy.ps Internet of Things
New Wireless Technologies
17
Fog Networks and Cloud Computing
Wireless Technologies
• Wireless connectivity is the biggest growth area.
• New protocols created/updated to support diverse IoT
devices:
• ZigBee
• Bluetooth
• 4G/5G
• LoRaWAN
• Protocols created for short, medium, and wide ranges
• Low-Power Wide-Area Networks (LPWAN) are designed to
support long range communications for low bit rate
devices such as sensors, actuators, and controllers
19. eAcademy.ps Internet of Things
ZigBee
19
Fog Networks and Cloud Computing
Wireless Technologies
• A low-energy, low-power, low-data rate wireless protocol
specification used to create personal area networks.
• Areas of utilization:
• home automation,
• medical device data collection,
• other low-power low-bandwidth needs.
• 250 kbps transfer rate best suited for
intermittent data transmissions.
• The ZigBee specification relies on a main device
called a ZigBee Coordinator that manages all ZigBee client devices.
• The ZigBee Coordinator, is responsible for the creation and maintenance of the ZigBee
network.
• The coordinator can talk to up to eight endpoints or routers in any combination.
• If an endpoint is too far away from the controller, a ZigBee router can be used to
bridge data between the coordinator and the endpoint.
21. eAcademy.ps Internet of Things
ZigBee Application Profile ID
21
Fog Networks and Cloud Computing
Wireless Technologies
• Every ZigBee data request uses an Application Profile Identification Number.
• Application profile ID numbers - 16-bit numbers that relate to public profiles,
manufacturing profiles, or private profiles.
• Example: home automation public application profile:
• Defines ZigBee networked devices intended for use in the home, such as wall
switches, thermostats, heaters, air conditioners, and keyless entry systems.
• This profile ensures that devices from one manufacturer will interact with
devices from another.
• Private profiles are used for applications where different vendor devices do not
need to interact.
22. eAcademy.ps Internet of Things
Bluetooth
23
Fog Networks and Cloud Computing
Wireless Technologies
• Wireless protocol used for data communication over short distances (PAN)
• Supported by almost all mobile devices and accessories - the defacto
standard for audio between mobile devices.
• Bluetooth Low Energy (BLE) - very popular because of the smartphone
industry and new applications in healthcare, fitness, and beacons.
• operates in the 2.4 GHz ISM band
• Has a very fast connection rate (milliseconds) and a very high data rate (1 Mbps).
• The BLE device then goes into “sleep mode” until a connection is reestablished –
lengthens the battery life for several years.
• Beacons use BLE technology - positioned on buildings, in
coffee shops, and on light posts to provide location
services.
23. eAcademy.ps Internet of Things
Bluetooth 5
24
Fog Networks and Cloud Computing
Wireless Technologies
• Bluetooth 5 was announced by the Bluetooth SIG in June 2016.
• Version 5 has four times the range as v4.2 (120m vs 30m)
• Version 5 is twice as fast as earlier versions.
• Version 5 has the ability to transmit audio to two devices at the same
time.
• When operating in low energy mode, Bluetooth 5
achieves an eight-fold increase in data broadcasting
capacity over Bluetooth 4.x. This is very important
for IoT devices which rely on constricted power
sources.
• Bluetooth 5 bandwidth is defined at 2 Mbps but
allows for bandwidth that can be adjusted
depending on the application.
24. eAcademy.ps Internet of Things
Cellular networks
25
Fog Networks and Cloud Computing
Wireless Technologies
• Cellular-based data networks designed to take advantage of
communications over large geographic areas
1980s
(1G)
1990s
(2G)
2000s
(3G)
2010s
(4G)
2020s
(5G)
26. eAcademy.ps Internet of Things
LoRaWAN
27
Fog Networks and Cloud Computing
Wireless Technologies
• Wireless technology designed to provide wireless WAN
connections to power constricted devices.
• Targets key requirements of IoT such as secure bi-directional
communication, mobility and localization services.
• Architecture is often an extended star topology in which gateways
relay messages between end-devices and a central network server
is located in the backend.
• Data rates range from 0.3 kbps to 50 kbps
• Security is built into the LoRaWAN standard, implemented in a
multi-layer encryption scheme.
• Unique keys are used in the Application, Network,
and Device layers.
https://www.youtube.com/watch?v=2Y0bMX3TVi0
27. eAcademy.ps Internet of Things
Activities
• Packet Tracer - Explore the Smart Home
• Packet Tracer - Build a Connected Factory Solution
• Packet Tracer - Securing Cloud Services in the IoT
28
Fog Networks and Cloud Computing
32. eAcademy.ps Internet of Things
Cloud Computing Model
33
Fog Networks and Cloud Computing
Fog and Cloud Services
• On-demand access to a shared pool of configurable computing
resources.
• Resources can be made available quickly with minimal
management effort.
• Cloud service providers use data centers for their cloud services
and cloud-based resources.
• “Pay-as-you-go” model treats computing and storage expenses as
a utility.
• Enables access to organizational data and applications anywhere
and at any time.
• Reduces cost for equipment, energy, physical plant requirements,
and personnel training needs.
33. eAcademy.ps Internet of Things
Cloud Service Models
34
Fog Networks and Cloud Computing
Fog and Cloud Services
• Infrastructure as a Service (IaaS)
• Hardware including servers and other infrastructure
components are supplied by a provider and adjusted on-
demand. The provider handles system maintenance, backups
and continuity planning.
• Platform as a Service (PaaS)
• A provider provides the platform, servers, storage, and OSs
for users to develop and launch applications.
• Mobile PaaS (mPaaS)
• Providers supply development capabilities for mobile
application designers and developers.
• Software as a Service (SaaS)
• Software, such as messaging, IoT data processing, payroll
processing, gaming, and tax preparation is licensed on a
subscription basis and hosted on cloud servers.
35. eAcademy.ps Internet of Things
Cloud Services Examples
36
Fog Networks and Cloud Computing
Fog and Cloud Services
• Amazon AWS
• a cloud service that provides cloud-hosted, on-demand
computing as a service.
• IFTTT
• Short for 'If This Then That', IFTTT allows for special resource
URLs to be created and mapped to specific IFTTT actions.
• Zapier
• Similar to IFTTT, Zapier also allows for cloud-based automation.
• Built.io
• Similar to IFTTT and Zapier but offers advanced functionality.
• Webex Teams
• Collaboration suite for teams to create, meet, message, call,
whiteboard, and share, regardless of whether they’re together
or apart - in one continuous workstream before, during, and
after meetings.
36. eAcademy.ps Internet of Things
Cloud Services Limitations
37
Fog Networks and Cloud Computing
Fog and Cloud Services
• Network Dependency: You need to always have Internet
access to be able to benefit from cloud services.
• Latency: Data has to travel to remote servers before
being able to act upon it.
• Loss of Control: A third party is controlling your data.
• Solving Technical Issues: If technical issues arise you
have to relay on the service provider to solve them.
• Limited Flexibility: You are limited to the features that
are provided by the service provider.
• Security: There have been several incidents of security
issues involving various cloud services.
39. eAcademy.ps Internet of Things
Data in Motion and Data at Rest
40
Fog Networks and Cloud Computing
Big Data
• Data in motion is a term used to refer to the process of
extracting value from data while it is being generated.
• This data may or may not eventually be stored.
• It is possible to think of data in motion as telling a story
as it happens.
• Data at rest is data that has been stored.
• https://www.youtube.com/watch?v=3C02F-YRsgY
41. eAcademy.ps Internet of Things
It is all about the Data
42
Fog Networks and Cloud Computing
Big Data
• Big data is data that is so vast and complex it is difficult
to store, process, and analyze using traditional data
storage and analytics applications.
• Typically characterized in three dimensions: volume,
velocity, and variety
• Volume - the amount of data being transported and stored.
• Velocity - the rate at which this data is generated.
• Variety - the type of data, which is rarely in a state that is
perfectly ready for processing and analysis.
• Apache Hadoop, Webex Teams, Cassandra, and Kafka –
examples of open source projects dealing with Big Data.
44. eAcademy.ps Internet of Things
Securing the Wireless Network
45
Fog Networks and Cloud Computing
Wireless Technologies
• Wireless networks have no clear boundaries.
• Securing wireless communications requires strong encryption,
authentication, and secure protocols.
• Several security protocols exist:
• Wired Equivalent Privacy (WEP)
• Wi-Fi Protected Access (WPA)
• Wi-Fi Protected Access II (WPA2):
• WPA2 uses AES encryption and is more secure than the other protocols.
A pass phrase larger than 21 chars should be used.
• It is recommended that security in the form of data authentication
and encryption is implemented as part of the application using
technologies such as VPNs and TLS/SSL.
• Video highlighting the vulnerability of using an insecure wireless
hotspot in a coffee shop:
https://www.youtube.com/watch?v=mW1LCmASQEQ
45. eAcademy.ps Internet of Things
Data Storage
46
Fog Networks and Cloud Computing
Security Concerns in the IoT
• IoT devices may store data for a period of time before
sending it out for processing – especially for devices that do
not maintain constant connections to their gateways or
controllers.
• Critical that all IoT storage devices encrypt data for storage
to avoid data tampering or theft.
• Self-encrypting drives have encryption capability built into
the drive controller – encryption and decryption done by
the drive itself, independent of the operating system.
• Self-encrypting flash memory – manufacturers beginning to
release new devices with self-encrypting flash memory.
46. eAcademy.ps Internet of Things
Data Transmission
47
Fog Networks and Cloud Computing
Security Concerns in the IoT
• If data is not properly secured through encryption, it can be
intercepted, captured or manipulated while in transit.
• Modern encryption algorithms may require more
processing power than what is available in the IoT device.
• As well as physical security, IoT devices must be able to
protect its own firmware and the data it transmits.
• Ensure that IoT devices are running the latest version of
their firmware and protocols.
• Common attack: trick devices into using sub-optimal
security parameters under which the connection can be
exploited.
• Servers, cloud endpoints, intermediary devices should also
be secured and use strong encryption algorithms before
communicating with IoT devices.
47. eAcademy.ps Internet of Things
5.6 Summary
• Personal information related to health, location, wealth, personal
preferences and behaviors is passing through the IoT devices in increasing
volumes. This increase in volume elevates the relevance of increasing the
attention on data privacy and data protection.
• New wireless technologies and protocols, such as ZigBee, Bluetooth,
4G/5G, and LoRaWAN, have been developed to accommodate the
diversity of IoT devices. Wireless technology is selected based on the
range of coverage, bandwidth requirements, power consumption, and
deployment location.
• Wireless security considerations include: selecting a secure protocol,
protection for management frames, identification of frequency jamming,
detecting rogue access points, and using security at the application layer.
• Cloud computing is a service that offers off-premise, on-demand access
to a shared pool of configurable computing resources. Cloud computing
offers services such as IaaS, PaaS, mPaaS and SaaS.
48
Software is Everywhere
48. eAcademy.ps Internet of Things
5.6 Summary (Cont.)
• A fog computing model identifies a distributed computing
infrastructure closer to the network edge. It enables edge devices to
run applications locally and make immediate decisions.
• The proliferation of devices in the IoT is one of the primary reasons for
the exponential growth in data generation. Data can be deemed at rest
or in motion. Big Data is typically characterized in three dimensions:
volume, velocity, and variety.
• Data stored in servers must be encrypted to avoid data tampering or
theft. Regular backups are mandatory to minimize losses in case of a
disaster
• IoT devices should run the latest version of firmware and protocols and
any communication between devices should be done using protocols
that provide secure encryption by default.
49
Software is Everywhere
49. eAcademy.ps Internet of Things
References
1. Cisco Networking Academy course: IoT Fundamentals:
Connecting Things version 2.01, Chapter 4.
2. http://mqtt.org/
50
Software is Everywhere