SlideShare a Scribd company logo
1 of 58
Internet of Things|
A Place Where
Machines talk to
Machines
Definition
The Internet of Things (IoT) is a scenario in which objects, animals or people
are provided with unique identifiers and the ability to transfer data over a
network without requiring human-to-human or human-to-computer interaction.
A thing, in the Internet of Things, can be a person with a heart monitor
implant, a farm animal with a bio-chip transponder, an automobile that has built-
in sensors to alert the driver when tire pressure is low -- or any other natural or
man-made object that can be assigned an IP address and provided with the
ability to transfer data over a network.
Architecture of IoT
Sensor Layer

Lowest Abstraction Layer

Incorporated to measure physical quantities

Interconnects the physical and digital world

Collects and process the real time information
Gateway and Network Layer

Robust and High performance network
infrastructure

Supports the communication requirements
for latency, bandwidth or security

Allows multiple organizations to share and
use the same network independently
Management Service Layer

Capturing of periodic sensory data

Data Analytics (Extracts relevant information
from massive amount of raw data)

Streaming Analytics ( Process real time data)

Ensures security and privacy of data.
Application Layer

Provides a user interface for using IoT.

Different applications for various sectors
like Transportation, Healthcare, Agriculture,
Supply chains, Government, Retail etc.
Major Challenges

Big Data Explosion

Countless components

Security & Privacy

Advanced Internet Protocol

Power efficiency
Internet connected things
IOT- Enabling Technologies
RFID Sensor Smart Tech Nano Tech
To identify
and track
the data of
things
To collect
and process
the data to
detect the
changes in
the physical
status of
things
To enhance
the power of
the network by
devolving
processing
capabilities to
different part
of the network.
To make the
smaller and
smaller
things have
the ability to
connect and
interact.
Applications of IOT
Network
Biosensor taken by people
Equipment in public placeHouse
Regional Office
Virtual EnvironmentTransportation Vehicle
Scenario: Shopping
(2) When shopping in the market, the
goods will introduce themselves.
(1) When entering the doors, scanners
will identify the tags on her clothing.
(4) When paying for the goods, the
microchip of the credit card will
communicate with checkout reader.
(3) When moving the goods, the reader
will tell the staff to put a new one.
Scenario: Smart Home
Scenario: E-Healthcare
Scenario: Smart Cars
Scenario: Smart Farms
Current Scenario
Future Scenario
Major Components of IOT
Major Components of IOT: (Client Server Model)
Network
Result
Client
Server
Client machine
Server machine
Socket Programming

Minimum Requirement
- Linux OS (Lib. Header iles)

Server and Client

IP and Port No.
What is Socket?
Sockets are communication points on the same or different
computers to exchange data. Sockets are supported by Unix,
Windows, Mac, and many other operating system.
Sockets allow communication between two different processes
on the same or different machines. To be more precise, it's a
way to talk to other computers using standard Unix file
descriptors.
What is Socket Address?
Socket address is a combination of IP address and Port number
What is Port?
• One of the circuit connection points on a front end processor or local
intelligent controller
Dest.
Host
P
o
r
t
SRC
Host
TCP
What is Port?
At the transport layer, an address is needed to choose among multiple
processes running on the destination host called Port Number

Destination Port Number for delivery

Source Port Number for reply
TCP or UDP
Port Port Port Port
Process 1 Process 2 Process 3 Process 4
Port# Data
Data
Packet
Port Number

Port is represented by a positive (16-bit ) integer value between 0 and
65,535

Some ports have been reserved to support common / well known services
ftp 21/tcp
telnet 23/tcp
smtp 25/tcp
login 513/tcp

User level process/services generally use port number value >= 1024
Socket Types
1) Stream Sockets:

Delivery in a networked environment is guaranteed. If you
send through the stream socket three items "A, B, C", they
will arrive in the same order - "A, B, C".

These sockets use TCP (Transmission Control Protocol) for
data transmission.

If delivery is impossible, the sender receives an error
indicator.
Socket Types
Datagram Sockets:

Delivery in a networked environment is not guaranteed.

They're connectionless because you don't need to have an
open connection as in Stream Sockets - you build a packet
with the destination information and send it out.

They use UDP (User Datagram Protocol).
Server and Client Programming Concept
- Server
 Create a socket with socket ()
 Bind the socket to an address using the bind()
 Listen for connections with the listen()
 Accept a connection with the accept()
 Send and Receive, use read() and write() system calls
- Client
 Create a socket with the socket()
 Connect socket to the address of server using connect()
system call
 Send and receive data, use read() and write() system calls
Socket programming- Flow
socket()
connect()
send()
recv()
close()
..
.
socket()
bind()
listen()
accept()
recv()
send()
close()
wait for connection
request from next
client
Client Server
What is Machine to Machine
(M2M) Communication?
The Machine to Machine
concept(communications inter-
machines) implies the association of
information and communication
technologies (ICT), smart and
communicating objects, as well as
specialized software to interact, with
the enterprise’s information system,
without human intervention.
What is cloud computing?
The practice of using a network of remote servers hosted on the Internet to
store, manage, and process data, rather than a local server or a personal
computer.
Clouds can be classified as public, private, and hybrid
Cloud computing types
 IOT Standard Protocols
Protocols
• TCP
• UDP
What Connects Internet of things…?
TCP Vs UDP
ROLE OF WIRELESS COMMUNICATION IN IOT
Bluetooth :
wireless technology standard for
exchanging data over short distances (using short-
wavelength UHF radio waves in the ISM band from
2.4 to 2.485 GHz) from fixed and mobile devices,
and building personal area networks (PANs).
Bluetooth Technologies in IOT
 Bluetooth LE | Bluetooth Smart (IEEE
802.15.4)
Bluetooth Smart/ Bluetooth LE :
Bluetooth Smart is an application-friendly technology supported by every major
operating system.
The technology costs less and offers flexible development architecture for
creating applications to bring everyday objects like heart-rate monitors,
toothbrushes, and shoes into the connected world and have them communicate
with applications that reside on the Bluetooth Smart compatible smartphones,
tablets, or similar devices those consumers already own.
Zigbee :
ZigBee is based on an IEEE 802.15.4 standard
Its low power consumption limits transmission distances to 10–100 meters line-
of-sight,
ZigBee devices can transmit data over long distances by passing data through
a mesh network of intermediate devices to reach more distant ones.
ZigBee is typically used in low data rate applications that require long battery life
and secure networking
ZigBee has a defined rate of 250 kbit/s, best suited for intermittent data
transmissions from a sensor or input device.
Wi-Fi
Wi-Fi is the name of a popular wireless networking technology that uses radio
waves to provide wireless high-speed Internet and network connections.
Wi-max
WiMAX (Worldwide Interoperability for Microwave Access) is
a wireless communications standard designed to provide 30 to 40 megabit-per-
second data rates.
SATCOM
Satcom (which stands for "satellite communication") is an artificial satellite that is
used to help telecommunication by reflecting or relaying signals into space and
back down to Earth.
It is the most powerful form of radio and can cover far more distance and wider
areas than other radios.
It can also communicate with words, pictures and other forms of information.
RFID
Radio-frequency identification (RFID)  is  the  wireless  use  of electromagnetic 
fields to transfer data, for the purposes of automatically identifying and tracking 
tags attached to objects. 
ETHERNET
Ethernet is the most commonly used local area network technology deployed 
with transmission speeds heading upwards into the gigabits range.
Ethernet is the most widely installed local area network (LAN) technology.
GSM- Global System for Mobile Communication
GSM digitizes and compresses data, then sends it down a channel with two other 
streams of user data, each in its own time slot. 
It operates at either the 900 MHz or 1800 MHz frequency band.
GPRS- General Packet Radio Service
General packet radio service (GPRS) is a packet oriented mobile data service on the 
2G  and  3G  cellular  communication  system's  global  system  for  mobile 
communications (GSM)
GPS- Global Positioning System
The Global Positioning System (GPS)  is  a  space-based satellite  navigation system 
that provides location and time information in all weather conditions, anywhere on 
or near the earth where there is an unobstructed line of sight to four or more GPS 
satellites
GROUPING OF STATIONS / CELLULAR
NETWORK :
A cellular network or mobile network is 
a wireless network distributed over land areas 
called cells, each served by at least one fixed-
location transceiver,  known  as  a cell 
site or base station. 
In a cellular network, each cell uses a different 
set  of  frequencies  from  neighboring  cells,  to 
avoid  interference  and  provide  guaranteed 
bandwidth within each cell.
CELL SIGNAL ENCODING
To distinguish signals from several different transmitters, following concepts are 
used:
 Frequency division multiple access (FDMA)
 Code division multiple access (CDMA)
FDMA, TDMA & CDMA
RELAY ACCESS POINT :
A wireless repeater (also called wireless range extender) takes an existing signal 
from  a  wireless  router  or  wireless access point and  rebroadcasts  it  to  create  a 
second network.
TARGET WAKE TIME:
Target Wake Time (TWT) is a function that permits an AP to define a specific time 
or set of times for individual stations to access the medium. 
The  STA  (client)  and  the  AP  exchange  information  that  includes  an  expected 
activity duration to allow the AP to control the amount of contention and overlap 
among competing STA. 
The  AP  can  protect  the  expected  duration  of  activity  with  various  protection 
mechanisms. 
1G, 2G, 3G and 4G(LTE) mobile networks:
LTE- Long Term Evaluation
IPv4 Vs IPv6:
Thank You
Have Fun ;)

More Related Content

What's hot

Bridging IoT infrastructure and cloud application using cellular-based intern...
Bridging IoT infrastructure and cloud application using cellular-based intern...Bridging IoT infrastructure and cloud application using cellular-based intern...
Bridging IoT infrastructure and cloud application using cellular-based intern...TELKOMNIKA JOURNAL
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentIJCERT
 
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Istabraq M. Al-Joboury
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
 
Wireless Communication & Networking
Wireless Communication & NetworkingWireless Communication & Networking
Wireless Communication & NetworkingMohit Somani
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachKarthic C M
 
100 network question and answers
100 network question and answers100 network question and answers
100 network question and answersRoman Orlowski
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
 
Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...IDES Editor
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
Internet an how it works
Internet an how it worksInternet an how it works
Internet an how it worksshahnaz10
 
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
 
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...eSAT Publishing House
 
Research review of iot
Research review of iotResearch review of iot
Research review of iotAbdullah Aziz
 
Form4 cd6
Form4 cd6Form4 cd6
Form4 cd6smktsj2
 

What's hot (20)

Bridging IoT infrastructure and cloud application using cellular-based intern...
Bridging IoT infrastructure and cloud application using cellular-based intern...Bridging IoT infrastructure and cloud application using cellular-based intern...
Bridging IoT infrastructure and cloud application using cellular-based intern...
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
 
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
 
Unit 1 q&a
Unit  1 q&aUnit  1 q&a
Unit 1 q&a
 
Ch2
Ch2Ch2
Ch2
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
 
Wireless Communication & Networking
Wireless Communication & NetworkingWireless Communication & Networking
Wireless Communication & Networking
 
Internet 2.0
Internet 2.0Internet 2.0
Internet 2.0
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approach
 
Co4301524529
Co4301524529Co4301524529
Co4301524529
 
100 network question and answers
100 network question and answers100 network question and answers
100 network question and answers
 
G0314043
G0314043G0314043
G0314043
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
Internet an how it works
Internet an how it worksInternet an how it works
Internet an how it works
 
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...
 
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...
 
Research review of iot
Research review of iotResearch review of iot
Research review of iot
 
Form4 cd6
Form4 cd6Form4 cd6
Form4 cd6
 

Viewers also liked

ENC Times-September 04 ,2016
ENC Times-September 04 ,2016ENC Times-September 04 ,2016
ENC Times-September 04 ,2016ENC
 
Iterative Co-Discovery: Designing Business Solutions with UX
Iterative Co-Discovery: Designing Business Solutions with UXIterative Co-Discovery: Designing Business Solutions with UX
Iterative Co-Discovery: Designing Business Solutions with UXMichael Kopack
 
RESUMEjan16Ll
RESUMEjan16LlRESUMEjan16Ll
RESUMEjan16Llbd joe
 
Banned Books Week_Collaborative Lesson
Banned Books Week_Collaborative LessonBanned Books Week_Collaborative Lesson
Banned Books Week_Collaborative LessonAshley Miller
 
Hani Shaker mep
Hani Shaker mepHani Shaker mep
Hani Shaker mephani ayyad
 
Receiving Parchment Data Via SPEEDE - UMUC
Receiving Parchment Data Via SPEEDE - UMUCReceiving Parchment Data Via SPEEDE - UMUC
Receiving Parchment Data Via SPEEDE - UMUCPatrick Elliott
 
ENC Times- February 11,2017
ENC Times- February 11,2017ENC Times- February 11,2017
ENC Times- February 11,2017ENC
 
ENC Times-September 18,2016
ENC Times-September 18,2016ENC Times-September 18,2016
ENC Times-September 18,2016ENC
 
Assessments - Data Driven Instruction
Assessments - Data Driven InstructionAssessments - Data Driven Instruction
Assessments - Data Driven InstructionSharon Frausto
 
ENC Times-August 31,2016
ENC Times-August 31,2016ENC Times-August 31,2016
ENC Times-August 31,2016ENC
 
ENC Times-December 01,2016
ENC Times-December 01,2016ENC Times-December 01,2016
ENC Times-December 01,2016ENC
 
Technology Enhanced Unit_Revised
Technology Enhanced Unit_RevisedTechnology Enhanced Unit_Revised
Technology Enhanced Unit_RevisedAshley Miller
 
ENC Times-September 07,2016
ENC Times-September 07,2016ENC Times-September 07,2016
ENC Times-September 07,2016ENC
 
Key Assessment- Assessment Item Objectives
Key Assessment- Assessment Item ObjectivesKey Assessment- Assessment Item Objectives
Key Assessment- Assessment Item ObjectivesAshley Miller
 
ENC Times-September 13,2016
ENC Times-September 13,2016ENC Times-September 13,2016
ENC Times-September 13,2016ENC
 
Современные формы, методы, средства
Современные формы, методы, средстваСовременные формы, методы, средства
Современные формы, методы, средстваRuslan Chudin
 
Enc times, 14 july 2016
Enc times, 14 july 2016Enc times, 14 july 2016
Enc times, 14 july 2016ENC
 
ENC Times-November 25,2016
ENC Times-November  25,2016ENC Times-November  25,2016
ENC Times-November 25,2016ENC
 

Viewers also liked (20)

ENC Times-September 04 ,2016
ENC Times-September 04 ,2016ENC Times-September 04 ,2016
ENC Times-September 04 ,2016
 
Iterative Co-Discovery: Designing Business Solutions with UX
Iterative Co-Discovery: Designing Business Solutions with UXIterative Co-Discovery: Designing Business Solutions with UX
Iterative Co-Discovery: Designing Business Solutions with UX
 
RESUMEjan16Ll
RESUMEjan16LlRESUMEjan16Ll
RESUMEjan16Ll
 
Banned Books Week_Collaborative Lesson
Banned Books Week_Collaborative LessonBanned Books Week_Collaborative Lesson
Banned Books Week_Collaborative Lesson
 
Faviana rondòn
Faviana rondònFaviana rondòn
Faviana rondòn
 
Presentation1
Presentation1Presentation1
Presentation1
 
Hani Shaker mep
Hani Shaker mepHani Shaker mep
Hani Shaker mep
 
Receiving Parchment Data Via SPEEDE - UMUC
Receiving Parchment Data Via SPEEDE - UMUCReceiving Parchment Data Via SPEEDE - UMUC
Receiving Parchment Data Via SPEEDE - UMUC
 
ENC Times- February 11,2017
ENC Times- February 11,2017ENC Times- February 11,2017
ENC Times- February 11,2017
 
ENC Times-September 18,2016
ENC Times-September 18,2016ENC Times-September 18,2016
ENC Times-September 18,2016
 
Assessments - Data Driven Instruction
Assessments - Data Driven InstructionAssessments - Data Driven Instruction
Assessments - Data Driven Instruction
 
ENC Times-August 31,2016
ENC Times-August 31,2016ENC Times-August 31,2016
ENC Times-August 31,2016
 
ENC Times-December 01,2016
ENC Times-December 01,2016ENC Times-December 01,2016
ENC Times-December 01,2016
 
Technology Enhanced Unit_Revised
Technology Enhanced Unit_RevisedTechnology Enhanced Unit_Revised
Technology Enhanced Unit_Revised
 
ENC Times-September 07,2016
ENC Times-September 07,2016ENC Times-September 07,2016
ENC Times-September 07,2016
 
Key Assessment- Assessment Item Objectives
Key Assessment- Assessment Item ObjectivesKey Assessment- Assessment Item Objectives
Key Assessment- Assessment Item Objectives
 
ENC Times-September 13,2016
ENC Times-September 13,2016ENC Times-September 13,2016
ENC Times-September 13,2016
 
Современные формы, методы, средства
Современные формы, методы, средстваСовременные формы, методы, средства
Современные формы, методы, средства
 
Enc times, 14 july 2016
Enc times, 14 july 2016Enc times, 14 july 2016
Enc times, 14 july 2016
 
ENC Times-November 25,2016
ENC Times-November  25,2016ENC Times-November  25,2016
ENC Times-November 25,2016
 

Similar to Introduction-All 'bout IOT

Internet of things & its insights
Internet of things & its insightsInternet of things & its insights
Internet of things & its insightsSaswati
 
InduSoft Web Studio and MQTT for Internet of Things Applications
InduSoft Web Studio and MQTT for Internet of Things ApplicationsInduSoft Web Studio and MQTT for Internet of Things Applications
InduSoft Web Studio and MQTT for Internet of Things ApplicationsAVEVA
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPTssuser2cc0d4
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdfJoshuaKimmich1
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
 
Chapter-1.doc
Chapter-1.docChapter-1.doc
Chapter-1.docvenui2
 
Internet of Things.pptx
Internet of Things.pptxInternet of Things.pptx
Internet of Things.pptxEshwar Prasad
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introductionBaji Babu
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionRoopaDNDandally
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionRoopaDNDandally
 

Similar to Introduction-All 'bout IOT (20)

IOT.pdf
IOT.pdfIOT.pdf
IOT.pdf
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 
Internet of things & its insights
Internet of things & its insightsInternet of things & its insights
Internet of things & its insights
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf
 
Chapter 1 pdf
Chapter 1 pdfChapter 1 pdf
Chapter 1 pdf
 
InduSoft Web Studio and MQTT for Internet of Things Applications
InduSoft Web Studio and MQTT for Internet of Things ApplicationsInduSoft Web Studio and MQTT for Internet of Things Applications
InduSoft Web Studio and MQTT for Internet of Things Applications
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPT
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
Mesh IoT Networks Explained
Mesh IoT Networks ExplainedMesh IoT Networks Explained
Mesh IoT Networks Explained
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
 
Chapter-1.doc
Chapter-1.docChapter-1.doc
Chapter-1.doc
 
Internet of Things.pptx
Internet of Things.pptxInternet of Things.pptx
Internet of Things.pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, Evolution
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, Evolution
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Introduction-All 'bout IOT

  • 1. Internet of Things| A Place Where Machines talk to Machines
  • 2. Definition The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. A thing, in the Internet of Things, can be a person with a heart monitor implant, a farm animal with a bio-chip transponder, an automobile that has built- in sensors to alert the driver when tire pressure is low -- or any other natural or man-made object that can be assigned an IP address and provided with the ability to transfer data over a network.
  • 3.
  • 5. Sensor Layer  Lowest Abstraction Layer  Incorporated to measure physical quantities  Interconnects the physical and digital world  Collects and process the real time information
  • 6. Gateway and Network Layer  Robust and High performance network infrastructure  Supports the communication requirements for latency, bandwidth or security  Allows multiple organizations to share and use the same network independently
  • 7. Management Service Layer  Capturing of periodic sensory data  Data Analytics (Extracts relevant information from massive amount of raw data)  Streaming Analytics ( Process real time data)  Ensures security and privacy of data.
  • 8. Application Layer  Provides a user interface for using IoT.  Different applications for various sectors like Transportation, Healthcare, Agriculture, Supply chains, Government, Retail etc.
  • 9. Major Challenges  Big Data Explosion  Countless components  Security & Privacy  Advanced Internet Protocol  Power efficiency
  • 11. IOT- Enabling Technologies RFID Sensor Smart Tech Nano Tech To identify and track the data of things To collect and process the data to detect the changes in the physical status of things To enhance the power of the network by devolving processing capabilities to different part of the network. To make the smaller and smaller things have the ability to connect and interact.
  • 12. Applications of IOT Network Biosensor taken by people Equipment in public placeHouse Regional Office Virtual EnvironmentTransportation Vehicle
  • 13. Scenario: Shopping (2) When shopping in the market, the goods will introduce themselves. (1) When entering the doors, scanners will identify the tags on her clothing. (4) When paying for the goods, the microchip of the credit card will communicate with checkout reader. (3) When moving the goods, the reader will tell the staff to put a new one.
  • 21. Major Components of IOT: (Client Server Model) Network Result Client Server Client machine Server machine
  • 22.
  • 23. Socket Programming  Minimum Requirement - Linux OS (Lib. Header iles)  Server and Client  IP and Port No.
  • 24. What is Socket? Sockets are communication points on the same or different computers to exchange data. Sockets are supported by Unix, Windows, Mac, and many other operating system. Sockets allow communication between two different processes on the same or different machines. To be more precise, it's a way to talk to other computers using standard Unix file descriptors.
  • 25. What is Socket Address? Socket address is a combination of IP address and Port number
  • 26. What is Port? • One of the circuit connection points on a front end processor or local intelligent controller Dest. Host P o r t SRC Host TCP
  • 27. What is Port? At the transport layer, an address is needed to choose among multiple processes running on the destination host called Port Number  Destination Port Number for delivery  Source Port Number for reply TCP or UDP Port Port Port Port Process 1 Process 2 Process 3 Process 4 Port# Data Data Packet
  • 28. Port Number  Port is represented by a positive (16-bit ) integer value between 0 and 65,535  Some ports have been reserved to support common / well known services ftp 21/tcp telnet 23/tcp smtp 25/tcp login 513/tcp  User level process/services generally use port number value >= 1024
  • 29. Socket Types 1) Stream Sockets:  Delivery in a networked environment is guaranteed. If you send through the stream socket three items "A, B, C", they will arrive in the same order - "A, B, C".  These sockets use TCP (Transmission Control Protocol) for data transmission.  If delivery is impossible, the sender receives an error indicator.
  • 30. Socket Types Datagram Sockets:  Delivery in a networked environment is not guaranteed.  They're connectionless because you don't need to have an open connection as in Stream Sockets - you build a packet with the destination information and send it out.  They use UDP (User Datagram Protocol).
  • 31. Server and Client Programming Concept - Server  Create a socket with socket ()  Bind the socket to an address using the bind()  Listen for connections with the listen()  Accept a connection with the accept()  Send and Receive, use read() and write() system calls - Client  Create a socket with the socket()  Connect socket to the address of server using connect() system call  Send and receive data, use read() and write() system calls
  • 33.
  • 34. What is Machine to Machine (M2M) Communication? The Machine to Machine concept(communications inter- machines) implies the association of information and communication technologies (ICT), smart and communicating objects, as well as specialized software to interact, with the enterprise’s information system, without human intervention.
  • 35. What is cloud computing? The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. Clouds can be classified as public, private, and hybrid
  • 37.  IOT Standard Protocols Protocols • TCP • UDP What Connects Internet of things…?
  • 39. ROLE OF WIRELESS COMMUNICATION IN IOT
  • 40. Bluetooth : wireless technology standard for exchanging data over short distances (using short- wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz) from fixed and mobile devices, and building personal area networks (PANs). Bluetooth Technologies in IOT  Bluetooth LE | Bluetooth Smart (IEEE 802.15.4)
  • 41. Bluetooth Smart/ Bluetooth LE : Bluetooth Smart is an application-friendly technology supported by every major operating system. The technology costs less and offers flexible development architecture for creating applications to bring everyday objects like heart-rate monitors, toothbrushes, and shoes into the connected world and have them communicate with applications that reside on the Bluetooth Smart compatible smartphones, tablets, or similar devices those consumers already own.
  • 42. Zigbee : ZigBee is based on an IEEE 802.15.4 standard Its low power consumption limits transmission distances to 10–100 meters line- of-sight, ZigBee devices can transmit data over long distances by passing data through a mesh network of intermediate devices to reach more distant ones. ZigBee is typically used in low data rate applications that require long battery life and secure networking ZigBee has a defined rate of 250 kbit/s, best suited for intermittent data transmissions from a sensor or input device.
  • 43. Wi-Fi Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.
  • 44. Wi-max WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide 30 to 40 megabit-per- second data rates.
  • 45. SATCOM Satcom (which stands for "satellite communication") is an artificial satellite that is used to help telecommunication by reflecting or relaying signals into space and back down to Earth. It is the most powerful form of radio and can cover far more distance and wider areas than other radios. It can also communicate with words, pictures and other forms of information.
  • 46. RFID Radio-frequency identification (RFID)  is  the  wireless  use  of electromagnetic  fields to transfer data, for the purposes of automatically identifying and tracking  tags attached to objects. 
  • 48. GSM- Global System for Mobile Communication GSM digitizes and compresses data, then sends it down a channel with two other  streams of user data, each in its own time slot.  It operates at either the 900 MHz or 1800 MHz frequency band.
  • 49. GPRS- General Packet Radio Service General packet radio service (GPRS) is a packet oriented mobile data service on the  2G  and  3G  cellular  communication  system's  global  system  for  mobile  communications (GSM)
  • 50. GPS- Global Positioning System The Global Positioning System (GPS)  is  a  space-based satellite  navigation system  that provides location and time information in all weather conditions, anywhere on  or near the earth where there is an unobstructed line of sight to four or more GPS  satellites
  • 51. GROUPING OF STATIONS / CELLULAR NETWORK : A cellular network or mobile network is  a wireless network distributed over land areas  called cells, each served by at least one fixed- location transceiver,  known  as  a cell  site or base station.  In a cellular network, each cell uses a different  set  of  frequencies  from  neighboring  cells,  to  avoid  interference  and  provide  guaranteed  bandwidth within each cell.
  • 52. CELL SIGNAL ENCODING To distinguish signals from several different transmitters, following concepts are  used:  Frequency division multiple access (FDMA)  Code division multiple access (CDMA)
  • 53. FDMA, TDMA & CDMA
  • 54. RELAY ACCESS POINT : A wireless repeater (also called wireless range extender) takes an existing signal  from  a  wireless  router  or  wireless access point and  rebroadcasts  it  to  create  a  second network.
  • 55. TARGET WAKE TIME: Target Wake Time (TWT) is a function that permits an AP to define a specific time  or set of times for individual stations to access the medium.  The  STA  (client)  and  the  AP  exchange  information  that  includes  an  expected  activity duration to allow the AP to control the amount of contention and overlap  among competing STA.  The  AP  can  protect  the  expected  duration  of  activity  with  various  protection  mechanisms. 
  • 56. 1G, 2G, 3G and 4G(LTE) mobile networks: LTE- Long Term Evaluation