SlideShare a Scribd company logo
Understanding the Logical and Physical design of
IoT
With the web of Things (IoT) changing into vastly popular, corporations are chop-chop
finding ways to use IoT and improve their efficiency. whereas IoT has many benefits,
businesses are troubled to grasp the way to implement the technology in their work and
regular life. This text can check up on the physical and logical design of iot and make a case
for the variations between them.
The logical design of IoT is an abstract illustration of processes and entities while not going
into the lower-level details of the implementation. Logical design is a smaller amount careful
than physical design and is a lot more conceptual. It’s the essential definition of how you
would like all those devices to speak and exchange information, however it doesn’t specify a
selected technology or product.
Physical design is quite making products. it's concerning forming an overall intelligent
system. the planning should be adjusted towards the tip user’s needs. However, in physical
design, one understands the foremost effective methodology of storing and accessing those
objects.
“Things” in IoT
Things seek advice from IoT devices with distinctive identities that have actuating,
monitoring, and remote sensing capabilities. Things are the first element of IoT applications.
IoT devices are of assorted types, together with sensiblewatches, sensing devices, smart
natural philosophy appliances, automobiles, wearable sensors, and industrial machines. IoT
devices generate knowledge in some type that results in helpful data once processed.
Physical style of IoT
A physical design of an IoT system refers to the individual node devices and their protocols
that are used to make a purposeful IoT ecosystem.
every node device will perform tasks similar to remote sensing, actuating, monitoring, etc.,
by looking forward to physically connected devices. it should conjointly be capable of
transmission data through differing types of wireless or wired connections.
The things/devices within the IoT system are used for:
● Building connections.
● Processing.
● Providing storage.
● Providing interfaces.
● Providing graphical interfaces.
The devices generate knowledge, and also the data is employed to perform and do operations
for raising the system. For instance, a wet device is used to get the moisture data from a
location, and the system analyses it to offer an output.
Logical style of IoT:
A logical design for an IoT system is that the actual design of its parts (computers, sensors,
and actuators) ought to be organized to complete a selected function. It doesn’t go in the
depth of describing how every element are going to be engineered with low-level
programming specifics.
IoT logical style includes:
● IoT purposeful blocks:
IoT systems include many functional blocks similar to Devices, communication, security,
services, and application. The functional blocks offer sensing, identification, actuation,
management, and communication capability.These functional blocks encompass devices that
handle the communication between the server and also the host, change watching
management functions, manage the information transfer, secure the IoT system mistreatment
authentication and totally different functions, and supply Associate in Nursing interface for
dominant and watching varied terms.
● IoT communications models:
There are multiple styles of models offered in a web of Things system that's used for act
between the system and server, such as:
● Request-response model.
● Push-pull model.
● Publish-subscribe model.
● Exclusive try model.
● IoT communication Api:
Arthropod genus are wont to communicate between the server and system in IoT. Some API’s
include:
● REST-based communication arthropod genus.
● Client-server.
● homeless.
● Cacheable.
● Websocket based mostly communication API.
IoT Protocols:
The set of rules governing all direct or indirect exchange of knowledge between computers
on a network. These rules are developed at the applying level and are used to outline how
devices communicate interoperably, regardless of variations in their internal styles and
operations.
IoT protocols facilitate sending commands and data between a network of devices controlled
by sensors or alternative physical attributes like motion, temperature, or vibration. Network
protocols help accomplish reliable data transfer across all layers just like the application,
transport, network, and link layer.
● Application Layer Protocols:
On this layer, protocols use an application interface to define how the data is sent over the
network. These protocols embody HTTP, XMPP, WebSocket, DDS, MQTT, and AMQP.
● Transport Layer Protocols:
This layer is chargeable for knowledge flow management and error handling, guaranteeing
that there are rules in situ to subsume errors. This layer conjointly provides finish-to-end
message transfer capability, freelance of the underlying network infrastructure. It provides
essential property between the 2 nodes on either end of the point-to-send-point-receive model
employed by key protocols similar to TCP/IP.
● Network Layer:
This layer is employed to send data from a supply network to a destination network. For this,
IPv4 and IPv6 protocols are used for host identification that transfers data in packets.
● Link Layer:
Link-layer protocols are the kind of knowledge transmission protocol wont to facilitate
sending data over the physical layer. They conjointly confirm however devices signal and
code packets on the network.

More Related Content

What's hot

Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
Darwin Nesakumar
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
Yogesh Fulara
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
Rushin Shah
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
Dushhyant Kumar
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
Aman Saurabh
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 
Utran architecture(rashmi)
Utran architecture(rashmi)Utran architecture(rashmi)
Utran architecture(rashmi)
Dr. ABHISHEK K PANDEY
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
Yara Ali
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 
mobile/wireless telephony
mobile/wireless telephonymobile/wireless telephony
mobile/wireless telephony
Shaurya
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
Jubayer Alam Shoikat
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
Joon Young Park
 
Wireless sensor Networks.ppt
Wireless sensor Networks.pptWireless sensor Networks.ppt
Wireless sensor Networks.ppt
MATRUSRI ENGINEERING COLLEGE
 
Canfis
CanfisCanfis
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
wsn networks
wsn networkswsn networks
wsn networks
snagendrareddy
 
Paging and Location Update
Paging and Location UpdatePaging and Location Update
Paging and Location Update
Abidullah Zarghoon
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
Miles Kevin Galario
 
Day 1.2 physical topologies
Day 1.2 physical topologiesDay 1.2 physical topologies
Day 1.2 physical topologies
CYBERINTELLIGENTS
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
Menaga Selvaraj
 

What's hot (20)

Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Utran architecture(rashmi)
Utran architecture(rashmi)Utran architecture(rashmi)
Utran architecture(rashmi)
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
mobile/wireless telephony
mobile/wireless telephonymobile/wireless telephony
mobile/wireless telephony
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
Wireless sensor Networks.ppt
Wireless sensor Networks.pptWireless sensor Networks.ppt
Wireless sensor Networks.ppt
 
Canfis
CanfisCanfis
Canfis
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
wsn networks
wsn networkswsn networks
wsn networks
 
Paging and Location Update
Paging and Location UpdatePaging and Location Update
Paging and Location Update
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
 
Day 1.2 physical topologies
Day 1.2 physical topologiesDay 1.2 physical topologies
Day 1.2 physical topologies
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 

Understanding the Logical and Physical design of IoT sureworks

  • 1. Understanding the Logical and Physical design of IoT With the web of Things (IoT) changing into vastly popular, corporations are chop-chop finding ways to use IoT and improve their efficiency. whereas IoT has many benefits, businesses are troubled to grasp the way to implement the technology in their work and regular life. This text can check up on the physical and logical design of iot and make a case for the variations between them. The logical design of IoT is an abstract illustration of processes and entities while not going into the lower-level details of the implementation. Logical design is a smaller amount careful than physical design and is a lot more conceptual. It’s the essential definition of how you would like all those devices to speak and exchange information, however it doesn’t specify a selected technology or product. Physical design is quite making products. it's concerning forming an overall intelligent system. the planning should be adjusted towards the tip user’s needs. However, in physical design, one understands the foremost effective methodology of storing and accessing those objects. “Things” in IoT Things seek advice from IoT devices with distinctive identities that have actuating, monitoring, and remote sensing capabilities. Things are the first element of IoT applications. IoT devices are of assorted types, together with sensiblewatches, sensing devices, smart natural philosophy appliances, automobiles, wearable sensors, and industrial machines. IoT devices generate knowledge in some type that results in helpful data once processed.
  • 2. Physical style of IoT A physical design of an IoT system refers to the individual node devices and their protocols that are used to make a purposeful IoT ecosystem. every node device will perform tasks similar to remote sensing, actuating, monitoring, etc., by looking forward to physically connected devices. it should conjointly be capable of transmission data through differing types of wireless or wired connections. The things/devices within the IoT system are used for: ● Building connections. ● Processing. ● Providing storage. ● Providing interfaces. ● Providing graphical interfaces. The devices generate knowledge, and also the data is employed to perform and do operations for raising the system. For instance, a wet device is used to get the moisture data from a location, and the system analyses it to offer an output. Logical style of IoT: A logical design for an IoT system is that the actual design of its parts (computers, sensors, and actuators) ought to be organized to complete a selected function. It doesn’t go in the depth of describing how every element are going to be engineered with low-level programming specifics. IoT logical style includes: ● IoT purposeful blocks: IoT systems include many functional blocks similar to Devices, communication, security, services, and application. The functional blocks offer sensing, identification, actuation, management, and communication capability.These functional blocks encompass devices that handle the communication between the server and also the host, change watching management functions, manage the information transfer, secure the IoT system mistreatment authentication and totally different functions, and supply Associate in Nursing interface for dominant and watching varied terms. ● IoT communications models: There are multiple styles of models offered in a web of Things system that's used for act between the system and server, such as: ● Request-response model. ● Push-pull model. ● Publish-subscribe model. ● Exclusive try model.
  • 3. ● IoT communication Api: Arthropod genus are wont to communicate between the server and system in IoT. Some API’s include: ● REST-based communication arthropod genus. ● Client-server. ● homeless. ● Cacheable. ● Websocket based mostly communication API. IoT Protocols: The set of rules governing all direct or indirect exchange of knowledge between computers on a network. These rules are developed at the applying level and are used to outline how devices communicate interoperably, regardless of variations in their internal styles and operations. IoT protocols facilitate sending commands and data between a network of devices controlled by sensors or alternative physical attributes like motion, temperature, or vibration. Network protocols help accomplish reliable data transfer across all layers just like the application, transport, network, and link layer. ● Application Layer Protocols: On this layer, protocols use an application interface to define how the data is sent over the network. These protocols embody HTTP, XMPP, WebSocket, DDS, MQTT, and AMQP. ● Transport Layer Protocols: This layer is chargeable for knowledge flow management and error handling, guaranteeing that there are rules in situ to subsume errors. This layer conjointly provides finish-to-end
  • 4. message transfer capability, freelance of the underlying network infrastructure. It provides essential property between the 2 nodes on either end of the point-to-send-point-receive model employed by key protocols similar to TCP/IP. ● Network Layer: This layer is employed to send data from a supply network to a destination network. For this, IPv4 and IPv6 protocols are used for host identification that transfers data in packets. ● Link Layer: Link-layer protocols are the kind of knowledge transmission protocol wont to facilitate sending data over the physical layer. They conjointly confirm however devices signal and code packets on the network.