Download presentation
Presentation is loading. Please wait.
Published bySven Nyström Modified over 5 years ago
1
Assist. Prof. Rassim Suliyev Zhumaniyaz Mamatnabiyev Week 7
IoT in Industry Assist. Prof. Rassim Suliyev Zhumaniyaz Mamatnabiyev Week 7
2
OUTLINE IoT Networks and Protocols Types of networks
Network mechanisms and processes Packet switching Converged networks Hosts Clients and servers Default gateway Network interface hardware Introduction to Packet Tracer Mobile wireless technologies
3
IoT Networks and Protocols | Introduction
When we look at an IoT system, we can see that sensors and actuators need to talk to controllers, and controllers need to talk to the Cloud. This communication takes place using protocols in layers. The communication is transportation of data.
4
IoT Networks and Protocols | Introduction
5
Types of networks The main objective of a network is to connect devices for data transmission. To achieve this objective, the interconnected networks are required to form the network of networks – known as the Internet.
6
Network mechanisms and processes | Datagrams
What makes data communications and networks unique is that the data stream is broken into pieces. Each piece of data (a collection of many bits) is generically called a datagram. Each datagram has a label (header) containing information about the data and, most importantly, where it is going to (destination address) and where it is coming from (source address). When a datagram is transmitted, the devices along the communication path examine the information in the header and make switching and forwarding decisions based on that information. This process is known as Packet switching.
7
Packet switching Transmitted datagrams effectively find their own way across an internetwork, because the intermediate devices decide where to send the datagram next based on the addressing information in each header. The process of packet switching, known as routing, will be explained further in Module 2. Advantages of packet switching include: Multiplexing Multiplexing enables multiple data streams to share a common network link by interleaving the datagrams of the different streams. Network resilience As each datagram is forwarded individually by each networking device, should one link to a destination become unavailable, subsequent datagrams addressed to that same destination can be re-directed along other links that provide a pathway to the same destination.
8
Converged networks
9
Hosts In networking, a host is an addressable (network identifiable) device that sends and receives datagrams. This includes individual devices such as PCs, laptops, printers, routers, smart phones, tables, sensors, cameras, and actuators. Note that these devices can be both actual hardware and virtualised (software) instances. Devices that only repeat or amplify datagrams without making switching decisions (repeaters and hubs), or that only interconnect devices (patch panels), are not considered to be hosts in this context. This means that in networking terms, the ‘things’ we connect are referred to as hosts.
10
Clients and servers
11
Host addressing To enable clients and servers to communicate across a network, and an internetwork, the sending and receiving hosts must be able to identify each other. To achieve this data communication, one addressing requirement is that each host be assigned a unique Internet Protocol (IP) address.
12
Default gateway The default gateway for a host is the IP address of the router interface that all hosts on one network are connected to. The router interface used as the default gateway for a network is literally that: a gateway. It is through this interface that all data traffic destined for other networks is sent, and through which all data traffic from other networks enters this network. Each host on the same network has a unique IPv4 address, but all share the same subnet mask, and the same default gateway IPv4 address.
13
Cables and media The key components of networks are: devices media
services
14
Network interface hardware
All networked devices require some electronic hardware to provide the connection point to the network medium being used. PCs and laptops usually have the electronics embedded or installed within the body of the device. For a cabled network connection, there is usually an ethernet RJ45 socket (plug), or less usually an optic fibre socket. This hardware is known as a Network Interface Card (NIC).
15
Bandwidth and throughput
Bandwidth and throughput are terms that describe the data carrying rate of network media.
16
Bandwidth Bandwidth is the specified (or ideal maximum) capacity of a medium to carry data. Digital bandwidth measures the amount of data that can flow from one place to another in a given amount of time. Bandwidth is typically measured in kilobits per second (kb/s), megabits per second (Mb/s), or gigabits per second (Gb/s). The practical bandwidth of a network is determined by: The properties of the physical media The technologies chosen for transmitting and detecting the signals on the media
17
Throughput and Goodput
Throughput is the measure of the actual transfer of bits across the media for a given period. Throughput usually does not match the specified maximum bandwidth of a physical layer implementation. Factors that influence throughput include: The amount of traffic The type of traffic The latency (delay) created by the number of network devices between source and destination In an internetwork or network with multiple segments, throughput cannot be faster than the slowest link in the path from source to destination. Goodput is a term sometimes used to describe the transfer rate of actual, usable data.
18
Introduction to Packet Tracer
Packet Tracer installation instructions: Installing Packet Tracer 7.1 on Windows and Linux Installing Packet Tracer 7.1 on Mac Creating an Ubuntu Virtual Machine
19
Mobile wireless technologies
Wireless technologies use electromagnetic waves to carry information between devices. Electromagnetic waves (electromagnetic radiation) travel through space-time (i.e. they don’t need a medium like water or air), and they carry electromagnetic radiant energy. Because they are waves they have a frequency and wavelength. Visible light is part of the electromagnetic spectrum, as are X-rays and microwaves. The part of the spectrum used by mobile wireless technologies are radio waves and microwaves. Radio waves are the waves of the spectrum that have the longest wavelength and the shortest frequency.
20
Mobile wireless technologies
21
Mobile wireless technologies
The wireless technologies most frequently used in local and personal area networks are in the unlicensed 2.4 GHz and 5 GHz frequency ranges.
22
Cellular data wireless systems
Unlike other wireless technologies, public switched cellular telecommunications operate within licensed bands of the radio spectrum, which requires licensing from the relevant government authority. Mobile cellular telephone systems began to be used for digital data communications (in addition to voice and SMS services) from the late 1990s, with the development of technologies such GPRS . Cell phone and data technologies have been labelled in ‘generations’ - G1, G2, G3, G4, and G5 - but these are just marketing names for groups of technologies, not specified standards.
23
Cellular data wireless systems
24
Cellular data wireless systems
Cell and smart phones are specifically switched to enable high speed 4G/LTE broadband Internet data services where available, in addition to voice communications. Given the often-wide coverage of 4G services available from telecommunications providers suitable for personal data usage (video streaming, for example), some use cases exist for IoT 4G/LTE applications. For example, building-monitored security and alarm systems may not have access to the appropriate public telecommunications cabling, so the sensor controller communicates with a central office using a 4G data service. Private 4G/LTE data services are also found in some remote mining operations. Public 4G/LTE services are typically not commercially available in these locations, so a private solution offers improved performance and range compared to traditional Wi-Fi solutions.
25
Wi-Fi Wi-Fi refers to the group of radio frequency (RF) standards used to provide data communications on a Wireless Local Area Network (WLAN). Wi-Fi operates in the unlicensed 2.4 and 5 Gigahertz (Ghz) ranges of the RF spectrum. The group of standards generally offer ranges of 20m (66 ft) to 250m (820 ft), and data rates between 1 Mb/s to 20 Gb/s.
26
Bluetooth Bluetooth is a low power, short range (typically less than 10 m (33 ft) up to 100 m (330 ft)), personal area network wireless technology. It enables mobile devices to connect to each other, and to wireless accessories, with minimal configuration. Bluetooth Low Energy (BLE) is used in healthcare, fitness, beacons, security, and home entertainment applications. Compared to classic Bluetooth, Bluetooth Low Energy provides considerably reduced power consumption (longer battery life) and lower costs, while maintaining a similar communication range. Mobile operating systems now natively support Bluetooth Low Energy. Up to eight Bluetooth devices can be connected at any one time.
27
Bluetooth Some examples of how devices use Bluetooth include:
Hands-free headset Keyboard or mouse Stereo control Car hands-free speakerphone Tethering (network connection sharing) Mobile speaker. Bluetooth can also offer some minimal level security for communications between connected devices. Public utility providers (for water, electricity, gas) can use handheld Bluetooth devices to remotely access the usage recording meter on house or business properties to read the customer's consumption from outside the property boundary.
28
Bluetooth
29
NFC Near-field communication (NFC) is a set of communication protocols that enable two electronic devices - typically portable devices such as smartphones - to establish low-speed communication by bringing them within 4 cm (1.6 in) of each other. NFC devices are used in contactless payment systems, like those used in credit cards and electronic ticket smartcards. NFC-enabled devices can act as electronic identity documents and keycards. The tag can also be passive (require no power) and still be detected by the scanning device, provided that the tag is within range. This makes it suitable for IoT applications. However, there is no default security (no pairing of devices like Bluetooth), so a tag could be read by an unauthorised device.
30
NFC
31
Any Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.