0% found this document useful (0 votes)
11 views13 pages

iot notes

The document provides an overview of the Internet of Things (IoT), detailing its definition, significance, communication models, logical design, challenges, and applications across various sectors. It also compares IoT with Machine-to-Machine (M2M) communication, discusses Software-Defined Networking (SDN) architecture, and outlines the requirements for managing IoT networks. Key features of IoT devices, the role of SDN and Network Function Virtualization (NFV), and the importance of systems management using protocols like NETCONF and YANG are also highlighted.

Uploaded by

anshumanjaiswal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views13 pages

iot notes

The document provides an overview of the Internet of Things (IoT), detailing its definition, significance, communication models, logical design, challenges, and applications across various sectors. It also compares IoT with Machine-to-Machine (M2M) communication, discusses Software-Defined Networking (SDN) architecture, and outlines the requirements for managing IoT networks. Key features of IoT devices, the role of SDN and Network Function Virtualization (NFV), and the importance of systems management using protocols like NETCONF and YANG are also highlighted.

Uploaded by

anshumanjaiswal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

UNIT 1

1. Concept of IoT and Its Significance

Definition:

• IoT = network of physical objects embedded with sensors, software, actuators, and
connectivity

• Enables devices to collect and exchange data over the internet

• No human-to-human or human-to-computer interaction required

• Term coined by Kevin Ashton in 1999

• Connects the physical world to the digital world

Significance:

• Enables automation, remote monitoring, and intelligent decision-making at scale

• Reduces human error and improves efficiency

• Enables predictive maintenance in industries

• Generates large volumes of data that fuel AI and analytics

• Reshapes industries: healthcare, agriculture, manufacturing

• Smart cities use IoT for traffic, waste, and energy management

• Enables Industry 4.0 — cyber-physical systems in manufacturing

• Economic impact projected in trillions of dollars globally

2. Communication Models in IoT

Device-to-Device (D2D):

• Two or more devices communicate directly without an intermediary server

• Uses protocols like Zigbee or Bluetooth

• Low-latency and efficient for local control

• Limited in range and scalability

• Example: smart locks and lighting systems in smart homes

Device-to-Cloud:

• Devices connect directly to a cloud service provider

• Most common IoT communication model

• Offers scalability and remote access

• Depends heavily on internet connectivity


• Example: smart thermostat sending data to AWS IoT

Device-to-Gateway:

• Devices communicate with an intermediate gateway

• Gateway aggregates data and forwards to cloud/server

• Necessary when devices use low-power protocols (Zigbee, Z-Wave)

• Gateway acts as a protocol translator

• Example: industrial IoT sensors connecting via gateway

Back-End Data Sharing:

• Multiple cloud platforms share and analyze data from IoT devices

• Supports interoperability across organizations

• Used in smart city infrastructure

• Example: different city agencies sharing real-time sensor data

Comparison Table:

Model Direct Internet? Scalability Latency Use Case

D2D No Low Very Low Home automation

D2Cloud Yes High Medium Wearables, tracking

D2Gateway No (via GW) Medium Low-Medium Industrial IoT

Back-End Sharing Yes Very High High Smart cities

3. Logical Design of IoT — Functional Blocks

Device Block:

• Physical "thing" with sensors and actuators

• Collects real-world data (temperature, motion, pressure)

• Performs physical actions (open valve, turn on motor)

Communication Block:

• Handles data transmission between devices and system

• Includes hardware interfaces: Wi-Fi, Zigbee, LTE

• Includes protocols: MQTT, CoAP, HTTP

Services Block:

• Middleware services for device management


• Handles data publishing/subscribing

• Enables service discovery

• Abstracts hardware complexity from applications

Management Block:

• Covers operational aspects of the system

• Includes fault management, configuration, performance monitoring

• Handles security operations

• Uses protocols like NETCONF and YANG

Security Block:

• Ensures authentication and authorization

• Provides data integrity and encryption

• Cross-cutting concern embedded throughout all layers

Application Block:

• Top-level user-facing layer

• Data is visualized, analyzed, and acted upon

• Includes dashboards, mobile apps, analytics platforms

4. Major Challenges Facing IoT Implementation

Security and Privacy:

• IoT devices are resource-constrained and cannot run heavy encryption

• Become easy entry points for cyberattacks

• Mirai botnet attack (2016) hijacked millions of IoT devices

• Smart devices collect deeply personal data raising privacy concerns

Interoperability:

• Thousands of vendors use different protocols and platforms

• No universal standard exists across the ecosystem

• Devices from different vendors may not communicate with each other

• Fragments the overall IoT ecosystem

Scalability:

• Billions of devices coming online simultaneously

• Traditional centralized architectures struggle to keep up


• Networks, cloud platforms, and data pipelines must scale massively

Power and Energy Constraints:

• Many IoT devices are battery-operated

• Must run for months or years without recharging

• Energy-efficient protocols and hardware design are critical

Data Management:

• IoT generates massive volumes of data continuously

• Storing, processing, and extracting insights in real time is challenging

• Requires robust big data infrastructure

Reliability and Connectivity:

• Network connectivity may be intermittent in remote/industrial settings

• Systems must be resilient and capable of offline operation

Regulatory and Legal Issues:

• Data sovereignty and compliance with GDPR adds complexity

• Liability for device failures is legally unclear

• Global deployments face different laws in different countries

5. Applications of IoT Across Different Sectors

Smart Home:

• Automated lighting and smart thermostats (e.g., Nest)

• Security cameras and voice assistants (e.g., Alexa)

• Connected appliances improve comfort and energy efficiency

Healthcare:

• Wearable devices monitor heart rate, glucose, oxygen levels

• Remote patient monitoring reduces hospital admissions

• Smart pills can track drug ingestion in real time

Agriculture (Precision Farming):

• Soil moisture sensors optimize irrigation

• Drone-based crop monitoring improves yield

• Automated systems reduce water and fertilizer waste

Manufacturing (IIoT):
• Predictive maintenance of machinery reduces downtime

• Real-time quality control on factory floors

• Robot coordination and automation enabled

Smart Cities:

• IoT sensors manage traffic lights intelligently

• Monitor air quality and environmental conditions

• Optimize waste collection routes and public lighting

Transportation and Logistics:

• Fleet tracking and cold chain monitoring

• Predictive vehicle maintenance

• V2V (vehicle-to-vehicle) communication for safety

Energy Management:

• Smart meters track consumption in real time

• Smart grids balance supply and demand dynamically

• Better integration of renewable energy sources

Retail:

• Smart shelves track inventory automatically

• Beacons personalize in-store customer experiences

• Connected checkout systems reduce queues

6. Physical Architecture of an IoT System

Perception Layer (Device Layer) — Bottom Layer:

• Contains physical sensors: temperature, humidity, motion, GPS

• Contains actuators: motors, relays, valves

• Uses embedded processors: Arduino, Raspberry Pi, ARM Cortex

• Directly interacts with the physical environment

Network Layer (Communication Layer) — Middle Layer:

• Transmits data from devices to processing systems

• PAN technologies: Bluetooth, Zigbee (short range)

• LAN technologies: Wi-Fi, Ethernet (medium range)

• WAN technologies: 4G/5G, LoRa, NB-IoT (long range)


• Gateways bridge short-range protocols to internet protocols

Application Layer (Processing/Service Layer) — Top Layer:

• Stores, processes, and presents data to users

• Includes cloud platforms: AWS IoT, Azure IoT Hub, Google Cloud IoT

• Includes databases, analytics engines, and dashboards

• User-facing applications: mobile apps, APIs, web portals

Fog/Edge Computing Layer (Modern Addition):

• Sits between network and application layers

• Processes data closer to the source

• Reduces latency and bandwidth requirements to cloud

7. Key Characteristics of IoT Devices

• Connectivity: Must connect to a network directly or via gateway using Wi-Fi, Bluetooth,
Zigbee, cellular, etc.

• Sensing/Actuation: Can sense environmental data through sensors or perform actions via
actuators, or both

• Heterogeneity: Extremely diverse in hardware, software, OS, and communication protocols

• Resource Constraints: Limited CPU power, memory, storage, and battery capacity

• Dynamic Nature: Devices join/leave networks constantly; operational context shifts


continuously

• Intelligence: Many modern devices embed on-device ML (TinyML) for local decision-making

• Scalability: Infrastructure must handle millions or billions of devices simultaneously

• Safety: Must meet safety standards, especially in industrial, medical, and automotive
contexts

UNIT 2

1. IoT and M2M Communication

M2M (Machine-to-Machine):

• Direct communication between devices without human intervention

• Uses any communication channel — wired or wireless

• Predates IoT; used in industrial SCADA and telemetry systems


• Typically point-to-point using proprietary protocols

• Operates over closed, private networks

IoT:

• Builds upon and extends M2M concepts

• Open, IP-based, internet-connected ecosystem

• Devices interact with each other, cloud services, and humans

• Adds intelligence, interoperability, and global connectivity

Key Relationship:

• M2M is a subset and predecessor of IoT

• IoT adds cloud platforms, analytics, and human-machine interfaces on top of M2M principles

2. Architecture of SDN

Overview:

• SDN = Software-Defined Networking

• Decouples the control plane (decision-making) from the data plane (packet forwarding)

• Centralizes network intelligence in software

Application Layer (Top):

• SDN applications define network behavior

• Includes: load balancing, firewalls, traffic engineering

• Communicates with controller via Northbound Interface (NBI)

• NBI is typically REST-based API

Control Layer (Middle):

• Contains the SDN Controller — the "brain" of the network

• Maintains a global view of the network topology

• Programs forwarding behavior of all switches

• Examples: OpenDaylight, ONOS, Floodlight

• Communicates downward via Southbound Interface (SBI)

Infrastructure Layer (Bottom):

• Physical or virtual network devices (switches, routers)

• Forwards traffic based on rules from the controller

• OpenFlow is the most common SBI protocol


• Controller populates flow tables in switches via OpenFlow

East-Westbound Interfaces:

• Allow communication between multiple SDN controllers

• Enables federated control across different network domains

3. Key Features and Applications of M2M

Key Features:

• Autonomous operation — no human in the loop required

• Real-time data collection from remote devices

• Uses embedded SIM cards or dedicated radio modules

• Low-power consumption for remote/battery-operated deployment

• Uses both licensed spectrum (2G/3G/4G) and unlicensed (Wi-Fi, Zigbee)

• Operates in vertical silos — each application has dedicated infrastructure

• Uses proprietary protocols unlike IoT's open standards

Applications:

• Utilities: Smart metering for electricity, water, gas — eliminates manual reading

• Transportation: Vehicle tracking and fleet management systems

• Healthcare: Remote patient monitoring via connected medical devices

• Vending Machines: Operators remotely check stock levels and receive fault alerts

• Security Systems: Alarm systems automatically connected to monitoring centers

• Industrial: SCADA systems for monitoring and controlling industrial processes

4. Rule Replacement in SDN

Background:

• Network devices (switches) maintain flow tables with rules for handling packets

• Each rule has: match field (source IP, destination port), action (forward/drop/modify),
priority, and timeout

• Hardware switches have limited TCAM memory for flow tables

Why Rule Replacement is Needed:

• When flow table reaches capacity, old rules must be removed to make space for new ones

• Similar to cache replacement in computer architecture


• Critical in IoT-SDN because IoT generates enormous numbers of short-lived flows

Replacement Strategies:

• LRU (Least Recently Used): Remove the rule with the oldest last-access timestamp

• LFU (Least Frequently Used): Remove the rule accessed least often

• TTL-based Expiry: Rules expire automatically after a timeout period defined at installation

Impact of Poor Rule Replacement:

• Increases flow setup latency — controller must be contacted for every cache miss

• Degrades overall network performance

• Especially harmful in high-traffic IoT environments

5. Differences Between IoT and M2M

Dimension M2M IoT

Communication Point-to-point Many-to-many, cloud-centric

Network Proprietary, closed IP-based, open internet

Architecture Vertical silos Horizontal platform

Intelligence Device-level only Cloud + device + edge

Scalability Limited Virtually unlimited

Standards Proprietary Open (MQTT, CoAP, REST)

Human Interaction Minimal Significant (apps, dashboards)

Data Usage Operational data only Big data, analytics, AI

Examples SCADA, telemetry Smart home, smart city

Summary:

• M2M focuses on connecting machines for specific tasks using closed systems

• IoT creates an open, intelligent, scalable ecosystem far beyond M2M's scope

• M2M is considered a subset and predecessor of IoT

6. Requirements of Network Operators in Managing IoT

Device Onboarding and Provisioning:

• Millions of devices need zero-touch provisioning

• Devices must connect, authenticate, and receive configuration automatically


• No manual intervention should be required at scale

Remote Configuration and Updates:

• Devices often deployed in inaccessible locations

• Operators must push firmware updates and security patches over-the-air (OTA)

• Configuration changes must be deployable remotely

Monitoring and Fault Management:

• Continuous monitoring of device health, connectivity, and performance

• Automated fault detection and alerting systems required

• Reduces operational costs significantly

Security Management:

• Enforce strong authentication mechanisms

• Manage certificates and cryptographic keys

• Detect anomalous behavior indicating device compromise

• Quickly isolate and quarantine infected devices

Quality of Service (QoS):

• Different IoT applications have different latency/bandwidth needs

• Real-time control systems need low latency

• Bulk sensor data can tolerate delays

• Operators must prioritize traffic intelligently

Scalability:

• Management systems must handle billions of endpoints

• Requires distributed, cloud-native management architectures

Interoperability:

• Operators manage heterogeneous device ecosystems

• Standards-based protocols required: NETCONF, YANG, SNMP, TR-069

7. Roles of SDN and NFV in IoT

SDN in IoT:

• Provides programmable, centralized control to IoT networks

• Controller dynamically adjusts routing, security policies, and bandwidth allocation

• Network adapts rapidly to changing device states


• Enables network slicing — logically separate virtual networks on shared physical
infrastructure

• Isolates different IoT applications for security and performance

• Single control point manages entire IoT network instead of device-by-device configuration

NFV in IoT:

• NFV = Network Function Virtualization

• Replaces dedicated hardware appliances with software on commodity servers

• Virtual functions include: firewalls, NAT gateways, load balancers, protocol converters

• IoT gateways and edge nodes use NFV for protocol translation and data aggregation

• Functions can be deployed, scaled, and updated in software without hardware changes

• Example: virtual firewall instantiated on demand when a new IoT device type joins the
network

Combined Impact of SDN + NFV:

• Together they enable "programmable infrastructure" for large-scale IoT

• Dynamic, automated, scalable, and cost-efficient network management

• Overcomes limitations of traditional hardware-centric networking

• Essential for managing billions of heterogeneous IoT devices efficiently

8. IoT Systems Management: NETCONF and YANG (10M)

Importance of IoT Systems Management:

• Encompasses monitoring, configuring, maintaining, and securing IoT devices

• At millions of devices, manual management is impossible

• Automated, standardized management is absolutely necessary

• Poor management leads to security vulnerabilities (unpatched devices)

• Poor management causes service degradation and operational chaos

• Must address: configuration, fault, performance, security, and lifecycle management

NETCONF (Network Configuration Protocol):

• IETF-standardized protocol — RFC 6241

• Designed for installing, manipulating, and deleting network device configurations

• Operates over SSH for secure transport

• Uses XML for data encoding


• Transactional in nature — ensures configuration consistency

NETCONF Operations:

• get — retrieve operational state data

• get-config — retrieve configuration data

• edit-config — modify configuration

• copy-config — copy one datastore to another

• delete-config — delete a configuration datastore

• lock/unlock — prevent concurrent modification

• commit — apply candidate configuration to running state

NETCONF Datastores:

• Running — currently active configuration on the device

• Candidate — proposed configuration being edited/tested

• Startup — configuration loaded when device boots

Benefits of NETCONF in IoT:

• Remotely configure gateways, edge routers, and IoT devices

• Transactional commits prevent partial or broken configurations

• Standardized interface works across multiple vendors

YANG (Yet Another Next Generation):

• Data modeling language — RFC 6020 and RFC 7950

• Models the configuration and operational state data that NETCONF manages

• Defines structure, syntax, and semantics of network data

• Human-readable and machine-processable format

• Data is modeled as a tree of nodes

Key YANG Constructs:

• module — top-level container for a YANG model

• container — grouping of related nodes

• list — sequence of entries identified by a key

• leaf — single data value (like a variable)

• leaf-list — sequence of single values

• typedef — reusable type definitions


• RPC — remote procedure call definitions

• notification — event-driven communication definitions

Example YANG Model for IoT Sensor:

• Container: "sensor"

• Leaves: sensor-id, location, current-temperature, threshold, alert-enabled

• Operator uses NETCONF to read temperature, update threshold, or enable alerts

Significance of NETCONF + YANG in IoT:

• Provides vendor-neutral, standardized interface for IoT device management

• Vital for interoperability in heterogeneous IoT ecosystems

• YANG models can be shared publicly between vendors

• Management systems can configure devices from any vendor using published YANG models

• Major step toward plug-and-play IoT vision

• OpenConfig and IETF YANG modules accelerating standardization

• YANG models consumed by SDN controllers for automated management

• Enables intent-based management — operators specify desired outcomes, system figures


out configuration

• Key enabler for autonomous IoT network operations

You might also like