Basics of IoT Networking
Devices Security. Power Management
Communication Protocols Scalability Regulatory Complianc
Connectivity Technologies Interoperability
Edge Computing Data Management and Analytics.
Components
Sensors Gateways: intermediaries between IoT Platforms: platforms that
Actuators IoT devices and the cloud facilitate the development,
Connectivity Hardware Cloud Infrastructure: backbone for deployment, and management
Embedded Systems: storing, processing, and analyzing User Interface (UI)
microcontrollerbased platforms IoT data Security Mechanism
Functional components of IoT
Perception Layer: Sensors and Actuators
Network Layer: Connectivity Technologies, Gateways, Edge Computing
Middleware Layer: Data Management, Security and Privacy, Device Management, Integration and Interoperability
Application Layer: IoT Applications, Analytics and Insights, User Interfaces (UI)
IoT service oriented architecture
Emphasizes the modularization of functionalities into loosely coupled, reusable services that communicate with each other
to achieve specific IoT goals, This architectural paradigm enables the rapid development and deployment of IoT applications
while supporting complex interactions and workflows in heterogeneous IoT environments.
Service Modules: decomposed into modular service units for a specific task or capability
Service Interface: Each service exposes a welldefined interface that specifies how other services or clients can interact with it
Loose Coupling: they have minimal dependencies on each other enables flexibility, scalability, and modifiability by allowing
services to be independently developed, deployed, and updated
Service Discovery and Registry: A service registry or directory facilitates the discovery and dynamic binding of services at
runtime. It maintains a catalog of available services, their locations, and their capabilities.
EventDriven Architecture:. Events represent meaningful occurrences or changes in the environment, such as sensor readings,
alarms, or user interactions.
Scalability and Elasticity: to accommodate growing numbers of devices, users, and data volumes.
Security and Governance: includes authentication, authorization, encryption, access control, and auditing features to protect
against unauthorized access, data breaches, and malicious attacks.
IEEE 802.15.4:
Standard: for lowrate wireless personal area networks (LRWPANs). specifies the physical (PHY) and media access control
(MAC) layers for shortrange, lowpower communication.
Physical Layer (PHY): operates in the 2.4 GHz ISM (Industrial, Scientific, and Medical) band or sub1 GHz bands, depending on
regional regulations
Media Access Control (MAC) Layer: mechanisms for channel access, addressing, frame formatting, and error detection
Topology: star, peertopeer (mesh), and hybrid configurations (e.g., routers).
6LoWPAN:
IPv6 Integration: the transmission of IPv6 packets. It allows IoT devices to leverage the vast address space and endtoend
connectivity of IPv6 for seamless integration with the internet.
Header Compression: larger header sizes which can be a challenge for resourceconstrained IoT devices with limited memory
and processing capabilities. compression techniques to reduce the overhead of IPv6 headers, making efficient use of
bandwidth and minimizing energy consumption.
Fragmentation and Reassembly
Routing: IPv6 routing commonly used in 6LoWPAN deployments to establish efficient routes and optimize network traffic.
ZigBee
wireless technology designed for lowpower, lowdatarate applications like home automation and sensor networks. reliable,
costeffective, and energyefficient communication over short distances. ZigBee networks can handle thousands of devices,
making them ideal for largescale IoT projects.
1. ZigBee Mesh: communicate through routers, multiple paths for better coverage and reliability. adapt to changes on own.
2. ZigBee Star: a central coordinator node communicates directly with end devices. simpler to set up, limited range, scalability.
3. ZigBee Cluster Tree: combine features of mesh and star topologies, using routers to extend coverage while maintaining a
central coordinator node. They offer a balance between scalability and simplicity.
RFID (RadioFrequency Identification):
RFID is a technology that uses radio waves to identify and track objects wirelessly. It consists of three main components:
RFID tags, RFID readers, and a backend system for data processing.
Features:
Contactless Identification Read/Write Capability: read/write Range: cm to m
Unique Identification unique operations, allowing data to be Durability: withstand harsh
identifier (UID) written to the tag's memory in environmental conditions
addition to reading its UID.
Working Principle:
When an RFID tag comes into the vicinity of an RFID reader, the reader emits radio waves.
The RFID tag receives the radio waves and uses the energy to power its circuit.
The RFID tag then modulates the radio waves and transmits its unique identifier (UID) back to the RFID reader.
The RFID reader captures the transmitted data and sends it to a backend system for processing.
Applications:
- Inventory Management - Asset Tracking - Animal Tracking
- Access Control - Payment Systems
NFC (Near Field Communication): shortrange wireless communication technology enables data exchange between
devices when they are brought within close proximity(in cm)
Applications:Mobile Payments, Access Control, Smart Posters and Marketing, Data Transfer
Bluetooth: Bluetooth is a wireless technology standard for shortrange communication between devices, typically
within a range of 10 meters.
Applications: Wireless Audio, Wearable Devices, IoT Devices, Automotive
Wireless Sensor Networks (WSN): WSNs consist of interconnected sensors distributed over a geographical area,
wirelessly transmitting data to a central node or gateway.
Applications: Environmental Monitoring, Healthcare, Structural Health Monitoring, Industrial Automation