MODULE 2 Iot

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 70

MODULE 1:

Introduction
In this module, we will provide a thorough overview of what the Internet of Things is,
what it can do, and where it is going. The knowledge you gain will enable you to be part
of the IoT revolution. We will help you to plant the seeds of your IoT project ideas and
discover what you need to make them grow.

Objectives:

After completing this module, you will be able to:

1. Apply G-Suite App learned in Coursera in Collaborating with your classmates. 


2. Demystifying the meaning of the internet 
3. Determine different IoT application in the society
4. Formulate your objectives and motivation in writing your proposal. 

Lesson 1: Evolution of Internet of


Things
Lesson 1: Evolution of Internet of Things
The Internet of Things (IoT), sometimes referred to as the Internet of Objects, will
change everything—including ourselves. This may seem like a bold statement, but
consider the impact the Internet already has had on education, communication,
business, science, government, and humanity. Clearly, the Internet is one of the most
important and powerful creations in all of human history. Now consider that IoT
represents the next evolution of the Internet, taking a huge leap in its ability to gather,
analyze, and distribute data that we can turn into information, knowledge, and,
ultimately, wisdom. In this context, IoT becomes immensely important.

Lesson 1: Evolution of Internet of


Things-2
             Already, IoT projects are under way that promise to close the gap between poor
and rich, improve distribution of the world’s resources to those who need them most,
and help us understand our planet so we can be more proactive and less reactive. Even
so, several barriers exist that threaten to slow IoT development, including the transition
to IPv6, having a common set of standards, and developing energy sources for millions
—even billions—of minute sensors.
          However, as businesses, governments, standards bodies, and academia work
together to solve these challenges, IoT will continue to progress. The goal of this
module is to educate you in plain and simple terms so you can be well versed in IoT and
understand its potential to change everything we know to be true today.
 

Lesson 1: Evolution of Internet of


Things-3
  To hear more on the evolution of the internet here's a video from Brian McCarson CTO
of IoT strategy for Intel, who will explain what the Internet of Things is, its history and
how we got here. 
       The Evolution of IoT: Connect the Unconnected

The Evolution of IoT: Smart and Connect Things

The Evolution of IoT: Software-Defined Autonomous World

A Very Short
History
Of The Internet Of
Things
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

INTRODUCTION
There have been visions of smart, communicating
objects even before the global computer network
was
launched fortyfive years ago. As the Internet has
grown
to link all signs of intelligence (i.e., software)
around the
world, a number of other terms associated with
the idea
and practice of connecting everything to
everything have
made their appearance, including machineto-
machine
(M2M), Radio Frequency Identification (RFID),
context
aware computing, wearables, ubiquitous
computing, and
the Web of Things. Here are a few milestones in
the
evolution of the mashing of the physical with the
digital.
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1932
Jay B. Nash writes in Spectatoritis: “Within our
grasp is the
leisure of the Greek citizen, made possible by our
mechanical slaves, which
far outnumber his twelve to fifteen per free man...
As we step into a room, at
the touch of a button a dozen light our way.
Another slave sits twentyfour
hours a day at our thermostat, regulating the heat
of our home. Another sits
night and day at our automatic refrigerator. They
start our car; run our
motors; shine our shoes; and cult our hair. They
practically eliminate time and
space by their very fleetness.”.Jay B. Nash

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

January 13, 1946


The 2Way Wrist Radio, worn as
a
wristwatch by Dick Tracy and
members of
the police force, makes its first
appearance
and becomes one of the comic
strip's most
recognizable icons.

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1949
The bar code is conceived when 27 year
old Norman Joseph Woodland draws four
lines in the sand on a Miami beach.
Woodland, who later became an IBM
engineer, received (with Bernard Silver)
the first patent for a linear bar code in
1952. More than twenty years later,
another IBMer, George Laurer, was one
of those primarily responsible for refining
the idea for use by supermarkets.

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1955
Edward O. Thorp conceives of the
first wearable computer, a cigarette
packsized analog device, used for
the sole purpose of predicting
roulette
wheels. Developed further with the
help of Claude Shannon, it was
tested
in Las Vegas in the summer of 1961,
but its existence was revealed only in
1966.
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

October 4, 1960
Morton Heilig receives a patent for
the firstever head
mounted display.

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1967
Hubert Upton invents an analog
wearable computer with
eyeglassmounted display to aid in lip
reading. CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY
2018

1967
Hubert Upton invents an analog
wearable computer with
eyeglassmounted display to aid in lip
reading.

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

October 29, 1969


The first message is sent over
the ARPANET,
the predecessor of the
Internet.

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

January 23, 1973


Mario Cardullo receives the first
patent for a passive, read
write RFID tag. CENTRO ESCOLAR UNIVERSITY FOR INTERNAL
CIRCULATION ONLY 2018
January 23, 1973
Mario Cardullo receives the first
patent for a passive, read
write RFID tag.

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

June 26, 1974


A Universal Product Code (UPC)
label is used to ring up
purchases at a supermarket for the
first time.

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1977
CC Collins develops an aid to the blind, a five-
pound wearable with a head
mounted camera that converted images into a
tactile grid on a vest.

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

Early 1980s
Members of the CarnegieMellon
Computer Science
department install microswitches in
the Coke vending machine and
connect them to the PDP10
departmental computer so they could
see on their computer terminals how
many bottles were present in
the machine and whether they were
cold or not.
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1981
While still in high school, Steve Mann
develops a backpackmounted
“wearable personal computerimaging
system and lighting kit.” CENTRO ESCOLAR UNIVERSITY
FOR INTERNAL CIRCULATION ONLY 2018

1981
While still in high school, Steve Mann
develops a backpackmounted
“wearable personal computerimaging
system and lighting kit.”
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1990
The Active Badge system provides a
means of locating individuals
within a building by determining the
location of their Active
Badge. This small device worn by
personnel transmits a unique infra
red signal every 10 seconds. CENTRO ESCOLAR
UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1990
The Active Badge system provides a
means of locating individuals
within a building by determining the
location of their Active
Badge. This small device worn by
personnel transmits a unique infra
red signal every 10 seconds.

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

September 1991
Xerox PARC’s Mark Weiser
publishes “The Computer in the 21st
Century” in Scientific American, using the
terms “ubiquitous computing” and
“embodied virtuality” to describe his
vision of how “specialized elements of
hardware and software, connected by
wires, radio waves and infrared, will be so
ubiquitous that no one will notice their
presence.”CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY
2018

September 1991
Xerox PARC’s Mark Weiser
publishes “The Computer in the 21st
Century” in Scientific American, using the
terms “ubiquitous computing” and
“embodied virtuality” to describe his
vision of how “specialized elements of
hardware and software, connected by
wires, radio waves and infrared, will be so
ubiquitous that no one will notice their
presence.”
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1993
MIT’s Thad Starner
starts using a specially
rigged computer and
headsup display as a
wearable

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1993
Columbia University’s Steven Feiner,
Blair MacIntyre, and Dorée
Seligmann
develop KARMAKnowledgebased
Augmented Reality for Maintenance
Assistance. KARMA overlaid
wireframe
schematics and maintenance
instructions on top of whatever was
being repaired. CENTRO ESCOLAR UNIVERSITY FOR INTERNAL
CIRCULATION ONLY 2018

1993
Columbia University’s Steven Feiner,
Blair MacIntyre, and Dorée
Seligmann
develop KARMAKnowledgebased
Augmented Reality for Maintenance
Assistance. KARMA overlaid
wireframe
schematics and maintenance
instructions on top of whatever was
being repaired.
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1994
Xerox EuroPARC’s Mik Lamming and Mike Flynn
demonstrate the ForgetMeNot, a
wearable device that communicates via wireless
transmitters and records interactions with
people and devices, storing the information in a
database.CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1994
Xerox EuroPARC’s Mik Lamming and Mike Flynn
demonstrate the ForgetMeNot, a
wearable device that communicates via wireless
transmitters and records interactions with
people and devices, storing the information in a
database.

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1994
Steve Mann develops a wearable
wireless webcam,
considered the first example of
lifelogging. CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION
ONLY 2018

1994
Steve Mann develops a wearable
wireless webcam,
considered the first example of
lifelogging.

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

September 1994
The term ‘contextaware’
is first used by B.N. Schilit and
M.M. Theimer in
“Disseminating active map
information to mobile hosts,”
Network, Vol. 8, Issue 5. CENTRO ESCOLAR
UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

September 1994
The term ‘contextaware’
is first used by B.N. Schilit and
M.M. Theimer in
“Disseminating active map
information to mobile hosts,”
Network, Vol. 8, Issue 5.

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1995
Siemens sets up a dedicated
department inside its mobile
phones business unit to develop and
launch a GSM data module
called “M1” for machinetomachine
(M2M) industrial applications,
enabling machines to communicate
over wireless networks. The first
M1 module was used for point of sale
(POS) terminals, in vehicle
telematics, remote monitoring and
tracking and tracing applications. CENTRO
ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1995
Siemens sets up a dedicated
department inside its mobile
phones business unit to develop and
launch a GSM data module
called “M1” for machinetomachine
(M2M) industrial applications,
enabling machines to communicate
over wireless networks. The first
M1 module was used for point of sale
(POS) terminals, in vehicle
telematics, remote monitoring and
tracking and tracing applications.
CENTRO ESCOLAR UNIVERSITY

December 1995
FOR INTERNAL CIRCULATION ONLY 2018

MIT’s Nicholas Negroponte and


Neil Gershenfeld write in
“Wearable Computing” in Wired:
“For hardware and software
to comfortably follow you around,
they must merge into
softwear... The difference in time
between loony ideas and
shipped products is shrinking so
fast that it's now, oh, about a
week.” CENTRO ESCOLAR UNIVERSITY

December 1995
FOR INTERNAL CIRCULATION ONLY 2018

MIT’s Nicholas Negroponte and


Neil Gershenfeld write in
“Wearable Computing” in Wired:
“For hardware and software
to comfortably follow you around,
they must merge into
softwear... The difference in time
between loony ideas and
shipped products is shrinking so
fast that it's now, oh, about a
week.”

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

October 13-14, 1997


CarnegieMellon, MIT, and
Georgia Tech cohost the first
IEEE International Symposium
on Wearable Computers, in
Cambridge, MA CENTRO ESCOLAR UNIVERSITY FOR INTERNAL
CIRCULATION ONLY 2018
October 13-14, 1997
CarnegieMellon, MIT, and
Georgia Tech cohost the first
IEEE International Symposium
on Wearable Computers, in
Cambridge, MA

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1999
The AutoID (for Automatic
Identification) Center is
established at MIT. Sanjay
Sarma, David Brock and
Kevin Ashton turned RFID into
a networking technology
by linking objects to the
Internet through the RFID tag.

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

1999
Neil Gershenfeld writes in When Things
Start to Think:
“Beyond seeking to make computers
ubiquitous, we should
try to make them unobtrusive.... For all
the coverage of the
growth of the Internet and the World Wide
Web, a far
bigger change is coming as the number of
things using the
Net dwarf the number of people. The real
promise of
connecting computers is to free people,
by embedding the
means to solve problems in the things
around us.”

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

January 1, 2001
David Brock, codirector of MIT’s AutoID
Center, writes in a white paper
titled “The Electronic Product Code
(EPC): A Naming Scheme for Physical
Objects”: “For over twentyfive years, the
Universal Product Code (UPC or
‘bar code’) has helped streamline retail
checkout and inventory
processes... To take advantage of [the
Internet’s] infrastructure, we
propose a new object identification
scheme, the Electronic Product Code
(EPC), which uniquely identifies objects
and facilitates tracking throughout
the product life cycle.”
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

March 18, 2002


Chana Schoenberger and Bruce
Upbin publish "The Internet of
Things” in Forbes. They quote
Kevin Ashton of MIT’s AutoID
Center: “We need an internet for
things, a standardized way for
computers to understand the real
world.” CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY
2018

March 18, 2002


Chana Schoenberger and Bruce
Upbin publish "The Internet of
Things” in Forbes. They quote
Kevin Ashton of MIT’s AutoID
Center: “We need an internet for
things, a standardized way for
computers to understand the real
world.”

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

April 2002
Jim Waldo writes in “Virtual Organizations,
Pervasive Computing, and an Infrastructure for
Networking at the Edge,” in the Journal of
Information Systems Frontiers: “...the Internet is
becoming the communication fabric for devices to
talk to services, which in turn talk to other
services. Humans are quickly becoming a minority
on the Internet, and the majority
stakeholders are computational entities that are
interacting with other computational entities
without human intervention.”CENTRO ESCOLAR UNIVERSITY FOR
INTERNAL CIRCULATION ONLY 2018

April 2002
Jim Waldo writes in “Virtual Organizations,
Pervasive Computing, and an Infrastructure for
Networking at the Edge,” in the Journal of
Information Systems Frontiers: “...the Internet is
becoming the communication fabric for devices to
talk to services, which in turn talk to other
services. Humans are quickly becoming a minority
on the Internet, and the majority
stakeholders are computational entities that are
interacting with other computational entities
without human intervention.”

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

June 2002
Glover Ferguson, chief scientist for Accenture,
writes in “Have Your Objects
Call My Objects” in the Harvard Business Review:
“It’s no exaggeration to
say that a tiny tag may one day transform your
own business. And that day
may not be very far off.”.CENTRO ESCOLAR UNIVERSITY FOR
INTERNAL CIRCULATION ONLY 2018

June 2002
Glover Ferguson, chief scientist for Accenture,
writes in “Have Your Objects
Call My Objects” in the Harvard Business Review:
“It’s no exaggeration to
say that a tiny tag may one day transform your
own business. And that day
may not be very far off.”.

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

January 2003
Bernard Traversat et al. publish “Project JXTAC:
Enabling a
Web of Things” in HICSS '03 Proceedings of the
36th Annual
Hawaii International Conference on System
Sciences. They
write: “The opensource Project JXTA was initiated
a year ago to
specify a standard set of protocols for ad hoc,
pervasive, peerto
peer computing as a foundation of the upcoming
Web of
Things.”
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

October 2003
Sean Dodson writes in the Guardian: ”Last month,
a controversial network to connect many of
the millions of tags that are already in the world
(and the billions more on their way) was
launched at the McCormick Place conference
centre on the banks of Lake Michigan. Roughly
1,000 delegates from across the worlds of retail,
technology and academia gathered for the
launch of the electronic product code (EPC)
network. Their aim was to replace the global
barcode with a universal system that can provide
a unique number for every object in the
world. Some have already started calling this
network ‘the internet of things’.”CENTRO ESCOLAR UNIVERSITY
FOR INTERNAL CIRCULATION ONLY 2018

October 2003
Sean Dodson writes in the Guardian: ”Last month,
a controversial network to connect many of
the millions of tags that are already in the world
(and the billions more on their way) was
launched at the McCormick Place conference
centre on the banks of Lake Michigan. Roughly
1,000 delegates from across the worlds of retail,
technology and academia gathered for the
launch of the electronic product code (EPC)
network. Their aim was to replace the global
barcode with a universal system that can provide
a unique number for every object in the
world. Some have already started calling this
network ‘the internet of things’.”

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

August 2004
Sciencefiction writer Bruce Sterling introduces
the concept of “Spime” at SIGGRAPH,
describing it as “a neologism for an imaginary
object that is still speculative. A Spime also
has a kind of person who makes it and uses
it, and that kind of person is somebody called
a ‘Wrangler.’ ... The most important thing to
know about Spimes is that they are precisely
located in space and time. They have histories.
They are
recorded, tracked, inventoried, and always
associated with a story... In the future, an object's
life begins
on a graphics screen. It is born digital. Its design
specs accompany it throughout its life. It is
inseparable
from that original digital blueprint, which rules the
material world. This object is going to tell you – if
you
ask – everything that an expert would tell you
about it. Because it WANTS you to become an
expert.”CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

August 2004
Sciencefiction writer Bruce Sterling introduces
the concept of “Spime” at SIGGRAPH,
describing it as “a neologism for an imaginary
object that is still speculative. A Spime also
has a kind of person who makes it and uses
it, and that kind of person is somebody called
a ‘Wrangler.’ ... The most important thing to
know about Spimes is that they are precisely
located in space and time. They have histories.
They are
recorded, tracked, inventoried, and always
associated with a story... In the future, an object's
life begins
on a graphics screen. It is born digital. Its design
specs accompany it throughout its life. It is
inseparable
from that original digital blueprint, which rules the
material world. This object is going to tell you – if
you
ask – everything that an expert would tell you
about it. Because it WANTS you to become an
expert.”

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

September 2004
G. Lawton writes in “Machinetomachine
technology gears up for growth” in
Computer: “There are many more machines—
defined as things with mechanical,
electrical, or electronic properties—in the world
than people. And a growing number
of machines are networked... M2M is based on
the idea that a machine has more
value when it is networked and that the network
becomes more valuable as more
machines are connected.”
Invented Touchscreens Discovered a Grayware VirusCENTRO ESCOLAR
UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

September 2004
G. Lawton writes in “Machinetomachine
technology gears up for growth” in
Computer: “There are many more machines—
defined as things with mechanical,
electrical, or electronic properties—in the world
than people. And a growing number
of machines are networked... M2M is based on
the idea that a machine has more
value when it is networked and that the network
becomes more valuable as more
machines are connected.”
Invented Touchscreens Discovered a Grayware Virus

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

October 2004
Neil Gershenfeld, Raffi Krikorian and Danny
Cohen write in “The
Internet of Things” in Scientific American: “Giving
everyday objects the
ability to connect to a data network would have a
range of benefits:
making it easier for homeowners to configure their
lights and switches,
reducing the cost and complexity of building
construction, assisting with
home health care. Many alternative standards
currently compete to do
just that—a situation reminiscent of the early days
of the Internet, when
computers and networks came in multiple
incompatible types.”

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

October 25, 2004


Robert Weisman writes in the Boston Globe: “The ultimate
vision, hatched in university laboratories
at MIT and Berkeley in the 1990s, is an ‘Internet of things’
linking tens of thousands of sensor mesh
networks. They'll monitor the cargo in shipping containers, the
air ducts in hotels, the fish in
refrigerated trucks, and the lighting and heating in homes and
industrial plants. But the nascent
sensor industry faces a number of obstacles, including the need
for a networking standard that can
encompass its diverse applications, competition from other
wireless standards, security jitters over
the transmitting of corporate data, and some of the same
privacy concerns that have dogged other
emerging technologies.”

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

2005
A team of faculty members at the Interaction
Design Institute Ivrea (IDII) in Ivrea, Italy,
develops Arduino, a cheap and easytouse single-
board microcontroller, for their students to
use in developing interactive projects. Adrian
McEwen and Hakim Cassamally in Designing
the Internet of Things: “Combined with an
extension of the wiring software environment, it
made a huge impact on the world of physical
computing.”CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY
2018

2005
A team of faculty members at the Interaction
Design Institute Ivrea (IDII) in Ivrea, Italy,
develops Arduino, a cheap and easytouse single-
board microcontroller, for their students to
use in developing interactive projects. Adrian
McEwen and Hakim Cassamally in Designing
the Internet of Things: “Combined with an
extension of the wiring software environment, it
made a huge impact on the world of physical
computing.”

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

November 2005
The International Telecommunications Union
publishes the 7th in its series of reports on the
Internet, titled “The Internet of Things.”.CENTRO ESCOLAR
UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

November 2005
The International Telecommunications Union
publishes the 7th in its series of reports on the
Internet, titled “The Internet of Things.”.

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

June 22, 2009


Kevin Ashton writes in “That ‘Internet of Things’ Thing” in
RFID Journal: “I could be wrong, but I'm fairly sure the
phrase ‘Internet of Things’ started life as the title of a
presentation I made at Procter & Gamble (P&G) in 1999.
Linking the new idea of RFID in P&G's supply chain to the
thenredhot topic of the Internet was more than just a good
way to get executive attention. It summed up an important
insight—one that 10 years later, after the Internet of Things
has become the title of everything from an article in
Scientific American to the name of a European Union
conference, is still often misunderstood.”

CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018

THANK YOU!
REFERENCE:
https://www.forbes.com/sites/gilpress/2014/06/18/averyshorthistoryofthe-
internetofthings/#623b43f410deCENTRO ESCOLAR UNIVERSITY FOR INTERNAL
CIRCULATION ONLY 2018

THANK YOU!
REFERENCE:

Lesson 2 - Demystifying Internet of


Things
This lesson will look at the different definition of IoT to better understand these
technologies as they fit into the real world.
What is the Internet of Things?

“The Internet of Things (IoT) is a system of interrelated computing devices, mechanical


and digital machines, objects, animals or people that are provided with unique identifiers
and the ability to transfer data over a network without requiring human-to-human or
human-to-computer interaction.”

MODULE 2: THE THINGS OF INTERNET OF THINGS

THE TWO BASIC COMPONENTS OF THE IOT:

1. SENSOR – A device that detects and responds to some type of input from the physical environment.
The input could be any of the ff: light, heat, motion, moisture, pressure or any one of a great number of
other environmental phenomena

2. ACTUATOR – a device that moves or controls some mechanism. It converts a control signal into
mechanical action such as an electrical motor. Actuators may be driven by hydraulic, pneumatic,
electric, thermal or mechanical means, as well as software. An actuator ties a control system to its
environment.
WAYS TO CATEGORIZE SENSOR:

1. Active or Passive

2. Invasive or non-invasive

3. Contact or no-contact

4. Absolute or Relative

5. Area of application

6. How sensors are measure

7. What sensors measure

SENSOR TYPES
1. POSITION SENSOR – measures the position of an object; position measurement can be absolute
(absolute position sensor) or relative term (displacement sensor)

2. OCCUPANCY SENSOR – detects the presence of people and animals in a surveillance area

3. MOTION SENSOR – Detects movement of people and objects

4. FORCE SENSOR – Detects whether a physical force is applied and whether the magnitude of force is
beyond threshold

5. PRESSURE SENSOR – Measures force applied by liquids or gases. Pressure is measured in terms of
force per unit area
6. ACOUSTIC SENSOR – Measures the sound levels and convert that information into digital or analog
data signals.

7. HUMIDITY SENSOR – Detects the amount of water vapor in the air or a mass.

8. FLOW SENSOR – Detects the rate of fluid flow; measure the volume (mass flow) or rate (flow velocity)
of the fluid that has passed through a system in a given period of time

9. LIGHT SENSOR – Detects the presence of light (visible or invisible)

10. RADIATION SENSOR – Detects radiation in the environment.

11. TEMPERATURE SENSOR – Measures the amount of heat or cold that is present in the system

12. CHEMICAL SENSOR – Measures the concentration f chemicals in the system

13. BIOSENSOR – Detects various biological elements such as organisms, tissues, cells, enzymes,
antibodies and nucleic acid

SENSORS IN SMARTPHONES
ACTUATORS -
Function: receive some type of control signal commonly an electrical signal or digital command that
triggers a physical effect, usually some type of motion, force, and etc.

SMART OBJECTS
- The building blcoks of IOT
- Transform everyday objects into a network of intelligent objects that are able to learn from and
interact with their environment in a meaningful way
- Other terms: smart sensor, smart device, IOT device, intelligent

TREND IN SMART OBJECTS


- Size is decreasing
- Power consumption is decreasing
- Processing power is increasing
- Communication capabilities are improving
- Communication is being increasingly standardized.

Bahay – identify ung ped emo gawing iot device kunwari ung pinto automatoc ganon assignment 2
- sensors and actuator
- any application
- sims

MODULE 3:

Lesson 1 - IoT Networking


Architecture Layers
 
IoT Device Layer



 This is sometimes called the client layer. Devices as you have learned in the
previous module point to the “things” in the Internet of Things. They act as
the interface between the physical and digital worlds. The devices used in the
collection, processing, storing, and transmitting data belong to this layer.

 
IoT Gateway Layer



 This is the server-side operators. An IoT gateway is needed to perform the
pre-processing of information before they are sent to the data center. Such
pre-processing includes message filtering and aggregation. The gateway
should also act as a single point of access for monitoring the selected area of
the operational field. You don’t want to connect to every sensor with your
monitoring software; it is easier to monitor only the gateway, which in turn is
responsible for gathering all the necessary metrics from the sensors.

The software application is the heart of the gateway. The gateway software is
responsible for collecting messages from the sensors and storing them appropriately
until they can be pre-processed and sent
to the data center. It decides if the data at a given stage of processing should be
temporary, persistent, or kept in memory.
Usually, gateways are connected to the Internet using GPS, WiFi, or ethernet. Some
gateways can also work in both GPS and WiFi modes. In general, non-GPS connectivity
is preferred to send data, as it doesn’t require a subscription to a paid mobile plan.
Some gateways will be constantly connected to inexpensive local networks, but those
using GPS connectivity should be very conservative in terms of what data they send to
the data center.
Visit this link to know more about the gateway layer. https://www.i-scoop.eu/internet-of-
things-guide/iot-technology-stack-devices-gateways-platforms/Links to an external site.
 
IoT Platform Layer



 IoT platform layer is where the business and consumer applications
and services connect. It connects the operator and client, and it is the layer
in which services and management and interconnection of the device layer
and gateway layer happen. For developers, an IoT platform provides a set of
ready-to-use features that greatly speed up the development of applications
for connected devices as well as take care of scalability and cross-device
compatibility. Modern IoT platforms provide components for frontend and
analytics, on-device data processing, and cloud-based deployment
Lesson 1 - IoT Architecture Stages
The fundamental features of a stable Internet of Things architecture include
functionality, scalability, availability, and maintainability.
 

https://www.marlabs.com/blog-stages-of-iot-architecture/ Links to an external site.

FOUR STAGES OF IoT ARCHITECTURE


STAGE 1: Sensors and actuators
STAGE 2: Internet gateways and Data Acquisition Systems
STAGE 3: Edge IT Data Processing
STAGE 4: Datacenter and cloud

  Lesson 1 - IoT Architecture Stage 1


 

In this stage, we can make use of hardware and gain necessary insights for
further analysis. Sensors collect data from the environment and turn that
data into useful information. An example of this is the specialized structures
in your cell phone that detect the directional pull of gravity and use that as
data to orient the device. Similarly, actuators also intervene to change the
physical conditions that generate the data. For example, an actuator shuts
off the power supply or adjusts the airflow valve in a system. This sensing
or actuating stage covers all sorts of devices, including industrial devices,
robotic camera systems, water-level detectors, air quality sensors, and
heart-rate monitors.
In reality, data processing takes place in every stage of IoT architecture.
However, the data that is processed at the sensor has limited use, as the
processing power available on each IoT device is limited.

Lesson 1 - IoT Architecture Stage 2

              
In this stage, the information collected from the previous stage and are compressed to
the optimal size for further analysis. IoT deals with working with sensors and actuators
in close proximity at this point. Data Acquisition Systems (DAS), perform data
aggregation, and conversion processes.
DAS connects to the sensor network, collects outputs,  and converts the analog data
into the digital data. On the other hand, the internet gateway receives the collected and
digitized data and sends it to stage 3 systems through Wi-Fi or LAN connections for
further processing. On top of this, timing conversion and structure conversion happens
at this stage. 

  Lesson 1 - IoT Architecture Stage 3


 

During this stage, the data prepared in stage 2 is transferred and exposed in
the IT world. The edge IT system performs enhanced analytics along with pre-
processing such as machine learning and visual representation. Some
additional processing may also happen here before the data is entered in data
centers.
Stage 3 enables data to be captured at local sensors and at the same time
transferring the data to the remote locations. Since edge systems perform
more analysis of the data, they are usually placed in remote offices or edge
locations closer to the sensors.

Lesson 1 - IoT Architecture Stage 4


 
 

The main processes of IoT architecture happen on the last stage,


Analyzing, Visualizing, and Storing Data. Here, data is processed in depth
in the data centers. This stage requires skilled analytics of both IT and OT
(operational technology) professionals along with high-end applications.
Data might also be gathered from other sources for execution. Once all the
quality standards and requirements are met, the information is then brought
back to the physical world for predictive analysis.

Lesson 2- IoT Connectivity and


Networks

 
Types of Internet of Things (IoT) Connectivity
The way you connect devices and sensors to your data processing module
is one of the major IoT challenges  you will face in building an IoT system.
As each business case has its own goals, each Internet of Things system
has its own requirements, including the requirements to connectivity in
terms of range, latency, data throughput, etc.
There’s no universal connectivity technology that would address the needs
of different IoT use cases. There are a lot of connectivity options each with
its own characteristics, benefits, and drawbacks.
 

Things to consider in choosing connectivity for your IoT project


There are various IoT connectivity options that you may choose from. Your
decision to use a particular option may depend on the power consumption,
bandwidth need, range, budget, scalability capabilities, and location of your
project.

 Range. This refers to the area of coverage of the device. You need to


consider the range to ensure that your device/sensor can still
communicate to the processing module when it is moved from as little
as a few inches to as far as few miles.
 Power consumption. You need to consider the power consumption of
your device. You may consider using long-life batteries or having it
constantly plugged into power sockets or charging stations so your
device may collect and send data continuously.
 Bandwidth. In an IoT system, bandwidth implies the volume of data that
can be sent between modules, for example, a sensor and cloud storage.
There are IoT connectivity options which provide extremely high
bandwidth, for example, WiFi, and those that allow sending only a small
fraction of data frequently, for example, every few hours.
 Cost. Cost is commonly associated with the volume of data to be
collected and transmitted, and the number of devices or locations used.
 Conditions. Some connectivity options work perfectly regardless of the
interference, noise, walls, or any other condition while others don’t, so it
is extremely essential to consider the environment you will install your
IoT system.
 Existing infrastructure. When designing an IoT system, take into
consideration the existing infrastructure it will sit in and, where it’s
possible, align the choice of IoT connectivity solution accordingly.

  IoT Connection Type

Image credit from http://www.techplayon.com/fog-computing-and-internet-of-things/


Understanding the type of connections in IoT is important for us to consider the most
effective setup. This lesson will give you idea on the different IoT connection type.
Communication Protocols

Image credit from  https://www.networkworld.com/article/2917793/internet-of-things/is-wi-fi-going-to-be-


the-technology-of-choice-for-iot.html

WiFi is one of the most common communication protocols. WiFi essentially uses an


infrastructure network, which additionally supports ad-hoc networking in infrastructure
mode. The communication goes from wireless nodes (devices) to a wireless access
point (router or network controller).
WiFi is ideal when we want to set up a quick connection between our device (should be
WiFi compatible) and the internet. WiFi is designed around the goal of keeping its power
consumption limited, so you can run your project on a dedicated battery as well. WiFi
should be used when you do not care much about how and when exactly your device
should connect and communicate with your server and all you are looking for is hassle-
free connection to the internet.
These tutorials can help you setup IoT using WiFi.

Getting
SparkFun Started
Inventor's Kit with the
for Photon ESP8266 WiFi SparkFun
Experiment Shield Hookup Blynk
Guide Guide Board

 
Thread is an open standard for reliable, cost-effective, low-power, wireless D2D (device
to device) communication. It was designed specifically for connected home
applications. It came into existence in 2014, when the Thread Group was formed. It now
has big organizations like Google, Samsung, Qualcomm, and ARM to design and
develop the Thread protocol. Although there is no single point of failure by architecture
in Thread networks, a single point of failure may exist due to poor network design.
Image credit from  http://www.embedded-computing.com/embedded-computing-design/connecting-
people-processes-and-iot-silicon-with-a-digital-thread

These tutorials can help you setup IoT using Threads.


                     

Links to an external site.


 
 
Bluetooth like other radio technologies. Bluetooth uses the 2.4GHz spectrum in the
ISM band. It has a range from 10m up to 100m (at higher transmit powers, and that
means higher power consumption!). Bluetooth is again an ad-hoc type of network and
provides point to point (P2P) connections. Bluetooth Classic supports up to one master
and seven slaves in one piconet. It also follows the star network topology, which means
that other peripherals cannot talk to each other. 

Image credit from https://www.anritsu.com/ru-RU/test-measurement/buy/promotions/ru-ru/bluetooth/


indexLinks to an external site.

 
You can go through the following tutorials on Bluetooth and BLE, to get a better
understanding of using them directly into your Bluetooth-based IoT project.
 

Understan
Simblee
ding the
Simblee LilyPad
BC127
Concepts Bluetooth Hookup
Guide
Module

Lesson 2 - IoT Connectivity (Short-


range)
Short-range IoT connectivity
WiFi
WiFi is popular among IoT systems that are placed in small areas, like
homes.  WiFi provides Internet access to devices that are within the range
(about 66 feet from the access point). It has high bandwidth and operates
on high frequency so it allows the transfer of bigger data. It has high
compatibility with different boards and can work with an average WiFi
router. WiFi works best for plugged appliances and the devices that can be
easily recharged, as it’s also power-intensive.
Modern WiFi versions have expanded the range and decreased power
consumption. Moreover, there’re WiFi standards developed for IoT
purposes — WiFi HaLow and HEW.
 

Bluetooth
Bluetooth is another short-range connectivity option that allows IoT devices
and sensors to send a lot of data at high speed. It is best for connecting
small devices and sending information indoors.  Similar to WiFi, it works
great both in a smart home environment and industrial IoT applications that
enable machines to continuously send status data. The biggest difference
from WiFi is lower power requirements and higher resilience to noise. BLE
or Bluetooth Low Energy is the Bluetooth technology developed for IoT
purposes.
 

Mesh Network
Mesh topology will work for your project if you want to have a very reliable
system. Mesh topology consists of many battery-powered devices
connected with each other and can exchange data and send data to the
Internet. This ensures that the IoT system does not stop working because
there are a lot of backup devices.
Zigbee and Thread are the two examples of mesh-based IoT connection.
These are low power, low bandwidth IoT connectivity standards with limited
range but reliable topology.
 

Ethernet
Ethernet is more reliable than a mesh network although it is insensitive to
interference because it is a wired. Wire connectivity provides better
security, robustness, and high data transfer speed. The range of Ethernet
is dependent on the wire length.

Lesson 2 - IoT Connectivity (Long-


range)
Long-range IoT Connectivity

LPWAN (LPWA, LPN)

LPWAN is an IoT connectivity technology that allows to connect multiple


devices and sensors miles away. It is inexpensive, does not require a
strong battery, and can pass through barriers. LPWAN is used in sending
small portions of data periodically and enables IoT devices or sensors to
last for years without recharging. It operates only with a gateway.

There are many IoT connectivity platforms that belong to LPWAN


technology. Some of the most popular ones are SigFox, Ingenu, and
LoRaWAN. Among these, LoRaWAN is widely known and used because it
is an open platform.

Cellular

Cellular is a long-range connectivity solution that offers great bandwidth,


reliable data transfer, and low latency. It requires a lot of power to handle
all this data, and it’s expensive, too. The price depends on the plans
offered by IoT connectivity providers and the volume of transferred data.

3G and 4G (LTE) are the most common cellular standards. However, there
are machine to machine (M2M) standards developed specifically for IoT:
LTE-M and NB-IoT.

Satellite

Satellite provides around-the-globe coverage and can handle large


volumes of data. Satellite connectivity is expensive and is rarely used on its
own.  In Internet of Things language, this form of communication is mostly
referred to as “M2M” (Machine-to-Machine) because it allows devices such
as a phone to send and receive data through the cell network.

Example of satellite connectivity would include utility meters that send data
to a remote server, commercials updated on digital billboards, or cars via
Internet connectivity.

Other IoT connectivity options

There are other IoT wireless technologies used in IoT. NFC and RFID are
the two communication methods that are worth considering for some IoT
projects.

NFC or Near-Field Communication protocol is also a power-efficient way


to connect things. Data is transferred when the NFC-enabled devices are
tapped with each other, making NFC belong to short-range communication.

RFID or Radio-Frequency Identification is another power-efficient


technology that implies using RFID tags and a system of readers that
enable communication. Active RFID tags have their own battery and can
continuously send small portions of data to a reader, while passive RFID
tags activate only when a reader pings them. There’s a great range of RFID
tags in form, size, and application. Protocols like ZigBee or ZWave use a
low-power RF radio embedded or retrofitted into electronic devices and
systems.

  Lesson 2 - Connectivity Options


 

There are too many choices of IoT connectivity technologies to choose


from is abundant. In most cases, a single IoT system requires combining
several connectivity solutions to optimize cost, efficiency, and quality of
data transfer in different environments.
 

To help you choose what device to use on your proposal, here is a


summary of the characteristics of the connectivity options.

Connectivity Pros Cons


options
Wi-Fi ·   extremely high bandwidth and speed ·   limited range (usually, up
·   good compatibility ·   Relatively high power usa
(however, less than cellular)
·   Affordable
·   Instability and inconsisten
·   Well protected and controlled
·   if WiFi source is off, IoT a
·   easy setup in WiFi-enabled
can’t send data
environment

Bluetooth ·   high bandwidth and speed ·   limited range


  ·   good compatibility ·   lower bandwidth compare
·   low cost ·   Hardware capabilities cha
fast and will need to be repla
·   low power requirements
·   If people switch off Blueto
·   available in all smartphones
are issues in usage.
·   technology is continuously being
upgraded and improved through new
hardware

Mesh Networks ·   low power requirements ·   limited range


  ·   reliability ·   relatively complex to set u
average customer
·   low cost
·   low bandwidth
Ethernet ·   reliability, especially in a challenging ·   range limited to wire lengt
environment
·   relies on the cable, so it c
·   robust to noise difficult to troubleshoot
·   security

LPWAN ·   long-range measured in miles ·   low bandwidth


·   low cost ·   less reliable (can lose dat
·   low power requirements ·   higher latency

Cellular ·   nearly global coverage ·   high cost


·   high speed and bandwidth ·   high power requirements
·   reliability ·   no range beyond the reac
sites

Satellite ·   global coverage (Universal ·   high cost


compatibility)
  ·   high power requirements
·   high bandwidth
·   communication from smar
·   reliability (Stable connection a device has to go through s
  ·   needs large hardware (dis
RFID ·   Does not require power ·   Highly insecure
·   Established and widely used ·    Ongoing cost per card
technology
·   Tags need to be present a
identifier and be handed ove
·   Not compatible with smart

NFC ·   Offers a low-speed connection with ·   Short-range might not be
extremely simple setup many situations for it is curre
available on new Android Ph
·   Can be used to bootstrap more
at Apple Pay on new iPhone
capable wireless connections
·   NFC has a short-range and supports
encryption where it may be more
suitable than earlier, less private RFID
systems

How message passes through a


 

network?
We say that to get information from a source we need a network, so information travels
from the source through media to destination. To better understand how these 3
network components interact with each other, let us have this example. Say you send a
message via Facebook messenger (service) through your mobile phone (source),  to a
friend's mobile (destination).

                     
 
 
This simple network has several key components:

Devices - includes computers, printers, routers, and servers.

Media - includes cabling or wireless connections.

The different media have different characteristics, which makes each better
suited to different circumstances, taking into consideration factors such as:

the distance a signal needs to travel

the environment it is traveling in

the amount and speed of the data

the cost of the media and its installation.

Services - includes the software that supports operations, such as email


hosting, in this example, it is chat application.

Components of a Network
          In order for a message to reach its destination or intended receiver, it needs
network components to provide a stable and reliable transmission.
There are three components of a network:
1. Devices
Image is taken from https://www.educba.com/types-of-network-devices/Links to an
external site.
2. Media

Image is taken from http://www.ciscopress.com/articles/article.asp?


p=2158215&seqNum=6Links to an external site.
3. Services

Image is taken from https://www.rgcltd.co.uk/network-services/Links to an external site.


     
          Devices and the media are the visible components of the network such as
computers, laptops, smartphones, routers, switches, or cables used to connect the end-
user devices.
          Services are the applications we use every day like email, social networking, etc.
There are processes working which we do not see but are important in networking.
 
END-USER DEVICES
          The devices that people are familiar with are called end-user devices.  This
device is either the source or the destination of the message transmitted over the
medium or channel. The end-user device uses IP address as their ID in the network.
 
INTERMEDIARY NETWORK DEVICES
          Intermediary network devices such as routers, switches, hubs connect the end-
user devices to the network and can inter-connect thousands of networks to form
internetworks. They provide connectivity and ensure that messages reach their
destination.
 
NETWORK MEDIA
          Network media are channels where the messages travel from source to
destination. There are three types of media, namely:


 metallic wires within cables - uses electric impulses
 glass or plastic fiber - uses light
 Wireless transmission - uses wavelengths from the electromagnetic spectrum

Lesson 3 - How IoT Device


Communicate
 

The Internet of Things is responsible for collecting real-world data, from


many different devices including sensors, actuators, gateways, and more.
Most modern smartphones are equipped with light sensors,
accelerometers, magnetometers, gyroscopes, proximity sensors,
temperature sensors, and even humidity sensors or barometers. Since you
are now familiar with these sensors on your wearables, it might be
interesting to know how these sensors transmit data.
A very important element of the Internet of Things network is the layer
transport, which ensures data processing from sensors, local storage, and
forwarding. It can be realized through standards created specifically for
data transport needs such as TCP, or more sophisticated protocols that
encompass many layers in their technology stack including a transport
layer. To share sensor data, Internet of Things usually requires an internet
connection that can be provided by wired networks or wireless
technologies.
In order for the communication between devices to be efficient,  another
layer is needed.
The application layer is responsible for delivering services and applications
to the user. It creates a coherent data exchange platform for data collected
by all devices and determine data validity and elicit value from it.
According to IBM, there are standard protocolsLinks to an external site. that
enable different devices operating over different systems and networks to
communicate with each other. One standard model goes through 7 layers
of protocols every time a device communicates with another through the
internet.
From the physical device, data goes through the network, is transported
from the network into a session, then the presentation where the
information can then be seen and finally, the application protocol where the
data can be used, manipulated, and retransmitted. The bigger the IoT gets
the more complex the protocols needed to ensure seamless
communication gets.
IoT devices transfer data with the help of different systems and protocols
that offer seamless connectivity.
A standard model of communication involves several different protocols
like LwM2MLinks to an external site. every time a device communicates
with another one through the internet. The data travels from the
physical device through the network to be transported into a session.
Eventually, it ends in the application protocol that allows using,
manipulating, and re-transmitting data. The larger the IoT network gets, the
more complex are the protocols required to ensure smooth communication.
Smartphones do play a significant role in IoT systems because many IoT
devices can be controlled through mobile apps, especially in consumer
implementations of IoT. For example, we can use our smartphones to
communicate with our smart thermostat so that it delivers the perfect
temperature when we get home from work.
IoT devices contain sensors and mini-computer processors that can act on
the data collected by the sensors using different techniques. Note that
these devices are growing smaller and smarter. Eventually, all of our
everyday items – from toasters to toothbrushes – may be connected to the
internet, communicating with one another and working to serve customers
better.
IoT is a robust technology trend of the future, and networks of connected
objects will soon become commonplace in our homes, workplaces, and
factories.

Lesson 3 - Internet Protocols (IP)

A device has a unique Internet Protocol (IP) address, so it is


distinguishable from all other devices. IP addresses are the numbers
assigned to computer network interfaces. Although we use names to refer
to the things we seek on the Internet, such as www.google.com, computers
translate these names into numerical addresses so they can send data to
the right location. So when you send an email, visit a web site, or
participate in a video conference, your computer sends data packets to the
IP address of the other end of the connection and receives packets
destined for its IP address.
The addresses used to send data in networks are called Internet Protocol
(IP) addresses. Ipv4 (version 4) is what is typically in use currently.
Ipv4 addresses consist of four sets of numbers separated by periods, and
each number is between 0 - 255.
For example:
1.2.3.4
or
233.67.151.3
 

IPv6 is developed using six sets of numbers, colons, and hexadecimal


numbering to allow many more destination addresses. These will help to
facilitate IoT, as well as adding features for improved routing, security, and
data flow.
Ipv4 has around 4 billion IP addresses (which ran out a few years back.)
Ipv6 has around 340 undecillion IP addresses - that's
340,000,000,000,000,000,000,000,000,000,000,000,000, give or take a few
billion.
 Links to an external site.

Lesson 3 - Internet Protocols (IP) 2


 

Do you want to see your computer's IP address?


1. Open a command prompt and type ipconfig and press Enter key.
2. Look for IPv4 Address, that is your computer's IP address
 
Intermediary devices interconnect end devices; host to the network, and
networks to other networks. Intermediary devices are used to connect
end devices to the network and can also be used to connect individual
networks to form an internetwork. Examples are switches and wireless
access points, routers and modems and firewalls.
These devices take the destination host address and combine that with
information about network connectedness to decide on the path that
messages take through the network. Intermediary devices, therefore, need
to maintain network information (frequently update the network map) and
may also notify other devices of errors. This allows them to choose
alternative pathways, or retransmit data, or even deny the flow of data
based on security settings.
 
Activity
We can look for the IP address of the following websites
using https://check-host.netLinks to an external site.
 

Just type in the URL in the text field and hit the Enter key to view its IP
address.
 

Now, we look for the country or location of the IP by using


this https://ipinfo.io/Links to an external site. site. It will reveal the origin of
the IP address of the above website.
Grab IP is 54.169.10.64 and I want to see the location of the IP, through
the help of IP locator, Grab's IP is originated from Singapore.
       
Additional Reference:
INTERNET PROTOCOL ( IP) ADDRESSES Links to an external site.

Lesson 3 - Domain Name System


(DNS)

In the previous activity, we looked into the website's IP address in


the Domain Name Service or DNS, which is the Internet equivalent of a
telephone book. It matches a name (like facebook.com) to a number (like
157.240.8.35) - because humans prefer to deal with names and computers
prefer numbers.
The DNS is a large database of computer names and their internet
addresses, but it is spread out so that no server has all the information.
Have you experienced typing the wrong URL from the browser, and
received the following error?
If a computer requests a domain name and that server doesn’t have it, it
forwards the request to another DNS server.
The Domain Name Service has a hierarchical structure, so requests get
sent from the bottom up.

Seven generic top-level domains were created early in the development of


the Internet, and predate the creation of ICANN in 1998.

Name Entity

.com Commercial

.org Organization

.net Network

.int International organization

.edu Education
U.S national and state
.gov
government agencies

.mil U.S military

Lesson 3 - Gateways and Routing


Previously we were introduced with media that provides us access through the internet.
Now we define Routing as the mechanism that allows a system to find the network path
to another system. A route is a defined pair of addresses which represent the
“destination” and a “gateway”. For one machine to be able to find another over a
network, there must be a mechanism in place to describe how to get from one to the
other. This is called routing. 
Now to give us idea on tracing the route that a website request takes. Follow the
following instructions:
1. Open the command prompt by typing cmd from your search button.
2. This will bring up a command prompt window. It has a line that looks like this:
C:Users\students> _ 
We will use tracert to trace the route of a certain website. tracert is computer
network diagnostic tool for displaying the route (path) and measuring transit delays of
packets across an Internet Protocol(IP) network.
3. From the command prompt type tracert google.com and press Enter Key
You will see similar screen below, showing all the different routers and networks that
the request travels through (up to a maximum of 30), and finally the destination site with
its IP address.
Note: To trace the route to a distant network, the PC used must have a working
connection to the Internet. 
This can be done by typing ping <website> and press Enter key from the command
prompt. Similar to the image below

You might also like