Skip to main content

The Internet in IoT

  • Chapter
  • First Online:

Abstract

This chapter describes the “Internet” in the “Internet of Things”. It starts with a summary of the well-known Open System Interconnection (OSI) Model Layers. It then describes the TCP/IP Model, which is the basis for the Internet. The TCP/IP protocol has two big advantages in comparison with earlier network protocols: Reliability and flexibility to expand. The TCP/IP protocol was designed for the US Army addressing the reliability requirement (resist breakdowns of communication lines in times of war). The remarkable growth of Internet applications can be attributed to this reliable expandable model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    IP packets are referred to as IP datagrams by many experts. However, some experts used the phrase “stream” to refer to packets that are assembled for TCP and the phrase “datagram” to packets that are assembled for UDP.

  2. 2.

    InterNIC is a registered service mark of the US Department of Commerce. It is licensed to the Internet Corporation for Assigned Names and Numbers, which operates this website.

References

  1. W. Odom, CCNA Routing and Switching 200–120 Official Cert Guide Library Book, ISBN: 978–1587143878, May 2013

    Google Scholar 

  2. P. Browning, F. Tafa, D. Gheorghe, D. Barinic, Cisco CCNA in 60 Days, ISBN: 0956989292, March 2014

    Google Scholar 

  3. G. Heap, L. Maynes, CCNA Piratical Studies Book (Cisco Press, April 2002)

    Google Scholar 

  4. Information IT Online Library.: http://www.informit.com/library/content.aspx?b=CCNA_Practical_Studies&seqNum=12

  5. Inter NICFootnote

    InterNIC is a registered service mark of the US Department of Commerce. It is licensed to the Internet Corporation for Assigned Names and Numbers, which operates this website.

    —Public Information Regarding Internet Domain Name Registration Services, Online: http://www.internic.net

  6. Understanding TCP/IP addressing and subnetting basics, Online: https://support.microsoft.com/en-us/kb/164015

  7. Tutorials Point, “IPv4 – Address Classes”, Online: http://www.tutorialspoint.com/ipv4/ipv4_address_classes.htm

  8. Google IPv6, “What if the Internet ran out of room? In fact, it's already happening”, Online: http://www.google.com/intl/en/ipv6/

  9. Wikipedia, “Internet Protocol version 6 (IPv6):, Online: https://en.wikipedia.org/wiki/IPv6

  10. IPv6 Addresses, Microsoft Windows Mobile 6.5, April 8, 2010, Online: https://msdn.microsoft.com/en-us/library/aa921042.aspx

  11. Binary to Hexadecimal Convert, Online: http://www.binaryhexconverter.com/binary-to-hex-converter

  12. Technology White Paper, Cisco Systems online: http://www.cisco.com/c/en/us/tech/ip/ip-routing/tech-white-papers-list.html

  13. M. Caeser, J. Rexford, “BGP routing policies in ISP networks”, Online: https://www.cs.princeton.edu/~jrex/papers/policies.pdf

  14. A. Shaikh, A.M. Goyal, A. Greenberg, R. Rajan, An OSPF topology server: Design and evaluation. IEEE J. Sel. Areas Commun 20(4) (2002)

    Article  Google Scholar 

  15. Y. Yang, H. Xie, H. Wang, A. Silberschatz, Y. Liu, L. Li, A. Krishnamurthy, On route selection for interdomain traffic engineering. IEEE Netw. Mag. Spec. Issue Interdomain Rout (2005)

    Google Scholar 

  16. N. Feamster, J. Winick, J. Rexford, “A model of BGP routing for network engineering,” in Proc. ACM SIGMETRICS, June 2004

    Article  Google Scholar 

  17. N. Feamster, H. Balakrishnan, Detecting BGP configuration faults with static analysis, in Proc. Networked Systems Design and Implementation, (2005)

    Google Scholar 

  18. Apple History / Power Macintosh Gigabit Ethernet, Online: http://www.apple-history.com/g4giga. Retrieved November 5, 2007

Download references

Author information

Authors and Affiliations

Authors

Problems and Exercises

Problems and Exercises

  1. 1.

    Ethernet and Point-to-Point Protocol (PPP) are two examples of data link protocols listed in this chapter. Name two other data link protocols.

  2. 2.

    Provide an example of Session Layer protocol.

  3. 3.

    In a table format, compare the bandwidth, distance, interference rating, cost and security of (1) twisted pair, (2) coaxial cabling, and (3) fiber optical cabling.

  4. 4.

    A. What are the main components of a router? B. Which element is considered the most essential? C. Why?

  5. 5.

    What is the main function of NVRAM? Why is such function important to operate a router?

  6. 6.

    How do network administrators guarantee that changes in the configuration are not lost in case the router is restarted or loses power?

  7. 7.

    What is a disaster recovery function in a router? Which router’s sub-component contains such function?

  8. 8.

    Many argue that routers are special computers but built to handle internetwork traffic. List three main differences between routers and personal computers.

  9. 9.

    There are no input devices for router like a monitor, a keyboard, or a mouse. How does a network administrator communicate with the router? List all possible scenarios. What are the main differences between such interfaces?

  10. 10.

    How many IPv4 addresses are available? Justify your answer.

  11. 11.

    What is the ratio of the number of addresses in IPv6 compared to IPv4?

  12. 12.

    IPv6 uses a 128-bit address, allowing 2128 addresses. In decimal, how many IPv6 addresses exist? How many IPv6 addresses will each human have? Why do we need billions of addresses for each human being?

  13. 13.

    How many IPv6 address will be available on each square meter of earth?

  14. 14.

    What are the major differences between interior and exterior routing protocols?

  15. 15.

    What is distance vector protocol? Why is it called a vector? Where is it used?

  16. 16.

    When would you use static routing and when would use dynamic routing? Why?

  17. 17.

    Most IP networks use dynamic routing to communicate between routers but may have one or two static routes. Why would you use static routes?

  18. 18.

    We have mentioned that in TCP/IP networks, the entire route is not known at the beginning of the journey. Instead, at each stop, the next router hop is determined by matching the destination address within the packet with an entry in the current router’s routing table using internal information. IP does not provide for error reporting back to the source when routing anomalies occur.

    1. A.

      Which Internet Protocol provides error reporting?

    2. B.

      List two other tasks that this protocol provides?

  19. 19.

    Why is EGP considered to be obsolete for the current Internet?

  20. 20.

    In a table, compare the speed and distance Standard Ethernet, Fast Ethernet, and Giga Ethernet. Why is Ethernet connection limited to 100 meters?

  21. 21.

    Why the Internet does require both TCP and IP protocols?

  22. 22.

    Are IPv4 and IPv6 protocols designed to be interoperable? How would an enterprise transition from IPv4 to IPv6?

  23. 23.

    What are the four different reasons for packet loss? List remediation for each reason.

  24. 24.

    List two factors that can affect throughput of a communication system.

  25. 25.

    Figure 2.10 (in Section 2.4.3) stated the throughput between host A and host B is 20 mbps with the assumptions:

    • R2 = R3 = R5 = R6 = 10Mbps.

    • R1 = R4 = 100Mbps.

    • Data is equally divided between the two paths.

    How did the authors arrive at 20 Mbps?

  26. 26.

    Assuming host A is transferring a large file to host B. What is the throughput between host A and host B for the network shown below?

    figure a
    1. A.

      Assumptions:

      • The speed of each router is higher than the speed of any link in the network.

      • No other host is sending data.

      • R2 = R3 = R5 = R6 = R7 = R8 = 10Mbps.

      • R1 = R4 = 1 Mbps.

      • Data is equally divided between the three paths.

    2. B.

      Assumptions:

      • The speed of each router is higher than the speed of any link in the network.

      • No other host is sending data.

      • R2 = R3 = R5 = R6 = R7 = R8 = 10Mbps.

      • R1 = R4 = 100 Mbps.

      • Data is equally divided between the three paths.

    3. C.

      Assumptions:

      • The speed of each router is 1 Mbps.

      • No other host is sending data.

      • R2 = R3 = R5 = R6 = R7 = R8 = 10Mbps.

      • R1 = R4 = 100 Mbps.

      • Data is equally divided between the three paths.

  27. 27.

    What is Traceroute? What does it typically report? What are the main advantageous of trace route? What is the main difference between Traceroute and Ping?

  28. 28.

    For the network shown below, assume the network administer is interested in measuring the end-to-end delay from router A to the server.

    1. A.

      What is the Traceroute command? Hence, Traceroute command is sent from router A directly (i.e., via the shown connected terminal).

    2. B.

      Which device will send their delays?

    figure b
  29. 29.

    What is time to live command? Why is it needed?

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Rayes, A., Salam, S. (2019). The Internet in IoT. In: Internet of Things From Hype to Reality. Springer, Cham. https://doi.org/10.1007/978-3-319-99516-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-99516-8_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-99515-1

  • Online ISBN: 978-3-319-99516-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics