SlideShare a Scribd company logo
1 of 27
Download to read offline
IOT & M2M
 Introduction
 M2M Vs IoT
 SDN & NFV
 IoT System Management
 SNMP
 Network Operator Requirements
 NETCONF
 YANG
 NETOPEER
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 1
CREDITS
Arshdeep bhagha & Vijay Maddisetti
MRS sir
Google
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 2
INTRODUCTION
IoT
M2M
TV-Remote
Mobile-AC
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 3
MACHINE-TO-MACHINE (M2M)
Machine-to-Machine
(M2M) refers to
networking of machines
(or devices)
for the purpose of remote
monitoring and control
and dataexchange.
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 4
MACHINE-TO-MACHINE (M2M)
 An M2M area network comprises of machines (or M2M nodes) which have embedded
hardware modules for sensing, actuation and communication.
 Various communication protocols can be used for M2M local area networks such as
ZigBee, Bluetooh, ModBus, M-Bus, Wirless M-Bus, Power Line Communication (PLC),
6LoWPAN, IEEE 802.15.4, etc.
 The communication network provides connectivity to remote M2M area networks.
 The communication network can use either wired or wireless networks (IPbased).
 While the M2M area networks use either proprietary or non-IP based communication
protocols, the communication network uses IP-based networks.
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 5
MACHINE-TO-MACHINE (M2M)
 Since non-IP based protocols
are used within M2M area
networks, the M2M nodes
within one network cannot
communicate with nodes in an
external network.
 To enable the communication
between remote M2M area
networks, M2M gateways are
used.
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 6
DIFFERENCE BETWEEN IOT &MACHINE-TO-MACHINE (M2M)
 Communication Protocols
 M2M and IoT can differ in how the communication between the machines or devices
happens.
 M2M uses either proprietary or non-IP based communication protocols for
communication within the M2M area networks.
 Machines in M2M vs Things in IoT
 The "Things" in IoT refers to physical objects that have unique identifiers and can sense
and communicate with their external environment (and user applications) or their
internal physical states.
 M2M systems, in contrast to IoT, typically have homogeneous machine types within an
M2M area network.
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 7
DIFFERENCE BETWEEN IOT &MACHINE-TO-MACHINE (M2M)
 Hardware vs Software Emphasis
 While the emphasis of M2M is more on hardware with embedded modules, the emphasis of IoT is more on
software.
 Data Collection & Analysis
 M2M data is collected in point solutions and often in on-premises storage infrastructure.
 In contrast to M2M, the data in IoT is collected in the cloud (can be public, private or hybrid cloud).
 Applications
 M2M data is collected in point solutions and can be accessed by on-premises applications such as
diagnosis applications, service management applications, and onpremisis enterprise applications.
 IoT data is collected in the cloud and can be accessed by cloud applications such as analytics applications,
enterprise applications, remote diagnosis and management applications, etc.
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 8
IOT & MACHINE-TO-MACHINE (M2M) COMMUNICATION
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 9
SDN
 Software-Defined Networking (SDN) is a
networking architecture that separates the
control plane from the data plane and
centralizes the network controller.
 Software-based SDN controllers maintain a
unified view of the network and make
configuration, management and
provisioning simpler.
 The underlying infrastructure in SDN uses
simple packet forwarding hardware as
opposed to specialized hardware in
conventional networks.
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 10
KEY ELEMENTS OF SDN
 Centralized Network Controller
 With decoupled control and data planes and centralized network controller, the network
administrators can rapidly configure the network.
 Programmable Open APIs
 SDN architecture supports programmable open APIs for interface between the SDN application
and control layers (Northbound interface).
 Standard Communication Interface (OpenFlow)
 SDN architecture uses a standard communication interface between the control and
infrastructure layers (Southbound interface).
 OpenFlow, which is defined by the Open Networking Foundation (ONF) is the broadly accepted
SDN protocol for the Southbound interface.
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 11
NETWORK FUNCTION VIRTUALIZATION (NFV)
 Network Function Virtualization
(NFV) is a technology that
leverages virtualization to
consolidate the heterogeneous
network devices onto industry
standard high volume servers,
switches and storage.
 NFV is complementary to SDN as
NFV can provide the infrastructure
on which SDN can run.
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 12
KEY ELEMENTS OF NFV
 Virtualized Network Function (VNF):
 VNF is a software implementation of a network function which is capable of running
over the NFV Infrastructure (NFVI).
 NFV Infrastructure (NFVI):
 NFVI includes compute, network and storage resources that are virtualized.
 NFV Management and Orchestration:
 NFV Management and Orchestration focuses on all virtualization-specific management
tasks and covers the orchestration and life-cycle management of physical
and/or software resources that support the infrastructure virtualization, and
the life-cycle management of VNFs.
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 13
NVF-USE CASE
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 14
NVF-USE CASE
NFV can be used to virtualize the Home Gateway.
The NFV infrastructure in the cloud hosts a virtualized Home
Gateway.
The virtualized gateway provides private IP addresses to the
devices in the home.
The virtualized gateway also connects to network services such
as VoIP and IPTV.
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 15
NEED FOR IOT SYSTEM MANAGEMENT
Automating Configuration
Monitoring Operational & Statistical Data
Improved Reliability
System Wide Configurations
Multiple System Configurations
Retrieving & Reusing Configurations
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 16
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
 SNMP is a well-known and widely used
network management protocol that
allows monitoring and configuring
network devices such as routers,
switches, servers, printers, etc.
 SNMP component include
 Network Management Station (NMS)
 Managed Device
 Management Information Base (MIB)
 SNMP Agent that runs on the device
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 17
DRAWBACKS OF SNMP
 SNMP is stateless in nature and each SNMP request contains all the information to
process the request. The application needs to be intelligent to manage the device.
 SNMP is a connectionless protocol which uses UDP as the transport protocol, making it
unreliable as there was no support for acknowledgement of requests.
 MIBs often lack writable objects without which device configuration is not possible using
SNMP.
 It is difficult to differentiate between configuration and state data in MIBs.
 Retrieving the current configuration from a device can be difficult with SNMP.
 Earlier versions of SNMP did not have strong security features.
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 18
NETWORK OPERATOR REQUIREMENTS
 Ease of use
 Distinction between configuration and
state data
 Fetch configuration and state data
separately
 Configuration of the network as a whole
 Configuration transactions across
services
 Configuration deltas
 Dump and restore configurations
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 19
 Configuration validation
 Configuration database schemas
 Comparing configurations
 Role-based access control
 Consistency of access control lists:
 Multiple configuration sets
 Support for both data-oriented and
task oriented access control
NETCONF
 Network Configuration Protocol (NETCONF) is a session-based network management protocol.
 NETCONF allows retrieving state or configuration data and manipulating configuration data on network
devices
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 20
NETCONF
 NETCONF works on SSH transport protocol.
 Transport layer provides end-to-end connectivity and ensure reliable delivery of messages.
 NETCONF uses XML-encoded Remote Procedure Calls (RPCs) for framing request and response messages.
 The RPC layer provides mechanism for encoding of RPC calls and notifications.
 NETCONF provides various operations to retrieve and edit configuration data from network devices.
 The Content Layer consists of configuration and state data which is XML-encoded.
 The schema of the configuration and state data is defined in a data modelling language called YANG.
 NETCONF provides a clear separation of the configuration and state data.
 The configuration data resides within a NETCONF configuration data store on the server.
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 21
YANG
 YANG is a data modeling language used to model configuration and state data manipulated by the NETCONF
protocol
 YANG modules contain the definitions of the configuration data, state data, RPC calls that can be issued and
the format of the notifications.
 YANG modules defines the data exchanged between the NETCONF client and server.
 A module comprises of a number of 'leaf' nodes which are organized into a hierarchical tree structure.
 The 'leaf' nodes are specified using the 'leaf' or 'leaf-list' constructs.
 Leaf nodes are organized using 'container' or 'list' constructs.
 A YANG module can import definitions from other modules.
 Constraints can be defined on the data nodes, e.g. allowed values.
 YANG can model both configuration data and state data using the 'config' statement.
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 22
IOT SYSTEMS MANAGEMENT WITH NETCONF-YANG
 Management System
 • Management API
 • Transaction Manager
 • Rollback Manager
 • Data Model Manager
 • Configuration Validator
 • Configuration Database
 • Configuration API
 • Data Provider API
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 23
NETOPEER-NETCONF-YANG
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 24
SUMMARY
 Introduction
 M2M Vs IoT
 SDN & NFV
 IoT System Management
 SNMP
 Network Operator Requirements
 NETCONF
 YANG
 NETOPEER
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 25
ANY CLARIFICATIONS?
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 26
THANK YOU FOR YOUR TIME
5/24/2021
DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 27

More Related Content

What's hot

MQTT IOT Protocol Introduction
MQTT IOT Protocol IntroductionMQTT IOT Protocol Introduction
MQTT IOT Protocol IntroductionPrem Sanil
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic designudhayakumarc1
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
domain specific iot system
domain specific iot systemdomain specific iot system
domain specific iot systemRadha Mahalle
 
Introduction to SDN and NFV
Introduction to SDN and NFVIntroduction to SDN and NFV
Introduction to SDN and NFVCoreStack
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfMD.ANISUR RAHMAN
 
Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachArshdeep Bahga
 
What is network architecture
What is network architecture What is network architecture
What is network architecture Sorcia D'Arceuil
 
A Reference architecture for the Internet of things
A Reference architecture for the Internet of things A Reference architecture for the Internet of things
A Reference architecture for the Internet of things WSO2
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesDevyani Vasistha
 
Network architecture
Network architectureNetwork architecture
Network architecturecsk selva
 
Properties of ubiquitous computing
Properties of ubiquitous computingProperties of ubiquitous computing
Properties of ubiquitous computingPurvi Sankhe
 
Distributed computing
Distributed computingDistributed computing
Distributed computingshivli0769
 

What's hot (20)

MQTT IOT Protocol Introduction
MQTT IOT Protocol IntroductionMQTT IOT Protocol Introduction
MQTT IOT Protocol Introduction
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
FP7 iCore project presentation
FP7 iCore project presentation FP7 iCore project presentation
FP7 iCore project presentation
 
domain specific iot system
domain specific iot systemdomain specific iot system
domain specific iot system
 
Introduction to SDN and NFV
Introduction to SDN and NFVIntroduction to SDN and NFV
Introduction to SDN and NFV
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
 
Introduction of iot
Introduction of iotIntroduction of iot
Introduction of iot
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
 
Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On Approach
 
What is network architecture
What is network architecture What is network architecture
What is network architecture
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
 
A Reference architecture for the Internet of things
A Reference architecture for the Internet of things A Reference architecture for the Internet of things
A Reference architecture for the Internet of things
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
Properties of ubiquitous computing
Properties of ubiquitous computingProperties of ubiquitous computing
Properties of ubiquitous computing
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
4. system models
4. system models4. system models
4. system models
 

Similar to IoT, M2M and IoT System Management

ioT and Machine 2 Machine Computing
ioT and Machine 2 Machine ComputingioT and Machine 2 Machine Computing
ioT and Machine 2 Machine ComputingVikram Nandini
 
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Petr Nemec
 
Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdfvenui2
 
Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613domenico di mola
 
Software Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkSoftware Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkIOSR Journals
 
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...Mistral Solutions
 
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorIRJET Journal
 
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfHCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfRayanneAguiar4
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdffreddysarabia1
 
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...IBM India Smarter Computing
 
Software Defined Networking/ Networking/ Traditional Networking/ SDN Benefits
Software Defined Networking/ Networking/ Traditional Networking/ SDN BenefitsSoftware Defined Networking/ Networking/ Traditional Networking/ SDN Benefits
Software Defined Networking/ Networking/ Traditional Networking/ SDN BenefitsMehak Azeem
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge ComputeMichelle Holley
 
Why sdn
Why sdnWhy sdn
Why sdnlz1dsb
 

Similar to IoT, M2M and IoT System Management (20)

ioT and Machine 2 Machine Computing
ioT and Machine 2 Machine ComputingioT and Machine 2 Machine Computing
ioT and Machine 2 Machine Computing
 
Unit 3 IOT.docx
Unit 3 IOT.docxUnit 3 IOT.docx
Unit 3 IOT.docx
 
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
 
Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdf
 
Security of software defined networks: evolution and challenges
Security of software defined networks: evolution and challengesSecurity of software defined networks: evolution and challenges
Security of software defined networks: evolution and challenges
 
Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613
 
Software Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkSoftware Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer Network
 
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
 
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
 
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfHCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdf
 
IoT & M2M.pdf
IoT & M2M.pdfIoT & M2M.pdf
IoT & M2M.pdf
 
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
 
Software Defined Networking/ Networking/ Traditional Networking/ SDN Benefits
Software Defined Networking/ Networking/ Traditional Networking/ SDN BenefitsSoftware Defined Networking/ Networking/ Traditional Networking/ SDN Benefits
Software Defined Networking/ Networking/ Traditional Networking/ SDN Benefits
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
UDM Report
UDM ReportUDM Report
UDM Report
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge Compute
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
Why sdn
Why sdnWhy sdn
Why sdn
 

More from Vikram Nandini

IoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold BarIoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold BarVikram Nandini
 
Linux File Trees and Commands
Linux File Trees and CommandsLinux File Trees and Commands
Linux File Trees and CommandsVikram Nandini
 
Introduction to Linux & Basic Commands
Introduction to Linux & Basic CommandsIntroduction to Linux & Basic Commands
Introduction to Linux & Basic CommandsVikram Nandini
 
Manufacturing - II Part
Manufacturing - II PartManufacturing - II Part
Manufacturing - II PartVikram Nandini
 
Prototyping Online Components
Prototyping Online ComponentsPrototyping Online Components
Prototyping Online ComponentsVikram Nandini
 
Artificial Neural Networks
Artificial Neural NetworksArtificial Neural Networks
Artificial Neural NetworksVikram Nandini
 
Design Principles for Connected Devices
Design Principles for Connected DevicesDesign Principles for Connected Devices
Design Principles for Connected DevicesVikram Nandini
 
Communication in the IoT
Communication in the IoTCommunication in the IoT
Communication in the IoTVikram Nandini
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityVikram Nandini
 
cloud computing UNIT-2.pdf
cloud computing UNIT-2.pdfcloud computing UNIT-2.pdf
cloud computing UNIT-2.pdfVikram Nandini
 
Introduction to Web Technologies
Introduction to Web TechnologiesIntroduction to Web Technologies
Introduction to Web TechnologiesVikram Nandini
 
Cascading Style Sheets
Cascading Style SheetsCascading Style Sheets
Cascading Style SheetsVikram Nandini
 

More from Vikram Nandini (20)

IoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold BarIoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold Bar
 
Design Patterns
Design PatternsDesign Patterns
Design Patterns
 
Linux File Trees and Commands
Linux File Trees and CommandsLinux File Trees and Commands
Linux File Trees and Commands
 
Introduction to Linux & Basic Commands
Introduction to Linux & Basic CommandsIntroduction to Linux & Basic Commands
Introduction to Linux & Basic Commands
 
INTRODUCTION to OOAD
INTRODUCTION to OOADINTRODUCTION to OOAD
INTRODUCTION to OOAD
 
Ethics
EthicsEthics
Ethics
 
Manufacturing - II Part
Manufacturing - II PartManufacturing - II Part
Manufacturing - II Part
 
Manufacturing
ManufacturingManufacturing
Manufacturing
 
Business Models
Business ModelsBusiness Models
Business Models
 
Prototyping Online Components
Prototyping Online ComponentsPrototyping Online Components
Prototyping Online Components
 
Artificial Neural Networks
Artificial Neural NetworksArtificial Neural Networks
Artificial Neural Networks
 
IoT-Prototyping
IoT-PrototypingIoT-Prototyping
IoT-Prototyping
 
Design Principles for Connected Devices
Design Principles for Connected DevicesDesign Principles for Connected Devices
Design Principles for Connected Devices
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
Embedded decices
Embedded decicesEmbedded decices
Embedded decices
 
Communication in the IoT
Communication in the IoTCommunication in the IoT
Communication in the IoT
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
cloud computing UNIT-2.pdf
cloud computing UNIT-2.pdfcloud computing UNIT-2.pdf
cloud computing UNIT-2.pdf
 
Introduction to Web Technologies
Introduction to Web TechnologiesIntroduction to Web Technologies
Introduction to Web Technologies
 
Cascading Style Sheets
Cascading Style SheetsCascading Style Sheets
Cascading Style Sheets
 

Recently uploaded

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

IoT, M2M and IoT System Management

  • 1. IOT & M2M  Introduction  M2M Vs IoT  SDN & NFV  IoT System Management  SNMP  Network Operator Requirements  NETCONF  YANG  NETOPEER 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 1
  • 2. CREDITS Arshdeep bhagha & Vijay Maddisetti MRS sir Google 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 2
  • 4. MACHINE-TO-MACHINE (M2M) Machine-to-Machine (M2M) refers to networking of machines (or devices) for the purpose of remote monitoring and control and dataexchange. 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 4
  • 5. MACHINE-TO-MACHINE (M2M)  An M2M area network comprises of machines (or M2M nodes) which have embedded hardware modules for sensing, actuation and communication.  Various communication protocols can be used for M2M local area networks such as ZigBee, Bluetooh, ModBus, M-Bus, Wirless M-Bus, Power Line Communication (PLC), 6LoWPAN, IEEE 802.15.4, etc.  The communication network provides connectivity to remote M2M area networks.  The communication network can use either wired or wireless networks (IPbased).  While the M2M area networks use either proprietary or non-IP based communication protocols, the communication network uses IP-based networks. 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 5
  • 6. MACHINE-TO-MACHINE (M2M)  Since non-IP based protocols are used within M2M area networks, the M2M nodes within one network cannot communicate with nodes in an external network.  To enable the communication between remote M2M area networks, M2M gateways are used. 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 6
  • 7. DIFFERENCE BETWEEN IOT &MACHINE-TO-MACHINE (M2M)  Communication Protocols  M2M and IoT can differ in how the communication between the machines or devices happens.  M2M uses either proprietary or non-IP based communication protocols for communication within the M2M area networks.  Machines in M2M vs Things in IoT  The "Things" in IoT refers to physical objects that have unique identifiers and can sense and communicate with their external environment (and user applications) or their internal physical states.  M2M systems, in contrast to IoT, typically have homogeneous machine types within an M2M area network. 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 7
  • 8. DIFFERENCE BETWEEN IOT &MACHINE-TO-MACHINE (M2M)  Hardware vs Software Emphasis  While the emphasis of M2M is more on hardware with embedded modules, the emphasis of IoT is more on software.  Data Collection & Analysis  M2M data is collected in point solutions and often in on-premises storage infrastructure.  In contrast to M2M, the data in IoT is collected in the cloud (can be public, private or hybrid cloud).  Applications  M2M data is collected in point solutions and can be accessed by on-premises applications such as diagnosis applications, service management applications, and onpremisis enterprise applications.  IoT data is collected in the cloud and can be accessed by cloud applications such as analytics applications, enterprise applications, remote diagnosis and management applications, etc. 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 8
  • 9. IOT & MACHINE-TO-MACHINE (M2M) COMMUNICATION 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 9
  • 10. SDN  Software-Defined Networking (SDN) is a networking architecture that separates the control plane from the data plane and centralizes the network controller.  Software-based SDN controllers maintain a unified view of the network and make configuration, management and provisioning simpler.  The underlying infrastructure in SDN uses simple packet forwarding hardware as opposed to specialized hardware in conventional networks. 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 10
  • 11. KEY ELEMENTS OF SDN  Centralized Network Controller  With decoupled control and data planes and centralized network controller, the network administrators can rapidly configure the network.  Programmable Open APIs  SDN architecture supports programmable open APIs for interface between the SDN application and control layers (Northbound interface).  Standard Communication Interface (OpenFlow)  SDN architecture uses a standard communication interface between the control and infrastructure layers (Southbound interface).  OpenFlow, which is defined by the Open Networking Foundation (ONF) is the broadly accepted SDN protocol for the Southbound interface. 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 11
  • 12. NETWORK FUNCTION VIRTUALIZATION (NFV)  Network Function Virtualization (NFV) is a technology that leverages virtualization to consolidate the heterogeneous network devices onto industry standard high volume servers, switches and storage.  NFV is complementary to SDN as NFV can provide the infrastructure on which SDN can run. 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 12
  • 13. KEY ELEMENTS OF NFV  Virtualized Network Function (VNF):  VNF is a software implementation of a network function which is capable of running over the NFV Infrastructure (NFVI).  NFV Infrastructure (NFVI):  NFVI includes compute, network and storage resources that are virtualized.  NFV Management and Orchestration:  NFV Management and Orchestration focuses on all virtualization-specific management tasks and covers the orchestration and life-cycle management of physical and/or software resources that support the infrastructure virtualization, and the life-cycle management of VNFs. 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 13
  • 14. NVF-USE CASE 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 14
  • 15. NVF-USE CASE NFV can be used to virtualize the Home Gateway. The NFV infrastructure in the cloud hosts a virtualized Home Gateway. The virtualized gateway provides private IP addresses to the devices in the home. The virtualized gateway also connects to network services such as VoIP and IPTV. 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 15
  • 16. NEED FOR IOT SYSTEM MANAGEMENT Automating Configuration Monitoring Operational & Statistical Data Improved Reliability System Wide Configurations Multiple System Configurations Retrieving & Reusing Configurations 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 16
  • 17. SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)  SNMP is a well-known and widely used network management protocol that allows monitoring and configuring network devices such as routers, switches, servers, printers, etc.  SNMP component include  Network Management Station (NMS)  Managed Device  Management Information Base (MIB)  SNMP Agent that runs on the device 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 17
  • 18. DRAWBACKS OF SNMP  SNMP is stateless in nature and each SNMP request contains all the information to process the request. The application needs to be intelligent to manage the device.  SNMP is a connectionless protocol which uses UDP as the transport protocol, making it unreliable as there was no support for acknowledgement of requests.  MIBs often lack writable objects without which device configuration is not possible using SNMP.  It is difficult to differentiate between configuration and state data in MIBs.  Retrieving the current configuration from a device can be difficult with SNMP.  Earlier versions of SNMP did not have strong security features. 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 18
  • 19. NETWORK OPERATOR REQUIREMENTS  Ease of use  Distinction between configuration and state data  Fetch configuration and state data separately  Configuration of the network as a whole  Configuration transactions across services  Configuration deltas  Dump and restore configurations 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 19  Configuration validation  Configuration database schemas  Comparing configurations  Role-based access control  Consistency of access control lists:  Multiple configuration sets  Support for both data-oriented and task oriented access control
  • 20. NETCONF  Network Configuration Protocol (NETCONF) is a session-based network management protocol.  NETCONF allows retrieving state or configuration data and manipulating configuration data on network devices 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 20
  • 21. NETCONF  NETCONF works on SSH transport protocol.  Transport layer provides end-to-end connectivity and ensure reliable delivery of messages.  NETCONF uses XML-encoded Remote Procedure Calls (RPCs) for framing request and response messages.  The RPC layer provides mechanism for encoding of RPC calls and notifications.  NETCONF provides various operations to retrieve and edit configuration data from network devices.  The Content Layer consists of configuration and state data which is XML-encoded.  The schema of the configuration and state data is defined in a data modelling language called YANG.  NETCONF provides a clear separation of the configuration and state data.  The configuration data resides within a NETCONF configuration data store on the server. 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 21
  • 22. YANG  YANG is a data modeling language used to model configuration and state data manipulated by the NETCONF protocol  YANG modules contain the definitions of the configuration data, state data, RPC calls that can be issued and the format of the notifications.  YANG modules defines the data exchanged between the NETCONF client and server.  A module comprises of a number of 'leaf' nodes which are organized into a hierarchical tree structure.  The 'leaf' nodes are specified using the 'leaf' or 'leaf-list' constructs.  Leaf nodes are organized using 'container' or 'list' constructs.  A YANG module can import definitions from other modules.  Constraints can be defined on the data nodes, e.g. allowed values.  YANG can model both configuration data and state data using the 'config' statement. 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 22
  • 23. IOT SYSTEMS MANAGEMENT WITH NETCONF-YANG  Management System  • Management API  • Transaction Manager  • Rollback Manager  • Data Model Manager  • Configuration Validator  • Configuration Database  • Configuration API  • Data Provider API 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 23
  • 24. NETOPEER-NETCONF-YANG 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 24
  • 25. SUMMARY  Introduction  M2M Vs IoT  SDN & NFV  IoT System Management  SNMP  Network Operator Requirements  NETCONF  YANG  NETOPEER 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 25
  • 26. ANY CLARIFICATIONS? 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 26
  • 27. THANK YOU FOR YOUR TIME 5/24/2021 DR. VIKRAM NEERUGATTI, PROFESSOR & HEAD, DEPT. OF CSE, ASIT, GUDURU. 27