Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Unit 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

UNIT-I

A dynamic global network infrastructure with self- configuring capabilities based on standard and
interoperable communication protocols, where physical and virtual “things” have identities, physical
attributes, and use intelligent interfaces, and are seamlessly integrated into information network that
communicate data with users and environments.

Characteristics:
Dynamic & Self Adapting: IoT devices and systems may have the capability to dynamically adapt with the
changing contexts and take actions based on their operating conditions, user’s context or sensed
environment.
Eg: the surveillance system is adapting itself based on context and changing conditions.
Self Configuring: allowing a large number of devices to work together to provide certain functionality.
Inter Operable Communication Protocols: support a number of interoperable communication protocols
and can communicate with other devices and also with the infrastructure.
Unique Identity: Each IoT device has a unique identity and a unique identifier(IP address).
Integrated into Information Network: that allow them to communicate and exchange data with other
devices and systems.

Physical Design Of IoT


• An IoT device may consist of several interfaces for connections to other devices, both wired and
wireless.
• I/O interfaces for sensors
• Interfaces for internet connectivity
• Memory and storage interfaces
• Audio/video interfaces

IoT Protocols:
Link Layer : Protocols determine how data is physically sent over the network’s physical layer or
medium.Scope of the link layer is the local network connection to which host is attached. Hosts on the
same link exchange data packets over the link layer using link layer protocols.

Protocols:
• 802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer.
Eg: 802.3 uses co-axial cable; 802.3i uses copper twisted pair connection; 802.3j uses fiber optic
connection; 802.3ae uses Ethernet over fiber.
• 802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN) communication
standards including extensive description of link layer. Eg: 802.11a operates in 5GHz band, 802.11b and
802.11g operates in 2.4GHz band, 802.11n operates in 2.4/5GHz band, 802.11ac operates in 5GHz band,
802.11ad operates in 60Ghz band.
• 802.16 - WiMax: IEEE802.16 is a collection of wireless broadband standards including exclusive
description of link layer. WiMax provide data rates from 1.5 Mb/s to 1 Gb/s.
• 802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless personal area
network(LR-WPAN). Basis for high level communication protocols such as ZigBee. Provides data rate
from 40kb/s to 250kb/s.
• 2G/3G/4G-Mobile Communication: Data rates from 9.6kb/s(2G) to up to 100Mb/s(4G).

Network/Internet Layer: Responsible for sending IP datagrams from source n/w to destination n/w.
Performs the host addressing and packet routing. Datagrams contains source and destination address.
Protocols:
• IPv4: Internet Protocol version4 is used to identify the devices on a n/w using a hierarchical addressing
scheme. 32 bit address. Allows total of 2**32 addresses.
• IPv6: Internet Protocol version6 uses 128 bit address scheme and allows 2**128 addresses.
• 6LOWPAN: ( IPv6 over Low power Wireless Personal Area Network ) operates in 2.4 GHz frequency
range and data transfer 250 kb/s.

Transport Layer: Provides end-to-end message transfer capability independent of the underlying n/w. Set
up on connection with ACK as in TCP and without ACK as in UDP. Provides functions such as error control,
segmentation, flow control and congestion control.
Protocols:
• TCP: Transmission Control Protocol used by web browsers(along with HTTP and HTTPS), email(along
with SMTP, FTP). Connection oriented and stateful protocol. IP Protocol deals with sending packets,
TCP ensures reliable transmission of protocols in order. Avoids n/w congestion and congestion collapse.
• UDP: User Datagram Protocol is connectionless protocol. Useful in time sensitive applications, very
small data units to exchange. Transaction oriented and stateless protocol. Does not provide guaranteed
delivery.

Application Layer: Defines how the applications interface with lower layer protocols to send data over the
n/w. Enables process-to-process communication using ports.
Protocols:
• HTTP: Hyper Text Transfer Protocol that forms foundation of WWW. Follow request-response model
Stateless protocol.
• CoAP: Constrained Application Protocol for machine-to-machine(M2M) applications with constrained
devices, constrained environment and constrained n/w. Uses client-server architecture.
• WebSocket: allows full duplex communication over a single socket connection.
• MQTT: Message Queue Telemetry Transport is light weight messaging protocol based on publish-
subscribe model. Uses client server architecture. Well suited for constrained environment.
• XMPP: Extensible Message and Presence Protocol for real time communication and streaming XML
data between network entities. Support client-server and server-server communication.
• DDS: Data Distribution Service is data centric middleware standards for device-to-device or machine-
to-machine communication. Uses publish-subscribe model.
• AMQP: Advanced Message Queuing Protocol is open application layer protocol for business messaging.
Supports both point-to-point and publish-subscribe model.

Logical design of IOT

• Device: An IoT system comprises of devices that provide sensing, actuation, monitoring and control
functions.
• Communication: handles the communication for IoT system.
• Services: for device monitoring, device control services, data publishing services and services for device
discovery.
• Management: Provides various functions to govern the IoT system.
• Security: Secures IoT system and priority functions such as authentication, authorization, message and
context integrity and data security.
• Application: IoT application provide an interface that the users can use to control and monitor various
aspects of IoT system.

IoT Communication Models:


1)Request-Response 2) Publish-Subscibe3) Push-Pull4) Exclusive Pair

• Request–Response is a communication model in which the client sends requests to the server and the
server responds to the requests.
• When the server receives a request, it decides how to respond, fetches the data, retrieves resource
representations, prepares the response and then sends the response to the client.
• Stateless communication model
• Publish–Subscribe is a communication model that involves publishers, brokers and consumers.
• Publishers are the source of data.Publishers send the data to the topics which are managed by the
broker. Publishers are not aware of the consumers.
• Consumers subscribe to the topics which are managed by the broker.
• When the broker receives data for a topic from the publisher, it sends the data to all the subscribed
consumers.

• Push–Pull is a communication model in which the data producers push the data to queues and the
consumers pull the data from the queues. Producers do not need to be aware of the consumers.
• Queues help in decoupling the messaging between the producers and consumers.
• Queues also act as a buffer which helps in situations when there is a mismatch between the rate at
which the producers push data and the rate at which the consumers pull data.

• Exclusive Pair is a bidirectional, fully duplex communication model that uses a persistent connection
between the client and the server.
• Once the connection is set up it, remains open until the client sends a request to close the connection.
• Client and server can send messages to each other after connection setup.
IoT Communication APIs
REST based communication APIs(Request-Response Based Model)
WebSocket based Communication APIs(Exclusive Pair BasedModel)
Representational State Transfer (REST) is a set of architectural principles by which you can design web
services and web APIs that focus on a system’s resources and how resource states are addressed and
transferred.
REST APIs follow the request–response communication model.
REST architectural constraints apply to the components, connectors and data elements within a distributed
hypermedia system

Client-Server: The principle behind client-server constraint is the separation of concerns.


Separation allows client and server to be independently developed and updated.
Stateless: Each request from client to server must contain all the info necessary to understand the request,
and cannot take advantage of any stored context on the server.
Cache-able: Cache constraint requires that the data within a response to a request be implicitly or
explicitly labeled as cache-able or non-cacheable. If a response is cache-able, then a client cache is given
the right to reuse that response data for later, equivalent requests.
Layered System: constraints the behavior of components such that each component cannot see beyond
the immediate layer with which they are interacting.
User Interface: constraint requires that the method of communication between a client and a server must
be uniform.
Code on Demand: Servers can provide executable code or scripts for clients to execute in their context.
This constraint is the only one that is optional.
WebSocket based Communication APIs(Exclusive Pair BasedModel)
WebSocket APIs allow bi-directional, full duplex communication between clients and servers.
WebSocket APIs follow the exclusive pair communication model

IoT Enabling Technologies


IoT is enabled by several technologies including Wireless Sensor Networks, Cloud Computing, Big Data
Analytics, Embedded Systems, Security Protocols and architectures, Communication Protocols, Web
Services, Mobile internet and semantic search engines.

Wireless Sensor Network(WSN): Comprises of distributed devices with sensors which are used to monitor
the environmental and physical conditions. Zig Bee is one of the most popular wireless technologies used
by WSNs.
WSNs used in IoT systems are described as follows:
• Weather Monitoring System: in which nodes collect temp, humidity and other data, which is
aggregated and analyzed.
• Indoor air quality monitoring systems: to collect data on the indoor air quality and concentration of
various gases.
• Soil Moisture Monitoring Systems: to monitor soil moisture at various locations.
• Surveillance Systems: use WSNs for collecting surveillance data(motion data detection).
• Smart Grids : use WSNs for monitoring grids at various points.
• Structural Health Monitoring Systems: Use WSNs to monitor the health of structures(building, bridges)
by collecting vibrations from sensor nodes deployed at various points in the structure.

Cloud Computing: Services are offered to users in different forms.


• Infrastructure-as-a-service(IaaS):provides users the ability to provision computing and storage
resources. These resources are provided to the users as a virtual machine instances and virtual storage.
• Platform-as-a-Service(PaaS): provides users the ability to develop and deploy application in cloud using
the development tools, APIs, software libraries and services provided by the cloud service provider.
• Software-as-a-Service(SaaS): provides the user a complete software application or the user interface to
the application itself.

Big Data Analytics: Some examples of big data generated by IoT are
• Sensor data generated by IoT systems.
• Machine sensor data collected from sensors established in industrial and energy systems.
• Health and fitness data generated IoT devices.
• Data generated by IoT systems for location and tracking vehicles.
• Data generated by retail inventory monitoring systems.
Communication Protocols: form the back-bone of IoT systems and enable network connectivity and
coupling to applications.
• Allow devices to exchange data over network.
• Define the data exchange formats, data encoding addressing schemes for device and routing of packets
from source to destination.
• It includes sequence control, flow control and retransmission of lost packets.

Embedded Systems: is a computer system that has computer hardware and software embedded to
perform specific tasks. Embedded System range from low cost miniaturized devices such as digital watches
to devices such as digital cameras, POS terminals, vending machines, appliances etc.,

IoT Levels and Deployment Templates


An IoT system comprises the following components:
• Device:An IoT device allows identification, remote sensing, actuating and remote monitoring
capabilities.
• Resource:Resources are software components on the IoT device for accessing, processing and storing
sensor information, or for controlling actuators connected to the device. Resources also include the
software components that enable network access for the device.
• Controller Service:Controller service is a native service that runs on the device and interacts with the
web services. Controller service sends data from the device to the web service and receives commands
from the application (via web services) for controlling the device.
• Database:Database can be either local or in the cloud and stores the data generated by the IoT device.
• Web Service:Web services serve as a link between the IoT device, application, database and analysis
components.Web service can be implemented using HTTP and REST principles (REST service) or using
the WebSocket protocol (WebSocket service).
• Analysis Component:This is responsible for analyzing the IoT data and generating results in a form that
is easy for the user to understand.
• Application:IoT applications provide an interface that the users can use to control and monitor various
aspects of the IoT system. Applications also allow users to view the system status and the processed
data.

• A level-1 IoT system has a single node/device that performs sensing and/or actuation, stores data,
performs analysis and hosts the application.
• Level-1 IoT systems are suitable for modelling low-cost and low-complexity solutions where the data
involved is not big and the analysis requirements are not computationally intensive.

• A level-2 IoT system has a single node that performs sensing and/or actuation and local analysis.
• Data is stored in the cloud and the application is usually cloud-based.
• Level-2 IoT systems are suitable for solutions where the data involved is big; however, the primary
analysis requirement is not computationally intensive and can be done locally.

• A level-3 IoT system has a single node. Data is stored and analyzed in the cloud and the application is
cloud-based.
• Level-3 IoT systems are suitable for solutions where the data involved is big and the analysis
requirements are computationally intensive.

• A level-4 IoT system has multiple nodes that perform local analysis. Data is stored in the cloud and the
application is cloud-based.
• Level-4 contains local and cloud-based observer nodes which can subscribe to and receive information
collected in the cloud from IoT devices.
• Level-4 IoT systems are suitable for solutions where multiple nodes are required, the data involved is big
and the analysis requirements are computationally intensive.

• A level-5 IoT system has multiple end nodes and one coordinator node.
• The end nodes perform sensing and/or actuation.
• The coordinator node collects data from the end nodes and sends it to the cloud.
• Data is stored and analyzed in the cloud and the application is cloud-based.
• Level-5 IoT systems are suitable for solutions based on wireless sensor networks, in which the data
involved is big and the analysis requirements are computationally intensive.

• A level-6 IoT system has multiple independent end nodes that perform sensing and/or actuation and
send data to the cloud.
• Data is stored in the cloud and the application is cloud-based.
• The analytics component analyzes the data and stores the results in the cloud database.
• The results are visualized with the cloud-based application.
• The centralized controller is aware of the status of all the end nodes and sends control commands to
the nodes.

DOMAIN SPECIFIC IoTs


1) Home Automation:
a) Smart Lighting: helps in saving energy by adapting the lighting to the ambient conditions and switching
on/off or diming the light when needed.
b) Smart Appliances: make the management easier and also provide status information to the users
remotely.
c) Intrusion Detection: use security cameras and sensors(PIR sensors and door sensors) to detect
intrusion and raise alerts. Alerts can be in the form of SMS or email sent to the user.
d) Smoke/Gas Detectors: Smoke detectors are installed in homes and buildings to detect smoke that is
typically an early sign of fire. Alerts raised by smoke detectors can be in the form of signals to a fire
alarm system. Gas detectors can detect the presence of harmful gases such as CO, LPG etc.,

2) Cities:
a) Smart Parking: make the search for parking space easier and convenient for drivers. Smart parking are
powered by IoT systems that detect the no. of empty parking slots and send information over internet
to smart application back ends.
b) Smart Lighting: for roads, parks and buildings can help in saving energy.
c) Smart Roads: Equipped with sensors can provide information on driving condition, travel time
estimating and alert in case of poor driving conditions, traffic condition and accidents.
d) Structural Health Monitoring: uses a network of sensors to monitor the vibration levels in the
structures such as bridges and buildings.
e) Surveillance: The video feeds from surveillance cameras can be aggregated in cloud based scalable
storage solution.
f) Emergency Response: IoT systems for fire detection, gas and water leakage detection can help in
generating alerts and minimizing their effects on the critical infrastructures.

3) Environment:
Weather Monitoring: Systems collect data from a no. of sensors attached and send the data to cloud
based applications and storage back ends. The data collected in cloud can then be analyzed and
visualized by cloud based applications.
a) Air Pollution Monitoring: System can monitor emission of harmful gases(CO2, CO, NO, NO2 etc.,) by
factories and automobiles using gaseous and meteorological sensors. The collected data can be
analyzed to make informed decisions on pollutions control approaches.
b) Noise Pollution Monitoring: Due to growing urban development, noise levels in cities have increased
and even become alarmingly high in some cities. IoT based noise pollution monitoring systems use a
no. of noise monitoring systems that are deployed at different places in a city. The data on noise levels
from the station is collected on servers or in the cloud. The collected data is then aggregated to
generate noise maps.
c) Forest Fire Detection: Forest fire can cause damage to natural resources, property and human life.
Early detection of forest fire can help in minimizing damage.
d) River Flood Detection: River floods can cause damage to natural and human resources and human life.
Early warnings of floods can be given by monitoring the water level and flow rate. IoT based river flood
monitoring system uses a no. of sensor nodes that monitor the water level and flow rate sensors.

4) Energy:
a) Smart Grids: is a data communication network integrated with the electrical grids that collects and
analyze data captured in near-real-time about power transmission, distribution and consumption.
Smart grid technology provides predictive information and recommendations to utilities, their
suppliers, and their customers on how best to manage power. By using IoT based sensing and
measurement technologies, the health of equipment and integrity of the grid can be evaluated.
b) Renewable Energy Systems: IoT based systems integrated with the transformers at the point of
interconnection measure the electrical variables and how much power is fed into the grid. For wind
energy systems, closed-loop controls can be used to regulate the voltage at point of interconnection
which coordinate wind turbine outputs and provides power support.
c) Prognostics: In systems such as power grids, real-time information is collected using specialized
electrical sensors called Phasor Measurment Units(PMUs) at the substations. The information received
from PMUs must be monitored in real-time for estimating the state of the system and for predicting
failures.

5) Retail:
a) Inventory Management: IoT systems enable remote monitoring of inventory using data collected by
RFID readers.
b) Smart Payments: Solutions such as contact-less payments powered by technologies such as Near Field
Communication(NFC) and Bluetooth.
c) Smart Vending Machines: Sensors in a smart vending machines monitors its operations and send the
data to cloud which can be used for predictive maintenance.

6) Logistics:
a) Route generation & scheduling: IoT based system backed by cloud can provide first response to the
route generation queries and can be scaled upto serve a large transportation network.
b) Fleet Tracking: Use GPS to track locations of vehicles in real-time.
c) Shipment Monitoring: IoT based shipment monitoring systems use sensors such as temp, humidity, to
monitor the conditions and send data to cloud, where it can be analyzed to detect food spoilage.
d) Remote Vehicle Diagnostics: Systems use on-board IoT devices for collecting data on Vehicle
operaions(speed, RPMetc.,) and status of various vehicle sub systems.

7) Agriculture:
a) Smart Irrigation: to detemine moisture amount in soil.
b) Green House Control: to improve productivity.

8) Industry:
a) Machine diagnosis and prognosis
b) Indoor Air Quality Monitoring

9) Health and Life Style:


a) Health & Fitness Monitoring
b) Wearable Electronics

You might also like