Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

43-IoT - Assignment Brief 1 2018 - 2019

Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

ASSIGNMENT 1 BRIEF

Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 43: Internet of Things

Assignment title

Academic Year 2020-2021

Unit Tutor Ho Hai Van

Issue date Submission date October, 24th 2020

IV name and date

Submission Format:

Format: This assignment is an Individual assignment and specifically including 1 document:


You must use font Calibri size 12, set number of the pages and use multiple line spacing at
1.3. Margins must be: left: 1.25 cm; right: 1 cm; top: 1 cm and bottom: 1 cm. The reference
follows Harvard referencing system. The recommended word limit is 2.000-2.500 words.
You will not be penalized for exceeding the total word limit. The cover page of the report
has to be the Assignment front sheet 1.
Submission Students are compulsory to submit the assignment in due date and in a way requested by
the Tutors. The form of submission will be a soft copy posted on
http://cms.greenwich.edu.vn/
Note: The Assignment must be your own work, and not copied by or from another student or from
books etc. If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style. Make sure that you know how to reference
properly, and that understand the guidelines on plagiarism. If you do not, you definitely get fail

Unit Learning Outcomes:

LO1 Analyse what aspects of IoT are necessary and appropriate when designing software applications
LO2 Outline a plan for an appropriate IoT application using common architecture, frameworks, tools, hardware
and APIs
LO3 Develop an IoT application using any combination of hardware, software, data, platforms and services.
LO4 Evaluate your IoT application and detail the problem your IoT application solves, the potential impact on

Page 1
people, business, society and the end user and the problems it might encounter when integrating into the wider
IoT ecosystem

Assignment Brief and Guidance:

You currently work as a product developer for a new startup where you design IoT products for the
consumer, corporate, government and defence clients. As part of your role your manager has tasked you
to plan and develop a new IoT product, service or application for a potential client. You are required to
identify a target user and conduct tests with this user and include this feedback into multiple iterative
versions of your product.

Part 1 (Assignment 1):: For the first part, you must:

• Plan an IoT application for a specific target end user and the tests you intend to conduct with this
user. This plan will be in the form of a document and will include supporting evidence and
material, such as user personas and customer journey maps.
• Create multiple iterations of your application and modify each iteration with enhancements
gathered from user feedback and experimentation. This will follow the pathway outlined in your
plan.(log book,)

Part 2 (Assignment 2): For the first part, you must:

• Show evidence about Developed IoT application using any combination of hardware, software,
data, platforms and services (video or images of your IoT system with code snippet)
• Evaluate your IoT application and detail the problem your IoT application solves, the potential
impact on people, business, society and the end user and the problems it might encounter when
integrating into the wider IoT ecosystem

Page 2
Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Analyse what aspects of IoT are necessary and appropriate when designing software
applications

P1 Explore various forms of M1 Evaluate the impact of D1 Evaluate specific forms of


IoT functionality. common IoT architecture, IoT architecture and justify their
frameworks, tools, hardware and use when designing software
APIs in the software development applications.
P2 Review standard
lifecycle.
architecture, frameworks,
tools, hardware and APIs
available for use in IoT M2 Review specific forms of IoT
development. architecture, frameworks, tools,
hardware and APIs for different
problem-solving requirements.

LO2 Outline a plan for an appropriate IoT application using common architecture, frameworks,
tools, hardware and APIs

P3 Investigate architecture, M3 Select the most appropriate D2 Make multiple iterations of


frameworks, tools, hardware IoT architecture, frameworks, your IoT application and modify
and API techniques available tools, hardware and API each iteration with
to develop IoT applications. techniques to include in an enhancements gathered from
application to solve this problem. user feedback and
experimentation.
P4 Determine a specific
problem to solve using IoT. M4 Apply your selected
techniques to create an IoT
application development plan.

Figure 1– Internet of underwater things ..................................................................................................................... 6


Figure 2: Internet of underground things .................................................................................................................... 7
Figure 3:Internet of battlefield things ......................................................................................................................... 8
Figure 4: Internet of space things ................................................................................................................................ 9
Figure 5: Internet of nano-things .............................................................................................................................. 10
Figure 6: Internet of bio-nanothings ......................................................................................................................... 11
Figure 7: Architecture of IoT (A: three layers) (B: five layers) ..................................................................................... 12
Figure 8: IoT standard framework (Session 2 - Design Framework for IoT system) ..................................................... 13
Figure 9: IoT standard tool – Tinkercad (Session 3 - Basic of IoT System) ................................................................... 13
Figure 10: IoT standard tool – Cisco Packet Tracer (Session 7- Communication Packet Tracer) .................................. 14
Figure 11: IoT standard hardware (Session 3 - Basic of IoT System) ........................................................................... 15
Figure 12: IoT standard APIs – Web API & MQTT API ................................................................................................. 16

Page 3
Figure 13: – IoT standard architecture – Application layer – Application protocols (Session 7- Communication Packet
Tracer) ...................................................................................................................................................................... 17
Figure 14: IoT standard architecture – Application layer – Application protocols – CoAP ........................................... 18
Figure 15: IoT standard architecture – Application layer – Application protocols – MQTT.......................................... 19
Figure 16: IoT framework – IOT Design Framework Layers ........................................................................................ 20
Figure 17: IoT framework – Design Framework example : Quad-copter..................................................................... 21
Figure 18: IoT tools – Tinkercad: example (Session 3 - Basic of IoT System) ............................................................... 22
Figure 19: IoT framework – Cisco packet tracer: example (Session 7- Communication Packet Tracer) ....................... 22
Figure 20: IoT standard hardware – Sensors & Actuators ......................................................................................... 23
Figure 21: IoT standard hardware – The Fog ............................................................................................................. 24
Figure 22: IoT standard hardware – The Cloud .......................................................................................................... 25
Figure 23: IoT standard APIs – CoAP vs MQTT APIs.................................................................................................... 26

Page 4
Table of Contents
P1 Explore various forms of IoT functionality. ........................................................................................................... 6
P2 Review standard architecture, frameworks, tools, hardware and APIs available for use in IoT development .... 11
• Architecture of IoT........................................................................................................................................ 11
P3 Investigate architecture, frameworks, tools, hardware and API techniques available to develop IoT applications.
................................................................................................................................................................................. 17
P4 Determine a specific problem to solve using IoT ................................................................................................. 27
Design thinking .................................................................................................................................................... 27
Questions for Defining a Problem ........................................................................................................................ 27
What is the Problem? .............................................................................................................................................. 27
Security for your home when you are not at home ................................................................................................. 27
Who has this problem, and what do we know about them? .................................................................................... 27
People often not at home and don’t have any one to look after there home, or they want protection for there
property or maybe for there children ...................................................................................................................... 27
What are their concerns and needs? ........................................................................................................................ 27
Their concerns are afraid of intruder, burglary,… they need a solution that can help them prevent or stop them
from stealing there properties. ................................................................................................................................ 27
How do they interact with their environment?........................................................................................................ 27
You live work play in your house, but sometime you have to go out for business. .................................................. 27
What causes the problem? ...................................................................................................................................... 27
When they not at home, some people can try to break in to their home. ............................................................... 27
When does this problem occur?............................................................................................................................... 27
When they not at home or at night, when they a sleep. .......................................................................................... 27
Can you turn this problem into a question? ............................................................................................................. 27
What is the best way to prevent or stop these thing to happen to our be love home. ............................................ 27
Research on available solutions ........................................................................................................................... 28
Process Diagrams ................................................................................................................................................. 28
Design a system: Choosing sensors ...................................................................................................................... 29
Design a system: Connecting devices ................................................................................................................... 29
Design a system: Local storage and processing .................................................................................................... 29
Design a system - Security requirements: ............................................................................................................ 30
Physical design ..................................................................................................................................................... 30
Design a system - Powering your device .............................................................................................................. 30
To powered this system, we will connect it direct to your house electrical grid and there will be an emergency
power souce to power only the system at least for a week or more consider your choice. .................................... 30
References ............................................................................................................................................................... 31

Page 5
P1 Explore various forms of IoT functionality.

Figure 1– Internet of underwater things

This network is needed as a result of the earth’s configuration. For one, 72% of the earth’s surface is
covered by water. This statistic means that IoT can connect only 28% of the earth in full operation. Climate
deregulation is the main cause of natural disasters, and it is a known fact that oceans are largely
responsible for regulating climate globally.

Lots of smart underwater objects have been created in recent years; some of which are autonomous
underwater vehicles( AUV), remotely operated underwater vehicles ( ROV), autonomous surface vehicles
and more. With these inventions, underwater wireless sensors networks have been deployed, and have
been a largely successful network system. In this network system, underwater sensors are the major
components; the sensors used are nodes with acoustic modems. These sensors are connected to the smart
objects underwater through nodes, and relay information such water quality, temperature and pressure
through acoustic modems. While this is a promising prospect, it can not yet be put to full use, due to the
challenges facing IoUT.

Page 6
Figure 2: Internet of underground things

The projected increases in World population and need for food have recently motivated adoption of
information technology solutions in crop fields within precision agriculture approaches. Internet Of
Underground Things (IOUT), which consists of sensors and communication devices, partly or completely
buried underground for real-time soil sensing and monitoring, emerge from this need. This new paradigm
facilitates seamless integration of underground sensors, machinery, and irrigation systems with the
complex social network of growers, agronomists, crop consultants, and advisors. In this paper, state-of-the-
art communication architectures are reviewed, and underlying sensing technology and communication
mechanisms for IOUT are presented. Moreover, recent advances in the theory and applications of wireless
underground communication are also reported. Finally, major challenges in IOUT design and
implementation are identified.

Page 7
Figure 3:Internet of battlefield things

In the IoBT, we will see all the IT “things” that a brick-and-mortar command center needs shrunk down to
fit in a vehicle, a transport case, and even smaller form factors. These “anywhere” platforms will be easy to
set up and make command centers less static targets for adversarial threats.

Bringing the IoBT to reality requires a gargantuan partnership effort between government, industry, and
the scientific community. Progress in technical disciplines including IT, engineering and integration,
software, and analytics must continue.

And many philosophical questions exist around resiliency, continuity of operations, and disaggregation of
capabilities to reduce the attack footprint. For instance, just how much data and infrastructure should we
put in the cloud if we can’t get to it for some reason?

As a technology and complex systems integrator, SAIC is well positioned to tackle these challenges. Unlike
OEMs supplying products, we seek out the most suitable technologies and take a holistic, system of
systems approach to solutions developmen

Page 8
Figure 4: Internet of space things

The Internet of Things ( IoT) has been identified as a core driver of 5 G wireless communications, ranging
from linked temperature sensors to unmanned aerial vehicles with a planned 50 billion endpoints by 2020.
IoT's long-term performance is related to its pervasiveness, an environment where today's heterogeneous
communication solutions fall short by a substantial margin. Only when it is augmented with a pervasive
networking network capable of operating even in the most remote locations will the true potential of IoT
be realized. This paper presents a novel cyber-physical structure called the Internet of Space Things /
CubeSats (IoST) that encompasses land, air, and space. Based on CubeSats, IoST is intended as a means of
achieving low-cost global connectivity, further assisted by the use of Software-Defined Networking and
Network Function Virtualization that offers fine-grained control of the hardware of the system, enhances
the use of network resources, and simplifies network management. In addition to the thorough
explanation of the component-level system, innovative solutions are also given to tackle the peculiarities of
the space world. In addition, through a preliminary performance assessment targeting key metrics such as
latency and throughput, the potential of the device is seen.

Page 9
Figure 5: Internet of nano-things

Nanotechnology is for the nanoparticles which cannot be identified with earlier technologies. For example,
we have sensors to detect various objects but that failed in the case of detecting nanoparticles. Then
Nanosensors come into the picture, which is helping us to collect the information from nanoparticles of the
microscopic world. In the case of medical science, the Nanosensors are being used to detect the stage of
tumors and cancers. The data accuracy and observations up to cell level make the Nanosensors more
reliable. Thus the doctors and researchers used this technology to detect the diseases in more accurately.

The Nanotechnology provides intelligent solutions in many areas such as biomedical, industrial and military
fields as well as in consumer and industrial goods. It is the ability to engineering the functional systems at
the nano scale – the particles at the molecular level.

Page 10
Figure 6: Internet of bio-nanothings

Facilitated by the recent advancements in synthetic biology and nanotechnology, the Internet of Bio-Nano
Things (IoBNT) promises a wide range of potential applications.

In the area of environmental sustainability, bacteria could be programmed and deployed in different
surroundings, such as the sea or “smart” cities, to sense for toxins and pollutants, gather data, and
undertake the bioremediation processes. In medicine and healthcare, bacteria could be programmed to
swim to a chosen destination within the human body, produce and release the hormones to treat diseases.

P2 Review standard architecture, frameworks, tools, hardware and APIs available for use in IoT
development

• Architecture of IoT
Three- and Five-Layer Architectures

The most basic architecture is a three-layer architecture [3–5] as shown in Figure 7. It was introduced in the
early stages of research in this area. It has three layers, namely, the perception, network, and application
layers.

• The perception layer is the physical layer, which has sensors for sensing and gathering information
about the environment. It senses some physical parameters or identifies other smart objects in the
environment.
• The network layer is responsible for connecting to other smart things, network devices, and servers.
Its features are also used for transmitting and processing sensor data.

Page 11
• The application layer is responsible for delivering application specific services to the user. It defines
various applications in which the Internet of Things can be deployed, for example, smart homes,
smart cities, and smart health.

Figure 7: Architecture of IoT (A: three layers) (B: five layers)

The three-layer architecture defines the main idea of the Internet of Things, but it is not sufficient for
research on IoT because research often focuses on finer aspects of the Internet of Things. That is why, we
have many more layered architectures proposed in the literature. One is the five-layer architecture, which
additionally includes the processing and business layers [3–6]. The five layers are perception, transport,
processing, application, and business layers (see Figure 7). The role of the perception and application layers
is the same as the architecture with three layers. We outline the function of the remaining three layers.

• The transport layer transfers the sensor data from the perception layer to the processing layer and
vice versa through networks such as wireless, 3G, LAN, Bluetooth, RFID, and NFC.
• The processing layer is also known as the middleware layer. It stores, analyzes, and processes huge
amounts of data that comes from the transport layer. It can manage and provide a diverse set of
services to the lower layers. It employs many technologies such as databases, cloud computing, and
big data processing modules.
• The business layer manages the whole IoT system, including applications, business and profit
models, and users’ privacy. The business layer is out of the scope of this paper. Hence, we do not
discuss it further.

Page 12
Figure 8: IoT standard framework (Session 2 - Design Framework for IoT system)

Smart Applications layer: combines together all other layers and embraces multiple market choices.
Analytics layer: translating sensor data into usable data.
Connectivity Layer: the communication protocol used to transfer product information to the cloud.
Sensor Layer: sense and receive data then transmit through network.
Product infrastructure layer: Harware and software use to operate the product

Figure 9: IoT standard tool – Tinkercad (Session 3 - Basic of IoT System)

Page 13
IoT applications are intended for data collection , processing, visualization and management of
devices. And we've got TinkerCad for the web browser. With simplicity and ease of use, online
computer-aided (CAD) design is free. Software where 3D objects can be designed, updated, and
printed by users.

Figure 10: IoT standard tool – Cisco Packet Tracer (Session 7- Communication Packet Tracer)
• Packet Tracer is a tool developed by Cisco Systems, Inc. for visual cross-platform network
simulation that can run on both Linux and Windows. This tool enables users to create
network topologies and to simulate current computer networks with simulations. This
program allows users to simulate the configuration of Cisco routers and switches and to use
the command line interface to support simulation.
• Packet Tracer has a simple-to-use user interface to allow users to add and uninstall
simulation networks as they wish, and drag and drop devices into the model. This software
primarily serves the laboratory needs of students who need to study but do not have
adequate laboratory equipment. And the Cisco Network Partner Academy also certifies it as
an educational tool to help you understand CCNA's fundamental concepts.

Page 14
-

Figure 11: IoT standard hardware (Session 3 - Basic of IoT System)

Connected devices are central to IoT. Devices gather data and monitor parameters. They are found on
everything from industrial equipment, buildings, and cars, to animals, cargo shipments, pipelines, and
people.

Hardware and software components are designed for IoT applications via a standard design protocol:
specification development, conceptual design, prototype, test, and ultimately rollout of hardware and
software integrated into a network. Some platforms, such as Arduino and Raspberry Pi, may expedite
design and allow rapid prototyping without involved customization, thus expediting the time required to
implement an IoT configuration.

Design will require identification of performance requirements, the necessary hardware and software to
achieve such requirements, followed by specifications for components – either commercially off-the-
shelf (COTS) or customized designs – with due consideration for the operating environment and the
application to be used within it.

In the context of IoT, a device refers to anything that attains information and transmits it. For example, a
pressure sensor within a pipeline, a temperature sensor within a refrigerated railcar, or tiny chips
inserted beneath the skin of a cow in a scattered heard – are all devices. Devices may stand alone, or
they work in sync with other devices.

Page 15
An

Figure 12: IoT standard APIs – Web API & MQTT API

An API is an interface for accessing an application used by programs. It enables a program to send
commands and receive responses from that application to another program. Many of today's APIs
are Web APIs and are intended to use the HTTP protocol. MQTT (Message Queuing Telemetry
Transport) is a publish / subscribe (message) protocol that uses low bandwidth, has high reliability
and is capable of operating under unpredictable transmission conditions, and the IoT protocol is
becoming the primary one.

Page 16
P3 Investigate architecture, frameworks, tools, hardware and API techniques available to develop IoT
applications.

Figure 13: – IoT standard architecture – Application layer – Application protocols (Session 7-
Communication Packet Tracer)

When we analyze application layer protocols in the context of IoT, what we're really doing is looking at the
various ways that these devices communicate with one another. In order for a smart door lock to tell your
smartphone that you are home so it can unlock, it has to be able to communicate that information in some
way. Application layer protocols provide those communication tools in the IoT protocol stack. In short,
application layer protocol is the messaging protocol that these IoT devices use to transport data.

Purpose and Necessity

Without application layer protocols, communication in the IoT world is non-existent. That means devices
cannot communicate with each other on your home network, for example, nor can they communicate over
the internet or with servers that house important data. These protocols enable the secure and efficient
transmission of information that makes IoT devices useful in today's world.

Just like we have specific protocols that carry out text messages or enable our phone calls, IoT devices have
protocols that make data transfer possible. The most diffused protocols are known as Constrained
Application Protocol, or CoAP, and Message Queuing Telemetry Transport, or MQTT. Let's look at each of
these a little more closely.

Page 17
Figure 14: IoT standard architecture – Application layer – Application protocols – CoAP

CoAP bundles are much smaller than TCP lines for HTTP. To save space, the bit fields and the luster
of the string of integers are commonly used. Without additional RAM in restricted machines, very
simple packages can be created and analysed in location. CoAP uses UDP (User Datagram Protocol),
which does not support TCP, which also allows broadcast which multicast addresses, non-connected
datagram (connectionless) CoAP communications that can be used on package-based
communication protocols. On micro-controllers, UDP can be easily deployed than TCP, but security
tools such as SSL / TSL are not usable, but instead we can use Datagram Transport Layer Security
(DTLS). Under the client / server paradigm, CoAP. The client sends a request to the server and the
server sends a reply again after that. The Customer May
Tools for GET, PUT, POST and DELETE.

Page 18
Figure 15: IoT standard architecture – Application layer – Application protocols – MQTT

For connecting parties, MQTT uses a pub / sub template. By separating the sender (publisher) from
the receiver (subscriber), MQTT does that. Publishers send messages that many subscribers are
waiting to receive on a central subject. Publishers and subscribers are independent, which suggests
that they do not need to recognize the existence of each other.
- The three components of the MQTT network are:
+ Publisher: When every other station sends data, each client receives data and the registered
channel. "It's called" publish "when a client sends data to that channel.
+ Subscriber: Several station nodes (called mqtt clients) have a MQTT server (called a broker)
connection. Multiple channels (topics) are subscribed to each client, such as "/client1 / channel1",
"/client1 / channel2".
+ Message broker: It is the duty of the broker to accept all messages, sort messages, determine who
cares about them and then publish messages to all registered clients.

Page 19
Figure 16: IoT framework – IOT Design
Framework Layers

There are four key design objectives for IoT frameworks: reducing development time and getting IoT
technologies to market earlier; reducing the obvious difficulty of deploying and running an IoT network;
enhancing portability and interoperability of applications; and enhancing serviceability, reliability, and
maintenance.
Frameworks hide the difficulty of networking under a higher-level message passing abstraction, such as
REST and subscribe-publish.
-- Product Technology layer: the product's hardware & software
-- The layer of sensors: sensors & networks supporting them
-- Connection Layer: protocol of communication needed to send product information to the Cloud

Page 20
-- Smart Apps layer: integrates together all other layers and supports various business decisions.

Figure 17: IoT framework – Design Framework example : Quad-copter

App control camera

• Video + Mic information display. Control camera zoom out or in, turn on night mode, etc

Convert data from Sensor

• into temperature and humidity

Internet Protocol

• to stream camera and sensor data

Camera for visual data

• Sensor for temperature and humidity


• Gyroscope for orientation

Hardware’

• [LED light + sensors + Frame]


• Software [Control Algorithms]

Page 21
Figure 18: IoT tools – Tinkercad: example (Session 3 - Basic of IoT System)

Tinkercad is available via a web browser for anyone with an internet connection (Chrome is
recommended), making it easy for anyone to learn a staple of the design process: combining
several simple objects to construct more complex shapes. It also allows you to build your own
forms or select shapes to subtract from their projects, offering an simple way to use negative
space as a tool to create arches or holes.
-You can log in with your Google account, then build 3D models or circuits

Figure 19: IoT framework – Cisco packet tracer: example (Session 7- Communication Packet Tracer)

- A cable describes the physical connection between two devices in the Packet Tracer. As well as simple
routing with RIP, OSPF, EIGRP, BGP with the degree of expansion required by the current CCNA software,
Packet Tracer supports a broad range of application-layer protocols. The Boundary Gateway protocol has
been provided by Packet Tracer since version 5.3. In addition to network emulation, it is also possible to
use Packet Tracer as an interaction method. Packet Tracer has supported multi-user systems since version
5.0, linking multiple topologies together through a computer network. Packet Tracer has been verified by
Cisco Systems as helpful for network monitoring.

Page 22
Figure 20: IoT standard hardware – Sensors & Actuators

Definition: A system that translates signals from a domain of energy into an electrical domain. If we take an
example to consider, the concept of the sensor is understandable.

Example

• Temperature sensor: The temperature sensor is one of the most common and popular sensors. As
the name suggests, a temperature sensor senses temperature, i.e., it tracks temperature changes.
Temperature sensors are used everywhere, such as computers , cell phones, vehicles, air
conditioning systems, factories.
• Proximity Sensors: Proximity sensors are non-contact sensors which detect an object 's presence.
Using different techniques such as optics, proximity sensors can be created. Cell phones, cars
(parking sensors), industry (alignment of objects), ground distance in airplanes are some
applications of proximity sensors.
• Ultrasonic Sensor: An ultrasonic sensor is a system of the non-contact form which can be used to
determine both the distance and the speed of an object. At frequencies higher than those that
humans can hear, ultrasonic sensors operate on the properties of sound waves.

Page 23
Figure 21: IoT standard hardware – The Fog

The idea of cloud computing and the Edge network is expanded by Fog Computing, making it the ideal
processing environment for IoT and other applications requiring real time interactions. The idea of a
network layer extending from the boundary layer where data is generated to where it will ultimately be
processed, whether in the cloud or in the data center of the customer, is Fog Computing. The IoT produces
data from the network boundary nodes (Edge Network) and the data processing centers which be the final
destination. It provides a missing link for information that can be moved to the cloud and what can be
examined locally at the IOT.

Page 24
Figure 22: IoT standard hardware – The Cloud

- IOT provides public cloud services in the cloud that can conveniently assist the IoT region by offering
access to the networks for third parties. IoT data or computing elements running over IoT devices may also
be supported by integration.

- Increased Scalability: IoT devices need a lot of storage to share information for valuable purposes. Iot in
cloud, like the StoneFly Cloud Connect to Microsoft Azure can provide customers with greater space which
can increase as per the users demand. Helping to resolve the storage needs of customers.

- Enhanced Performance: In order to communicate and link with each other, the vast quantities of data
generated by IoT devices require extreme performance. IOT in the cloud offers the communication
required to exchange data between devices and make sense of it at a fast rate.

-Pay-as-you-go: Internet Cloud Storage software allows IoT to give sense to the larger amount of
knowledge produced. Users have no fear of purchasing more or less storage. As the data generated
increases and pays for the amount of storage they use with Internet Cloud Computing, they can easily scale
the storage.

Page 25
Figure 23: IoT standard APIs – CoAP vs MQTT APIs

MQTT and CoAP are both useful as IoT protocols, but have fundamental differences.
MQTT is a many-to-many communication protocol for passing messages between multiple clients through
a central broker. It decouples producer and consumer by letting clients publish and having the broker
decide where to route and copy messages. While MQTT has some support for persistence, it does best as a
communications bus for live data.
CoAP is, primarily, a one-to-one protocol for transferring state information between client and server.
While it has support for observing resources, CoAP is best suited to a state transfer model, not purely event
based.

Page 26
P4 Determine a specific problem to solve using IoT
Design thinking
Many problem may occur when you are not at home. Your house can be stolen things, someone is trying to
trespassing your land,… So I decided to design an IOT system that can so images and signal to your smart
devices to alert you when some one is in you home land.

Questions for Defining a Problem

What is the Problem? Security for your home when you are not at home

Who has this problem, and what do we know People often not at home and don’t have any one
about them? to look after there home, or they want protection
for there property or maybe for there children

What are their concerns and needs? Their concerns are afraid of intruder, burglary,…
they need a solution that can help them prevent or
stop them from stealing there properties.

How do they interact with their environment? You live work play in your house, but sometime
you have to go out for business.

What causes the problem? When they not at home, some people can try to
break in to their home.

When does this problem occur? When they not at home or at night, when they a
sleep.

Can you turn this problem into a question? What is the best way to prevent or stop these thing
to happen to our be love home.

Page 27
Research on available solutions

What is the problem?


Intruders burglaries, steal your properties.
Available solutions to Advantages/Disadvantages What is the process What are the limits of
this problem (e.g Cost and (How well does it solve this solution?
Functionalities) the problem)

Alarm, sensor, camera, Effective reliables but high It can scare, alert police, The only limit is your
fents, cost. It can cost 100 to prevent intruders. budget.
1000 of dollas.

What can you identify as the key factors of success?

Reliability , durability.

Process Diagrams

Page 28
Design a system: Choosing sensors
PIR sensor

• Wide range on input voltage varying from 4.V to 12V (+5V recommended)
• Output voltage is High/Low (3.3V TTL)
• Can distinguish between object movement and human movement
• Has to operating modes - Repeatable(H) and Non- Repeatable(H)
• Cover distance of about 120° and 7 meters
• Low power consumption of 65mA
• Operating temperature from -20° to +80° Celsius

https://components101.com/hc-sr501-pir-sensor

Design a system: Connecting devices


I use routers in this framework as a linking unit. And it's because decent coverage, bandwidth, and medium
power usage go well with the following situation.

Design a system: Local storage and processing


In this solution, I use the Google App Engine to storage the raw data collected and converted to useful
information that can be utilised to make intelligent decision.

Page 29
Design a system - Security requirements:
We need to use APIsecurity to protect the privacy of data being sent from IoT devices to back-end systems
and to ensure that only approved devices, developers and apps interact with APIs. -- There is a program to
track the sensors such that a message is received when they are disabled.

Security gateways have more computing power, memory and capabilities than the IoT devices themselves,
serving as an intermediary between IoT devices and the network, which allows them the ability to enforce
features such as firewalls to ensure that hackers do not reach the IoT devices they link

Physical design
Every doors and windows will have sensor and every corners of the house will have a camera so there will
be no blind spot. Of course there will be a effective use of each items.

Design a system - Powering your device


To powered this system, we will connect it direct to your house electrical grid and there will be an
emergency power souce to power only the system at least for a week or more consider your choice.

Page 30
References
1. Tutorialspoint.com. 2020. The Internet Of Nano Things. [online] Available at:
<https://www.tutorialspoint.com/the-internet-of-nano-things> [Accessed 21 October 2020].
2. Underwater Wireless Modem and Communication devices. 2020. All You Need To Know About
Internet Of Underwater Things | Dspcomm. [online] Available at:
<https://www.dspcommgen2.com/all-you-need-to-know-about-internet-of-underwater-things/>
[Accessed 21 October 2020].
3. Tutorialspoint.com. 2020. The Internet Of Nano Things. [online] Available at:
<https://www.tutorialspoint.com/the-internet-of-nano-things> [Accessed 21 October 2020].
4. Joncas, R., 2020. MQTT And Coap, Iot Protocols | The Eclipse Foundation. [online] Eclipse.org.
Available at:
<https://www.eclipse.org/community/eclipse_newsletter/2014/february/article2.php#:~:text=MQT
T%20and%20CoAP%20are%20both,clients%20through%20a%20central%20broker.&text=CoAP%20i
s%2C%20primarily%2C%20a%20one,information%20between%20client%20and%20server.>
[Accessed 24 October 2020].
5. Unit 43 - Internet of Things 2019, Session 1- Introduction to IoT, University of Greenwich (Alliance with
Vietnam FPT Education), United Kingdom.
6. Unit 43 - Internet of Things 2019, Session 2 - Design Framework for IoT system, University of
Greenwich (Alliance with Vietnam FPT Education), United Kingdom.
7. Unit 43 - Internet of Things 2019, Session 3 - Basic of IoT System, University of Greenwich (Alliance
with Vietnam FPT Education), United Kingdom.
8. Unit 43 - Internet of Things 2019, Session 4 - Sensors and Actuators - Introduction, University of
Greenwich (Alliance with Vietnam FPT Education), United Kingdom.
9. Unit 43 - Internet of Things 2019, Session 5 - Digital Sensors Practices, University of Greenwich
(Alliance with Vietnam FPT Education), United Kingdom.
10. Unit 43 - Internet of Things 2019, Session 6 - Analog Sensors Practices, University of Greenwich
(Alliance with Vietnam FPT Education), United Kingdom.
11. Unit 43 - Internet of Things 2019, Session 7- Communication Packet Tracer, University of Greenwich
(Alliance with Vietnam FPT Education), United Kingdom.
12. Unit 43 - Internet of Things 2019, Session 8 - Intermediate Devices - Microprocessors, University of
Greenwich (Alliance with Vietnam FPT Education), United Kingdom.
13. Unit 43 - Internet of Things 2019, Session 9 - Programming and Big Data, University of Greenwich
(Alliance with Vietnam FPT Education), United Kingdom.
14. Unit 43 - Internet of Things 2019, Session 10 - Design IOT System, University of Greenwich (Alliance
with Vietnam FPT Education), United Kingdom.
15. Engineers Garage. 2020. Application Layer Protocols For IOT : IOT Part 11. [online] Available at:
<https://www.engineersgarage.com/tutorials/application-layer-protocols-for-iot-iot-part-11/>
[Accessed 24 October 2020].

Page 31

You might also like