Iot Unit 1 Notes
Iot Unit 1 Notes
INTERNET OF THINGS
INTERNET OF THINGS:
According to the definition of IoT, It is the way to interconnection with the help of the internet
devices that can be embedded to implement the functionality in everyday objects by enabling
them to send and receive data. Today data is everything and everywhere. Hence, IoT can also be
defined as the analysis of the data generates a meaning action, triggered subsequently after the
interchange of data. IoT can be used to build applications for agriculture, assets tracking, energy
sector, safety and security sector, defence, embedded applications, education, waste
management, healthcare product, telemedicine, smart city applications, etc.
The term Internet of Things(IoT) has emerged over the past few years as one of the popular
“technology buzz” terms. In today’s technological world IoT figures prominently in technology
discussions due to its rapid growth. There are multiple ways to define IoT.
Scalability –
The number of elements connected to the IoT zone is increasing day by day. Hence, an IoT setup
should be capable of handling the massive expansion. The data generated as an outcome is
enormous, and it should be handled appropriately.
Architecture –
IoT architecture cannot be homogeneous in nature. It should be hybrid, supporting different
manufacturers ‘ products to function in the IoT network. IoT is not owned by anyone engineering
branch. IoT is a reality when multiple domains come together.
Safety –
There is a danger of the sensitive personal details of the users getting compromised when all
his/her devices are connected to the internet. This can cause a loss to the user. Hence, data
security is the major challenge. Besides, the equipment involved is huge. IoT networks may also
be at the risk. Therefore, equipment safety is also critical.
Self Configuring – This is one of the most important characteristics of IoT. IoT devices are able
to upgrade their software in accordance with requirements with a minimum of user participation.
Additionally, they can set up the network, allowing for the addition of new devices to an already-
existing network.
IOT HARDWARE
Transducer :
A transducer converts a signal from one physical structure to another.
It converts one type of energy into another type.
It might be used as actuators in various systems.
Sensors characteristics :
Static
Dynamic
1. Static characteristics :
It is about how the output of a sensor changes in response to an input change after steady state
condition.
Accuracy –
Accuracy is the capability of measuring instruments to give a result close to the true value of the
measured quantity. It measures errors. It is measured by absolute and relative errors. Express the
correctness of the output compared to a higher prior system. Absolute error = Measured value –
True value
Relative error = Measured value/True value
Range –
Gives the highest and the lowest value of the physical quantity within which the sensor can
actually sense. Beyond these values, there is no sense or no kind of response.
e.g. RTD for measurement of temperature has a range of -200`c to 800`c.
Resolution –
Resolution is an important specification towards selection of sensors. The higher the resolution,
better the precision. When the accretion is zero to, it is called threshold.
Provide the smallest changes in the input that a sensor is able to sense.
Precision –
It is the capacity of a measuring instrument to give the same reading when repetitively measuring
the same quantity under the same prescribed conditions.
It implies agreement between successive readings, NOT closeness to the true value.
It is related to the variance of a set of measurements.
It is a necessary but not sufficient condition for accuracy.
Sensitivity –
Sensitivity indicates the ratio of incremental change in the response of the system with respect to
incremental change in input parameters. It can be found from the slope of the output
characteristics curve of a sensor. It is the smallest amount of difference in quantity that will
change the instrument’s reading.
Linearity –
The deviation of the sensor value curve from a particular straight line. Linearity is determined by
the calibration curve. The static calibration curve plots the output amplitude versus the input
amplitude under static conditions.
A curve’s slope resemblance to a straight line describes the linearity.
Drift –
The difference in the measurement of the sensor from a specific reading when kept at that value
for a long period of time.
Repeatability –
The deviation between measurements in a sequence under the same conditions. The
measurements have to be made under a short enough time duration so as not to allow significant
long-term drift.
Dynamic Characteristics :
Properties of the systems
Zero-order system –
The output shows a response to the input signal with no delay. It does not include energy-storing
elements.
Ex. potentiometer measure, linear and rotary displacements.
First-order system –
When the output approaches its final value gradually.
Consists of an energy storage and dissipation element.
Second-order system –
Complex output response. The output response of the sensor oscillates before steady state.
Sensor Classification :
Passive & Active
Analog & digital
Scalar & vector
Passive Sensor –
Can not independently sense the input. Ex- Accelerometer, soil moisture, water level and
temperature sensors.
Active Sensor –
Independently sense the input. Example- Radar, sounder and laser altimeter sensors.
Analog Sensor –
The response or output of the sensor is some continuous function of its input parameter. Ex-
Temperature sensor, LDR, analog pressure sensor and analog hall effect.
Digital sensor –
Response in binary nature. Design to overcome the disadvantages of analog sensors. Along with
the analog sensor, it also comprises extra electronics for bit conversion. Example – Passive
infrared (PIR) sensor and digital temperature sensor(DS1620).
Scalar sensor –
Detects the input parameter only based on its magnitude. The answer for the sensor is a function
of magnitude of some input parameter. Not affected by the direction of input parameters.
Example – temperature, gas, strain, color and smoke sensor.
Vector sensor –
The response of the sensor depends on the magnitude of the direction and orientation of input
parameter. Example – Accelerometer, gyroscope, magnetic field and motion detector sensors.
ACTUATORS IN IOT
An IoT device is made up of a Physical object (“thing”) + Controller (“brain”) + Sensors +
Actuators + Networks (Internet). An actuator is a machine component or system that moves or
controls the mechanism or the system. Sensors in the device sense the environment, then control
signals are generated for the actuators according to the actions needed to perform.
A servo motor is an example of an actuator. They are linear or rotatory actuators, can move to a
given specified angular or linear position. We can use servo motors for IoT applications and
make the motor rotate to 90 degrees, 180 degrees, etc., as per our need.
The following diagram shows what actuators do, the controller directs the actuator based on the
sensor data to do the work.
Things/Devices
Things/Devices are used to build a connection, process data, provide interfaces, provide storage,
and provide graphics interfaces in an IoT system. all these generate data in a form that can be
analyzed by an analytical system and program to perform operations and used to improve the
system.
for example temperature sensor that is used to analyze the temperature generates the data from a
location and is then determined by algorithms.
Connectivity
Devices like USB hosts and ETHERNET are used for connectivity between the devices and the
server.
Processor
A processor like a CPU and other units are used to process the data. these data are further used to
improve the decision quality of an IoT system.
Audio/Video Interfaces
An interface like HDMI and RCA devices is used to record audio and videos in a system.
Input/Output interface
To give input and output signals to sensors, and actuators we use things like UART, SPI, CAN,
etc.
Storage Interfaces
Things like SD, MMC, and SDIO are used to store the data generated from an IoT device.
Other things like DDR and GPU are used to control the activity of an IoT system.
IoT Protocols
These protocols are used to establish communication between a node device and a server over
the internet. it helps to send commands to an IoT device and receive data from an IoT device
over the internet. we use different types of protocols that are present on both the server and
client-side and these protocols are managed by network layers like application, transport,
network, and link layer.
Application Layer protocol
In this layer, protocols define how the data can be sent over the network with the lower layer
protocols using the application interface. these protocols include HTTP, WebSocket, XMPP,
MQTT, DDS, and AMQP protocols.
HTTP
Hypertext transfer protocol is a protocol that presents in an application layer for transmitting
media documents. it is used to communicate between web browsers and servers. it makes a
request to a server and then waits till it receives a response and in between the request server
does not keep any data between two requests.
WebSocket
This protocol enables two-way communication between a client and a host that can be run on an
untrusted code in a controlled environment. this protocol is commonly used by web browsers.
MQTT
It is a machine-to-machine connectivity protocol that was designed as a publish/subscribe
messaging transport. and it is used for remote locations where a small code footprint is required.
Transport Layer
This layer is used to control the flow of data segments and handle the error control. also, these
layer protocols provide end-to-end message transfer capability independent of the underlying
network.
TCP
The transmission control protocol is a protocol that defines how to establish and maintain a
network that can exchange data in a proper manner using the internet protocol.
UDP
a user datagram protocol is a part of an internet protocol called the connectionless protocol. this
protocol is not required to establish the connection to transfer data.
Network Layer
This layer is used to send datagrams from the source network to the destination network. we use
IPv4 and IPv6 protocols as host identification that transfers data in packets.
IPv4
This is a protocol address that is a unique and numerical label assigned to each device connected
to the network. an IP address performs two main functions host and location addressing. IPv4 is
an IP address that is 32-bit long.
IPv6
It is a successor of IPv4 that uses 128 bits for an IP address. it is developed by the IETF task
force to deal with long-anticipated problems.
Link Layer
Link-layer protocols are used to send data over the network's physical layer. it also determines
how the packets are coded and signaled by the devices.
Ethernet
It is a set of technologies and protocols that are used primarily in LANs. it defines the physical
layer and the medium access control for wired ethernet networks.
WiFi
It is a set of LAN protocols and specifies the set of media access control and physical layer
protocols for implementing wireless local area networks.
What is 6LoWPAN?
6LoWPAN is an IPv6 protocol, and It’s extended from is IPv6 over Low Power Personal Area
Network. As the name itself explains the meaning of this protocol is that this protocol works on
Wireless Personal Area Network i.e., WPAN.
WPAN is a Personal Area Network (PAN) where the interconnected devices are centered around
a person’s workspace and connected through a wireless medium. You can read more about
WPAN at WPAN. 6LoWPAN allows communication using the IPv6 protocol. IPv6 is Internet
Protocol Version 6 is a network layer protocol that allows communication to take place over the
network. It is faster and more reliable and provides a large number of addresses.
6LoWPAN initially came into existence to overcome the conventional methodologies that were
adapted to transmit information. But still, it is not so efficient as it only allows for the smaller
devices with very limited processing ability to establish communication using one of the Internet
Protocols, i.e., IPv6. It has very low cost, short-range, low memory usage, and low bit rate.
It comprises an Edge Router and Sensor Nodes. Even the smallest of the IoT devices can now be
part of the network, and the information can be transmitted to the outside world as well. For
example, LED Streetlights.
It is a technology that makes the individual nodes IP enabled.
6LoWPAN can interact with 802.15.4 devices and also other types of devices on an IP Network.
For example, Wi-Fi.
It uses AES 128 link layer security, which AES is a block cipher having key size of 128/192/256
bits and encrypts data in blocks of 128 bits each. This is defined in IEEE 802.15.4 and provides
link authentication and encryption.
Features of 6LoWPAN:
● It is used with IEEE 802.15,.4 in the 2.4 GHz band.
● Outdoor range: ~200 m (maximum)
● Data rate: 200kbps (maximum)
● Maximum number of nodes: ~100
Advantages of 6LoWPAN:
● 6LoWPAN is a mesh network that is robust, scalable, and can heal on its own.
● It delivers low-cost and secure communication in IoT devices.
● It uses IPv6 protocol and so it can be directly routed to cloud platforms.
● It offers one-to-many and many-to-one routing.
● In the network, leaf nodes can be in sleep mode for a longer duration of time.
Disadvantages of 6LoWPAN:
● It is comparatively less secure than Zigbee.
● It has lesser immunity to interference than that Wi-Fi and Bluetooth.
● Without the mesh topology, it supports a short range.
Applications of 6LoWPAN:
● It is a wireless sensor network.
● It is used in home-automation,
● It is used in smart agricultural techniques, and industrial monitoring.
To obtain 66, we put 1 under 64 and 2 as the sum of 64 and 2 is equal to 66 (64+2=66), and the
remaining bits will be zero, as shown above. Therefore, the binary bit version of 66 is 01000010.
Step 2: Now, we calculate the binary number of 94.
To obtain 94, we put 1 under 64, 16, 8, 4, and 2 as the sum of these numbers is equal to 94, and
the remaining bits will be zero. Therefore, the binary bit version of 94 is 01011110.
Step 3: The next number is 29.
To obtain 29, we put 1 under 16, 8, 4, and 1 as the sum of these numbers is equal to 29, and the
remaining bits will be zero. Therefore, the binary bit version of 29 is 00011101.
Step 4: The last number is 13.
To obtain 13, we put 1 under 8, 4, and 1 as the sum of these numbers is equal to 13, and the
remaining bits will be zero. Therefore, the binary bit version of 13 is 00001101.
Drawback of IPv4
Currently, the population of the world is 7.6 billion. Every user is having more than one device
connected with the internet, and private companies also rely on the internet. As we know that
IPv4 produces 4 billion addresses, which are not enough for each device connected to the
internet on a planet. Although the various techniques were invented, such as variable- length
mask, network address translation, port address translation, classes, inter-domain translation, to
conserve the bandwidth of IP address and slow down the depletion of an IP address. In these
techniques, public IP is converted into a private IP due to which the user having public IP can
also use the internet. But still, this was not so efficient, so it gave rise to the development of the
next generation of IP addresses, i.e., IPv6.
What is IPv6?
IPv4 produces 4 billion addresses, and the developers think that these addresses are enough, but
they were wrong. IPv6 is the next generation of IP addresses. The main difference between IPv4
and IPv6 is the address size of IP addresses. The IPv4 is a 32-bit address, whereas IPv6 is a 128-
bit hexadecimal address. IPv6 provides a large address space, and it contains a simple header as
compared to IPv4.
It provides transition strategies that convert IPv4 into IPv6, and these strategies are as follows:
Dual stacking: It allows us to have both the versions, i.e., IPv4 and IPv6, on the same device.
Tunneling: In this approach, all the users have IPv6 communicates with an IPv4 network to
reach IPv6.
Network Address Translation: The translation allows the communication between the hosts
having a different version of IP.
This hexadecimal address contains both numbers and alphabets. Due to the usage of both the
numbers and alphabets, IPv6 is capable of producing over 340 undecillion (3.4*1038) addresses.
IPv6 is a 128-bit hexadecimal address made up of 8 sets of 16 bits each, and these 8 sets are
separated by a colon. In IPv6, each hexadecimal character represents 4 bits. So, we need to
convert 4 bits to a hexadecimal number at a time
Address format
The address format of IPv4:
Ipv4 Ipv6
Classes IPv4 has 5 different classes of IP IPv6 does not contain classes
address that includes Class A, Class of IP addresses.
B, Class C, Class D, and Class E.
Checksum field The checksum field is available in The checksum field is not
IPv4. available in IPv6.
Encryption and It does not provide encryption and It provides encryption and
Authentication authentication. authentication.
Both WiFi and Bluetooth are wireless technologies that are widely used to send and receive data
wirelessly using radio signals. WiFi is for high-speed Internet access that connects nearby
devices with each other and share the Internet via hotspots, whereas Bluetooth is used for
connecting devices in short range.
Go through this article to find out more about the features of WiFi and Bluetooth and how they
are different from each other.
What is WiFi?
WiFi stands for Wireless Fidelity. It defines any network based on the 802.11 standards, allows
computers and devices with the required wireless capacity to communicate via radio waves with
other computers or devices. IEEE established the 802.11 network standards, which describe how
two wireless devices interact over the air.
WiFi is a small network where smartphones, computers or other networkable devices are
connected to each other wirelessly within a small range and share Internet using hotspots. WiFi
uses radio frequency waves for wireless high-speed Internet and network connections. The size
of a WiFi antenna is very small and can be put on small routers. WiFi can be used to connect
printers, computers, gaming consoles, mobile and so on.
WiFi specifies how to physically create a wireless network using approaches similar to the
Ethernet standard. WiFi is built into most of today's computers and mobile devices, such as
smartphones and handheld game consoles.
The WiFi standard is widely used in hotspots, which allow mobile users to connect to the
internet using their WiFi-enabled wireless computers and devices. WiFi is also used in many
homes and small companies to connect computers and devices wirelessly.
What is Bluetooth?
Bluetooth was created under the IEEE 802.15.1 standard, which is used for wireless
communication via radio transmissions. Bluetooth was first introduced in 1994 as a wireless
replacement for RS-232 connections.
Bluetooth connects a wide range of devices and establishes personal networks in the unlicensed
2.4 GHz spectrum. The device class determines the operating range. Many digital gadgets, such
as MP3 players, mobile and peripheral devices, and personal computers, use Bluetooth.
Unlike previous wireless technologies, Bluetooth provides high-level services such as file
pushing, voice transmission, and serial line emulation to its network and devices.
A scattered ad-hoc topology is the name given to the Bluetooth topology. It defines a Piconet, a
small cell that consists of a group of devices connected in an ad-hoc manner.
Bluetooth ensures data security and privacy when in use. It employs a 128-bit random number, a
device's 48-bit MAC address, and two keys: authentication (128 bits) and encryption (256 bits)
(8 to 128 bits). Non-secure, service level, and link-level are the three modes of operation.
Advantages of Using Bluetooth
Wireless − One of the advantages of Bluetooth is that it transmits data without the use of any
cables. You may send and receive files without having to worry about wires with this method.
Wireless Bluetooth technology is also used in a variety of different applications. Personal
security systems, finding devices, and health monitoring are examples of such uses.
Availability − Bluetooth is now a standard function on most gadgets, including smartphones and
tablets.
Usability − Because of its ease of use, Bluetooth can be used by even the most inexperienced
user. The Bluetooth pairing process is pretty simple. There is no need to install any software or
drivers.
Efficiency − Bluetooth is energy efficient which results in minimal power consumption. This is
usually due to the Bluetooth low-power signals.
Disadvantages of Using Bluetooth
Speed − Data transfer is relatively sluggish in all wireless methods. In the case of Bluetooth, this
is especially true. The transmission rate of Bluetooth 3.0 and Bluetooth 4.0 is 25 Mbps in
general.
Range − A Bluetooth connection has a maximum range of 100 meters. Bluetooth has a limited
range of communication (typically lower than a WiFi connection).
Safety and security − Even though Bluetooth has several security features, its security level is
significantly lower because it utilizes radio frequencies. Bluetooth allows hackers to obtain your
personal information quickly.
Reliability − Even though the majority of Bluetooth implementations follow the standard, there
are still worries about Bluetooth compatibility. This is due to a variety of factors, including
profiles, drivers, and versions.
Comparison between WiFi and Bluetooth
The following table highlights the major differences between WiFi and Bluetooth.
Key WiFi Bluetooth
WiFi is more secure than Bluetooth. Bluetooth is less secure than other
Security
wireless technologies such as WiFi.
Wi-Fi allows more devices and users Bluetooth restricts the number of
Number of
to communicate at the same time. devices that can connect at any given
Users
moment.
Key WiFi Bluetooth
WiFi establishes a wireless network that allows computers and devices with the required wireless
capacity to communicate via radio waves. Bluetooth, on the other hand, is a wireless technology
that is used to connect devices in short range.
What is MQTT?
MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol that was
developed by IBM and first released in 1999. It uses the pub/sub pattern and translates messages
between devices, servers, and applications.
The MQTT protocol was initially created in order to link sensors on oil pipelines with
communications satellites, with an emphasis on minimal battery loss and bandwidth
consumption.
Since its inception, MQTT has continued to undergo development, with version 5.0 arriving in
May 2018. Version 3.1.1 was submitted to the OASIS consortium in 2013 and accepted as an
ISO standard.
2. Publisher-Subscriber Model –
This model comprises three entities: Publishers, Brokers, and Consumers.
Publishers are the source of data. It sends the data to the topic which are managed by the broker.
They are not aware of consumers.
Consumers subscribe to the topics which are managed by the broker.
Hence, Brokers responsibility is to accept data from publishers and send it to the appropriate
consumers. The broker only has the information regarding the consumer to which a particular
topic belongs to which the publisher is unaware of.
3. Push-Pull Model –
The push-pull model constitutes data publishers, data consumers, and data queues.
Publishers and Consumers are not aware of each other.
Publishers publish the message/data and push it into the queue. The consumers, present on the
other side, pull the data out of the queue. Thus, the queue acts as the buffer for the message when
the difference occurs in the rate of push or pull of data on the side of a publisher and consumer.
Queues help in decoupling the messaging between the producer and consumer. Queues also act
as a buffer which helps in situations where there is a mismatch between the rate at which the
producers push the data and consumers pull the data.
4. Exclusive Pair –
Exclusive Pair is the bi-directional model, including full-duplex communication among client
and server. The connection is constant and remains open till the client sends a request to close
the connection.
The Server has the record of all the connections which has been opened.
This is a state-full connection model and the server is aware of all open connections.
WebSocket based communication API is fully based on this model.
WHAT IS STATELESS AND STATEFUL PROTOCOLS?
Stateless Protocol
It is a network model in which the client sends a request to the server and the server in return
sends a response back according to the current state just like the Request-Response model.
The server is not obliged to keep the session information or the status of each communication
partner for multiple requests.
They are very easy to implement on the Internet.
Stateless protocols work better when the crash occurs because no state needs to be restored, a
failed server can simply reboot after a crash.
Examples:- HTTP (Hypertext Transfer Protocol), UDP (User Datagram Protocol), DNS (Domain
Name System).
Stateful Protocol
In this protocol, suppose a client sends a request to the server and the server doesn't respond,
then the client resends a request to the server.
Stateful protocols are logically heavy to implement on the Internet.
Stateful Protocol does not work better at the time of the crash because stateful servers must retain
information about the state and session details of internal states.
Examples:- FTP (File Transfer Protocol), Telnet.
Websocket APIs enable bi-directional and duplex communication between customers and
servers.
Unlike REST, There is no need to set up a connection every now and then to send messages
between a client and a server.
It works on the principle of the exclusive pair model. Can you recall it? Yes. Once a connection
is set up, there is a constant exchange of messages between the client and the server. All we need
is to establish a dedicated connection to start the process. the communication goes on unless the
connection is terminated.
It is a stateful type.
Due to one time dedicated connection setup, there is less overhead, lower traffic and less latency
and high throughput.
So Web socket is the most suitable IoT Communication APIs for IoT System.
WSN can be used for processing, analysis, storage, and mining of the data.
Applications of WSN:
● Quality of Service
● Security Issue
● Energy Efficiency
● Network Throughput
● Performance
● Ability to cope with node failure
● Cross layer optimisation
● Scalability to large scale of deployment
Components of WSN:
Sensors:
Sensors in WSN are used to capture the environmental variables and which is used for data
acquisition. Sensor signals are converted into electrical signals.
Radio Nodes:
It is used to receive the data produced by the Sensors and sends it to the WLAN access point. It
consists of a microcontroller, transceiver, external memory, and power source.
WLAN Access Point:
It receives the data which is sent by the Radio nodes wirelessly, generally through the internet.
Evaluation Software:
The data received by the WLAN Access Point is processed by a software called as Evaluation
Software for presenting the report to the users for further processing of the data which can be
used for processing, analysis, storage, and mining of the data.
In, cloud computing in combination with the Internet of Things will make fundamental changes
to the life of mankind, particularly in how information is managed. The cloud is the only
technology that can analyze, store, and access the IoT depending on the deployment model.
Because of the nature of on-demand information, cloud computing with an Internet connection is
available on any device at any time. As hybrid cloud adoption grows, many companies are
realizing its benefits and the need to implement it. Cloud computing will continue to open up
new opportunities for the IoT for a long time to come.
The three main components of the cloud listed below will revolutionize the Internet of Things:-
Computing power
Reliability
Connectivity
IoT level 2
A node performs sensing/actuation and local analysis. Data is stored in the cloud. this level is
facilitated where the data involved is big and primary analysis is not comprehensive
Example: Cloud-based application is used for monitoring and controlling the IoT system A
single node monitors the soil moisture in the field Which is sent to the database on the cloud
using REST APIS. The controller service continuously monitors moisture levels.
IoT level 3
At this level, the application is cloud-based. A single node monitors the environment and stores
data in the cloud. This is suitable where data is comprehensive and analysis 1 computationally
intensive.
Example: A node is monitoring a package using devices like an accelerometer and gyroscope.
These devices track vibration levels. controller service sends sensor data to the cloud in the rear
time using WebSocket APL. Data is stored in the cloud and visualized using a cloud-based
application. The analysis component triggers an alert if vibration levels cross a threshold.
IoT level 4
At this level, Multiple nodes collect information and store it in the cloud. Local and rent server
nodes are used to grant and receive information collected in the cloud from various devices.
Observer nodes can process information and use it for applications but not perform control
functions, This level is the best solution where data involvement is big, requirement analysis is
comprehensive and multiple nodes are required,
Example: Analysis is done on the cloud and the entire IoT system has monitored the cloud using
an application. Noise monitoring of an area requires various nodes to function independently of
each other. Each has its own controller service. Data is stored in a cloud database.
IoT level 5
In this level Nodes present locally are of two types end odes and coordinator nodes End nodes
collect data and perform sensing or actuation or both. Coordinator nodes collect data from end
nodes and send it to the cloud. Data is stored and analyzed in the cloud. This level is best for
WSN, where the data involved is big and the requirement analysis is comprehensive.
Example: A monitoring system has various components: end nodes collect various data from the
environment and send it to the coordinator node. The coordinator node acts as a gateway and
allows the data to be transferred to cloud storage using REST API. The controller service on the
coordinator node sends data to the cloud.
IoT Level-6
At this level, the application is also cloud-based and data is stored in the cloud-like of levels.
Multiple independent end nodes perform sensing and actuation and send d to the cloud. The
analytics components analyze the data and store the results in the cloud database. The results are
visualized with a cloud-based application. The centralized controller is aware of the status of all
the end nodes and sends control commands to the nodes.
Example: Weather monitoring consists of sensors that monitor different aspects of the system.
The end nodes send data to cloud storage. Analysis of components, applications, and storage
areas in the cloud. The centralized controller controls all nodes and provides inputs.
Smart Roads
Smart roads equipped with sensors can alert the users about poor driving conditions, traffic
congestion, and accidents. Information sensed from the roads can be sent via Internet to
applications or social media. This helps in reducing traffic jams.
Emergency Response
IoT systems can be used to monitor buildings, gas and water pipelines, public transport and
power substations. These systems provides alerts and helps in mitigating disasters. Along with
cloud-based applications IoT systems helps to provide near real-time detection of adverse events.
Environment
Weather Monitoring
IoT-based weather monitoring systems use different sensors to gather data. That data is sent to
the cloud-based storage. The collected can be analyzed and visualized with applications. Weather
alerts can be subscribed by users from such applications.
IoT-based forest fire detection systems use number of nodes deployed at various locations in the
forest. Each monitoring node collects data about ambient conditions. This data will be collected
and analyzed for the presence of fire and corresponding people will be alerted.
Energy
Smart Grids
Smart grid is a data communications network integrated with the electrical grid. Smart grid
technology provides predictive information and recommendations to utilities, their suppliers and
consumers, and how best to manage power. Smart meters can capture real-time power
consumption and allows to manage power distribution remotely.
Retail
Inventory Management
The inventory in a store or warehouse can be managed by using IoT. The products or items in the
store can be attached with RFID tags. By using the RFID tags, the RFID reader or software can
automatically show the number of items in the store or warehouse. If a product goes out of stock
a notification can be sent to the store owner automatically.
Smart Payments
Now-a-days new types of payments are coming into picture like QR codes, NFC, contact less
technologies etc. These technologies enables smart payments.
Also, the vending machines can maintain the history of the consumers. So, when a consumer
visits the vending machine next day, it can suggest the same item that the consumer purchased
before.
Logistics
Route Generation and Scheduling
While delivering packages to various locations, different sensors can be fixed in those routes and
they can be monitored remotely through an application. By looking at the data sent by the
sensors, the delivery company can automatically know which routes are less congested and
schedule the delivery of packages in such routes.
Fleet Tracking
A delivery company will have several delivery personnel working with them. Different people
will use different vehicles for delivering the packages. Sensors can be fixed to those vehicles and
their location can be tracked to know how long will it take to deliver the package.
Shipment Monitoring
The packages can be fixed with RFID tags or other form of remote tracking sensors to send data
periodically to a server via Internet. The delivery company can use that data to track where the
package is and update the user about the remaining time that will be needed to deliver the
package.
Agriculture
Smart Irrigation
Irrigation refers to the watering of plants. By using different sensors like temperature sensor,
humidity sensor, soil moisture sensor, etc., data can be collected about the soil and the
environment and let the framer know when to turn on the water sprinklers to provide water to the
plants. This process is illustrated in the figure given below.
The data from the green house is aggregated at a local gateway and sent to the server via
Internet. The data at the server is analyzed and appropriate alerts are sent to the owner of the
green house. This process is illustrated in the figure below.
Industry
Machine Diagnosis & Prognosis
The machines used in the industry can be fixed with sensors. The data from the sensors can be
used to diagnose the machines. We can know if the machine is working up to the expected
performance or not. The data analysis will also let the owner of the machine know when the life
of machine will be over.
The doctor can attend to such patients from a remote location. Different sensors can be fixed on
near the patient to monitor the health vitals of that patient. The data sent by the sensors is
monitored by the doctor and appropriate decisions are made.
Wearable Electronics
Now-a-days there are different types of wearables available in the market to monitor health and
lifestyles. Some examples of such wearables are smart watches, smart glasses, smart patches,
smart garments, etc., as shown in the below figure.
https://www.startertutorials.com/blog/domain-specific-iot-applications.html FOR
FURTHER REFERENCE