IOT Unit 1
IOT Unit 1
IOT Unit 1
INTERNET OF THINGS
INTRODUCTION
Definition:-
1. The Internet of Things as simply an interaction
between the physical and digital worlds. The digital
world interacts with the physical world using a
sensors and actuators.
2. The Internet of Things refers to a new kind of
world where almost all the devices and appliances
that we use are connected to a network. We can use
them collaboratively to achieve complex tasks that
require a high degree of intelligence.
Cont.,
• For this intelligence and interconnection, IoT devices are equipped
with embedded sensors, actuators, processors, and transceivers.
• Sensors and actuators are devices, which help in interacting with
the physical environment.
• The data collected by the sensors has to be stored and processed
intelligently in order to derive useful inferences from it.
• sensor → a mobile phone or even a microwave oven can count as
a sensor as long as it provides inputs about its current state
(internal state + environment).
• Example:
• Temperature Sensors. ...
• Humidity Sensors. ...
• Pressure Sensors. ...
• Proximity Sensors. ...
• Level Sensors. .
Cont.,
• An actuator →is a device that is used to effect
a change in the environment such as the
temperature controller of an air conditioner.
Cont.,
• Sensors, actuators, compute servers, and the
communication network form the core
infrastructure of an IoT framework.
• we need a middleware that can be used to
connect and manage all of these heterogeneous
components. We need a lot of standardization to
connect many different devices.
• The Internet of Things finds various applications in
health care, fitness, education, entertainment,
social life, energy conservation, environment
monitoring, home automation, and transport
systems.
UNIT I
Evolution of Internet
Internet
Internet is defined as an Information super Highway, to access
information over the web. However, It can be defined in many ways as
follows:
• In 1972, the ARPANET spread over the globe with 23 nodes located at
different countries and thus became known as Internet.
• By the time, with invention of new technologies such as TCP/IP
protocols, DNS, WWW, browsers, scripting languages etc.,Internet
provided a medium to publish and access information over the web.
Advantages
Internet covers almost every aspect of life, one can think of. Here, we will
discuss some of the advantages of Internet:
o Facebook
o Twitter
o Yahoo
o Google+
o Flickr
o Orkut
• One can surf for any kind of information over the internet. Information
regarding various topics such as Technology, Health & Science, Social
Studies, Geographical Information, Information Technology, Products
etc can be surfed with help of a search engine.
o Online Television
o Online Games
o Songs
o Videos
o Internet Banking
o Matrimonial Services
o Online Shopping
o Data Sharing
o E-mail
Disadvantages
However, Internet has prooved to be a powerful source of information in
almost every field, yet there exists many disadvanatges discussed below:
Intranet
Intranet is defined as private network of computers within an organization
with its own server and firewall. Moreover we can define Intranet as:
Time Saving
Information on Intranet is shared in real time.
Collaboration
Information is distributed among the employees as according to requirement
and it can be accessed by the authorized users, resulting in enhanced
teamwork.
Platform Independency
Intranet can connect computers and other devices with different
architecture.
Cost Effective
Employees can see the data and other documents using browser rather than
printing them and distributing duplicate copies among the employees, which
certainly decreases the cost.
Workforce Productivity
Data is available at every time and can be accessed using company
workstation. This helps the employees work faster.
Business Management
It is also possible to deploy applications that support business operations.
Security
Since information shared on intranet can only be accessed within an
organization, therefore there is almost no chance of being theft.
Specific Users
Intranet targets only specific users within an organization therefore, once can
exactly know whom he is interacting.
Immediate Updates
Any changes made to information are reflected immediately to all the users.
ISSUES
Apart from several benefits of Intranet, there also exist some issues.. These
issues are shown in the following diagram:
Applications
Intranet applications are same as that of Internet applications. Intranet
applications are also accessed through a web browser. The only difference is
that, Intranet applications reside on local server while Internet applications
reside on remote server. Here, we've discussed some of these applications:
Document publication applications
Document publication applications allow publishing documents such as
manuals, software guide, employee profits etc without use of paper.
Intranet Internet
Extranet
Extranet refers to network within an organization, using internet to
connect to the outsiders in controlled manner. It helps to connect businesses
with their customers and suppliers and therefore allows working in a
collaborative manner.
Implementation
Extranet is implemented as a Virtual Private Networks (VPN) because it uses
internet to connect to corporate organization and there is always a threat to
information security. VPN offers a secure network in public infrastructure
(Internet).
Key Points
• The message is sent over VPN via VPN Tunnel and this process is
known as tunneling.
Benefits
Extranet proves to be a successful model for all kind of businesses whether
small or big. Here are some of the advantages of extranet for employees,
suppliers, business partners, and customers:
Issues
Apart for advantages there are also some issues associated with extranet.
These issues are discussed below:
Hosting
Where the extranet pages will be held i.e. who will host the extranet pages. In
this context there are two choices:
• Host it with an Internet Service Provider (ISP) in the same way as web
pages.
But hosting extranet pages on your own server requires high bandwidth
internet connection which is very costly.
Security
Additional firewall security is required if you host extranet pages on your
own server which result in a complex security mechanism and increase work
load.
Accessing Issues
Information can not be accessed without internet connection. However,
information can be accessed in Intranet without internet connection.
Decreased Interaction
It decreases the face to face interaction in the business which results in lack
of communication among customers, business partners and suppliers.
Extranet Intranet
P
S
S M SB
M=Master P=Parked
SB S=Slave SB=Standby
S
P
scatternet
Scatternet
• It is formed by using various piconets.
• A slave that is present in one piconet can be act as master or we can
say primary in other piconet.
• This kind of node can receive message from master in one picone
and deliver the message to its slave into the other piconet where it i
acting as a slave. This type of node is refer as bridge node. A
station cannot be master in two piconets.
S S
P
P
SB
S M
M
S
SB
P SB
S
Physical links
• Between master and slave(s), different types of
links can be established. Two link types have
been defined:
– Synchronous Connection-Oriented (SCO) link
– Asynchronous Connection-Less (ACL) link
Physical links
• Synchronous Connection Oriented (SCO)
– Support symmetrical, circuit-switched, point-to-point
connections
– Typically used for voice traffic.
– Data rate is 64 kbit/s.
• Asynchronous Connection-Less (ACL)
– Support symmetrical and asymmetrical, packet-switched,
point-to-multipoint connections.
– Typically used for data transmission .
– Up to 433.9 kbit/s in symmetric or 723.2/57.6 kbit/s in
asymmetric
Connection Establishment States
• Standby
– State in which Bluetooth device is inactive, radio not
switched on, enable low power operation.
• Page
– Master enters page state and starts transmitting paging
messages to Slave using earlier gained access code and
timing information.
• Page Scan
– Device periodically enters page state to allow paging
devices to establish connections.
Connection Establishment States
• Inquiry
– State in which device tries to discover all Bluetooth
enabled devices in the close vicinity.
• Inquiry scan
– Most devices periodically enter the inquiry scan state to
make themselves available to inquiring devices.
Inquiry and Page
Master Slave
Page
scan
(6) ID packet
Connection Connection
(7) ID packet
Bluetooth Protocol Stack
• Bluetooth standard has many protocols that
are organized into different layers.
• The layer structure of Bluetooth does not
follow OS1 model, TCP/IP model or any
other known model.
• The different layers and Bluetooth protocol
architecture are:
Bluetooth Protocol Stack
1.Radio Layer
• It defines the physical characteristics of
bluetooth transceiver.
• It performs modulation/demodulation of the
data into RF signals. The radio layer moves
data from master to slave or vice versa.
• It is a low power system that uses 2.4 GHz
ISM band in a range of 10 meters.
• This band is divided into 79 channels of
1MHz each.
• It defines two types of physical link:
connection-less and connection-oriented.
Cont.,
• Bluetooth uses the Frequency Hopping Spread
Spectrum (FHSS) method in the physical layer
to avoid interference from other devices or
networks.
• Bluetooth hops 1600 times per second, i.e. each
device changes its modulation frequency 1600
times per second.
• In order to change bits into a signal, it uses a
version of FSK called GFSK i.e. FSK with
Gaussian bandwidth filtering.
2.Baseband Layer
• It performs the connection establishment
within a piconet.
• Baseband layer is equivalent to the MAC
sublayer in LANs.
• Bluetooth uses a form of TDMA called
TDD-TDMA (time division duplex TDMA).
• Master and slave stations communicate
with each other using time slots.
• The master in each piconet defines the
time slot of 625 µsec.
3.Link Manager protocol layer
• It performs the management of the already
established links.
• It is a communication protocol to
exchange objects between 2 devices.
8.WAP
• It is short for Wireless Access Protocol. It
is used for internet access.
9.TCS
• It is short for Telephony Control Protocol.
It provides telephony service.
10.Application layer
• It enables the user to interact with the
application.
Bluetooth Frame Format
Advantages:
• Low cost.
• Easy to use.
• It can also penetrate through walls.
• It creates an adhoc connection
immediately without any wires.
• It is used for voice and data transfer.
Disadvantages
COAP
Communication over internet
• HTTP(Hyper Text Transfer Protocol)over REST
(Representational State Transfer)
• CoAP(Constrained Application Protocol) Over
CoRE(Constrained RESTful Environment).
• Each CoAP message has a unique ID, this is useful
to detect message duplicates.
• A CoAP message is built by 3 parts:
– A binary header
– A Compact options
– Payload
CoAP
• Constrained Devices
– Small Embedded Devices
– Runs on Batteries and need be Energy Efficient
– Small ROM and RAM
• Constrained Networks
• Low Power
• Low Bandwidth
• Lossy
• High Latency
MQTT and CoAP:Underlying Protocols
for the IOT
CoAP Architecture
CoAP Message Types
• Confirmable
• Non-Confirmable
• Acknowledgment
• Reset
CoAP
• It is a specialized transfer protocol for use with
constrained nodes and constrained networks in
the Internet of Things.
• The protocol is designed for Machine-to-
Machine(M2M) applications such as smart engery
and building automation.
• Most of the website offer such an API interface .
Features of CoAP
• The main features of CoAP protocols are:
• Web protocol used in M2M with constrained
requirements.
• Asynchronous message exchange.
• Low overhead and very simple to parse.
• URI and content-type support.
• Proxy and caching capabilities.
Why CoAP is used in IoT?
• Constrained Application Protocol (CoAP) is a
specialized web transfer protocol for use with
constrained nodes and constrained networks
in the Internet of Things. CoAP is designed to
enable simple, constrained devices to join
the IoT even through constrained networks
with low bandwidth and low availability.
Cont.,