Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
6 views

IoT Module 1 Note

Uploaded by

sc.cse
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

IoT Module 1 Note

Uploaded by

sc.cse
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Department of Computer Science and Engineering

Programme: B.Tech in Computer Science and


Engineering (AI)
Semester III
Course Name: Internet of Things (ESCM301)

Module- 1

1. Definition & Characteristics of IoT

2. Challenges and Issues

3. Physical Design of IoT

4. Logical Design of IoT & Functional Blocks

5. IoT Communication Model

6. IoT Security

1. Definition & Characteristics of IoT :


Definition: IoT is referred to as a network comprised of interconnected
physical objects (referred to as "things") worldwide that are capable of
collecting and exchanging data without human interaction. These
devices contain embedded systems (software, electronics, networks,
and sensors) that are able to collect data about the surrounding
environment, transmit data over a network, respond to remote
commands, or take actions based on data collected.
Characteristics of IoT:

(i) Dynamic and Self-Adapting: IoT devices can adjust their behavior and
operations automatically based on changes in the environment or user
needs.

(ii) Self-Configuring: IoT devices can set themselves up and organize into
networks without human intervention.

(iii) Interoperable Communication Protocols: IoT devices use common


communication standards to easily connect and communicate with each
other, regardless of the manufacturer.

(iv) Unique Identity: Every IoT device has a distinct identifier, like an IP
address, that distinguishes it from other devices.

(v) Integrated into Information Network: IoT devices are connected to


larger networks (such as the internet) for sharing and accessing
information.
Components of IoT:

Advantages of IoT:

Automation and Control: IoT allows devices to operate automatically


and with minimal human intervention, making processes smoother and
more controlled.

Improved Efficiency: By monitoring and managing tasks automatically,


IoT devices help optimize operations and reduce wasted resources.

Cost Savings: Automating and optimizing operations with IoT leads to


lower operational costs and reduced labor expenses.

Enhanced Customer Experience: IoT provides personalized and


convenient experiences for customers, such as smart home features and
tailored services.

Better Decision Making: IoT devices collect and analyze data in real-time,
helping businesses make more informed and timely decisions.

Improved Safety and Security: IoT enhances safety through real-time


monitoring and alerts, improving security measures and reducing risks.
Scalability: IoT systems can easily expand as needs grow, allowing more
devices and functionalities to be added without major overhauls.

Applications of IoT:

2. Challenges and Issues


Privacy Concerns: IoT devices collect a lot of personal data, raising
concerns about how this information is used and protected.

Interoperability: Different IoT devices and systems often have trouble


communicating with each other due to varying standards and protocols.

Connectivity Issues: IoT devices rely heavily on internet connections,


and poor connectivity can lead to unreliable or lost data.

Inadequate Storage Capacity: IoT devices generate large amounts of


data, and storing all this information can be challenging.

Power Consumption: Many IoT devices require continuous power,


which can be a challenge in terms of battery life and energy costs.

Maintenance: Keeping IoT devices updated and functioning correctly


can be time-consuming and costly, especially as systems grow in
complexity.
Lesser Employability: Automation and IoT solutions can reduce the need
for human labor, potentially leading to job losses in certain industries.

3. Physical Design of IoT

IoT devices, often referred to as "Things" in the Internet of Things, are


uniquely identifiable and capable of performing various functions such
as remote sensing, actuating, and monitoring. These devices can
exchange data with other connected devices and applications, either
directly or indirectly. They are designed to either collect data from other
devices and process it locally or send the data to centralized servers or
cloud-based application back-ends for further processing. Depending on
temporal and spatial constraints, IoT devices can execute some tasks
locally while offloading others to the broader IoT infrastructure. This
flexibility allows IoT devices to function efficiently within a complex
network of interconnected systems.

Block Diagram of an IoT Device:

An IoT device may include several types of interfaces to connect with


other devices, both wired and wireless:
I/O Interfaces for Sensors: These interfaces allow the device to connect
with various sensors for data input and output.

Interfaces for Internet Connectivity: These are used for connecting the
device to the internet, enabling data exchange and communication with
other devices and services.

Memory and Storage Interfaces: These interfaces provide connections


for onboard memory and storage, allowing the device to store and
manage data.

Audio/Video Interfaces: These interfaces enable the device to process


and transmit audio and video data, supporting multimedia functions.

IoT Protocols:

IoT protocols are essential for enabling communication between IoT


devices, networks, and platforms. These protocols handle various tasks
such as data transmission, device management, security, and more.

Link Layer

802.3 – Ethernet:
Wired communication standard for local area networks (LANs).
802.11 – WiFi:
Wireless communication standard for connecting devices to networks
over short distances.

802.16 – WiMax:
Wireless broadband access standard, used for long-range
communication.

802.15.4 – LR-WPAN:
Low-rate wireless personal area network standard, used for low-power,
short-range communication (e.g., Zigbee).

2G/3G/4G:
Cellular network standards for mobile communication, providing wide-
area connectivity.

Network/Internet Layer

IPv4:
Internet Protocol version 4, widely used for addressing and routing
traffic on the internet.

IPv6:
Internet Protocol version 6, designed to replace IPv4, offering a larger
address space.

6LoWPAN:
IPv6 over Low-Power Wireless Personal Area Networks, enabling IPv6
communication over low-power, low-bandwidth networks.

Transport Layer

TCP:
Transmission Control Protocol, ensuring reliable, ordered, and error-
checked data transmission.

UDP:
User Datagram Protocol, offering faster, connectionless communication
with less overhead but no guarantee of delivery.

Application Layer

HTTP:
Hypertext Transfer Protocol, used for web communication.

CoAP:
Constrained Application Protocol, lightweight for constrained devices
and networks.

WebSocket:
Protocol enabling full-duplex communication over a single TCP
connection.

MQTT:
Message Queuing Telemetry Transport, a lightweight publish/subscribe
messaging protocol for IoT.

XMPP:
Extensible Messaging and Presence Protocol, used for real-time
communication.

DDS:
Data Distribution Service, real-time, publish/subscribe protocol for high-
performance IoT systems.

AMQP:
Advanced Message Queuing Protocol, a secure and reliable protocol for
enterprise-level messaging.

4. Logical Design of IoT & Functional Blocks


Logical design of an IoT system refers to an abstract representation of
the entities and processes without going into the low-level specifics of
the implementation. An IoT system comprises of a number of functional
blocks that provide the system the capabilities for identification, sensing,
actuation, communication, and management.

Functional Block of IoT

(I) Device

Includes the hardware components of the IoT system.

Functions:

Sensing: Devices that detect and measure physical or environmental


conditions, such as temperature, humidity, light, etc.

Actuation: Devices that perform actions based on data or commands,


such as turning on a light or adjusting a thermostat.

Monitoring: Continuous observation of a process or activity to gather


data.

Control: Adjusting the functioning of other components based on the


monitoring data.

(II) Communication
Responsible for data exchange within the IoT system and between the
system and external networks.

Functions:

Data Transmission: Sending and receiving data between devices, servers,


and users.

Protocols: Utilizes various communication protocols (like MQTT, HTTP,


CoAP) to ensure effective communication.

(III) Services

Provides different service types to support the functioning and


interaction of IoT devices.

Functions:

Device Monitoring: Services to track and manage device health and


status.

Device Control: Services that allow remote control and configuration of


devices.

Data Publishing: Services for disseminating data collected from devices


to various users or systems.

Device Discovery: Services that help in locating and integrating new


devices into the network.

(IV) Management

Provides tools and processes to oversee the operation and maintenance


of the IoT system.

Functions:

Device Management: Adding, removing, updating, and monitoring


devices in the network.
Resource Management: Allocating and optimizing the use of resources
like bandwidth, power, and processing capacity.

Performance Management: Ensuring the system performs efficiently and


reliably.

(V) Security

Ensures the protection of data and resources in the IoT system.

Functions:

Authentication: Verifying the identity of users and devices.

Authorization: Granting permissions based on user/device identity and


roles.

Message and Content Integrity: Ensuring that the data has not been
tampered with during transmission.

Data Security: Protecting sensitive information from unauthorized access


or breaches.

(VI) Application

The user interface and interaction layer of the IoT system.

Functions:

User Control and Monitoring: Allows users to interact with the system,
control devices, and monitor their status.

Data Visualization and Analysis: Provides tools to view, analyze, and


interpret the collected data for better decision-making.

5. IoT Communication Model


(I) Request-Response Communication Model
Request-Response is a communication model in which the client sends
requests to the server and the server responds to the requests.

When the server receives a request, it decides how to respond, fetches


the data, retrieves resource representations, prepares the response, and
then sends the response to the client.

(II) Publish-Subscribe Communication Model

Publish-Subscribe is a communication model that involves publishers,


brokers and consumers.

Publishers are the source of data. Publishers send the data to the topics
which are managed by the broker. Publishers are not aware of the
consumers.
Consumers subscribe to the topics which are managed by the broker.
When the broker receives data for a topic from the publisher, it sends
the data to all the subscribed consumers.

(III) Push-Pull Communication Model

Push-Pull is a communication model in which the data producers push


the data to queues and the consumers pull the data from the queues.
Producers do not need to be aware of the consumers.

Queues help in decoupling the messaging between the producers and


consumers.

Queues also act as a buffer which helps in situations when there is a


mismatch between the rate at which the producers push data and the
rate rate at which the consumers pull data.
(IV) Exclusive Pair Communication Model

Exclusive Pair is a bidirectional, fully duplex communication model that


uses a persistent connection between the client and server.

Once the connection is setup, it remains open until the client sends a
request to close the connection.

Client and server can send messages to each other after connection
setup.

REST-based Communication APIs:

REST stands for Representational State Transfer. It’s a way of designing


communication between devices or applications using standard web
protocols, like the ones your web browser uses to talk to websites.

Communication Style: REST APIs work by sending requests and receiving


responses over the internet. For example, when you want to get data
from a device, you send a GET request, and the device sends back the
data as a response.
Stateless: Each request stands on its own and contains all the
information needed to process it. This means that the server doesn’t
need to remember anything about previous requests.

Key Features

Uses URLs: Each resource (like a device or sensor) is represented by a


URL, just like web pages have URLs.

Standard Methods: It uses standard HTTP methods:

GET: Retrieve data.


POST: Add new data.
PUT: Update existing data.
DELETE: Remove data.
Flexible Data Formats: Usually, data is sent and received in XML formats,
which are easy to read and use.

Common Uses

Device Management: You can use REST APIs to add, update, or remove
IoT devices from a system.
Data Access: Fetch sensor readings or device statuses.
Configuration Changes: Change settings on devices remotely.

WebSocket-based Communication APIs:

WebSockets are a way to create a continuous, two-way communication


channel between a client (like a web app or an IoT device) and a server.

Persistent Connection: Once a WebSocket connection is established, it


stays open. This is different from REST, where each request/response is
a separate connection.

Real-Time Communication: With WebSockets, data can flow back and


forth instantly, which is great for applications needing real-time updates,
like chat apps or live monitoring systems.
Key Features

Two-Way Communication: Both the client and server can send messages
to each other at any time.

Low Latency: Because the connection stays open, messages can be sent
with very little delay.

Event-Driven: The communication happens through events, which


means you can react to messages as they come in without waiting for a
request.

Common Uses

Real-Time Monitoring: Ideal for systems that need to update


information continuously, like stock tickers or sports scores.

Interactive Applications: Good for chat apps or games where players


need to see each other’s actions in real time.

Streaming Data: Useful for sending a constant stream of data, like video
or sensor readings

6. IoT Security

IoT security refers to the comprehensive measures and strategies


employed to protect Internet of Things (IoT) devices and the networks
from cyberattacks.

Important of IoT Security

No Built-In Security: Many IoT devices were not designed with security in
mind, so they can be easily hacked.

Sensitive Data: IoT devices often send data over the internet without any
protection, which makes it easy for hackers to steal information.
Risk of Attacks: If IoT devices aren’t secured, hackers can break into
networks and steal data or cause other problems.

Types of IoT Security :

(I) Network Security

Keeping the Network Safe: Use firewalls, intrusion detection systems,


and access controls to prevent unauthorized access.

Zero-Trust Policy: Treat every device and user as potentially unsafe,


requiring frequent authentication and verification.

Secure Communication: Encrypt all data transmissions between devices


to ensure confidentiality and prevent interception.

(II) Device Security

Monitoring and Protection: Employ security software to detect and


prevent unusual or malicious activities on devices.

Robust Software: Regularly update and patch device software to


eliminate vulnerabilities and protect against exploitation.

Secure Boot Process: Verify the integrity of the device’s operating


system at startup to ensure it has not been tampered with.
(III) Data Security

Data Encryption: Implement strong encryption for data both at rest and
in transit to prevent unauthorized access.

Data Privacy: Restrict access to sensitive information, ensuring only


authorized personnel can view it.

Data Integrity: Use checksums and other verification techniques to


ensure data accuracy and detect any unauthorized alterations.

You might also like