Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Introdution To Internet of Things (Iot) : Module-2

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 40

Introdution to Internet

of Things (IoT)
Module-2
Internet of Things (IoT)
• The IoT allows objects to be sensed or
controlled remotely if they are integrated
across existing network infrastructure.
• This can result in creating opportunities for
integration of the physical world into
computer-based systems and resulting in
improved efficiency, accuracy and economic
benefit in addition to a reduced human
intervention in managing them.
The IoT is not just a technology; it is, in fact, an ecosystem of things such
as:
• Devices
• Internet
• Data
• Cloud
• Applications
• Platforms & Products
It offers opportunities for business owners to bring a revolution in their
work by increasing productivity, reducing inefficiencies and inaccuracies,
Internet Protocol for Smart Objects
How does IoT Work
1. Devices consist of Sensors & Sensor Technology. They collect a wide variety of data ranging from
temperature, pressure, location, weather/environment conditions, grid parameters, health
essentials of a patent, etc.

2. Gateways as the name suggests, are the gateways to the internet for all the devices or things that
need to interact with it. They help to connect the sensor nodes in the internal network with the
external Internet, by collecting data from the sensor nodes and further transmitting it to the internet
infrastructure.

3. The data transmitted through the gateway is then stored and processed securely within the Cloud
infrastructure using the Big Data analytics engine. The data thus processed performs intelligent
actions. This is what makes the 'Smart Devices'!

4. The Applications help the end users to control and monitor their devices from remote locations. They
not only send important information on the hand-held devices or PCs but also help to send
commands back to the Smart Devices.

Apart from the above, IP addresses play an important role in the entire IoT ecosystem. The Internet
recognizes IP addresses only. IPv6 ensures that we will never run out of IP addresses by providing
3.4 x 1038  IP addresses.
The IoT Ecosystem
The main objective in this example is to control the loads (of the AC, refrigerator,
washing machine, etc.) through the Internet network remotely on the basic principle
of the Internet of Things (IoT).
 A real-time webpage will be essential with a user configurable front end to control
and monitor the load (See A in the figure 1.9).
 The data sent from a password protected webpage returns commands through
allowed IP fed to it.
 A Wi-Fi Module is configured with any nearby wireless modem to access internet.
The received Internet commands are fed to the Wi-Fi module.
 The program within the Wi-Fi Module executes the commands received based on
which the device gets activated through Bluetooth or Zigbee module interfaced to
Wi-Fi Module.
 The devices to be monitored/controlled communicate through RF modules in their
signal processing for WiFi / ZigBee/ Bluetooth/ radio transceiver (RFID) etc, or
through wired LAN.
 The data for control / monitor is harnessed through internet network to a remote
control / monitoring centre. PC system, laptop, tablet A or smart phone is used for
remote control centres and monitoring. (See A in the figure).
Principal technologies that drive IoT system

• Wireless Sensor Networks


• Embedded Systems
• Communication Protocols
• Cloud Computing
• Big Data Analysis
Wireless Sensor Networks
• A Wireless Sensor Network (WSN) is a network formed by a large
number of sensor nodes where each node is equipped with a sensor
to detect physical phenomenon such as light, heat, pressure, etc.
• With the rapid technological development of sensors, WSNs will
become the key technology for IoT.
• A sensor has the ability to capture anything from location to the
device orientation. Collectively, these sensors produce a huge amount
of data, both in unstructured form (such as picture or videos) as well
as structured (such as GPS or acceleration data). These “devices” are
perpetually connected to the Internet over WiFi, 3G or 4G.
• The simple block diagram of connectivity is illustrated below. The
devices can be connected through WiFi, modem, cloud etc.
Embedded Systems
• Embedded hardware devices, micro controllers etc, are the ones that
process the data. The data from the sensors are not directly usable and
a process for using them is implemented by the embedded system.
• All the connected devices are intelligent devices using a
microcontroller or a processor.
• Processors are the brain of the IoT system. Their main function is to
process the data from the sensors according to an algorithm to extract
the valuable information like status, parameter values, alerts etc., and
control actuators in some cases in the system. Processors work on a
real-time basis.
• Changes in their operational limits can be set by applications depending
on customer requirements. These are also responsible for securing the
data i.e. performing encryption and decryption of the data.
Communication Protocols
• IoT connects various devices through Internet and devices
talk to each other through a communication channel. The
defined communication channel is called as
'Communication Protocol'.
• The IoT specific protocols cover the wireless protocols like
ZigBee, RFID, Bluetooth, BAC net to the next generation
protocol standards such as 802.15.4e, IPv6 over Low-
Power Wireless Personal Area Networks(6LowPAN) ,
Routing protocol for low-power and lossy networks(RPL) ,
Constrained Application Protocol (CoAP) etc.
IoT Protocols
• IoT connects various devices through internet and
devices talk to each other through a communication
channel. Defined communication channel is called as
'Communication Protocol'.
• Communication protocols are broadly categorized as:
Link layer
Network layer
Transport layer and
Application layer
1.Link Layer
Link Layer determines how the data is physically sent over the
network's physical layer.
Ex: copper wire, OFC, radio waves etc.
Some examples are provided below:
• 802.3 - Ethernet
• Coaxial cables, twisted pair wire or optical fibre as a
medium 10Mbps to 40Gbps+ data rate
• 802.11 – Wi-Fi
• Wireless LAN; 802.11 b/g/n
• 2.4GHz / 5GHz band
• 1 Mbps to up to 6.75 Gbps data rate
802.16 – WiMax
• Collection of wireless broadband standards
• 1.5Mbps to 1Gbps data rate
802.15.4 – LR-WPAN
• Low-rate wireless personal area networks
ex: LoRa
• 40bps to 250Kbps data rate
• Provides low-cost, low-speed communication for low-power
devices
2.Network Layer
• The Network layer is responsible for sending
IP datagram from a source network to the
destinationnetwork. The layer performs host
addressing and packet routing.
• Some examples are provided below:
Ipv4
• 32 bit address scheme. Total (2)^32 addresses
are available
IPv6
• 128 bit address scheme. Total (2)^128 addresses are
available
6LoWPAN

• IPv6 over Low power Wireless Personal Area


Network
• Operates in 2.4GHz range with data transfer
rate of 250Kbps
3.Transport Layer
• Transport layer protocols provide end-to-end
message transfer capability independent of
the underlying network.
TCP
• Transmission Control Protocol
• Connection oriented and state full protocol
• Ensures reliable transmission, provides error
detection, flow control and congestion control
UDP
• User Datagram Protocol
• Connectionless and stateless protocol
• Asynchronous protocol
4. Application Layer
• Application layer protocol defines how the
applications interface with lower layer
protocols to send data over a network.
HTTP
• Hypertext Transfer Protocol
• Follows a request-response model
CoAP
• Constrained Application Protocol
• Follows a request-response model
• Runs on top of UDP
• Meant for constrained environment
Web Sockets
• Based on TCP
• Allows full duplex unique connections
MQTT
• Message Queue Telemetry Transport
• Based on Publish-Subscribe model
• Low data rate, low packet size, requires low
bandwidth
XMPP

• Extensible Messaging and Presence Protocol


• Used for real-time communication and
streaming XML data
DDS

• Data Distributed Service


• Based on publish – subscribe model
AMQP

• Advanced Message Queuing Protocol


• Supports publish – subscribe model, point-to-
point and routing and queuing
Cloud Computing
• cloud refers to a distinct IT environment that is designed for the
purpose of remotely provisioning scalable and measured IT
resources.
• It is a means of providing remote access to a set of decentralized
IT resources.
• Mainly it is a type of computing that relies on sharing computing
resources rather than having local servers or personal devices to
handle applications.
• In short, cloud computing is a type of Internet-based computing,
where different services such as servers, storage and applications
are delivered to an organisation's computers and devices
through the Internet.
Cloud solution

The solution in the Cloud can have several levels of complexity:


1. Connectivity:
The solution can enable a remote user to connect to the device remotely (through
the Cloud solution).
2. Management :
The management capability can be provided by the Cloud solution whereby the
operation and control of the device can be performed through the Cloud solution.
3. Remote user:
Similar to a local user, a remote user equipped with a Smartphone /Tablet/PC wants to
interact with the connected device or receive information relating to it. A local user
may interact directly with the device, whereas a remote user will need to do so via the
cloud solution. A relevant app or application needs to be developed that will connect
to the Cloud solution and thereby have access to the device or the information relating
to it.
Big data Analytics
• Big data analytics is the process of examining
large and varied data sets i.e., big data to
uncover hidden patterns, unknown
correlations, market trends, customer
preferences and other useful information that
can help organizations make more-informed
business decisions.
• Big data analysis and cloud computing go
hand in hand, particularly in IoTapplications.
• Analysis of the data coming from a device or other
sources can be used to send information to a
remote/local user regarding the device operation,
or this analysis can be translated into commands
sent to the device to influence its operation.
• For example, the connected lamp can be turned
on from the Cloud when analysis shows that it is
dark in the lamp's location and a remote lock
shows that someone has entered the house.
BPM- Business Process Management OSS- Operations support systems
BRM- Business RelationshipManagement BSS- Basic Service Set 

You might also like