IoT Unit 1
IoT Unit 1
IoT Unit 1
By:
Manjunath C Lakkannavar
Assistant Professor, Dept. of ECE
Ramaiah Institute of Technology, Bengaluru – 54
Email: manjunathl@msrit.edu
Mobile: +91-7411403673
OVERVIEW
Unit 1: Introduction & concepts
Unit 2: Developing Internet of Things, IoT Physical Devices and End Points
Unit 3: Smart Objects, IP as the IoT Network Layer
Unit 4: Data and Analytics for IoT, Securing IoT
Unit 5: IoT Case Studies
UNIT – I
Introduction & concepts: Definition and Characteristics of IoT, Things in IoT, IoT Protocols, IoT Functional
Blocks, IoT Communication Models, IoT Communication APIs, IoT Enabling Technologies, IoT Levels and
Deployment Templates, IoT and M2M, SDN and NFV for IoT, IoT System Management with NETCONFIG-
YANG
UNIT – II
Developing Internet of Things: IoT Platform Design Methodology, Specifications: Requirements, Process,
Domain, Information, Services, Level, Functional, Operational, Integration, Application Development
IoT Physical Devices and End Points: Basic Building Blocks of an IoT Device, Raspberry Pi, Linux on Raspberry
Pi, Raspberry Pi Interfaces: Serial, SPI, I2C
UNIT – III
Smart Objects: The “Things” in IoT, Sensors, Actuators, and Smart Objects, Sensor Networks, Connecting
Smart Objects, Communications Criteria, IoT Access Technologies.
IP as the IoT Network Layer: The Business Case for IP, The need for Optimization, Optimizing IP for IoT, Profiles
and Compliances, Application Protocols for IoT, The Transport Layer, IoT Application Transport Methods
UNIT – IV
Data and Analytics for IoT: An Introduction to Data Analytics for IoT, Machine Learning, Big Data Analytics Tools and
Technology, Hadoop, HDFS, Mapreduce, Apache spark, Apache storm, Edge streaming, Network Analytics
Securing IoT: A Brief History of OT Security, Common Challenges in OT Security, How IT and OT Security Practices and Systems
Vary, Formal Risk, Analysis Structures: OCTAVE and FAIR, The Phased Application of Security in an Operational Environment
UNIT – V
IoT Case Studies: Home automation: Supply of Gas and Water, Smart Meters, Smart lighting, Home intrusion detection; Smart
parking environment: Weather monitoring system, Weather reporting bot, Air Quality and monitoring pollutants, Forest fire
detection, Agriculture – Smart irrigation, IoT printer, VANET
REFERENCE BOOKS:
1. Vijay Madisetti and ArshdeepBahga, “Internet of Things (A Hands -on-Approach)”, 1stEdition, VPT, 2014.
(ISBN: 978-8173719547) Edition, McGraw Hill Education, 2017.
2. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry,"IoT Fundamentals: Networking
Technologies, Protocols, and Use Cases for the Internet of Things”, 1st Edition, Pearson Education (Cisco Press Indian
Reprint).
Unit 1
• Introduction to IoT
• IoT and M2M
• IoT System management with
NETCONF-YANG
Outline
• IoT definition
• Characteristics of IoT
• Physical Design of IoT
• Logical Design of IoT
• IoT Protocols
• IoT Levels & Deployment Templates
• Difference between IoT and M2M
• SDN and NFV for IoT
• NETCONF
Definition of IoT
• Self-Configuring
Setup networking
Upgrade software with minimal user intervention
• Unique Identity
Monitor status
Query device
Control remotely
• Integrated into Information Network
To communicate and exchange data with other devices and systems
Data analysis and prediction
Physical Design of IoT
• The "Things" in IoT usually refers to IoT devices which have unique
identities and can perform remote sensing, actuating and monitoring
capabilities.
• IoT devices can:
• Exchange data with other connected devices and applications (directly or
indirectly), or
• Collect data from other devices and process the data locally or Send the data
to centralized servers or cloud-based application back-ends for processing the
data, or
• Perform some tasks locally and other tasks within the IoT infrastructure, based
on temporal and space constraints
• Eg: Mobile Phone
Generic block diagram of an IoT Device
• Link Layer
• 802.3 – Ethernet(10Mb/s to 40 Gb/s) – wired LAN
• 802.11 – WiFi (1 Mb/s to 6.75Gbp/s) – wireless LAN
• 802.16 – WiMax (1.5Mb/s to 1 Gb/s)
World wide interoperability for microwave access(multiple physical layer and
multiple MAC channels)
• 802.15.4 – LR-WPAN (40Kb/s – 250 Kb/s)
• 2G/3G/4G (9.6Kbps – 100Mb/s)
• Network/Internet Layer
• IPv4
• IPv6
• 6LoWPAN---2.4GHz, 250Kbp/s
• Transport Layer
• TCP- connection oriented, Reliable
• UDP- connectionless, used for time sensitive small data transfer
• Application Layer
• HTTP- Hyper text transfer protocol-TCP-request response(RR)
• CoAP- Constrained Application Protocol (M2M)-UDP-RR
• WebSocket- full duplex comm over single socket- CS
• MQTT- Message Queue telemetry transport- CS-pub/subs
• XMPP – extensible messaging and presence protocol- real time- CS-Server to
server
• DDS- Data Distribution Service- M to M- pub/subscribe
• AMQP- Advanced message queuing protocol – business messaging-
PP,Pub/sub
Logical Design of IoT
• Request-Response is a communication
model in which the client sends
requests to the server and the server
responds to the requests.
• Publish-Subscribe is a
communication model that involves
publishers, brokers and consumers.
• Publishers are the source of data.
Publishers send the data to the
topics which are managed by the
broker. Publishers are not aware of
the consumers.
• Consumers subscribe to the topics
which are managed by the broker.
• When the broker receives data for a
topic from the publisher, it sends the
data to all the subscribed consumers.
Push-Pull communication model
• Database: Database can be either local or in the cloud and stores the data
generated by the IoT device.
• Web Service: Web services serve as a link between the IoT device, application,
database and analysis components. Web service can be either implemented using
HTTP and REST principles (REST service) or using WebSocket protocol (WebSocket
service).
• Analysis Component: The Analysis Component is responsible for analyzing the IoT
data and generate results in a form which are easy for the user to understand.
• Application: IoT applications provide an interface that the users can use to control
and monitor various aspects of the IoT system. Applications also allow users to
view the system status and view the processed data.
IoT Level-1
• An M2M area network comprises of machines (or M2M nodes) which have
embedded hardware modules for sensing, actuation and communication.
• Various communication protocols can be used for M2M local area networks
such as ZigBee, Bluetooh, ModBus, M-Bus, Wirless M-Bus, Power Line
Communication (PLC), 6LoWPAN, IEEE 802.15.4, etc.
• The communication network provides connectivity to remote M2M area
networks.
• The communication network can use either wired or wireless networks (IP-
based).
• While the M2M area networks use either proprietary or non-IP based
communication protocols, the communication network uses IP-based networks.
• Since non-IP based protocols are used within M2M area networks, the
M2M nodes within one network cannot communicate with nodes in an
external network.
• To enable the communication between remote M2M area networks,
M2M gateways are used.
• Communication Protocols
• M2M and IoT can differ in how the communication between the machines or
devices happens.
• M2M uses either proprietary or non-IP based communication protocols for
communication within the M2M area networks.
• M2M focus is on protocols below N/W layer and in IOT above N/W layer
• Machines in M2M vs Things in IoT
• The "Things" in IoT refers to physical objects that have unique identifiers and can
sense and communicate with their external environment (and user applications) or
their internal physical states.
• M2M systems, in contrast to IoT, typically have homogeneous machine types within
an M2M area network.
• Network Function
Virtualization (NFV) is a
technology that leverages
virtualization to consolidate
the heterogeneous network
devices onto industry
standard high volume servers,
switches and storage.
• NFV is complementary to SDN
as NFV can provide the
infrastructure on which SDN
can run.
• The SNMP agent which is a software running on the managed device responds to the requests from
NMS and retrieves data from / writes to MIB
SNMP is an application layer protocol and uses UDP as the transport protocol
Limitations of SNMP
• While SNMP has be the most popular protocol for network management, it has its own
limitations
1. SNMP is designed to be simple, and, stateless, meaning the application will have to
maintain the context / state and has to be smart enough to roll back in the event of an
error / failure
2. SNMP is based on UDP and thus is not reliable – no acks
3. MIBs often lack writable objects, as such its not possible for writing configurations
using SNMP. Meaning SNMP can be used primarily for monitoring and status polling
4. There is no distinction between configuration and state data in the MIBs
5. Retrieving and playback of configuration data is cumbersome with SNMP
6. Earlier versions of SNMP did not have strong security features (the present / newer
versions have strong security support!!)
THE END…..