Unit 1
Unit 1
Unit 1
• Sensors or devices are a key component that helps you to collect live data from the surrounding environment.
Connectivity
• All the collected data is sent to a cloud infrastructure. The sensors should be connected to the cloud using
various mediums of communications. These communication mediums include mobile or satellite networks,
Bluetooth, WI-FI, WAN, etc.
Data Processing
• Once that data is collected, and it gets to the cloud, the software performs processing on the gathered data.
identifying objects, using computer vision on video.
User Interface
• The information needs to be available to the end-user in some way which can be achieved by triggering
alarms on their phones or sending them notification through email or text message.
Characteristics of IoT
• Characteristics of the Internet of Things:
1.Connectivity — Connectivity is an important requirement of the IoT
infrastructure. Things of IoT should be connected to the IoT infrastructure.
Anyone, anywhere, anytime can connect, this should be guaranteed at all
times. For example, the connection between people through internet
devices like mobile phones, and other gadgets, also a connection between
Internet devices such as routers, gateways, sensors, etc.
2.Intelligence and Identity — The extraction of knowledge from the
generated data is very important. For example, a sensor generates data, but
that data will only be useful if it is interpreted properly. Each IoT device has
a unique identity. This identification is helpful in tracking the equipment
and at times for querying its status.
3.Scalability — The number of elements connected to the IoT zone is
increasing day by day. Hence, an IoT setup should be capable of handling
the massive expansion. The data generated as an outcome is enormous, and
it should be handled appropriately.
4.Dynamic and Self-Adapting (Complexity) –IoT devices should
dynamically adapt themselves to changing contexts and scenarios.
Assume a camera meant for surveillance. It should be adaptable to
work in different conditions and different light situations (morning,
afternoon, and night).
5.Architecture — IoT architecture cannot be homogeneous in nature.
It should be hybrid, supporting different manufacturers ‘ products to
function in the IoT network. IoT is not owned by anyone engineering
branch. IoT is a reality when multiple domains come together.
6.Safety — There is a danger of the sensitive personal details of the
users getting compromised when all his/her devices are connected to
the internet. This can cause a loss to the user. Hence, data security is
the major challenge. Besides, the equipment involved is huge. IoT
networks may also be at the risk. Therefore, equipment safety is also
critical.
IoT Enabling Technologies
Different technologies together enable development of IoT applications.
The IoT enabling technologies are:
• Wireless Sensor Networks
• Cloud Computing
• Big Data Analytics
• Communication Protocols
• Embedded Systems
IoT Enabling Technologies: Wireless Sensor Networks
• A Wireless Sensor Network (WSN) is a collection of devices which
communicate through wireless channels.
• A WSN consists of distributed devices with sensors which are used to
monitor the environmental and physical conditions.
• A WSN consists of a number of end nodes, routers and coordinators.
End nodes can also act as routers.
• A coordinator collects data from all the nodes and is connected to
Internet.
Examples of WSNs used in IoT systems:
• Weather monitoring systems
• Indoor air quality monitoring systems
• Soil moisture monitoring systems
• Surveillance systems
• Smart grids
• Structural health monitoring systems
• IoT Enabling Technologies: Cloud Computing
• Cloud computing is a computing model in which applications and services are delivered over
Internet. The resources provisioned by cloud can be compute, networking or storage. Cloud
allows the users to access resources based on utility model. The characteristics of cloud
computing are:
• On demand: The resources in the cloud are available based on the traffic. If the incoming traffic
increases, the cloud resources scale up accordingly and when the traffic decreases, the cloud
resources scale down accordingly.
• Autonomic: The resource provisioning in the cloud happens with very less to no human
intervention. The resources scale up and scale down automatically.
• Scalable: The cloud resources scale up and scale down based on the demand or traffic. This
property of cloud is also known as elasticity.
• Pay-per-use: On contrary to traditional billing, the cloud resources are billed on pay-per-use
basis. You have to pay only for the resources and time for which you are using those resources.
• Ubiquitous: You can access the cloud resources from anywhere in the world from any device.
All that is needed is Internet. Using Internet you can access your files, databases and other
resources in the cloud from anywhere.
Cloud computing offers three basic service models using which users can
subscribe to cloud resources. These service models are:
• Infrastructure-As-A-Service (IAAS)
• Platform-As-A-Service (PAAS)
• Software-As-A-Service (SAAS)
These three service models can be illustrated as shown below.
IAAS model provides the core infrastructure to companies for building their
own applications.
This core infrastructure includes servers, storage, networking, etc.
PAAS model offers development runtimes for the users to build and deploy
their application.
SAAS model offers already developed and deployed applications for the users
to use. Examples of SAAS offerings are Gmail, Facebook, DropBox, YouTube, etc.
• Cloud computing supports four basic deployment models.
• These models differ in the way how the cloud is built and who are
using the resources in the cloud.
The four cloud deployment models are:
• Public cloud
• Private cloud
• Community cloud
• Hybrid cloud
IoT Enabling Technologies: BigData Analytics
• BigData is a collection of data coming from various types of sources. The data is
often huge which cannot be handled by the traditional databases and data
warehouses. BigData is often characterized by six Vs. They are:
• Volume: Refers to the huge volume of data aggregated from various sources.
• Variety: Refers to different types of data. Data can be structured, semi-structured or
unstructured.
• Velocity: Refers to the speed at which the data is generated. Now-a-days the amount
of data available on the Internet per minute is several peta bytes or even more.
• Veracity: Refers to the degree to which the data can be trusted. If the data collected
is incorrect or has manipulated or wrong values, the analysis of such data is useless.
• Value: Refers to the business value of the collected. Even though we have huge
amount of data, but it is not useful for gaining profits in the business, such data is
useless.
• Variability: Refers to the ways in which the big data can be used and formatted
• The data analytics framework consists of six steps namely: collection,
cleaning, integration, analysis, visualization and alerting. These six
steps can be summarized as shown in the below figure.
IoT Enabling Technologies: Communication Protocols
• Communications protocols form the backbone for IoT systems. They
allow devices to communicate with each other.
• Protocols define the data exchange formats, data encoding and
addressing schemes for devices.
• Protocols also provide flow control, error control, and other functions.
• IoT Enabling Technologies: Embedded Systems
• Embedded system can be imagined as computing hardware with
software embedded in it.
• An embedded system can be an independent system or it can be a part
of another larger system.
• An embedded system is a microcontroller or microprocessor based
system which is designed to perform a specific task.
• The key components include microcontroller/microprocessor,
memory, networking units, I/O, and storage.
• It runs Real-Time Operating Systems (RTOS).
An embedded system has three components. They are:
• Hardware
• Software
• Real Time Operating system (RTOS) that supervises the application
software and provide mechanism to let the processor run a process as
per schedule by following a plan to control the latencies
The characteristics of an embedded system are:
• Single-functioned
• Tightly constrained
• Reactive and Real time
• Memory
• Connected
Physical Design of Internet of Things (IOT)
• Things in IoT refers to IoT devices. Things have unique identities. Things can perform sensing,
actuation, and monitoring. Some of the examples of things in internet of things are shown below.
Some of the examples of IoT devices are:
• Home appliances: smart TV, smart refrigerator, smart AC, etc.
• Smart phones and computers
• Wearables: smart watch, smart sensors, etc.
• Automobiles like self-driving cars
• Energy systems
• Retail : smart payment
• Printers
• Industrial machines
• Healthcare: smart watch, smart healthcare, etc.
• Surveillance: smart cameras, smart trackers, etc.
• The physical design of an IoT system is referred to as the
Things/Devices and protocols that are used to build an IoT system.
• all these things/Devices are called Node Devices and every device has
a unique identity that performs remote sensing, actuating and
monitoring work.
• and the protocols that are used to establish communication between
the Node devices and servers over the internet.
• Things/Devices
• Things/Devices are used to build a connection, process data, provide
interfaces, provide storage, and provide graphics interfaces in an IoT
system.
• all these generate data in a form that can be analyzed by an analytical
system and program to perform operations and used to improve the
system.
• for example temperature sensor that is used to analyze the
temperature generates the data from a location and is then
determined by algorithms.
An IoT thing or device is made up of different
components. The generic block diagram of an IoT thing
or device is given below:
Connectivity
• Devices like USB hosts and ETHERNET are used for connectivity between the devices and
the server.
Processor
• A processor like a CPU and other units are used to process the data. these data are
further used to improve the decision quality of an IoT system.
Audio/Video Interfaces
• An interface like HDMI and RCA devices is used to record audio and videos in a system.
Input/Output interface
• To give input and output signals to sensors, and actuators we use things like UART, SPI,
CAN, etc.
Storage Interfaces
• Things like SD, MMC, and SDIO are used to store the data generated from an IoT device.
• Other things like DDR and GPU are used to control the activity of an IoT system.
• Physical Design of IoT: IoT Protocols
• A protocol is a set of rules that governs the communication between
two or more devices.
• A protocol defines the rules, syntax, semantics and synchronization of
communication and possible error recovery methods.
• An overview of different protocols used in IoT with respect to TCP/IP
protocol stack is given below:
Application Layer protocol
• In this layer, protocols define how the data can be sent over the network with the lower
layer protocols using the application interface.
• these protocols include HTTP, WebSocket, XMPP, MQTT, DDS, and AMQP protocols.
HTTP
• Hypertext transfer protocol is a protocol that presents in an application layer for
transmitting media documents. it is used to communicate between web browsers and
servers.
• it makes a request to a server and then waits till it receives a response and in between the
request server does not keep any data between two requests.
WebSocket
• This protocol enables two-way communication between a client and a host that can be run
on an untrusted code in a controlled environment.
• this protocol is commonly used by web browsers.
MQTT
• It is a machine-to-machine connectivity protocol that was designed as a
publish/subscribe messaging transport. and it is used for remote locations where a
small code footprint is required.
Transport Layer
• This layer is used to control the flow of data segments and handle the error
control. also, these layer protocols provide end-to-end message transfer capability
independent of the underlying network.
TCP
• The transmission control protocol is a protocol that defines how to establish and
maintain a network that can exchange data in a proper manner using the internet
protocol.
UDP
• a user datagram protocol is a part of an internet protocol called the connectionless
protocol. this protocol is not required to establish the connection to transfer data.
Network Layer
• This layer is used to send datagrams from the source network to
the destination network. we use IPv4 and IPv6 protocols as host
identification that transfers data in packets.
IPv4
• This is a protocol address that is a unique and numerical label
assigned to each device connected to the network. an IP
address performs two main functions host and location
addressing. IPv4 is an IP address that is 32-bit long.
IPv6
• It is a successor of IPv4 that uses 128 bits for an IP address. it is
developed by the IETF task force to deal with long-anticipated
problems.
Link Layer
• Link-layer protocols are used to send data over the network's physical
layer. it also determines how the packets are coded and signaled by
the devices.
Ethernet
• It is a set of technologies and protocols that are used primarily in
LANs. it defines the physical layer and the medium access control for
wired ethernet networks.
WiFi
• It is a set of LAN protocols and specifies the set of media access
control and physical layer protocols for implementing wireless local
area networks.
Logical Design of IoT
• The logical design of an IoT system refers to an abstract
representation of entities and processes without going into the
low-level specifies of implementation.
• it uses Functional Blocks, Communication Models,
and Communication APIs to implement a system.
• Logical Design of Internet of Things(IoT)
1.IoT Functional Blocks
2.IoT Communication Models
3.IoT Communication APIs
IoT Functional blocks
• An IoT system consists of a number of functional
blocks like Devices, services, communication, security,
and application that provide the capability for sensing,
actuation, identification, communication, and
management.
• These functional blocks consist of devices that provide
monitoring control functions, handle communication
between host and server, manage the transfer of data,
secure the system using authentication and other
functions, and interface to control and monitor various
terms.
Application
• It is an interface that provides a control system that use by users to view the status and analyze of system.
Management
• This functional block provides various functions that are used to manage an IoT system.
Services
• This functional block provides some services like monitoring and controlling a device and publishing and deleting the data
and restoring the system.
Communication
• This block handles the communication between the client and the cloud-based server and sends/receives the data using
protocols
Security
• This block is used to secure an IoT system using some functions like authorization, data security, authentication, 2-step
verification, etc.
Device
• These devices are used to provide sensing and monitoring control functions that collect data from the outer environment.
IoT Communication Models
• There are several different types of models available in an IoT
system that is used to communicate between the system and
server like the request-response model, publish-subscribe
model, push-pull model, exclusive pair model, etc.
Request-Response Communication Model