100% found this document useful (1 vote)
93 views77 pages

217529-Internet of Things: Devices

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
93 views77 pages

217529-Internet of Things: Devices

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 77

217529- Internet of Things

Unit Number: 3
Unit Name: Introduction & IOT Technologies behind smart and intelligent
devices
Unit Outcomes: CO3
Explain the concept of Internet of Things and identify the technologies that
make up the internet of things

Dr. D. Y. Patil Institute of Technology


Syllabus
• IoT Concepts, Introduction to IOT Communications, Telemetry vs IOT, Applications of IOT
Communications, People, Processes and Devices.
• Automation, asset management, telemetry, transportation, telematics. Telemetry and Telemetric;
Report ocation, logistics, tracking and remote assistance; Next generation kiosks, self-service
technology; Cellular IOT connectivity services.

Dr. D. Y. Patil Institute of Technology


Introduction..
 Internet of Things, popularly known as IoT, is "a process or phenomenon in which all devices are
connected to the Internet and communicate with each other." or The ‘Thing’ in IoT can be any
device with any kind of built-in-sensors with the ability to collect and transfer data over a
network without manual intervention
 These devices can also be normal devices and smart. Devices can also be there. Let me give you
some examples
 Automation home
 smart City
 Smart grid
 Industrial internet
 Connected course
 Smart retail
 Energy engagement

Dr. D. Y. Patil Institute of Technology


IoT? (Some Industry Definitions)
 A network connecting (either wired or wireless) devices, or ‘things’, that is characterized by
autonomous provisioning, management, and monitoring. The IoT is innately analytical and
integrated (IDC)

 IoT is the next evolution of the Internet, connecting the unconnected people, processes, data, and
things in your business today (Cisco)

 IoT devices as those capable of two-way data transmission (excluding passive sensors and RFID
tags). It includes connections using multiple communication methods such as cellular, short
range and others. (GSMA)

 Sensors & actuators connected by networks to computing systems. These systems can monitor or
manage the health and actions of connected objects and machines. Connected sensors can also
monitor the natural world, people, and animal” (McKinsey)

Dr. D. Y. Patil Institute of Technology


Cont..
 “An IoT system is a network of networks where, typically, a massive number of objects, things,
sensors or devices are connected through communications and information infrastructure to
provide value-added services via intelligent data processing and management for different
applications (e.g. smart cities, smart health, smart grid, smart home, smart transportation, and
smart shopping).” (IEEE)
 ITU Definition
 Physical things
Exist in the physical world and are capable of
being sensed, actuated and connected.
Examples: industrial robots,
goods and electrical equipment.

 Virtual things
Exist in the information world and are capable of
being stored, processed and accessed.
Examples: Multimedia content, application software.

Dr. D. Y. Patil Institute of Technology


History
 The term “The Internet of Things” (IoT) was
coined by Kevin Ashton in a presentation
to Proctor & Gamble in 1999. He is a co-
founder of MIT’s Auto-ID Lab.
 He pioneered RFID (used in bar code
detector) for the supply-chain management
domain. He also started Zensi, a company
that makes energy sensing and monitoring
technology.
 However, IoT was “born” sometime between
2008 and 2009. In 2010, the number of
everyday physical objects and devices
connected to the Internet was around 12.5
billion.
 Nowadays there are about 25 billion of devices
connected to the IoT. More or less a smart
device per person.
Dr. D. Y. Patil Institute of Technology
HOW IoT Works?
 The IoT consists of sensors and devices collecting data from their surroundings. This data is then sent to
the cloud by means of Wi-Fi, Bluetooth, LPWAN, satellite, or being connected directly to the internet via
Ethernet.
 When the data reaches the cloud, it is then processed by software programs. The information is then
made available to the consumer in a user-friendly way.
 This information is communicated to the user to either check on the system or take action and affect the
system.

Dr. D. Y. Patil Institute of Technology


Example

 For Example we need to sprinkle water in Garden in specific time or when specific data received as an
inout to IoT system. MQTT is an OASIS standard messaging protocol for the Internet of Things (IoT). It is
designed as an extremely lightweight publish/subscribe messaging transport that is ideal for connecting
remote devices with a small code footprint and minimal network. HTTP stands for Hypertext Transfer
Protocol. · It is a protocol used to access the data on the World Wide Web (www).
Dr. D. Y. Patil Institute of Technology
Component of IOT
 IoT has 4 components that describe the functioning of most of the IoT systems:
1. Devices: Sensors gather the information at the point of activity. It could
be biological, environmental, visual, auditory, or any combination of
these. Things or Devices are the primary physical objects that are being
monitored. Smart sensors attached to these devices are continuously
collecting data from the device and transmitting it to next layer i.e.
gateway.
2. Connectivity: The sensors can be connected to the cloud through
various mediums of communication and transports such as cellular
networks, satellite networks, Wi-Fi, Bluetooth, wide-area networks
(WAN), low power wide area network and many more.
3. Data processing: Analytics is the process of converting analog data
from interconnected smart devices and sensors into usable insights that
can be processed, interpreted, and used for detailed analysis. Intelligent
analytics is a must for IoT technology for management and improvement
of the entire system.
4. User Interface: User interfaces are the visible, tangible part of the IoT
system which can be accessible by users. Designers will have to make
sure a well-designed user interface for minimum effort for users and
encourage more interactions.

Dr. D. Y. Patil Institute of Technology


Characteristics of IoT
 1. Intelligence: IoT systems are extensively liked in the market because of their intelligence. A combination of
algorithms and computer enables the system to inform change in the environment and take appropriate actions. For
example – Systems are intelligent enough to sense a sudden spike in temperature and trigger an alarm for fire.
 2. Connectivity: Connectivity is the main characteristic of IoT as it enables the system to send data and stay connected
to other devices. It provides system network accessibility and function collaboratively.
 3. Expressing: IoT is all about interacting intelligently with the outer environment and humans. Expressing enables this
interactivity. Expressing allows us to show output into the real world and input from people and the environment.
 4. Sensing: Sensitivity means aware of the changes around us. Sensor technologies provide us with the means to create
an experience that reflects an awareness of changes in the physical world and the people in it. It helps in expressing.
This forms the input for the IoT system and provides a better understanding of the complex world around us.
 5. Energy: Everything in this world is driven by energy. IoT systems are created smart enough to synthesize energy
from the outer environment and conserve it. It is also made energy efficient to work for a longer duration.
 6. Security: Safety and security is the most important feature of any system. If the system is not secure to cyber attack
and illegal intervention, nobody will use it. IoT systems deal with personal data; that’s why it’s an obligation that all
safety measure should be taken care of in this system. All IoT systems are secure enough to deal with personal data.

Dr. D. Y. Patil Institute of Technology


Advantages of IoT
 Internet of things facilitates the several advantages in day-to-day life in the business sector. Some
of its benefits are given below:
 Efficient resource utilization: If we know the functionality and the way that how each device
work we definitely increase the efficient resource utilization as well as monitor natural
resources.
 Minimize human effort: As the devices of IoT interact and communicate with each other and
do lot of task for us, then they minimize the human effort.
 Save time: As it reduces the human effort then it definitely saves out time. Time is the primary
factor which can save through IoT platform.
 Enhance Data Collection:
 Improve security: Now, if we have a system that all these things are interconnected then we
can make the system more secure and efficient.

Dr. D. Y. Patil Institute of Technology


Disadvantages of IoT
 As the Internet of things facilitates a set of benefits, it also creates a significant set of challenges.
Some of the IoT challenges are given below:
 Security: IoT technology creates an ecosystem of connected devices. However, during this
process, the system may offer little authentication control despite sufficient security
measures.
 Privacy: The use of IoT, exposes a substantial amount of personal data, in extreme detail,
without the user’s active participation. This creates lots of privacy issues.
 Flexibility: There is a huge concern regarding the flexibility of an IoT system. It is mainly
regarding integrating with another system as there are many diverse systems involved in the
process.
 Complexity: The design of the IoT system is also quite complicated. Moreover, it’s deployment
and maintenance also not very easy.
 Compliance: IoT has its own set of rules and regulations. However, because of its complexity,
the task of compliance is quite challenging.

Dr. D. Y. Patil Institute of Technology


Four pillars of IOT
 There are four pillars that unify the Internet of things. They all help you to communicate and
connect with people and devices, and they work together to create a new Internet Age: an
Internet Age where we can do things we never thought we could, and where we become more
connected than ever before.
 M2M [Machine to Machine]
 SCADA [Supervisory Control and Data Acquisition:]
 WSN [Wireless Sensor Network]
 RFID [Radio-frequency identification]

Dr. D. Y. Patil Institute of Technology


Piller 1: M2M: Machine to Machine
 M2M stands for machine-to-machine, mobile-to-machine, and machine-to-mobile Communications.
 Machine to Machine (M2M) can be defined as a “direct, point-to-
point” communication standard between devices usually of the
same type. It’s also meant for a specific on-premise application,
which can be through wired or “non-Internet”-based wireless
methods, such as Zigbee, RFID, Bluetooth, Wi-Fi, BLE, LoRaWAN,
Sigfox, 6LoWPAN, and more.
 The three main domains of M2M architecture are:
1. M2M application: As the name suggests, the M2M application domain
offers applications to use M2M technology conveniently. Examples
include server and end-user applications.

2. M2M network domain: M2M network domain acts as a bridge between


the M2M application domain and the M2M device domain. It is made of
two parts called the M2M core and M2M service capabilities.

3. M2M device domain: M2M device domain contains all the devices that
can connect to the M2M network easily. The device domain can also be
called the M2M area network. The M2M device domain includes devices
that can connect directly over a network, devices that cannot directly
connect to a network and may perhaps require an M2M gateway and
proprietary devices.
Dr. D. Y. Patil Institute of Technology
Working of M2M
 M2M devices send data across a network by sensing information.
 In order to send the data the machines use public networks such as cellular and ethernet. M2M
comprises components such as RFID, sensors, Wi-Fi communication links and automated
computer software programs that translate the incoming data to generate responses or actions.

 Telemetry is one of the most renowned M2M communications. It has been in use since the
beginning of the last century to transmit data. Developers used telephone lines for
communication and later moved to radio wave transmission signals in order to monitor the
performance of the data that is gathered from remote locations.

 The arrival of the internet improved the standards of wireless technology and now wireless
communication is used in everyday real life applications such as hospitals, cities, stations, roads
and so on.

Dr. D. Y. Patil Institute of Technology


Piller 2 Supervisory Control and Data Acquisition SCADA
 SCADA stands for Supervisory Control and Data Acquisition. As the name suggests, this system is used to
monitor, collect data from and automatically control the production process.

 What Is SCADA Used For?

Dr. D. Y. Patil Institute of Technology


Piller 2 Supervisory Control and Data Acquisition SCADA
 A SCADA system is a combination of hardware and software that enables the automation of
industrial processes by capturing Operational Technology (OT) real-time data.
 SCADA is a monitoring system which is used to remotely observe and control industrial
processes. It is a type of Industrial Control System (ICS). Before we move on to SCADA, we need to
talk about ICSs.
 SCADA connects the sensors that monitor equipment like motors, pumps, and valves to an onsite
or remote server. A SCADA system empowers organizations to:
 Control processes locally or at remote locations
 Acquire, analyze and display real-time data
 Directly interact with industrial equipment such as sensors, valves, pumps, and motors
 Record and archive events for future reference or report creation.

Dr. D. Y. Patil Institute of Technology


Cont..
 Basic components and the functions they perform individually.
 Examples of a SCADA system
 Smart City
 Smart Manufacturing

1. Peripherals: including sensors, measuring devices, converters and actuators.

2. Intermediate data collection stations: are remote terminal units RTU (Remote Terminal Units) or PLC
(Programmable Logic Controllers) that communicate with actuators.

3. Communication system: includes industrial communication networks, telecommunication equipment and


multiplexing converters that transmit field-level data to control blocks and servers.

4. Monitoring control system: includes SCADA software and HMI (Human Machine Interface).

Dr. D. Y. Patil Institute of Technology


SCADA System Work

 The first step in the process is the collection of analogue data. There are many types of sensors designed to record pressure, temperature, humidity, and various other
factors.

 The sensor data is collected by the PLC (controller) and forwarded to the centralised SCADA station which is usually present in a remote location.

 The central location receives data from multiple PLCs which are usually located across a wide spread of area. With the help of the HMI, the user (e.g. manager or
supervisor) can view the gathered information in an organised fashion, such as in the form of a table or graph.

 This refined data may then be fed into the CMMS. This software helps detect any anomalies in the data and then generate reports and work orders.

 The work orders define the problem, solutions, and required resources. Human workers can then intervene and perform the required maintenance or repair work on
the equipment which caused the irregularity in the first place.

Dr. D. Y. Patil Institute of Technology


Piller 3: WSN: Wireless Server Network
 A wireless sensor network (WSN) is a wireless network that contains distributed independent sensor devices that are meant to
monitor physical or environmental conditions. A WSN consists of a set of connected tiny sensor nodes, which communicate with
each other and exchange information and data. These nodes obtain information on the environment such as temperature, pressure,
humidity or pollutant, and send this information to a base station. The latter sends the info to a wired network or activates an
alarm or an action, depending on the type and magnitude of data monitored.
 Typical applications include weather and forest monitoring, battlefield surveillance, physical monitoring of environmental
conditions such as pressure, temperature, vibration, pollutants, or tracing human and animal movement in forests and borders.

 They use the same transmission medium (which is air) for wireless
transmission as wireless local area networks (WLANs). For nodes in a local
area network to communicate properly, standard access protocols like IEEE
802.11 are available. However, this and the other protocols cannot be
directly applied to WSNs.

Dr. D. Y. Patil Institute of Technology


Piller 4:RFID : Radio-frequency identification
 RFID (radio frequency identification) is a form of wireless communication that
incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the
electromagnetic spectrum to uniquely identify an object, animal or person.
 There are two types of RFID :
 Passive RFID – In this device, RF tags are not attached by a power supply and passive RF tag stored
their power. When it is emitted from active antennas and the RF tag are used specific frequency like
125-134MHZ as low frequency, 13.56MHZ as a high frequency and 856MHZ to 960MHZ as ultra-high
frequency.
 Active RFID – In this device, RF tags are attached by a power supply that emits a signal and there is an
antenna which receives the data.
 Application of RFID :
 It utilized in tracking shipping containers, trucks and railroad, cars. It uses in Asset tracking. It
utilized in credit-card shaped for access application. It uses in Personnel tracking. Controlling access
to restricted areas. It uses ID badging. Supply chain management. Counterfeit prevention (e.g., in the
pharmaceutical industry).
Dr. D. Y. Patil Institute of Technology
Introduction to IOT Communications Model
 Request-Response:  Publish-Subscribe

• Here client sends requests to the server and the server responds to the • Publish-Subscribe is a communication model that involves publishers, brokers
requests. When the server receives a request, it decides how to respond, and consumers. Publishers are the source of data. Publishers send the data to
fetches the data, retrieves resource representation, prepares the response, the topics which are managed by the broker. Publishers are not aware of the
and then sends the response to the client. consumers.
• HTTP works as a request-response protocol between a client and server. A • Consumers subscribe to the topics which are managed by the broker. When the
web browser may be the client, and an application on a computer that
broker receive data for a topic from the publisher, it sends the data to all the
hosts a web site may be the server
subscribed consumers.
• Example: Sending a spreadsheet to the printer — the spreadsheet program
• Example: Public sensors with a massive base of uniform users that will use the
is the client.
data

Dr. D. Y. Patil Institute of Technology


Introduction to IOT Communications Model
 Push-Pull  Exclusive Pair

• Exclusive Pair is a bidirectional, fully duplex communication model that uses a


• Push-Pull is a communication model in which the data producers push
persistent connection between the client and server.
the data to queues and the consumers Pull the data from the Queues.
• Producers do not need to be aware of the consumers. Queues help in • Connection is setup it remains open until the client sends a request to close
decoupling the messaging between the Producers and Consumers. the connection. Client and server can send messages to each other after
Queues also act as a buffer which helps in situations when there is a connection setup.
mismatch between the rate at which the producers push data and the
rate at which the consumer pull data • Exclusive pair is stateful communication model and the server is aware of all
• Example: Queues help in decoupling the messaging between the the open connections.
producers and consumers.
• Example: The WebSocket-based communication API.

Dr. D. Y. Patil Institute of Technology


IOT Communication API’s
 IoT APIs are the points of interaction between an IoT device and the internet and/or other
elements within the network. As API management company Axway puts it, “APIs are tightly linked
with IoT because they allow you to securely expose connected devices to customers, go-to-market
channels and other applications in your IT infrastructure.”
 There are two types of API support
 REST based communication APIs (Request-Response BasedModel)
 WebSocket based Communication APIs (Exclusive PairBasedModel)

Dr. D. Y. Patil Institute of Technology


REST based communication APIs (Request-Response BasedModel)
 REST is acronym for Representational State Transfer. It follows request response model.
Representational State Transfer (REST) is a set of architectural principles by which you can design web
services and web APIs that focus on a system’s resources and how resource states are addressed and
transferred. The REST architectural constraints are as follows:
 The below figure shows the communication between client server with REST APIs

Dr. D. Y. Patil Institute of Technology


Cont..
 REST architecture constraints are as follows:
 Client-Server: The principle behind client-server constraint is the separation of concerns.
Separation allows client and server to be independently developed and updated.
 Stateless: Each request from client to server must contain all the info. Necessary to understand
the request, and cannot take advantage of any stored context on the server.
 Cache-able: Cache constraint requires that the data within a response to a request be
implicitly or explicitly labelled as cache-able or non-cacheable. If a response is cacheable, then
a client cache is given the right to reuse that response data for later, equivalent requests.
 Layered System: constraints the behaviour of components such that each component cannot
see beyond the immediate layer with which they are interacting.
 User Interface: constraint requires that the method of communication between a client and a
server must be uniform.
 Code on Demand: Servers can provide executable code or scripts for clients to execute in their
context. This constraint is the only one that is optional.

Dr. D. Y. Patil Institute of Technology


The Request-Response model used by REST:
 RESTful web service is a collection of resources which are represented by
URIs.
 RESTful web API has a base URI(e.g: http://example.com/api/tasks/).
 The clients and requests to these URIs using the methods defined by the
HTTP protocol(e.g: GET, PUT, POST or DELETE).
 A RESTful web service can support various internet media types Following
table showing HTTP request method and action

Dr. D. Y. Patil Institute of Technology


WebSocket based Communication APIs (Exclusive PairBasedModel)
 WebSocket APIs allow bi-directional, full duplex communication between clients and servers. WebSocket APIs follow the exclusive
pair communication model. WebSocket APIs allow full duplex communication and do not require new connection to be setup for
each message to be sent.
 WebSocket communication begins with a connection setup request sent by the client to server. This request (is known as
WebSocket handshake) is sent over the HTTP and server interprets it as an upgrade request. If server supports this websocket
protocol, then it responds to the WebSocket handshake response. After connection setup, the client and server can send
data/message to each other in full-duplex mode. This API is used to reduce network traffic and latency as there is no overhead for
connection setup and termination request for each message. It suitable in IoT application that has low latency and high throughput
requirements.

Dr. D. Y. Patil Institute of Technology


IoT Levels & Deployment Template
 Developing an IoT Level Template system consists of the following components:
 Device: These may be sensors or actuators capable of identifying, remote sensing, or monitoring.
 Resources: These are software components on IoT devices for accessing and processing. storing software components or
controlling actuators connected to the device. Resources also include software components that enable network access.
 Controller Service: It is a service that runs on the device and interacts with web services. The controller service sends data
from the device to the web service and receives commands from the application via web services for controlling the device.
 Database: Stores data generated from the device. Database can be either local or in the cloud and stores the data generated by
the IoT device.
 Web Service: It provides a link between IoT devices, applications, databases, and analysis components. Web services serve as a
link between the IoT device, application, database and analysis components. Web service can be either implemented using
HTTP and REST principles (REST service) or using WebSocket protocol (WebSocket service).
 Analysis Component: It performs an analysis of the data generated by the lol device and generates results in a form which are
easy for the user to understand. .
 Application: It provides a system for the user to view the system status and view product data. It also allows users to control
and monitor various aspects of the IoT system. IoT applications provide an interface that the users can use to control and
monitor various aspects of the IoT system. Applications also allow users to view the system status and view the processed

Dr. D. Y. Patil Institute of Technology


Level of IOT
 Level 1  Level 2
 Level-1 IoT systems have a single node that performs  IoT Level2 has a single node that performs sensing
sensing and/or actuation, stores data, performs and/or actuating and local analysis as shown in fig.
analysis and host the application. Suitable for Data is stored in cloud and application is usually
modeling low cost and low complexity solutions cloud based. Level2 IoT systems are suitable for
where the data involved is not big and analysis solutions where data are involved is big, however, the
requirement are not computationally intensive. An primary analysis requirement is not computationally
e.g., of IoT Level1 is Home automation. intensive and can be done locally itself. An e,g., of
Level2 IoT system for Smart Irrigation.

Dr. D. Y. Patil Institute of Technology


 Level 4
Level of IOT  At this level, multiple nodes collect information and
store it in the cloud. Local and rent server nodes are
 Level 3
used to grant and receive information collected in the
 This System has a single node. Data is stored and cloud from various devices. Observer nodes can
analyzed in the cloud application is cloud based as process information and use it for applications but
shown in fig. Level3 IoT systems are suitable for not perform control functions, this level is the best
solutions where the data involved is big and analysis solution where data involvement is big, requirement
requirements are computationally intensive. analysis is comprehensive and multiple nodes are
required,

Dr. D. Y. Patil Institute of Technology


 Level 6
Level of IOT  At this level, the application is also cloud-based and
data is stored in the cloud-like of levels. Multiple
 Level 5
independent end nodes perform sensing and
 In this level Nodes present locally are of two types actuation and send d to the cloud. The analytics
end odes and coordinator nodes End nodes collect components analyze the data and store the results in
data and perform sensing or actuation or both. the cloud database. The results are visualized with a
Coordinator nodes collect data from end nodes and cloud-based application. The centralized controller is
send it to the cloud. Data is stored and analyzed in aware of the status of all the end nodes and sends
the cloud. This level is best for WSN, where the data control commands to the nodes.
involved is big and the requirement analysis is
comprehensive.

Dr. D. Y. Patil Institute of Technology


Question Bank
 Define IOT and explain the characteristics of IoT.
 Explain IoT component with suitable diagram [oct 2022]
 Make note on IoT Functional Blocks
 Make note on IoT communication APIs. [oct 2022]
 Explain IoT Communication model with suitable diagram
 Elaborate the functions of IoT Level3 with diagram
 Explain the functions of IoT Level5 with diagram
 Describe the functions IoT Level6 with block diagram.

Dr. D. Y. Patil Institute of Technology


Telemetry
 Telemetry automatically collects, transmits and measures data from remote sources, using
sensors and other devices to collect data. It uses communication systems to transmit the data
back to a central location. Subsequently, the data is analyzed to monitor and control the remote
system.
 Telemetry data helps improve customer experiences and monitor security, application health, quality
and performance. Although telemetry refers to wireless data transfer mechanisms such as radio,
ultrasonic, or infrared systems, it is not limited and includes data transferred over other media such as
optical links, telephones, computer networks, and other wired communications.
 Traditional examples of telemetry are:
 Monitoring data from space crafts, Animal tracking devices, Automobile sensors for fuel level, engine
heat, vehicle speed and more, Heart monitors (EKG), Convicted felon ankle bracelets, Wearables such
as Fitbit health monitoring devices
 Telemetry provides the ability to access data from remote locations. Very often, these locations are
difficult or expensive to get to and have limited access to power and physical networks.

Dr. D. Y. Patil Institute of Technology


IoT telemetry architecture
 IoT telemetry architecture includes the components shown below
 IoT Devices – IoT devices are independent network nodes that communicate across IP
networks or often directly with IoT gateway systems.

 M2M IoT – Protocols communicate with the local IoT gateway or alternately with central
data enter or cloud locations.

 IoT Gateway – the intelligent IoT gateway performs a set of functions including,

 Protocol translation between M2M IoT protocols and central datacenter and cloud
applications

 Consolidation of upstream IoT communications to WAN-optimized data


communications

 Near real-time analytics and event management. IoT devices communicate with the
gateway with low-latency network connections. Compute and other resource-
intensive analytics can be performed locally for time-critical events

 IoT gateways communicate using secure and encrypted protocols.


 Datacenter – IoT data ingested is often processed by:

 Business applications that monitor and act upon the telemetry data. IoT data from multiple locations are analyzed centrally with a
complete view of all deployed devices.
 Storing the incoming data stream in various big-data repositories for long-term storage and analysis

 IoT device management software systems that provide orchestrations, software/firmware updates, health monitoring and overall
management. New IoT devices can be deployed and on-boarded with centralized systems.
Dr. D. Y. Patil Institute of Technology
IoT Telemetry Protocols
 IoT devices communicate using several network protocols. IoT devices used for telemetry such as remote sensors
have the following requirements:
 Low Power – Many IoT devices are powered from an embedded battery. New battery technologies have life
expectancies of 10 to 20 years.
 Low-Code Footprint – IoT devices are required to be as small as possible. This requires lightweight protocols that do
not need heavy computing or wireless transmission power requirements.
 Low Bandwidth – Higher bandwidth transmissions require higher power and additional hardware footprints.
 Local Intelligent IoT Gateways – The closer this system is to the IoT device, the lower the power required to transmit
to this receiving system.

Dr. D. Y. Patil Institute of Technology


Cont..
 IoT telemetry communications between the devices and the receiving system are performed by several protocols. Each protocol
has benefits and flaws.
 MQTT – The Message Queuing Telemetry Transport (MQTT) protocol runs over TCP/IP and was designed for embedded hardware
devices with limited embedded components and low power requirements. This protocol uses a publish-subscribe approach, which
is inactive between transmissions and data retrievals. MQTT requires an intelligent IoT gateway.
 CoAP – Constrained Application Protocol (CoAP) was designed to run on devices constrained by low power and lossy networks.
The protocol runs on UDP and is easily translatable to HTTP. CoAP can be routed over IP networks and supports IP multicast for
M2M communications between other IoT devices.
 HTTP – This protocol is often combined with the Restful API protocol and is routable across the internet but is insecure.
 HTTPS – This protocol is secure and robust but has high power and processing requirements to encrypt data traffic and requires
remote management of certificates.
 Alternative protocols
 XMPP – IM-based protocol, simple addressing scheme, Advanced Message Queuing Protocol (AMQP) – Server to Server,
Streaming Text-Oriented Messaging Protocol (STOMP), Data Distribution Service (DDS) – Device to Device, OPC UA, Web
Application Messaging Protocol (WAMP)

Dr. D. Y. Patil Institute of Technology


Telematics..
 A telematics system operates by integrating a machine into an asset, including a tracking device or other real-time
monitoring tools. The device then gathers critical asset performance information. Once the information is collected,
the device sends it to a computer system, where it will be compiled, interpreted, and reviewed.
 Data is collected using various methods, including hard-wired or self-fit gadgets and smartphone apps. The system
considers multiple factors, such as natural conditions.
 For example: When we say that a vehicle is integrated with telematics, it essentially means that it is fitted with a
crash-resistant black box with a complex electronic control unit inside. This black-box, also referred to as the T-Box
in automotive engineering parlance, is a telematics control unit.

Dr. D. Y. Patil Institute of Technology


Dr. D. Y. Patil Institute of Technology
Dr. D. Y. Patil Institute of Technology
Benefits..
 Some of the key benefits offered by the implementation of telematics are:
 Navigation – Telematics provides turn-by-turn navigation assistance to guide drivers easily to their locations. When
drivers are able to access shortest routes to destinations, they are also able to save on fuel costs.
 Safety – Telematics devices collect safety-related information such as call for assistance during a crisis, emergency
requests, stolen vehicle tracking, etc. and provide timely help to the vehicle occupants. Telematics also collects driving
behavior data such as sharp braking, acceleration, etc. This information can be used to educate drivers so that they stay
safe on the roads.
 Vehicle Performance – Users receive important vehicle health reports through the telematics system. This information
can be very useful for fleet managers, as they can then schedule vehicle maintenance accordingly.
 Vehicle Visibility – Telematics empowers organizations so that they can track the location of their vehicles. Fleet
managers can use the vehicle location data to make timely route adjustments while responding to traffic congestion,
weather conditions, etc. This way, they can switch resources around and ensure that there is no delay in deliveries.
 Connectivity to Internet – The driver and passengers in the vehicle can utilize live weather forecasts, news bulletins and
even information from social networking apps.
 Reduced Administrative Costs – Administration and compliance is simplified as telematics devices can be integrated with
third-party apps that generate various types of reports.

Dr. D. Y. Patil Institute of Technology


Challenges of Telematics
 Power dependency: Vehicle GPS trackers must be powered to function. Nevertheless, both battery-powered and complex-
wired tools have drawbacks. One must charge battery-powered devices regularly to prevent being stuck in an urgent
situation with no way to summon help. Hard-wired car trackers power up from the battery pack and can drain it if the
wires are not correctly installed.
 Privacy concerns: People are understandably worried about their moves being tracked and recorded on a remote server.
Before placing a GPS tracker in a car used by anyone except yourself – whether it’s your wife, kid, or employee – make
sure to address any privacy issues they may have by clarifying why you want to configure a tracker and how you plan to
use the data.
 Jamming: Sadly, GPS signals can be clogged by devices that interrupt GPS satellite messages. The only way to avoid this is
to invest in a telematics system capable of detecting and reporting signal jamming.
 System installation can take some time: Mounting telematics may take roughly 15 minutes to a day. This is because the
process may require dismantling and rebuilding the dashboards. Therefore, you should allow specialists to carry out this
task on your behalf.
 Cost: Mounting a telematics system is costly, even if the consumer has the skill to do so, since one must purchase
hardware and software. Prices vary depending on the global navigation satellite system (GNSS) and GPS. Cellular tracking
is the least expensive, costing around $700. Nevertheless, the user must pay approximately $35 per month for online data.
In passive wireless monitoring, the hardware costs $700, and the directory and network costs $800. Moreover, the
average cost of satellite-based real-time tracking ranges between $5 and $100.

Dr. D. Y. Patil Institute of Technology


Top 10 Applications of Telematics
 Safety monitoring
 Communication in real-time
 Detect harsh acceleration or braking
 Vehicle maintenance
 A risk assessment by insurance companies
 Logging fuel consumption
 Monitoring weather conditions
 Assist with performance and training
 Monitoring trailers and quasi assets
 Beyond standard geofencing

Dr. D. Y. Patil Institute of Technology


Applications..

Dr. D. Y. Patil Institute of Technology


Cont..
s

Dr. D. Y. Patil Institute of Technology


Home Automation
s

Dr. D. Y. Patil Institute of Technology


Cont..
s

Dr. D. Y. Patil Institute of Technology


Cont..
s

Dr. D. Y. Patil Institute of Technology


Smart Cities
s

Dr. D. Y. Patil Institute of Technology


Cont..
s

iNELS SMART CITY | Smart street lighting


- YouTube

Dr. D. Y. Patil Institute of Technology


Cont..
s

Dr. D. Y. Patil Institute of Technology


Cont..
s

Dr. D. Y. Patil Institute of Technology


Environment…
s

Dr. D. Y. Patil Institute of Technology


Cont..
s

Dr. D. Y. Patil Institute of Technology


Cont..
s

Dr. D. Y. Patil Institute of Technology


Energy..
s

Dr. D. Y. Patil Institute of Technology


Cont..

Dr. D. Y. Patil Institute of Technology


Cont..
s

Dr. D. Y. Patil Institute of Technology


Retail..
s

Dr. D. Y. Patil Institute of Technology


Cont..
s

Dr. D. Y. Patil Institute of Technology


Logistic..
s

Dr. D. Y. Patil Institute of Technology


Cont..
s

Dr. D. Y. Patil Institute of Technology


Agriculture..
s

Dr. D. Y. Patil Institute of Technology


Cont..
s

Dr. D. Y. Patil Institute of Technology


Industry..
s

Dr. D. Y. Patil Institute of Technology


Cont..
s

Dr. D. Y. Patil Institute of Technology


Health and Lifestyle..
s

Dr. D. Y. Patil Institute of Technology


Cont..
s

Dr. D. Y. Patil Institute of Technology


Cellular IoT
 Cellular IoT allows a wide variety of machines and devices to communicate with each other, via a mobile
data connection provided by cellular networks. These machines and devices are classified as IoT devices,
which stands for Internet Of Things.
 Cellular IoT connects physical objects by piggybacking on the cellular networks.
 Piggybacking: acknowledge.

Dr. D. Y. Patil Institute of Technology


Cont..
 Cellular IoT is one of the most popular types of Internet of Things connectivity, primarily because
it:
 Has excellent coverage
 Simplifies global deployment
 Works right out of the box
 Establishes secure connections
 Performs well in mobile, indoor, and outdoor applications
 Supports low and high bandwidth applications
 While cellular networks were designed for phones, they’re highly versatile, and cellular technology has
evolved to accommodate a wider range of devices and use cases over time. Like smartphones and other
mobile devices, cellular IoT devices can use 2G, 3G, 4G, and 5G networks. But they don’t use data the
same way as phones, and with billions of low-power devices relying on cellular technology, specialized
cellular networks have also been developed specifically for IoT: LTE-M and NB-IoT.

Dr. D. Y. Patil Institute of Technology


What is LTE-M?
 Considering the Internet of Things is literally part of the name, NB-IoT was designed for the IoT.
NB-IoT stands for “Narrowband-IoT” and is great for areas without robust LTE coverage or when
bandwidth requirements are relatively minimal. Again, per its name, NB-IoT uses just a narrow
band of the full bandwidth available.
 Available globally where GSM is the flag-bearer (such as much of Europe, Africa, and Asia), NB-IoT
devices consume very little power and provide less data throughout than LTE-M (approximately
60KB down and 30KB up). Compared to LTE-M’s bandwidth of 1.4 MHz, NB-IoT operates on 200
KHz, providing longer range and better indoor penetration.
 Certain use cases like smart cities (e.g. parking meters, utility monitoring), parking garages,
indoor deployments, and agricultural settings are great examples of suitable NB-IoT
implementations.

Dr. D. Y. Patil Institute of Technology


What is NB-IoT?
 You can probably hazard a guess that LTE-M is closely related to the popular LTE (Long-Term
Evolution) wireless standard. The countries that support LTE encompass a vast list primarily
comprised of the Americas and parts of Europe.
 LTE-M effectively stands for “Long-Term Evolution for Machines” and allows for IoT devices to
piggyback on existing LTE networks. It was designed in a power-conscious manner for
applications that require low-to-medium data throughput. With a bandwidth of 1.4 MHz
(compared to 20 MHz for LTE), LTE-M provides great range but less throughput than LTE
(approximately 375KB down and 300KB up). LTE-M also offers cell tower handoff features,
making it a great mobility solution (even across multiple regions).
 Asset tracking, wearables, home security, and home/business monitoring are all great examples
of use cases for LTE-M in the IoT.

Dr. D. Y. Patil Institute of Technology


Cellular IoT Benefits:
 The advantages of cellular connectivity with IoT are extensive:
 Coverage: Cellular networks are ubiquitous, mature, and reliable.
 Global Reach: There is no other network technology with the reach of cellular.
 Security: SIM-based authentication and utilization of VPN tunnels makes cellular the most
secure option.
 Installation: Works out-of-the-box without requiring local installation or technical expertise.
 Low/No power: Cellular modules can consume ~8mA of power and networks are still available
in the case of a power outage.
 When it comes to security, coverage, and usability, it’s hard to compete with cellular.

Dr. D. Y. Patil Institute of Technology


Next generation kiosks, self-service technology
 A kiosk is a digital machine that businesses can utilize to give customers the ability to make
purchases independently. This provides an excellent opportunity for companies looking forward
to improving their customer and business relations, not to mention allowing them to generate
more income and valuable information about their market.

 Types of Kiosks
 There are many types of kiosks, and those can be best used for several different applications. Some might
seem futuristic or high-tech, but they are not uncommon in many places throughout the world, and there
are lots of varieties. These kiosks can help customers find their way around an establishment, place
orders, make payments, or gain access to Internet connectivity. Regardless of how these kiosks were
developed, they play a significant role when it comes to interacting directly with customers since they
facilitate quick and easy ways to interact with employees (or machines).
 In years past, business owners relied on big-box stores for all their electronic needs. Today, however, we
have our pick of packaging and distribution methods for the kiosks we choose. That is set to change even
further as technology has the potential to fundamentally increase efficiency in various retail settings.
There are essentially two kinds of options: non-interactive and interactive kiosks.
Dr. D. Y. Patil Institute of Technology
Interactive Kiosks
 Interactive kiosks are those that customers can use in different ways to access a specific resource
or avail of something, usually at shopping centres, malls, parking areas, etc. Because these kiosks
function on user interaction and demand, these devices are available to a wide variety of
businesses and businesses-in-general, including restaurants, service providers, and even
destinations such as malls and airports.

 Types of Interactive Kiosks


 Self-Service kiosks
 Internet Kiosks
 Parking Kiosks

Dr. D. Y. Patil Institute of Technology



Benefits of Kiosks
Now that we have reviewed the various types of kiosks, so it’s time to discuss why they are worth purchasing or renting.
They are an investment, aren’t they? After all, whichever option you choose, you will be investing in the maintenance or
development of your brand. That being said, let’s understand why they are worth buying!
 Save Money: Interactive kiosks are suitable for customers. They don’t ask for a salary and can provide customers with
any information they might need. And since you’re not paying to hire people, which means more money to buy even
more products! Kiosks also reduce overhead costs because you don’t have to pay rent or hire people to run the business.
Placing a vending machine outside is an excellent way of getting noticed and attracting sales. Interactive kiosks can
eliminate the need for staffing; you won’t have to worry about red tape, sick leave, maternity leave, or firing someone if
they don’t work out; after all, these machines are made for that exact purpose!
 Increase Reach: While most people think of kiosks as a way to promote their products and services, they’re not just for
in-store shopping but are increasingly being installed outside retail establishments, such as hotels. This is for two
reasons: one, many companies want to extend the reach of their advertising efforts; and two, these can be operated by
trained professionals who know how to perform various tasks efficiently. So, having a kiosk can increase customer reach
and significantly benefit your business.
 Improve Customer Experience: A great thing about having a kiosk in a retail store or parking lot is that it considerably
improves the customer experience. Most people have a sense of freedom and superiority when they are not interrupted
while making a purchase, and that’s what a kiosk provides them with. Remember, improved customer experience means
more customer revisits, so every business owner should consider installing a kiosk to gain more profits.

Dr. D. Y. Patil Institute of Technology


Last Exam 2022 SPPU Question Asked

Dr. D. Y. Patil Institute of Technology

You might also like