Foundamentals of IOT - PH - Nasscom - FINAL - BOOK - Re1d PDF
Foundamentals of IOT - PH - Nasscom - FINAL - BOOK - Re1d PDF
Founda on Skills in
Internet of Things ( IoT )
Powered by
Published by:
Printed at:
Copyright© 2017
IT - ITES Sector Skill Council NASSCOM
Plot No -7 to 10, Sector 126, Noida, UP - 201303
Phone : 0120 4990172
e-mail : [email protected]
Disclaimer
The information contained herein has been obtained from sources reliable to IT – ITES Sector Skill Council NASSCOM.
IT – ITES Sector Skill Council NASSCOM disclaims all warranties to the accuracy, completeness or adequacy of such
information. IT – ITES Sector Skill Council NASSCOM shall have no liability for errors, omissions, or inadequacies, in
the information contained herein, or for interpretations thereof. Every effort has been made to trace the owners of
the copyright material included in the book. The publishers would be grateful for any omissions brought to their
notice for acknowledgements in future editions of the book. No entity in IT – ITES Sector Skill Council NASSCOM shall
be responsible for any loss whatsoever, sustained by any person who relies on this material. The material in this
publication is copyrighted. No parts of this publication may be reproduced, stored or distributed in any form or by
any means either on paper or electronic media, unless authorized by the IT – ITES Sector Skill Council NASSCOM.
Foreword
We are living in times of accelerating change in almost every area, be it political, financial, economic,
climatic or technological. The field of Information Technology is witnessing the greatest rate of change. In
fact, the advancement of technology and particularly information technology has today brought us to
the edge of a revolution that will completely change the way we live and work - the Internet of Things
(IoT) revolution. IoT, which is enabling increased connectivity of everyone, everything, everywhere and
every time, is causing a fundamental shift in how we do things.
Globally, the installed base of IoT units is expected to reach 20.8 billion by 2020 (USD 3 trillion in revenue
terms). Although India began its IoT journey much later than developed economies, it is set to leap-frog
the adoption of IoT - IoT units in India are expected to grow ~32X to 1.9 billion by 2020, from its current
base of 60 million. This translates to a market size of USD 9 billion by 2020, ~7X growth over 2016.
IoT adoption in India is expected to grow across industries. By 2020, industries such as Utilities,
Manufacturing, Automotive and Transportation & Logistics are expected to see highest adoption levels.
GoI's planned investment worth USD 1 billion for 100 Smart Cities over the next 5 years is expected to be
a key enabler; additionally, industries such as Healthcare, Retail and Agriculture are also expected to
make significant progress in IoT adoption.
Cross-functional skill sets and specialized training are needed to enable successful deployment of IoT by
the workforce. However, the current workforce lacks exposure across all aspects of IoT technology
leading to knowledge in silos and lack of application ability. IoT specific training programs should focus
on training in crucial areas such as technology/ solution architecture, cyber security, UI/ UX design, etc.
and this courseware development is one such activity towards it.
The primary goal is to provide students with an understanding of IoT which will be helpful in their
engineering education and subsequently in their careers. The courseware addresses introduction to IoT
and its architecture, industry applications and use cases in various sectors like Aerospace, Agriculture,
Automotive, Construction, Energy, Healthcare, Logistics, Manufacturing, Retail and Transportation;
course end project work is a mandatory inclusion offering practical exposure.
This book is drafted under the guidance of subject matter specialists from various fields encapsulating
but basic important fundamentals regarding this industry that can create employment prospects.
I wish relevant stakeholders and partners all the very best in their endeavor to enable IoT growth in India.
R Chandrasekhar
President
NASSCOM
v
Acknowledgements
Industry's involvement in developing the 'Internet of Things -IoT' courseware issignificant to the
ecosystem basis the efforts of IT-ITeS Sector Skills Council NASSCOM (SSC NASSCOM) .Developing and
subsequently enabling the implementation of the IoT program is relevant toindustry's projected needs
present and future. This initiative is of importance to stakeholders concerned—industry, academia and
students.
SSC NASSCOM thanks NASSCOM member companies, participant to the IoT 'Special InterestGroup' (SIG)
established to fulfill the goal of enhancing thecompetency and employability of candidates interested
in this field. SIG's strategic direction towards the design and development of content for thiscourseware
is significant.
The contribution of pioneer companies constituting likeAxiscades, BOSCH, Buoyanci, Caterpillar,
CISCO,Eximius Design, Frugal Labs, Intel, LnT TS, Preva Systems, Quest, TCS, Tevetron Technologies, Texas
Instruments, UTAS and NASSCOM Center of Excellence – IoT has enhanced the requisite content to the
appropriate levels.
SSC NASSCOM places on record its appreciationof Mr. ManjunathaHebbar of Byoanci and Mr. Samir
Yajnik of Tata Technologies for their leadership in facilitating the development of this courseware; the
contributions of Dr. Arup Ray of AXISCADES.Mr. Prashant Rao of AXISCADES, Mr. Shanmuga Bharathi and
Mr.Balasubarmanian of AXISCADES,Mr. Uday Prabhu of BOSCH, Mr. Merlin C. Yesudian of Caterpillar,Mr.
Sridhar Venkateswaran of Caterpillar Mr.Jaihari Prasad P G of Caterpillar,Mr.Ritesh S Gupta of Caterpillar
and Mr.ParameswaranSankaranarayanan of Caterpillar,Mr. Murugan Vasudevan of CISCO, Mr. Narendra
Nade of Eximius Design, Mr. Anirban Chowdhury of Frugal Labs and Ms.Sreowshi Sinha of Frugal Labs,
Mr. Udian Patel of Intel, Mr. Sachin Kelkar of Intel and Mr. Sumeet Verma of Intel, Mr. Sumonta
Manumder of L&T TS, Mr. Ashok Kumar of L&T TS and Mr. ShyamKrishnan of L&T TS Mr.Ravi Nuguri of
L&T TS,Mr.Jatin Panchal of L&T TS and Ms.Aditi Shenoy of L&T TS, Mr. Sharan K of Preva Systems and Mr.
Rajeev Tiwari of Tevatron Technologies,Mr.Anurag Gupta of Tevatron Technologies and Mr.Saket
Saurabh of Tevatron Technologies,Mr. Senkathir Selvan Suriaprakasam of TCS,Mr.RamkishoreAyyagari of
TCS, Mr. Praveen of Texas Instruments, Mr. Amar Vof Quest and Dr. TC Tamesh of Quest, Mr. Sharat Kumar
Variyar of UTAS and Mr. Venkat Sheshadri of UTAS.
Last but not the least SSC NASSCOM would also like place on record its appreciation of Mr.Sanjeev
Malhotra of NASSCOM CoE-IoT,Mr.Sudhanshu Mittal of NASSCOM CoE-IoT, Prof.Bharadwaj Amrutur of
NASSCOM CoE-IoT,Prof. Anurag kumar of NASSCOM CoE-IoT,Prof. U. B. Desai of NASSCOM CoE-IoT and
Prof. Balakrishnan of NASSCOM CoE-IoT for their active participation and contribution in the design and
development of this book.
SSC NASSCOM would also like to thank the NASSCOM secretariat, Mr.KS Viswanathan,Mr.
Niranjan,Mr.Yudhisther Yadav and Mr. Udaya Shankar and PROGILENCE Capability Development Pvt.Ltd.
for facilitating the development of this book.
Dr. Sandhya Chintala
Executive Director – Sector Skill Council NASSCOM
Vice President - NASSCOM
vi
Symbols Used
vii
viii
Participant Handbook
Table of Contents
S.No Modules and Unit Page No
2. Catalogue of Applications 87
Unit 2.1 – Catalogue of Applications 89
ix
Foundation Skills in IoT
x
1. Introduc on to Internet
of Things (IoT)
Unit 1.1 - What is IoT and its Evolu on over Time
Unit 1.2 - Working of an IoT System
Unit 1.3 - Logical Design of IoT
Unit 1.4 - IoT Setup with Device Connec ons
Participant Handbook
2
Foundation Skills in IoT
We are living at a me of accelera ng change in almost every area, be it poli cal, financial, economic,
clima c or technological. The field of Informa on Technology is witnessing the greatest rate of change. In
fact, the advancement in technology and par cularly informa on technology has today brought us to
the edge of a revolu on that has the poten al to completely change the way we all live and work. This
revolu on is called the Internet of Things (IoT). IoT, which is enabling increased connec vity of
everyone, everything, everywhere and every me, is causing a fundamental shi in how we do things.
“So let's understand what IoT does”
The IoT allows objects to be sensed or controlled remotely if they are integrated across exis ng network
infrastructure. This can result in crea ng opportuni es for integra on of the physical world into
computer-based systems and resul ng in improved efficiency, accuracy and economic benefit in
addi on to a reduced human interven on in managing them.
3
Participant Handbook
ET+NT+IT = IoT
The IoT is not just a technology; it is, in fact, an ecosystem of things such as:
Ÿ Devices
Ÿ Internet
Ÿ Data
Ÿ Cloud
Ÿ Applica ons
Ÿ Pla orms & Products
It offers opportuni es for business owners to bring a revolu on in their work by increasing produc vity,
reducing inefficiencies and inaccuracies, reducing costs, providing value added services, etc. It also offers
opportuni es for a network of other players such as:
Ÿ Hardware operators
Ÿ Network operators
Ÿ System integrators
Ÿ Applica on vendors, etc.
4
Foundation Skills in IoT
Let us imagine a large grocery store owner, who requires a reminder whenever the stock of a
category of grocery goes below a predefined level. He needs to decide on the order levels, lead-
me and the stock to be maintained. Fast moving items, slow moving items, stagnant items have a
direct bearing on this. Ordinarily, the process will be laborious and me- consuming and prone to
human errors and delays. Let us look how IoT will work for him.
Let us say that containers of the grocery type are fi ed with a sensor, say a load cell, to sense the
weight of the container with the contents. Imagine this data is transported through the Internet
from a hub which is integra ng the sensor data and genera ng a report on an cipated shortages
and giving pointers based on the history to highlight fast moving, slow moving and stagnant items.
This can help him in the investment strategy, ordering periodicity, op mising the stock, avoiding
stocks going stale or crossing the date of expiry and so on. What made this possible is IoT.
5
Participant Handbook
The Internet of Things (IoT) is the networking of physical devices ("connected devices" or "smart
devices") embedded with electronics, so wares, sensors, actuators and network connec vity that
enable these objects to collect and exchange data.
The IoT allows objects to be sensed or controlled remotely if they are integrated across exis ng network
infrastructure. This can result in crea ng opportuni es for integra on of the physical world into
computer-based systems and resul ng in improved efficiency, accuracy and economic benefit in
addi on to a reduced human interven on in managing them.
The Interna onal Telecommunica on Unit (ITU) defines Internet of Things (IoT) as “A global
infrastructure for the informa on society, enabling advanced services by interconnec ng (physical and
virtual) things based on exis ng and evolving interoperable informa on and communica on
technologies”. IoT can also be defined as a concept which extends connec vity and compu ng
capabili es to objects and items normally considered computers, allowing these devices to create,
communicate, aggregate, analyze and act without human interven on. There is however, no single
defini on of IoT.
“The Internet of Things (IoT) is the networking of physical devices (also referred to as "connected
devices" and "smart devices") embedded with electronics, so ware, sensors, actuators and network
connec vity that enable these objects to collect and exchange data”
- as defined by Wikipedia
"A global infrastructure for the informa on society, enabling advanced services by interconnec ng
(physical and virtual) things based on exis ng and evolving interoperable informa on and
communica on technologies."
-as defined by 'The Interna onal Telecommunica on Unit'
6
Foundation Skills in IoT
NASSCOM and Deloi e have published a report tled “IoT – Revolu on in the making”. The report states
that “The concept of Internet of Things (IoT) has gained trac on over the last decade, owing to collec ve
efforts by industry players, associa ons as well as academia.” It is also men oned that various
consor ums of corporate as well as industry associa ons such as IPSO alliance, IIC, OIC etc. have been
working towards increasing worldwide IoT awareness and adop on as well as increasing number of
devices connected to the internet. They have played a significant role in driving IoT adop on. Academia,
in collabora on with other industry stakeholders, has further supported the development and
deployment of IoT solu ons.
IoT, today, is poised for exponen al growth globally, with the number of connected devices expected to
grow over 5.5x to 20.8 billion and revenue expected to grow over 3x to USD 3 trillion by 2020”.
An interes ng ques on to ask would be - "How did it all start?"
While IoT is rela vely new, the concept of combining computers, networks to monitor processes, was
known for decades. However, it all started with the Internet.
The telegraph, telephone, radio, and computer had already set the stage for an unprecedented
integra on of capabili es. However, the Internet has been the instrumental facet in revolu onizing the
computer and communica ons world like nothing before.
7
Participant Handbook
The next big step, in the chain of events leading to the Internet of Things, was the advent of wireless
technologies. This gave rise to wireless Internet, the Internet on mobile phones and smartphones. Then
started the revolu on of the Internet of Things.
The term IoT was coined by Kevin Ashton in 1999. Gradually, the concept gained trac on with academia
as well as industry promo ng its growth.
standardisation:
standardisation:
standardisation:
As per Cisco's Internet Business Solu ons Group (IBSG), me period between 2008-09 marked a key
milestone in IoT growth, when the number of devices connected to the Internet reached 12.5 billion and
the world's popula on became 6.8 billion, thus making number of devices per person more than 1 (i.e.
1.84) for the first me ever.
The rise in adop on of IoT can be a ributed to a combina on of technology and market trends such as:
1. Technology advancement:
The declining cost of sensors, explosive rise in connec vity including WiFi and cellular, the rise in
processing power, miniaturisa on of components and development of cloud have been
accelera ng the demand for IoT by genera ng and using data in real- me.
8
Foundation Skills in IoT
Ÿ Cheap Sensors – Sensor prices have dropped to an average ₹100/- from ₹1000/- in the past 10
years.
Ÿ Cheap Bandwidth – The cost of bandwidth has also declined precipitously, by a factor of nearly
40X over the past 10 years.
Ÿ Cheap Processing – Processing costs have declined by nearly 60X over the past 10 years.
Ÿ IPv6 – 128 bit address. This enables more devices to connect to the Internet.
Ÿ Big Data – As the IoT will, by defini on, generate voluminous amounts of unstructured data, the
availability of big data analy cs is a key enabler.
Ÿ Smartphones – Smartphones are now becoming the personal gateway to the IoT, serving as a
remote control or hub for the connected home, connected car or the health and fitness devices
consumers are increasingly star ng to wear.
Ÿ Ubiquitous Wireless Coverage – With Wi-Fi coverage being ubiquitous now, wireless connec vity
is available for free or at a very low cost, given Wi-Fi u lizes unlicensed spectrum and thus, does
not require monthly access fees to a carrier.
2. Investment & Entrepreneurship:
Venture capital investments in IoT have risen almost ten-fold from 2010 to 2015. Even major
technology players have been accelera ng their investments in this space. For example, IBM
recently announced an investment in IoT of USD 3 billion, to be made over the years 2015 to
9
Participant Handbook
For example, IBM recently announced an investment in IoT of USD 3 billion, to be made over the
years 2015 to investment in IoT of USD 3 billion, to be made over the years 2015 to 2017. Cisco is
inves ng USD 1 billion in crea ng a pla orm for IoT, etc. Along with increase in investments, the
pace of mergers and acquisi ons in this space is also accelera ng.
3. Need for connected consumer and business processes:
With rising device penetra on, increasing mobile usage and mobile integra on, it is evident that
the connected consumer is here to stay – thereby shaping consumer experience road map of
leading companies. Companies are converging physical and digital worlds for an integrated and
seamless consumer experience, by using sensory data for automa on of processes, predic ve
analy cs, etc.
4. IoT Characteris cs that are making it popular:
It is very interes ng to understand the reason why IoT is gaining such popularity.
IoT has the following characteris cs:
Scalable solu on
Interoperability between
different communica on
technologies
10
Foundation Skills in IoT
We have seen how IoT has evolved over me. Let us have a look at its current avatar and also at the future
prospects of IoT.
As per the NASSCOM Deloi e report:
The concept of Internet of Things (IoT) has gained trac on over the last decade, owing to the collec ve
efforts by industry players, associa ons as well as academia.
Ÿ Various consor ums of corporates as well as industry associa ons such as IPSO alliance, IIC, OIC
etc. have been working towards increasing the worldwide IoT awareness and adop on.
Ÿ Increasing the number of devices connected to the internet has played a significant role in driving
IoT adop on.
Ÿ Academia, in collabora on with other industry stakeholders, has further supported the
development and deployment of IoT solu ons.
As of today, Internet technology is being used in almost all sectors such as:
Ÿ Manufacturing
Ÿ Financial Services
Ÿ Communica on
Ÿ Educa on
Ÿ Business
Ÿ Transport
Ÿ Medical / Health
The communica on capabili es have enhanced because of it and the work flow has been simplified.
These are also the sectors that are adop ng IoT. Smart grids, virtual power plants, smart homes,
intelligent transporta on and smart ci es with remote traffic management and many more are the
applica ons of IoT in these sectors.
Some more current popular uses of IoT include:
Ÿ Industrial organiza ons are using IoT devices such as thermal/pressure/chemical sensors and
picking systems to reduce risk and down me.
Ÿ Home automa on through the use of smart home devices, that perform control and automa on
of ligh ng, hea ng, ven la on, air condi oning (HVAC) systems, and appliances such as
washer/dryers, robo c vacuums, air purifiers, ovens or refrigerators/freezers that use Wi-Fi for
remote monitoring.
Ÿ Office Automa on or smart workplaces where IoT devices and sensors are used from air
condi oning and ligh ng systems to personal mobile devices. Important assets can be tracked for
their loca on and can communicate informa on to other devices around them.
Ÿ Healthcare companies are using sensors to monitor and maintain medical devices as well as for
remotely tracking assets by loca on.
11
Participant Handbook
"Things" in the IoT sense, can refer to a wide variety of devices such as heart monitoring implants,
biochip transponders on farm animals, automobiles with built-in sensors, Traffic signals and informa on
boards for speed limit diversion DNA analysis devices for environmental/food/pathogen monitoring or
field opera on devices that assist fire fighters in search and rescue opera ons….the list can be endless!
It is es mated that the IoT applica on will be the next revolu on in the IT sector by 2020. The number of
applica ons can increase in manifold because of the benefits it provides. Automa on in nearly all the
fields may be the end result.
IoT is also expected to generate large amounts of data from diverse loca ons, with the consequent
necessity for quick aggrega on of the data, increased need to index, store, and process them for
prompts, alerts, forecasts, futuris c trends, etc. more effec vely.
Radio-frequency iden fica on (RFID) may be seen as a prerequisite for the Internet of Things for the
crea on of local hubs. If all the objects and people in daily life were equipped with iden fiers, it would
help computers in managing and monitoring. Besides using RFID, the tagging of things may be achieved
through such technologies as near field communica on, barcodes, QR codes and digital watermarking.
One of the first consequences of implemen ng the Internet of Things by equipping all objects in the
world with minuscule iden fying devices or machine-readable iden fiers would be to transform them as
accessible and interactable devices for the IoT applica on. A person's ability to interact with objects
could be altered remotely based on immediate or present needs, in accordance with exis ng end-user
agreements. As such, it is clear that the IoT will consist of a very large number of devices being connected
to the Internet.
However, the applica on of the IoT is not only restricted to these areas. Other specialized usage cases of
the IoT may also exist. Based on an overview of some of the most prominent applica on areas and based
on the applica on domain, IoT products can be classified broadly into six different categories: smart
devices, smart wearables, smart home, smart city, smart environment, and smart enterprise. The IoT
products and solu ons in each of these markets will have different characteris cs.
Future Prospects of IoT:
The connec vity of devices is growing exponen ally in every field, may it be logis cs, manufacturing,
healthcare, home automa on, automo ve, construc on, retail, energy, agriculture, aerospace, mining
and environment. IoT enhances the system performance.
Currently, the IoT Industry is evaluated at USD 28.4 Billion and expected to touch 50.1 billion mark by
2020.
As per the Nasscom- Deloi e report:
IoT market growth will be driven primarily by connected devices in Manufacturing and Automo ve
industries, with Transporta on & Logis cs forming the largest share of industry-specific IoT revenue.
12
Foundation Skills in IoT
Ÿ Among industries, Manufacturing and Automo ve are expected to drive the highest volumes in
IoT adop on. The installed base of connected devices in both of these industries is expected to be
approximately 0.7 billion each by 2020.
Ÿ While Manufacturing devices are expected to grow over 2X from 0.32 billion in 2014 to 0.68
billion in 2020, the installed base for Automo ve industry will grow 37X from 0.02 billion devices
in 2014 to 0.74 billion in 2020.
Ÿ In terms of revenue, Automo ve industry is expected to see maximum growth to reach USD 303
billion by 2020.
Ÿ On the other hand, Transporta on & Logis cs is expected to drive industry-specific IoT revenue
and is likely to reach USD 491 billion by 2020.
IoT usage is gaining trac on across business func ons such as IT services, Business Process Management
(BPM) and Engineering, Research & Development (ER&D).
Ÿ IoT applica ons can be deployed across areas of IT services such as IT consul ng, custom
so ware, IT Outsourcing, BPM and Support Services. By integra ng IoT based services, IT service
providers are expected to increase their por olio by 10 per cent.
Ÿ Integra on of IoT with BPM will lead to effec ve real- me communica on between devices and
processes, thus enabling accelerated solu on deployment, streamlined opera ons and
con nuous process improvements.
Ÿ IoT in ER&D will empower product engineers and researchers by delivering real- me feedback,
enabling quicker design changes to reduce me-to-market and deliver customized products and
services.
13
Participant Handbook
Further reference:
14
Foundation Skills in IoT
15
Participant Handbook
1. Devices consist of Sensors & Sensor Technology. They collect a wide variety of data ranging from
temperature, pressure, loca on, weather/environment condi ons, grid parameters, health
essen als of a pa ent, etc.
2. Gateways as the name suggests, are the gateways to the internet for all the devices or things that
need to interact with it. They help to connect the sensor nodes in the internal network with the
external Internet, by collec ng data from the sensor nodes and further transmi ng it to the internet
infrastructure.
3. The data transmi ed through the gateway is then stored and processed securely within the Cloud
infrastructure using the Big Data analy cs engine. The data thus processed performs intelligent
ac ons. This is what makes the 'Smart Devices'!
4. The Applica ons help the end users to control and monitor their devices from remote loca ons. They
not only send important informa on on the hand-held devices or PCs but also help to send
commands back to the Smart Devices.
Apart from the above, IP addresses play an important role in the en re IoT ecosystem. The Internet
recognizes IP addresses only. IPv6 ensures that we will never run out of IP addresses by providing
3.4*1038 IP addresses.
The IoT Ecosystem
To understand the concept of IoT ecosystem further, let's look at the examples in a domes c scenario, as
illustrated below:
Analy cs
Data Storage
A
Remote
is
Command/RFI
ys
al
Analysis
An
ta
Da
IoT Devices B
ta
Da
Gateway
Internet Network
16
Foundation Skills in IoT
The main objec ve in this example is to control the loads (of the AC, refrigerator, washing machine, etc.)
through the Internet network remotely on the basic principle of the Internet of Things (IoT).
· A real- me webpage will be essen al with a user configurable front end to control and monitor
the load (See A in the figure 1.9).
· The data sent from a password protected webpage returns commands through allo ed IP fed to
it.
· A Wi-Fi Module is configured with any nearby wireless modem to access internet. The received
Internet commands are fed to the Wi-Fi module.
· The program within the Wi-Fi Module executes the commands received based on which the
device gets ac vated through Bluetooth or Zigbee module interfaced to Wi-Fi Module. A Typical
interface can be shown as below.
Ÿ The devices (See B in the Figure) should consist of power management modules and status data
report module interfaced to RF modules used for communica on. This way the status of the
device will also be communicated and displayed on the web page.
The devices to be monitored/controlled communicate through RF modules in their signal
processing for WiFi / ZigBee/ Bluetooth/ radio transceiver (RFID) etc, or through wired LAN.
Ÿ The data for control / monitor is harnessed through internet network to a remote control /
monitoring centre. A PC system, laptop, tablet or smart phone is used for remote control centres
and monitoring. (See A in the figure).
The principal technologies that drive IoT system are:
Ÿ Wireless Sensor Networks
Ÿ Embedded Systems
Ÿ Communica on Protocols
Ÿ Cloud Compu ng
Ÿ Big Data Analysis
17
Participant Handbook
Let's look at each of them individually in the next few sec ons.
Further reference:
Following videos in the URL can be referred for how IoT works?
h ps://www.youtube.com/watch?v=QSIPNhOiMoE – IoT How it works
h ps://www.youtube.com/watch?v=o7VXyolenvU – IoT explained easily
A Wireless Sensor Network (WSN) is a network formed by a large number of sensor nodes where each
node is equipped with a sensor to detect physical phenomenon such as light, heat, pressure, etc. With
the rapid technological development of sensors, WSNs will become the key technology for IoT.
A sensor has the ability to capture anything from loca on to the device orienta on. Collec vely, these
sensors produce a huge amount of data, both in unstructured form (such as picture or videos) as well as
structured (such as GPS or accelera on data). These “devices” are perpetually connected to the Internet
over WiFi, 3G or 4G.
The simple block diagram of connec vity is illustrated below. The devices can be connected through
WiFi, modem, cloud etc.
18
Foundation Skills in IoT
Temperature
Humidity
WiFi Modem
Light Intensity
Switch
UI Cloud
UI – User Interface
Embedded hardware devices, micro controllers etc, are the ones that process the data. The data from the
sensors are not directly usable and a process for using them is implemented by the embedded system. All
the connected devices are intelligent devices using a microcontroller or a processor.
Processors are the brain of the IoT system. Their main func on is to process the data from the sensors
according to an algorithm to extract the valuable informa on like status, parameter values, alerts etc.,
and control actuators in some cases in the system. Processors work on a real- me basis. Changes in their
opera onal limits can be set by applica ons depending on customer requirements. These are also
responsible for securing the data i.e. performing encryp on and decryp on of the data.
19
Participant Handbook
The IoT specific protocols cover the wireless protocols like ZigBee, RFID, Bluetooth and BAC net to the
next genera on protocol standards such as 802.15.4e, 6LoWPAN, RPL, CoAP etc.
20
Foundation Skills in IoT
Applica on Layer
HTTP XMPP Websockets
Transport Layer
TCP UDP
Network Layer
IPv4 Ipv6 6LoWPAN
Link Layer
802.3 -Ethernet 802.16 -WiMax 2G/3G/LTE-
Cellular
802.11 - WiFi 802.15.4 -LR-WPAN
21
Participant Handbook
IoT Protocols:
IoT connects various devices through internet and devices talk to each other through a communica on
channel. Defined communica on channel is called as 'Communica on Protocol'.
Communica on protocols are broadly categorized as:
Ÿ Link layer
Ÿ Network layer
Ÿ Transport layer and
Ÿ Applica on layer
1. Link Layer
Link Layer determines how the data is physically sent over the network's physical layer.
Ex: copper wire, OFC, radio waves etc.
Some examples are provided below:
802.3 - Ethernet
Ÿ Coaxial cables, twisted pair wire or op cal fibre as a medium
Ÿ 10Mbps to 40Gbps+ data rate
802.11 – Wi-Fi
Ÿ Wireless LAN; 802.11 b/g/n
Ÿ 2.4GHz / 5GHz band
Ÿ 1 Mbps to up to 6.75 Gbps data rate
22
Foundation Skills in IoT
802.16 – WiMax
Ÿ Collec on of wireless broadband standards
Ÿ 1.5Mbps to 1Gbps data rate
802.15.4 – LR-WPAN
Ÿ Low-rate wireless personal area networks
ex: LoRa
Ÿ 40bps to 250Kbps data rate
Ÿ Provides low-cost, low-speed communica on for low-power devices
802.15.4 - LR-WPAN
PAN Coordinator
FFD
RFD
Fig.1.19 – LR-WPAN
23
Participant Handbook
2. Network Layer
The Network layer is responsible for sending IP datagram from a source network to the des na on
network. The layer performs host addressing and packet rou ng.
Some examples are provided below:
Ipv4
32
Ÿ 32 bit address scheme. Total (2) addresses are available
Network Layer
Ipv4
An Ipv4 address (do ed-decimal nota on)
172 . 16 . 254 . 1
32 – bit addressing
10101100.00010000.11111110.00000001
Addresses got exhausted in 2011
one byte = Eight bytes
Thirtytwo bits ( 4x8), or 4 bytes
Guaranteed Delivery and data integrity
handled by upper layer protocols e.g. TCP
Fig.1.21 – IPv4
24
Foundation Skills in IoT
IPv6
Ÿ 128 bit address scheme. Total (2) 128 addresses are available
Ipv6
128 bits
xxxx xxxx xxxx xxxx xxxx xxxx xxxx xxxx 2^128 addresses
Fig.1.22 – IPv6
6LoWPAN
Ÿ IPv6 over Low power Wireless Personal Area Network
Ÿ Operates in 2.4GHz range with data transfer rate of 250Kbps
6LoWPAN
Low power Devices With limited Processing
Capabili es
Transfer rate – 250 kb/s
Frequency – 2.4 Ghz
Works With 802.15.4.4 link layer protocols
Fig.1.23 – 6LoWPAN
25
Participant Handbook
3. Transport Layer
Transport layer protocols provide end-to-end message transfer capability independent of the underlying
network.
TCP
Ÿ Transmission Control Protocol
Ÿ Connec on oriented and state full protocol
Ÿ Ensures reliable transmission, provides error detec on, flow control and conges on control
Transport Layer
TCP
FIN/ACK ESTABLISHED
ESTABLISHED
ACK Ensures reliable transmission of packets in-order
ESTABLISHED
CLOSED
UDP
Ÿ User Datagram Protocol
Ÿ Connec onless and stateless protocol
Ÿ Asynchronous protocol
UDP UDP
UDP packet NEW Connec onless protocol
UDP packet
Time sensi ve applica on
- ESTABLISHED
26
Foundation Skills in IoT
Comparison
4. Applica on Layer
Applica on layer protocol defines how the applica ons interface with lower layer protocols to send data
over a network.
HTTP
Ÿ Hypertext Transfer Protocol
Ÿ Follows a request-response model
Applica on Layer
HTTP
Founda on ot WWW
h p:// Request – response model
Stateless protocol
Users URI (Universal Resource Inden fiers)
27
Participant Handbook
CoAP
Ÿ Constrained Applica on Protocol
Ÿ Follows a request-response model
Ÿ Runs on top of UDP
Ÿ Meant for constrained environment
coAP
Web Sockets
Ÿ Based on TCP
Ÿ Allows full duplex unique connec ons
Websocket
Client server
Duplex Communica on
Based on TCP
Allow streams of messages to be sent back
and forth b/w client and server
MQTT
Ÿ Message Queue Telemetry Transport
Ÿ Based on Publish-Subscribe model
Ÿ Low data rate, low packet size, requires low bandwidth
28
Foundation Skills in IoT
XMPP
Ÿ Extensible Messaging and Presence Protocol
Ÿ Used for real- me communica on and streaming XML data
DDS
29
Participant Handbook
AMQP
Ÿ Advanced Message Queuing Protocol
Ÿ Supports publish – subscribe model, point-to-point and rou ng and queuing
AMQP
Supports both point-to-point and publisher-
subcriber model
Rou ng and queing
AMQP
30
Foundation Skills in IoT
31
Participant Handbook
32
Foundation Skills in IoT
Applica on
Services
Management Security
Communica on
Device
33
Participant Handbook
Devices:
An IoT system works on the data received from various devices like sensors, micro controller, powerful
gateways etc. All the devices should be registered in the network. The process of registering devices is
called as ‘Data provisioning’. Each device will have a unique ID, by which they can be iden fied.
Communica on:
Sensor and devices of the network are connected at a signal point, and they communicate with each
other as per the defined communica on protocol thus making devices and sensor capable of taking real
me ac on.
Management:
Once the network connec ons are established, the next task is to manage data. The data management
includes data collec on, aggrega on, processing, storage and triggering. Proper connec vity aids in real
me data collec on, real me processing, big data solu on and predic ve analysis. With the help of
device provisioning, the device can be monitored remotely. The devices should be constantly monitored
so as to achieve the desired result.
Services/Applica on:
An IoT system is designed to achieve a specific task i.e. service. These services can be controlled by users
through Applica ons.
34
Foundation Skills in IoT
Surveillance
Sensors
Sensor Network,
Connec vity
Sensors/Actuators, Tags
and Network
(RFID, Barcode)
35
Participant Handbook
The basic cons tuents as shown in the above diagram are as follows:
Ÿ Sensors
Ÿ IoT Gateways
Ÿ Network /wireless services
Ÿ Services
1. Sensors (Things)
Ÿ These are referred to as things in IoT.
Ÿ Sensors collect data and pass on the data to actuators for further processing.
Ÿ Sensors will have unique IP address and be easily iden fiable over the network.
Ÿ Some commonly used are a Humidity sensor, Power sensor, Temperature sensor, water quality
sensor etc.
2. Gateways
Ÿ Gateways route the proposed data to proper loca ons to be u lized.
Ÿ Facilitate to and fro communica on of data.
Ÿ Gateways also provide network connec vity to the data which is essen al for an IoT system to
communicate.
Ÿ LAN, WAN, PAN etc, are examples of network gateways.
3. Internet
Ÿ Connect devices to the IoT system.
Ÿ Different types of modes can be used like WiFi, Mobile, DSL, Fibre etc.
36
Foundation Skills in IoT
Ÿ cameras
Ÿ microphones etc.
With 3 billion Smartphone users and 82% of them using Android, we can safely claim that 2.4 billion IoT-
compa ble devices are already in the market and this number can only grow higher and higher!
Apart from hundreds and thousands of other devices based on many other technologies, it appears
Smartphones can also be the cons tuent component of the Internet of Things. It can play a very
significant role as pathfinders through this new terrain and will be the harbingers of the Internet of
Things.
If you have a Smartphone in your pocket, pat it lovingly — it will be your access point for the Internet of
Things one day. With the rise of the wearables, such as Android Wear or the Apple Watch it appears
increasingly that smart phone can play an addi onal role.
One example of an actual use of the Internet of Things could be to observe traffic conges on on specific
roads with Google Maps. This data is automa cally being collected from the mo on sensors of hundreds
of anonymous Android users as connected devices who are moving along that road at this instant of
me, processed for sta s cal validity and sent to any Google Maps user who is interested.
Here are a few projects that are taking advantage of this trend, turning smart phones (or their silicon
guts, at least) into the hardware that can power all sorts of IoT use-cases.
Placemeter:
New York city startup 'Placemeter' was one of the first to see the value in an out-of-date Smartphone
hardware. The company's cloud-based analy cs pla orm uses machine vision algorithms to track the
number of pedestrians on a street or customers in a store. While any webcam feed will do, old iOS or
Android smart phones can also collect data : users install the Placemeter app and place the phone in a
window. As the company builds out its pla orm and refines its algorithms, it has offered to pay up to $50
a month for video feeds of busy intersec ons and other public spaces.
Fig.1.40 – Placemeter
37
Participant Handbook
Zensors:
Zensors is a proof-of-concept project from computer science graduate students and professors at
Carnegie Mellon University. It repurposes unused smart phones as camera-equipped visual sensors and
uses a combina on of crowd sourcing and machine learning to answer natural-language ques ons about
what the camera sees.
Users place the phone to point its camera at something they want to track, then use a finger p to circle
an “area of interest” in the video feed and type in a ques on that they'd like to have answered — such as
“How many cars are in the parking lot?” or “Is it snowing?” or “How large is the pile of dishes on the
kitchen counter?” Images are reviewed first by humans through Amazon's Mechanical Turk pla orm,
which provides some training so that a machine learning algorithm can eventually take over.
Windows Arduino Libraries:
At the 2015 Build developer conference, Microso announced two new so ware libraries that
essen ally allow Windows phones (or any hardware running Windows 10) to act as Arduino compa ble
development boards.
Windows Virtual Shield for Arduino lets any Windows device to connect wirelessly to an Arduino board.
That gives the Arduino access to all of the hardware in the phone, from gyroscope to touch screen, just as
if those components were hard-wired through an Arduino "shield" module. Windows Remote Arduino
runs the equa on backwards, allowing a Windows applica on to control and draw on the components of
an Arduino device.
With the release of the libraries, Windows 10 became the first opera ng system to join the Arduino
Cer fied program by making it easy to add an en re Smartphone's worth of hardware components to
any Arduino project.
38
Foundation Skills in IoT
There are many technologies that enable IoT. Crucial to the field is the network used to communicate
between devices of an IoT installa on, a role that several wireless or wired technologies may fulfil. Some
be er known network solu ons are given below.
Communica on models are broadly categorized as:
Ÿ Short-range wireless
Ÿ Long- range wireless
Ÿ Wired
39
Participant Handbook
40
Foundation Skills in IoT
transac ons, access digital content and connect electronic devices. Essen ally it extends the
capability of contactless card technology and enables devices to share informa on at a distance that
is less than 4cm.
Standard: ISO/IEC 18000-3
Frequency: 13.56MHz (ISM)
Range: 10cm
Data Rates: 100–420kbps
4. QR codes and barcodes
Machine readable op cal tags that store informa on about the item to which they are a ached.
41
Participant Handbook
42
Foundation Skills in IoT
6. Thread
Network protocol based on the IEEE 802.15.4 standard, similar to ZigBee, providing IPv6 addressing.
A very new IP-based IPv6 networking protocol aimed at the home automa on environment is called
as 'Thread'. Based on 6LoWPAN, and also similar, it is not an IoT applica on protocol like Bluetooth or
ZigBee. However, from an applica on point of view, it is primarily designed as a complement to WiFi
as it recognises that while WiFi is good for many consumer devices, it has limita ons for use in a
home automa on setup.
Launched in mid-2014 by the Thread Group, the royalty-free protocol is based on various standards
including IEEE802.15.4 (as the wireless air-interface protocol), IPv6 and 6LoWPAN and offers a
resilient IP-based solu on for the IoT. Designed to work on exis ng IEEE802.15.4 wireless silicon from
chip vendors such as Freescale and Silicon Labs, Thread supports a mesh network using IEEE802.15.4
radio transceivers and is capable of handling up to 250 nodes with high levels of authen ca on and
encryp on. A rela vely simple so ware upgrade should allow users to run a thread on exis ng
IEEE802.15.4-enabled devices.
Standard: Thread, based on IEEE802.15.4 and 6LoWPAN
Frequency: 2.4GHz (ISM)
Range: N/A
Data Rates: N/A
Further reference:
h ps://www.cheatography.com/davidpol/cheat-sheets/understanding-thread-protocol/
43
Participant Handbook
Currently, the most common WiFi standard used in homes and many businesses is 802.11n, which
offers serious throughput in the range of hundreds of megabit per second, which is fine for file
transfers but may be too power-consuming for many IoT applica ons. A series of RF development
kits designed for building WiFi-based applica ons are available from RS.
Standard: Based on 802.11n (most common usage in homes today)
Frequencies: 2.4GHz and 5GHz bands
Range: Approximately 50m
Data Rates: 600 Mbps maximum, but 150-200Mbps is more typical, depending on channel
frequency used and number of antennas (latest 802.11-ac standard should offer 500Mbps to 1Gbps)
2. Wi-Fi Direct
A Variant of the Wi-Fi standard for peer-to-peer communica on, elimina ng the need for an access
point.
3. Z-Wave
Communica on protocol providing short-range, low-latency data transfer at rates and power
consump on lower than Wi-Fi. Used primarily for home automa on.
Z-Wave is a low-power RF communica ons technology that is primarily designed for home
automa on for products such as lamp controllers and sensors among many others. Op mized for
reliable and low-latency communica on of small data packets with data rates up to 100kbit/s, it
operates in the sub-1GHz band and is impervious to interference from WiFi and other wireless
technologies in the 2.4-GHz range such as Bluetooth or ZigBee. It supports full mesh networks
without the need for a coordinator node and is very scalable, enabling control of up to 232 devices. Z-
Wave uses a simpler protocol than some others, which can enable faster and simpler development,
but the only maker of chips is Sigma Designs compared to mul ple sources for other wireless
technologies such as ZigBee and others.
Standard: Z-Wave Alliance ZAD12837 / ITU-T G.9959
Frequency: 900MHz (ISM)
Range: 30m
Data Rates: 9.6/40/100kbit/s
4. ZigBee
Communica on protocols for personal area networking based on the IEEE 802.15.4 standard,
providing low power consump on, low data rate, low cost, and high throughput.
ZigBee, like Bluetooth, has a large installed base of opera on, although perhaps tradi onally more in
industrial se ngs. ZigBee PRO and ZigBee Remote Control (RF4CE), among other available ZigBee
44
Foundation Skills in IoT
profiles, are based on the IEEE802.15.4 protocol, which is an industry-standard wireless networking
technology opera ng at 2.4GHz targe ng applica ons that require rela vely infrequent data
exchanges at low data-rates over a restricted area and within a 100m range such as in a home or a
building.
ZigBee/RF4CE has some significant advantages in complex systems offering low-power opera on,
high security, robustness and high scalability with high node counts and is well posi oned to take
advantage of wireless control and sensor networks in M2M and IoT applica ons. The latest version
of ZigBee is the recently launched 3.0, which is essen ally the unifica on of the various ZigBee
wireless standards into a single standard. An example product and kit for ZigBee development are
TI's CC2538SF53RTQT ZigBee System-On-Chip IC and CC2538 ZigBee Development Kit.
Standard: ZigBee 3.0 based on IEEE802.15.4
Frequency: 2.4GHz
Range: 10-100m
Data Rates: 250kbps
5. HaLow
A Variant of the Wi-Fi standard providing extended range for low-power communica on at a lower
data rate.
6. LTE-Advanced
High-speed communica on specifica on for mobile networks. Provides enhancements to the LTE
standard with extended coverage, higher throughput, and lower latency.
7. 6LoWPAN
A key IP (Internet Protocol)-based technology is 6LoWPAN (IPv6 Low-power Wireless Personal Area
Network). Rather than being an IoT applica on protocols technology like Bluetooth or ZigBee,
6LoWPAN is a network protocol that defines encapsula on and header compression mechanisms.
The standard has the freedom of frequency band and physical layer and can also be used across
mul ple communica ons pla orms, including Ethernet, Wi-Fi, 802.15.4 and sub-1GHz ISM. A key
a ribute is the IPv6 (Internet Protocol version 6) stack, which has been a very important
introduc on in recent years to enable the IoT. IPv6 is the successor to IPv4 and offers approximately
5 x 1028 addresses for every person in the world, enabling any embedded object or device in the
world to have its own unique IP address and connect to the Internet. Especially designed for a home
or building automa on, for example, IPv6 provides a basic transport mechanism to produce
complex control systems and to communicate with devices in a cost-effec ve manner via a low-
power wireless network.
Designed to send IPv6 packets over IEEE802.15.4-based networks and implemen ng open IP
45
Participant Handbook
standards including TCP, UDP, HTTP, COAP, MQTT, and websockets, the standard offers end-to-end
addressable nodes, allowing a router to connect the network to IP. 6LoWPAN is a mesh network that
is robust, scalable and self-healing. Mesh router devices can route data des ned for other devices,
while hosts are able to sleep for long periods of me.
Standard: RFC6282
Frequency: Adapted and used over a variety of other networking media including Bluetooth Smart
(2.4GHz) or ZigBee or low-power RF (sub-1GHz.
Range: N/A
Data Rates: N/A
Further reference:
h p://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/srnd/ipv6/ipv6srnd/basic
s.pdf
h p://www.txv6 .org/wp-content/uploads/2010/08/Muhummad-Tutorial-ipv6-
basics.pdf
8. Sigfox
An alterna ve wide-range technology is Sigfox, which in terms of range comes between WiFi and
cellular. It uses the ISM bands, which are free to use without the need to acquire licenses, to transmit
data over a very narrow spectrum to and from connected objects. The idea for Sigfox is that for many
M2M applica ons that run on a small ba ery and only require low levels of data transfer, then Wi-Fi's
range is too short while cellular is too expensive and also consumes too much power. Sigfox uses a
technology called Ultra Narrow Band (UNB) and is only designed to handle low data-transfer speeds
of 10 to 1,000 bits per second. It consumes only 50 microwa s compared to 5000 microwa s for
cellular communica on or can deliver a typical stand-by me of 20 years with a 2.5Ah ba ery while it
is only 0.2 years for cellular.
Already deployed in tens of thousands of connected objects, the network is currently being rolled
out in major ci es across Europe, including ten ci es in the UK for example. The network offers a
robust, power-efficient and scalable network that can communicate with millions of ba ery-
operated devices across areas of several square kilometers, making it suitable for various M2M
applica ons that are expected to include smart meters, pa ent monitors, security devices, street
ligh ng and environmental sensors. The Sigfox system uses silicon such as the EZRadioPro wireless
transceivers from Silicon Labs, which deliver industry-leading wireless performance, extended range
and ultra-low power consump on for wireless networking applica ons opera ng in the sub-1GHz
band.
46
Foundation Skills in IoT
Standard: Sigfox
Frequency: 900MHz
Range: 30-50km (rural environments), 3-10km (urban environments)
Data Rates: 10-1000bps
9. Neul
Similar to Sigfox in concept and opera ng in the sub-1GHz band, 'Neul' leverages very small slices of
the TV White Space spectrum to deliver high scalability, high coverage, low power and low-cost
wireless networks. Systems are based on the Iceni chip, which communicates using the white space
radio to access the high-quality UHF spectrum, now available due to analogue to digital TV
transi on. The communica ons technology is called Weightless, which is a new wide-area wireless
networking technology designed for the IoT that largely competes against exis ng GPRS, 3G, CDMA
and LTE WAN solu ons. Data rates can be anything from a few bits per second up to 100kbps over the
same single link; and devices can consume as li le as 20 to 30mA from 2xAA ba eries, meaning 10 to
15 years in the field.
Standard: Neul
Frequency: 900MHz (ISM), 458MHz (UK), 470-790MHz (White Space)
Range: 10km
Data Rates: Few bps up to 100kbps
10. LoRaWAN
Similar in some respects to Sigfox and Neul, LoRaWAN targets wide-area network (WAN)
applica ons and is designed to provide low-power WANs with features specifically needed to
support low-cost mobile secure bi-direc onal communica on in IoT, M2M, smart city and industrial
applica ons. Op mized for low-power consump on and suppor ng large networks with millions
and millions of devices, data rates range from 0.3 kbps to 50 kbps.
Standard: LoRaWAN
Frequency: Various
Range: 2-5km (urban environment), 15km (suburban environment)
Data Rates: 0.3-50 kbps.
Long-range wireless:
1. Low-power wide-area networking (LPWAN)
Wireless networks are designed to allow long-range communica on at a low data rate, reducing
power and cost for transmission.
47
Participant Handbook
Wired:
1. Ethernet
General purpose networking standard using twisted pair and fibre op c links in conjunc on with
hubs or switches.
48
Foundation Skills in IoT
Further reference:
h p s : / / p e o p l e . e e c s . b e r k e l e y. e d u / ~ p r a b a l / t e a c h i n g / c s 2 9 4 - 1 1 -
f05/slides/day21.pdf
h ps : / / w w w.yo u t u b e . co m / watc h ? v = h 8 x P U f Tpy G U & l i st = P Lw 5 h 0 D i J -
9PCxDZkP8pbgpyiDweF3DJ8c&index=6 (Part 1 to 4) for detailed understanding of
Networking protocols.
h p s : / / w w w.y o u t u b e . c o m / w a t c h ? v = o c _ q z T j 2 6 - k & l i s t = P Lw 5 h 0 D i J -
9PCxDZkP8pbgpyiDweF3DJ8c – IoT tutorial
49
Participant Handbook
Server
Receives
request from
client, processes
up/letches
resources and
sends response
to clients
50
Foundation Skills in IoT
8. 6LoWPAN
51
Participant Handbook
Applica on Programming Interface (API) is created for a specific applica on. APIs are necessary to
control devices. APIs hold together connected 'things' in an IoT system. APIs aid in transferring
informa on between programs from one applica on to another. An API should be developed keeping in
mind reusable pa erns and automated deployment.
An applica on programming interface or API is a so ware interface that enables backend
communica on between programs and applica ons.
Communica on APIs are broadly classified as:
Ÿ REST based Communica on API
Ÿ WebSocket based Communica on API
52
Foundation Skills in IoT
Code
APIs
53
Participant Handbook
Ci es
Ÿ Smart parking
Ÿ Smart roads
Ÿ Waste management
Ÿ Traffic management Fig.1.58 – Smart city
Environment
Ÿ Weather monitoring
Ÿ Air quality monitoring
Ÿ Forest fire detec on
Ÿ Water quality management
54
Foundation Skills in IoT
Retail
Ÿ Inventory management
Ÿ Smart payments
Ÿ Smart vending machines
Industry
Ÿ Making factories smarter, more produc ve
through predic ve maintenance
Ÿ Indoor air quality monitoring
Ÿ Smart energy management
55
Participant Handbook
Agriculture
Ÿ Smart irriga on
Ÿ Greenhouse control
Ÿ Precision plan ng
Ÿ Smart crop monitoring
Health
Ÿ Health and Fitness monitoring
Ÿ Wearable technology
Ÿ Automated BP monitor
Auto
Ÿ Google maps and other naviga on tools
Ÿ Music apps
Ÿ Solar roofs with integrated ba ery storage
Ÿ Self driving car technology
Ÿ Health monitoring of fleet of tractors
56
Foundation Skills in IoT
Avia on
Ÿ Real me intelligence to enhance opera ons
Ÿ Aircra communica ons
Ÿ System Wide Informa on Management (SWIM)
Ÿ Control data linking and monitoring of
Unmanned Aerial Vehicles (UAV) and drones
1.3.6 Security
57
Participant Handbook
consumer privacy, interrup on of business opera ons, the slowdown of internet func onality through
large-scale denial-of-service a acks, and poten al disrup ons to cri cal infrastructure. It is impera ve
that IoT ecosystem is built on a founda on that is trustworthy and secure. These need to be addressed at
access level, encryp on in the data transac ons and failures ensured for failsafe and securely. Many of
the vulnerabili es in IoT could be mi gated through recognized security best prac ces.
Ÿ Enable security by default through unique, hard to crack default user names and passwords
typically as used in secure bank transac ons star ng from the mandatory first change when the
device and the integrated set up is commissioned and periodic change in the life cycle. Automa c
closure of the access beyond specific me of inac vity.
Ÿ Use hardware that incorporates security features to strengthen the protec on and integrity of
the device. For example, use computer chips that integrate security at the module/component
level, embedded in the processor and provide encryp on and anonymity. This is to enable
encrypted transac on.
Design the IoT ecosystem keeping in mind system and opera onal disrup on. Understand what
consequences could flow from the failure of a device and implement features in devices to fail safely and
securely so that the failure does not lead to greater disrup on.
SNIFFER ATTACKS
between two
device
58
Foundation Skills in IoT
IoT
smart
Patch vulnerabili es as soon
as they are announced
guide:What to
Read our guide:
consider when buying a
smart device
59
Participant Handbook
As we have discussed in the earlier sec ons, an IoT system is a combina on of hardware and so ware
components designed to achieve a specific task.
Ÿ The components interact with each other through a defined communica on channel called as
'communica on protocol'
Ÿ Processors act as the brain of an IoT system and the main func on of a processor is to process the
data received from the sensors according to an algorithm and extract useful informa on
Ÿ Gateways route the processed data to proper loca ons for further u liza on. Gateways help in to
and fro communica on of the data and provide network connec vity to the data
An IoT Pla orm is referred to as IoT middleware. It acts as a mediator between applica on layer and
hardware.
IoT pla orm facilitates the following:
Ÿ Communica on
Ÿ Data flow
60
Foundation Skills in IoT
Ÿ Device management
Ÿ Func onality of applica ons
To begin embedded development, a pla orm is required which has the following components:
Ÿ Development board
Ÿ IDE (Integrated Development Environment)
A microcontroller development board is a printed circuit board (PCB) with circuitry and hardware. The
development board will have a processor, memory, chip set and on board peripherals. The
microcontroller development board is also called as 'Single board microcontroller'.
For example: Arduino, ARM mbed etc.
61
Participant Handbook
There are many open source so ware (IDE) available to develop microcontroller boards to develop real
me applica ons.
Arduino:
An Arduiono is an open source microcontroller development board. This can be used to read sensors and
control devices. A program can be uploaded on this board to interact with things in the real world.
There are various types of Arduino boards. Care should be taken to select right kind of Arduino board
based on the applica on.
Some common types of Arduino boards are:
Ÿ Arduino Uno
Ÿ Arduino NG, Diecimila, and the Duemilanove (Legacy Versions)
Ÿ Arduino Mega 2560
Ÿ Arduino Mega ADK
Ÿ Arduino LilyPad
As an example, we will study some features of Arduino UNO.
Arduino UNO:
It is an open source electronics prototyping pla orm for developing interac ve electronic applica ons.
Digital
62
Foundation Skills in IoT
There are many types of boards compa ble with Arduino. Some of them are listed below:
Ÿ YUN
Ÿ ETHERNET
Ÿ TIAN
Ÿ INDUSTRIAL IoT
Ÿ LEONARDO ETH
Ÿ YUN MINI
Ÿ WiFi SHIELD
Ÿ YUN SHIELD
Ÿ WIRELESS PROTO SHIELD etc.
Some flavors of Arduino are:
Ÿ Arduino Leonardo Microcontroller (Headers)
Ÿ Arduino Leonardo (No Headers)
Ÿ Arduino Uno USB Microcontroller Rev 3
Ÿ Arduino Duemilanove USB Microcontroller module
Ÿ Arduino Ethernet Microcontroller (No PoE)
Ÿ Arduino Ethernet Microcontroller With PoE
Ÿ Arduino Ethernet Microcontroller With PoE + USB2SERIAL Kit
63
Participant Handbook
ARM mbed
64
Foundation Skills in IoT
65
Participant Handbook
Input Output
Ÿ Informa on provided to the board is called Ÿ Any signal going from the board is
as 'Input' called as 'Output'
Example: Example:
Ÿ Bu ons, Switches, Light Sensors, Flex Ÿ LED, DC motor, Servo motor, Piezo
Sensors, Humidity Sensors, Temperature buzzer, Relay etc.
Sensors etc.
Analogue Vs Digital:
Analogue Digital
Analogue signal is a con nuous signal which Digital signals are discrete me signals generated
represents physical measurements. by digital modula on.
Analogue signals are denoted by sine waves. Digital signals are denoted by square waves.
Analogue signals use a con nuous range of Digital signals use discrete or discon nuous values
values to represent the informa on. to represent the informa on.
Example: Human voice in air, analogue Example: Computers, CDs, DVDs, and other digital
electronic devices. electronic devices
66
Foundation Skills in IoT
5V- 5V-
0V-
0V-
Analogue Signal Digital Signal
67
Participant Handbook
Con nuity tes ng is carried out to check the flow of electric current in the circuit. This test can be carried
out using a mul meter.
Make sure that all components will have a common ground with the Arduino
Measurement of 'Resistance':
Resistance is defined as the opposi on offered to the flow of electric current. The opposi on offered to
the flow of electronics depends on the following:
Ÿ Type of materials
Ÿ Cross sec onal area
Ÿ Temperature
68
Foundation Skills in IoT
Step 3:
Measure resistance using probes of a mul meter
69
Participant Handbook
Python:
Ÿ High level programming for general purpose programming
Ÿ It is an interpreted language – flexible, easy to read, quick to write
Ÿ Open source so ware
Ÿ Support mul ple programming paradigms like object oriented, impera ve and func onal
programming
Ÿ Most suited for embedded control and IoT world
Advantages of Python:
Ÿ Lesser me is required to develop Python compared to Java
Ÿ Python has built in high level data types
Ÿ Can be used to prototype components
Ÿ Strong in data structures
Ÿ Supports mul ple systems and pla orms
Ÿ Python has built in tes ng framework for debugging
Disadvantages:
Ÿ Not suitable for mobile development
Ÿ May not be used in memory intensive tasks
Ÿ Not suitable for mul processor/mul core work
70
Foundation Skills in IoT
Operator Description A
x[index:index] Slicing L
x[index] Indexing L
~x Bitwise NOT NA
x|y Bitwise OR L
71
Participant Handbook
x or y Boolean OR L
* x!=y and x<>y are the same inequality test (!= is the preferred form, <> obsolete)
Opera on Interpreta on
C & C++:
Ÿ C++ is object oriented version of C
Ÿ Can be used for both Linux OS and Arduino embedded IoT so ware system
Ÿ Ideal for embedded systems
Ÿ Codes can be wri en specifically for Hardware
72
Foundation Skills in IoT
Java:
Ÿ Code is not specific to hardware and more portable
Ÿ Library is required to run different hardware
Ÿ Java is like a write once and run anywhere language
73
Participant Handbook
During this you will also be carrying out some interes ng projects.
Ÿ Energy Sector
o Smart Ligh ng
Ÿ Mining Sector
o Safety and Availability of Construc on and Heavy Equipment
Ÿ Medical/Healthcare Sector
o Automated BP Monitor
o Remote Pa ent Monitoring
Ÿ Aerospace Sector
o Control, data link and Monitoring (Unmanned Aerial Vehicle)
Ÿ Automo ve Sector
o Breath Alcohol Igni on Interlock Device
And many more………………..
74
Foundation Skills in IoT
Summary
1. The Internet of things (IoT) is the networking of physical devices ("connected devices" or "smart
devices") embedded with electronics, so ware, sensors, actuators and network connec vity
that enable these objects to collect and exchange data.
2. IoT Characteris cs that are making it popular are:
Ÿ Low energy requirement
Ÿ Scalable solu on
Ÿ Secured environment
Ÿ Inter operability between different communica on technologies
Ÿ Open API/Open source
3. The connec vity of devices is growing exponen ally in every field may it be logis cs,
manufacturing, healthcare, home automa on, automo ve, construc on, retail, energy,
agriculture, aerospace, mining and environment. IoT enhances the system performance.
4. The principle technologies that drive IoT system are:
Ÿ Wireless Sensor Networks
Ÿ Embedded systems
Ÿ Communica on protocols
Ÿ Cloud Compu ng
Ÿ Big Data Analysis
5. IoT connects various devices through internet and devices interact with each other through a
communica on channel.
6. Communica on protocols are broadly categorized as:
Ÿ Link layer
Ÿ Network layer
Ÿ Transport layer
Ÿ Applica on layer
7. A cloud refers to a dis nct IT environment that is designed for the purpose of remotely
provisioning scalable and measured IT resources.
8. Big data analy cs is the process of examining large and varied data sets i.e., big data to uncover
hidden pa erns, unknown correla ons, market trends, customer preferences and other useful
informa on that can help organiza ons make more-informed business decisions.
9. The IoT system comprises of the following func onal blocks:
Ÿ Devices
Ÿ Communica on
Ÿ Services
75
Participant Handbook
Ÿ Management
Ÿ Security
Ÿ Applica on
12. Applica on Programming Interfaces (API) are created for a specific applica on.
13. APIs are necessary to control devices.
14. Communica on APIs are broadly classified as:
Ÿ REST based Communica on API
Ÿ WebSocket based Communica on API
15. An IoT Pla orm is referred to as IoT middleware. It acts as a mediator between applica on layer
and hardware.
16. IoT pla orm facilitates the following:
Ÿ Communica on
Ÿ Data flow
Ÿ Device management
Ÿ Func onality of applica ons
17. To begin embedded development, a pla orm is required which has the following components:
Ÿ Development board
Ÿ IDE (Integrated Development Environment)
18. A microcontroller development board is a printed circuit board (PCB) with circuitry and
hardware.
19. An Arduiono is an open source microcontroller development board. This can be used to read
sensors and control devices. A program can be uploaded on this board to interact with things in
the real world.
76
Foundation Skills in IoT
20. ARM mbed pla orm provides the opera ng system, cloud services, tools and developer
ecosystem to make the crea on and deployment of commercial, standards-based IoT solu ons.
21. So ware Development Kit (SDK) is an open source C/C++ microcontroller so ware pla orm.
This can be used to build projects.
22. Hardware Development Kit (HDK) provides full microcontroller sub-system design files and
firmware for building development boards and custom products.
23. Higher end IoT nodes require applica on processors running Linux, Windows Embedded and
Windows 10.
24. Linux based end points are used when there is a need for local processing and also run a web
version or HMI screen.
25. Raspberry Pi is a small pla orm and runs on Linux pla orm.
26. A 'Circuit' is defined as the path between two or more points through which electric current
flows.
27. A circuit should have con nuous LOOP from power (Vcc) to ground.
28. Con nuity tes ng is carried out to check the flow of electric current in the circuit. This test can be
carried out using a mul menter.
29. Resistance is defined as the opposi on offered to the flow of electric current.
30. Some of the programming languages are:
Ÿ Python
Ÿ C and C++
Ÿ Java
Ÿ Node.js and Java script
77
Participant Handbook
Exercise
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
78
Foundation Skills in IoT
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
79
Participant Handbook
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
I. WSN
II. UI
III. BLE
IV. HTTP
V. TCP
VI. PLC
VII. NFC
VIII. ITU
IX. IDE
X. API
XI. REST
??
??
?? ??
??
??
80
Foundation Skills in IoT
82
Participant Handbook
V. Iden fy the type of communica on model most commonly used in IoT applica on
VI. Name the communica on model in which the communica on can be sent to a mul ple
en es at the same me
82
Foundation Skills in IoT
VII. Iden fy the type of communica on model, where the request for a transac on is ini ated by a
central server
VIII. Iden fy the type of communica on API used in the development of web services
IX. Which type of communica on API provides full duplex communica on channels?
83
Participant Handbook
84
Foundation Skills in IoT
Further reference:
h ps://www.youtube.com/watch?v=uEsKZGOxNKw – Introduc on to IoT
h ps://www.youtube.com/watch?v=QSIPNhOiMoE – IoT How it works
h ps://www.youtube.com/watch?v=o7VXyolenvU – IoT explained easily
h p s : / / w w w.y o u t u b e . c o m / w a t c h ? v = o c _ q z T j 2 6 - k & l i s t = P Lw 5 h 0 D i J -
9PCxDZkP8pbgpyiDweF3DJ8c – IoT tutorial
h p s : / / w w w. y o u t u b e . c o m / w a t c h ? v = h 8 x P U f Tp y G U & l i s t = P L w 5 h 0 D i J -
9PCxDZkP8pbgpyiDweF3DJ8c&index=6 – Net working protocols Part 1 to part 4
h ps://www.youtube.com/watch?v=jYrkujWlbt0 – IoT protocols need to know
h ps://www.youtube.com/watch?v=z72G4WXQ_IY – IoT benefits and risks
h ps://www.youtube.com/watch?v=7D1CQ_LOizA – Big data
h ps://www.youtube.com/watch?v=DGDtujmOBKc – How Cloud Compu ng Works
h ps://www.youtube.com/watch?v=riSLyE57IdA – Connected Avia on Solu on at Dubai
IoT World Forum
h ps://www.youtube.com/watch?v=emAJwuwvstw – Internet of Aircra Things: aircra
data management solu ons
h ps://www.youtube.com/watch?v=Q8Cn47L8FRQ – Connected Vehicle: The Future of
Transporta on
h ps://www.youtube.com/watch?v=aOFZqecYk2g – Intelligent Transporta on System
85
Participant Handbook
Further reference:
“An Introduc on to the Internet of Things (IoT)" – (PDF). Cisco.com. San Francisco, California:
Lopez Research. November 2013. Retrieved 23 October 2016.
Monnier, Olivier (8 May 2014). "A smarter grid with the Internet of Things". Texas
Instruments.
Evans, Dave (April 2011). "The Internet of Things: How the Next Evolu on of the Internet Is
Changing Everything" (PDF). Cisco. Retrieved 15 February 2016.
Zanella, Andrea; Bui, Nicola; Castellani, Angelo; Vangelista, Lorenzo; Zorzi, Michele (February
2014). "Internet of Things for Smart Ci es". IEEE Internet of Things Journal. 1 (1): 22–32.
Retrieved 26 June 2015.
Höller, J.; Tsiatsis, V.; Mulligan, C.; Karnouskos, S.; Avesand, S.; Boyle, D. (2014). From
Machine-to-Machine to the Internet of Things: Introduc on to a New Age of Intelligence.
Elsevier. ISBN 978-0-12-407684-6.
Hendricks, Drew. "The Trouble with the Internet of Things". London Datastore. Greater
London Authority. Retrieved 10 August 2015.
Magrassi, P. (2 May 2002). "Why a Universal RFID Infrastructure Would Be a Good Thing".
Gartner research report G00106518.
“Use case: Sensi ve wildlife monitoring". FIT French Project. Retrieved 10 July 2014.
"Every. Thing. Connected. A study of the adop on of 'Internet of Things' among Danish
companies" (PDF). Ericsson. Retrieved 28 March 2017.
www.gsma.com/connectedliving. Understanding IoT
h ps://www.prokarma.com/blog/2015/02/17/iotgatewayswayiotnetworking - IoT
Gateways - The ways to IoT networking
h ps://www.postscapes.com/interneto hingsprotocols/ - IoT Standards & Protocols Guide
| 2017 Comparisons on Network, Wireless Comms, Security, Industrial
h ps://opentechdiary.wordpress.com/2015/07/16/awalkthroughinterneto hingsiotbasic
spart2/ -Part 2 : A walk through Internet of Things (IoT) basics
86
2. Catalogue of
Applica ons
Unit 2.1 – Catalogue of Applica ons
Participant Handbook
88
Foundation Skills in IoT
2.1.1 Introduc on
In the previous sec ons, we have discussed various aspects of an IoT system including devices, sensors,
communica on protocol, networking and architecture. Basically an IoT system has 'Hardware
components' and 'IDE (Integrated Development Environment)'. All devices communicate with each
other through a defined communica on protocol. Data is collected from various nodes, processed and
input is given to various devices to act.
An IoT concept can be implemented in almost all sectors. An effort is made to list some applica ons of IoT
covering some fast moving sectors like:
Ÿ Logis cs
Ÿ Manufacturing
Ÿ Medical/Healthcare
Ÿ Smart Home
Ÿ Automo ve
Ÿ Construc on / Infrastructure/Smart city
Ÿ Retail
Ÿ Energy
Ÿ Agriculture
Ÿ Aerospace
Ÿ Mining
Ÿ Environment
89
Participant Handbook
2.1.2 Logis cs
The technology of IoT can be implemented in various fields to achieve desired results like smoother
opera on, hassle free communica on, enhanced produc vity, energy conserva on etc.
One of the major tasks in Logis cs sector is to manage traffic and fleet to enhance the opera onal
efficiency. This can be achieved by reducing human interven on and adap ng technological solu ons.
IoT technology can be effec vely u lized.
Some applica ons are listed below:
1. Traffic and Fleet management
IoT adds value in op mum u liza on of assets and enhance opera onal efficiency. Vehicles are
among the assets most ripe for improved efficiency, especially in terms of traffic and fleet
90
Foundation Skills in IoT
91
Participant Handbook
2.1.3 Manufacturing
Network control and management of manufacturing equipment, asset and situa on management or
manufacturing process control bring the IoT within the realm of industrial applica ons and smart
manufacturing as well. The IoT intelligent systems enable rapid manufacturing of new products, dynamic
response to product demands and real- me op miza on of manufacturing produc on and supply chain
networks, by networking machinery, sensors and control systems together.
92
Foundation Skills in IoT
2. Asset management
This can also be used in asset management via predic ve maintenance, sta s cal evalua on and
measurements to maximize reliability.
3. Energy op miza on
Smart industrial management systems can also be integrated with the Smart Grid, thereby
enabling real- me energy op miza on. Measurements, automated controls, plant
op miza on, health and safety management, and other func ons are provided by a large
number of networked sensors.
93
Participant Handbook
94
Foundation Skills in IoT
The term IIoT (Industrial Internet of Things) is o en encountered in the manufacturing industries,
referring to the industrial subset of the IoT. IIoT in manufacturing would probably generate so much
business value that it will eventually lead to the fourth industrial revolu on. It is likely that in the future,
successful companies will be able to increase their revenue through Internet of things by crea ng new
business models and improve produc vity, exploit analy cs for innova on, and transform workforce.
The poten al of growth by implemen ng IIoT is unimaginable.
While the connec vity and data acquisi on are impera ve for IIoT, predic ve maintenance is probably a
rela vely "easier win" since it is applicable to exis ng assets and management systems. The objec ve of
intelligent maintenance systems is to reduce unexpected down me and increase produc vity and can
generate big saving over total maintenance costs. Industrial big data analy cs will play a vital role in
manufacturing asset predic ve maintenance.
IoT devices can be used to enable remote health monitoring and emergency no fica on systems.
We will study some applica ons of IoT being used in Healthcare sector.
95
Participant Handbook
96
Foundation Skills in IoT
Advantages of IoT:
1. Reduced costs
With IoT, pa ents can be monitored in real me, thereby cu ng down unnecessary physician
visits. Advanced monitoring techniques will help pinpoint the health problem thereby
elimina ng conduc ng huge tests and procedures to just find the problem.
2. Improved treatment outcome
Connected health enables caregivers to get access to real- me informa on resul ng in data-
driven, informed decisions and evidence-based treatments can help provide mely care and
boost treatment outcomes.
3. Real me disease management
With con nuous monitoring of pa ents and access to real- me data, diseases can be treated
proac vely before their condi on worsens.
4. Minimizing errors
Automated workflow, accurate data collec on and data-driven decisions cut down wastes,
minimise errors and reduce system costs.
5. Improved pa ent experience
Connected health genuinely focuses on pa ent centricity. Be er accuracy in diagnosis,
proac ve treatment, mely physician interven on and improved treatment outcome lead to
accountable care resul ng in high trust among pa ents.
97
Participant Handbook
An IoT system finds applica ons in homes. The objec ve is to control various appliances remotely to
conserve energy and enhance security.
One example would be a connected lamp that can have Wi-Fi embedded into it so that it can then be
turned on/off and dimmed via a Smartphone app or remotely via a Cloud solu on.
Local
user
98
Foundation Skills in IoT
The feature of the WiFi Module used in this connected outlet can be that one doesn't have to do any
programming at all at the device level and one doesn't have to add an applica on CPU to the design.
58% 19:49
iChipNET
Connect ne
The Device Networking Authority
status Completed.
off ‘Not Ac ve’
on ‘Room’ Light’
off ‘Washing Machine’
off ‘Dryer’
off ‘Not Ac ve’
off ‘Not Ac ve’
off ‘Not Ac ve’
off ‘Not Ac ve’
99
Participant Handbook
There exists an almost bewildering choice of connec vity op ons for electronics engineers and
applica on developers working on products and systems for the Internet of Things (IoT).
2.1.6 Automo ve
It will not be a surprise that in the year 2020, 82% of all cars marketed will be IoT connected. Automakers
have correctly no ced a growing trend and a significant business opportunity for connec ng their cars.
The manner in which public transporta on, such as buses and trains are operated, will also transform
because of the IoT.
Some applica ons are listed below:
1. So ware update in real me
Currently automakers are connec ng their vehicles in two ways:
Ÿ Embedded
Ÿ Tethered
Embedded cars use a built-in antenna and chipset, while tethered connec ons use hardware to
allow drivers to connect to their cars via their smart phones. Internet connec vity in vehicles
allows car companies to release so ware updates in real me, which is extremely important
during the recall.
100
Foundation Skills in IoT
101
Participant Handbook
3. Cross selling
More connec vity provides more ways for automakers to cross-sell their products and services
to customers. Typical example is the Mahindra e2O car (EV) which is monitored and the
customer is promptly alerted and supported on his driving performance and car care including
the ba ery status.
4. RFID (Radio Frequency Iden fica on)
RFID system is o en seen as a prerequisite for an IoT par cularly in automobiles. RFID is an
automa c technology and aids machines or computers to iden fy objects, record metadata or
control individual target through radio waves. Connec ng RFID reader to the terminal of
Internet, the readers can iden fy, track and monitor the objects a ached with tags globally,
automa cally and in real me, if needed. This is the so-called Internet of Things (IoT).
102
Foundation Skills in IoT
Further reference:
h ps://www.youtube.com/watch?v=Q8Cn47L8FRQ - Connected Vehicle: The Future of
Transporta on
h ps://www.youtube.com/watch?v=aOFZqecYk2g - Intelligent Transporta on System
Greater promises are in the field of Smart homes and Smart ci es where reduced energy use, access to
care, improved quality of life, safety, reduced environment risks and efficient commu ng in the city
transport system can be achieved with IoT systems.
103
Participant Handbook
104
Foundation Skills in IoT
105
Participant Handbook
Infrastructure management:
Monitoring and controlling opera ons of urban and rural infrastructures like bridges, railway tracks, on-
and offshore- wind-farms is another applica on of IoT. An IoT infrastructure can be used for monitoring
any events or changes in structural condi ons that can compromise safety and increase risk.
It can also be used for scheduling repair and maintenance ac vi es in an efficient manner, by
coordina ng tasks between different service providers and users of these facili es. IoT devices can also
be used to control cri cal infrastructure like bridges to provide access to ships. Usage of IoT devices for
monitoring and opera ng infrastructure is likely to improve incident management and emergency
response coordina on and quality of service, up- mes and reduced costs of opera on in all
infrastructure related areas.
106
Foundation Skills in IoT
2.1.8 Retail
The way forward in Retail segment is to automate processes that can enhance store opera ons and aid in
smooth management. There are various applica ons where IoT can be implemented. In this sec on, we
will discuss some applica ons of IoT in Retail stores.
1. Predic ve equipment maintenance
Every retail store will have a lot of equipment which is u lized in store opera ons. Every care
should be taken to maintain equipment in good working condi on. IoT technology is u lized to
manage energy or predict equipment failure or detect issues rela ng to equipment.
2. Smart Transporta on
Moving merchandise from one loca on to another more efficiently is the main objec ve of
Smart Transporta on. IoT Technology can be u lized for maintenance of transport, tracking and
op miza on of route.
3. Connected consumer
The consumer can find products, offers and best prices using their cell phone. Customized offers
can be provided to consumers and an alert can be sent to their mobile number. This is possible by
using IoT Technology.
4. Smart Store
The IoT technology can be u lized to analyse traffic at various retail stores. This helps in
understanding the en re shopping journey and experience of consumers at various retail stores.
The store associate can also collect feedback from consumers.
107
Participant Handbook
2.1.9 Energy
Integra on of sensing and actua on systems, connected to the Internet, is likely to op mize energy
consump on as a whole.
It requires IoT devices to be integrated into all forms of energy consuming devices (switches, power
outlets, bulbs, televisions, etc.) and be able to communicate with the u lity supply company in order to
effec vely balance power genera on and energy usage. Such devices would also offer the opportunity
for users to remotely control their devices, or centrally manage them via a cloud based interface and
enable advanced func ons like scheduling (e.g., remotely powering on or off hea ng systems,
controlling ovens, changing ligh ng condi ons etc.).
108
Foundation Skills in IoT
Besides home based energy management, the IoT is especially relevant to the Smart Grid since it
provides systems to gather and act on energy and power-related informa on in an automated fashion
with a goal to improve the efficiency, reliability, economics, and sustainability of the produc on and
distribu on of electricity. Using advanced metering infrastructure (AMI) devices connected to the
Internet backbone, electric u li es can not only collect data from end-user connec ons, but also
manage other distribu on automa on devices like transformers and switching controls.
109
Participant Handbook
2.1.10 Agriculture
The Food and Agricultural Organisa on of the UN (FAO) predicts that the global popula on will reach 9.6
billion people by 2050. In order to keep pace, food produc on must increase by 70% by 2050.
Current Barriers:
Ÿ Slowing down of produc vity
Ÿ Limited availability of arable land
Ÿ Climate changes
Ÿ Increasing need of fresh water
Solu ons:
110
Foundation Skills in IoT
111
Participant Handbook
2.1.11 Aerospace
Opera on and maintenance of these sectors need to subscribe to governmental control of airspace and
airspace opera ons and as such it is a highly-regulated domain.
The IoT model uses data collected from devices and transmi ed through the network to cloud services,
where the real- me intelligence drives produc vity and opera onal gains. There is no single owner who
controls the en re solu on, or system of systems.
Airlines typically own the aircra and the associated ground maintenance facili es; communica ons
have to go through avionics radios, the Aircra Communica ons Addressing and Repor ng System
(ACARS) data link, or commercial broadband services; and in flight the opera ons are controlled by the
airspace operators, typically run by government agencies such as the FAA or EUROCONTROL or DGCA in
India.
This mul -owner, mul -tenant environment makes it par cularly challenging to implement system-of-
system efficiencies and to exploit data in the emerging concepts of IoT. Although the automa on
provided by IoT allows for more efficient opera ons, new security and safety requirements to ensure
that the excellent safety record of commercial aerospace is not compromised is needed.
One of such schemes is implemented through an open, interna onally agreed-upon cloud service:
System Wide Informa on Management (SWIM). SWIM aggregates data about all aspects of aircra
opera ons, including flight paths, coordina on in take-off and landing, weather informa on, and
opera onal data about airspace and airports. By combining data from various sources, addi onal
benefits can be provided. For example, an aircra encountering turbulence can report that informa on
through SWIM to allow other air space users to avoid that area. Use of IoT concepts in the Management
and Opera on of individual devices in this frame work need to obtain an aircra type cer ficate, which in
turn means that devices within the aircra have to be safety-cer fied, typically following the RTCA DO-
178 and EUROCAE ED-12 standard for so ware, and RTCA DO-274 and EUROCAE ED-80 for hardware.
112
Foundation Skills in IoT
Some of the IoT benefits have been already put to use in the aircra . For example, Sensor packages that
monitor an engine's usage and collect performance, vibra on and fuel consump on data have been in
existence for a number of years. This data enables the engine manufacturer to advise the carrier on
correc ve measures, usually during scheduled maintenance phases and has been used to predict and
op mize when maintenance is required based on analysing this data over many years of opera on.
With the advent of IoT, greater connec vity to the aircra has enabled engine manufacturers to exploit
this data just in me for allowing prompter servicing as well as advising on opera onal changes, such as
those that would result in fuel savings or other advantageous opera ons (for example, changing a
landing sequence to put less stress on the engine).
Using IoT intelligence also have driven business model changes. For example, IoT systems give engine
manufacturers the ability to lease engines to carriers based on actual usage in flight, rather than selling
them outright, reducing capital expenses (CAPEX) for operators. Under this business model, the engine
113
Participant Handbook
manufacturer takes responsibility for maintaining and op mizing the engine, which can be of significant
value to the carrier. In the past, carriers could mi gate the risk of equipment failure only by taking an
aircra out of service for inspec on at scheduled intervals; nevertheless, in some cases equipment
failure could s ll lead to unscheduled out-of-service aircra , which is very expensive and disrup ve for
the airlines.
Predic ve maintenance, along with synchronized logis cs—made possible by interconnected smart
sensors and data analy cs linked to the logis cs system—reduces not only the risk of in-flight failure but
also the number of aircra si ng idle in hangars, awai ng parts and service.
With a worldwide fleet, it's essen al to have the right parts and engineering resources when and where
they're needed. Real- me IoT systems that can match maintenance repair and overhaul (MRO)
requirements with parts availability can help ensure the mely delivery of parts and service engineers.
Further reference:
h ps://www.youtube.com/watch?v=riSLyE57IdA - Connected Avia on Solu on at Dubai IoT
World Forum
h ps://www.youtube.com/watch?v=emAJwuwvstw - Internet of Aircra Things: aircra data
management solu ons
2.1.12 Mining
The biggest drivers for the use of technology are operator safety and comfort because it helps keep
operators away from hazardous areas.
Mine sites that put technologies to work have also experienced a number of other valuable benefits such
as:
Ÿ Increased produc vity
Ÿ Higher equipment u liza on
Ÿ Less machine damage
114
Foundation Skills in IoT
115
Participant Handbook
4. Object Direc on
Adds radar capabili es to mobile surface equipment. Automa cally detects hazards such as other
equipment or vehicles within cri cal zones around the machine.
Can be added as an a ermarket solu on and is available for any brand of equipment.
5. Driver Safety System
An in-cab camera system measures operator eye movements to spot distrac on events and
determine the onset of fa gue. Used with an operator training and awareness program, it is a
powerful tool for mi ga ng the root causes of many site accidents.
6. Machine to Machine Communica on
Eliminates data gaps and the need for site-wide radio coverage. The system stores data on the on-
board display and sends it to the office whenever they come within range of hot spots located
around the site.
7. Capture and Playback
Records incidents for playback, analysis and training opportuni es. Enhanced repor ng helps
iden fy the best operators by comparing incidents to produc vity.
116
Foundation Skills in IoT
117
Participant Handbook
118
Foundation Skills in IoT
2.1.13 Environment
Environmental monitoring applica ons of an IoT system typically use sensors to assist in environmental
protec on for monitoring:
Ÿ Air quality
Ÿ Water quality
Ÿ Atmospheric or soil condi ons
Ÿ Movement of wildlife and their habitats
Development of resource constrained devices connected to the Internet also mean that other
applica ons like earthquake or tsunami early-warning systems can also be used by emergency services
to provide more effec ve aid. IoT devices in this applica on typically span a large geographic area and
can also be mobile. It has been argued that the standardiza on of IoT brought to wireless sensing will
revolu onize this area.
119
Participant Handbook
120
Foundation Skills in IoT
Summary
We have briefly discussed various applica ons of IoT in various sectors. The applica ons are listed below.
Logis cs:
1. Traffic and fleet management
2. Resource and energy management
3. Safety and security
4. Health monitoring
Manufacturing:
1. Automated process controls
2. Asset management
3. Energy op miza on
4. Intelligent maintenance system
Medical / Healthcare:
1. Remote health monitoring and emergency no fica on system
2. Encourage healthy living
Automo ve:
1. So ware update in real me
2. Vehicle performance analysis
3. Cross selling
4. RFID (Radio Frequency Iden fica on)
Construc on/Infrastructure/Smart city:
1. Ligh ng, asset tracking and smart energy
2. Environmental monitoring
3. Smart waste management
4. Smart ci zen
5. Traffic intensity monitoring
6. River monitoring
7. Outdoor parking management
Retail:
1. Predic ve equipment maintenance
2. Smart transporta on
121
Participant Handbook
3. Connected consumer
4. Smart store
Energy:
1. Smart grid
2. Smart home
Agriculture:
1. Smart farming
Aerospace:
1. System Wide Informa on Management (SWIM)
Mining:
1. Improving safety
2. Building virtual fences
3. Smart rou ng and lane maintenance
Environment:
1. Environmental protec on
122
3. Use Cases - Automo ve
Unit 3.1 - Breath Alcohol Igni on Interlock Device
Unit 3.2 - Health Monitoring of Tractors
Participant Handbook
124
Foundation Skills in IoT
3.1.1 Scenario
Drinking and driving is one of the main causes of road accidents. It is also important to know that more
than 70% of road accidents are due to drunk driving.
The US Na onal Highway Traffic Safety Administra on (NHTSA) has mandated the installa on of an
Igni on Interlock System in vehicles to control to drunk driving.
Breath Alcohol Igni on Interlock Device (BAIID) employs sensors to test the breath sample and the
vehicle will start only if the alcohol concentra on (Breath Alcohol Concentra on) is below the set point.
Thus, these devices will help in controlling accidents due to drunk driving.
This use case describes handheld and base unit to meet the Requirement of NHTSA guidelines.
3.1.2 Design
This system uses a handheld unit, a base unit and a cloud base data collec on and an analysis unit.
BAIID system is remotely connected to the base unit through GPRS/GPS/Wi-Fi interface.
The system can store the data for three months with a driving usage limit of 24 hours of driving per day as
per the NHTSA guidelines. The driver has to visit the nearest service sta on once in every 3 months for
data collec on, analysis and scru ny for a defaulter driver.
The main tasks of a 'handheld' unit are:
Ÿ Handle user inputs via switches
Ÿ Perform BAC (Breath Alcohol Concentra on) test
Ÿ No fy the status
Ÿ Transfer the data to the base unit
125
Participant Handbook
Cortex Other
MCU Timer Sensors
CPU Peripherals
STM32L151
126
Foundation Skills in IoT
Flow intensity
Storage save
not acceptable Trigger random
data
Time Random
unit Scheduler Test test (30sec-30min)
Random meout
Hardware ini aliza on start BAC test, blow the Air in tube
1
Display message system
Display
ini aiza on
if air pressure message,
== standard “blow with
Measure the temp of Air flow more
tube, fuel cell, Flow valve pressure
intensity”
127
Participant Handbook
Wait ll
meout
Put device in standby mode and wait for the
meout due to rolling retest mer or random retest
me or ING ctrl mer.
128
Foundation Skills in IoT
Yes
Glow Green LED, do Audio buzzer Store Data in Local Flash
and Display “Test Pass”
Power ON
se Rese
Wait for rolling test data on serial port
qu t loc n
k_
en
ce ca o_ro
r_I llin
Hardware Read data Serial loc NG e g_te
unit Comm. k I ve st/
NG nt
ctr on U
V l. AR
NA Parse data
T
p er, ta to
am da
d t el BAC test Lock/Unlock Car igni on
p en lev
Ap ery ta evalua on LGN CTRL ctrl
Tamper ba C da
Monitoring BA
Data
Acquisi on sto
re
da
ta
to
flash
Naviga on Go to
Data Fuel Gauge Data standby System Wake Up
Rolling Test
level storage Standby
129
Participant Handbook
Start
Hardware in aliza on
If Yes
meout
event
No
Rtos unit
os Kernel ini alize
Kernel_call
Ini alize the RTOS Kernel
for crea ng objects Configured Free RTOS
kernel call
os Kernel ini alize
Start Scheduler()
Start the RTOS Kernel CMSIS core call
Create a idle task and
other task related init
130
Foundation Skills in IoT
3.1.4 Security
Security is handled mul fold in this case at mul ple cases and points:
Ÿ A handshake protocol is implemented at the boot me with a unique code stored in the SD card
that allows the system to boot up with registered hardware only.
Ÿ Tamper proofing: The unit is tamper proof at the cabinet level by sensing the tamper switch on
one of the GPIO pin. If the GPIO pin gets disconnected, the unit will stop func oning and would
not even reboot again.
Ÿ System level handshake security with the service sta on server interface: Here each system
checks the unique ID of the car unit before accessing the data from the system on Wi-Fi.
Ÿ AWS data security: The cloud data is maintained with unique access code and system password
for both write opera on and system level read opera ons.
131
Participant Handbook
132
Foundation Skills in IoT
3.2.1 Scenario
A very interes ng applica on of IoT in the automo ve domain is the monitoring health of the off-road
vehicles like tractors and earth moving equipment.
These vehicles are very expensive pieces of equipment and are put to use at far-off loca ons that are not
very easy to access. In case of break down at the work-site, it is very difficult to get the fault repair teams
to the loca on. The cost of loss of business due to off- me of the vehicles is very high.
Hence it is important for the stakeholders to be able to monitor the health of the vehicles regularly from
remote loca ons on an on-going basis.
IoT facilitates remote monitoring of the vehicle for various stake holders and enables proac ve support
to keep the machines in opera onal condi on and also provide data for design improvements to achieve
be er performance. The applica on requires use of sensors and instrumenta on of the tractor for
collec ng data and monitoring the health of the machine. The instrumenta on scheme and the details of
the arrangement are illustrated below.
133
Participant Handbook
3.2.2 Design
This IoT applica on is for monitoring the tractor performance from various objec ves. Let's have a look
at the design used to achieve this.
Ÿ The connected devices here are the Tractors.
Ÿ DAU electronic unit, an embedded system monitors the tractor systems.
Ÿ DAU is interfaced to GPRS or Wi-Fi connec vity.
Ÿ Wi-Fi communica on model and enabling technology is used because of long data range.
Ÿ Cloud based compu ng is also essen al to access data from different servers and support the
proposed GUI with the required data.
This system requires sensors to monitor various parameters. The following sensors are used in this
applica on:
Ÿ Vibra on sensor for engine mount and power train
Ÿ Temperature sensor- lube oil, hydraulic oil and coolant
Ÿ Pressure sensor – lube oil , hydraulic oil and coolant
Ÿ Level sensor - oil , coolant, fuel
Ÿ Load cell - accessories loading sense
Ÿ Sensors for general voltage, frequency (rpm), current, ba ery voltage
134
Foundation Skills in IoT
135
Participant Handbook
To support the informa on at various user centres, GPRS (General Packet Radio Services) will be essen al
for mul point access to transport the individual vehicle data to the customer site and share the data
through internet connec vity. The arrangement can be as below for a fleet of tractors.
E
/LT
4G
Internet Origina on 3G/
3G/ Points
4G/ 3G/4G/LTE
LTE
Telco Wireless
Network
Hardware
Hardware
ISP/Server Base
The data acquisi on unit, used in the tractor, is required to have GPRS interface to have the Internet
connec vity. GPRS / Wi-Fi will be used for communica on gateway to access the Internet.
Fig.3.13 – Connected workplace for off road opera ons through the Internet
136
Foundation Skills in IoT
3.2.4 Security
The current and future connected vehicles will have system modules and infotainment modules
connected to the Internet. This will pose many security problems which were not present before when
these vehicles were considered as standalone devices. Now with IoT applica ons growing, the vehicle is
one more node in the network of other personal and public devices.
The security of a connected vehicle closely resembles a combina on of the following:
Ÿ Mobile security
Ÿ IoT security
Ÿ Applica on security
Out of the three, 'IoT security' is rela vely new and has similar challenges as connected vehicles. So, the
approach towards securing a connected vehicle will require a framework which will adapt the processes,
techniques, technologies and best prac ces from the three fields men oned above.
Poten al Risks:
Ÿ Driver distrac ons (e.g. sudden unexpected volume, wipers’ ac va on), engine shutoff or
degrada on, steering changes (autonomous vehicles)
Ÿ Risk of wrong informa on fed to safety cri cal systems like steering, braking and vehicle
malfunc on alert modules
Ÿ Reduced or nil response rates to safety set thresholds or deployment of devices like airbags and
ABS brakes
Ÿ Manipula on of response to environment vectors like traffic and road inputs and vehicle RFID
devices
Ÿ Some Less Safety-Cri cal Vehicle specific risks such as
¡ The of the vehicle or contents
¡ Enabling physical crime against occupants
¡ Insurance or lease fraud
¡ Eavesdropping on occupants
¡ The of informa on (e.g. personal profile, phone list, bank details)
¡ Vector for a acking mobile devices in the car
¡ The of PII
¡ Unauthorized tracking of the vehicles and their loca on
Recommenda ons:
Hardware Security: Use of secure boot and so ware a esta on func on, trusted pla orm module,
tamper protec on, cryptographic accelerator, ac ve memory protec on, device iden ty directly on
device. (e.g. Intel EPID, physically un-cloneable func on)
So ware Security: Secure boot, par oned OS, module level authen ca on, enforcement of approved
and appropriate behavior, secure product development lifecycle.
137
Participant Handbook
Network Security: Message and device authen ca on, iden fy and enforce predictably holis c
behavior, access control.
Cloud Security: Secure authen cated channel to cloud, remote monitoring of vehicle, threat intelligence
exchange, OTA updates, creden al management.
Supply-chain Security: Authorized distribu on channel, track and trace components, con nuity of
supply, ability to iden fy uncer fied component.
Ba ery backup and SD card is provided to save limited data if there is a loss of power or connec vity.
Interface
to GPRS
DAU of the Tractor
GPRS
GPRS link
Gateway
GPRS
network Internet
Database
Base Sta on Firewall
138
Foundation Skills in IoT
139
Participant Handbook
Summary
1. Drinking and driving is one the main cause of road accidents. It is also important to know that
more than 70% of road accidents are due drunk driving.
2. Breath Alcohol Igni on Interlock Device (BAIID) employs sensors to test the breath sample and
the vehicle will start only if the alcohol concentra on (Breath Alcohol Concentra on) is below
the set point.
3. This system uses a handheld unit, a base unit and a cloud based data collec on and an analysis
unit.
4. A recent applica on of IoT in the automo ve domain is the monitoring of the health of off-road
vehicles like tractors and earth moving equipment.
5. These vehicles are very expensive pieces of equipment and are put to use at far-off loca ons that
are not very easy to access.
6. The cost of loss of business due to off- me of the vehicles is very high.
7. IoT facilitates remote monitoring of the vehicle for various stake holders and enables proac ve
support to keep the machines in opera onal condi on and also provide data for design
improvements to achieve be er performance.
8. The applica on requires use of sensors and instrumenta on of the tractor for collec ng data and
monitoring the health of the machine.
9. DAU electronic unit, an embedded system, monitors the tractor systems.
10. DAU is interfaced to GPRS or Wi-Fi connec vity.
11. This system requires sensors to monitor various parameters.
140
4. Use Cases – Medical/
Healthcare
Unit 4.1 – Automated BP Monitor
Unit 4.2 – Remote Pa ent Monitoring
Participant Handbook
142
Foundation Skills in IoT
4.1.1 Scenario
IoT applica on in medical electronics has been overwhelming and likely to grow in leaps and bounds in
the coming years. This can provide innumerable advantages for providing mely a en on by the doctor
and paramedical staff. The Internet of Medical Things (IoMT) is the collec on of data from medical
devices and applica ons that connect to healthcare IT systems through online computer networks.
Medical devices equipped with Wi-Fi allow machine-to-machine communica on.
IoT devices link to cloud pla orms on which captured data can be stored and analysed.
Following can be the future developments:
Ÿ Remote pa ent monitoring of people with chronic or long-term condi ons
Ÿ The loca on of pa ents admi ed to hospitals
Ÿ Pa ents' wearable mHealth devices, which can send informa on to caregivers
Informa on gathered can connect to analy cs dashboards typically as devised for the telema cs. There
are now more possible applica ons of IoT than before because many consumer mobile devices are built
with Near Field Communica on (NFC) Radio Frequency Iden fica on (RFID) tags that allow the devices
to share informa on with IT systems.
143
Participant Handbook
Accelerometer
Headbands
ALT Al meter
ECG
Digital camera
EMG Electromyogram
EEG Electroencephalogram
Camera clips
Electrodermograph
Loca on GPS
Smartwatches
Microphone
OXI
OXI Oximeter
Bluetooth proximity
Sensor embedded in clothing
Thermometer
144
Foundation Skills in IoT
Data Storage
A
Headbands
ECG
Camera clips
is
Headbands
s
ECG
aly
Command/RFI
Smartwatches
Sociometric badges
OXI
An
Camera clips
ECG EMG
ALT
Smartwatches
ta
OXI
Da
Headbands
Sensor embedded in clothing
ECG
ECG EMG
ALT
ta
Sociometric badges
Da
Camera clips
Smartwatches
OXI
ECG EMG
ALT
Pa ent
Co
m
Gateway
m
an
Internet Network
d/
In
str
cu
on
Doctor
Nurse
145
Participant Handbook
4.1.2 Design
The process cycle gets ini ated with one press of the start bu on. The process cycle involves pressurising
the cuff, establishing the systolic pressure and diastolic pressure levels along with heart beat. At the end
of the cycle this data is presented on the display panel and also gets stored in the memory. Last 10
measurements are stored. The stored data is recallable through memory recall bu on. The process is
managed by a microcontroller to turn ON / OFF the motor – pump for pressurising the cuff; read the
pressure transducer and deduce the systolic and diastolic pressure.
1. Memory recall
bu on
LCD
P - Pump 2. Start/Stop bu on
M - Motor P M panel
3. DI - Discrete
V - Valve display
Micro Input
PT - Pr Tdr
controller
PS - Power PT Mains
supply DI 1 2 adaptor
V
Drivers for
the motor
and
I/F to the cuff
solenoid PS board
valve
Power pack
- This device can be connected through IoT applica on using an RFID to Ethernet and then to a
local hub as it is not a mobile pla orm.
- This is proposed using RFID tag on the BP monitor to connect to a hub as a number of BP
monitors are expected to be in use in a health care centre.
146
Foundation Skills in IoT
Ethernet
RFID
Reader
Ÿ Wired LAN may be used and the internet access is through the Ethernet
Ÿ Tags are to be a ached to the BP monitor. Two types of tags are available i.e., Passive and ac ve
tags.
Passive Tags
– Do not require power – draw power from the Interrogator field
– Lower storage capaci es (few bits to 1 KB)
– Shorter read ranges (4 inches to 15 feet)
– Usually 'Write Once Read Many'
Ac ve Tags
– Ba ery powered
– Higher storage capaci es (512 KB)
– Longer read range (300 feet)
– Typically can be rewri en by RF Interrogators
147
Participant Handbook
Reader
Antenna
Power from RF field
Reader -> Tag Commands
Reader
RFID Communica on
Channel
148
Foundation Skills in IoT
In a Hospital or outpa ent environment a number of BP monitor devices may be connected to the
Internet through a RFID reader and data collected by the machine is uploaded via an Internet gateway to
a cloud based storage server. This data is shared and processed by an applica on layer and made
available to authorised users like medical and hospital staff. Output is used for medical diagnosis and
resul ng treatment advice and alerts are transmi ed to pa ents and pa ent responders via the cloud
and internet gateways to mobile devices.
Analy cs
A Data Srorage
Remote
sis
ly
a
An
Command/RFI
Analysis
ta
Da
ta
Da
Co
m
Gateway
m
an
Internet Network
d
/I
nst
ru
c
on
Doctor
Nurse
149
Foundation Skills in IoT
4.1.4 Security
The cyber security posture of medical devices has increasingly become a concern to healthcare
providers, device manufacturers, regulators and pa ents. Due to their long useful life, unique care-
cri cal use case and strict regulatory oversight, these devices tend to have a low security maturity,
significant vulnerabili es and an overall high suscep bility to security threats.
Poten al risks:
Typical risks of security breaches and compromise of data can be broadly categorized as:
- The of Pa ent records including Pa ent Health Informa on (PHI) , social security numbers,
passwords, billing details, insurance records, etc. which can be used to cause damage to privacy
and financial loss to stake holders.
- Ransomware and malware a acks on the cri cal life and health support systems through
connected devices like wearables, in-plants, portable and mobile devices.
- Malfunc on and infec on of cri cal devices in a pa ent health support system causing
malfunc on or disablement due to malware which can put pa ents at risk.
Some Proposed Measures:
Ÿ For mobile and wearable devices:
- Enabling remote lock and wipe, to easily remove unauthorized users from the enterprise
system or to erase content of the device in case of the
- Ensure secure authen ca on, secure boot and access management of the device
- Enforcement of data encryp on
- Enforcement of device-level passwords
- Monitoring the opera ng system's integrity to avoid jailbreak and roo ng procedures
- Secure email and a achments to prevent malware being spread from personal accounts
- Prevent installa on of untrusted apps
- Log devices and ac ons for audit and manage allowed access of mobile assets
Ÿ For device manufacturers:
- Take steps to limit unauthorized device access to trusted users only, par cularly for those
devices that are life-sustaining or could be directly connected to hospital networks.
Appropriate security controls may include: user authen ca on, for e.g. user ID and password,
smartcard or biometric; strengthening password protec on by avoiding hard-coded
passwords and limi ng public access to passwords used for technical device access; physical
locks; card readers and guards.
- Protect individual components from exploita on and develop strategies for ac ve security
protec on appropriate for the device's use environment. Such strategies should include mely
deployment of rou ne, validated security patches and methods to restrict so ware or
firmware updates to the authen cated code.
150
Foundation Skills in IoT
- Use design approaches that maintain a device's cri cal func onality, even when security has
been compromised, known as “fail-safe modes”.
- Provide methods for reten on and recovery a er an incident, where security has been
compromised. Cyber security incidents are increasingly likely and manufacturers should
consider incident response plans that address the possibility of degraded opera on and
efficient restora on and recovery.
Ÿ For healthcare facili es:
- The FDA is recommending that steps should be taken to evaluate network security and protect
hospital system.
- In evalua ng network security, hospitals and healthcare facili es should consider:
Ÿ Restric ng unauthorized access to the network and networked medical devices
Ÿ Making certain that appropriate an virus so ware and firewalls are up-to-date
Ÿ Monitoring the network ac vity for unauthorized use
Ÿ Protec ng individual network components through rou ne and periodic evalua on,
including upda ng security patches and disabling all unnecessary ports and services
Ÿ Contac ng the specific device manufacturer if there is a cyber security problem related to a
medical device. If you are unable to determine the manufacturer or cannot contact the
manufacturer, the FDA and DHS ICS-CERT may be able to assist in vulnerability repor ng and
resolu on
Ÿ Developing and evalua ng strategies to maintain cri cal func onality during adverse
condi ons
151
Participant Handbook
4.2.1 Scenario
The healthcare sector is growing at a rapid pace and the need for reliable health services is also in
demand. In India na onal spending for Healthcare has reached up 4.7% of GDP. Healthcare costs are on
the rise globally. The two major pointers of healthcare sector are quality of the products offered and the
access to good healthcare centers. The growing burden of chronic diseases is driving healthcare players
to look for alterna ve ways to help pa ents with chronic illness in managing their condi on.
Home monitoring mechanism wherein physicians and pa ents are closely connected is being adopted in
developed countries. This system promotes adherence to treatment and ensures that an early ac on can
be ini ated. This system also reduces the cost of hospitaliza on.
152
Foundation Skills in IoT
Tele-health applica ons remotely connect providers and pa ents. This system u lizes remote
monitoring devices and electronic recorders.
Benefits of remote healthcare solu ons:
- Reduced hospital re-admissions and lengths of stay
- Fewer emergency room visits
- Lower cost of chronic disease care
- Improved self-management of health condi ons
- Timely, affordable and convenient access to care, wherever and whenever it's needed
- Proac ve support when it is medically necessary
- Enhanced pa ent quality of life
4.2.2 Design
No fy Visualiza on
++
re
Personal A
Popula on Health
Body A
++
Biometrics Aggregated Data
Implanted Chronic Web Portal ++
Condi on Feedback Alerts Care Coordina on
- Email HCO System
Wearable - SMS
Fitness Mobile Apps - Telephone Health Coaching
and Devices - Mail
Virtual Visits
Home 4 No fy
153
Participant Handbook
154
Foundation Skills in IoT
BP Blood Pressure
155
Participant Handbook
156
5. Use Case - Aerospace
Unit 5.1 – Control, Data Linking and Monitoring
Participant Handbook
158
Foundation Skills in IoT
5.1.1 Scenario
Unmanned Aerial Vehicles (UAVs) are at the forefront of an evolu on. These unmanned systems are no
longer primarily associated with war and combat situa ons. With a deadline of Sept. 15, 2015 for full
integra on into U.S. airspace, it is highly likely that UAVs will play an increasing role in their cri cal
infrastructure opera ons.
Industries such as public safety, land/ crop surveying and oil /gas are being eyed as key markets that can
benefit from the use of unmanned systems for monitoring and surveillance. For several applica ons such
as wildfire monitoring and border protec on, UAVs can even be used to protect people and save lives.
The related system for the IoT applica on for UAVs is targeted towards the Avionics for flight control and
data link and mission monitoring systems. The onboard Flight controller receives and transmits flight
data to the ground base sta on to enable the control of the flight parameters and achieve mission
objec ves. The data link acquires data from video and camera sensors which is fed to the base sta on for
analysis and record. Video data may also be used for manual mission control of the aircra or with the
auto pilot mode. The IoT systems may enable ‘aircra to aircra ’ and ‘aircra to base’ communica on.
159
Participant Handbook
5.1.2 Design
Pitot tube
Fig.5.2 – Flight control and data links with sensors and actuators
The electrical power for the UAV systems is managed by two Lithium Ion Ba eries for powering the
propulsion motor through Electronic Speed controller (ESC) and other avionics. The other ba ery is used
to provide power to avionics and also acts as a backup power during cri cal situa ons.
160
Foundation Skills in IoT
Cruise Cruise
Ascent
Descent
Take off Landing
Propulsion system:
The Propulsion system is driven by an electric motor. An electronic speed controller (ESC) with current
control capability is used for speed control of the motor. The ESC with a BEC (Ba ery Eliminator Circuit) is
chosen to provide a redundant power supply to the Auto pilot. This takes care of a single point failure due
to the power supply in comple ng the mission by the UAV.
161
Participant Handbook
The following sensor inputs support to the control law for flight control and auto pilo ng:
Ÿ Rate inputs from the 3 axis accelerometers and gyro package
Ÿ Air data from pitot sta c pressure sensor
Ÿ Heading from 3 axis magnetometer and GPS
Ÿ Naviga on inputs from GPS
The FC/AP unit houses the rate gyro and accelerometer pack (Iner al Measuring Unit – IMU), the
magnetometer, the GPS receiver with an ac ve antenna. Addi onal external GPS antenna will improve
the GPS recep on. Hence an external GPS antenna is also added. A pitot tube mounted at the leading
edge of the wing is integrated to FC/AP to support the naviga on func on and air data measurement and
calcula on. The FC/ AP have to be located at the Centre of Gravity (CG) of UAV for correct sensing of the
rate inputs.
Apart from flight control and auto pilo ng the FC/AP performs the following func ons:
Ÿ Monitor the Electrical power supply voltage and current for the propulsion motor and its rpm
Ÿ Release signal (PWM) for the parachute
Ÿ Storage of the flight plan
Ÿ Data logging
Ÿ Nose wheel steering
10 servo drives are used by the AP for the following controls:
Ÿ Rudder LH
Ÿ Rudder RH
Ÿ Aileron LH
Ÿ Aileron RH
Ÿ Elevator
Ÿ Nose wheel steering
Ÿ Propulsion motor rpm control
Video Transmi er Unit:
A camera sub system is interfaced with a video transmi er unit and operates at 5.8GHz.
This will enable the sharing of informa on and collec on of data from UAVs at different loca ons for
monitoring. Each UAV will be a device with internet connec vity. Ac ons can be pre-programmed for
opera on in autonomous mode as is the case for defence or disaster response systems.
162
Foundation Skills in IoT
The UAVs are flown with pre-programmed flight plan so that they are self-contained in their flight path
and land automa cally at the end of the plan. The data covering the onboard system status alerts and the
images they capture are shared through GPRS, Wi-Fi and internet connec vity.
3G/4G/LTE
Telco Wireless
Network
Hardwire
Hardwire
163
Participant Handbook
Ÿ UAV: Id, A tude of UAV – Pitch, Roll, Yaw, Heading, Loca on (GPS), Video (as captured by UAV),
Ground speed.
Interface
to GPRS
Firewall
Base Sta on
5.1.5 Security
The access is protected and secured for the authorised stake holders with passwords and encrypted data
links. Safety is the top priority for agencies like the FAA for the opera on of UAVs and Aircra par cularly
as it relates to secure and reliable Command and Control (C2) links and sense and avoid tac cs. Aircra
without reliable (C2) links are vulnerable to mission failure, hazardous flight and hacking.
There are a number of (C2) link solu ons which have been used. Machine to Machine (M2M) wireless
solu ons are also available using mul ple frequency op ons.
Some of the Key considera ons for secure (C2) links that need to be incorporated are:
Ÿ Access control measures by Authen ca on, Authoriza on and Accoun ng offered with secure
access control prevents unauthorized intrusion and hacking.
Ÿ Advanced Data Encryp on and the Federal Informa on Processing Standards (FIPS) which
specify publica on 197 for Advanced Encryp on Standard (AES) for cryptographic algorithms to
protect electronic data. FIPS 140 specifies 4 levels of security for cryptographic modules from 1 to
4 each building on the previous level and adding stricter measures.
164
Foundation Skills in IoT
Ÿ Advanced wireless technologies like frequency hopping spectrums that can hop to avoid
detec on and mul ple user defined cryptographic keys which allow user to change key posi ons
on demand.
Ÿ Use of established wireless service providers who can provide secure networks with the above
enablers.
AP Auto pilot
CG Center of Gravity
FC Flight Control
165
Participant Handbook
166
6. Use Cases -
Transporta on
Unit 6.1 - Smart Transporta on
Participant Handbook
168
Foundation Skills in IoT
6.1.1 Scenario
Smart transporta on is the result of technological advancements in mobile terminals and automo ve
electronics. This intelligent system is genera ng huge data in urban areas and posing a challenge for data
storage and data analy cs.
The real me intelligent system is designed to analyze the following:
Ÿ Vehicle recogni on – plate number, plate colour, car body color, car logo etc.
Ÿ Clothing feature recogni on – clothing colour of upper and lower body
Ÿ Face detec on – face detec on in the image
Ÿ Behavior detec on – running, hi ng the line, intruding the region, going against the traffic rules
169
Participant Handbook
A special system needs to be designed to handle the challenge of data storage and data analy cs
Parking
informa on
Accident
Road video
data
Photographing Communica on
Hardware device
Opera ng system Terminal
Travel path Railway symbol
Scheduling status
170
Foundation Skills in IoT
This transport solu on provides a good pla orm for data storage and analysis.
6.1.2 Design
This transport solu on uses frontend devices like web camera and NVR (Network Video Recorder) and
backend devices like data centers. Data acquisi on and data storage are considered as frontend tasks
and data analysis as a backend task.
Frontend technology:
Intel Atom and Intel Core processor pla orms are used considering high performance, high reliability
and high scalability. The intelligent network video recorder which is compa ble to Intel processor is used.
The intelligent network video recorder will have a unique IP address. Some specifica ons of such
recorders are provided below:
- 128 –way HD access
- 348 Mbps access
- 256 Mbps storage
- 384 Mbps forwarding
- To support advanced video coding format (H.265/H.264/MPEG4/2-way HDMI and 1- way VGA)
Backend technology:
Big data processing technologies such as Spark and Hadoop architecture is used for real- me data
acquisi on and summary. Real- me data analysis and offline mining of large data can also be processed
using the same architecture.
Big data processing system includes:
- Batch Layer
- Speed Layer
- Servicing Layer
171
Participant Handbook
Real- me Fake
Traffic Plate ...., etc.
Sta s cs Detec on
Algorithms
& Learning
Frameworks
Spark Real- me, Streaming Analysis
(Spark Streaming)
Based
Analy cs
Pla orm User Interface
Alert & Query
Compute (spark) Interface
Web Service/App
Load Balance & Data
Input (Ka a)
Storage (HDFS, HBase)
Data Pla orm (”Plumbing”)
We have seen that big data processing system includes 'Speed Layer', 'Batch Layer' and 'Servicing Layer'.
Now we will see tasks performed by various layers of big data processing system.
Speed Layer
The following tasks are performed by the Speed Layer:
- Real- me streaming analysis
- Process streaming data received from devices
- Advanced analy cal applica on
The real- me data will be saved as Hbase and is called as 'History data'.
172
Foundation Skills in IoT
Batch Layer
Spark compu ng engine is u lized for batch pre-computa on of data. The results of pre-computa on
are stored in Hbase. This data can be used by Servicing layer.
Servicing Layer
The Servicing layer can check the history data and batch processing view through Hbase interface.
Servicing layer can also use Spark or Spark SQL compu ng engine to realize sta s cal query func on.
service network
Recogni on
query
Data input
Pla orm Pla orm photo server
database
Cloud storage
cloud compu ng
pla orm O&M client
173
Participant Handbook
The Spark system architecture can perform ac vi es like processing, streaming compu ng and real- me
analysis. Interac ve compu ng can support more complex machine learning and image processing
algorithm.
Results :This system is successfully implemented in one big city and has the capacity to process 1.5
million pieces of data each day
174
7. Use Cases - Energy
Unit 7.1 - Smart Mesh
Unit 7.2 - Condi on Based Maintenance of Distribu on Power
Transformers
Participant Handbook
176
Foundation Skills in IoT
7.1.1 Scenario
Electrical grid is a network of devices func oning together to transmit the electricity from one loca on to
another. Lots of challenges have been discovered over the years that bring out the need for automa on,
digi za on and analy cs in most func ons of the grid. To make a grid smart, it is required to make each
and every unit smart (communica on enabled and connected most of the me).
One can imagine the amount of data being generated from each electricity meter and being transmi ed
to a centralized loca on as well as the me required to process this huge amount of data. An important
aspect of smart grid is a strong communica on backbone that should enable collec on of data from each
meter with minimum latency.
This is an end to end implemented solu on to digitally monitor overall opera ons of a smart grid. It
ensures that all devices in a smart grid are connected all the me on a wide area communica on
network.
7.1.2 Design
177
Participant Handbook
B. So ware
1. Firmware for edge gateway
Ÿ It is the embedded analy cs algorithms for data cleansing, prepara on and
preprocessing.
Ÿ It forwards data to centralized database hosted in cloud environment.
2. Repor ng Applica on
Ÿ It enables u li es to region wise monitor overall opera ons including outages, energy
the , billing, communica on status, load profiling etc.
Ÿ It provides user managements – role based dashboards.
178
Foundation Skills in IoT
Tri-axial Accelerometers
Ÿ Type of Measurement - Current
Ÿ Type of Measurement - Tri-axial caps Ÿ Loca on of Moun ng - Input Line
Vibra on Ÿ To Capture the current pa erns during Start, stop
Ÿ Loca on of Moun ng - Bearing, and con nuous opera on of equipment
Founda on/Overall
Nature of Faults Detected
Misalignment & Looseness Bearing Fric on
C. Communica ons
1. Implemented 802.11s protocol for communica on over Wi-Fi mesh network.
2. Cellular – 3G/LTE connec vity.
3. Ethernet connec vity.
4. Proprietary protocols implemented to form a Wi-Fi mesh network of meters and edge
gateway mounted on transformer.
5. Communica on modules to transmit data from edge gateway to central loca on database in
cloud environment.
D. Analy cs
1. Energy consump on trends at each level i.e. circuit, transformer and meter.
2. Energy the detec on and revenue loss calcula ons.
3. Outage detec on and trends.
4. Communica on network response rate monitoring.
5. Cri cal assets repor ng on priority.
6. Load profiling and energy usage.
179
Participant Handbook
Digital technology that allows for two-way communica on between the u lity and its customers. The
sensing along the transmission lines is what makes grids smart. The purpose of infusing controls and
automa on is to respond digitally to our quickly changing electric demand such as:
Ÿ More efficient transmission of electricity.
Ÿ Quicker restora on of electricity a er power disturbances.
Ÿ Reduced opera ons and management costs for u li es and ul mately lower power costs for
consumers.
Ÿ Reduced peak demand, which will also help lower electricity rates.
Ÿ Increased integra on of large-scale renewable energy systems.
Ÿ Be er integra on of customer-owned power genera on systems, including renewable energy
systems.
Ÿ Improved security.
Ÿ Giving customers control – the right informa on and tools to make intelligent energy choices and
track consump on usage in real- me.
180
Foundation Skills in IoT
Further reading:
What is a mesh network?
h ps://en.wikipedia.org/wiki/Wireless_mesh_network
Ÿ Smart Meters act as internet hubs, providing connec vity to households. It is also an addi onal
source of revenue for u lity providers.
Ÿ Connec vity to the en re smart city ecosystem: Street light control using daylight sensors, clean
energy programs, automated tracking and billing at automobile charging points.
Ÿ Single unified interface for energy monitoring: The en re city's networks of transformers are
wirelessly connected and their data is pushed to the cloud in real- me. Operators have access to a
single, unified interface to view an en re city's consump on pa erns.
Ÿ Analy cs for con nuous energy supply: Load profiling and real- me analy cs help determine
the energy needs to provision for adequate power supply, maintain con nuous up me during
peak demand and also control power losses in transmission lines.
Ÿ Remote monitoring of cri cal power machinery: At every stage of the power genera on and
transmission process, cri cal machinery is remotely monitored in a central control sta on. Any
anomalies are picked up at a nascent stage and rec fied during a planned and scheduled
maintenance.
181
Participant Handbook
7.1.4 Security
182
Foundation Skills in IoT
183
Participant Handbook
7.2.1 Scenario
Power transformers are an integral part of any power distribu on network. Owing to humongous capital
and maintenance cost involved for this equipment, there exists a huge scope to op mize expenses
thereby improving the revenue.
Where do distribu on companies struggle ?
Ÿ Unavailability of dashboards or tools to visualize the status of mul ple parameters associated
with power transformers.
Ÿ Unforeseen failures in transformers leading to down me and penalty.
Ÿ Loss of asset life due to con nuous faults/failures.
Ÿ Poor maintenance planning.
Ÿ Unavailability of advanced solu ons to monitor the health of transformers.
184
Foundation Skills in IoT
7.2.2 Design
The proposed model dwarfs the limita ons with respect to the operator's capability, limited input data,
absence of intelligent monitoring devices and inability to correlate mul ple test results.
The model is based on developing an adap ve tes ng/maintenance plan based on the transformer's
history and domain exper se instead of adhering to a sta c tes ng plan. In this way, the distribu on
company can op mize maintenance cost and avoid poten al failures.
Mul ple tests are conducted as per the adap ve tes ng plan and the results are updated to a central
database from which the model fetches data for analysis. The reports are analyzed simultaneously and
various calculated parameters are evaluated for determining health index of the transformers. In case of
poten al faults or failures, the type of fault is iden fied before evalua ng the calculated parameters.
Dashboards are the most important part of this model which visualize at the trending of various test
parameters and calculated parameters. They customize the quan ty of data to be displayed as per the
requirement. Based on the analysis, the model updates the adap ve tes ng plan and the next test date is
determined.
Following parameters/tests are considered for this model building:
Ÿ Dissolved Gas Analysis (DGA)
Ÿ Oil Sample Test (OST)
Ÿ Loading history
Ÿ Winding Hot spot and Top Oil Temperature
Ÿ Degree of polymeriza on or Furanic compound analysis
185
Participant Handbook
186
Foundation Skills in IoT
7.2.4 Security
1. Device Level Security: Devices are connected into the network with unique and dedicated
device IDs.
2. Firmware level security: Data encryp on from source (hardware) using SSL.
3. Applica on Level security : Hierarchy level access to data for relevant stakeholders using login
and password creden als.
187
Participant Handbook
188
8. Use Cases - Retail
Unit 8.1 – Retail Sensor Pla orm
Unit 8.2 – Smart Black Box
Participant Handbook
190
Foundation Skills in IoT
8.1.1 Scenario
According to reports, inventory distor on in the form of overstock, stock out and shrinkage represent
over $ 1 trillion worth of losses for retailers worldwide. It is also es mated that, poten al impact of IoT on
retail will range from $140 billion to over $1 trillion by 2025.
In 2015, Intel began working with the clothing manufacturer Levi's in a proof of concept to deliver near
real- me inventory monitoring in the Levi San Francisco store. Intel is marke ng this solu on as 'Retail
Sensor Pla orm'.
8.1.2 Design
RFID tags are placed on all items in the store. Data readings are forwarded to the Intel gateways and then
pushed back to back-office systems for cloud based analy cs.
The system consists of the following:
Ÿ The Intel Retail Sensor Pla orm.
Ÿ An Intel based gateway located at the back end of the store for forwarding the data to the cloud.
Ÿ The Trusted Analy cs Pla orm (TAP) is the part of the cloud based solu on. It provides tools,
algorithms, and engines to work with data scien sts to conduct advanced analy cs.
Ÿ External APIs which enables so ware developers and solu on providers to integrate new and
adjunct applica ons such as inventory loca on tracking.
191
Participant Handbook
RFID antennas are always on, gathering and dissemina ng the Stock Keeping Unit (SKU) level data on
constant basis. Since the system is con nuously scanning for products, it is able to locate and account for
every item on the sales floor at any given me.
The system provides alerts to allow stock to be replenished when running low. Once the plug and play
device is connected to an Intel gateway, via one wire, it begins collec ng and forwarding the inventory
informa on.
Intel is also developing sensor capabili es with video analy cs to analyse the way customers move in the
store, to help the retailer op mize the layout and placement of merchandise.
Results and Benefits:
1. Visibility of inventory in real- me to improve efficiency.
2. Reducing inventory costs.
3. Improved understanding of customer behavior.
4. Iden fying new usage models and retail applica ons.
5. Be er customer experience.
192
Foundation Skills in IoT
8.2.1 Scenario
There is a growing concern about the decline of the vending industry. Sales are lost because of customers
preferring new ways of buying such as touch screen kiosks.
'Smart Black Box' solu on accommodates the new features that the customer wants such as cashless
payments, touch screens, etc. This solu on also enables vendors to respond to consumer tastes rapidly.
8.2.2 Design
This solu on incorporates mul ple hardware- based components onto a single so ware based pla orm.
Smart Black Box solu on has new features to help customers and vendors.
Customers:
Ÿ Cashless payment op ons.
Ÿ Touch screen op on to make selec ons.
Ÿ Interac ve digital signage.
Vendors:
Ÿ Remote management with online monitoring and diagnos cs.
Ÿ Reliable remote monitoring of temperatures for hot or cold beverages.
Ÿ Reliable data to base product and campaign data analy cs.
Ÿ New technologies for customer loyalty, including using a smart phone app that allows machines
to communicate with customers through beacon technology.
193
Participant Handbook
The box is based on the Intel Vending Reference Pla orm, a secure architecture that streamlines systems
and protocols and powered by Intel vPro processor.
The network connec vity part of the solu on is provided by Jersey telecom. A SIM management
pla orm provides real – me connec vity status and control.
The hardware is based on Intel's low power dual-core i7-3571UE processor, integra ng graphics and
suppor ng several display interfaces. The system uses the solid state Drive 520 series. It consolidates
several func ons onto a single Intel processor board, thereby lowering the total cost of the system.
The vending machines have a range of built-in capabili es including Bluetooth connec vity and social
media links. Touch screens replace bu ons to allow users to navigate through product informa on and
make selec ons. The machines also accept credit and debit cards.
The system comprises of AVA (Anonymous Viewer Analy cs), AIM counter (a viewer capable of recording
and analysing a video stream of the customer) and a web based repor ng system allowing data analysis.
All this comes with a cloud based licence and sensor management system.
The AVA feature uses an op cal sensor to view the customer and detect purchase choices and dwell
mes. The brand markets can use this informa on to ascertain the effec veness of their ads.
Results and Benefits:
Ÿ Supplier
o Real – me data on the machines, such as when to restock or when to collect cash.
o This solu on also provides faults alerts.
Ÿ Brand Marke ng
o The brand owner can ghten the supply chain, enabling just in me delivery Losses due to
overstocking significantly reduced.
194
Foundation Skills in IoT
The basic requirement for this applica on is Intel- dual core i7-357UE processor
195
Participant Handbook
196
9. Use Cases –
Manufacturing
Unit 9.1 - Condi on Based Maintenance of Rota ng Equipment
Participant Handbook
198
Foundation Skills in IoT
9.1.1 Scenario
Typical challenge in any industry is related to maintenance of cri cal assets e.g. 'Homogenizer' in food
processing industry, 'Transformers' in electrical grid, 'Compressors and Conveyors' in manufacturing
industry. Most industries follow a periodic and preven ve maintenance strategy to maintain these
cri cal assets. This approach leads to unnecessary maintenance ac vi es without assessing the current
condi on of the asset.
This use case details IoT applica on in maintenance of equipment.
9.1.2 Design
The solu on is a complete end to end solu on that enables plant managers to op mally design the
maintenance strategy based on the actual condi on of the asset there by reducing overall maintenance
cost.
The solu on consists of various components such as smartedge gateway having inbuilt fast data
acquisi on modules, integrated analy cs algorithms, advance data compression and storage methods
etc. Data acquisi on is done at the sampling speed of 20 KHz.
199
Participant Handbook
Going beyond the preven ve maintenance strategy, a condi on based predic ve maintenance solu on
has been developed that gives addi onal me for plant managers to plan the maintenance ac vi es for
the cri cal assets adequately. Validated machine learning based algorithms for various types of machine
e.g. motor, pumps, compressors, etc. have been developed.
These algorithms quan fy the current condi on of assets on which cost effec ve decisions can be taken.
Poten al Areas of Machine Failure:
Ÿ Noise
Ÿ Loose parts
Ÿ Low oil
Ÿ Misalignment
Ÿ Tight parts
Ÿ Defec ve parts
Ÿ Wear and tear of matching parts
Ÿ Bent cranksha
Ÿ Overloading
Benefits of predic ve maintenance strategy:
Ÿ Op mal maintenance schedule
Ÿ Reduced unplanned produc on down me
Ÿ Extended opera ng life of machines
Ÿ Reduced quality issues such as rejec on and rework
Ÿ Be er planning and inventory maintenance of op mal level, which helps in budge ng and
ensuring availability of spare parts
Condi on Monitoring Applica ons:
Ÿ Heavy industrial equipment with high KW ra ng
Ÿ Oil pumps
Ÿ Hydraulic systems
Ÿ Automo ve engines
Ÿ Truck and Off Highway Vehicles
200
Foundation Skills in IoT
Rota ng Equipment
Ÿ CBM hardware with sensors
connected externally on to the
equipment Field
Ÿ Data is captured and processed
Technician
Actual
internally in the gateway before Accessibl form phone/Tablet
transmi ng to local server or cloud Maintenance
Repor ng:
Mobile App
201
Participant Handbook
Fig.9.2 – Dashboards
202
Foundation Skills in IoT
9.1.4 Security
203
Participant Handbook
204
10. Use Case - Logis cs
Unit 10.1 - Warehousing Opera ons
Unit 10.2 - Freight Transporta on
Participant Handbook
206
Foundation Skills in IoT
10.1.1 Scenario
The objec ve of any logis cs company is to deliver goods to the customer within the promised me and
in good condi on. The goods are collected from various loca ons and stored at warehouses. The goods
are dispatched to the consignee from warehouses located at strategic loca on. Warehousing plays a very
cri cal role in the en re supply chain, however, in today's economic scenario, warehousing serves as a
key source of compe ve advantage for logis cs provider who can deliver fast, cost-efficient and
increasingly flexible warehousing opera ons for their customers.
Warehousing opera on is not an easy task as it involves mul ple types and forms of goods. Every inch of
a warehouse should be op mally u lized to store, process, retrieve and deliver goods as fast as possible.
This is not possible without technological interven on. This requires a strong pla orm to perform all
these opera ons. Modern warehouses contain many 'dark assets' that can be connected and op mized
through IoT.
207
Participant Handbook
10.1.2 Design
Pallet or item level tagging is carried out using low-cost, miniscule iden fica on devices such as RFID.
This will pave the way for IoT driven smart inventory management.
Wireless readers capture data transmi ed from each pallet as it arrives through the inbound gateways.
The data will include informa on on the product such as volume and dimensions. This data is aggregated
and sent to Warehouse Management System (WMS) for processing.
This system reduces the effort of manual accoun ng and volume scanning of pallets. Cameras are
a ached to the gateways to detect damages by scanning pallets for imperfec ons.
208
Foundation Skills in IoT
Once the pallets are moved to the right loca on, tags transmit signals to the WMS to provide real- me
visibility into inventory levels thus avoiding out of stock situa on. In case of any misplacement of items,
sensors send alert to the warehouse manager to track the item's exact loca on for correc ve ac ons.
Sensors monitor the condi on of an item and alert the warehouse manager when the temperature or
humidity thresholds are to be compounded. This would allow warehouse staff to take correc ve ac on,
ensuring service quality and greater customer confidence.
For the outbound delivery, pallets are scanned through an outbound gateway, to ensure that right items,
in the right order for delivery are being sent. Stock levels are updated automa cally in the WMS for
accurate inventory control.
IoT can also be used for op mal asset u liza on. Machineries and vehicles are connected to the central
system thus enabling managers to track all the assets in real- me environment. Managers will get alerts
if an asset is being over u lized or underu lized so that, they can take correc ve ac ons.
Connected assets in a warehouse also enable predic ve maintenance for warehouse transport system.
Higher levels of worker health and safety can be achieved by using IoT. Sensors and actuators combined
with radar or cameras a ached to the forkli can allow them to communicate with other forkli s and
scan the environment for hidden objects that could cause collusion.
IoT can also be used to achieve other benefits in smart warehousing.
209
Participant Handbook
Desktop Applica on
210
Foundation Skills in IoT
10.2.1 Scenario
The major challenge for any Logis cs company is to track and monitor the freight or shipment cargo as
goods are dispatched through various modes of transport including road, sea and air. The logis cs
operator is also responsible to deliver the goods in good condi on. The logis cs company may get lot of
queries from the consignee regarding the delivery of their goods and current status.
With hundreds of thousands of oceans, air and road assets, freight transporta on presents a great
poten al for IoT network. Today it is already possible to track and monitor a container in freight and
shipment in a cargo.
211
Participant Handbook
An IoT applica on pla orm should have be er features for tracing and tracking which should be faster,
accurate, predic ve and secure.
The challenge faced by the logis cs industry is that the solu ons provided so far are proprietary and the
solu ons cannot communicate with each other. There is a need to create a new pla orm using exis ng
hardware and so ware capabili es. The solu on should provide end-to-end integrity of supply chains.
10.2.2 Design
Agheera, a real- me tracking solu on provider, has developed an open pla orm for connec ng various
telema cs and sensor hardware devices to consolidate data across different applica ons and modes.
The pla orm merges mul ple assets such as a connected swap body or truck into one easy-to-use portal
with worldwide accessibility, allowing logis cs providers and customers to track all assets and their
various devices at once.
212
Foundation Skills in IoT
Through IoT, logis cs providers will gain clear visibility on the movement of goods — meter by meter and
second by second — as well as item-level condi on monitoring to ensure that goods arrive in me, at the
right place and intact.
As we have seen, loca on and condi on monitoring through IoT will provide a new level of transport
visibility and security. Telema cs sensors in trucks and mul -sensor tags on items transmit data on the
loca on, condi on (whether any thresholds have been crossed) and if a package has been opened (to
detect possible the ).
213
Participant Handbook
Through IoT, logis cs providers will gain clear visibility on the movement of goods — meter by meter and
second by second — as well as item-level condi on monitoring to ensure that goods arrive in me, at the
right place and intact.
214
11. Use Cases - Agriculture
Unit 11.1 – Calving
Unit 11.2 – Increasing Yield
Participant Handbook
216
Foundation Skills in IoT
11.1.1 Scenario
Calving is a stressful me for farmers. Almost one in 14 calves die during the birth. Un l now, the only way
to improve these odds was to keep watch over the expectant cow around the clock.
Animal welfare company Moocall has developed a remote monitoring solu on for pregnant cows. This
simple solu on is based on the principle that cows move their tails more o en the closer they get to
delivery.
217
Participant Handbook
The Moocall service senses tail mo on via a ba ery–powered monitor that is clipped to the cow's tail.
The device sends SMS alerts, when it detects enough mo on to show a cow is about to go into labour. As
a result, farmers can carry on with their daily work or get good nights sleep.
Moocall relies on Vodafone's managed connec vity to ensure coverage in even the most remote farming
areas and to help the company expand interna onally.
It is also planned to introduce similar devices for horses and have other ideas for new developments such
as flock protec on.
11.1.3 Security
Device level security features are deployed in this solu on. SMS alerts are sent to the registered mobile
number.
218
Foundation Skills in IoT
219
Participant Handbook
11.2.1 Scenario
Historically, crop farming has relied on farmers' exper se, built up over genera ons, to iden fy the best
way to work the land and iden fy the opportune moments to plant and harvest. But even the best
farmers can find their hard work undermined by poor weather. And the impact can be severe. For
instance, the combina on of weak farm gate prices and excep onal levels of rainfall resulted in some
Irish crops running at losses of 30% in 2016.
Precision farming and the deployment of IoT technology promises to make crop management more
predictable, introduce a new level of efficiency and drive up produc vity.
Soil sensors
Narrow Band IoT (NB-IoT) is a low-cost technology that's enabling farmers to measure soil condi ons
such as moisture content, pH levels and temperatures, providing them with be er insight into when to
plant crops. Even deep in the soil, the wireless sensors provide excellent connec vity and coverage and
the low power consump on means farmers don't need to change a ba ery for over 10 years.
The technology can also help when it comes to spraying. By monitoring condi ons such as temperature,
humidity and wind speed, farmers can get a be er understanding of the condi ons that allow pathogens
to take hold. Using IoT, the farmer knows when to spray and where.
220
Foundation Skills in IoT
More precise use of pes cides and fer lizers can save money, deliver be er results and lower the impact
on the environment — which is a good news for everyone.
221
Participant Handbook
222
12. Use Cases - Mining
Unit 12.1 - Safety in Mining
Unit 12.2 - Availability in Mining
Participant Handbook
224
Foundation Skills in IoT
12.1.1 Scenario
Mining is a unique industry where the miners have to adjust to the changing environment under the
ground. Miners have to work with materials and many factors that may not be controllable. Mining
ventures are extremely capital intensive. The infrastructure for mines in remote loca ons alone may cost
several hundred million dollars. High fixed costs represent a large component of a mining opera on's
total costs. Once the presence of an ore deposit has been established, several years of intensive effort is
required before the property is brought in stream and ore is produced on a con nuous basis.
Mining is broadly categorised as 'Underground Mining' and 'Surface Mining'. Each type will have its own
challenges and advantages.
Mining is a very complex ac vity and many variables are to be controlled to make this venture profitable
within the defined me frame. Mining operators are looking for technological interven ons that aid in
the opera on's efficiency and at the same me, the solu on should cover all aspects of mining.
As we are aware, mines are located at remote loca ons, hence some constraints are to be addressed to
implement IoT solu ons.
Some of the constraints are:
Ÿ Infrastructure setup
¡ Site is located at remote loca ons
Ÿ Networking constraints
¡ For the exis ng mines, IoT technology may add addi onal load on the bandwidth
Ÿ Cyber a acks
¡ The applica on might be vulnerable to cyber a acks
225
Participant Handbook
¡ A ackers may halt the opera on of the machine by entering the network
¡ Illegi mate update of machine so ware can result in malfunc on or can increase the
warranty costs of the manufacturer
Mining is a complex ac vity involving too many variables and to be profitable in this highly capital
intensive and complex industry requires some of the best technologies. At the same me, the mine
operators look at solu ons that support them in managing and also making money out of the mines. In
order to deliver end to end solu ons to support the mining value chain, one of the key requirement is the
connec vity of individual devices/systems and integra on of them to a single solu on. Use of network
infrastructure either local WiFi (with a tunnel to the Internet) or cellular or satellite can support this
need. This sets the base for IoT in mining.
Safety in Mining:
The IoT technology can be used for the safety of personnel and equipment. This will have a cascading
effect on the overall safety in the mining opera ons.
Safety in mining relates to one of the three major causes:
1. Environment
2. Equipment
3. Operator behavior
Let us try to understand how IoT helps in the above.
Safety in Mining – Environment:
The following are some of the frequent contributors that are important in mining safety.
Ÿ Hazardous terrains
Both in 'Surface' and 'Underground' mining, collapse of the working floor is a serious concern.
There is a possibility of toppling of the machine when the floor collapses. This will pose a serious
threat to the operator. In Underground mining, there is a possibility that the workers might get
trapped inside the tunnel when the roof collapses. There are notable such incidents in the
recorded history of opera on of mine sites.
Ÿ Dust
Dust is one of the most common hazard in mining. Dust not only affects the opera on of the
machines due to poor visibility but also poses a serious threat to the operator when he inhales
the dust.
226
Foundation Skills in IoT
227
Participant Handbook
12.1.2 Design
How it Works?
Setup:
Ø Machines are fi ed with GPS and Radio Units
Ø All equipments are connected to central office
Ø The mine office creates maps for the mine site with GPS
coordinates and each machine has a copy of the updated mine
map marked with safe zones
In site:
Ø Machines con nuously monitor their GPS posi on
Ø When the machine nears the end of safe zone, the operator is
alerted using Audio/vision in the cab
In Office:
Ø The office receives the posi on of every machine periodically
Ø The Mine Controller will be alerted for taking appropriate ac on to
ensure safety incident when the machine moves out of safe zone
228
Foundation Skills in IoT
The fa gue or distrac on event data from the system can also be sent to a 24-hour monitoring centre,
which could be the mine office or a remote centre away from the mine site to classify and analyse the
data. Capture & Playback can be used to record incidents for playback, analysis and training
opportuni es.
This data can be used to provide customised repor ng with site-level recommenda ons. Cross-
referencing fa gue and distrac on events against available equipment data can provide sugges ons to
improve opera onal efficiency.
Fa gue management doesn't stop at the mine site. Behaviors of the site impact fa gue and distrac ons
on the job, so any fa gue management program must include at-home cultural awareness and training
elements that encourage healthy nutri on and good sleeping habits.
While the fa gue detec on system is onboard, the machine can collect data for analysis of incidents on
the site, to understand the sleeping habits and other ac vi es. Industry now uses ac vity tracker bands,
mobile devices and smart electric devices at home such as smart ligh ng system or smart TV. Analysis of
this data helps plan work schedule for the team of personnel including proper shi breaks, selec on of
day vs night shi , alterna ng of shi s, counselling, etc.
229
Participant Handbook
Data is the parent of any smart technology. Data gathering is the enabler of precise and predic ve
Technology by having its predic ve capability based on the actual status of the machine.
The below men oned sequence chart summarises the steps involved in Data Gathering and relaying.
A wide range of Communica on protocols can be used, some being proprietary to the mine site to assist
in the relaying of data.
Message Queue Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP),
Simple/Streaming Text Oriented Messaging Protocol (STOMP) are some of the popular protocols that are
used in telema cs.
All the protocols should be reliable, light-weight (on bandwidth) and should support security.
230
Foundation Skills in IoT
12.1.4 Security
Connec vity opens the door for hacking. Even the most protected system is vulnerable to a ack and
hence mul ple levels of security must be provided to make the network safe.
The simplest form of a ack is the of the data. The data of the mine site is sensi ve and private to the
mine owner. Access to the mine informa on can be exploited by the compe tors and social elements.
Any manipula on of Safety Technology must not result in a safety incident. Hence, it is mandated that as
long as human is inside the machine, the technology must only be able to alert the person and must be
capable of being overridden.
In mine sites, where complete or semi-autonomy is implemented, the network has to be given intense
protec on. Any hacking in the network can make the en re mine site vulnerable to remote control by an
uniden fied person.
Some common protec on methods are given below,
Ÿ Most of the mine networks operate behind the Firewall. The Firewall needs to be updated
frequently and be monitored for any hacking a empts
Ÿ Provide provision for private networks, disconnected to the Internet, when sensi ve data or
control informa on is handled
Ÿ Use Proprietary protocol with secure handshakes to relay informa on in the mine site
231
Participant Handbook
12.2.1 Scenario
232
Foundation Skills in IoT
Consumables tracking are another feature that comes as a standard with many machine guidance and
produc on monitoring tools. It lets mine managers monitor the use and condi on of commonly used
components to ensure they're replaced exactly when needed-before failure, but not before the end of
their useful life.
Increasing the component life cycle through haul road maintenance:
Haul road condi ons dictate speed, fuel burn, re life, safety and annual tonnage moved. Clean,
smooth surfaces extend re life for mine haul trucks and reduce the chance of machine damage or
accidents due to road hazards. Smooth, constant grades minimise transmission shi s, enable drivers to
maintain higher average speeds, allow more constant braking effort on returns and reduce spillage and
fuel consump on.
On the other hand, poorly designed or maintained mining haul roads can lead to drama cally increased
costs caused by lost produc on me, shortened re life, greater fuel usage, excessive component wear,
major equipment repair and replacement and safety issues. Even excep onally designed haul roads
require me and effort to keep in top shape. Regular maintenance helps eliminate the small decreases in
speed—and increases in cycle mes—that nega vely affect hourly and annual produc on.
Fortunately, several new tools and technologies are available to help mine opera on managers enhance
haul road construc on and maintenance prac ces, with the ul mate goal of increasing re and mining
truck life, improving fuel economy and reducing cost per ton.
12.2.2 Design
233
Participant Handbook
For example, the coolant in any engine performs the job of removing the heat of the engine block, a
failure in this component or system can result in engine failure. In order to predict this, we could monitor
the coolant temperature before it enters the engine block and a er it exits the engine block. The
difference should be posi ve high (Outlet minus inlet). However, any impuri es in the coolant can reduce
the cooling func on resul ng in lower outlet temperature. This can be iden fied well ahead by
monitoring the trend of outlet minus inlet coolant temperature and se ng alerts for the threshold.
Setup
Ÿ Temperature sensors for the coolant connected to embedded
control unit, that can transfer data back to site office
Sensing
Ÿ On-Board system periodically reads the values of the sensors
and relays the informa on to the Off-Board Intelligent Analyser
System
Ÿ The Analyser system detects and ascertains any abnormality in
the measured values
Ÿ The system also predicts the tenta ve failure me and no fies
the mine controller
234
Foundation Skills in IoT
In addi on, so ware packages can simulate mining truck produc vity and es mated cost per ton on
various haul road profiles. Mines can use these tools to determine if mining trucks are achieving
predicted speed on grades, as well as cycling and wai ng at the loader in predicted me ranges. With this
data, opera on managers can inves gate possible causes behind delays—Are rough or slippery roads or
ght corners forcing operators to slow down? Is rolling resistance higher than planned? Is visibility poor
due to dust or obscured views?—and make the necessary adjustments. This so ware can run on the
cloud on heaps of data from mul ple mine sites.
The tracking capabili es now built into many mining machines also can assist with haul road
maintenance for mines. These systems generate reports showing where health and opera onal alerts
occur, which can help drivers and opera on managers spot site problems—including subop mal haul
road condi ons—that affect mining equipment availability, health and asset life.
It is important to note that certain mining equipment such as Trucks requires paved roads. If the truck
with tons of payload is frequently made to pass over a bumpy terrain, the stress on the suspension
systems is higher than it is designed for which may result in earlier failure. Skidding of a machine in the
narrow road of the mine site will severely impair the mine site ll the machine is removed. The below
example illustrates how lane maintenance can be done.
Setup
Ÿ Machine with GPS and Suspension Stress sensor
Ÿ Connected via IoT to the mine control room
Sensing
Ÿ On-Board system periodically reads the values of the sensors
and relays the informa on to the Off-Board Intelligent Analyser
System
Ÿ The Analyser system detects the abnormality in the terrain such
as bumps and ascertains the same by comparing the values from
different machines that move over the terrain
Ÿ The system no fies the mine controller
Ac on
Ÿ The mine controller modifies the schedule to cordon
the area requiring pavement of road
Ÿ Mine controller instructs pavement machines such as
Motor grader to reach the area and pave the roads
235
Participant Handbook
Such preven ve maintenance saves a lot of repair cost for the Mine Owner and improves the
produc vity of the mine site.
Data is the parent of any smart technology. Data gathering is the enabler of precise and predic ve
Technology by having its predic ve capability based on the actual status of the machine.
The below sequence chart summarises the steps involved in Data Gathering and relaying from the mines
to the mine site.
236
Foundation Skills in IoT
A wide range of Communica on protocols can be used, some being proprietary to the mine site to assist
in the relaying of data.
Message Queue Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP),
Simple/Streaming Text Oriented Messaging Protocol (STOMP) are some of the popular protocols that are
used in telema cs.
All the protocols should be reliable, light-weight (on bandwidth) and should support security.
12.2.4 Security
Connec vity opens the door for hacking. Even the most protected system is vulnerable to a ack and
hence mul ple levels of security must be provided to make the network safe.
The simplest form of a ack is the of the data. The data of the mine site is sensi ve and private to the
mine owner. Access to the mine informa on can be exploited by the compe tors and an -social
elements.
In mine sites, where complete or semi-autonomy is implemented, the network has to be given intense
protec on. Any hacking in the network can make the en re mine site vulnerable to safety issues
inten onally induced by malicious elements.
Some common protec on methods are given below,
Ÿ Most of the mine networks operate behind the Firewall. The Firewall needs to be updated
frequently and be monitored for any hacking a empts
Ÿ Provide provision for private networks, disconnected to the Internet, when sensi ve data or
control informa on is handled
Ÿ Use Proprietary protocol with secure handshakes to relay informa on in the mine site
237
Participant Handbook
238
13. Professional Skills
Unit 13.1 – Office, e-mail and telephone e que e
Unit 13.2 – Goal se ng and me management
Participant Handbook
240
Foundation Skills in IoT
A re:
To achieve excellence in the career, professional skills also play a major role along with technical skills. In
this session, we will learn few professional skills.
Let us see what a re suits for office
Ÿ Business formals are suitable for office.
Ÿ Men can wear plain/ striped full sleeve or half sleeved shirts, formal trouser and formal shoes
(black/brown).
Ÿ Women can wear Saree/Salwar kameez, plain/striped shirts/co on tops, formal trouser/skirts
shoe/slip-ons.
241
Participant Handbook
Avoid:
Men Women
Ÿ No flashy cuff links, rings or gold chains. Ÿ One pair of conserva ve, non-dangling
Wedding ring is fine. earring and one ring per hand.
Ÿ No visible body piercing. Ÿ No dangling or distrac ng bracelets. No visible
body piercing beyond earrings.
Cubicle e que e:
Ÿ Always use your 'library voice' when speaking in a cubicle environment.
Ÿ When someone adjacent to you asks someone a ques on for which you know the correct
answer, resist the urge to volunteer this informa on. Doing so will confirm that you were eves
dropping.
Ÿ Do not use sign language or whisper to a ract the a en on of someone who is dialing, checking
mail or involved in another ac vity.
Ÿ When you decorate your cubicle, remember that others view your cubicle throughout the day. Be
careful not to offend others on moral, religious, cultural or sexual grounds.
Common place behavior:
Rest rooms:
Ÿ Flush the toilet.
Ÿ Throw your paper towels in the trash.
Ÿ Wash your hands every single me.
242
Foundation Skills in IoT
Elevator:
Ÿ Do not a empt to board elevator before previous passengers have disembarked.
Ÿ Take the stairs if travelling between one or two floors, barring personal injury.
Ÿ Hold the door for others running to catch the carriage. However, do not hold the door indefinitely
and delay travel for other passengers.
Ÿ Give others their personal space in an uncrowded elevator.
Ÿ Do not call out the floor to the person standing nearest the bu ons as if that person is the li
operator.
Ÿ Do not carry on personal conversa ons, be it person-to-person or via cellular phone.
e-mail:
In the office, you may be required to communicate with others using e-mail. There are certain rules to be
followed, when wri ng the e-mails.
To: The addresses in the “To” are the people who have to act on the e-mail
Cc: The addresses in the “Cc” are for people who need to be kept informed
Bcc: The addresses in “Bcc” receive a copy of the informa on. Addresses in “To”
and “Cc” do not know of inclusion of addresses in “Bcc”
Reply All Do not automa cally “Reply to all”. Take one last look at your distribu on
list—is this e-mail necessary for all recipients?
Subject: All messages should have clear and specific “Subject Lines” that
Ÿ describe the message content
Ÿ specify if there are any ac ons required and due dates
Ÿ men on clearly who the message is for
243
Participant Handbook
Body In the first 1–3 lines of your email, specify what this e-mail is about.
Ÿ Does it include ac on required?
Ÿ Does it require a reply by a certain date?
Ÿ What informa on is contained that the reader will
find necessary for their job?
Signature End the e-mail with either 'Thanks and Regards' or just 'Regards'
Dos Don'ts
Telephone e que e:
Answering incoming call:
Ÿ Answer incoming calls within 2ⁿ or 3 ring.
Ÿ Always iden fy yourself. (To avoid the embarrassment of interrup ng and informing the caller
that he is speaking to the wrong person).
244
Foundation Skills in IoT
245
Participant Handbook
246
Foundation Skills in IoT
13.2.1 Goal se ng
Rules for goal se ng:
Ÿ Set one goal at a me: Choose one major goal and stay focused.
Ÿ Intensify your desire to achieve your goal: The single most important reason why people do not
achieve their goal is because they do not have a strong enough desire.
Ÿ Develop a strong belief that you can achieve your goal: If you do not believe that you can reach
your goal, you would not.
Ÿ Set a dead line for your goal: Dead line will move you to ac on .
Ÿ Write your goal down—your goal is no longer just a thought.
Ÿ When you put pen to paper you turn your thoughts into something tangible. You can actually see
it and touch it.
Ÿ Break your goal down to mini goals: It's the planning of the route to your goal.
Ÿ Define your tasks for every mini goal.
Self SWOT:
Strengths:
Ÿ What advantages do you have that others don't have (for example, skills, cer fica ons,
educa on or connec ons)?
Ÿ What do you do be er than anyone else?
Ÿ What personal resources can you access?
Ÿ What do other people (and your boss, in par cular) see as your strengths?
Ÿ Which of your achievements are you most proud of?
Ÿ What values do you believe in that others fail to exhibit?
Ÿ Are you part of a network that no one else is involved in? If so, what connec ons do you have with
influen al people?
247
Participant Handbook
Weakness:
Ÿ What tasks do you usually avoid because you don't feel confident doing them?
Ÿ What will the people around you see as your weaknesses?
Ÿ Are you completely confident in your educa on and skills training? If not, where are you weakest?
Ÿ What are your nega ve habits (for example, are you o en late, are you disorganised, do you have
a short temper or are you poor at handling stress?
Ÿ Do you have personality traits that hold you back in your field? For instance, if you are
apprehensive talking to outsiders, sharing thoughts in mee ngs etc.
Opportuni es:
Ÿ What new technology can help you? Or can you get help from others or from people via the
Internet?
Ÿ Do you have a network of strategic contacts to help you or offer good advice?
Ÿ What trends do you see in your chosen field and how can you take advantage of them?
Threats:
Ÿ What obstacles do you currently face in life?
Ÿ Are any of your colleagues compe ng with you?
Ÿ Does changing scenarios (business, economic) threaten your prospects?
Ÿ Could any of your weaknesses lead to threats?
Priori sa on technique:
248
Foundation Skills in IoT
Quadrant 1 represents things which are both urgent and important. We've called this "firefigh ng". The
ac vi es need to be dealt with immediately, and they're important. Give examples like crisis in the
family, accidents that require immediate a en on.
Quadrant 2 represents things which are important, but not urgent. We've termed this one "Quality
Time". Although the ac vi es here are important and contribute to achieving the goals and
priori es—they don't have to be done right now. As a result, they can be scheduled in when you can give
quality thought to them. A good example would be the prepara on of an important talk or preparing for
an examina on. Prayer me, family me and personal relaxa on/recrea on are also part of Quadrant 2.
Ac vi es that are planned in Quadrant 2 and not acted upon would move to Quadrant 1. This leads to
stress and issues in priori sa on.
Quadrant 3 represents things which are distrac ons. They must be dealt with right now, but frankly, are
not important. For example, when you answer an unwanted phone call—you've had to interrupt
whatever you were doing to answer it.
The final quadrant, Quadrant 4, consists of things which are neither urgent nor important. Some
mee ngs could fall into this category—they've been scheduled in advance, but if they achieve nothing,
or you don't contribute to them, then they have simply wasted me. Other examples could include
driving me and low quality relaxa on or family me. Using the tool, consciously strive to maximise
Quadrant 2 me. Allocate me in your diary to carry out these tasks when you are at your best. Doing so
can reduce the amount of me taken up by firefigh ng quadrant 1 ac vi es, since many quadrant 1
ac vi es could have been quadrant 2 if they had been done earlier. You can also seek to reduce me
spent in Quadrant 3 by improving your systems and processes for dealing with distrac ons and you can
seek to eliminate as much as possible of quadrant 4 ac vi es, by either not spending me on these
things or changing the nature of them to make them more produc ve. For example, driving can be
quadrant 4 if the me is unproduc ve, but there are a number of ways of making this me more
produc ve by listening to a praise tape, praying, learning new skills with a tape course, planning and so
on.
Tips for 'Time' management:
Ÿ Have a vision
Ÿ Plan ahead
Ÿ Priori se your tasks
Ÿ Be organised
Ÿ Avoid overload
Ÿ Be able to be flexible
249
Participant Handbook
250
14. Employability &
Entrepreneurship Skills
Unit 14.1 – Personal Strengths & Value Systems
252
Employability & Entrepreneurship Skills
253
Participant Handbook
254
Employability & Entrepreneurship Skills
Unit Objectives
At the end of this unit, you will be able to:
255
Participant Handbook
256
Employability & Entrepreneurship Skills
What is Hygiene ?
As per the World Health Organization (WHO), “Hygiene refers to conditions and practices that
help to maintain health and prevent the spread of diseases.” In other words, hygiene means
ensuring that you do whatever is required to keep your surroundings clean, so that you reduce
the chances of spreading germs and diseases.
For instance, think about the kitchen in your home. Good hygiene means ensuring that the
kitchen is always spick and span, the food is put away, dishes are washed and dustbins are not
overflowing with garbage. Doing all this will reduce the chances of attracting pests like rats or
cockroaches, and prevent the growth of fungus and other bacteria, which could spread disease.
How many of these health standards do you follow? Tick the ones that apply to you.
1. Have a bath or shower every day with soap – and wash your hair with shampoo 2-3
times a week.
2. Wear a fresh pair of clean undergarments every day.
3. Brush your teeth in the morning and before going to bed.
4. Cut your fingernails and toenails regularly.
5. Wash your hands with soap after going to the toilet.
6. Use an anti-perspirant deodorant on your underarms if you sweat a lot.
7. Wash your hands with soap before cooking or eating.
8. Stay home when you are sick, so other people don’t catch what you have.
9. Wash dirty clothes with laundry soap before wearing them again.
10. Cover your nose with a tissue/your hand when coughing or sneezing.
See how healthy and hygienic you are, by giving yourself 1 point for every ticked statement!
Then take a look at what your score means.
Your Score
0-7/20: You need to work a lot harder to stay fit and fine! Make it a point to practice good
habits daily and see how much better you feel!
7-14/20: Not bad, but there is scope for improvement! Try and add a few more good habits to
your daily routine.
14-20/20: Great job! Keep up the good work! Your body and mind thank you!
257
Participant Handbook
us.” This is why it is so important that you make good habits a way of life, and consciously avoid
practicing bad habits.
Some good habits that you should make part of your daily routine are:
• Always having a positive attitude • Smiling! Make it a habit to smile as often as
• Making exercise a part of your daily routine possible
• Reading motivational and inspirational stories • Making time for family and friends
• Going to bed early and waking up early
Some bad habits that you should quit immediately are:
• Skipping breakfast • Smoking, drinking alcohol and doing drugs
• Snacking frequently even when you are not • Spending more money than you can afford
hungry • Worrying about unimportant issues
• Eating too much fattening and sugary food • Staying up late and waking up late
Tips
• Following healthy and hygienic practices every day will make you feel good mentally andphysically.
• Hygiene is two-thirds of health – so good hygiene will help you stay strong and healthy!
258
Employability & Entrepreneurship Skills
Tips
• Be aware of what emergency number to call at the time of a workplace emergency
• Practice evacuation drills regularly to avoid chaotic evacuations
What is Motivation ?
Very simply put, motivation is your reason for acting or behaving in a certain manner. It is
important to understand that not everyone is motivated by the same desires – people are
motivated by many, many different things. We can understand this better by looking at Maslow’s
Hierarchy of Needs.
Maslow’s Hierarchy of Needs
Famous American psychologist Abraham Maslow wanted to understand what motivates
people. He believed that people have five types of needs, ranging from very basic needs (called
physiological needs) to more important needs that are required for self-growth (called self-
actualization needs). Between the physiological and self-actualization needs are three other
needs – safety needs, belongingness and love needs, and esteem needs. These needs are
usually shown as a pyramid with five levels and are known as Maslow’s Hierarchy of Needs.
Self-fulfillment
Self -
needs
actualization:
achieving one's full
potential, including
creative activities
Esteem needs:
prestige and feeling of Psychological
accomplishment needs
Safety needs:
Security, safety Basic
needs
Physiological needs:
food, water, warmth, rest
259
Participant Handbook
As you can see from the pyramid, the lowest level depicts the most basic needs. Maslow
believed that our behaviour is motivated by our basic needs, until those needs are met. Once
they are fulfilled, we move to the next level and are motived by the next level of needs. Let’s
understand this better with an example.
Rupa comes from a very poor family. She never has enough food, water, warmth or rest.
According to Maslow, until Rupa is sure that she will get these basic needs, she will not even
think about the next level of needs – her safety needs. But, once Rupa is confident that her basic
needs will be met, she will move to the next level, and her behaviour will then be motivated
by her need for security and safety. Once these new needs are met, Rupa will once again move
to the next level, and be motivated by her need for relationships and friends. Once this need
is satisfied, Rupa will then focus on the fourth level of needs – her esteem needs, after which
she will move up to the fifth and last level of needs – the desire to achieve her full potential.
• Unafraid to take risks for personal • Very persistent when it comes to achieving
accomplishment goals
• Love being challenged • Extremely courageous
• Future-oriented • Highly creative and innovative
• Flexible and adaptive • Restless - constantly looking to achieve more
• Value negative feedback more than • Feel personally responsible for solving
positive feedback problems
Think about it: • Can you think of entrepreneurs who display
these traits?
• How many of these traits do you have?
260
Employability & Entrepreneurship Skills
What is Attitude ?
Now that we understand why motivation is so important for self-analysis, let’s look at the
role our attitude plays in better understanding ourselves. Attitude can be described as your
tendency (positive or negative), to think and feel about someone or something. Attitude is the
foundation for success in every aspect of life. Our attitude can be our best friend or our worst
enemy. In other words:
Now that we understand why motivation is so important for self-analysis, let’s look at the
role our attitude plays in better understanding ourselves. Attitude can be described as your tendency
(positive or negative), to think and feel about someone or something. Attitude is the
foundation for success in every aspect of life. Our attitude can be our best friend or our worst
enemy. In other words:
“The only disability in life is a bad attitude.”
When you start a business, you are sure to encounter a wide variety of emotions, from difficult
times and failures to good times and successes. Your attitude is what will see you through
the tough times and guide you towards success. Attitude is also infectious. It affects everyone
around you, from your customers to your employees to your investors. A positive attitude helps
build confidence in the workplace while a negative attitude is likely to result in the demotivation
of your people.
Strengths Weaknesses
261
Participant Handbook
Tips
• Achievement motivation can be learned. • Train yourself to finish what you start.
• Don’t be afraid to make mistakes. • Dream big.
262
Employability & Entrepreneurship Skills
263
Participant Handbook
Tips
• Don’t get angry when someone tells you the truth and you don’t like what you hear.
• Always be willing to accept responsibility for your mistakes.
• They are imaginative and playful • They detest rules and routine
• They see issues from different angles • They love to daydream
• They notice small details • They are very curious
• They have very little tolerance for boredom
What is Innovation ?
There are many different definitions of innovation. In simple terms, innovation means turning
an idea into a solution that adds value. It can also mean adding value by implementing a new
product, service or process, or significantly improving on an existing product, service or process.
Tips
• Take regular breaks from your creative work to recharge yourself and gain fresh perspective.
• Build prototypes frequently, test them out, get feedback, and make the required changes.
264
Employability & Entrepreneurship Skills
Tips
• Always complete the most important tasks first. • Set a time limit for every task that you will
• Get at least 7 – 8 hours of sleep every day. undertake.
• Start your day early. • Give yourself some time to unwind between
tasks.
• Don’t waste too much time on small,
unimportant details.
265
Participant Handbook
266
Employability & Entrepreneurship Skills
Tips
• Try to forgive those who anger you, rather than hold a grudge against them.
• Avoid using sarcasm and hurling insults. Instead, try and explain the reason for your
frustration in a polite and mature manner.
Causes of Stress
Stress can be caused by internal and external factors.
Internal causes of stress
• Constant worry • Pessimism
• Rigid thinking • Negative self-talk
• Unrealistic expectations • All in or all out attitude
Symptoms of Stress
Stress can manifest itself in numerous ways. Take a look at the cognitive, emotional, physical
and behavioral symptoms of stress.
267
Participant Handbook
Tips
• Force yourself to smile even if you feel stressed. Smiling makes us feel relaxed and happy.
• Stop yourself from feeling and thinking like a victim. Change your attiude and focus on being proactive.
268
Employability & Entrepreneurship Skills
• Central Processing Unit (CPU): The brain of the computer. It interprets and carries out
program instructions.
• Hard Drive: A device that stores large amounts of data.
• Monitor: The device that contains the computer screen where the information is visually
displayed.
• Mouse: A hand-held device used to point to items on the monitor.
• Speakers: Devices that enable you to hear sound from the computer.
• Printer: A device that converts output from a computer into printed paper documents.
269
Participant Handbook
Tips
• When visiting a .com address, there no need to type http:// or even www. Just type the
name of the website and then press Ctrl + Enter. (Example: Type ‘apple’ and press Ctrl +
Enter to go to www.apple.com)
• Press the Ctrl key and press the + or - to increase and decrease the size of text.
• Press F5 or Ctrl + R to refresh or reload a web page.
270
Employability & Entrepreneurship Skills
Tips
• Press Ctrl+R as a shortcut method to reply to email.
• Set your desktop notifications only for very important emails.
• Flag messages quickly by selecting messages and hitting the Insert key.
• Save frequently sent emails as a template to reuse again and again.
• Conveniently save important emails as files.
Examples of E-Commerce
Some examples of e-commerce are:
• Online shopping • Electronic payments
• Online auctions • Internet banking
• Online ticketing
Types of E-Commerce
E-commerce can be classified based on the types of participants in the transaction. The main
types of e-commerce are:
• Business to Business (B2B): Both the transacting parties are businesses.
• Business to Consumer (B2C): Businesses sell electronically to end-consumers.
• Consumer to Consumer (C2C): Consumers come together to buy, sell or trade items to
other consumers.
• Consumer-to-Business (C2B): Consumers make products or services available for purchase
to companies looking for exactly those services or products.
• Business-to-Administration (B2A): Online transactions conducted between companies
and public administration.
• Consumer-to-Administration (C2A): Online transactions conducted between individuals
and public administration.
Benefits of E-Commerce
The e-commerce business provides some benefits for retailers and customers.
Benefits for retailers
• Establishes an online presence
• Reduces operational : costs by removing overhead costs
• Increases brand awareness through the use of good keywords
• Increases sales by removing geographical and time constraints
Benefits for customers:
• Offers a wider range of choice than any physical store
• Enables goods and services to be purchased from remote locations
• Enables consumers to perform price comparisons
271
Participant Handbook
E-Commerce Activity
Choose a product or service that you want to sell online. Write a brief note explaining how
you will use existing e-commerce platforms, or create a new e-commerce platform, to sell your
product or service.
Tips
• Before launching your e-commerce platform, test everything.
• Pay close and personal attention to your social media.
272
Employability & Entrepreneurship Skills
Tips
• Break your spending habit. Try not spending on one expensive item per week, and put the
money that you would have spent into your savings.
• Decide that you will not buy anything on certain days or weeks and stick to your word.
273
Participant Handbook
274
Employability & Entrepreneurship Skills
Tips
• Select the right type of account. • Understand the rules.
• Fill in complete nomination details. • Check for online banking – it’s convenient!
• Ask about fees. • Keep an eye on your bank balance.
Tips
• When trying to determine whether a cost is fixed or variable, simply ask the following
question: Will the particular cost change if the company stopped its production activities? If
the answer is no, then it is a fixed cost. If the answer is yes, then it is probably a variable cost.
275
Employability & Entrepreneurship Skills
276
Participant Handbook
• Health Insurance: The main types of health insurance are individual health insurance, family
floater health insurance, comprehensive health insurance and critical illness insurance.
• Travel Insurance: This can be categorised into Individual Travel Policy, Family Travel Policy,
Student Travel Insurance and Senior Citizen Health Insurance.
• Home Insurance: This protects the house and its contents from risk.
• Marine Insurance: This insurance covers goods, freight, cargo etc. against loss or damage
during transit by rail, road, sea and/or air.
Taxes
There are two types of taxes – Direct Taxes and Indirect Taxes.
Direct Tax
Direct taxes are levied directly on an entity or a person and are non-transferrable.
Some examples of Direct Taxes are:
• Income Tax: This tax is levied on your earning in a financial year. It is applicable to both,
individuals and companies.
• Capital Gains Tax: This tax is payable whenever you receive a sizable amount of money.
It is usually of two types – short term capital gains from investments held for less than 36
months and long term capital gains from investments held for longer than 36 months.
• Securities Transaction Tax: This tax is added to the price of a share. It is levied every time
you buy or sell shares.
• Perquisite Tax: This tax is levied is on perks that have been acquired by a company or used
by an employee.
• Corporate Tax: Corporate tax is paid by companies from the revenue they earn.
Indirect Tax
Indirect taxes are levied on goods or services.
Some examples of Indirect Taxes are:
• Sales Tax: Sales Tax is levied on the sale of a product.
• Service Tax: Service Tax is added to services provided in India.
• Value Added Tax: Value Added Tax is levied at the discretion of the state government. The tax is levied on
goods sold in the state. The tax amount is decided by the state.
• Customs Duty & OctroiC : ustoms Duty is a charge that is applied on purchases that are imported from
another country. Octroi is levied on goods that cross state borders within India.
• Excise Duty: Excise Duty is levied on all goods manufactured or produced in India.
Tips
• Think about how quickly you need your money back and pick an investment option
accordingly.
• Ensure that you are buying the right type of insurance policy for yourself.
• Remember, not paying taxes can result in penalties ranging from fines to imprisonment.
277
Employability & Entrepreneurship Skills
RTGS
RTGS stands for Real Time Gross Settlement. This is a real time funds transfer system which enables you to
transfer funds from one bank to another, in real time or on a gross basis. The transferred amount is
immediately deducted from the account of one bank, and instantly credited to the other bank’s account.
The RTGS payment gateway is maintained by the Reserve Bank of India. The transactions between banks are
made electronically. RTGS can be used by individuals, companies and firms to transfer large sums of money.
Before remitting funds through RTGS, you will need to add the beneficiary and his bank account details
via your online banking account. In order to complete this registration, you will require the
• Name of the beneficiary • Beneficiary’s account number
• Beneficiary’s bank address • Beneficiary’s bank’s IFSC code
IMPS
IMPS stands for Immediate Payment Service. This is a real-time, inter-bank, electronic funds
transfer system used to transfer money instantly within banks across India. IMPS enables
users to make instant electronic transfer payments using mobile phones through both, Mobile Banking and
S M S . I t c a n a l s o b e u s e d t h r o u g h AT M s a n d o n l i n e b a n k i n g . I M P S i s a v a i l a b l e 2 4
hours a day and 7 days a week. The system features a secure transfer gateway and immediately
confirms orders that have been fulfilled.
278
Participant Handbook
In order to initiate a money transfer through IMPS, you will need to enter the following information:
1. The beneficiary’s mobile number 2. The beneficiary’s MMID
3. The transfer amount 4. Your MPIN
As soon as money has been deducted from your account and credited into the beneficiary ’s account, you
will be sent a confirmation SMS with a transaction reference number, for futurereference.
Differences Between NEFT, RTGS & IMPS
Criteria NEFT RTGS IMPS
Settlement Done in batches Real-time Real-time
Full form National Electronic Real Time Gross Immediate Payment
Fund Transfer Settlement Service
Timings on 8:00 am – 6:30 pm 9:00 am – 4:30 pm 24x7
Monday – Friday
Timings on 8:00 am – 1:00 pm 9:00 am – 1:30 pm 24x7
Saturday
Minimum amount `1 `2 lacs `1
of money transfer
limit
Maximum amount `10 lacs `10 lacs per day `2 lacs
of money transfer
limit
Maximum charges Upto 10,000 – `2.5 above 2 – 5 lacs – Upto 10,000 – `5
as per RBI above 10,000 – 1 lac `25 above 10,000 – 1 lac
– `5 – `5
above 5 – 10 lacs –
above 1 – 2 lacs – above 1 – 2 lacs –
`50
`15 `15
above 2 – 5 lacs –
`25
above 5 – 10 lacs –
`25
Tips
• Never click on any links in any e-mail message to access your online banking website.
• You will never be asked for your credit or debit card details while using online banking.
• Change your online banking password regularly.
279
Employability & Entrepreneurship Skills
280
Participant Handbook
• Ensure that your clothes are clean and well-ironed. Pick neutral colours – nothing too bright or flashy.
• The shoes you wear should match your clothes, and should be clean and suitable for an interview.
• Remember, your aim is to leave everyone you meet with the impression that you are a professional
and highly efficient person.
5. Ensure that you have packed everything that you may require during the interview.
• Carry a few copies of your resume. Use a good quality paper for your resume print outs.
• Always take along a notepad and a pen.
• Take along any information you may need to refer to, in order to fill out an application form.
• Carry a few samples of your work, if relevant.
6. Remember the importance of non-verbal communication.
• Practice projecting confidence. Remind yourself to smile and make eye contact. Practice giving a firm
handshake.
• Keep in mind the importance of posture. Practice sitting up straight. Train yourself to stop nervous
gestures like fidgeting and foot-tapping.
• Practice keeping your reactions in check. Remember, your facial expressions provide a good insight
into your true feelings. Practice projecting a positive image.
7. Make a list of questions to end the interview with.
• Most interviews will end with the interviewer(s) asking if you have any questions. This is your chance
to show that you have done your research and are interested in learning more about the company.
• If the interviewer does not ask you this question, you can inform him/her that you have some querirs
that you would like to discuss. This is the time for you to refer to the notes you made while studing
the company.
• Some good questions to ask at this point are:
o What do you consider the most important criteria for success in this job?
o How will my performance be evaluated?
o What are the opportunities for advancement?
o What are the next steps in the hiring process?
• Remember, never ask for information that is easily available on the company website.
Tips
• Ask insightful and probing questions.
• When communicating, use effective forms of body language like smiling, making eye
contact, and actively listening and nodding. Don’t slouch, play with nearby items, fidget,
chew gum, or mumble.
281
Employability & Entrepreneurship Skills
phone number and e-mail address. Insert a bold line under the section to separate it
from rest of your resume.
Example:
Khyati Mehta
Breach Candy, Mumbai – India
Contact No: +91 2223678270
Email: [email protected]
Educational Qualifications
• <Enter qualification> <enter date of qualification> from <enter name of institute> with
<enter percentage or any other relevant scoring system>.
282
Participant Handbook
Example:
Academic Projects
Project Title: <Insert project title>
Organization: <Insert the name of the organization for whom you did the project>
Platform used: <Insert the platform used, if any>
Contribution: <Insert your contribution towards this project>
Description: <Insert a description of the project in one line>
Strengths
• Excellent oral, written and presentation skills
• Action-oriented and result-focused
• Great time management skills
The last section of your résumé must include the following personal information:
• Date of birth • Gender & marital status
• Nationality • Languages known
Example:
Personal Details
• Date of birth: 25th May, 1981
• Gender & marital status: Female, Single
• Nationality: Indian
• Languages known: English, Hindi, Tamil, French
Tips
• Keep your resume file name short, simple and informational.
• Make sure the resume is neat and free from typing errors.
• Always create your resume on plain white paper.
283
Employability & Entrepreneurship Skills
284
Participant Handbook
Tips
• Be honest and confident while answering.
• Use examples of your past experiences wherever possible to make your answers more
impactful.
285
Employability & Entrepreneurship Skills
• Compensation Package: The combination of salary and benefits that an employer provides to his/her
employees.
• Compensatory Time (Comp Time): Time off in lieu of pay.
• Contract Employee: An employee who works for one organization that sells said employee’s service to
another company, either on a project or time basis.
• Contract of Employment: When an employee is offered work in exchange for wages or salary, and
accepts the offer made by the employer, a contract of employment exists.
• Corporate Culture: The beliefs and values shared by all the members of a company, and imparted
from one generation of employees to another.
• Counter Offer/Counter Proposal: A negotiation technique used by potential candidates to increase
the amount of salary offered by a company.
• Cover Letter: A letter that accompanies a candidate’s resume. It emphasizes the important points in
the candidate’s resume and provides real examples that prove the candidate’s ability to perform
the expected job role.
• Curriculum Vitae (CV)/Resume: A summary of a candidate’s achievements, educational background,
work experience, skills and strengths.
• Declining Letter: A letter sent by an employee to an employer, turning down the job offer made by the
employer to the employee.
• Deductions: Amounts subtracted from an employee’s pay and listed on the employee’s pay slip.
• Discrimination: The act of treating one person not as favourably as another person.
• Employee: A person who works for another person in exchange for payment.
• Employee Training: A workshop or in-house training that an employee is asked to attend
by his or her superior, for the benefit of the employer.
• Employment Gaps: Periods of unemployed time between jobs.
• Fixed-Term Contract: A contract of employment which gets terminated on an agreed-upon date.
• Follow-Up: The act of contacting a potential employer after a candidate has submitted his or her resume.
• Freelancer/Consultant/Independent Contractor: A person who works for him or herself and pitches
for temporary jobs and projects with different employers.
• Holiday: Paid time-off from work.
• Hourly Rate: The amount of salary or wages paid for 60 minutes of work.
• Internship: A job opportunity offered by an employer to a potential employee, called an intern, to work
at the employer’s company for a fixed, limited time period.
• Interview: A conversation between a potential employee and a representative of an employer, in
order to determine if the potential employee should be hired.
• Job Application: A form which asks for a candidate’s information like the candidate’s name, address, contact
details and work experience. The purpose of a candidate submitting a job application, is to show that
candidate’s interest in working for a particular company.
• Job Offer: An offer of employment made by an employer to a potential employee.
• Job Search Agent: A program that enables candidates to search for employment opportunities
by selecting criteria listed in the program, for job vacancies.
• Lay Off: A lay off occurs when an employee is temporarily let go from his or her job, due to
the employer not having any work for that employee.
• Leave: Formal permission given to an employee, by his or her employer, to take a leave of
absence from work.
286
Participant Handbook
• Letter of Acceptance: A letter given by an employer to an employee, confirming the offer of employment
made by the employer, as well as the conditions of the offer.
• Letter of Agreement: A letter that outlines the terms of employment.
• Letter of Recommendation: A letter written for the purpose of validating the work skills of a person.
• Maternity Leave: Leave taken from work by women who are pregnant, or who have just given birth.
• Mentor: A person who is employed at a higher level than you, who offers you advice and guides you
in your career.
• Minimum wage: The minimum wage amount paid on an hourly basis.
• Notice: An announcement made by an employee or an employer, stating that the employment
contract will end on a particular date.
• Offer of Employment: An offer made by an employer to a prospective employee that contains
important information pertaining to the job being offered, like the starting date, salary, working
conditions etc.
• Open-Ended Contract: A contract of employment that continues till the employer or employee
terminates it.
• Overqualified: A person who is not suited for a particular job because he or she has too many years
of work experience, or a level of education that is much higher than required for the job, or is
currently or was previously too highly paid.
• Part-Time Worker: An employee who works for fewer hours than the standard number of hours
normally worked.
• Paternity Leave: Leave granted to a man who has recently become a father.
287
Employability & Entrepreneurship Skills
288
Participant Handbook
Importance of Entrepreneurship
Entrepreneurship is very important for the following reasons:
1. It results in the creation of new organizations
2. It brings creativity into the marketplace
3. It leads to improved standards of living
4. It helps develop the economy of a country
Characteristics of Entrepreneurs
All successful entrepreneurs have certain characteristics in common.
They are all:
• Extremely passionate about their work • Highly creative
• Confident in themselves • Visionaries
• Disciplined and dedicated • Open-minded
• Motivated and driven • Decisive
Entrepreneurs also have a tendency to:
• Have a high risk tolerance • Understand their offering and their market in detail
• Thoroughly plan everything • Ask for advice from experts when required
• Manage their money wisely • Know when to cut their losses
• Make their customers their priority
Types of Enterprises
As an entrepreneur in India, you can own and run any of the following types of enterprises:
Sole Proprietorship
In a sole proprietorship, a single individual owns, manages and controls the enterprise. This type of business
is the easiest to form with respect to legal formalities. The business and the owner have no separate legal
existence. All profit belongs to the proprietor, as do all the losses the liability of the entrepreneur is unlimited.
289
Employability & Entrepreneurship Skills
Partnership
A partnership firm is formed by two or more people. The owners of the enterprise are called partners. A
partnership deed must be signed by all the partners. The firm and its partners have no separate legal
existence. The profits are shared by the partners. With respect to losses, the liability of the partners is
unlimited. A firm has a limited life span and must be dissolved when any one of the partners dies, retires,
claims bankruptcy or goes insane.
Limited Liability Partnership (LLP)
In a Limited Liability Partnership or LLP, the partners of the firm enjoy perpetual existence as well as the
advantage of limited liability. Each partner’s liability is limited to their agreed contribution to the LLP. The
partnership and its partners have a separate legal existence.
Tips
• Learn from others’ failures.
• Be certain that this is what you want.
• Search for a problem to solve, rather than look for a problem to attach to your idea.
1. Pragmatism: This means having the ability to highlight all obstacles and challenges, in order to resolve
issues and reduce risks.
2. Humility: This means admitting to mistakes often and early, and being quick to take responsibility for your
actions. Mistakes should be viewed as challenges to overcome, not opportunities to point blame.
3. Flexibility: It is critical for a good leader to be very flexible and quickly adapt to change. It is equally
critical to know when to adapt and when not to.
4. Authenticity: This means showing both, your strengths and your weaknesses. It means being human and
showing others that you are human.
5. Reinvention: This means refreshing or changing your leadership style when necessary. To do this, it’s
important to learn where your leadership gaps lie and find out what resources are required to close
them.
6. Awareness: This means taking the time to recognize how others view you. It means understanding how
your presence affects those around you.
290
Participant Handbook
1. Unity of purpose: All the team members should clearly understand and be equally committed to the
purpose, vision and goals of the team.
2. Great communication skills: Team members should have the ability to express their concerns, ask
questions and use diagrams, and charts to convey complex information.
3. The ability to collaborate: Every member should feel entitled to provide regular feedback on new ideas.
4. Initiative: The team should consist of proactive individuals. The members should have the enthusiasm to
come up with new ideas, improve existing ideas, and conduct their own research.
5. Visionary members: The team should have the ability to anticipate problems and act on these potential
problem before they turn into real problems.
6. Great adaptability skills: The team must believe that change is a positive force. Change should be seen
as the chance to improve and try new things.
7. Excellent organizational skills: The team should have the ability to develop standard work processes,
balance responsibilities, properly plan projects, and set in place methods to measure progress and ROI.
Tips
• Don’t get too attached to your original idea. Allow it to evolve and change.
• Be aware of your weaknesses and build a team that will complement your shortfalls.
• Hiring the right people is not enough. You need to promote or incentivize your most
talented people to keep them motivated.
• Earn your team’s respect.
291
Employability & Entrepreneurship Skills
Ÿ Incorporate body language in your speech like eye contact, smiling, nodding, gesturing etc.
Ÿ Build a draft of your speech before actually making your speech.
Ÿ Ensure that all your emotions and feelings are under control.
Ÿ Pronounce your words distinctly with the correct pitch and intensity. Your speech should be crystal clear
at all times.
Ÿ Use a pleasant and natural tone when speaking. Your audience should not feel like you are putting on an
accent or being unnatural in any way.
Ÿ Use precise and specific words to drive your message home. Ambiguity should be avoided at all costs.
Ÿ Ensure that your speech has a logical flow.
Ÿ Be brief. Don’t add any unnecessary information.
Ÿ Make a conscious effort to avoid irritating mannerisms like fidgeting, twitching etc.
292
Participant Handbook
Ÿ Choose your words carefully and use simple words that the majority of the audience will have no difficulty
understanding.
Ÿ Use visual aids like slides or a whiteboard.
Ÿ Speak slowly so that your audience can easily understand what you’re saying. However, be
Ÿ careful not to speak too slowly because this can come across as stiff, unprepared or even condescending.
Ÿ Remember to pause at the right moments.
Tips
Ÿ If you’re finding it difficult to focus on what someone is saying, try repeating their words in your head.
Ÿ Always maintain eye contact with the person that you are communicating with, when speaking as well as
listening. This conveys and also encourages interest in the conversation.
1. Goals 2. Obstacles
The aim of problem solving is to recognize the obstacles and remove them in order to achieve the goals.
1. Application forms: Ask for proof of the candidate’s problem solving skills in the application form.
2. Psychometric tests: Give potential candidates logical reasoning and critical thinking tests
and see how they fare.
3. Interviews: Create hypothetical problematic situations or raise ethical questions and see how the
candidates respond.
4. Technical questions: Give candidates examples of real life problems and evaluate their
thought process.
293
Employability & Entrepreneurship Skills
What is Negotiation?
Negotiation is a method used to settle differences. The aim of negotiation is to resolve differences through a
compromise or agreement while avoiding disputes. Without negotiation, conflicts are likely to lead to
resentment between people. Good negotiation skills help satisfy both parties and go a long way towards
developing strong relationships.
Why Negotiate?
Starting a business requires many, many negotiations. Some negotiations are small while others are critical
enough to make or break a startup. Negotiation also plays a big role inside the workplace. As an
entrepreneur, you need to know not only know how to negotiate yourself, but also how to train employees in
the art of negotiation.
How to Negotiate?
Take a look at some steps to help you negotiate:
Step 1: Pre-Negotiation Agree on where to meet to discuss the problem, decide who all will
Preparation be present and set a time limit for the discussion.
Step 2: Discuss the This involves asking questions, listening to the other side, putting
Problem your views forward and clarifying doubts.
Step 3: Clarify the Ensure that both parties want to solve the same problem and reach
Objective the same goal.
Step 4: Aim for a Try your best to be open minded when negotiating. Compromise
Win-Win Outcome and offer alternate solutions to reach an outcome where both
parties win.
Step 5: Clearly Define When an agreement has been reached, the details of the
the Agreement agreement should be crystal clear to both sides, with no scope for
misunderstandings.
Step 6: Implement the Agree on a course of action to set the solution in motion
Agreed Upon Solution
Tips
• Know exactly what you want before you work towards getting it
• Give more importance to listening and thinking, than speaking
• Focus on building a relationship rather than winning
• Remember that your people skills will affect the outcome
• Know when to walk away – sometimes reaching an agreement may not be possible
294
Participant Handbook
A business opportunity means a good or favourable change available to run a specific business in a given
environment, at a given point of time.
Common Questions Faced by Entrepreneurs
A critical question that all entrepreneurs face is how to go about finding the business opportunity
that is right for them.
Some common questions that entrepreneurs constantly think about are:
Ÿ Should the new enterprise introduce a new product or service based on an unmet need?
Ÿ Should the new enterprise select an existing product or service from one market and offer it in another
where it may not be available?
Ÿ Should the enterprise be based on a tried and tested formula that has worked elsewhere?
It is therefore extremely important that entrepreneurs must learn how to identify new and
existing business opportunities and evaluate their chances of success.
295
Employability & Entrepreneurship Skills
STRENGTH WEAKNESSES
What are your strengths? What are your weaknesses?
What unique capabilities do What do your competitors do
you posses? better than you?
What do you do better than
others?
What do others percieve
as your strengths? S W
OPPORTUNITIES O T THREATS
What Trends may positively Do you have solid financial
impact you? support?
What oppprtunities are What trends may negatively
available to you? impact you?
Opportunity Analysis
Once you have identified an opportunity, you need to analyze it.
To analyze an opportunity, you must:
• Focus on the idea • Talk to industry leaders in the same space as the idea
• Focus on the market of the idea • Talk to players in the same space as the idea
Tips
• Remember, opportunities are situational. • Avoid the latest craze.
• Look for a proven track record. • Love your idea.
296
Participant Handbook
2. The Growth Potential Entrepreneur: The desire of this type of entrepreneur is to start an enterprise that
will grow, win many customers and make lots of money. Their ultimate aim is to eventually sell their
enterprise for a nice profit. Such entrepreneurs usually have a science or technical background.
3. The Project-Oriented Entrepreneur: This type of entrepreneur generally has a background in the Arts or
psychology. Their enterprises tend to be focus on something that they are very passionate about.
4. The Lifestyle Entrepreneur: This type of entrepreneur has usually worked as a teacher or a secretary.
They are more interested in selling something that people will enjoy, rather than making lots of money.
Characteristics of an Entrepreneur
Successful entrepreneurs have the following characteristics:
• They are highly motivated
• They are creative and persuasive
• They are mentally prepared to handle each and every task
• They have excellent business skills – they know how to evaluate their cash flow, sales and revenue
• They are willing to take great risks
• They are very proactive – this means they are willing to do the work themselves, rather
than wait for someone else to do it
• They have a vision – they are able to see the big picture
• They are flexible and open-minded
• They are good at making decisions
Stage 1: Idea Generation. The entrepreneurial process begins with an idea that has been thought of by the
entrepreneur. The idea is a problem that has the potential to be solved.
Stage 2: Germination or Recognition. In this stage a possible solution to the identified problem is thought of.
Stage 3: Preparation or Rationalization. The problem is studied further and research is done to find out how
others have tried to solve the same problem.
297
Employability & Entrepreneurship Skills
Stage 4: Incubation or Fantasizing. This stage involves creative thinking for the purpose of coming up with
more ideas. Less thought is given to the problem areas.
Stage 5: Feasibility Study: The next step is the creation of a feasibility study to determine if the idea will make
a profit and if it should be seen through.
Stage 6: Illumination or Realization. This is when all uncertain areas suddenly become clear. The entrepreneur
feels confident that his idea has merit.
Stage 7: Verification or Validation. In this final stage, the idea is verified to see if it works and if it is useful.
Take a look at the diagram below to get a better idea of this process.
Idea Germination
Generation (Recognition)
Preparation
(Rationalisation)
Incubation
(Fantasising)
Feasibility
Study
Illumination Varification
(Realisation) (Validation)
1. Favourable Culture: This includes elements such as tolerance of risk and errors, valuable
networking and positive social standing of the entrepreneur.
2. Facilitating Policies & Leadership: This includes regulatory framework incentives and
existence of public research institutes.
3. Financing Options: Angel financing, venture capitalists and micro loans would be good examples of this.
4. Human Capital: This refers to trained and untrained labour, entrepreneurs and entrepreneurship training
programmes, etc.
5. Conducive Markets for Products & Services: This refers to an existence or scope of existence of a market
for the product/service.
6. Institutional & Infrastructural Support: This includes legal and financing advisers, telecommunications,
digital and transportation infrastructure, and entrepreneurship networking programmes.
These domains indicate whether there is a strong entrepreneurship support ecosystem and
what actions should the government put in place to further encourage this ecosystem. The six
domains and their various elements have been graphically depicted.
298
Leadership
Early Customers Government
• Unequivocal support • Institutions • Research institutes
• Early adopters for proof-of-concept
• Social legitimacy e.g. Investment, support
• Expertise in productizing
• Reference customer
• Open door for advocate
• Financial support • Venture-friendly
• First reviews • Entrepreneurship strategy e.g. for R&D, jump start funds legislation
• Distribution channels • urgency, crisis and challenge
Regulatory framework • e.g. Bankruptcy,
incentives contract enforcement, pro-
Participant Handbook
Networks
e.g. Tax benifits perty rights, and labour
• Entrepreneure’s networks Policy
• Diaspora networks Financial Capital
• Multinational corporations • Micro-loans • Venture capital funds
Market Finance • Angel investors, fri- • Private equity
Labour ends and family • Public capital markets
• Zero-stage venture • Debt
• Skilled and unskilled
Entrepreneurship capital
• Serial entrepreneures
299
• Later generation family Success Stories
Human • Visible successes
Educational Institutions Culture
• General degrees (professional and academic)
Capital • Wealth generation for founders
• Specific entrepreneurship training • International reputation
Supports Societal norms
Infrastructure
• Tolerance of risk, mistakes, failure
• Telecommunications • Innovation, creativity, experimentation
• Transportation & logistics • Social status of entrepreneur
• Energy • Wealth creation
• Zones, incubation centers, clusters Non-Government Institution • Ambition, drive, hunger
• Entrepreneurship • Conferences
Support Professions promotion in
• Legal non-profits
• Accounting • Business plan • Entrepreneur- fri-
• Investment bankers contests endly association
Fig.14.5.2 Entrepreneurship at a Glance
Employability & Entrepreneurship Skills
Every entrepreneurship support ecosystem is unique and all the elements of the ecosystem are
interdependent. Although every region’s entrepreneurship ecosystem can be broadly described by the above
features, each ecosystem is the result of the hundred elements interacting in highly complex and particular
ways.
Entrepreneurship ecosystems eventually become (largely) self-sustaining. When the six domains are resilient
enough, they are mutually beneficial. At this point, government involvement can and should be significantly
minimized. Public leaders do not need to invest a lot to sustain the ecosystem. It is imperative that the
entrepreneurship ecosystem incentives are formulated to be self-liquidating, hence focussing on sustain
ability of the environment.
The Make in India campaign, launched by Prime Minister Modi aims to satisfy all these needs of young,
aspiring entrepreneurs. Its objective is to:
300
Participant Handbook
1. Pradhan Mantri MUDRA Yojana, - Micro Units Development and Refinance Agency (MUDRA),
Description
Under the aegis support of Pradhan Mantri MUDRA Yojana, MUDRA has already created its initial
products/schemes. The interventions have been named 'Shishu', 'Kishor' and 'Tarun' to signify the stage of
growth/development and funding needs of the beneficiary micro unit/entrepreneur and also provide a
reference point for the next phase of graduation/growth to look forward to:
a. Shishu: Covering loans upto Rs.50,000/-
b. Kishor: Covering loans above Rs. 50,000/- and upto Rs.5 lakh
c. Tarun: Covering loans above Rs. 5 lakh to Rs.10 lakh
Who can apply?
Any Indian citizen who has a business plan for a non-farm sector income generating activity such as
manufacturing, processing, trading or service sector and whose credit need is less than Rs.10 lakh can
approach either a Bank, MFI, or NBFC for availing of MUDRA loans under Pradhan Mantri Mudra Yojana
(PMMY).
2. Stand Up India
Description
The objective of the Standup India scheme is to facilitate bank loans between Rs.10 lakh and Rs.1 crore to at
least one Schedule Caste (SC) or Scheduled Tribe (ST) borrower and at least one woman borrower per bank
branch for setting up a Greenfield enterprise. This enterprise may be in manufacturing, services or the
trading sector. In case of non-Individual enterprises at least 51% of the shareholding and controlling stake
should be held be either an SC/ST or Woman Entrepreneur.
Who can apply?
ST, SC &Women
Nature of assistance
The maximum cost of the project/unit admissible under manufacturing sector is Rs.25 lakh and under
business/service sector is Rs.10 lakh. Levels of funding under PMEGP
301
Employability & Entrepreneurship Skills
The balance amount of the total project cost will be provided by Banks as term loan as well as working capital.
Who can apply?
Any individual, above 18 years of age. At least VIII standard pass for projects costing above Rs.10 lakh in the
manufacturing sector and above Rs.5 lakh in the business/service sector. Only new projects are considered
for sanction under PMEGP. Self Help Groups (including those belonging to BPL provided that they have not
availed benefits under any other Scheme), Institutions registered under Societies Registration Act,1860;
Production Co-operative Societies, and Charitable Trusts are also eligible. Existing Units (under PMRY, REGP
or any other scheme of Government of India or State Government) and the units that have already availed
Government Subsidy under any other scheme of Government of India or State Government are NOT eligible.
4. International Cooperation
Description
The Scheme would cover the following activities:
a. Deputation of MSME business delegations to other countries for exploring new areas of technology
infusion/upgradation, facilitating joint ventures, improving market of MSMEs products, foreign
collaborations, etc.
b. Participation by Indian MSMEs in international exhibitions, trade fairs and buyer-seller meets in foreign
countries as well as in India, in which there is international participation.
c. Holding international conferences and seminars on topics and themes of interest to the MSME.
Nature of assistance
IC Scheme provides financial assistance towards the airfare and space rent of entrepreneurs. Assistance is
provided on the basis of size and the type of the enterprise.
Who can apply?
a. State/Central Government Organisations;
b. Industry/Enterprise Associations; and
c. Registered Societies/Trusts and Organisations associated with the promotion and development of
MSMEs
5. Performance and Credit Rating for Micro and Small Enterprises
Description
The objective of the Scheme is to create awareness amongst micro & small enterprises about the strengths
and weaknesses of their operations and also their credit worthiness.
Nature of assistance
Up to Rs.50 lacs 75% of the fee charged by the rating agency subject
to a ceiling Rs.15,000/-
Above Rs.50 lacs to Rs.200 75% of the fee charged by the rating agency subject
lacs to a ceiling of Rs.30,0001-
Above Rs.200 lacs 75% of the fee charged by the rating agency subject
302
Participant Handbook
Nature of assistance
Financial assistance of up to 95% of the airfare and space rent of entrepreneurs. Assistance is provided on the
basis of size and the type of the enterprise. Financial assistance for co-sponsoring would be limited to 40% of
the net expenditure, subject to maximum amount of Rs.5 lakh.
Who can apply?
MSMEs, Industry Associations and other organizations related to MSME sector.
7. Reimbursement of Registration Fee for Bar Coding
Description
The financial assistance is provided towards 75% reimbursement of only one-time registration fee and 75%
of annual recurring fee for first three years paid by MSEs to GS1 India for using bar coding.
Nature of assistance
Funding support for reimbursement of 75% of one time and recurring bar code registration fees.
Who can apply?
All MSMEs with EM registration.
8. Enabling Participation of MSMEs in State/District Level Trade Fairs and Provide Funding Support
Description
Provide marketing platform to manufacturing MSMEs by enabling their participation in state/district
level exhibitions being organized by state/district authorities/associations.
Nature of assistance
1. Free registration for participating in trade fairs
Note: The selection of participants would be done by the MSME-DIs post the submission of application.
2. Reimbursement of 50% of to and fro actual fare by shortest distance/direct train (limited
to AC II tier class) from the nearest railway station/bus fare to the place of exhibition and 50% space
rental charges for MSMEs (General category entrepreneurs).
3. For Women/SC/ST entrepreneurs & entrepreneurs from North Eastern Region Govt. of
India will reimburse 80% of items listed above in Point (2).
Note: The total reimbursement will be max. Rs.30,000/- per unit for the SC/ST/Women/Physically
Handicapped entrepreneurs, while for the other units the max. limit will be Rs.20,000/- per person per
MSME unit.
Note: The participant is required to submit follow-up proofs post attending the event to claim
reimbursement. The proofs can be submitted after logging in online under the section "My Applications" or
directly contacting a DI office.
Who can apply?
All MSMEs with EM registration.
303
Employability & Entrepreneurship Skills
304
Participant Handbook
Tips
• Research the existing market, network with other entrepreneurs, venture capitalists, angel investors, and
thoroughly review the policies in place to enable your entrepreneurship.
• Failure is a stepping stone and not the end of the road. Review yours and your peers’ errors and correct
them in your future venture.
• Be proactive in your ecosystem. Identify the key features of your ecosystem and enrich them to ensure
self-sustainability of your entrepreneurship support ecosystem.
305
Employability & Entrepreneurship Skills
Tips
• Cultivate a great network of clients, suppliers, peers, friends and family. This will not only
help you promote your business, but will also help you learn, identify new opportunities
and stay tuned to changes in the market.
• Don’t dwell on setbacks. Focus on what the you need to do next to get moving again.
• While you should try and curtail expenses, ensure that it is not at the cost of your growth.
306
Participant Handbook
Shyam: Well, there is no one single reason why entrepreneurs fail. An entrepreneur can fail due to numerous
reasons. You could fail because you have allowed your fear of failure to defeat you. You could fail because you
are unwilling to delegate (distribute) work. As the saying goes, “You can do anything, but not everything!” You
could fail because you gave up too easily – maybe you were not persistent enough. You could fail because you
were focusing your energy on small, insignificant tasks and ignoring the tasks that were most important.
Other reasons for failing are partnering with the wrong people, not being able to sell your product to the right
customers at the right time at the right price… and many more reasons!
Shyam: I believe we should all look at failure as an asset, rather than as something negative. The way I see it,
if you have an idea, you should try to make it work, even if there is a chance that you will fail. That’s because
not trying is failure right there, anyway! And failure is not the worst thing that can happen. I think having
regrets because of not trying, and wondering ‘what if’ is far worse than trying and actually failing.
Interviewer: How did you feel when you failed for the first time?
Shyam: I was completely heartbroken! It was a very painful experience. But the good news is, you do recover
from the failure. And with every subsequent failure, the recovery process gets a lot easier. That’s because you
start to see each failure more as a lesson that will eventually help you succeed, rather than as an obstacle that
you cannot overcome. You will start to realize that failure has many benefits.
Shyam: One of the benefits that I have experienced personally from failing is that the failure made me see
things in a new light. It gave me answers that I didn’t have before. Failure can make you a lot stronger. It also
helps keep your ego in control.
Interviewer: What advice would you give entrepreneurs who are about to start their own enterprises?
Shyam: I would tell them to do their research and ensure that their product is something that is actually
wanted by customers. I’d tell them to pick their partners and employees very wisely and cautiously. I’d tell
them that it’s very important to be aggressive – push and market your product as aggressively as possible. I
would warn them that starting an enterprise is veryexpensive and that they should be prepared for a situation
where they run out of money.I would tell them to create long term goals and put a plan in action to achieve
that goal. I would tell them to build a product that is truly unique. Be very careful and ensure that you are not
copying another startup. Lastly, I’d tell them that it’s very important that they find the right investors.
Interviewer: That’s some really helpful advice, Shyam! I’m sure this will help all entrepreneurs
to be more prepared before they begin their journey! Thank you for all your insight!
Tips
• Remember that nothing is impossible.
• Identify your mission and your purpose before you start.
• Plan your next steps – don’t make decisions hastily.
307
Employability & Entrepreneurship Skills
Primary research
Primary research can be of two types:
• Exploratory: This is open-ended and usually involves detailed, unstructured interviews.
• Specific: This is precise and involves structured, formal interviews. Conducting specific
308
Participant Handbook
Secondary research
Secondary research uses outside information. Some common secondary sources are:
• Public sources: These are usually free and have a lot of good information. Examples are government
departments, business departments of public libraries etc.
• Commercial sources: These offer valuable information but usually require a fee to be paid. Examples are
research and trade associations, banks and other financial institutions etc.
• Educational institutions: These offer a wealth of information. Examples are colleges, universities,
technical institutes etc.
The 4 Ps of Marketing
The 4 Ps of marketing are Product, Price, Promotion and Place. Let’s look at each of these 4 Ps in detail.
Product
A product can be:
• A tangible good • An intangible service
Whatever your product is, it is critical that you have a clear understanding of what you are offering, and what
its unique characteristics are, before you begin with the marketing process.
Some questions to ask yourself are:
• What does the customer want from the • How will customers use it?
product/service? • What should it be called?
• What needs does it satisfy? • How is it different from similar products?
• Are there any more features that can be • How much will it cost to produce?
added? • Can it be sold at a profit?
• Does it have any expensive and unnecessary
features?
Price
Once all the elements of Product have been established, the Price factor needs to be considered.
The Price of a Product will depend on several factors such as profit margins, supply, demand
and the marketing strategy.
Some questions to ask yourself are:
• What is the value of the product/service to • Is the customer price sensitive?
customers? • Should discounts be offered?
• Do local products/services have established • How is your price compared to that of your
price points? competitors?
Promotion
Once you are certain about your Product and your Price, the next step is to look at ways to promote it. Some
key elements of promotion are advertising, public relations, social media marketing, email marketing, search
engine marketing, video marketing and more.
Some questions to ask yourself are:
• Where should you promote your product or • When would be the best time to promote
service? your product?
• What is the best medium to use to reach your • How are your competitors promoting their
target audience? products?
Place
According to most marketers, the basis of marketing is about offering the right product, at the right price, at
the right place, at the right time. For this reason, selecting the best possible location is critical for converting
prospective clients into actual clients.
309
Employability & Entrepreneurship Skills
Importance of an IDEA
Some questions to ask yourself are:
Ideas are the foundation of progress. An idea can be small or ground-breaking, easy to accomplish or
extremely complicated to implement. Whatever the case, the fact that it is an idea gives it merit. Without
ideas, nothing is possible. Most people are afraid to speak out their ideas, out for fear of being ridiculed.
However, if are an entrepreneur and want to remain competitive and innovative, you need to bring your ideas
out into the light.
Some ways to do this are by:
• Establishing a culture of brainstorming where you invite all interested parties to contribute
• Discussing ideas out loud so that people can add their ideas, views, opinions to them
• Being open minded and not limiting your ideas, even if the idea who have seems ridiculous
• Not discarding ideas that you don’t work on immediately, but instead making a note of
them and shelving them so they can be revisited at a later date
Tips
• Keep in mind that good ideas do not always have to be unique.
• Remember that timing plays a huge role in determining the success of your idea.
• Situations and circumstances will always change, so be flexible and adapt your idea
accordingly.
310
Participant Handbook
3. Break-Even Point: This is the point at which the company will not make a profit or a loss. The total cost
and total revenues are equal.
Formula: Break-Even = Fixed Costs/Sales Price – Variable Cost per Unit
5. Profit Margin: This is shown as a percentage. It shows what percentage of sales are left over after all the
expenses are paid by the business.
Formula: Profit Margin = Net Income/Sales
6. Debt-to-Equity Ratio: This ratio shows how much equity and debt a company is using to finance its assets,
and whether the shareholder equity can fulfill obligations to creditors if the business starts making a loss.
Formula: Debt-to-Equity Ratio = Total Liabilities/Total Equity
311
Employability & Entrepreneurship Skills
7. Cost of Goods Sold: This is the total of all costs used to create a product or service, which has been sold.
Formula: Cost of Goods Sold = Cost of Materials/Inventory – Cost of Outputs
8. Return on Investment (ROI): This is usually shown as a percentage. It calculates the profits of an
investment as a percentage of the original cost.
Formula: ROI = Net Profit/Total Investment * 100
9. Simple Interest: This is money you can earn by initially investing some money (the principal).
Formula:
A = P(1 + rt); R = r * 100
Where:
A = Total Accrued Amount (principal + interest)
P = Principal Amount
I = Interest Amount
r = Rate of Interest per year in decimal; r = R/100
t = Time Period involved in months or years
10. Annual Compound Interest: The calculates the addition of interest to the principal sum of a loan or
deposit.
Formula:
A = P (1 + r/n) ^ nt:
Where:
A = the future value of the investment/loan, including interest
P = the principal investment amount (the initial deposit or loan amount)
r = the annual interest rate (decimal)
n = the number of times that interest is compounded per year
t = the number of years the money is invested or borrowed for
Benefits of CRM
CRM has a number of important benefits:
• It helps improve relations with existing customers which can lead to:
¡ Increased sales
¡ Identification of customer needs
¡ Cross-selling of products
• It results in better marketing of one’s products or services
312
Participant Handbook
Tips
• Use social media interactions to identify needs and gather feedback.
• When networking, ask open-ended questions rather than yes/no type questions.
313
Employability & Entrepreneurship Skills
Business Description
The second section of your business plan needs to provide a detailed review of the different elements of your
business. This will help potential investors to correctly understand your business goal and the uniqueness of
your offering.
Your Business Description should include:
• A description of the nature of your business
• The market needs that you are aiming to satisfy
• The ways in which your products and services meet these needs
• The specific consumers and organizations that you intend to serve
• Your specific competitive advantages
Market Analysis
The market analysis section usually follows the business description. The aim of this section is to showcase
your industry and market knowledge. This is also the section where you should lay down your research
findings and conclusions.
Your Market Analysis should include:
• Your industry description and outlook • The amount of market share you want to
• Information on your target market capture
• The needs and demographics of your target • Your pricing structure
audience • Your competitive analysis
• The size of your target market • Any regulatory requirements
Organization & Management
This section should come immediately after the Market Analysis.
Your Organization & Management section should include:
• Your company’s organizational structure • Detailed descriptions of each
• Details of your company’s ownership division/department and its function
• Details of your management team • The salary and benefits package that you offer
• Qualifications of your board of directors your people
314
Participant Handbook
Financial Planning
Before you begin building your enterprise, you need to plan your finances. Take a look at the steps for
financial planning:
Step 1: Create a financial plan. This should include your goals, strategies and timelines for
accomplishing these goals.
315
Participant Handbook
Step 2: Organize all your important financial documents. Maintain a file to hold your investment
details, bank statements, tax papers, credit card bills, insurance papers and any other financial
records.
Step 3: Calculate your net worth. This means figure out what you own (assets like your house,
bank accounts, investments etc.), and then subtract what you owe (liabilities like loans, pending
credit card amounts etc.) the amount you are left with is your net worth.
Step 4: Make a spending plan. This means write down in detail where your money will come
from, and where it will go.
Step 5: Build an emergency fund. A good emergency fund contains enough money to cover at
least 6 months’ worth of expenses.
Step 6: Set up your insurance. Insurance provides long term financial security and protects you
against risk.
Risk Management
As an entrepreneur, it is critical that you evaluate the risks involved with the type of enterprise that you want
to start, before you begin setting up your company. Once you have identified potential risks, you can take
steps to reduce them. Some ways to manage risks are:
• Research similar business and find out about their risks and how they were minimized.
• Evaluate current market trends and find out if similar products or services that launched a while ago
are still being well received by the public.
• Think about whether you really have the required expertise to launch your product or service.
• Examine your finances and see if you have enough income to start your enterprise.
• Be aware of the current state of the economy, consider how the economy may change over time, and
think about how your enterprise will be affected by any of those changes.
• Create a detailed business plan.
Tips
• Ensure all the important elements are • Be conservative in your approach and your
covered in your plan. projections.
• Scrutinize the numbers thoroughly. • Use visuals like charts, graphs and images
wherever possible.
• Be concise and realistic.
316
Employability & Entrepreneurship Skills
General Credentials
This is where you, as an entrepreneur, provide the bank with background information on yourself. Such
information includes:
• Letter(s) of Introduction: This letter should be written by a respected business person who knows you
well enough to introduce you. The aim of this letter is set across your achievements and vouch for
your character and integrity.
• Your Profile: This is basically your resume. You need to give the bank a good idea of your educational
achievements, professional training, qualifications, employment record and achievements.
• Business Brochure: A business brochure typically provides information on company products, clients,
how long the business has been running for etc.
• Bank and Other References: If you have an account with another bank, providing those bank
references is a good idea.
• Proof of Company Ownership or Registration: In some cases, you may need to provide the bank with
proof of company ownership and registration. A list of assets and liabilities may also be required.
Financial Situation
Banks will expect current financial information on your enterprise. The standard financial reports you should
be prepared with are:
• Balance Sheet • Profit-and-Loss Account
• Cash-Flow Statement • Projected Sales and Revenues
• Business Plan • Feasibility Study
Guarantees or Collaterals
Usually banks will refuse to grant you a loan without security. You can offer assets which the
bank can seize and sell off if you do not repay the loan. Fixed assets like machinery, equipment,
vehicles etc. are also considered to be security for loans.
The Lending Criteria of Banks
Your request for funding will have a higher chance of success if you can satisfy the following
lending criteria:
• Good cash flow • Adequate shareholders’ funds
• Adequate security • Experience in business
• Good reputation
The Procedure
To apply for funding the following procedure will need to be followed.
1. Submit your application form and all other required documents to the bank.
2. The bank will carefully assess your credit worthiness and assign ratings by analyzing your business
information with respect to parameters like management, financial, operational and industry
information as well as past loan performance.
3. The bank will make a decision as to whether or not you should be given funding.
Tips
• Get advice on funding options from experienced bankers.
• Be cautious and avoid borrowing more than you need, for longer than you need, at an
interest rate that is higher than you are comfortable with.
317
Participant Handbook
Step 2: Divide your work amongst others – realize that you cannot handle everything yourself.
Even the most skilled manager in the world will not be able to manage every single task that an enterprise will
demand of him. A smart manager needs to realize that the key to managing his enterprise lies in his dividing
all his work between those around him. This is known as delegation. However, delegating is not enough. A
manager must delegate effectively if he wants to see results. This is important because delegating, when done
incorrectly, can result in you creating even more work for yourself. To delegate effectively, you can start by
making two lists. One list should contain the things that you know you need to handle yourself. The second
list should contain the things that you are confident can be given to others to manage and handle. Besides
incorrect delegation, another issue that may arise is over-delegation. This means giving away too many of
your tasks to others. The problem with this is, the more tasks you delegate, the more time you will spend
tracking and monitoring the work progress of those you have handed the tasks to. This will leave you with
very little time to finish your own work.
318
Employability & Entrepreneurship Skills
also hire a marketing agency if you feel you need help in this area. Now that you know what is required to run
your enterprise effectively, put these steps into play, and see how much easier managing your enterprise
becomes!
Tips
• Get advice on funding options from experienced bankers.
• Be cautious and avoid borrowing more than you need, for longer than you need, at an
interest rate that is higher than you are comfortable with.
Tips
• It is very important to validate your business ideas before you invest significant time, money and
resources into it.
• The more questions you ask yourself, the more prepared you will be to handle to highs and lows of
starting an enterprise.
Footnotes:
1. A mentor is a trusted and experienced person who is willing to coach and guide you.
2. A customer is someone who buys goods and/or services.
3. A competitor is a person or company that sells products and/or services similar to your products
and/or services.
4. SWOT stands for Strengths, Weaknesses, Opportunities and Threats. To conduct a SWOT analysis of
your company, you need to list down all the strengths and weaknesses of your company, the
opportunities that are present for your company and the threats faced by your company.
5. A minimum viable product is a product that has the fewest possible features, that can be sold to
customers, for the purpose of getting feedback from customers on the product.
6. A company is said to break even when the profits of the company are equal to the costs.
7. The legal structure could be a sole proprietorship, partnership or limited liability partnership.
8. There are two types of taxes – direct taxes payable by a person or a company, or indirect taxes
charged on goods and/or services.
9. There are two types of insurance – life insurance and general insurance. Life insurance overs human
life while general insurance covers assets like animals, goods, cars etc
319
Participant Handbook
Notes
320
Projects
Participant Handbook
Project - 1
Problem statement:
322
Foundation Skills in IoT
Approved by :
Name:
Signature:
Design details:
323
Participant Handbook
So ware requirement:
Architecture:
324
Foundation Skills in IoT
325
Participant Handbook
Name:
Signature:
Date:
Name:
Signature:
Date:
Remarks:
326
Foundation Skills in IoT
Project - 2
Problem statement:
327
Participant Handbook
Approved by :
Name:
Signature:
Design details:
328
Foundation Skills in IoT
So ware requirement:
Architecture:
329
Participant Handbook
330
Foundation Skills in IoT
Name:
Signature:
Date:
Name:
Signature:
Date:
Remarks:
331
Participant Handbook
Notes
332
Foundation Skills in IoT
IT - ITES Sector Skill Council NASSCOM
Plot No -7 to 10, Sector 126, Noida, UP - 201303
Phone : 0120 4990172
e-mail : [email protected]
Website : www.nasscom.in