IoT Notes
IoT Notes
1.1 Introduction
1.2 Characteristics of IoT
1.3 Applications of IoT
1.4 IoT Categories
1.5 IoT Enablers and connectivity layers
1.6 Baseline Technologies
1.7 Sensor
1.8 Actuator
1.9 IoT components and implementation
1.10 Challenges for IoT
1.1 Introduction
Internet of Things (IoT) is presently an emerging technology worldwide. IoT cuts
across different application domain such as agriculture, space, healthcare,
manufacturing, construction, water and mining, which are presently transitioning their
legacy to support IoT.
Definition: The Internet of Things (IoT) is the network of physical devices,
vehicles, home appliances and other items embedded with electronics, software,
sensors, actuators and network connectivity which enables these objects to get
connected and exchange data. Each thing is uniquely identifiable through its
embedded computing system but is able to inter-operate within the existing
Internet infrastructure.
® Internet of Things can also be defined as an Internet technology connecting
devices, machines and tools to the Internet by means of wireless technologies
like Bluetooth, WiFi, ZigBee etc.
® The IoT allows objects to be sensed or controlled remotely across existing
network infrastructure, creating opportunities for more direct integration of the
physical world into computer-based systems and resulting in improved
efficiency, accuracy and economic benefit in addition to reduced human
intervention.
® IoT also results in unification of technologies such as low power embedded
systems, cloud computing, big data, machine learning and networking.
® The two solutions for the networking technologies in IoT are either to expand
the existing network or to build a separate network from the scratch.
Prepared by
Nishita Kindo
1
Lecturer (CSE), BOSE Cuttack
3. Heterogeneity: The devices in the IoT are heterogeneous based on different hardware
platforms, applications and networks. They can interact with other devices or service
platforms through different networks such as sleeping nodes, mobile devices and non-
IP devices.
4. Dynamic changes and and self-adapting: The state of device change dynamically,
e.g., sleeping and waking up, connected or disconnected as well as the context of
devices including location, speed and the number of devices can be changed
dynamically.
5. Scalability: The number of devices that need to be managed and that communicate
with one another will be at least in an order of magnitude larger than the devices
connected to the current Internet that means a system that can handle a growing amount
of work by adding resources to the system like management of generated data and their
interpretation for application purposes for semantics of data, as well as efficient data
handling.
6. Safety/Security: IoT must be designed with safety in mind. This includes the security
of our personal data and the safety of our physical devices. Securing the endpoints, the
networks and the data moving across these networks, creating a security model in IoT.
7. Naming and Addressing: The names and addresses of devices connected to Internet
of Things should be unique. Efficient and unambiguous addressing mechanisms should
be deployed for devices connected in IoT. And also the conversion and translation of
addresses from one network to the other should take place efficiently.
2. Smart City
Internet access to people in a city as well as to the devices in it make smart cities.
Incorporating existing technology into infrastructural requirements and some vital concerns
like Traffic Management, Waste Management, Water Distribution, Electricity Management,
and more. All these work towards eliminating some day-to-day challenges faced by people
and bring in added convenience.
Prepared by
Nishita Kindo
3
Lecturer (CSE), BOSE Cuttack
1.4 IoT Categories/Types of IoT
1. Consumer Internet of Things (CIoT)
Consumer IoT (CIoT) refers to the use of IoT for consumer applications and devices.
Common CIoT products include smartphones, wearables, smart assistants, home
appliances, etc.
There are numerous use cases for commercial IoT, including monitoring environmental
conditions, managing access to corporate facilities, and economizing utilities and
consumption in hotels and other large venues. Many Commercial IoT solutions are
geared towards improving customer experiences and business conditions.
Industrial IoT (IIoT), is perhaps the most dynamic wing of the IoT industry. Its focus
is on augmenting existing industrial systems, making them both more productive and
more efficient. IIoT deployments are typically found in large-scale factories and
manufacturing plants and are often associated with industries like healthcare,
agriculture, automotive, and logistics.The Industrial Internet is perhaps the most well-
known example of IIoT.
4. Infrastructure IoT
Prepared by
Nishita Kindo
4
Lecturer (CSE), BOSE Cuttack
5. Internet of Military Things (IoMT)
The last type of IoT is the Internet of Military Things (IoMT), often referred to as
Battlefield IoT, the Internet of Battlefield Things, or simply IoBT. IoMT is precisely
what it sounds like — the use of IoT in military settings and battlefield situations. It is
chiefly aimed at increasing situational awareness, bolstering risk assessment, and
improving response times.
Common IoMT applications include connecting ships, planes, tanks, soldiers, drones,
and even Forward Operating Bases via an interconnected system. In addition, IoMT
produces data that can be leveraged to improve military practices, systems, equipment,
and strategy.
Based on several discussions on the topic of IoT with operators, there are some key enablers
for IoT which are imperative to achieve success in this new area. For each of the areas of IoT,
the requirement will be different from various contributors. For example, a use case may
require low latency for decision making whereas another would require high throughput for
live video streaming.
Prepared by
Nishita Kindo
5
Lecturer (CSE), BOSE Cuttack
Below are the Top 5 enablers for Internet of things,
1. Selection of use cases with future growth: The most important enabler for IoT is careful
selection of a use case today which has potential growth opportunities in the future. For
example, a use case for agriculture may be based on adding sensors for extracting the
information about the water and fertilizer level today, but in the long run there may be an
evolution to send a drone with fertilizer if levels are observed to be low!
Note: Use case a specific situation in which a product or service could potentially be used.
2. Technology Selection and Evolution: There are multiple options for IoT technologies
available in the markets today, but what is important is to go with the mainstream 3GPP
technologies for inter-working with advanced technologies like 5G in the future and at the same
time providing the highest level of security. For example, like the case of agriculture stated
above, there could be a trigger to plow the field based on water levels by an unmanned ground
vehicle (UGV) in the future based on 5G. Thus is it very important to select technologies today
which can support the evolution of the selected use cases to the next level.
3. Industry Partnerships: IoT has a vast landscape and it is essential for an enabler to have
partnerships to facilitate development of long term solutions, it is very unlikely for a IoT
enabler to have it all in-house. Industry partnerships are required for different aspects, an
enabler would require them for understanding the vertical (Like automobiles, education etc),
partnering for providing devices or associated hardware (like sensors, cameras etc) and for
providing IT systems and platforms for enabling IoT. It is assumed that the basic IoT
connectivity would be always provided by a Mobile operator.
4. IT Transformation: When we talk about IoT, we are not talking about humans, so it will
not make sense to send a connectivity bill to a sensor! Thus it is essential that a IoT enabler has
a IT system which can cater to the needs of IoT, mechanisms for flexibility and scalability for
admitting billions of devices. There are also certain use cases where a system has to cater to
requirements for multi country solutions like you cannot expect that your connected car stops
working when you drive from Malaysia to Singapore.
5. Marketing with a Non-Mobile Mindset: The first and foremost requirement for IoT is
to have a non-mobile mindset – we are no longer talking about mobile phones and humans, we
have a plethora of other devices which will be connected and provide solutions so a sensor will
not walk upto a shop to enroll for connectivity! For any big enterprise investing in IoT it will
be imperative to have a long term view where the short term vision solutions will not fly –
bring the futuristic thought the first!
Prepared by
Nishita Kindo
6
Lecturer (CSE), BOSE Cuttack
IOT LAYERS
These Elements of IoT define the fundamentals of almost every IoT system on the globe. Still,
they are divided into multiple architecture layers to further refine the overall IoT network.
• Business layer that derives information and decision-making analysis from data.
• Security Layer that covers all aspects of protecting the whole IoT architecture
which includes device security, cloud security and connectivity security.
• Edge Computing Layer that works at an edge or near the device information
collection.
Prepared by
Nishita Kindo
7
Lecturer (CSE), BOSE Cuttack
5 Layer Architecture of Internet of Things
1. Perception Layer :
This is the first layer of IoT architecture. In the perception layer, number of sensors
and actuators are used to gather useful information like temperature, moisture content,
intruder detection, sounds, etc. The main function of this layer is to get information
from surroundings and to pass data to another layer so that some actions can be done
based on that information.
2. Network/Connectivity/Transport Layer :
As the name suggests, it is the connecting layer between perception and middleware
layer. It gets data from perception layer and passes data to middleware layer using
networking technologies like 3G, 4G, UTMS, WiFi, infrared, etc. This is also called
communication layer because it is responsible for communication between perception
and middleware layer. All the transfer of data done securely keeping the obtained data
confidential.
3. Middleware/Processing Layer :
Middleware Layer has some advanced features like storage, computation, processing,
action taking capabilities. It stores all data-set and based on the device address and
name it gives appropriate data to that device. It can also take decisions based on
calculations done on data-set obtained from sensors.
4. Application Layer :
The application layer manages all application process based on information obtained
from middleware layer. This application involves sending emails, activating alarm,
security system, turn on or off a device, smartwatch, smart agriculture, etc.
5. Business Layer :
The success of any device does not depend only on technologies used in it but also
how it is being delivered to its consumers. Business layer does these tasks for the
device. It involves making flowcharts, graphs, analysis of results, and how device can
be improved, etc.
6. Additional Layers of IoT-
A) Security Layer: This layer covers all aspects of protecting the whole IoT
architecture which includes device security, cloud security and connectivity
security. Data breach, tracking malicious software, and hacking are the main
challenges with Security Layer in integrating IoT systems.
B) Edge Computing Layer: This layer works at an edge or near the device
information collection.
Prepared by
Nishita Kindo
8
Lecturer (CSE), BOSE Cuttack
® In product restocking, for example, a vending machine can message the distributor
when a particular item is running low.
® M2M communication is an important aspect of warehouse management, remote
control, robotics, traffic control, logistic services, supply chain management, fleet
management and tele-medicines.
® Key components of an M2M system include sensors, RFID, a Wi-Fi or cellular
communications link and autonomic computing software programmed to help a
networked device interpret data and make decisions.
® The most well-known type of M2M communication is telemetry, which has been
used since the early part of the last century to transmit operational data.
® Pioneers in telemetries first used telephone lines and later used radio waves to
transmit performance measurements gathered from monitoring instruments in remote
locations.
® The Internet and improved standards for wireless technology have expanded the role
of telemetry from pure science, engineering to Internet-connected home appliances.
Hence, making them smart but many M2M systems are built to perform device
specific task.
b) Cyber-Physical Systems —
® Cyber-Physical Systems (CPS) represent the next generation embedded intelligent
ICT systems that are interconnected, interdependent, collaborative, autonomous
and provide computing and communication, monitoring/ control of physical
components/ processes in various applications.
® Future CPS needs to be scalable, distributed, decentralized allowing interaction
with humans, environment and machines while being connected to Internet or to
other networks. Adaptability, reactivity, optimality and security are features to be
embedded in such systems , as the CPS is now forming an invisible ‘neural network’
of the society.
® Cyber-Physical systems are systems that integrate computing elements with the
physical components and processes. The computing elements coordinate and
communicate with sensors, which monitor cyber and physical indicators and
actuators, which modify the cyber and physical environment.
® Cyber-Physical systems use sensors to connect all distributed intelligence in the
environment to gain a deeper knowledge of the environment, which enables more
accurate actions and tasks.
® Common applications of CPS typically fall under sensor-based communication-
enabled autonomous systems. For example, many wireless sensor networks monitor
some aspects of the environment and relay the processed information to a central
node.
® Other types of CPS include smart grid, autonomous automotive systems, medical
monitoring, process control systems, distributed robotics, and automatic pilot
avionics.
Prepared by
Nishita Kindo
9
Lecturer (CSE), BOSE Cuttack
c) Web of Things —
® The Web of Things (WoT) is a term used to describe approaches, software
architectural styles and programming patterns that allow real-world objects to be
part of the World Wide Web.
® Similarly to what the Web (Application Layer) is to the Internet (Network Layer),
the Web of Things provides an Application Layer that simplifies the creation of
Internet of Things applications.
® Rather than re-inventing completely new standards, the Web of Things reuses
existing and well-known Web standards used in the programmable Web (e.g.,
REST, HTTP, JSON), semantic Web (e.g., JSON-LD, Microdata, etc.), the real-
time Web (e.g., WebSockets) and the social Web (e.g., OAuth or social networks).
From a developer’s perspective, the WoT enables access and control over IoT
resources and applications using mainstream Web technologies like HTML 5.0,
Javascript, Ajax, PHP etc.
® The approach to build WoT is therefore based on Representational State Transfer
(REST) principles and REST APIs, which enable both developers and deployers to
benefit from the popularity and maturity of Web Technologies.
® This API is then used to create a physical Mashup. (i)Nimbits is an open source data
historian server built on cloud computing architecture that provides connectivity
among devices using data points. (ii)ThingSpeak is an open source Internet of
Things platform created by Hans Scharler to collect, analyze and to act on data
generated by sensors and actuators. (iii)EVRYTHING is a platform for making
unconnected products and connected devices as part of the Web based on Web of
Things architecture.
1.7 Sensor
It is a device that converts signals from one energy domain to electrical domain.
Example: An Automatic Flight Control System consists of several sensors for various tasks
like speed control, height monitoring, position tracking, status of doors, obstacle detection, fuel
level, manoeuverings and many more. A Computer takes data from all these sensors and
processes them by comparing them with pre-designed values.
Prepared by
Nishita Kindo
10
Lecturer (CSE), BOSE Cuttack
The simplest example of a sensor is an LDR or a Light Dependent Resistor. It is a device,
whose resistance varies according to intensity of light it is subjected to. When the light falling
on an LDR is more, its resistance becomes very less and when the light is less, well, the
resistance of the LDR becomes very high.
Classification of Sensors
In the first classification of the sensors, they are divided in to Active and Passive.
® Active Sensors are those which require an external excitation signal or a power signal.
® Passive Sensors, on the other hand, do not require any external power signal and
directly generates output response.
® The other type of classification is based on the means of detection used in the sensor.
Some of the means of detection are Electric, Biological, Chemical, Radioactive etc.
® The next classification is based on conversion phenomenon i.e., the input and the
output. Some of the common conversion phenomena are Photoelectric, Thermoelectric,
Electrochemical, Electromagnetic, Thermo-optic, etc.
® The final classification of the sensors are Analog and Digital Sensors. Analog Sensors
produce an analog output i.e., a continuous output signal (usually voltage but sometimes
other quantities like Resistance etc.) with respect to the quantity being measured.
Digital Sensors, in contrast to Analog Sensors, work with discrete or digital data. The
data in digital sensors, which is used for conversion and transmission, is digital in
nature.
The following is a list of different types of sensors that are commonly used in various
applications. All these sensors are used for measuring one of the physical properties like
Temperature, Resistance, Capacitance, Conduction, Heat Transfer etc.
1. Temperature Sensor
2. Proximity Sensor
3. IR Sensor (Infrared Sensor)
4. Pressure Sensor
5. Light Sensor
6. Ultrasonic Sensor
7. Smoke, Gas and Alcohol Sensor
8. Touch Sensor
9. Color Sensor
10. Humidity Sensor
11. Position Sensor
12. Magnetic Sensor (Hall Effect Sensor)
13. Microphone (Sound Sensor)
14. Tilt Sensor
15. Flow and Level Sensor
16. PIR Sensor
17. Strain and Weight Sensor
Prepared by
Nishita Kindo
11
Lecturer (CSE), BOSE Cuttack
1. Temperature Sensor
One of the most common and most popular sensors is the Temperature Sensor. A Temperature
Sensor, as the name suggests, senses the temperature i.e., it measures the changes in the
temperature.
® There are different types of Temperature Sensors like Temperature Sensor ICs (like
LM35, DS18B20), Thermistors, Thermocouples, RTD (Resistive Temperature
Devices), etc.
® Temperature Sensors can be analog or digital. In an Analog Temperature Sensor, the
changes in the Temperature correspond to change in its physical property like resistance
or voltage. LM35 is a classic Analog Temperature Sensor.
® The Digital Temperature Sensor, the output is a discrete digital value (usually, some
numerical data after converting analog value to digital value). DS18B20 is a simple
Digital Temperature Sensor.
® Temperature Sensors are used everywhere like computers, mobile phones, automobiles,
air conditioning systems, industries etc.
2. Proximity Sensors
A Proximity Sensor is a non-contact type sensor that detects the presence of an object.
Proximity Sensors can be implemented using different techniques like Optical (like Infrared or
Laser), Sound (Ultrasonic), Magnetic (Hall Effect), Capacitive, etc.
® Some of the applications of Proximity Sensors are Mobile Phones, Cars (Parking
Sensors), industries (object alignment), Ground Proximity in Aircrafts, etc.
Prepared by
Nishita Kindo
12
Lecturer (CSE), BOSE Cuttack
® Proximity Sensor in Reverse Parking is implemented in this Project: REVERSE
PARKING SENSOR CIRCUIT.
® There are two types of Infrared or IR Sensors: Transmissive Type and Reflective Type.
In Transmissive Type IR Sensor, the IR Transmitter (usually an IR LED) and the IR
Detector (usually a Photo Diode) are positioned facing each other so that when an object
passes between them, the sensor detects the object.
® The other type of IR Sensor is a Reflective Type IR Sensor. In this, the transmitter and
the detector are positioned adjacent to each other facing the object. When an object
comes in front of the sensor, the infrared light from the IR Transmitter is reflected from
the object and is detected by the IR Receiver and thus the sensor detects the object.
® Different applications where IR Sensor is implemented are Mobile Phones, Robots,
Industrial assembly, automobiles etc.
4. Ultrasonic Sensor
An Ultrasonic Sensor is a non-contact type device that can be used to measure distance as
well as velocity of an object. An Ultrasonic Sensor works based on the properties of the
sound waves with frequency greater than that of the human audible range.
Prepared by
Nishita Kindo
13
Lecturer (CSE), BOSE Cuttack
® Using the time of flight of the sound wave, an Ultrasonic Sensor can measure the
distance of the object (similar to SONAR). The Doppler Shift property of the sound
wave is used to measure the velocity of an object.
5. Light Sensor
Light Sensors are one of the important sensors. It is also known as Photo Sensors. A simple
Light Sensor available today is the Light Dependent Resistor or LDR. The property of LDR
is that its resistance is inversely proportional to the intensity of the ambient light i.e., when
the intensity of light increases, its resistance decreases and vise-versa.
® There are two other Light Sensors (or Photo Sensors) which are often used in complex
electronic system design. They are Photo Diode and Photo Transistor. All these are
Analog Sensors.
® There are also Digital Light Sensors like BH1750, TSL2561, etc., which can calculate
intensity of light and provide a digital equivalent value.
® Gas Sensors are more common in laboratories, large scale kitchens and industries. They
can detect different gases like LPG, Propane, Butane, Methane (CH4), etc.
® Now-a-days, smoke sensors (which often can detect smoke as well gas) are also
installed in most homes as a safety measure.
® The “MQ” series of sensors are a bunch of cheap sensors for detecting CO, CO2, CH4,
Alcohol, Propane, Butane, LPG etc. You can use these sensors to build your own
Smoke Sensor Application.
Prepared by
Nishita Kindo
14
Lecturer (CSE), BOSE Cuttack
7. Alcohol Sensor
As the name suggests, an Alcohol Sensor detects alcohol. Usually, alcohol sensors are used in
breath analyzer devices, which determine whether a person is drunk or not. Law enforcement
8. Touch Sensor
All touch screen devices (Mobile Phones, Tablets, Laptops, etc.) have touch sensors in them.
Another common application of touch sensor is trackpads in our laptops.
® Touch Sensors, as the name suggests, detect touch of a finger or a stylus. Often touch
sensors are classified into Resistive and Capacitive type. Almost all modern touch
sensors are of Capacitive Types as they are more accurate and have better signal to
noise ratio.
9. Color Sensor
A Color Sensor is an useful device in building color sensing applications in the field of image
processing, color identification, industrial object tracking etc. The TCS3200 is a simple Color
Sensor, which can detect any color and output a square wave proportional to the wavelength
of the detected color.
Prepared by
Nishita Kindo
15
Lecturer (CSE), BOSE Cuttack
10. Humidity Sensor
Weather Monitoring Systems, provides temperature as well as humidity data. So, measuring
humidity is an important task in many applications and Humidity Sensors help us in achieving
this.
® Often all humidity sensors measure relative humidity (a ratio of water content in air to
maximum potential of air to hold water). Since relative humidity is dependent on
temperature of air, almost all Humidity Sensors can also measure Temperature.
® Humidity Sensors are classified into Capacitive Type, Resistive Type and Thermal
Conductive Type. DHT11 and DHT22 are two of the frequently used Humidity Sensors
in DIY Community (the former is a resistive type while the latter is capacitive type).
1.8 Actuator
An IoT device is made up of a Physical object (“thing”) + Controller (“brain”) + Sensors +
Actuators + Networks (Internet).
Prepared by
Nishita Kindo
16
Lecturer (CSE), BOSE Cuttack
An actuator is a machine component or system that moves or controls the mechanism or the
system. Sensors in the device sense the environment, then control signals are generated for the
actuators according to the actions needed to perform.
® A servo motor is an example of an actuator. They are linear or rotatory actuators, can
move to a given specified angular or linear position. We can use servo motors for IoT
applications and make the motor rotate to 90 degrees, 180 degrees, etc., as per our need.
The following diagram shows what actuators do, the controller directs the actuator based on
the sensor data to do the work.
The control system acts upon an environment through the actuator. It requires a source of
energy and a control signal. When it receives a control signal, it converts the source of energy
to a mechanical operation. On this basis, on which form of energy it uses, it has different types
given below.
Types of Actuators :
1. Hydraulic Actuators –
A hydraulic actuator uses hydraulic power to perform a mechanical operation. They are
actuated by a cylinder or fluid motor. The mechanical motion is converted to rotary, linear, or
oscillatory motion, according to the need of the IoT device. Ex- construction equipment uses
hydraulic actuators because hydraulic actuators can generate a large amount of force.
Advantages :
• Hydraulic actuators can produce a large magnitude of force and high speed.
• Used in welding, clamping, etc.
• Used for lowering or raising the vehicles in car transport carriers.
Disadvantages :
• Hydraulic fluid leaks can cause efficiency loss and issues of cleaning.
• It is expensive.
• It requires noise reduction equipment, heat exchangers, and high maintenance
systems.
2. Pneumatic Actuators –
A pneumatic actuator uses energy formed by vacuum or compressed air at high pressure to
convert into either linear or rotary motion. Example- Used in robotics, use sensors that work
like human fingers by using compressed air.
Prepared by
Nishita Kindo
17
Lecturer (CSE), BOSE Cuttack
Advantages :
• They are a low-cost option and are used at extreme temperatures where using air is
a safer option than chemicals.
• They need low maintenance, are durable, and have a long operational life.
• It is very quick in starting and stopping the motion.
Disadvantages :
• Loss of pressure can make it less efficient.
• The air compressor should be running continuously.
• Air can be polluted, and it needs maintenance.
3. Electrical Actuators –
An electric actuator uses electrical energy, is usually actuated by a motor that converts
electrical energy into mechanical torque. An example of an electric actuator is a solenoid based
electric bell.
Advantages :
• It has many applications in various industries as it can automate industrial valves.
• It produces less noise and is safe to use since there are no fluid leakages.
• It can be re-programmed and it provides the highest control precision positioning.
Disadvantages :
• It is expensive.
• It depends a lot on environmental conditions.
Other actuators are –
4. Thermal/Magnetic Actuators –
These are actuated by thermal or mechanical energy. Shape Memory Alloys
(SMAs) or Magnetic Shape‐Memory Alloys (MSMAs) are used by these
actuators. An example of a thermal/magnetic actuator can be a piezo motor
using SMA.
5. Mechanical Actuators –
A mechanical actuator executes movement by converting rotary motion into
linear motion. It involves pulleys, chains, gears, rails, and other devices to
operate. Example – A crankshaft.
• Soft Actuators
• Shape Memory Polymers
• Light Activated Polymers
• With the expanding world of IoT, sensors and actuators will find more usage in
commercial and domestic applications along with the pre-existing use in industry.
Prepared by
Nishita Kindo
18
Lecturer (CSE), BOSE Cuttack
1.9 IoT components and implementation
• Sensors
• Networks
• Standards
• Intelligent Analysis
• Intelligent Actions
1. Sensors
According to (IEEE) sensors can be defined as: An electronic device that produces electrical,
optical, or digital data derived from a physical condition or event. Data produced from sensors
is then electronically transformed, by another device, into information (output) that is useful in
decision making done by “intelligent” devices or individuals (people).
Prepared by
Nishita Kindo
19
Lecturer (CSE), BOSE Cuttack
2. Networks
The second step of this implantation is to transmit the signals collected by sensors over
networks with all the different components of a typical network including routers, bridges in
different topologies, including LAN, MAN and WAN. Connecting the different parts of
networks to the sensors can be done by different technologies including Wi-Fi, Bluetooth, Low
Power Wi-Fi , Wi-Max, regular Ethernet , Long Term Evolution (LTE) and the recent
promising technology of Li-Fi (using light as a medium of communication between the
different parts of a typical network including sensors).
The driving forces for wide spread network adoption in IoT can be summarized as
follows
Prepared by
Nishita Kindo
20
Lecturer (CSE), BOSE Cuttack
3. Standards
The third stage in the implementation process includes the sum of all activities of handling,
processing and storing the data collected from the sensors. This aggregation increases the value
of data by increasing, the scale, scope, and frequency of data available for analysis but
aggregation only achieved through the use of various standards depending on the IoT
application in used.
Types of Standards
Two types of standards relevant for the aggregation process; technology standards (including
network protocols, communication protocols, and data-aggregation standards) and regulatory
standards (related to security and privacy of data, among other issues).
Technology Standards
Regulatory Standards
Set and administrated by government agencies like FTC (Federal Trade Commission), for
example Fair Information Practice Principles (FIPP) and US Health Insurance Portability and
Accountability Act (HIPAA) just to mention few.
Prepared by
Nishita Kindo
21
Lecturer (CSE), BOSE Cuttack
4. Intelligent Analysis
The fourth stage in IoT implementation is extracting insight from data for analysis, Analysis is
driven by cognitive technologies and the accompanying models that facilitate the use of
cognitive technologies.
With advances in cognitive technologies’ ability to process varied forms of information, vision
and voice have also become usable. Below is a list of selected cognitive technologies that are
experiencing increasing adoption and can be deployed for predictive and prescriptive analytics:
• Computer vision refers to computers’ ability to identify objects, scenes, and activities
in images
• Natural-language processing refers to computers’ ability to work with text the way
humans do, extracting meaning from text or even generating text that is readable.
• Speech recognition focuses on accurately transcribing human speech
• Artificial intelligence models can be improved with large data sets that are more readily
avail- able than ever before, thanks to the lower storage costs.
• Growth in crowdsourcing and open- source analytics software: Cloud-based
crowdsourcing services are leading to new algorithms and improvements in existing
ones at an unprecedented rate.
• Real-time data processing and analysis: Analytics tools such as complex event
processing (CEP)enable processing and analysis of data on a real-time or a near-real-
time basis, driving timely decision making and action.
5. Intelligent Actions
Intelligent actions can be expressed as M2M and M2H interfaces for example with all the
advancement in UI(user interface) and UX(user experiences) technologies.
Prepared by
Nishita Kindo
22
Lecturer (CSE), BOSE Cuttack
1.10 Challenges in IoT
1. Challenges facing IoT sensors
• Power consumption
• Security
• Interoperability
• Standard for handling unstructured data: Structured data are stored in relational
databases and queried through SQL. Unstructured data are stored in different types
of noSQL databases without a standard querying approach.
• Security and privacy issues: There is a need for clear guidelines on the retention,
use, and security of the data as well as metadata (the data that describe other data).
• Regulatory standards for data markets: Data brokers are companies that sell data
collected from various sources. Even though data appear to be the currency of the
IoT, there is lack of transparency about, who gets access to data and how those data
are used to develop products or services and sold to advertisers and third parties.
• Inaccurate analysis due to flaws in the data and/or model: A lack of data or
presence of outliers may lead to false positives or false negatives, thus exposing
various algorithmic limitations
• Legacy systems’ ability to analyze unstructured data: Legacy systems are well
suited to handle structured data; unfortunately, most IoT/business interactions
generate unstructured data
• Legacy systems’ ability to manage real- time data: Traditional analytics software
generally works on batch-oriented processing, wherein all the data are loaded in a
batch and then analyzed.
Prepared by
Nishita Kindo
23
Lecturer (CSE), BOSE Cuttack
• Technical skills to leverage newer aggregation tools: Companies that are keen on
leveraging big-data tools often face a shortage of talent to plan, execute, and
maintain systems.
The Internet of Things (IoT) is an ecosystem of ever-increasing complexity, it’s the next weave
of innovation that will humanize every object in our life, which is the next level to automating
every object in our life. Convergence of technologies will make IoT implementation much
easier and faster, which in turn will improve many aspects of our life at home and at work and
in between.
Prepared by
Nishita Kindo
24
Lecturer (CSE), BOSE Cuttack
CHAPTER-2 IOT NETWORKING
2.1 Terminologies
2.2 Gateway Prefix allotment
2.3 Impact of mobility on Addressing
2.4 Multihoming
2.5 Deviation from regular Web
2.6 IoT identification and Data protocols
2.1 Terminologies
An IoT network refers to a collection of interconnected devices that communicate
with other devices without the need for human involvement, such as autonomous
cars, smart appliances, and wearable tech.
IoT Node- These are machines, things or computers connected to other nodes inside
a LAN via the IoT LAN. This node may be sometimes connected to the Internet
through a WAN directly.
IoT LAN- Local Area Network or LAN is short to medium range, where distances can
be up to hundreds of meters, such as home automation or sensors that are installed
within a factory production line that communicate over Wi-Fi with a gateway device
that is installed within the same building. It is an organization wide network which
may or may not be connected to internet.
IoT WAN- Wide Area Networks or WAN is the connection of various network segments
organizationally and geographically wide which connects to the Internet. It may
consist of several LANs. Each node in a LAN will have a unique address but another
node in a different LAN may have the same address. Different LANs are connected to
WAN via gateways.
IoT Gateway- This is a router connecting the IoT LAN to a WAN or to the Internet. It
can implement several LANs and WANs. The main responsibility of IoT gateways is
to forward packets between LAN and WAN on the IP layer.
IoT Proxy- This performs active application layer functions between IoT nodes and
other entities.
Prepared by
Nishita Kindo
1
Lecturer(CSE), BOSE Cuttack
2.1.1 Gateways
IoT gateways with or without proxies are responsible mainly for:
§ Internet connectivity
§ IoT LAN intra-connectivity
§ Upstream address prefixes are obtained using mechanisms like DHCPv6 and delegated
to the nodes using SLAAC (stateless addressing).
§ LU addresses are maintained independently of globally routable addresses, in cases
were internal address stability is of prime concern.
§ Despite providing address stability, LU cannot communicate directly with the
internet or the upper layers, which is solved by implementing an application layer
proxy.
§ Application layer proxies may be additionally configured to process data, rather than
just passing it.
§ In nodes with no support for computationally intensive tasks, IoT proxy gathers data
sent to the link-local multicast address and routes them globally.
Note: Tunnelling works by encapsulating packets: wrapping packets inside of other packets. Packets are small pieces of data that
can be re-assembled at their destination into a larger file.
Tunnelling is often used in virtual private networks (VPNs). It can also set up efficient and secure connections between networks,
enable the usage of unsupported network protocols, and in some cases allow users to bypass firewalls.
Presently, the Internet is mainly IPv4, based with little or no IPv6 uplink facilities or support.
Due to the lack of a universal transition solution to IPv6, lots of un-optimized solutions are
being used for IoT deployment.
These makeshift solutions mainly address:
§ IPv6 to IPv4 translation
§ IPv6 tunneling over IPv4
§ Application layer proxies (e.g: data relaying)
Prepared by
Nishita Kindo
2
Lecturer(CSE), BOSE Cuttack
§ In IoT addressing, since there are huge number of devices connected, we need to
conserve the address space. Each device connected to IoT network needs a unique IP
address. Nodes within a gateway’s jurisdiction have addresses that are valid within the
gateway’s domain only. The same addresses may be repeated in the domain of another
gateway . The gateway has a unique network prefix which can be used to identify them
globally. This strategy saves a lot of unnecessary address wastage although the nodes
have to communicate to the Internet via the gateway.
§ The network connected to the internet has routers with their set of addresses and ranges.
These routers have multiple gateways connected to them which can forward packets
from the nodes, to the Internet, only via these routers. These routers assign prefixes to
gateways under them, so that the gateways can be identified with them.
® The network prefix changes from 1 to 2 due to movement, making the IoT LAN safe
from changes due to movements.
® IoT gateway WAN address changes without change in LAN address. This is achieved
using ULA(Unique Local Adressing).
® The gateways assigned with prefixes, which are attached to a remote anchor point by
using various protocols such as Mobile IPv6, and are immune to changes of network
prefixes. This is achieved using LU.
® The address of the nodes within the gateways remain unchanged as the gateways provide
them with locally unique address and the change in gateway’s network prefix doesn’t
affect them.
® Sometimes, there is a need for the nodes to communicate directly to the internet. This is
achieved by tunneling, where the nodes communicate to a remote anchor point instead
of channeling their packets through the router which is achieved by using tunneling
protocols such as IKEv2:internet key exchange version 2.
Prepared by
Nishita Kindo
3
Lecturer(CSE), BOSE Cuttack
2.4. Multi-homing
Multihoming is the practice of connecting a host or a computer network to more than one
network. This can be done in order to increase reliability or performance, or to reduce cost.
There are several different ways to perform multihoming.
(a) Host multihoming: In this a single host may be connected to multiple networks. For
example, a mobile phone might be simultaneously connected to a Wi-Fi network and a
3G network, and a desktop computer might be connected to both a home network and
a VPN. A multihomed host usually is assigned multiple addresses, one per connected
network.
(b) Classical multihoming: In classical multihoming, a network is connected to multiple
providers, and uses its own range of addresses (typically from a Provider Independent
(PI) range). (i)The network’s edge routers communicate with the providers using a
dynamic routing protocol, typically Border Gateway Protocol (BGP), which announces
the network’s address range to all providers. (ii)If one of the links fail, the dynamic
routing protocol recognizes the failure within seconds or minutes, and reconfigures its
routing tables to use the remaining links, transparently to the hosts. (iii)Classical
multihoming is costly, since it requires the use of address space that is accepted by all
providers, a public Autonomous System (AS) number, and a dynamic routing protocol.
(iv) Since multihomed address space cannot be aggregated, it causes growth of the
global routing table.
(c) Multihoming with multiple addresses: In this approach, the network is connected to
multiple providers, and assigned multiple address ranges, one for each provider.
(i)Multihoming with multiple addresses is cheaper than classical multihoming, and can
be used without any cooperation from the providers (e.g. in a home network) but
requires additional technology in order to perform routing. (ii)In case of small IoT
LANs where allotment of address prefixes is not feasible and possible, a proxy based
approach is used to manage multiple IP addresses. And map them to link local
addresses. (iii)In another approach, gateway based approach is used for assigning link
local addresses to the nodes under it. (iv)Providing source addresses, destination
addresses and routing information to the multihomed nodes is the real challenge in
multihoming networks. (v)In case the destination and source addresses originate from
the same prefix, routing between gateways can be employed for IoT gateway selection.
(vi)Presently, IEFT is still trying to standardize this issue.
There are various universal ISs, such as Object IDentifier (OID), Electronic Product Code
(EPC), Universally Unique IDentifier (UUID), and International Mobile Equipment Identity
(IMEI), etc.
Prepared by
Nishita Kindo
5
Lecturer(CSE), BOSE Cuttack
1. OID
• The OID is an identification mechanism developed by the ITU-T (International
Telecommunication Union Telecommunication Standardization Sector) and the ISO/IEC
(International Organization for Standardization/International Electrotechnical
Commission), to name specific objects so that the objects can be distinguished easily.
• Objects are represented as a sequence of base integer values and corresponding unicode
values according to a hierarchical name structure so that they can be identified.
• The OIDs address the interoperability issues of heterogeneous inter-industry identification
systems.
• The OID scheme uses a tree-like hierarchy to assign unique numbers to objects so that they
are not duplicated.
• The OID can be used in various fields, such as Internet management, security, medical care,
and the RFID (In the RFID, EPC and ISO codes are used for existing barcodes. Therefore, special identification methods are
needed for the new RFID service to avoid collision with the system that uses previous code systems, such as the EPC. Based on these
reasons, the concept of OID is essential in the RFID.).
• It can also be used for digital signature certificate items used by banks or various security
duties to manage them efficiently and safely.
Example: There is no name for the root, and it only has three of the top-level areas, which are
managed by the ISO. 0 is the ITU-T, 1 is the ISO, and 2 is jointly managed by the ISO and the
ITU-T.
Below is an example scheme based on the OID:
{ 0.2.481.1.999.xxxx }
Each digit in the OID hierarchy is called an arc. The first arc represents the managing
organization, and 0 here represents the ITU-T. The second arc represents the type for which it
is used. In this example, 2 represents the administration. The third arc is the Data Country Code
(DCC), which is assigned to each country. In Korea, 450, 480 and 481 codes are assigned, and
KISA is responsible for the management. 450 is used to discriminate the RFID code type. The
other two numbers are not used nowadays, but number 1 of 481 is experimentally granted and
used by SKT. The fifth arc 999 means the grant for the IoT, and the sixth arc means the given
organization or company.
Fig. 1 shows the OID structure, which is managed by the ITU-T.
Prepared by
Nishita Kindo
6
Lecturer(CSE), BOSE Cuttack
Fig. 1. OID structure by ITU
2. EPC
• An EPC is a universal identifier that assigns the identity to any physical object that is unique
amongst all objects and categories all around the world.
• These unique identifiers can be used for referring to or tracking objects in information
systems that are part of the EPCglobal Network. EPCglobal and other third-party providers
aim to achieve a common goal towards an enhancement in business flows and computer
applications through the use of EPCs.
• The identification of each object, such as an asset, a trade item and a document, has a
corresponding GS1 key, which is shown in Table 1. GS1's EPC Tag Data Standard (TDS)
1.11 specifies the data format of the EPC and provides encodings for numbering schemes,
which include the GS1 keys within an EPC. The TDS is concerned with the encoding of
EPCs onto the RFID tags, as well as with defining the standards for other data apart from
the EPC that may be stored on a Gen 2 RFID tag.
Table 1. EPC identification schemes.
EPC Scheme Identifier Syntax
Serialised Global Trade urn:epc:id:sgtin:CompanyPrefix.ItemRefAndIndicator.SerialNumber
Identification Number (SGTIN)
Global Location Number with or urn:epc:id:sgln:CompanyPrefix.LocationReference.Extension
without Location (SGLN)
Global Returnable Asset Identifier urn:epc:id:grai:CompanyPrefix.AssetType.SerialNumber
(GRAI)
Global Document Type Identifier urn:epc:id:gdti:CompanyPrefix.DocumentType.SerialNumber
(GDTI)
Component/Part Identification (CPI) urn:epc:id:cpi:CompanyPrefix.ComponentPartReference.Serial
Serialised Global Coupon Number urn:epc:id:sgcn:CompanyPrefix.CouponReference.SerialComponent
(SGCN)
Global Identification Number of urn:epc:id:ginc:CompanyPrefix.ConsignmentReference
Consignment (GINC)
Global Shipment Identification urn:epc:id:gsin:CompanyPrefix.ShipperReference
Number (GSIN)
General Identifiers (GID) urn:epc:id:gid:ManagerNumber.ObjectClass.SerialNumber
3. UUID
• The UUID is a 128 bit number that is used to uniquely identify an entity or object across
space and time. It is also termed as Globally Unique IDentifier (GUID).
• The probability of having a duplicated UUID is almost zero and can be considered
negligible. Because of this characteristic, it can be safely used as a unique Identification
Schemes(IS). UUIDs were initially used Apollo Network Computing System (ANCS) and
later on Open Software Foundation's (OSF) Distributed Computing Environment (DCE)
and in Microsoft Windows platforms. The first design of the UUID was based on the ANCS
UUIDs.
• In the canonical structure of the UUID, 32 hexadecimal (base 16) digits represent the
sixteen octets of a UUID. The display format of the UUID is in five groups as 8-4-4-4-12
for a total of 36 characters, four of which are hyphens.
Prepared by
Nishita Kindo
8
Lecturer(CSE), BOSE Cuttack
1. MQTT (Message Queuing Telemetry Transport)
§ An MQTT (Message Queuing Telemetry Transport) is a lightweight IoT data protocol. It
features a publisher-subscriber messaging model and allows for simple data flow between
different devices.
§ MQTT’s main selling point is its architecture. Its genetic make-up is basic and lightweight
and, therefore, it’s able to provide low power consumption for devices. It also works on top
of a TCP/IP protocol.
§ IoT data protocols were designed to tackle unreliable communication networks. This
became a need in the IoT world due to the increasing number of small, cheap, and lower-
power objects that have appeared in the network over the past few years.
§ Despite MQTT’s wide adaptation, mostly IoT standard with industrial applications doesn’t
support a defined data representation and device management structure mode. As a result,
the implementation of data and device management capabilities is entirely platform- or
vendor-specific.
5. WebSocket
§ WebSocket was initially developed back in 2011 as part of the HTML5 initiative. Via a
single TCP connection, messages can be sent between the client and the server.
§ Like CoAp, WebSocket’s standard connectivity protocol helps simplify many of the
complexities and difficulties involved in the management of connections and bi-direction
communication on the internet.
§ It can be applied to an IoT network where data is communicated continuously across
multiple devices. Therefore, you’ll find it used most commonly in places that act as clients
or servers. This includes runtime environments or libraries.
Prepared by
Nishita Kindo
10
Lecturer(CSE), BOSE Cuttack
Chapter--3
Connectivity Technologies
3.1 Introduction
3.2 IEEE 802.15.4
3.3 ZigBee, 6LoWPAN
3.4 RFID, HART and wireless HART
3.5 NFC, Bluetooth, Z wave, ISA100.11.A
3.1 Introduction
So, we have been through different protocols which include XMPP protocol, MQTT protocol,
CoAP protocol and AMQP protocol. But, there are other different communication protocols
that are primarily involved with offering connectivity services at higher levels.
Prepared by
Nishita Kindo
1
Lecturer(CSE) BOSE, Cuttack
3.2.1 IEEE 802.15.4 standard
The IEEE 802.15.4 standard has undergone a number of releases. In addition to this there
are a number of variants of the IEEE 802.15.4 standard to cater for different forms of
physical layer, etc. These are summarised below in the table.
Note: Although new versions of the standard are available for use by any of the higher layer standards, Zigbee still
uses the initial 2003 release of the IEEE 802.15.4 standard.
Prepared by
Nishita Kindo
2
Lecturer(CSE) BOSE, Cuttack
Fig: Variants of IEEE 804.15.4
• Star topology: The star format for an IEEE 802.15.4 network topology has one central
node called the PAN coordinator with which all other nodes communicate.
Having a star network topology does limit the overall distances that can be covered.
It is limited to one hop.
• Peer to Peer network topology: In this form of network topology, there is still a PAN
coordinator, but communications may also take place between different nodes and
not necessarily via the coordinator.
It is worth defining the different types of devices that can exist in a network. There are
three types:
• Full Function Device (FFD): - a node that has full levels of functionality. It can
be used for sending and receiving data, but it can also route data from other
nodes.
• Reduced Function Device (RFD) : - a device that has a reduced level of
functionality. Typically it is an end node which may be typically a sensor or
switch. RFDs can only talk to FFDs as they contain no routing functionality.
These devices can be very low power devices because they do not need to route
other traffic and they can be put into a sleep mode when they are not in use.
These RFDs are often known as child devices as they need other parent devices
with which to communicate.
• Coordinator: This is the node that controls the IEEE 802.15.4 network. This is
a special form of FFD. In addition to the normal FFD functions it also sets the
IEEE 802.15.4 network up and acts as the coordinator or manager of the
network.
Prepared by
Nishita Kindo
3
Lecturer(CSE) BOSE, Cuttack
In the IEEE 802.15.4 standard, two different operation modes are specified: the beacon
enabled networks, and non-beacon networks.
Beacon-enabled network:
P In a beacon-enabled network, there will be periodic transmission of beacon
messages. Data frames are sent via slotted CSMA/CA with a super frame structure
managed by PAN coordinator.
P Beacons are used for synchronization and association of other nodes with the
coordinator.
P A beacon-enabled device is hard to implement. High processing power is required
to meet the constrained timing events and process the beacon packets.
P The scope of operation spans the whole network.
Prepared by
Nishita Kindo
4
Lecturer(CSE) BOSE, Cuttack
3.3 ZigBee, 6LoWPAN
3.3.1 ZigBee
P It's low power consumption limits transmission distances to 10-100 meters line-of-
sight.
P ZigBee devices can transmit data over long distances by passing data through a
mesh network of intermediate devices to reach distant ones.
P ZigBee networks are secured by 128 bit symmetric encryption keys.
P ZigBee has a defined rate of 250 Kbits/s best suited for intermittent data
transmissions from a sensor or input device.
Prepared by
Nishita Kindo
5
Lecturer(CSE) BOSE, Cuttack
Disadvantage:
® The operation of this network topology depends on the coordinator of the
network.
® As all packets between devices must go through coordinator, the coordinator
may become bottlenecked.
® Also, there is no alternative path from the source to the destination.
Advantage:
® It is simple topology and packets go through at most two hops to reach their
destination.
Disadvantages:
® If one of the parents becomes disabled, the children of the disable parent
cannot communicate with other devices in the network.
® Even if two nodes are geographically close to each other, they cannot
communicate directly.
Prepared by
Nishita Kindo
6
Lecturer(CSE) BOSE, Cuttack
(d) Mesh Topology:
P Mesh topology, also referred to as a peer-to-peer network, consists of one
coordinator, several routers, and end devices.
Prepared by
Nishita Kindo
7
Lecturer(CSE) BOSE, Cuttack
Prepared by
Nishita Kindo
8
Lecturer(CSE) BOSE, Cuttack
3.3.2 6LoWPAN
Prepared by
Nishita Kindo
9
Lecturer(CSE) BOSE, Cuttack
Prepared by
Nishita Kindo
10
Lecturer(CSE) BOSE, Cuttack
The 128 bits of IPv6 addresses are divided in two parts: The network prefix (64 bits) and the
host address (64 bits). The 6LoWPAN header compression mechanism omits the 64 most
significant bits (network prefix) because they're fixed for a given 6LoWPAN. Moreover, the
64 least significant bits can address very large address space (up to 1.84467441x1019).
Therefore, 6LOWPAN provides options for compressing the host address (the common usage
is 16 bits) In a nutshell, a 128-bit IPv6 address can be compressed down to 16 bits using
6LOWPAN.
Version 4-bit Internet Protocol version number 6.
Traffic Class 8-bit traffic class field.
Flow Label 20-bit flow label.
Payload Length 6-bit unsigned integer. Length of the IPv6 header is in octets.
Next Header 8-bit selector. Identifies the type of header immediately following
the IPv6 header. Uses the same values as the IPv4 protocol field.
Hop Limit 8-bit unsigned integer. Decremented by 1 by each node that
forwards the packet. The packet is discarded if hop limit is
decremented to zero.
Source Address 128-bit address of the originator of the packet.
Destination Address 128-bit address of the intended recipient of the packet (possibly not
the ultimate recipient, if a routing header is present).
6LOWPAN Headers
There are 3 types of header for 6LoWPAN-Dispatch header, Mesh addressing header and
Fragmentation header.
Prepared by
Nishita Kindo
11
Lecturer(CSE) BOSE, Cuttack
a) Dispatch Header: It is a 32-bit header. 0, 1 is the identifier for dispatch type.
Dispatch initiates communication. This is a 6-bit and identifies the next header type.
The Type Specific Header is determined by Dispatch header.
c) Fragmentation header: If an entire payload (e.g., IPv6) datagram fits within a single
802.15.4 frame, it is unfragmented and the LoWPAN encapsulation should not
contain a fragmentation header. If the datagram does not fit within a single IEEE
802.15.4 frame, it SHALL be broken into link fragments. As the fragment offset can
only express multiples of eight bytes, all link fragments for a datagram except the
last one MUST be multiples of eight bytes in length. The first link fragment SHALL
contain the first fragment header as defined below. The second and subsequent link
fragments (up to and including the last) SHALL contain a fragmentation header that
conforms to the format shown below.
Prepared by
Nishita Kindo
12
Lecturer(CSE) BOSE, Cuttack
§ Datagram Size: This 11-bit field encodes the size of the entire IP packet before link
layer fragmentation (but after IP layer fragmentation). The value of Datagram Size
shall be the same for all link-layer fragments of an IP packet. For IPv6, this shall be 40
octets more than the value of Payload Length in the IPv6 header [RFC2460] of the
packet. Packet may already be fragmented by hosts involved in the communication,
i.e., this field needs to encode a maximum length of 1280 octets.
§ Datagram Tag: The value of Datagram Tag shall be the same for all link fragments of
a payload (e.g., IPv6) datagram. The sender shall increment Datagram Tag for
successive, fragmented datagrams. The incremented value of Datagram Tag shall
wrap from 65535 back to zero. This field is 16 bits long, and its initial value is not
defined.
§ Datagram Offset: This field is present only in the second and subsequent link
fragments and shall specify the offset, in increments of 8 octets, of the fragment
from the beginning of the payload datagram. The first octet of the datagram (e.g., the
start of the IPv6 header) has an offset of zero; the implicit value of Datagram Offset
in the first link fragment is zero. This field is 8 hits long.
Prepared by
Nishita Kindo
13
Lecturer(CSE) BOSE, Cuttack
Figure: Working Principle of RFID
Prepared by
Nishita Kindo
14
Lecturer(CSE) BOSE, Cuttack
P The HART Protocol makes use of the Bell 202 Frequency Shift Keying (FSK) standard to
communicate additional device information using a digital signal that is superimposed
at a low level on top of the 4-20mA analog signal.
P The digital signal is made up of two frequencies— 1,200 Hz and 2,200 Hz representing
bits 1 and 0, respectively.
P The digital FSK signal is continuous phase, there is no interference with the 4-20mA
signal.
The HART Protocol implemented in layers 1,2, 3, 4 and 7 of the Open System
Interconnection (OSI) model:
Prepared by
Nishita Kindo
15
Lecturer(CSE) BOSE, Cuttack
Prepared by
Nishita Kindo
16
Lecturer(CSE) BOSE, Cuttack
In the Application Layer, the public commands of the protocol are divided into
four major groups termed as HART Commands.
HART Commands:
1. Universal Commands – provide functions which must be implemented in
all field devices
2. Common Practice Commands – provide functions common to many, but
not all field devices
3. Device Specific Commands – provide functions that are unique to a
particular field device and are specified by the device manufacturer
4. Device Family Commands – provide a set of standardized functions for
instruments with particular measurement types, allowing full generic
access without using device-specific commands.
P Wireless HART enables device placements more accessible and cheaper such as the
top of a reaction tank, inside a pipe or at widely separated warehouses.
Prepared by
Nishita Kindo
17
Lecturer(CSE) BOSE, Cuttack
P The main difference between the wired and unwired versions is in the physical
layer, data link layer and network layer.
P Wired HART doesn’t have a network layer.
Prepared by
Nishita Kindo
18
Lecturer(CSE) BOSE, Cuttack
Fig: Working of NFC
Prepared by
Nishita Kindo
19
Lecturer(CSE) BOSE, Cuttack
3.5.2 Bluetooth
Prepared by
Nishita Kindo
20
Lecturer(CSE) BOSE, Cuttack
Prepared by
Nishita Kindo
21
Lecturer(CSE) BOSE, Cuttack
Prepared by
Nishita Kindo
22
Lecturer(CSE) BOSE, Cuttack
Fig: Diagram of Bluetooth Topology(Piconet & Scatternet)
Prepared by
Nishita Kindo
23
Lecturer(CSE) BOSE, Cuttack
3.5.3 Z-Wave
Prepared by
Nishita Kindo
24
Lecturer(CSE) BOSE, Cuttack
3.5.4 ISA 100.11A
Prepared by
Nishita Kindo
25
Lecturer(CSE) BOSE, Cuttack
Fig: Architecture of Z-Wave
Prepared by
Nishita Kindo
26
Lecturer(CSE) BOSE, Cuttack
Fig: Architecture of ISA 100.11A
Prepared by
Nishita Kindo
27
Lecturer(CSE) BOSE, Cuttack
Chapter 4
Wireless Sensor Networks
4.1 Introduction
4.2 Components of a sensor node
4.3 Modes of Detection
4.4 Challenges in WSN
4.5 Sensor Web
4.6 Cooperation and Behaviour of Nodes in WSN
4.7 Self-Management of WSN
4.8 Social sensing WSN
4.9 Application of WSN
4.10 Wireless Multimedia sensor network
4.11 Wireless Nano-sensor Networks
4.12 Underwater acoustic sensor networks
4.13 WSN Coverage
4.14 Stationary WSN, Mobile WSN
4.1 INTRODUCTION
Prepared by
Nishita Kindo 1
Lecturer(CSE), BOSE Cuttack
i. Sensing unit:
Sensors are hardware devices that capture data from the environment and produce a
measurable response to a change in a physical condition like temperature or pressure.
Sensors measure and monitor physical data and have specific characteristics such as
accuracy, sensitivity etc.
Sensors are classified into three categories: passive omni-directional sensors, passive
narrow-beam sensors and active sensors.
Passive sensors sense the data without actually manipulating the environment
by active probing. They are self-powered. The energy is needed only to amplify
their analog signal.
a) Narrow-beam sensors have a well-defined notion of direction of
measurement, similar to a camera.
b) Omni-directional sensors have no notion of direction involved in their
measurements.
Active sensors actively probe the environment, for example, a sonar or radar
sensor and they require continuous energy from a power source.
iii. Transceiver:
The functionality of both transmitter and receiver are combined into a single device
known as a transceiver.
Transceivers often lack unique identifiers.
The operational states are transmit, receive, idle, and sleep.
v. Processor:
The processor processes data and controls the functionality of other components in
the sensor node.
The most common processor is a microcontroller. A microcontroller is often used
because of its low cost, flexibility to connect to other devices, ease of programming
and low power consumption.
A general purpose microprocessor generally has higher power consumption than a
microcontroller.
Digital Signal Processors may be chosen for broadband wireless communication
applications to process modulation and the signal processing tasks of actual sensing of
data is less complicated.
vi. Storage or External Memory
The most relevant kinds of memory are the on-chip memory of a microcontroller and
flash memory.
Flash memories are used due to their cost and capacity.
Memory requirements are very much application dependent. Two categories of
memory based on the purpose of storage are: user memory used for storing
Prepared by
Nishita Kindo 2
Lecturer(CSE), BOSE Cuttack
application related or personal data and program memory used for programming the
device. Program memory also contains identification data of the device if present.
In this a single object will be detected by a single sensor node. The detected data will be sent to the
sink node via the intermediate sensors.
Prepared by
Nishita Kindo 3
Lecturer(CSE), BOSE Cuttack
2.
In this there will be a single source for detecting multiple objects. The detected data on reaching the
sink node will identify the various objects.
3.
In this, same object will be detected by multiple sensors. This is expensive and can be applied for
security critical applications.
4(a)
4(b)
This mode of detection contains more than one object and more than one sensor. Each object may
be detected by more than one sensor.
Prepared by
Nishita Kindo 4
Lecturer(CSE), BOSE Cuttack
4.4 Challenges in WSN
4.5
Sensor Web is a type of sensor network that is well suited for environmental monitoring.
It is associated with a sensing system which heavily utilizes the World Wide Web.
Sensor Web is the combination of Service Oriented Architecture (SOA), grid computing and
sensor networks.
Sensor Web brings the heterogeneous sensors into an integrated and uniform platform
supporting dynamic discovery and access.
EXAMPLE: A sample scenario would be the client (may be the researchers or other software,
model and workflow system), who wants to utilize the information collected by the
deployed sensors on the target application, such as weather forecast, tsunami or pollution
detection. The client may query the entire sensor web and get the response either from real-
time sensors that have been registered in the web or existing data from a remote database.
The clients are not aware of where the real sensors are and what operations they may have,
although they are required to set parameters for their plan and invoke the service (similar to
when people perform a search on Google, filling in the search field and clicking the search
button). The primary goal of the Sensor Web is to provide the middleware infrastructure and
the programming environment for creating, accessing and utilizing sensor services through
the Web.
Prepared by
Nishita Kindo 5
Lecturer(CSE), BOSE Cuttack
1. Sensor Model Language (SensorML) - Information model and XML encodings that describe
either single sensor or sensor platform in regard to discover, query and control sensors.
2. Observation and Measurement (O&M) - Information model and XML encodings for
observations and measurement.
3. Transducer Markup Language (TML) – TransducerML is an OGC standard developed to
describe any transducer (sensor or transmitter) in terms of a common model, including
characterizing not only the data but XML formed metadata describing the system producing
that data.
4. Sensor Observation Service (SOS) - Open interface for a web service to obtain observations
and sensor and platform descriptions from one or more sensors.
5. Sensor Planning Service (SPS) - Service to help users build feasible sensor collection plan
and to schedule requests for sensors and sensor platforms.
6. Sensor Collection Service (SCS) - Service to fetch observations, which conforms to the
Observations and Measurement information model, from a single sensor or a collection of
sensors. It is also used to describe the sensors and sensor platforms by utilizing SensorML..
7. Web Notification Service (WNS) - Service to manage client session and notify the client
about the outcome of one's requested service using various communication protocols.
4.6.2
Prepared by
Nishita Kindo 6
Lecturer(CSE), BOSE Cuttack
4.6.3
4.6.4
4.6.5
Prepared by
Nishita Kindo 7
Lecturer(CSE), BOSE Cuttack
4.7 Self-Management of WSN
4.8
Prepared by
Nishita Kindo 8
Lecturer(CSE), BOSE Cuttack
Fig. Social Sensing in WSN
4.9.1
4.9.2
Prepared by
Nishita Kindo 9
Lecturer(CSE), BOSE Cuttack
Prepared by
Nishita Kindo 10
Lecturer(CSE), BOSE Cuttack
4.9.3 Application of WSN: Surveillance
Wireless Sensor Networks can be used in surveillance systems which is Known as target
tracking or object tracking.
It comprises of WSN network containing cameras.
When a suspicious object is detected by a sensor, it needs to track the trajectory of the object.
This tracking can be of two types. First one is to keep on following the target as and when the
target moves to know where it is moving using different sensors. This can be done in real time.
The second one is to predict the trajectory of the target.
There are three different problems of formulation in target tracking. They are a) Push based
Formulation b) Pull based Formulation and c) Guided Formulation.
4.9.4
Prepared by
Nishita Kindo 11
Lecturer(CSE), BOSE Cuttack
4.10
Prepared by
Nishita Kindo 12
Lecturer(CSE), BOSE Cuttack
4.11
Prepared by
Nishita Kindo 13
Lecturer(CSE), BOSE Cuttack
4.12
Prepared by
Nishita Kindo 14
Lecturer(CSE), BOSE Cuttack
Communicating links in underwater networks are based on acoustic wireless
communications. The traditional approach for ocean-bottom or ocean column
monitoring is to deploy underwater sensors that record data during the monitoring
mission and then recover the instruments. This approach has the following
disadvantages:
1. Real time monitoring is not possible.
2. No interaction is possible between onshore control systems and the monitoring
instruments.
3. If failures or misconfigurations occur, it may not be possible to detect them before
the instruments are recovered.
4. The amount of data that can be recorded during the monitoring mission by every
sensor is limited by the capacity of the onboard storage devices (memories, hard
disks, etc.).
Major challenges in the design of underwater acoustic networks are:
1. Battery power is limited and usually batteries cannot be recharged, also because
solar energy cannot be exploited.
2. The available bandwidth is severely limited.
3. Channel characteristics, including long and variable propagation delays, multi-path
and fading problems.
4. High bit error rates.
5. Underwater sensors are prone to failures because of fouling, corrosion, etc.
6. Oceanic forces may affect the node's mobility.
Prepared by
Nishita Kindo 15
Lecturer(CSE), BOSE Cuttack
4.13
Prepared by
Nishita Kindo 16
Lecturer(CSE), BOSE Cuttack
4.13.1
4.13.2
Prepared by
Nishita Kindo 17
Lecturer(CSE), BOSE Cuttack
4.13.3
Prepared by
Nishita Kindo 18
Lecturer(CSE), BOSE Cuttack
Prepared by
Nishita Kindo 19
Lecturer(CSE), BOSE Cuttack
4.14 Stationary WSN, Mobile WSN
4.14.1
Prepared by
Nishita Kindo 20
Lecturer(CSE), BOSE Cuttack
4.14.2
Prepared by
Nishita Kindo 21
Lecturer(CSE), BOSE Cuttack
(A)
(B)
(C)
4.14.3
Prepared by
Nishita Kindo 22
Lecturer(CSE), BOSE Cuttack
4.14.4
4.14.5
4.14.6
Prepared by
Nishita Kindo 23
Lecturer(CSE), BOSE Cuttack
CHAPTER 5
M2M COMMUNICATION
5.1 M2M communication
5.2 M2M Ecosystem
5.3 M2M service Platform
5.4 Interoperability
Prepared by 1
Nishita Kindo
Lecturer(CSE), BOSE Cuttack
At the outermost layer lie the sensors which sense the data.
The sensed data is sent through a network to a server.
At the server, information is extracted and processing is done.
The action to be taken is sent to the actuators for appropriate action.
1. Manufacturing
Every manufacturing environment whether it is food processing or general product
manufacturing relies on technology, to ensure costs are managed properly and
processes are executed efficiently.
Automating manufacturing processes in the manufacturing world could involve
highly automated equipment maintenance and safety procedures.
For example MZMI tools allow business owners to be alerted on their smart phones
when an important piece of equipment needs servicing, so they can address issues
as quickly as they arise.
2. Home Appliances
Manufacturers like LG and Samsung are already slowly unveiling smart home
appliances to help ensure a higher quality of life for occupants.
Prepared by 2
Nishita Kindo
Lecturer(CSE), BOSE Cuttack
For example, an M2M-capable washing machine could send alerts to the owners
smart devices once it finishes washing or drying and a smart refrigerator could
automatically order groceries from Amazon once its inventory is depleted.
User can remotely control Heating Ventilation and Air Conditioning (HVAC) systems
by using their mobile devices. In situations where a homeowner decides to leave
work early, he or she could contact the home heating system before leaving work to
make sure the temperature at home will be comfortable upon arrival. He/she can
contact the lighting system also so that the necessary lights will be on before he/she
reaches home.
Prepared by 3
Nishita Kindo
Lecturer(CSE), BOSE Cuttack
1.
2.
3.
Prepared by 4
Nishita Kindo
Lecturer(CSE), BOSE Cuttack
5.2 M2M Ecosystem
M2M ecosystem comprises of device providers, Internet service providers (ISPS),
platform providers, service providers and service users.
Prepared by 5
Nishita Kindo
Lecturer(CSE), BOSE Cuttack
Fig. M2M Service Platform(M2SP)
(a)
(b)
(c)
(d)
Prepared by 6
Nishita Kindo
Lecturer(CSE), BOSE Cuttack
Prepared by 7
Nishita Kindo
Lecturer(CSE), BOSE Cuttack
5.4 INTEROPERABILITY
Prepared by 8
Nishita Kindo
Lecturer(CSE), BOSE Cuttack
5.4.2 Types of Interoperability
(1)
1a.
Prepared by 9
Nishita Kindo
Lecturer(CSE), BOSE Cuttack
1b.
1c.
Prepared by 10
Nishita Kindo
Lecturer(CSE), BOSE Cuttack
(2)
Prepared by 11
Nishita Kindo
Lecturer(CSE), BOSE Cuttack
Different situations/circumstances in which heterogeneous devices communicate:
Prepared by 12
Nishita Kindo
Lecturer(CSE), BOSE Cuttack
2) Consider the following scenario in which a device is controlled and monitored.
The local control or monitoring message is sent from first device to UMB-A1.
From UMB-A1, local to UMB message conversion takes place and a query/action
request is sent to UMB-C.
From UMB-C, this query/action request is sent to UMB-A2 of the second device.
Here UMB to local message conversion and local control/monitoring message takes
place.
A local message is then sent to UMB-A2. From there a query/action response is sent
to UMB-A1 through UMB-C. UMB-A1 sends back local message to first device.
Prepared by 13
Nishita Kindo
Lecturer(CSE), BOSE Cuttack
Chapter 6
Programming with Arduino
6.1 Features of Arduino
6.2 Components of Arduino Board
6.3 Arduino IDE
6.4 Case Studies