IoT MATERIAL
IoT MATERIAL
Types of IoT
Consumer IoT :
It is used primarily for everyday use.
Eg: Home appliances, Voice Assistance, and Light Fixtures.
Commercial IoT :
It is used primarily in the healthcare and transport industries.
Eg: Smart Pacemakers and Monitoring Systems
Basic Components of IoT Application Development
Depending on the approaches, IoT software development companies define from 4 to 7 the most
common components of an IoT ecosystem.
Data Cloud.
User interface.
Network Interconnection.
System Security.
Data Analytics.
Characteristics of IoT
The Internet of Things (IoT) is characterized by the following key features that are
mentioned below.
1. Connectivity
Connectivity is an important requirement of the IoT infrastructure. Things of IoT should
be connected to the IoT infrastructure. Anyone, anywhere, anytime can connect, this
should be guaranteed at all times. For example, the connection between people through
Internet devices like mobile phones, and other gadgets, also a connection between
Internet devices such as routers, gateways, sensors, etc.
2. Intelligence and Identity
The extraction of knowledge from the generated data is very important. For example, a
sensor generates data, but that data will only be useful if it is interpreted properly. Each
IoT device has a unique identity. This identification is helpful in tracking the equipment
and at times for querying its status.
3. Scalability
The number of elements connected to the IoT zone is increasing day by day. Hence, an
IoT setup should be capable of handling the massive expansion. The data generated as an
outcome is enormous, and it should be handled appropriately.
4. Dynamic and Self-Adapting (Complexity)
IoT devices should dynamically adapt themselves to changing contexts and
scenarios. Assume a camera meant for surveillance. It should be adaptable to work in
different conditions and different light situations (morning, afternoon, and night).
5. Architecture
IoT Architecture cannot be homogeneous in nature. It should be hybrid, supporting
different manufacturers products to function in the IoT network. IoT is not owned by
anyone engineering branch. IoT is a reality when multiple domains come together.
6. Safety
There is a danger of the sensitive personal details of the users getting compromised when
all his/her devices are connected to the internet. This can cause a loss to the user. Hence,
data security is the major challenge. Besides, the equipment involved is huge. IoT
networks may also be at risk. Therefore, equipment safety is also critical.
7. Self Configuring
This is one of the most important characteristics of IoT. IoT devices are able to upgrade
their software in accordance with requirements with a minimum of user participation.
Additionally, they can set up the network, allowing for the addition of new devices to an
already-existing network.
8. Interoperability
IoT devices use standardized protocols and technologies to ensure they can communicate
with each other and other systems. Interoperability is one of the key characteristics of the
Internet of Things (IoT). It refers to the ability of different IoT devices and systems to
communicate and exchange data with each other, regardless of the underlying technology
or manufacturer.
Interoperability is critical for the success of IoT, as it enables different devices and
systems to work together seamlessly and provides a seamless user experience. Without
interoperability, IoT systems would be limited to individual silos of data and devices,
making it difficult to share information and create new services and applications.
9. Embedded Sensors and Actuators
Embedded sensors and actuators are critical components of the Internet of Things (IoT).
They allow IoT devices to interact with their environment and collect and transmit data.
Sensors are devices that can detect changes in the environment, such as temperature,
light, sound, or movement. In IoT systems, sensors are embedded into devices, allowing
them to collect data about the environment.
Actuators are devices that can interact with the environment, such as turning on lights,
opening or closing doors, or controlling the speed of a motor. In IoT systems, actuators
are embedded into devices, allowing them to perform actions based on data collected by
sensors.
Together, sensors and actuators allow IoT devices to collect data about the environment,
process that data, and take action based on the results. This makes it possible to automate
a wide range of processes and tasks, such as home automation, energy management, and
predictive maintenance.
10. Autonomous operation
Autonomous operation refers to the ability of IoT devices and systems to operate
independently and make decisions without human intervention. This is a crucial
characteristic of the Internet of Things (IoT) and enables a wide range of new applications
and services.
In IoT systems, devices and systems are equipped with sensors, actuators, and processing
power, allowing them to collect and process data about the environment, make decisions
based on that data, and take action accordingly.
11. Data-driven
Data-driven is a key characteristic of the Internet of Things (IoT). IoT devices and
systems collect vast amounts of data from sensors and other sources, which can be
analyzed and used to make data-driven decisions.
In IoT systems, data is collected from embedded sensors, actuators, and other sources,
such as cloud services, databases, and mobile devices. This data is used to gain insights
into the environment, improve operational efficiency, and make informed decisions.
12. Security
Security is a critical concern for the Internet of Things (IoT), as IoT devices and systems
handle sensitive data and are connected to critical infrastructure. The increasing number
of connected devices and the amount of data being transmitted over the Internet make
IoT systems a prime target for cyberattacks.
To secure IoT systems, multiple layers of security are necessary, including physical
security, network security, and data security.
13. Ubiquity
Ubiquity refers to the widespread and pervasive presence of the Internet of Things (IoT)
devices and systems in our daily lives. The goal of IoT is to create a seamless and
interconnected world where devices and systems can communicate and share data
seamlessly and transparently.
Ubiquity is achieved through the widespread deployment of IoT devices, such as sensors,
actuators, and other connected devices, as well as the development of IoT networks and
infrastructure to support communication and data exchange.
14. Context Awareness
Context awareness refers to the ability of Internet of Things (IoT) devices and systems to
understand and respond to the environment and context in which they are operating. This is
achieved through the use of sensors and other technologies that can detect and collect data about
the environment.
LPWANs.
Cellular (3G/4G/5G).
Wi-Fi.
RFID.
Asset management.
3. Push-Pull Model –
The push-pull model constitutes data publishers, data consumers, and data queues.
Publishers and Consumers are not aware of each other.
Publishers publish the message/data and push it into the queue. The consumers,
present on the other side, pull the data out of the queue. Thus, the queue acts as the
buffer for the message when the difference occurs in the rate of push or pull of data
on the side of a publisher and consumer.
Queues help in decoupling the messaging between the producer and consumer.
Queues also act as a buffer which helps in situations where there is a mismatch
between the rate at which the producers push the data and consumers pull the data.
4. Exclusive Pair –
Exclusive Pair is the bi-directional model, including full-duplex communication
among client and server. The connection is constant and remains open till the client
sends a request to close the connection.
The Server has the record of all the connections which has been opened.
This is a state-full connection model and the server is aware of all open connections.
WebSocket based communication API is fully based on this model.
An IoT ecosystem can be designed on different levels. Each level is fundamentally a roadmap of
how to deploy the components of the IoT ecosystem. Thus, the same IoT ecosystem can be
designed using level 1 and level 2 standards both. The only thing that will differ is the way the
components are arranged altogether.
Following are the six different levels of IoT:
1. Level 1: In this level all the components are deployed locally. There is no any cloud or
external network involved in the process.
Sensors, routers, cloud components, application etc. all are at the user’s end. This standard
is good for those ecosystems where data is neither big nor varying. A uniform stream of
data is coming from a pre-set group of sensors and that is all happening in a simple way.
An example of Level 1 IoT is a smart home.
Level 2: In this level all the components are deployed locally except the servers. There is
a cloud or an external network involved in the process.
At the user’s end there are only sensors, routers and application. The cloud part is having
the servers configured for the purpose of storage and analysis. This standard is good for
those ecosystems where data is big. A huge amount of data is coming from many
components in the ecosystem and that too on a rapid speed.
An example of Level 2 IoT is a smart factory.
2. Level 3: In this level all the components are deployed locally except the servers and the
network connectivity part. There is a cloud or an external network involved in the process.
At the user’s end there are only sensors and application. The cloud part is having the
essential networks for connectivity and servers configured for the purpose of storage and
analysis. This standard is good for those ecosystems where data is big and varying. A huge
amount of data is coming from many components deployed in many ecosystems and that
too on a rapid speed.
An example of Level 3 IoT is a smart industry.
Level 4: In this level also, all the components are deployed locally except the servers and
the network connectivity part. In some cases, sensors are also in the cloud.
At the user’s end there is only the application. The cloud part is having the essential
networks for connectivity and servers configured for the purpose of storage and analysis.
This standard is good for those ecosystems where data is big, varying and is coming from
mobile sources.
An example of Level 4 IoT is a courier tracking system.
Level 5: Level 5 IoT is very similar to Level 4 but with one major advancement. In level
5 IoT, coordinator devices are also there in the local part of the ecosystem. A coordinator
device coordinates a certain set of sensing devices. There is an Observer Node also in the
cloud part that observes the entire process.
Level 6: Level 6 IoT is very similar to Level 5 but with one major advancement. In level
6 IoT, coordinator devices are replaced by a single component Centralized Controller and
that is there in the cloud part of the ecosystem.
IoT Design:
Application Layer Protocols of this layer work for the better utilization of services provided
by networks.
o HTTP: It stands for Hyper Text Transfer Protocol. It provides a standard way to
transfer documents and their contents in the form of HTML pages.
o CoAP: It stands for Constrained Application Protocol. Very similar to HTTP,
CoAP is specific to networks having many end-devices.
o MQTT: It stands for Message Queue Telemetry Transport Protocol. It is a machine
to machine (M2M) connectivity protocol that works on client server configuration.
o XMPP: It stands for Extensible Messaging and Presence Protocol. XMPP is an
XML based messaging protocol that works for real time message transfer across
the devices in IoT.
o AMQP: It stands for Advanced Message Queue Protocol. It enables encrypted real
time messaging across the devices and applications.
Logical Design
Logical design refers to the design through which the physical components are incorporated. It is
an abstract representation of the things, protocols and processes. Following are the major aspects
of logical design:
Functional blocks
Communication models
Communication APIs
Functional blocks: Functional blocks are parts of the system that interact with each other in order
to let the services run properly. Following are the functional blocks of the IoT ecosystem:
Device
Communication
Services
Management
Security
Application
Communication models: Communication models are used for making the services of IoT reach
up to the end users. We generally discuss about the following four communication model in IoT:
Request-Response Communication model: This model is very similar to Client-Server
model. Clients request servers and as a response, servers provide them services.
Publish Subscribe Communication Model: This model is a little elaborate and hence, is
distributed among publishers, brokers and consumers. Consumers, based on their type of
requirement, are assigned to a broker. Brokers get the data from publishers and provide to
consumers.
Push Pull Communication model: In this model, Publishers push the data in a queue and
consumers are required to pull the data as and when required.
Exclusive pair Communication model: This model is pure Client-Server model. Two
devices come in an exclusive pair and work on full duplex CS model.
Communication APIs: API stands for Application Programming Interface. We need APIs for
implementing the software part of communication between devices and machines. IoT uses
following two APIs:
REST based APIs: REST stands for Representational State Transfer. This API works on
the basis of different states of an object that is communicating. It is called stateless because
between every pair of two devices the state is different. There is no any end-to-end state.
WebSocket based APIs: WebSocket based APIs are different from REST. Here pure Client
Server approach is used with an end-to-end connection. WebSocket based APIs are
considered stateful.
Embedded System
Embedded systems refer to those systems that have many hardware components attached either on
the same board or in the same package. A software program is also needed to accomplish either a
specific task or a set of tasks. A Fire Alarm or Rain Alarm is a classic example of an embedded
system.
Components of an embedded system:
Processor: Processor or Microcontroller is the most important component in an embedded system
since this is the thing that has to process the data.
Memory: Memory is the second most important thing in an embedded system since it has to hold
or store all the data and programs.
Software: Software or simply called programs are another important components in embedded
systems especially because these are the actual tasks that have to be executed.
Applications of embedded Systems:
Medical Equipment.
Automobile
Industries
Gadgets
IoT HARDWARE
Transducer:
A transducer converts a signal from one physical structure to another.
It converts one type of energy into another type.
It might be used as actuator in various systems.
Sensor’s characteristics:
1. Static
2. Dynamic
1. Static characteristics:
It is about how the output of a sensor changes in response to an input change after steady state
condition.
Accuracy: Accuracy is the capability of measuring instruments to give a result close
to the true value of the measured quantity. It measures errors. It is measured by
absolute and relative errors. Express the correctness of the output compared to a
higher prior system. Absolute error = Measured value – True value
Relative error = Measured value/True value
Range: Gives the highest and the lowest value of the physical quantity within which
the sensor can actually sense. Beyond these values, there is no sense or no kind of
response.
e.g., RTD for measurement of temperature has a range of -200`c to 800`c.
Resolution: Resolution is an important specification for selection of sensors. The
higher the resolution, better the precision. When the accretion is zero to, it is called
the threshold.
Provide the smallest changes in the input that a sensor is able to sense.
Precision: It is the capacity of a measuring instrument to give the same reading when
repetitively measuring the same quantity under the same prescribed conditions.
It implies agreement between successive readings, NOT closeness to the true value.
It is related to the variance of a set of measurements.
It is a necessary but not sufficient condition for accuracy.
Sensitivity: Sensitivity indicates the ratio of incremental change in the response of
the system with respect to incremental change in input parameters. It can be found
from the slope of the output characteristics curve of a sensor. It is the smallest amount
of difference in quantity that will change the instrument’s reading.
Linearity: The deviation of the sensor value curve from a particularly straight line.
Linearity is determined by the calibration curve. The static calibration curve plots the
output amplitude versus the input amplitude under static conditions.
A curve’s slope resemblance to a straight line describes linearity.
Drift: The difference in the measurement of the sensor from a specific reading when
kept at that value for a long period of time.
Repeatability: The deviation between measurements in a sequence under the same
conditions. The measurements have to be made under a short enough time duration so
as not to allow significant long-term drift.
Dynamic Characteristics:
Properties of the systems
Zero-order system: The output shows a response to the input signal with no delay. It
does not include energy-storing elements.
Ex. potentiometer measure, linear and rotary displacements.
First-order system: When the output approaches its final value gradually.
Consists of an energy storage and dissipation element.
Second-order system: Complex output response. The output response of the sensor
oscillates before steady state.
Sensor Classification:
Passive & Active
Analog & digital
Scalar & vector
Passive Sensor
It can not independently sense the input.
E.g. Accelerometer, soil moisture, water level and temperature sensors.
Active Sensor
It can independently sense the input.
E.g. Radar, sounder and laser altimeter sensors.
Analog Sensor
The response or output of the sensor is some continuous function of its input parameter.
E.g. Temperature sensor, LDR, analog pressure sensor and analog hall effect.
Digital sensor
Response in binary nature. Design to overcome the disadvantages of analog sensors. Along with
the analog sensor, it also comprises extra electronics for bit conversion.
E.g. Passive infrared (PIR) sensor and digital temperature sensor (DS1620).
Scalar sensor –
Detects the input parameter only based on its magnitude. The answer for the sensor is a function
of magnitude of some input parameter. Not affected by the direction of input parameters.
E.g.temperature, gas, strain, color and smoke sensor.
Vector sensor
The response of the sensor depends on the magnitude of the direction and orientation of input
parameter. Example – Accelerometer, gyroscope, magnetic field and motion detector sensors.
Types of sensors
Electrical sensor:
Electrical proximity sensors may be contact or non-contact.
Simple contact sensors operate by making the sensor and the component complete an
electrical circuit.
Non- contact electrical proximity sensors rely on the electrical principles of either
induction for detecting metals or capacitance for detecting nonmetals as well.
Light sensor:
Light sensor is also known as photo sensors and one of the important sensor.
Light dependent resistor or LDR is a simple light sensor available today.
The property of LDR is that its resistance is inversely proportional to the intensity of the
ambient light i.e when the intensity of light increases, its resistance decreases and vice
versa.
Touch sensor:
Detection of something like a touch of finger or a stylus is known as touch sensor.
It’s name suggests that detection of something.
They are classified into two types:
1. Resistive type
2. Capacitive type
Today almost all modern touch sensors are of capacitive types.
Because they are more accurate and have better signal to noise ratio.
Range sensing:
Range sensing concerns detecting how near or far a component is from the sensing
position, although they can also be used as proximity sensors.
Distance or range sensors use non-contact analog techniques. Short range sensing,
between a few millimetres and a few hundred millimetres is carried out using electrical
capacitance, inductance and magnetic technique.
Longer range sensing is carried out using transmitted energy waves of various types eg
radio waves, sound waves and lasers.
Mechanical sensor:
Any suitable mechanical / electrical switch may be adopted but because a certain amount
of force is required to operate a mechanical switch it is common to use micro-switches.
Pneumatic sensor:
These proximity sensors operate by breaking or disturbing an air flow.
The pneumatic proximity sensor is an example of a contact type sensor. These cannot be
used where light components may be blown away.
Optical sensor:
In their simplest form, optical proximity sensors operate by breaking a light beam which
falls onto a light sensitive device such as a photocell. These are examples of non contact
sensors. Care must be exercised with the lighting environment of these sensors for
example optical sensors can be blinded by flashes from arc welding processes, airborne
dust and smoke clouds may impede light transmission etc.
Speed Sensor:
Sensor used for detecting the speed of any object or vehicle which is in motion is known
as speed sensor.
E.g.Wind Speed Sensors, Speedometer , UDAR ,Ground Speed Radar .
Temperature Sensor:
Devices which monitors and tracks the temperature and gives temperature’s measurement
as an electrical signal are termed as temperature sensors .These electrical signals will be
in the form of voltage and is directly proportional to the temperature measurement .
PIR Sensor:
PIR stands for passive infrared sensor and it is an electronic sensor that is used for the
tracking and measurement of infrared (IR) light radiating from objects in its field of view
and is also known as Pyroelectric sensor .It is mainly used for detecting human motion
and movement detection .
Ultrasonic Sensor:
The principle of ultrasonic sensor is similar to the working principle of SONAR or
RADAR in which the interpretation of echoes from radio or sound waves to evaluate the
attributes of a target by generating the high frequency sound waves .
Actuator
An actuator is a machine component or system that moves or controls the mechanism of the
system. Sensors in the device sense the environment, then control signals are generated for the
actuators according to the actions needed to perform.
Types of Actuators :
1. Hydraulic Actuators
A hydraulic actuator uses hydraulic power to perform a mechanical operation. They are
actuated by a cylinder or fluid motor. The mechanical motion is converted to rotary, linear, or
oscillatory motion, according to the need of the IoT device. Ex- construction equipment uses
hydraulic actuators because hydraulic actuators can generate a large amount of force.
Advantages :
Hydraulic actuators can produce a large magnitude of force and high speed.
Used in welding, clamping, etc.
Used for lowering or raising the vehicles in car transport carriers.
Disadvantages :
Hydraulic fluid leaks can cause efficiency loss and issues of cleaning.
It is expensive.
It requires noise reduction equipment, heat exchangers, and high maintenance
systems.
2. Pneumatic Actuators
A pneumatic actuator uses energy formed by vacuum or compressed air at high pressure to
convert into either linear or rotary motion. Example- Used in robotics, use sensors that work
like human fingers by using compressed air.
Advantages :
They are a low-cost option and are used at extreme temperatures where using air is
a safer option than chemicals.
They need low maintenance, are durable, and have a long operational life.
It is very quick in starting and stopping the motion.
Disadvantages :
Loss of pressure can make it less efficient.
The air compressor should be running continuously.
Air can be polluted, and it needs maintenance.
3. Electrical Actuators
An electric actuator uses electrical energy, is usually actuated by a motor that converts
electrical energy into mechanical torque. An example of an electric actuator is a solenoid based
electric bell.
Advantages :
It has many applications in various industries as it can automate industrial valves.
It produces less noise and is safe to use since there are no fluid leakages.
It can be re-programmed and it provides the highest control precision positioning.
Disadvantages :
It is expensive.
It depends a lot on environmental conditions.
Other actuators are
Thermal/Magnetic Actuators –
These are actuated by thermal or mechanical energy. Shape Memory Alloys
(SMAs) or Magnetic Shape‐Memory Alloys (MSMAs) are used by these actuators.
An example of a thermal/magnetic actuator can be a piezo motor using SMA.
Mechanical Actuators
A mechanical actuator executes movement by converting rotary motion into linear
motion. It involves pulleys, chains, gears, rails, and other devices to operate.
Example – A crankshaft.
Soft Actuators
Shape Memory Polymers
Light Activated Polymers
With the expanding world of IoT, sensors and actuators will find more usage in
commercial and domestic applications along with the pre-existing use in industry.
Arduino Board
Arduino is the best choice for IoT projects because its boards are durable and simpler than others,
making them easier to maintain and program. With the backing of the Arduino IoT Cloud and its
programming environments, programmers may create linked devices and objects quickly and
easily.
NodeMCU
NodeMCU is an open-source Lua based firmware developed for the ESP8266 wifi chip. By
exploring functionality with the ESP8266 chip, NodeMCU firmware comes with the ESP8266
Development board/kit i.e. NodeMCU Development board. Since NodeMCU is an open-source
platform, its hardware design is open for edit/modify/build. NodeMCU Dev Kit/board consist of
ESP8266 wifi enabled chip.
The ESP8266 is a low-cost Wi-Fi chip developed by Espressif Systems with TCP/IP protocol.
There is Version2 (V2) available for NodeMCU Dev Kit i.e. NodeMCU Development Board v1.0
(Version2), which usually comes in black colored PCB. NodeMCU Dev Kit has Arduino like
Analog (i.e. A0) and Digital (D0-D8) pins on its board. It supports serial communication protocols
i.e. UART, SPI, I2C, etc.
NodeMCU ESP8266 specification & features are as follows:
Microcontroller: Tensilica 32-bit RISC CPU Xtensa LX106
Operating Voltage: 3.3V
Input Voltage: 7-12V
Digital I/O Pins (DIO): 16
Analog Input Pins (ADC): 1
UARTs: 1
SPIs: 1
I2Cs: 1
Flash Memory: 4 MB
SRAM: 64 KB
ESP8266
ESP8266 is Wi-Fi enabled system on chip (SoC) module developed by Espressif system.
It is mostly used for development of IoT (Internet of Things) embedded applications.
It employs a 32-bit RISC CPU based on the Tensilica Xtensa L106 running at 80 MHz (or
overclocked to 160 MHz).
It has a 64 KB boot ROM, 64 KB instruction RAM and 96 KB data RAM. ESP8266 module is
low cost standalone wireless transceiver that can be used for end-point IoT developments.
Arduino
IoT layers
The Device Layer: At the bottom of the stack, we have the device layer, also called
the perception layer. This layer contains the physical things needed to sense or control the
physical world and acquire data (that is, by perceiving the physical world). Existing hardware,
such as sensors, RFID, and actuators, constitutes the perception ...
ITU-T IoT Reference Model P
The architecture of IoT depends upon its functionality and implementation in different
sectors.
IoT Protocols
6LOWPAN
6LoWPAN stands for IPv6 over Low-power Wireless Personal Area Networks.
It is a standard protocol for realizing IPv6 communication on wireless networks
composed of low-power wireless modules.
6LoWPAN specification contains packet compression and other optimization
mechanisms to enable the efficient transmission of IPv6 packets on a network with
limited power resources and reliability, which makes efficient IPv6 communication over
low-power wireless networks possible.
RPL Protocol
RPL stands for Routing Protocol for Low-Power and Lossy Network.
It is a distance-vector protocol that supports a variety of Data Link Protocols.
RPL builds a Destination Oriented Directed Acyclic Graph (DODAG) which has only
one route from each leaf node to the root.
All the traffic in this DODAG is routed through the root. Initially, each node sends a
DODAG Information Object (DIO) announcing them self as a root. This information
travels in the network, and complete DODAG is gradually built. When a new node wants
to join the network, it sends a DODAG Information Solicitation (DIS) request and root
responds back with a DAO Acknowledgment (DAO-ACK) confirming the join.
CoAP
CoAP Protocol (Constrained Application Protocol) is a web-based protocol that has been
specifically designed to connect small, semi-intelligent devices to the Internet of Things
(IoT).
CoAP (Constrained Application Protocol) is a session layer protocol that provides the
RESTful (HTTP) interface between HTTP client and server.
It is designed by IETF Constrained RESTful Environment (CoRE) working group.
It is designed to use devices on the same constrained network between devices and general
nodes on the Internet.
CoAP enables low-power sensors to use RESTful services while meeting their low power
constraints. This protocol is specially built for IoT systems primarily based on HTTP
protocols.
This network is used within the limited network or in a constrained environment. The
whole architecture of CoAP consists of CoAP client, CoAP server, REST CoAP proxy,
and REST internet.
The data is sent from CoAP clients (such as smartphones, RFID sensors, etc.) to the CoAP server
and the same message is routed to REST CoAP proxy. The REST CoAP proxy interacts outside
the CoAP environment and uploads the data over REST internet.
MQTT (Message Queue Telemetry Transport)
UNIT-IV
Device Discovery
Device discovery tools simplify the process using a variety of discovery protocols to
discover and collect information about: Physical assets such as routers, switches, servers, hosts
and firewalls. Software assets such as applications, operating systems, and services. Virtual
devices and networks.
Device Discovery Protocols
There are three primary discovery protocols:
Simple Network Management Protocol (SNMP),
Link Layer Discovery Protocol (LLDP), and ping.
SNMP is an Internet Standard protocol that allows IT teams to aggregate and organize data about
the devices on a network.
LLDP is a vendor-neutral protocol.
IoT Device Discovery
DHCP Data Collection by Traffic Type.
Firewall Deployment Options for IoT Security.
Configure a Pre-PAN-OS 10.0 Firewall with a DHCP Server.
Configure a Pre-PAN-OS 10.0 Firewall for a Local DHCP Server.
Use a Tap Interface for DHCP Visibility.
Use a Virtual Wire Interface for DHCP Visibility.
IoT cloud-based services
An IoT cloud is a massive network that supports IoT devices and applications. This
includes the underlying infrastructure, servers and storage, needed for real-time operations and
processing.
Registration in IoT
The IoT register (register of sensors´ networks of the Internet of Things) is a tool that
enables standard registration of data sources from the sensory networks of different customers
and diff erent suppliers „in one map“.
Registering personal and departmental Wi-Fi devices allows users affiliated with the UMN
to connect devices such as Xbox, Roku, Apple TV, Google Chromecast, door locks, freezer
monitors, and more to the University Wi-Fi network. Unregistered devices can disrupt or slow
down the University Wi-Fi network, making it difficult for neighboring devices to connect.
The types of devices that should be registered using the Register a Personal Device for IoT guide
or Register a Departmental Device for IoT guide are listed below.
Xbox, Roku, Apple TV, and other streaming devices
Xbox, Roku, Apple TV, and similar devices can be registered for Internet of Things (IoT)
service. Follow the directions on this guide to connect these devices.
Google Chromecast and Google Home
Do not register Google Chromecast, Google Home, and similar device configurations using
this process. These devices are limited to residence halls and require a Student Internet ID and
password. They have additional steps for setup on the UofM-Guest Network. Please
follow Register your Chromecast Device for these devices.
Laptops, Smart Phones, Printers
Do not register laptops, smart phones, or printers using this process unless otherwise
specified. If not connecting to eduroam, these devices should connect to UofM-Guest without
registration.
Phones and laptops should connect to eduroam using your full University email address
([email protected]) and password authentication. For more information on eduroam,
follow Connect to eduroam.
Smart Light Bulb and Similar Home Devices
Please note that some Internet of Things (IoT) devices designed to work on home
networks may not be supported by the UMN network. The scale, design, and security controls of
the UMN network makes it challenging for some devices to function properly on the network.
Some examples include:
Devices that require a direct connection or special addressing from a Wi-Fi router (e.g. a
Phillips Hue light bulb).
Some devices that connect to a local hub that is then connected to the University network.
Departmental Devices (i.e., Door Locks, Cameras, Sensors)
Departmental-owned on-campus door locks, cameras, sensors, and similar devices can be
registered for Internet of Things (IoT) service. Follow the directions on this guide to connect
these devices.
Step 3: Bulk Import and register your IoT Devices for the Encrypted Service
Step 4 (Optional): Setting the Same Password for a Group of IoT Devices
Step 5: Connect to the Encrypted IoT Wi-Fi Service
In a traditional virtualized environment, the virtual disk storage model is the eminent one. The
nomenclature of this model is based upon this very reason, instance storage, meaning storage that
is used like conventional virtual disks.
It is crucial to note that instance storage is a storage model, not a storage protocol.
This storage can be implemented in numerous ways. For example, DAS is generally used to
implement instance storage. It is often stated as ephemeral storage as the storage isn’t highly
reliable.
Hard drives that instance storages run on are physically attached to the EC2 hosts which are
running the store. Their endurance depends upon the lifetime of the instances attached to them.
Both Instance and Elastic Block Storage (EBS) volumes are stored in a series somewhere in the
same AZ. All the HDP’s and can be re-arranged with a new EC2 instance unless they are bound
to delete when the attached EC2 instance is terminated.
Due to the paucity of speed and persistence in instance storage, it’s usually used on data that
requires quick but temporary assessment, like swap or paging files.
However, it is also used to store data that requires regular replication to multiple locations.
Also, EC2’s using instance storage for their root device should keep a copy of their AMI on the
instance store disk because instance storage does not endure any data, which is the reason behind
longer boot time when compared to instances backed by EBS.
Volume storage is also known as block storage. It supports operations like read/write and
keeping the system files of running virtual machines.
As suggested by its name, data is stored in structured blocks and volumes where files are split
into equal-sized blocks. Each block has its own address.
However, unlike objects, they don’t possess any metadata. Files are bifurcated into simpler
blocks of fixed size, storing large amounts of data, which are dispensed amongst the storage
nodes.
Public cloud providers allow the creation of various file systems on their block storage systems,
thus enabling users to store incessant data like a database.
Additionally, an Amazon EBS volume is accessed from an Amazon EC2 instance through an
AWS shared or dedicated network.
Another advantage of using volume/block storage is its backup mechanism. For example, AWS
EBS extends a snapshot feature that is necessarily an incremental point in a timely backup of
your volume.
Cloud-native applications need space, for storing data that is shared between different VMs.
However, often there’s a need for spaces that can extend to various data centers across multiple
geographies which is catered by Object storage.
For example, Amazon Simple Storage Service (S3) caters to a single space across an entire
region, probably, across the entire world.
Object storage stores data as objects, unlike others which go for a file hierarchy system. But it
provides for eventual consistency.
What object storage does differently is that it tries to explore address capabilities that are
overlooked by other storages viz a namespace, directly programmable interface, data
distribution, etc.
Object storage also saves a substantial amount of unstructured data. This kind of storage is used
for storing songs on audio applications, photos on social media, or online services like Dropbox.
In this kind of storage, files are distributed in different nodes which means that to modify a file
you will need to upload a new revision of the entire file which can significantly impact
performance.
UAV
A UAV, commonly known as a drone, unpiloted aerial vehicle, or remotely piloted aircraft
(RPA), has its flight controlled either autonomously by on-board computers or by the remote
control of a pilot on the ground or in another vehicle.
Types of Drones
1. Multi-Rotor Drones
2. Fixed-Wing Drones
3. Single-Rotor Drones
4. Fixed-Wing Hybrid VTOL
Drone
Type Pros Cons Uses/Price
Good camera
control
Can operate in a
confined area
Launch and
recovery needs a
lot of space
Not perfect at
either hovering or
Fixed- VTOL forward flight Drone Delivery
Wing
Hybrid Long-endurance Still in Price: TBD, in
flight development development
Multi-Rotor Drones
Multi-rotor drones are the easiest and cheapest option for getting an ‘eye in the sky.’ They
also offer greater control over position and framing, and hence they are perfect for aerial
photography and surveillance. They are called multi-rotor because they have more than one motor,
more commonly tricopters (3 rotors), quadcopters (4 rotors), hexacopters (6 rotors) and
octocopters (8 rotors), among others. By far, quadcopters are the most popular multi-rotor drones.
Fixed-Wing Drones
A fixed-wing drone has one rigid wing that is designed to look and work like an aeroplane,
providing the lift rather than vertical lift rotors. Hence, this drone type only needs the energy to
move forward and not to hold itself in the air. This makes them energy-efficient.
Single-Rotor Drones
Single-rotor drone types are strong and durable. They look similar to actual helicopters in
structure and design. A single-rotor has just one rotor, which is like one big spinning wing, plus a
tail rotor to control direction and stability.
Fixed-Wing Hybrid VTOL
Hybrid VTOL drone types merge the benefits of fixed-wing and rotor-based designs. This
drone type has rotors attached to the fixed wings, allowing it to hover and take off and land
vertically. This new category of hybrids are only a few on the market, but as technology advances,
this option can be much more popular in the coming years. One example of fixed-wing hybrid
VTOL is Amazon’s Prime Air delivery drone.
Components of UAV
Fuselage.
Wing.
Tail assembly/empennage.
Payload.
Propulsion system.
Landing gear/undercarriage.
Transmitter & Receiver.
Flight controller (FC)
Sensors used in Drones
3 axis accelerometers:
This sensor is very useful to stablilize the drone. 3-axis accelerometer provides linear
acceleration in 3 axes.
3-axis gyroscope:
This sensor is used to provide angular motion to the drone. 3-axis gyroscope provides angular
acceleration in 3 axes.
Magnetometer:
This drone sensor type is present in the drone which has GPS functionality. It is available in 1 to
3 axes. Magnetometer is basically a magnetic compass which can measure magnetic field of the
earth. This feature is used to determine direction of compass used in the Drone. Compass
direction is determined with respect to mangetic north.
Barometer:
As we know atmospheric pressure changes with respect to height from the sea level. This
phenomenon is used in the barometer to determine height of Unmanned Aerial Vehicle.
Barometer is also referred as pressure sensor. In most of the flight controllers additional
measurement device based on GPS sensor is used to calculate height above sea level very
accurately.
GPS Sensor:
This drone sensor type uses satellite launched around the Earth to determine specific geographic
locations. Unmanned Aerial Vehicles (UAV) use GPS sensors to determine the specific router
without the presence of pilot. It can also return back to its original position with the use of GPS
sensor.
Distance Sensor:
These types of sensors are used to sense the obstacles. The distance sensors are based on
ultrasonic, laser based or LIDAR based.
UAV Deployed Sensors
Optical Cameras
To enable high-resolution Structure-from-Motion photogrammetry, we currently focus on
the Nikon D800 series of cameras, including the 36 mp Nikon D800/D810 and the 45.7 mp Nikon
D850, most frequently using a 50mm prime lens. From distances in the 25-30m range (80-100
feet), this enables sub-cm 3Dsensing useful for high resolution assessment of transportation
infrastructure such as roads and bridges. Other UAVs come with built-in cameras, such as the 20
mp onboard the latest Mavic 2 Pro small quadcopter that includes 4K video capability.
Thermal Sensors
We have deployed several FLIR thermal sensors, including the Tau2, Vue Pro, Vue Pro R,
and Duo Pro systems, primarily for finding subsurface delamination in concrete bridge decks.
Thermal anomalies can be indicative of where concrete has begun to delaminate, creating
subsurface air gaps that warm up differentially and create an identifiable pattern on the bridge deck
surface.
FLIR Duo Pro and FLIR Vue Pro R sensors are being flown to identify thermal anomalies at a bridge in Michigan.
Lidar (Light Detection and Ranging) Sensor
We have a customized lidar setup and mount able to deploy lidar sensors such as the VLP-
16 system, creating 3D points clouds of bridges and ground surfaces. These can be used to find
bridge spalling and ground features that would ordinarily be hard to identify.
Ground Penetrating Radar (GPR) Sensor and Antenna Configuration
We deploy a four-port, wideband, low frequency stepped frequency continuous wave
(SFCW) radar using an AKELA vector network analyzer, with ability to transmit 256 frequencies
between 500mhz and 2000 mhz. This GPS sensor system was deployed on our Bergen Quad-8
UAV to demonstrate buried object detection.
data collection flight
Lightweight Portable Radiometer (LPR)
MTRI has developed a lightweight portable radiometer (LPR) system to enable
spectroscopy at lower cost than traditional systems, with the ability to be deployed from UAS
platforms such as our Bergen hexa copter UAS. It uses two Ocean Optics STS sensors with
measurements of upwelling radiance and downwelling irradiance from 350 to 1000 nm with 1.5
nm spectral resolution. The LPR has recently been deployed to create spectral profiles of
submerged aquatic vegetation and harmful algal blooms.
Tetra Cam Multispectral Camera
We have deployed the Tetra cam Micro-MCA6 tunable six-band multispectral camera to
identify submerged aquatic vegetation species in the Great Lakes, with a focus on identifying the
invasive plant Eurasian watermilfoil. We have also modified the bands to collect harmful algal
bloom data and identify areas with high concentrations of dissolved organic carbon at river mouths.
We can apply different polarization filters to help identify anthropogenic features in images or
improve monitoring of aquatic areas.
Mission Planner
Mission Planner is a ground control station for Plane, Copter and Rover. It is compatible
with Windows only. Mission Planner can be used as a configuration utility or as a dynamic control
supplement for your autonomous vehicle. Here are just a few things you can do with Mission
Planner:
Load the firmware (the software) into the autopilot board (i.e. Pixhawk series) that
controls your vehicle.
Setup, configure, and tune your vehicle for optimum performance.
Plan, save and load autonomous missions into you autopilot with simple point-and-
click way-point entry on Google or other maps.
Download and analyze mission logs created by your autopilot.
Interface with a PC flight simulator to create a full hardware-in-the-loop UAV
simulator.
With appropriate telemetry hardware you can:
o Monitor your vehicle’s status while in operation.
o Record telemetry logs which contain much more information the the on-
board autopilot logs.
o View and analyze the telemetry logs.
o Operate your vehicle in FPV (first person view)
Internet of Drones
The Internet of drones (IoD) can be described as an infrastructure designed to provide
control and access over the Internet between drones and users.