0% found this document useful (0 votes)
36 views

43 IoT - Assignment Brief 1 2020 10 24 2020 PDF

The document provides information on an assignment brief for a BTEC Level 5 HND Diploma in Computing course. It outlines the requirements for a two-part assignment on planning and developing an Internet of Things (IoT) application. For part one, students must plan an IoT application for an end user and test iterations with user feedback. For part two, students must develop an IoT application using hardware, software and services, and evaluate the application and its potential impact. The document provides learning outcomes, assessment criteria and guidance on the tasks and expected format and standards for submission.

Uploaded by

Haifa Maqsood
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views

43 IoT - Assignment Brief 1 2020 10 24 2020 PDF

The document provides information on an assignment brief for a BTEC Level 5 HND Diploma in Computing course. It outlines the requirements for a two-part assignment on planning and developing an Internet of Things (IoT) application. For part one, students must plan an IoT application for an end user and test iterations with user feedback. For part two, students must develop an IoT application using hardware, software and services, and evaluate the application and its potential impact. The document provides learning outcomes, assessment criteria and guidance on the tasks and expected format and standards for submission.

Uploaded by

Haifa Maqsood
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

ASSIGNMENT 1 BRIEF

Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 43: Internet of Things

Assignment title

Academic Year

Unit Tutor Ho Hai Van

Issue date Submission date

IV name and date Hồ Nguyễn Minh Phong

Submission Format:

Format: This assignment is an Individual assignment and specifically including 1 document:


You must use font Calibri size 12, set number of the pages and use multiple line spacing at
1.3. Margins must be: left: 1.25 cm; right: 1 cm; top: 1 cm and bottom: 1 cm. The reference
follows Harvard referencing system. The recommended word limit is 2.000-2.500 words.
You will not be penalized for exceeding the total word limit. The cover page of the report
has to be the Assignment front sheet 1.
Submission Students are compulsory to submit the assignment in due date and in a way requested by
the Tutors. The form of submission will be a soft copy posted on
http://cms.greenwich.edu.vn/
Note: The Assignment must be your own work, and not copied by or from another student or from
books etc. If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style. Make sure that you know how to reference
properly, and that understand the guidelines on plagiarism. If you do not, you definitely get fail

Unit Learning Outcomes:

LO1 Analyse what aspects of IoT are necessary and appropriate when designing software applications
LO2 Outline a plan for an appropriate IoT application using common architecture, frameworks, tools, hardware
and APIs
LO3 Develop an IoT application using any combination of hardware, software, data, platforms and services.
LO4 Evaluate your IoT application and detail the problem your IoT application solves, the potential impact on

Page 1
people, business, society and the end user and the problems it might encounter when integrating into the wider
IoT ecosystem

Assignment Brief and Guidance:

You currently work as a product developer for a new startup where you design IoT products for the
consumer, corporate, government and defence clients. As part of your role your manager has tasked you
to plan and develop a new IoT product, service or application for a potential client. You are required to
identify a target user and conduct tests with this user and include this feedback into multiple iterative
versions of your product.

Part 1 (Assignment 1):: For the first part, you must:

 Plan an IoT application for a specific target end user and the tests you intend to conduct with this
user. This plan will be in the form of a document and will include supporting evidence and
material, such as user personas and customer journey maps.
 Create multiple iterations of your application and modify each iteration with enhancements
gathered from user feedback and experimentation. This will follow the pathway outlined in your
plan.(log book,)

Part 2 (Assignment 2): For the first part, you must:

 Show evidence about Developed IoT application using any combination of hardware, software,
data, platforms and services (video or images of your IoT system with code snippet)
 Evaluate your IoT application and detail the problem your IoT application solves, the potential
impact on people, business, society and the end user and the problems it might encounter when
integrating into the wider IoT ecosystem

Page 2
Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Analyse what aspects of IoT are necessary and appropriate when designing software
applications

P1 Explore various forms of M1 Evaluate the impact of D1 Evaluate specific forms of


IoT functionality. common IoT architecture, IoT architecture and justify their
frameworks, tools, hardware and use when designing software
APIs in the software development applications.
P2 Review standard
lifecycle.
architecture, frameworks,
tools, hardware and APIs
available for use in IoT M2 Review specific forms of IoT
development. architecture, frameworks, tools,
hardware and APIs for different
problem-solving requirements.

LO2 Outline a plan for an appropriate IoT application using common architecture, frameworks,
tools, hardware and APIs

P3 Investigate architecture, M3 Select the most appropriate D2 Make multiple iterations of


frameworks, tools, hardware IoT architecture, frameworks, your IoT application and modify
and API techniques available tools, hardware and API each iteration with
to develop IoT applications. techniques to include in an enhancements gathered from
application to solve this problem. user feedback and
experimentation.
P4 Determine a specific
problem to solve using IoT. M4 Apply your selected
techniques to create an IoT
application development plan.

Page 3
Page 4
LO1 Analyse what aspects of IoT are necessary and appropriate
when designing software applications.
P1 Explore various forms of IoT functionality.
What is internet of things (IoT)
The internet of things, or IoT, is a system of interrelated computing devices,
mechanical and digital machines, objects, animals or people that are provided
with unique identifiers (UIDs) and the ability to transfer data over a network
without requiring human-to- human or human-to-computer interaction.

A thing in the internet of things can be a person with a heart monitor implant, a
farm animal with a biochip transponder, an automobile that has built-in sensors
to alert the driver when tire pressure is low or any other natural or man-made
object that can be assigned an Internet Protocol (IP) address and is able to
transfer data over a network.

How IoT works


An IoT ecosystem consists of web-enabled smart devices that use embedded
systems, such as processors, sensors and communication hardware, to collect,
send and act on data they acquire from their environments. IoT devices share
the sensor data they collect by connecting to an IoT gateway or other edge
device where data is either sent to the cloud to be analyzed or analyzed locally.
Sometimes, these devices communicate with other related devices and act on
the information they get from one another. The devices do most of the work
without human intervention, although people can interact with the devices - for
instance, to set them up, give them instructions or access the data.

The connectivity, networking and communication protocols used with these


web-enabled devices largely depend on the specific IoT applications deployed.

IoT can also make use of artificial intelligence (AI) and machine learning to aid in
making data collecting processes easier and more dynamic.

Page 5
Why IoT is important
The internet of things helps people live and work smarter, as well as gain
complete control over their lives. In addition to offering smart devices to
automate homes, IoT is essential to business. IoT provides businesses with a
real-time look into how their systems really work, delivering insights into
everything from the performance of machines to supply chain and logistics
operations.

IoT enables companies to automate processes and reduce labor costs. It also
cuts down on waste and real service delivery, making it less expensive to
manufacture and deliver goods, as well as offering transparency into customer
transactions.

As such, IoT is one of the most important technologies of everyday life, and it
will continue to pick up steam as more businesses realize the potential of
connected devices to keep them competitive.

Pros and cons of IoT


Some of the advantages of IoT include the following:

Page 6
-ability to access information from anywhere at any time on any device;

-improved communication between connected electronic devices;

-transferring data packets over a connected network saving time and money;
and

-automating tasks helping to improve the quality of a business's services and


reducing the need for human intervention.

Some disadvantages of IoT include the following:

-As the number of connected devices increases and more information is shared
between devices, the potential that a hacker could steal confidential
information also increases.

-Enterprises may eventually have to deal with massive numbers -- maybe even
millions -- of IoT devices, and collecting and managing the data from all those
devices will be challenging.

-If there's a bug in the system, it's likely that every connected device will
become corrupted.

-Since there's no international standard of compatibility for IoT, it's difficult for
devices from different manufacturers to communicate with each other.

Internet of underwater things

Page 7
The grand goal of the Internet of Underwater Things (IoUT) is to create a
worldwide network of smart interconnected underwater objects and to digitally
link our oceans, streams, and lakes.

The current count of IoT devices is about 9 billion (excluding smartphones,


tablets, and computers) and estimated to reach 30 billion by 2020. While there
are ambitious terrestrial not like Google's Project Loon and Facebook's Aquila
drone, which are trying to digitally connect every rural and remote corner of the
land, we're missing out on connecting underwater.

Oceans and lakes cover three quarters of the earth. It is only natural for
scientists and engineers to extend the concept of IoT into the oceans.

The Vision of Internet of Underwater Things:


IoUT would enable a system of autonomous underwater vehicles (AUV)
communicating with each other, collecting data, and transmitting to control
centers above the surface at regular internet speeds. Apart from effective
management of our planet's resources, the information can be used for a wide
Page 8
variety of tasks such as surveying crashes and shipwrecks, detecting early signs
of tsunamis, monitoring health of animals, as well as creating interactive real-
time aquatic education, archaeological expeditions, and ecological monitoring
applications.

Technological Challenges for IoUT:


The established concepts of IoT cannot simply extend to underwater since the
conditions are very different from land. This poses serious challenges for
scientists and engineers to tackle before IoUT can become reality. Some
practical challenges are listed below:

-Signal transmission underwater is limited and not as effective compared to air.


For example, radio waves used by conventional Wi-Fi networks can travel only a
few meters at most underwater.

-Signal interference from waves, passing ships, or background noise from marine
life

-Achieving reliable response to rapidly changing environment - from salinity to


the temperature of the water

-Huge costs of implementing sensors and submarine AUVs

-Chemical and UV radiation resistance of IoUT clients has to be stronger than for
home devices.

Internet of underground things

Page 9
The projected growth in World population and need for food have recently
motivated adoption of information technology solutions in crop fields within
precision agriculture approaches. Internet of underground things (IOUT), which
consists of sensors and communication devices, partly or completely buried
underground for real-time soil sensing and monitoring, emerge from this need.
This new paradigm facilitates seamless integration of underground sensors,
machinery, and irrigation systems with the complex social network of growers,
agronomists, crop consultants, and advisors. In this paper, state-of-the-art
communication architectures are reviewed, and underlying sensing technology
and communication mechanisms for IOUT are presented. Recent advances in
the theory and applications of wireless underground communication are also
reported. Major challenges in IOUT design and implementation are identified.

Internet of underground things (IOUT) is an emerging paradigm which consists


of sensors and communication devices, partly or completely buried
underground for real-time soil sensing and monitoring. In this paper, the
performance of different modulation schemes in IOUT communications is
studied through simulations and experiments. The spatial modularity of direct,
lateral, and reflected components of the UG channel is exploited by using
multiple antennas. First, it has been shown that bit error rates of 10 -3 can be
Page 10
achieved with normalized delay spreads (τ d) lower than 0.05. Evaluations are
conducted through the first software-defined radio-based field experiments for
UG channel. Moreover, equalization has a significant impact on the performance
improvement of an IOUT system. An 8-Tap DFE (decision-feedback equalizer)
adaptive equalizer achieves better performance. It is also found that DBPSK, and
DPSK are more suitable for digital communications in the UG channel without
adaptive equalization. Then, two novel UG receiver designs, specifically, 3W-
Rake and Lateral-Direct-Reflected (LDR) are developed and analyzed for
improvement performance. It has been shown that with a three antenna LDR
design, BER of lower than 10 -5 can be achieved. The BER of these two
approaches are compared and the LDR has been shown to perform better.

Internet of battlefield things

In the future, military operations will rely less on human soldiers and more on
interconnected technology, leveraging advancements in embedded systems and
machine intelligence in order to achieve superior defense capabilities. The
Internet of Battlefield Things will connect soldiers with smart technology in
armor, radios, weapons, and other objects, to give troops “extra sensory”
perception, offer situational understanding, endow fighters with prediction
powers, provide better risk assessment, and develop shared intuitions .The
initiative is a collaboration between the Army Research Lab, academia, and
industry.

Page 11
Internet of space things

The Internet of Things (IoT) has been recognized as a key driver of 5G wireless
communications, with a projected 50 billion endpoints by 2020 ranging from
connected temperature sensors to unmanned aerial vehicles. The long term
success of IoT is tied to its pervasiveness, an area where the heterogeneous
connectivity solutions of today fall short by a large margin. The true potential of
IoT can only be realized when it is augmented with a ubiquitous connectivity
platform capable of functioning even in the most remote of locations. To this
end, this project focuses on the development of a novel cyber-physical system
spanning ground, air, and space, called the Internet of Space Things / CubeSats
(IoST). IoST expands the functionalities of traditional IoT, by not only providing
an always-available satellite backhaul network, but also by by real-time satellite-
captured information and, more importantly, performing integration of on the
ground data and satellite information to enable new applications . The
fundamental building block for IoST is a new generation of nano-satellites
known as CubeSats, which are augmented with SDN and NFV solutions.

The primary research Objectives of this project include:

-Development of reconfigurable multi-band radios covering wide spectrums at


microwaves, mm-wave, THz band, and optical frequencies to high-throughput
services.

Page 12
-Design of multi-band antenna arrays based on new materials such as graphene,
which allow the creation of programmable antenna architectures with tunable
frequency and radiation diagram.

-Deep neural networks-enabled resource allocation strategies for self-learning


and optimization of CubeSat network.

-Tackling long delays and temporal variation in network topology through new
concepts such as Stateful Segment Routing.

-Proactive handovers through Ground-to-satellite link outage forecasting and


satellite diversity.

-Lightweight hardware virtualization for CubeSats with full networking support.

Internet of nano-things

Nanotechnology, since its inception has provided enhanced and efficient


solutions to various applications in biomedical, industry, agriculture and military
applications. Nanotechnology has led to the evolution of nano-machines which
are tiny components comprising of arranged set of molecules performing pre-
determined tasks. The interconnection of nanosensors and nanodevices with
Internet has led to development of next generation standard based on IoT called
“Internet of Nano Things” (IoNT). The main objective behind this paper is to
provide in-depth view of Internet of Nano Things (IoNT) - Architecture,
Application areas and Challenges to make researchers aware of IoNT standard

Page 13
for overcoming existing challenges and making use of IoNT in unique areas in
near future for rapid deployment.

The Internet of nano things (IoNT) offers a medium to connect various


nanodevices with the help of high-speed networks. Using this technology,
nanodevices can be deployed along with other advanced technologies such as
cloud computing, big data, and machine learning.

With the help of Internet of Nano Things, nanodevices can collect large volumes
of critical data that can be analyzed to gain informative business insights. Also,
nanotechnology can be used in data processing with the help of supercomputers
and processors that can acquire, analyze, and present data generated by IoNT
devices. In this manner, IoNT infrastructure can be used to process large
volumes of crucial data to help improve business models and generate business
analytics.

Internet of bio-nanothings

Recent advances in communications and computing technologies have made a


growing number of smart devices available for use and communicate. The
integration of intelligent objects on the Internet is known as Internet of Things
(IoT) .1 The IoT can be defined as a world of interconnected objects, capable of
being identified, addressed, controlled and accessed via the Internet. These
objects can communicate with others, with other resources available on the
web, and with information systems and human users. As the size of the devices
Page 14
is reduced due to improvements in nanotechnology (such as graphene) emerges
the concept of Nanonetworks. Nanonetworks are networks formed by the
interconnection of nano-sized devices hereinafter called nanomachines. From
the interconnection of these nanomachines with the Internet came the concept
of Internet of NanoThings (IoNT). This nanosized devices are used in many fields
varying from healthcare, body sensing networks and environmental monitoring.
These nanomachines can be either artificial or biological. Nowadays research
has led to the use of artificial, usually graphene based. Although the graphene
has made the nanomachines feasible and operational for several applications,
there are applications where their artificial nature make unfeasible to deploy
(such as intrabody applications). In this sense emerge the Internet of Bio-Nano
Things (IoBNT) where the nanomachines are no longer artificial but based on
biological cells built through the procedures of synthetic biology. Some of the
applications intended by IoBNT are intra-body sensing and actuation networks,
and environmental control of toxic agents and pollution.2 This new paradigm
poses new challenges in terms of communication and networking using
biochemical infrastructure while enabling an interface to the electrical domain
of the Internet.

P2 Review standard architecture, frameworks, tools, hardware and


APIs available for use in IoT development.
IoT standard architecture

Page 15
What is IoT architecture?

Because of outstanding opportunities IoT promises, more organizations seek for


the inclusion of its products in their business processes. However, when it
comes to reality, this brilliant idea appears too complicated to be
implemented — given the number of devices and conditions needed to make it
work. In other words, the problem of establishing a reliable architecture of
Internet of Things inevitably enters the stage.

Among all, to deal with the whole variety of factors affecting IoT architecture,
it’s easier and more effective to find a reliable provider of IoT solutions. This
decision will significantly reduce the number of resources spent on the way.
Though it’s possible to comprehend the process of creating software, the
practical application of its 4 stages contains too many nuances and aspects to be
described in simple words. Because of that, use this guide for establishing a
proper understanding of what’s going on during IoT architecture — but consider
referring to the specialist to make this process actually happen. This decision will
facilitate getting the needed result and guarantee being a satisfied client of a
software development company.

Before revealing the secrets and providing a clear structure of this initiative, it’s
important to understand what this concept actually means. In essence, IoT
architecture is the system of numerous elements: sensors, protocols, actuators,
cloud services, and layers. Given its complexity, there exist 4 stages of IoT
architecture. Such a number is chosen to steadily include these various types of
components into a sophisticated and unified network.
Page 16
In addition, Internet of Things architecture layers are distinguished in order to
track the consistency of the system. This should also be taken into consideration
before the IoT architecture process start.

An Overview of the Main Stages in the IoT Architecture Diagram

In simple terms, the 4 Stage IoT architecture consists of

-Sensors and actuators

-Internet getaways and Data Acquisition Systems

-Edge IT

-Data center and cloud.

Stage 1. Networked things (wireless sensors and actuators)

The outstanding feature about sensors is their ability to convert the information
obtained in the outer world into data for analysis. In other words, it’s important
to start with the inclusion of sensors in the 4 stages of an IoT architecture
framework to get information in an appearance that can be actually processed.

For actuators, the process goes even further — these devices are able to
intervene the physical reality. For example, they can switch off the light and
adjust the temperature in a room.

Because of this, sensing and actuating stage covers and adjusts everything
needed in the physical world to gain the necessary insights for further analysis.

Stage 2. Sensor data aggregation systems and analog-to-digital data conversion

Even though this stage of IoT architecture still means working in a close
proximity with sensors and actuators, Internet getaways and data acquisition
systems (DAS) appear here too. Specifically, the later connect to the sensor
network and aggregate output, while Internet getaways work through Wi-Fi,
wired LANs and perform further processing.

Page 17
The vital importance of this stage is to process the enormous amount of
information collected on the previous stage and squeeze it to the optimal size
for further analysis. Besides, the necessary conversion in terms of timing and
structure happens here.

In short, Stage 2 makes data both digitalized and aggregated.

Stage 3. The appearance of edge IT systems

During this moment among the stages of IoT architecture, the prepared data is
transferred to the IT world. In particular, edge IT systems perform enhanced
analytics and pre-processing here. For example, it refers to machine learning
and visualization technologies. At the same time, some additional processing
may happen here, prior to the stage of entering the data center.

Likewise, Stage 3 is closely linked to the previous phases in the building of an


architecture of IoT. Because of this, the location of edge IT systems is close to
the one where sensors and actuators are situated, creating a wiring closet. At
the same time, the residing in remote offices is also possible.

Stage 4. Analysis, management, and storage of data

The main processes on the last stage of IoT architecture happen in data center
or cloud. Precisely, it enables in-depth processing, along with a follow-up
revision for feedback. Here, the skills of both IT and OT (operational technology)
professionals are needed. In other words, the phase already includes the
analytical skills of the highest rank, both in digital and human worlds.
Therefore, the data from other sources may be included here to ensure an in-
depth analysis.

After meeting all the quality standards and requirements, the information is
brought back to the physical world — but in a processed and precisely analyzed
appearance already.

Stage 5 of IoT Architecture?

Page 18
In fact, there is an option to extend the process of building a sustainable IoT
architecture by introducing an extra stage in it. It refers to initiating a user’s
control over the structure — if only your result doesn’t include full automation,
of course. The main tasks here are visualization and management. After
including Stage 5, the system turns into a circle where a user sends commands
to sensors/actuators (Stage 1) to perform some actions.

And the process starts all over again.

IoT standard framework

IoT Framework tells about the basic structure underlying an IoT


solution/product.

There are four basic components of IoT framework:-

-Device Hardware – Requires an idea of architecture and working of various


micro-controllers along with various sensors.

-Device Software - Requires writing programs to configure your controller and


make it act accordingly. Also requires knowledge for how API’s work inside
micro-controllers and how you can make libraries for programming.

-Communication and Cloud Platform – Requires basics of wired and wireless


communication. Cloud in itself is an indispensable part of IoT and requires
knowledge for how Cloud technology works and its IoT integration.

Page 19
-Cloud Application – It is a software program where cloud-based and local
components work together which have faster and easier accessibility. It serves
the purpose of improving our ability to use the system to maximum potential.

IoT platform is a cloud software/platform that connects to the sensors,


gateways, end-user applications or any other physical thing that has an network
connectivity and is an integral component of IoT framework.

For developers, an IoT platform provides a set of ready-to-use features that


greatly speed up development of applications for connected devices as well as
take care of cross-device compatibility.

Moreover, IoT platforms provide data security involving encryption,


comprehensive identity management, end-to-end data flow encryption, device
authentication, user access rights management, and private cloud infrastructure
for sensitive data to avoid potentially compromising breaches.

IoT standard tool – Tinkercad

IoT Tools stands for the Internet of Things Tools. It is a network or connection of
devices, vehicles, equipment applying embedded electronics, home appliances,
buildings and many more. This helps in collecting and exchanging different kinds
of data. It also helps the user to control the devices remotely over a network.

Today in the internet-driven world, IoT has engulfed the IT industry and is the
latest buzzword. It has opened many new horizons for companies and
developers working on IoT. Many exceptional products have been developed

Page 20
due to IoT app development. Companies providing Internet of Things solution
are creating hardware and software designs to help the IoT developers to create
new and remarkable IoT devices and applications

Tinkercad uses a simplified constructive solid geometry method of constructing


models. A design is made up of primitive shapes that are either "solid" or "hole".
Combining solids and holes together, new shapes can be created, which in turn
can be assigned the property of solid or hole. In addition to the standard library
of primitive shapes, a user can create custom shape generators using a built-
in JavaScript editor.

Shapes can be imported in three formats: STL and OBJ for 3D, and 2-
dimensional SVG shapes for extruding into 3D shapes. Tinkercad exports models
in STL or OBJ formats, ready for 3D printing.

Tinkercad also includes a feature to export 3D models to Minecraft Java


Edition, and also offers the ability to design structures using Lego bricks.

IoT standard tool – Cisco Packet Tracer

Packet Tracer is a cross-platform visual simulation tool designed by Cisco


Systems that allows users to create network topologies and imitate
modern computer networks. The software allows users to simulate the
configuration of Cisco routers and switches using a simulated command line
interface. Packet Tracer makes use of a drag and drop user interface, allowing
users to add and remove simulated network devices as they see fit. The
software is mainly focused towards Certified Cisco Network Associate Academy
Page 21
students as an educational tool for helping them learn fundamental CCNA
concepts. Previously students enrolled in a CCNA Academy program could freely
download and use the tool free of charge for educational use.

Packet Tracer can also be run on Linux, Microsoft Windows, and macOS.
Similar Android and iOS apps are also available. Packet Tracer allows users to
create simulated network topologies by dragging and dropping routers, switches
and various other types of network devices. A physical connection between
devices is represented by a 'cable' item. Packet Tracer supports an array of
simulated Application Layer protocols, as well as basic routing
with RIP, OSPF, EIGRP, BGP, to the extents required by the
current CCNA curriculum. As of version 5.3, Packet Tracer also supports
the Border Gateway Protocol.

In addition to simulating certain aspects of computer networks, Packet Tracer


can also be used for collaboration. As of Packet Tracer 5.0, Packet Tracer
supports a multi-user system that enables multiple users to connect multiple
topologies together over a computer network. Packet Tracer also allows
instructors to create activities that students have to complete.Packet Tracer is
often used in educational settings as a learning aid. Cisco Systems claims that
Packet Tracer is useful for network experimentation.

IoT standard hardware

In its simplest form, an IoT platform allows only connection between "things" or
devices. Architecture can also include a software platform, an application

Page 22
development platform, or an analytics platform. In a more complex form, an
authentic end-to-end IoT platform consists of eight important architectural
blocks:

1. Connection and Synchronization : This component integrates synchronous


synchronization of different protocols and data formats into one "software"
interface that ensures accurate and interoperable data transmission. works with
all devices.

Device management : This is the component that ensures the "everything"


connection works properly, runs patches and updates software and applications
running on the device or the peripheral gateways (EDGE gateway. ).

3. Database : This is the most important component of a platform. In addition to


storing the device's critical data, it must be scalable meeting the requirements
for cloud-based databases. This component must ensure mass expansion,
diversity, speed and reliability of the data.

4. Operational management and processing : The function to put data into


operation based on the Event-Action-Triggers principle allows the
implementation of "smart" operations based on data from specific sensors.

5. Analysis : This can be considered as the brain of the IoT platform. This
component performs a variety of complex analyzes from basic data clustering
and self-learning to self-analyze, predict, and extract the most valuable data in
the IoT data stream.

6. Visual data : Allows people to review patterns and observe trends from the
visual control panel, where data is graphically depicted through line charts,
simulated graphics.

7. Additional tools : This component allows IoT developers to test and pre-
market their products with use cases represented on a simulated ecosystem for
visualization and management. and control connected equipment.

Page 23
8. External Interfaces : This is where integration with third party systems and the
rest of the IT system through application programming interfaces (APIs),
software development kits (SDK) and gateways.

IoT standard APIs – Web API & MQTT API

APIs are methods and protocols to connect with other libraries and
applications. It stands for Application Programming Interface - application
programming interface . The API provides the ability to provide access to a set of
frequently used functions. And from there it is possible to exchange data
between applications.

Web API is a method used to allow different applications to communicate and


exchange data. The data returned by the Web API is usually in the form
of JSON or XML over the HTTP or HTTPS protocol.

P3 Investigate architecture, frameworks, tools, hardware and API


techniques available to develop IoT applications
IoT standard architecture – Application layer – Application protocols

Page 24
An application layer is an abstraction layer that specifies the
shared communications protocols and interface methods used by hosts in a
communications network.The application layer abstraction is used in both of the
standard models of computer networking: the Internet Protocol Suite (TCP/IP)
and the OSI model. Although both models use the same term for their
respective highest level layer, the detailed definitions and purposes are different.

In the Internet protocol suite, the application layer contains the communications
protocols and interface methods used in process-to-process communications
across an Internet Protocol (IP) computer network. The application layer only
standardizes communication and depends upon the underlying transport
layer protocols to establish host-to-host data transfer channels and manage the
data exchange in a client-server or peer-to-peer networking model. Though the
TCP/IP application layer does not describe specific rules or data formats that
applications must consider when communicating, the original specification
(in RFC 1123) does rely on and recommend the robustness principle for
application design.

An application layer protocol defines how application processes (clients and


servers), running on different end systems, pass messages to each other. In
particular, an application layer protocol defines:

-The types of messages, e.g., request messages and response messages.

-The syntax of the various message types, i.e., the fields in the message and how
the fields are delineated.

-The semantics of the fields, i.e., the meaning of the information that the field is
supposed to contain;

-Rules for determining when and how a process sends messages and responds
to messages.

Application layer functions


-Transport access and management

Page 25
It allows a user to access, retrieve and manage files in a remote computer.

-mail services

It provides the basis for email forwarding and storage facilities.

-Virtual terminal

For various reasons, it can be said that the standardization of terminals has
completely failed. The OSI solution to this problem is to define a virtual terminal
that is really just an abstract data structure that takes the abstract state of the
actual terminal. This abstract data structure can be operated by both the
keyboard and the computer and reflects the current state of the data structure
on the display. The computer can query this abstract data structure and change
this abstract data structure so that the output appears on the screen.

-Other functions

In addition to the three functions above, there are some other functions:
directory services, remote job entry, graphics, information communication and
so on.

Application layer examples

-DNS (Domain Name System)

The Domain Name System (DNS) is a hierarchical decentralized naming system


for computers, services, or other resources connected to the Internet or a
private network. It associates various information with domain names assigned
to each of the participating entities.

Currently, the limit on domain name length is 63 characters, including www.


And .com or other extensions. Domain names are also restricted to only a subset
of ASCII characters, making many other languages unable to properly represent
their names and words. Punycode-based IDNA systems, which map Unicode
strings to valid DNS character sets, have been validated and adopted by some
registries as a workaround.
Page 26
-HTTP (Hypertext Transfer Protocol)

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed,


collaborative, and hypermedia information systems.[1] HTTP is the foundation
of data communication for the World Wide Web.

HTTP is a client and server-side standard for request and response (TCP). The
client is the end user, the server is the website. Using a web browser, web
crawler, or other tools, the client initiates an HTTP request to the specified port
on the server. The responding server stores (some) resources, such as HTML
files and images. (We call it) This answering server is the origin server. There
may be multiple middleware between the user agent and the origin server, such
as agents, gateways, or tunnels. Although the TCP / IP protocol is the most
popular application on the Internet, the HTTP protocol does not require that it
be used and based on the layers it supports. In fact, HTTP can be implemented
on any other Internet protocol, or on other networks. HTTP assumes only that
the underlying protocol (provided by the underlying protocol) is reliable and
that any protocol capable of providing this guarantee can be used by it.

Typically, a request is made by the HTTP client to establish a TCP connection to


the server's designated port (the default is port 80). The HTTP server listens on
that port for requests sent by the client. Upon receipt of the request, the server
sends a status line (to the client), such as "HTTP / 1.1 200 OK," and (response) a
message body that may be a requested file, an error message, or some other
information.

-FTP (File Transfer Protocol)

FTP services generally run on both ports 20 and 21. Port 20 is used to transmit
data flow between the client and server, while port 21 is used to transmit
control flow and is the command to import to the ftp server. When data is
streamed, the control flow is idle. When the control flow, idle for a long time,
the client's firewall, the session will be set to overtime, so when a large amount
of data through the firewall, there will be some problems. At this point,

Page 27
although the file can be successfully transmitted, it can be broken by the firewall
because of the control session; the transfer can result in some errors.

Application layer protocols


The application layer protocols provide rules for communication between
applications. To ensure smooth communication, the application layer protocols
implemented on the source host and the destination host must be the same.

Application layer protocol features:

-Define the process for both parties to the communication.

-Define the message type.

-Define the syntax of the message.

-Definition of the meaning of any informational field.

-Define the way to send the message and the expected response.

-Define interaction with the next level.

IoT standard architecture – Application layer – Application protocols – CoAP

Page 28
Constrained Application Protocol (CoAP) is a specialized Internet Application
Protocol for constrained devices, as defined in RFC 7252. It enables those
constrained devices called "nodes" to communicate with the wider Internet
using similar protocols. CoAP is designed for use between devices on the same
constrained network (e.g., low-power, lossy networks), between devices and
general nodes on the Internet, and between devices on different constrained
networks both joined by an internet. CoAP is also being used via other
mechanisms, such as SMS on mobile communication networks.

CoAP is a service layer protocol that is intended for use in resource-constrained


internet devices, such as wireless sensor network nodes. CoAP is designed to
easily translate to HTTP for simplified integration with the web, while also
meeting specialized requirements such as multicast support, very low overhead,
and simplicity.[1][2] Multicast, low overhead, and simplicity are extremely
important for Internet of Things (IoT) and Machine-to-Machine (M2M) devices,
which tend to be deeply embedded and have much less memory and power
supply than traditional internet devices have. Therefore, efficiency is very
important. CoAP can run on most devices that support UDP or a UDP analogue.

The Internet Engineering Task Force (IETF) Constrained RESTful Environments


Working Group (CoRE) has done the major standardization work for this
protocol. In order to make the protocol suitable to IoT and M2M applications,
various new functions have been added. The core of the protocol is specified
in RFC 7252; important extensions are in various stages of the standardization
process.

Page 29
IoT standard architecture – Application layer – Application
protocols – MQTT

MQTT (MQ Telemetry Transport [failed verification] or Message Queuing


Telemetry Transport) is an open OASIS and ISO standard (ISO/IEC
20922) lightweight, publish-subscribe network protocol that transports
messages between devices. The protocol usually runs over TCP/IP; however, any
network protocol that provides ordered, lossless, bi-directional connections can
support MQTT. It is designed for connections with remote locations where a
"small code footprint" is required or the network bandwidth is limited.

IoT framework – IOT Design Framework Layers

IoT frameworks have four primary design goals:

-reduce development time and bring IoT solutions to market sooner;

-reduce apparent complexity of deploying and operating an IoT network;

- improve application portability and interoperability;


Page 30
-improve serviceability, reliability, and maintainability.

Given the vast range of existing and emerging communication technology


choices, it is untenable for applications to manage the combinations of possible
ways to connect. Frameworks hide connectivity complexity beneath a higher-
level message passing abstraction like REST and publish-subscribe. Standards
organizations help achieve these goals through standardization of the
framework layer interconnect, message passing interface definition, and data
definitions leveraged by applications. Standards groups also document IoT
system design principles, architecture, and interconnect options. Standards
organizations and industry consortia may assist developers by supplying and
certifying reference implementations that include source code. Reference code
helps streamline development by providing implementations that pass
compliance tests and correctly interprets standards specifications. Reference
codebases are easier to maintain benefiting from a large diverse community of
open source developers who cooperate by actively developing code and
improving the codebase.

Frameworks simplify IoT networks by creating an abstraction of the IoT device


networks that hides much of the underlying complexity while exposing data,
interfaces, and functions that facilitate interoperation. All it should take to
develop an IoT application is to create an application in a high-level language
such as Node.js that utilizes framework APIs. The framework provides a
semantically rich description of IoT nodes, objects, and interactions that allow
IoT network designers to focus only on node interaction semantics rather than
on the details of connectivity.

Frameworks facilitate improved application portability. This can be achieved at


different levels. The bottom layer of the framework is operating system specific.
The top layer of the framework is IoT use case specific in that it exposes a data
model abstraction that reinforces an IoT usage context. Some examples include
lighting control, home automation, health monitoring, entertainment, process
automation, industrial control, and autonomous control. IoT applications can be
Page 31
developed once given the framework abstraction and can execute on any OS the
framework is ported to. The details of dissimilar OSs and platforms can be
hidden where porting of framework code to another OS (source code–level
compatibility) can happen independently of application development. Binary
compatible platforms can migrate compiled framework code across platforms
using the same binary. Platforms that are not binary compatible may rely on
virtualization to host framework images or may rely on device management
services that hide the complexity associated with paring and installing the right
framework with the correct platform.

Frameworks enable interoperable devices in heterogeneous environments.


Consider a hypothetical scenario where devices are running different OSs and
HW platforms. These devices could be built by different platform vendors using
silicon from multiple vendors running different OSs such as Windows IoT
Embedded and VxWorks running different middleware stacks. This is a perfect
storm scenario for an IoT network deployment where there are too many
possible combinations of connectivity and message exchange options to expect
speedy deployments. IoT frameworks come to the rescue by building the
connectivity intelligence into the framework – hidden from application view and
simplified from the device and network management view.

Frameworks also facilitate seamless manageability and serviceability by


leveraging the framework’s infrastructure to expose platform status information
through the framework layer in accordance with the framework’s data model
abstraction. For example, a firmware update availability notification may be
easily propagated across an IoT network. If the framework supports applying a
firmware update, either push or pull, the firmware update images may be
distributed over the air using the connectivity solution worked out by the
framework.

IoT framework – Design Framework example : Quad-copter

Page 32
IoT is expected to see widespread adoption in many fields, starting with
automotive and spreading into smart homes, smart buildings, manufacturing
and industrial plants, medicine and healthcare, safety and security, insurance,
transport, energy, distribution, agriculture HEMS, smart meters (water,
electricity, gas), etc. Recent services using IoT devices and products include AI
speakers, smart watches, smart meters, security cameras, and more.
In addition, the appearance of next-generation 5G communications, featuring
fast and large capacity, low latency, and multi-connectivity is expected to drive
even more explosive growth of IoT.
In the IoT market, connection of many “things” (IoT devices and products) to the
Internet will use wireless communications to collect data from either standalone
or built-in sensors which will then be sent via the Internet to data centers for AI-
based analysis with the analysis results returned via the Internet to other IoT
devices and products, smartphones, tablets, etc..
Some recent applications are described below.

-AI speakers connected by wireless LAN (Wi-FI、WLAN) to the Internet can


stream music from the Internet to listeners. In this case, the listener’s music
preference history can be saved in a database for analysis by AI to recommend
other music matching the listener’s taste.

-Smart watches connected via Bluetooth® to the wearer’s smartphone using a


4G LTE connection can connect to the Internet to send information (number of
steps and distance walked, cardiogram) from sensors in the smart watch to a

Page 33
data center, enabling people with diet and other health concerns to improve
their lifestyle using these data.

IoT tools – Tinkercad: example

Tinkercad uses a simplified constructive solid geometry method of constructing


models. A design is made up of primitive shapes that are either "solid" or "hole".
Combining solids and holes together, new shapes can be created, which in turn
can be assigned the property of solid or hole. In addition to the standard library
of primitive shapes, a user can create custom shape generators using a built-
in JavaScript editor.

Shapes can be imported in three formats: STL and OBJ for 3D, and 2-
dimensional SVG shapes for extruding into 3D shapes. Tinkercad exports models
in STL or OBJ formats, ready for 3D printing.

Page 34
Tinkercad also includes a feature to export 3D models to Minecraft Java
Edition, and also offers the ability to design structures using Lego bricks.

- Available via a web browser to those with an internet connection (Chrome is


recommended), Tinkercad makes it easy for those learning a basic design
process: to combine many simple objects to construct more complex shapes. It
also allows you to build your own forms or select shapes to remove from their
ventures, offering an simple way to use negative space as a tool to create arches
or holes. -You can log in with your Google account, then build 3D models or
circuits.

IoT framework – Cisco packet tracer: example

Packet Tracer allows students to design complex and large networks, which is
often not feasible with physical hardware, due to costs. Packet Tracer is
commonly used by CCNA Academy students, since it is available to them for
free. However, due to functional limitations, it is intended by CISCO to be used
only as a learning aid, not a replacement for Cisco routers and switches. The
application itself only has a small number of features found within the actual
hardware running a current Cisco IOS version. Thus, Packet Tracer is unsuitable
for modelling production networks. It has a limited command set, meaning it is
not possible to practice all of the IOS commands that might be required. Packet
Tracer can be useful for understanding abstract networking concepts, such as
the Enhanced Interior Gateway Routing Protocol by animating these elements in
a visual form. Packet Tracer is also useful in education by providing additional

Page 35
components, including an authoring system, network protocol simulation and
improving knowledge an assessment system.

IoT standard hardware – Sensors & Actuators

Interesting, useful energy is converted by a sensor into electrical data. An


actuator, on the other hand, converts electrical data into interesting, usable
energy data.

Example:

+Speaker actuator: converts electrical signals into sound.

+Laptop screen actuator: turns electrical signal into light.

+ Electric stove sensor: electrical signal enters and turns into heat.

+Microphone sensor: sound enters and becomes an electrical signal.

IoT standard hardware – The Fog

Page 36
Fog computing can be perceived both in large cloud systems and big
data structures, making reference to the growing difficulties in accessing
information objectively. This results in a lack of quality of the obtained content.
The effects of fog computing on cloud computing and big data systems may vary.
However, a common aspect is a limitation in accurate content distribution, an
issue that has been tackled with the creation of metrics that attempt to improve
accuracy.

Fog networking consists of a control plane and a data plane. For example, on the
data plane, fog computing enables computing services to reside at the edge of
the network as opposed to servers in a data-center. Compared to cloud
computing, fog computing emphasizes proximity to end-users and client
objectives (e.g. operational costs, security policies, resource exploitation), dense
geographical distribution and context-awareness (for what concerns
computational and IoT resources), latency reduction and backbone bandwidth
savings to achieve better quality of service (QoS) and edge analytics/stream
mining, resulting in superior user-experience and redundancy in case of failure
while it is also able to be used in Assisted Living scenarios.

Fog networking supports the Internet of Things (IoT) concept, in which most of
the devices used by humans on a daily basis will be connected to each other.
Examples include phones, wearable health monitoring devices, connected
vehicle and augmented reality using devices such as the Google Glass.

SPAWAR, a division of the US Navy, is prototyping and testing a scalable, secure


Disruption Tolerant Mesh Network to protect strategic military assets, both
stationary and mobile. Machine-control applications, running on the mesh
nodes, "take over", when internet connectivity is lost. Use cases include Internet
of Things e.g. smart drone swarms.

ISO/IEC 20248 provides a method whereby the data of objects identified


by edge computing using Automated Identification Data Carriers [AIDC],
a barcode and/or RFID tag, can be read, interpreted, verified and made available
into the "Fog" and on the "Edge," even when the AIDC tag has moved on.
Page 37
IoT standard hardware – The Cloud

Past research on processing Big Data focused on the distributed and stream-
based processing (Zikopoulos and Eaton 2011). While cloud computing emerged
a bit earlier than Big Data, it is a new computing paradigm for delivering
computation as a fifth utility (after water, electricity, gas and telephony) with
the features of elasticity, pooled resources, on-demand access, self-service and
pay-as-you-go (Mell and Grance 2011). These features enabled cloud services to
be Infrastructure as a Service, Platform as a Service and Software as a Service
(Mell and Grance 2011). While redefining the possibilities of geoscience and
digital earth (Yang, Xu, and Nebert 2013), cloud computing has engaged Big Data
and enlightened potential solutions for various digital earth problems in
geoscience and relevant domains such as social science, astronomy, business
and industry. The features of cloud computing and their utilization to support
characteristics of Big Data are summarized

- Iot provides public cloud services in the cloud that can conveniently assist the
IoT region by offering access to networks for third parties. IoT data or computing
elements running over IoT devices may also be supported by integration.

- Improved Scalability: To exchange information for useful purposes, IoT devices


need a lot of storage. Iot will provide users with greater space in the cloud, such
Page 38
as the StoneFly Cloud Link to Microsoft Azure, which will increase according to
user demand. Helping to address clients' storage needs.

- Enhanced performance: In order to communicate and link with each other, the
vast quantities of data generated by IoT devices require extreme performance.
Iot in the cloud offers the communication required to exchange data between
devices and make sense of it at a fast rate.

- Pay-as-you-go: Internet Cloud Computing infrastructures allow the IoT to give


sense to the 12 largest quantities of data generated. Users have no fear of
purchasing more or less storage. As the data generated increases and pays for
the amount of storage they use with Internet Cloud Computing, they can easily
scale the storage.

IoT standard APIs – CoAP vs MQTT APIs

Both MQTT and CoAP:

-Are open standards

-Are better suited to constrained environments than HTTP

-Provide mechanisms for asynchronous communication


Page 39
-Run on IP

-Have a range of implementations

MQTT gives flexibility in communication patterns and acts purely as a pipe for
binary data.
CoAP is designed for interoperability with the web.

MQTT is a publish/subscribe messaging protocol designed for lightweight M2M


communications. It was originally developed by IBM and is now an open
standard.

-Even though MQTT is designed to be lightweight, it has two drawbacks for very
constrained devices.

-Every MQTT client must support TCP and will typically hold a connection open
to the broker at all times. For some environments where packet loss is high or
computing resources are scarce, this is a problem.

-MQTT topic names are often long strings which make them impractical for
802.15.4.

-Both of these shortcomings are addressed by the MQTT-SN protocol, which


defines a UDP mapping of MQTT and adds broker support for indexing topic
names.

-CoAP is the Constrained Application Protocol from the CoRE (Constrained


Resource Environments) IETF group.

P4 Determine a specific problem to solve using IoT


Design thinking

In life, many people go out and forget to turn off the lights in the house.
sometimes they don't go home for long periods of time causing the light bulb to
dissipate significantly and causing the monotony to rise unnecessarily. So I will

Page 40
design a device iodine that makes it possible for everyone to turn off the lights
even when they are out of the house.

Questions for Defining a Problem.

What is the problem? Many people spend more money on


their monthly electricity bills, which is
unreasonable.

Who has this problem, and what do we Everyone will have 1 or more times to
know about them? forget to turn off the light bulb.

What are their interests and needs? Easily turn off the lights when leaving
the house

Cause of the problem? Because they are in a remote place


where they cannot go home and turn
off the light when they suddenly
remember it

When did this incident happen? When someone has gone somewhere
away from their home and doesn't
want to waste time going back just
because they forgot to turn off the
light.

Page 41
Page 42
Electric ball on off

+ Durability and stability: High

Size: 120x72x43 mm

+ Rated load: 1,000W / gang, 5A

+ European standard CE ROHS

+ Can remotely turn on and off lights via Wifi connection with smartphone

Detection distance: anywhere

+ Cost: 718,468 VND

Page 43
In this system I use routers as a connecting device. Because it goes well with the
following condition

good coverage, bandwidth; and medium power consumption.

-In this solution, I use the Google App Engine to storage the raw data collected
and converted to useful

information that can be utilised to make intelligent decision.

Page 44
-To protect the integrity of data being sent from IoT devices to back-end
systems and ensure only authorized devices, developers and apps communicate
with APIs, we must use API security.

-Security gateways. Acting as an intermediary between IoT devices and the


network, security

-Gateways have more processing power, memory, and capabilities than the IoT
devices themselves,

which provides them the ability to implement features such as firewalls to


ensure hackers cannot

access the IoT devices they connect.

- Because it is installed indoors, the sensor will not worry about water, all
operations can be operated through the application installed on the smartphone,
so the touch paralysis when required by manual operation will not occur.

-The devices will be connected directly to the indoor line like normal electrical
equipment.

Page 45
reference
1) IoT Agenda. 2020. What Are Iot Devices?. [online] Available at:
<https://internetofthingsagenda.techtarget.com/definition/IoT-device>
[Accessed 24 October 2020].

2) Ranger, S., 2020. What Is The Iot? Everything You Need To Know About The
Internet Of Things Right Now | Zdnet. [online] ZDNet. Available at:
<https://www.zdnet.com/article/what-is-the-internet-of-things-everything-
you-need-to-know-about-the-iot-right-now/> [Accessed 24 October 2020].

3) Vietsunshine. 2020. Iot Là Gì? Mọi Thứ Bạn Cần Biết Về Internet Of Things.
[online] Available at: <https://www.vietsunshine.com.vn/2018/12/13/iot-la-
gi-moi-thu-ban-can-biet-ve-internet-of-
things/#:~:text=Internet%20of%20Things%2C%20hay%20IoT,th%C3%A0nh%
20m%E1%BB%99t%20ph%E1%BA%A7n%20c%E1%BB%A7a%20IoT.>
[Accessed 24 October 2020].

4) Iot.dtt.vn. 2020. DTT Iot Solution. [online] Available at:


<http://iot.dtt.vn/InternetofThings.html> [Accessed 24 October 2020].

5) Iantosca, L., 2020. The Building Of The Internet Of Underwater Things |


Sierra Circuits. [online] Sierra Circuits. Available at:
<https://www.protoexpress.com/blog/the-building-of-the-internet-of-
underwater-things/> [Accessed 24 October 2020].

6) TopDev. 2020. API Là Gì? Những Đặc Điểm Nổi Bật Của Web API | Topdev.
[online] Available at: <https://topdev.vn/blog/api-la-gi/> [Accessed 24
October 2020].

7) En.wikipedia.org. 2020. File Transfer Protocol. [online] Available at:


<https://en.wikipedia.org/wiki/File_Transfer_Protocol> [Accessed 24
October 2020].

8) Router-switch.com. 2020. What Is Application Layer? The Functions And


Examples Of Application Layer. [online] Available at: <https://www.router-
Page 46
switch.com/faq/what-is-application-layer-the-functions-and-examples-of-
application-layer.html> [Accessed 24 October 2020].

9) En.wikipedia.org. 2020. Constrained Application Protocol. [online] Available


at: <https://en.wikipedia.org/wiki/Constrained_Application_Protocol>
[Accessed 24 October 2020].

10)En.wikipedia.org. 2020. MQTT. [online] Available at:


<https://en.wikipedia.org/wiki/MQTT> [Accessed 24 October 2020].

11)Joncas, R., 2020. MQTT And Coap, Iot Protocols | The Eclipse Foundation.
[online] Eclipse.org. Available at:
<https://www.eclipse.org/community/eclipse_newsletter/2014/february/art
icle2.php> [Accessed 24 October 2020].

Page 47

You might also like