43 IoT - Assignment Brief 1 2020 10 24 2020 PDF
43 IoT - Assignment Brief 1 2020 10 24 2020 PDF
Assignment title
Academic Year
Submission Format:
LO1 Analyse what aspects of IoT are necessary and appropriate when designing software applications
LO2 Outline a plan for an appropriate IoT application using common architecture, frameworks, tools, hardware
and APIs
LO3 Develop an IoT application using any combination of hardware, software, data, platforms and services.
LO4 Evaluate your IoT application and detail the problem your IoT application solves, the potential impact on
Page 1
people, business, society and the end user and the problems it might encounter when integrating into the wider
IoT ecosystem
You currently work as a product developer for a new startup where you design IoT products for the
consumer, corporate, government and defence clients. As part of your role your manager has tasked you
to plan and develop a new IoT product, service or application for a potential client. You are required to
identify a target user and conduct tests with this user and include this feedback into multiple iterative
versions of your product.
Plan an IoT application for a specific target end user and the tests you intend to conduct with this
user. This plan will be in the form of a document and will include supporting evidence and
material, such as user personas and customer journey maps.
Create multiple iterations of your application and modify each iteration with enhancements
gathered from user feedback and experimentation. This will follow the pathway outlined in your
plan.(log book,)
Show evidence about Developed IoT application using any combination of hardware, software,
data, platforms and services (video or images of your IoT system with code snippet)
Evaluate your IoT application and detail the problem your IoT application solves, the potential
impact on people, business, society and the end user and the problems it might encounter when
integrating into the wider IoT ecosystem
Page 2
Learning Outcomes and Assessment Criteria
LO1 Analyse what aspects of IoT are necessary and appropriate when designing software
applications
LO2 Outline a plan for an appropriate IoT application using common architecture, frameworks,
tools, hardware and APIs
Page 3
Page 4
LO1 Analyse what aspects of IoT are necessary and appropriate
when designing software applications.
P1 Explore various forms of IoT functionality.
What is internet of things (IoT)
The internet of things, or IoT, is a system of interrelated computing devices,
mechanical and digital machines, objects, animals or people that are provided
with unique identifiers (UIDs) and the ability to transfer data over a network
without requiring human-to- human or human-to-computer interaction.
A thing in the internet of things can be a person with a heart monitor implant, a
farm animal with a biochip transponder, an automobile that has built-in sensors
to alert the driver when tire pressure is low or any other natural or man-made
object that can be assigned an Internet Protocol (IP) address and is able to
transfer data over a network.
IoT can also make use of artificial intelligence (AI) and machine learning to aid in
making data collecting processes easier and more dynamic.
Page 5
Why IoT is important
The internet of things helps people live and work smarter, as well as gain
complete control over their lives. In addition to offering smart devices to
automate homes, IoT is essential to business. IoT provides businesses with a
real-time look into how their systems really work, delivering insights into
everything from the performance of machines to supply chain and logistics
operations.
IoT enables companies to automate processes and reduce labor costs. It also
cuts down on waste and real service delivery, making it less expensive to
manufacture and deliver goods, as well as offering transparency into customer
transactions.
As such, IoT is one of the most important technologies of everyday life, and it
will continue to pick up steam as more businesses realize the potential of
connected devices to keep them competitive.
Page 6
-ability to access information from anywhere at any time on any device;
-transferring data packets over a connected network saving time and money;
and
-As the number of connected devices increases and more information is shared
between devices, the potential that a hacker could steal confidential
information also increases.
-Enterprises may eventually have to deal with massive numbers -- maybe even
millions -- of IoT devices, and collecting and managing the data from all those
devices will be challenging.
-If there's a bug in the system, it's likely that every connected device will
become corrupted.
-Since there's no international standard of compatibility for IoT, it's difficult for
devices from different manufacturers to communicate with each other.
Page 7
The grand goal of the Internet of Underwater Things (IoUT) is to create a
worldwide network of smart interconnected underwater objects and to digitally
link our oceans, streams, and lakes.
Oceans and lakes cover three quarters of the earth. It is only natural for
scientists and engineers to extend the concept of IoT into the oceans.
-Signal interference from waves, passing ships, or background noise from marine
life
-Chemical and UV radiation resistance of IoUT clients has to be stronger than for
home devices.
Page 9
The projected growth in World population and need for food have recently
motivated adoption of information technology solutions in crop fields within
precision agriculture approaches. Internet of underground things (IOUT), which
consists of sensors and communication devices, partly or completely buried
underground for real-time soil sensing and monitoring, emerge from this need.
This new paradigm facilitates seamless integration of underground sensors,
machinery, and irrigation systems with the complex social network of growers,
agronomists, crop consultants, and advisors. In this paper, state-of-the-art
communication architectures are reviewed, and underlying sensing technology
and communication mechanisms for IOUT are presented. Recent advances in
the theory and applications of wireless underground communication are also
reported. Major challenges in IOUT design and implementation are identified.
In the future, military operations will rely less on human soldiers and more on
interconnected technology, leveraging advancements in embedded systems and
machine intelligence in order to achieve superior defense capabilities. The
Internet of Battlefield Things will connect soldiers with smart technology in
armor, radios, weapons, and other objects, to give troops “extra sensory”
perception, offer situational understanding, endow fighters with prediction
powers, provide better risk assessment, and develop shared intuitions .The
initiative is a collaboration between the Army Research Lab, academia, and
industry.
Page 11
Internet of space things
The Internet of Things (IoT) has been recognized as a key driver of 5G wireless
communications, with a projected 50 billion endpoints by 2020 ranging from
connected temperature sensors to unmanned aerial vehicles. The long term
success of IoT is tied to its pervasiveness, an area where the heterogeneous
connectivity solutions of today fall short by a large margin. The true potential of
IoT can only be realized when it is augmented with a ubiquitous connectivity
platform capable of functioning even in the most remote of locations. To this
end, this project focuses on the development of a novel cyber-physical system
spanning ground, air, and space, called the Internet of Space Things / CubeSats
(IoST). IoST expands the functionalities of traditional IoT, by not only providing
an always-available satellite backhaul network, but also by by real-time satellite-
captured information and, more importantly, performing integration of on the
ground data and satellite information to enable new applications . The
fundamental building block for IoST is a new generation of nano-satellites
known as CubeSats, which are augmented with SDN and NFV solutions.
Page 12
-Design of multi-band antenna arrays based on new materials such as graphene,
which allow the creation of programmable antenna architectures with tunable
frequency and radiation diagram.
-Tackling long delays and temporal variation in network topology through new
concepts such as Stateful Segment Routing.
Internet of nano-things
Page 13
for overcoming existing challenges and making use of IoNT in unique areas in
near future for rapid deployment.
With the help of Internet of Nano Things, nanodevices can collect large volumes
of critical data that can be analyzed to gain informative business insights. Also,
nanotechnology can be used in data processing with the help of supercomputers
and processors that can acquire, analyze, and present data generated by IoNT
devices. In this manner, IoNT infrastructure can be used to process large
volumes of crucial data to help improve business models and generate business
analytics.
Internet of bio-nanothings
Page 15
What is IoT architecture?
Among all, to deal with the whole variety of factors affecting IoT architecture,
it’s easier and more effective to find a reliable provider of IoT solutions. This
decision will significantly reduce the number of resources spent on the way.
Though it’s possible to comprehend the process of creating software, the
practical application of its 4 stages contains too many nuances and aspects to be
described in simple words. Because of that, use this guide for establishing a
proper understanding of what’s going on during IoT architecture — but consider
referring to the specialist to make this process actually happen. This decision will
facilitate getting the needed result and guarantee being a satisfied client of a
software development company.
Before revealing the secrets and providing a clear structure of this initiative, it’s
important to understand what this concept actually means. In essence, IoT
architecture is the system of numerous elements: sensors, protocols, actuators,
cloud services, and layers. Given its complexity, there exist 4 stages of IoT
architecture. Such a number is chosen to steadily include these various types of
components into a sophisticated and unified network.
Page 16
In addition, Internet of Things architecture layers are distinguished in order to
track the consistency of the system. This should also be taken into consideration
before the IoT architecture process start.
-Edge IT
The outstanding feature about sensors is their ability to convert the information
obtained in the outer world into data for analysis. In other words, it’s important
to start with the inclusion of sensors in the 4 stages of an IoT architecture
framework to get information in an appearance that can be actually processed.
For actuators, the process goes even further — these devices are able to
intervene the physical reality. For example, they can switch off the light and
adjust the temperature in a room.
Because of this, sensing and actuating stage covers and adjusts everything
needed in the physical world to gain the necessary insights for further analysis.
Even though this stage of IoT architecture still means working in a close
proximity with sensors and actuators, Internet getaways and data acquisition
systems (DAS) appear here too. Specifically, the later connect to the sensor
network and aggregate output, while Internet getaways work through Wi-Fi,
wired LANs and perform further processing.
Page 17
The vital importance of this stage is to process the enormous amount of
information collected on the previous stage and squeeze it to the optimal size
for further analysis. Besides, the necessary conversion in terms of timing and
structure happens here.
During this moment among the stages of IoT architecture, the prepared data is
transferred to the IT world. In particular, edge IT systems perform enhanced
analytics and pre-processing here. For example, it refers to machine learning
and visualization technologies. At the same time, some additional processing
may happen here, prior to the stage of entering the data center.
The main processes on the last stage of IoT architecture happen in data center
or cloud. Precisely, it enables in-depth processing, along with a follow-up
revision for feedback. Here, the skills of both IT and OT (operational technology)
professionals are needed. In other words, the phase already includes the
analytical skills of the highest rank, both in digital and human worlds.
Therefore, the data from other sources may be included here to ensure an in-
depth analysis.
After meeting all the quality standards and requirements, the information is
brought back to the physical world — but in a processed and precisely analyzed
appearance already.
Page 18
In fact, there is an option to extend the process of building a sustainable IoT
architecture by introducing an extra stage in it. It refers to initiating a user’s
control over the structure — if only your result doesn’t include full automation,
of course. The main tasks here are visualization and management. After
including Stage 5, the system turns into a circle where a user sends commands
to sensors/actuators (Stage 1) to perform some actions.
Page 19
-Cloud Application – It is a software program where cloud-based and local
components work together which have faster and easier accessibility. It serves
the purpose of improving our ability to use the system to maximum potential.
IoT Tools stands for the Internet of Things Tools. It is a network or connection of
devices, vehicles, equipment applying embedded electronics, home appliances,
buildings and many more. This helps in collecting and exchanging different kinds
of data. It also helps the user to control the devices remotely over a network.
Today in the internet-driven world, IoT has engulfed the IT industry and is the
latest buzzword. It has opened many new horizons for companies and
developers working on IoT. Many exceptional products have been developed
Page 20
due to IoT app development. Companies providing Internet of Things solution
are creating hardware and software designs to help the IoT developers to create
new and remarkable IoT devices and applications
Shapes can be imported in three formats: STL and OBJ for 3D, and 2-
dimensional SVG shapes for extruding into 3D shapes. Tinkercad exports models
in STL or OBJ formats, ready for 3D printing.
Packet Tracer can also be run on Linux, Microsoft Windows, and macOS.
Similar Android and iOS apps are also available. Packet Tracer allows users to
create simulated network topologies by dragging and dropping routers, switches
and various other types of network devices. A physical connection between
devices is represented by a 'cable' item. Packet Tracer supports an array of
simulated Application Layer protocols, as well as basic routing
with RIP, OSPF, EIGRP, BGP, to the extents required by the
current CCNA curriculum. As of version 5.3, Packet Tracer also supports
the Border Gateway Protocol.
In its simplest form, an IoT platform allows only connection between "things" or
devices. Architecture can also include a software platform, an application
Page 22
development platform, or an analytics platform. In a more complex form, an
authentic end-to-end IoT platform consists of eight important architectural
blocks:
5. Analysis : This can be considered as the brain of the IoT platform. This
component performs a variety of complex analyzes from basic data clustering
and self-learning to self-analyze, predict, and extract the most valuable data in
the IoT data stream.
6. Visual data : Allows people to review patterns and observe trends from the
visual control panel, where data is graphically depicted through line charts,
simulated graphics.
7. Additional tools : This component allows IoT developers to test and pre-
market their products with use cases represented on a simulated ecosystem for
visualization and management. and control connected equipment.
Page 23
8. External Interfaces : This is where integration with third party systems and the
rest of the IT system through application programming interfaces (APIs),
software development kits (SDK) and gateways.
APIs are methods and protocols to connect with other libraries and
applications. It stands for Application Programming Interface - application
programming interface . The API provides the ability to provide access to a set of
frequently used functions. And from there it is possible to exchange data
between applications.
Page 24
An application layer is an abstraction layer that specifies the
shared communications protocols and interface methods used by hosts in a
communications network.The application layer abstraction is used in both of the
standard models of computer networking: the Internet Protocol Suite (TCP/IP)
and the OSI model. Although both models use the same term for their
respective highest level layer, the detailed definitions and purposes are different.
In the Internet protocol suite, the application layer contains the communications
protocols and interface methods used in process-to-process communications
across an Internet Protocol (IP) computer network. The application layer only
standardizes communication and depends upon the underlying transport
layer protocols to establish host-to-host data transfer channels and manage the
data exchange in a client-server or peer-to-peer networking model. Though the
TCP/IP application layer does not describe specific rules or data formats that
applications must consider when communicating, the original specification
(in RFC 1123) does rely on and recommend the robustness principle for
application design.
-The syntax of the various message types, i.e., the fields in the message and how
the fields are delineated.
-The semantics of the fields, i.e., the meaning of the information that the field is
supposed to contain;
-Rules for determining when and how a process sends messages and responds
to messages.
Page 25
It allows a user to access, retrieve and manage files in a remote computer.
-mail services
-Virtual terminal
For various reasons, it can be said that the standardization of terminals has
completely failed. The OSI solution to this problem is to define a virtual terminal
that is really just an abstract data structure that takes the abstract state of the
actual terminal. This abstract data structure can be operated by both the
keyboard and the computer and reflects the current state of the data structure
on the display. The computer can query this abstract data structure and change
this abstract data structure so that the output appears on the screen.
-Other functions
In addition to the three functions above, there are some other functions:
directory services, remote job entry, graphics, information communication and
so on.
HTTP is a client and server-side standard for request and response (TCP). The
client is the end user, the server is the website. Using a web browser, web
crawler, or other tools, the client initiates an HTTP request to the specified port
on the server. The responding server stores (some) resources, such as HTML
files and images. (We call it) This answering server is the origin server. There
may be multiple middleware between the user agent and the origin server, such
as agents, gateways, or tunnels. Although the TCP / IP protocol is the most
popular application on the Internet, the HTTP protocol does not require that it
be used and based on the layers it supports. In fact, HTTP can be implemented
on any other Internet protocol, or on other networks. HTTP assumes only that
the underlying protocol (provided by the underlying protocol) is reliable and
that any protocol capable of providing this guarantee can be used by it.
FTP services generally run on both ports 20 and 21. Port 20 is used to transmit
data flow between the client and server, while port 21 is used to transmit
control flow and is the command to import to the ftp server. When data is
streamed, the control flow is idle. When the control flow, idle for a long time,
the client's firewall, the session will be set to overtime, so when a large amount
of data through the firewall, there will be some problems. At this point,
Page 27
although the file can be successfully transmitted, it can be broken by the firewall
because of the control session; the transfer can result in some errors.
-Define the way to send the message and the expected response.
Page 28
Constrained Application Protocol (CoAP) is a specialized Internet Application
Protocol for constrained devices, as defined in RFC 7252. It enables those
constrained devices called "nodes" to communicate with the wider Internet
using similar protocols. CoAP is designed for use between devices on the same
constrained network (e.g., low-power, lossy networks), between devices and
general nodes on the Internet, and between devices on different constrained
networks both joined by an internet. CoAP is also being used via other
mechanisms, such as SMS on mobile communication networks.
Page 29
IoT standard architecture – Application layer – Application
protocols – MQTT
Page 32
IoT is expected to see widespread adoption in many fields, starting with
automotive and spreading into smart homes, smart buildings, manufacturing
and industrial plants, medicine and healthcare, safety and security, insurance,
transport, energy, distribution, agriculture HEMS, smart meters (water,
electricity, gas), etc. Recent services using IoT devices and products include AI
speakers, smart watches, smart meters, security cameras, and more.
In addition, the appearance of next-generation 5G communications, featuring
fast and large capacity, low latency, and multi-connectivity is expected to drive
even more explosive growth of IoT.
In the IoT market, connection of many “things” (IoT devices and products) to the
Internet will use wireless communications to collect data from either standalone
or built-in sensors which will then be sent via the Internet to data centers for AI-
based analysis with the analysis results returned via the Internet to other IoT
devices and products, smartphones, tablets, etc..
Some recent applications are described below.
Page 33
data center, enabling people with diet and other health concerns to improve
their lifestyle using these data.
Shapes can be imported in three formats: STL and OBJ for 3D, and 2-
dimensional SVG shapes for extruding into 3D shapes. Tinkercad exports models
in STL or OBJ formats, ready for 3D printing.
Page 34
Tinkercad also includes a feature to export 3D models to Minecraft Java
Edition, and also offers the ability to design structures using Lego bricks.
Packet Tracer allows students to design complex and large networks, which is
often not feasible with physical hardware, due to costs. Packet Tracer is
commonly used by CCNA Academy students, since it is available to them for
free. However, due to functional limitations, it is intended by CISCO to be used
only as a learning aid, not a replacement for Cisco routers and switches. The
application itself only has a small number of features found within the actual
hardware running a current Cisco IOS version. Thus, Packet Tracer is unsuitable
for modelling production networks. It has a limited command set, meaning it is
not possible to practice all of the IOS commands that might be required. Packet
Tracer can be useful for understanding abstract networking concepts, such as
the Enhanced Interior Gateway Routing Protocol by animating these elements in
a visual form. Packet Tracer is also useful in education by providing additional
Page 35
components, including an authoring system, network protocol simulation and
improving knowledge an assessment system.
Example:
+ Electric stove sensor: electrical signal enters and turns into heat.
Page 36
Fog computing can be perceived both in large cloud systems and big
data structures, making reference to the growing difficulties in accessing
information objectively. This results in a lack of quality of the obtained content.
The effects of fog computing on cloud computing and big data systems may vary.
However, a common aspect is a limitation in accurate content distribution, an
issue that has been tackled with the creation of metrics that attempt to improve
accuracy.
Fog networking consists of a control plane and a data plane. For example, on the
data plane, fog computing enables computing services to reside at the edge of
the network as opposed to servers in a data-center. Compared to cloud
computing, fog computing emphasizes proximity to end-users and client
objectives (e.g. operational costs, security policies, resource exploitation), dense
geographical distribution and context-awareness (for what concerns
computational and IoT resources), latency reduction and backbone bandwidth
savings to achieve better quality of service (QoS) and edge analytics/stream
mining, resulting in superior user-experience and redundancy in case of failure
while it is also able to be used in Assisted Living scenarios.
Fog networking supports the Internet of Things (IoT) concept, in which most of
the devices used by humans on a daily basis will be connected to each other.
Examples include phones, wearable health monitoring devices, connected
vehicle and augmented reality using devices such as the Google Glass.
Past research on processing Big Data focused on the distributed and stream-
based processing (Zikopoulos and Eaton 2011). While cloud computing emerged
a bit earlier than Big Data, it is a new computing paradigm for delivering
computation as a fifth utility (after water, electricity, gas and telephony) with
the features of elasticity, pooled resources, on-demand access, self-service and
pay-as-you-go (Mell and Grance 2011). These features enabled cloud services to
be Infrastructure as a Service, Platform as a Service and Software as a Service
(Mell and Grance 2011). While redefining the possibilities of geoscience and
digital earth (Yang, Xu, and Nebert 2013), cloud computing has engaged Big Data
and enlightened potential solutions for various digital earth problems in
geoscience and relevant domains such as social science, astronomy, business
and industry. The features of cloud computing and their utilization to support
characteristics of Big Data are summarized
- Iot provides public cloud services in the cloud that can conveniently assist the
IoT region by offering access to networks for third parties. IoT data or computing
elements running over IoT devices may also be supported by integration.
- Enhanced performance: In order to communicate and link with each other, the
vast quantities of data generated by IoT devices require extreme performance.
Iot in the cloud offers the communication required to exchange data between
devices and make sense of it at a fast rate.
MQTT gives flexibility in communication patterns and acts purely as a pipe for
binary data.
CoAP is designed for interoperability with the web.
-Even though MQTT is designed to be lightweight, it has two drawbacks for very
constrained devices.
-Every MQTT client must support TCP and will typically hold a connection open
to the broker at all times. For some environments where packet loss is high or
computing resources are scarce, this is a problem.
-MQTT topic names are often long strings which make them impractical for
802.15.4.
In life, many people go out and forget to turn off the lights in the house.
sometimes they don't go home for long periods of time causing the light bulb to
dissipate significantly and causing the monotony to rise unnecessarily. So I will
Page 40
design a device iodine that makes it possible for everyone to turn off the lights
even when they are out of the house.
Who has this problem, and what do we Everyone will have 1 or more times to
know about them? forget to turn off the light bulb.
What are their interests and needs? Easily turn off the lights when leaving
the house
When did this incident happen? When someone has gone somewhere
away from their home and doesn't
want to waste time going back just
because they forgot to turn off the
light.
Page 41
Page 42
Electric ball on off
Size: 120x72x43 mm
+ Can remotely turn on and off lights via Wifi connection with smartphone
Page 43
In this system I use routers as a connecting device. Because it goes well with the
following condition
-In this solution, I use the Google App Engine to storage the raw data collected
and converted to useful
Page 44
-To protect the integrity of data being sent from IoT devices to back-end
systems and ensure only authorized devices, developers and apps communicate
with APIs, we must use API security.
-Gateways have more processing power, memory, and capabilities than the IoT
devices themselves,
- Because it is installed indoors, the sensor will not worry about water, all
operations can be operated through the application installed on the smartphone,
so the touch paralysis when required by manual operation will not occur.
-The devices will be connected directly to the indoor line like normal electrical
equipment.
Page 45
reference
1) IoT Agenda. 2020. What Are Iot Devices?. [online] Available at:
<https://internetofthingsagenda.techtarget.com/definition/IoT-device>
[Accessed 24 October 2020].
2) Ranger, S., 2020. What Is The Iot? Everything You Need To Know About The
Internet Of Things Right Now | Zdnet. [online] ZDNet. Available at:
<https://www.zdnet.com/article/what-is-the-internet-of-things-everything-
you-need-to-know-about-the-iot-right-now/> [Accessed 24 October 2020].
3) Vietsunshine. 2020. Iot Là Gì? Mọi Thứ Bạn Cần Biết Về Internet Of Things.
[online] Available at: <https://www.vietsunshine.com.vn/2018/12/13/iot-la-
gi-moi-thu-ban-can-biet-ve-internet-of-
things/#:~:text=Internet%20of%20Things%2C%20hay%20IoT,th%C3%A0nh%
20m%E1%BB%99t%20ph%E1%BA%A7n%20c%E1%BB%A7a%20IoT.>
[Accessed 24 October 2020].
6) TopDev. 2020. API Là Gì? Những Đặc Điểm Nổi Bật Của Web API | Topdev.
[online] Available at: <https://topdev.vn/blog/api-la-gi/> [Accessed 24
October 2020].
11)Joncas, R., 2020. MQTT And Coap, Iot Protocols | The Eclipse Foundation.
[online] Eclipse.org. Available at:
<https://www.eclipse.org/community/eclipse_newsletter/2014/february/art
icle2.php> [Accessed 24 October 2020].
Page 47