Chapter IoT and IIoT
Chapter IoT and IIoT
Content
Machine to machine (M2M), human to machine (H2M), and machine to smartphone (M2S) or a similar
handheld device, such as a tablet computer. The accumulation of all this technology is now referred to as
Industry 4.0, or the Fourth Industrial Revolution (4IR).
The adoption of this technology is rapidly gaining momentum, as technological, societal, and competitive
pressures push firms to innovate and transform themselves. As IoT technology advances and increasing numbers
of firms adopt the technology, IoT cost-benefit analysis will become a subject of great interest. Because of the
potential but uncertain benefits and high investment costs of the IoT, firms need to carefully assess every IoT-
induced opportunity and challenge to ensure that their resources are spent judiciously.
IoT Architecture
The IoT relies on the Open Systems Interconnection (OSI) model to bring disparate entities together. Under this
model, there are four primary groupings that encompass seven operational layers. These include a physical layer,
data links, a network, a transport mechanism, a session layer, a presentation layer, and a software application.
Here’s a brief technical overview of the plumbing and electrical wiring for the IoT:
Low Power Wide Area Network (LPWAN) This technology delivers a low-power, long-range wireless
communication framework. It is valuable for large and widespread deployments of wireless sensors, such as those
used in smart city initiatives. Several IoT specific LPWAN technologies exist, including LongRange physical layer
protocol (LoRa), Haystack, SigFox, LTE-M, and Narrowband IoT (NB-IoT).
Cellular Wireless networks include legacy 2G (GSM) and 3G (GSM and CDMA), as well as 4G and
increasingly common 5G. In addition, two standards exist for using IoT devices over LPWANs. NB-IoT and LTE-
M introduce more robust and flexible frameworks for transporting data across cellular devices and services
because they were designed specifically for the IoT.
Wi-Fi The wireless networking standard has evolved considerably since its introduction in the late 1990s. IEEE
802.11 a/b/g/n offers varying levels of speed and connectivity. The 8.2.11n standard delivers the highest data
throughput among various wireless technologies, but it comes at a cost: high power consumption. Although Wi-Fi
is ideal for connecting smartphones, smartwatches, and many other IoT devices, it draws too much power to make
it suitable for battery-powered sensors.
PhD. Quang-Phuoc Tran
Ho Chi Minh City Industry 4.0 technologies in Mechanical Engineering
University of Technology
ZigBee The 2.4-gigahertz wireless chip technology is slightly slower than Bluetooth BLE (250 kbps throughput
compared to 270 kbps) and it reaches approximately 30 meters. However, Zigbee is a mesh network, which
makes it highly suited to smart homes and smart office buildings that require device-to- Device communication.
A similar protocol, Z-Wave, which operates at 908 megahertz (meaning it has a better range than ZigBee but
can’t transmit as much data at any given moment), was recently released into the public domain. Both operate
on the IEEE 802.11.15.4 standard.
PhD. Quang-Phuoc Tran
Ho Chi Minh City Industry 4.0 technologies in Mechanical Engineering
University of Technology
Radio Frequency Identification (RFID) RFID is widely used to track physical objects and assets, including
industrial environments and supply chains. These tags, chips, or printed circuits, are attached to objects. They
offer a range of about one meter. Once an object is tagged, an RFID reader can pinpoint it. Tags can be both
passive and active. The former works without batteries. This means that tags are read when they pass a reader.
Active tags periodically broadcast their location, making them more trackable. A newer RFID protocol called
Dash7 offers an open standard for bidirectional data exchange at up to 500 meters.1 It operates in the sub
gigahertz spectrum and offers low latency, making it ideal for sensors, alarms, and other connected industrial
systems.
Ethernet In some cases, where it’s possible to connect devices to a wired network, Ethernet is the technology of
choice. This might include sensors or devices like security cameras located within a building. The IEEE 802.3
standard was introduced in 1980 and formalized in 1983. Today, it transports data at a rate of approximately 400
gigabytes per second and it interworks fully with Wi-Fi.
- Thousands of different types of sensors now exist, detecting light, sound, temperature, magnetic fields, motion,
moisture, tactile pressure, gravity, electrical fields, chemicals, and much more. These devices can detect toxic
gasses, radiation, and the presence of biological and chemical compounds.
- Many IoT sensors use microelectromechanical systems (MEMS) technology, which dates back to the early 1960s.
These circuits, which are produced using a standard silicon fabrication process, are actually small mechanical
systems (typically between 1 micrometer by 1 millimeter) that can stretch, bend, spin, and change form based on
environmental conditions and other factors. MEMS generate an electrical signal that translates into data about how
a system is moving or reacting to conditions. Thus, a fitness tracker, smartwatch, or smartphone can measure
activity and movement, and with the use of GPS and other input, translate this data into steps and distance traveled
using algorithm.
•Manufacturing chips at lower costs is an important factor driving the development of IoT. As chip
costs decrease, IoT devices become more popular.
•Technical advances in chip fabrication like dual damascene processes and copper integration help
create compact, high-performance chips for IoT.
•Using advanced materials like silicon-on-insulator (SOI) improves efficiency and lowers power
consumption for IoT chips.
•Streamlined chip fabrication processes with high integration allow designing specialized chips for
IoT applications like smart grid, wearables, healthcare.
By Flow of Data
Remote Monitoring: Data flows from the thing to
the IoT client
• Remote Controlling: Remote commands flow
from users to the device( s)
• Thing-to-Thing: Data is shared among the IoT devices
• Combinations: Mixture of two or more of the above
systems.
3. Define the data structure ( needed insights, raw data, types, sizes, data sources)
Data is the DNA of an IoT system; IoT devices capture and broadcast raw data to the cloud. There,
DA algorithms convert the raw data into valuable insights and deliver them to the IoT clients, where
users can utilize these insights for their purposes.
Therefore, the development process begins from the end; we start from the insights and reverse-
engineer the whole IoT system to obtain them. Specifically, the IoT team must answer the following
questions:
1/What insights do we need from our Iot system
2/ What raw data would we need to develop these insights? Where to get it from?
3. What types of data would we need to capture?
4. How much data would we need? How often would we need it?
4. Develop the IoT devices that would capture and broadcast the raw data ( the things)
4. Develop the IoT devices that would capture and broadcast the raw data ( the things)
The Sensors: These are the actual devices that capture the raw data and send it to the controller for
analysis and processing. There is a wide variety of sensors that can capture any type of data. Sensors
also vary in range, capability, and cost. Sensors could be digital or analogue, each with its pros and
cons. The field of Sensor Selection is beyond the scope of this book. Relevant experts include
Mechatronics, Automation, and E&E engineers.
The Network-Ready Controller: The brains of the IoT device. Programmed to perform all primary
tasks; receive data from sensors, package data to web-friendly formats, and broadcast data to the
cloud. Optionally, to give motion commands to actuators, if included.
There are different types of IoT controllers, each with varying capabilities and features: Controller
Chip controllers, such as the AT91SAM chip, an ARM archi-tecture processor, the Controller Board
controllers, such as the Arduino or the NodeMCU controllers, or the full-fledged Computer-on-chip
controllers, such as the Raspberry Pi, or Beaglebone systems. For the sake of simplicity, we will refer
to all of these types as Controllers. In later chapters, we will discuss these differ-ences and their
impact on IoT operations.
PhD. Quang-Phuoc Tran
Ho Chi Minh City
University of Technology
Internet of Things (IoT) Industry 4.0 technologies in Mechanical Engineering
4. Develop the IoT devices that would capture and broadcast the raw data ( the things)
The Network Module ( Optional): Regardless of
the differences, all IoT controllers must be ready,
both in hardware and software, to connect to the
Internet. For some IoT controllers, connectivity is
a b uiltin feature ( Raspberry Pi, Beaglebone,
NodeMCU). For others ( Arduino, AT91SAM,
etc.), a network module is needed. A network
module is an external module device added to
establish a network connection for the controller
Nevertheless, sometimes this is something we
cannot escape; perhaps the only controllers we
have in-house are Arduino Uno. Perhaps our
system requires a specific ARM-based controller
that is not readily connected, and other reasons
may apply. Therefore, in the later hands-on
chapters, we will discuss both connectivity
options (built-in and through a module).
PhD. Quang-Phuoc Tran
Ho Chi Minh City
University of Technology
Internet of Things (IoT) Industry 4.0 technologies in Mechanical Engineering
4. Develop the IoT devices that would capture and broadcast the raw data ( the things)
The Power Source: Obviously, power is essential for the components of the IoT device. This is not an
issue for indoor IoT applications, such as industry or smart homes. However, the situation is different
for outdoor, mobile, and embedded IoT applications.
+ For Outdoor applications, we could always extend power lines to wire up the devices, but that would
be expensive, disruptive, and restrictive to the IoT devices. The better option is to use solar-powered
rechargeable batteries or power banks. Free from the wires, the developers could freely experiment
with the locations and arrangements of the devices with ease.
+ Mobile IoT devices, used in the logistics industry, could be recharged through the vehicles on which
they are installed. Embedded IoT devices, installed within consumer products, could be recharged
when the consumers power the products and use them.
Regardless of the recharging method, the power unit typically contains a rechargeable battery or a
power bank and miscellaneous components for recharging.
4. Develop the IoT devices that would capture and broadcast the raw data ( the things)
Methods:
The methods and techniques used in implementing these steps involve various fields:
+ Statistics & Probability
+ Fuzzy logic
+ Artificial Intelligence ( AI)
+ Machine Learning ( ML)
+ Deep Learning ( DL)
+ Other advanced Data Science topics.
Focus on processing and visualizing the raw data, deduce any lessons and experimenting
with methods and techniques.
Any free email services out there, such as Yahoo, Gmail, or your corporate or school
email. It will cost you nothing, and setup will take minutes, but the contents of your email
would be exposed to the administrators of your provider.
Create the email application yourself; perhaps you want a particular feature or a unique
email ID. But you host the application using a hosting web service for a fee. You need to
have some knowledge of web development for this option, and you need to spend money
on hosting. Still, your email is exposed to the hosting service.
Do everything yourself; create the email application, launch it, and host it on your own
physical server. While this option would give you complete control and privacy, you will
need to be an expert in web development and spend more money on hosting.
+ Identify the Scope of Data to Be Monetized: Define precisely what you are selling; your
whole data set, a sub-set, a repurposed data set, others.
+ Ensure Validation of Data: You need to show your prospective customers how you obtained
your data, with evidence but without exposing propriety information.
+ Ensure Data Security and Encryption: This
could also be considered part of data validation,
ensuring your data is also safe and protected.
+ Package Data in Periodic Reports:
Configure your system to create reports daily,
weekly, monthly, or in other intervals.
+ Offer Data Subscription Services: To your
prospective customers for a profit.
The Industrial Internet provides a way to get better visibility and insight into the
company’s operations and assets through integration of machine sensors,
middleware, software, and backend cloud compute and storage systems. Therefore, it
provides a method of transforming business operational processes by using as
feedback the results gained from interrogating large data sets through advanced
analytics. The business gains are achieved through operational efficiency gains and
accelerated productivity, which results in reduced unplanned downtime and
optimized efficiency, and thereby profits.
+ Sensor technology has reduced dramatically in recent years in cost and size.
This made the instrumentation of machines, processes, and even people financial
and technically feasible.
+ Big Data and advanced analytics are another key driver and enabler for the IIoT
Exercise