Iotcp Unit 1
Iotcp Unit 1
Characteristics:
1) Dynamic & Self Adapting: IoT devices and systems may have the
capability to dynamically adapt with the changing contexts and take actions
based on their operating conditions, user‘s context or sensed environment.
Eg: the surveillance system is adapting itself based on context and changing
conditions.
2) Self Configuring: allowing a large number of devices to work together
to provide certain functionality.
4) Unique Identity: Each IoT device has a unique identity and a unique
identifier(IP address).
Applications of IoT:
Asset Layers: This layer comprises basic elements or objects which are used
for Monitoring and Controlling. This layer has various digital representations
and Identifiers.
Resource Layer : Sensing, Actuation and Embedded Identities are the main
functionality of this layer. It has two types Primary Resources such as
Sensors, Actuator and RFID Tags, Readers etc and Secondary Resources such
as Gateways.
Data and Information Layers : Abstract services are provided in this layer.
Important goal is to capture knowledge and provide advanced Control Logic
and Support 244 Enhancement of IoT-Based Smart Hospital System Survey
Paper.
IoT Standards
Smart objects produce large volumes of data. This data needs to be managed,
processed, transferred and stored securely. Standardization is key to achieving
universally accepted specifications and protocols for true interoperability
between devices and applications.
The fact that any of the electronic devices we are using these days is way
smarter than the devices used a decade back. On one side people had to leave
their sofa to change the TV channel or to press their AC button, on the other
side manually, they could speak to give instructions to their TV or AC on what
to do, and this is how technology has changed the way we are using the
devices.
To make the devices work more efficiently or to offer more functionality, the
concept of IoT has been introduced. The implementation of this technology has
changed the life of mankind. It is concerned with getting the devices together
with the other devices so that they can contribute to enhancing their
functionality. To manage this, of course, there exists some standard to make
sure everything is happening in a controlled way, and here we will be focusing
on those standards.
All of the standards for IoT are concerned about the way devices interact with
each other to create the network of the devices. The more things are connected,
the greater the security risk. So, security standards are also needed to protect
the individuals, businesses and governments which will use the IoT
IoT Devices: IoT devices are pieces of hardware , such as sensors , actuators,
gadgets , appliances or machines, that are programmed for certain applications
and can transmit data over the internet or other networks.
IoT devices are two types, they are Basic IoT Device and Advanced IoT
Device.
Basic IoT devices are good for performing simple processes like alarms,
metering, standalone smart thermostats and others.
Most IoT devices are configured and managed through a software application.
For example, an app on your smartphone to control the lights in your home.
Some devices also have integrated web servers, which eliminates the need for
external applications.
For example, the lights switch on immediately when you enter a room.
There are large varieties of IoT devices available based on IEEE 802.15.4
standard. These devices range from wireless motes, attachable sensor-boards to
interface-boards which are useful for researchers and developers.
Home Security
The key driver behind smart and secure homes is IoT. A variety of sensors,
lights, alarms and cameras (all of which can be controlled from a smartphone)
are connected via IoT to provide 24x7 security.
Activity Trackers
Smart home security cameras provide alerts and peace of mind. Activity
trackers are sensor devices that can monitor and transmit key health indicators
in real-time. You can track and manage your blood pressure, appetite, physical
movement and oxygen levels.
Motion sensors can detect vibrations in buildings, bridges, dams and other
large-scale structures. These devices can identify anomalies and disturbances in
the structures that could lead to catastrophic failures. They can also be used in
areas susceptible to floods, landslides, and earthquakes.
IoT Gateways: An IoT gateway acts as a network router, routing data between IoT
devices and the cloud.IoT gateway is a physical device or virtual platform that
connects sensors, IoT modules, and smart devices to the cloud. Gateways serve as a
wireless access portal to give IoT devices access to the Internet.
There are several types of IoT gateways available, and each type has its unique
features and functionalities. Here are some of the common types of IoT
gateways:
IoT gateways play a crucial role in enabling secure and reliable communication
between IoT devices and the cloud or other network infrastructures. The choice
of IoT gateway type depends on the specific application requirements, such as
data processing capabilities, connectivity options, and power consumption.
High energy and cost efficiency: IoT gateways are enabled to manage data transfers,
reduce bandwidth consumption, and reduce latency for IoT devices, making them
ideal for deployment in any IoT ecosystem. In addition, the cost savings from one IoT
gateway are negligible, but you’ll notice a considerable reduction when deploying a
large number of gateways.
Security risk mitigation:With the explosion of IoT devices, the security risks against
them crop up here and there, making the communication bridge – IoT gateways attach
more importance than ever. As expected, IoT gateways are equipped with multiple
security options to ensure an extra security layer between the Internet and the devices.
Durable and Reliable: While a commercial IoT gateway has all the advantages
above, it is not exactly the same as an Industrial IoT gateway. They differ in that IIoT
gateways can withstand extremely hostile industrial conditions. IIoT gateways are
usually built with robust industrial materials that are more durable and reliable,
allowing them to endure wide-ranging temperatures, humidity, radiation, dust,
vibration, and even explosions.
A LAN can be set up using wired or wireless technologies and allows devices
to communicate and share resources, such as files, printers, and internet
access.In a LAN, devices are typically connected to a central device called a
switch or router, which manages the flow of data between devices.
LANs are commonly used in business and educational settings to improve
communication and collaboration between employees or students, and to
share resources efficiently.
In local area networks, computers can exchange data and messages easily
and quickly. This saves time and gets things done faster. LAN allows any user
to share messages and data with any other user on the network. Users can
access the network from any computer and access the data stored on the
server.
WANs are used by organizations that have multiple locations, such as businesses,
government agencies, and educational institutions, to connect their various sites and
allow for communication and collaboration between them. WANs enable the sharing
of resources such as data, applications, and services between geographically dispersed
sites.
The internet is the largest example of a WAN, connecting millions of devices across
the globe. Internet Service Providers (ISPs) provide connectivity to the internet via
various technologies such as cable, DSL, and fiber-optic connections. WANs also
support virtual private networks (VPNs), which allow remote users to securely access
resources on the network over the internet.
WANs provide organizations with the ability to communicate and collaborate across
large distances, making it possible for businesses to operate on a global scale and for
individuals to connect with people from all over the world.
WANs can facilitate communication, the sharing of information and much more
between devices from around the world through a WAN provider.
• Big Data: Huge amounts of data are generated, capturing detailed aspects of the
processes where devices are involved.
• Heterogeneous Data: The data is produced by a huge variety of devices and is itself
highly heterogeneous, differing on sampling rate, quality of captured values, etc.
• Real-World Data: The overwhelming majority of the M2M data relates to real-
world processes and is dependent on the environment they interact with.
• Spatial Data: Increasingly, the data generated by M2M interactions are not only
captured by mobile devices, but also coupled to interactions in specific locations, and
their assessment may dynamically vary depending on the location their assessment
may dynamically vary depending on the location
● Polymorphic Data: The data acquired and used by M2M processes may be
complex and involve various data, which can also obtain different meanings
depending on the semantics applied and the process they participate in.
● Proprietary Data: Up to now, due to monolithic application development, a
significant amount of M2M data is stored and captured in proprietary formats.
However, increasingly due to the interactions with heterogeneous devices and
stakeholders, open approaches for data storage and exchange are used.
● Security and Privacy Data Aspects: Due to the detailed capturing of
interactions by M2M, analysis of the obtained data has a high risk of leaking
private information and usage patterns, as well as compromising security.
Billions of devices interact and generate data at exponential growth rates, data
management is of critical importance as it sets the basis upon which any other
processes can rely and operate. Several aspects of data management need to be
addressed in order to fully take advantage of the M2M data and their business
relevance.
The data flow from the moment it is sensed (e.g. by a wireless sensor node) up
to the moment it reaches the backend system has been processed manifold
(and often redundantly), either to adjust its representation in order to be easily
integrated by the diverse applications, or to compute on it in order to extract
and associate it with respective business intelligence (e.g. business process
affected, etc.). We see a number of data processing network points between
the machine and the enterprise that act on the datastream (or simply
forwarding it) based on their end-application needs and existing context.
Dealing with M2M data may be decomposed into several stages, which we
briefly outline below. Not all of the stages are necessary in every solution, and
may be used in orders other than those described below.
Data generation: Data generation is the first stage within which data is
generated actively or passively from the device, system, or as a result of its
interactions. The sampling of data generation depends on the device and its
capabilities as well as potentially the application needs. Usually default
behaviors for data generation exist, which are usually further configurable to
strike a good benefit between involved costs, e.g. frequency of data collection.
Data acquisition: Data acquisition deals with the collection of data (actively
or passively) from the device, system, or as a result of its interactions .The
data acquisition systems usually communicate with distributed devices over
wired or wireless links to acquire the needed data, and need to respect
security, protocol, and application requirements. The nature of acquisition
varies, e.g. it could be continuous monitoring, interval-poll, event-based, etc.
Data processing Data processing enables working with the data that is either
at rest (already stored) or is in-motion (e.g. stream data). The scope of this
processing is to operate on the data at a low level and “enhance” them for
future needs. For example is the transformation of incoming data; for example,
a stream can be converted on the fly (e.g. temperature values are converted
from F to C), or repackaged in another data model, etc. Missing or invalid data
that is needed for the specific time-slot may be forecasted and used until, in a
future interaction, the actual data comes into the system.
Data remanence: M2M data may reveal critical business aspects, and hence
their lifecycle management should include not only the acquisition and usage,
but also the end-of-life of data. However, even if the data is erased or
removed, residues may still remain in electronic media, and may be easily
recovered by third parties often referred to as data remanence. Several
techniques have been developed to deal with this, such as overwriting,
degaussing, encryption, and physical destruction.
1. Data Collection: IoT devices generate a large amount of data, and the
first step in utilizing this data is to collect it. This can be done using
various sensors and devices that are connected to the IoT network.
2. Data Analytics: Once the data is collected, it needs to be analyzed to
extract meaningful insights. This involves using analytics tools and
techniques to identify patterns, trends, and anomalies in the data.
3. Predictive Maintenance: IoT devices can be used to monitor the
performance of equipment and predict when maintenance is needed.
This can help to prevent costly breakdowns and downtime.
4. Inventory Management: IoT sensors can be used to monitor inventory
levels in real-time, allowing businesses to optimize their inventory
management processes and reduce waste.
5. Supply Chain Management: IoT devices can be used to track
shipments and monitor the condition of goods in transit. This can help
businesses to optimize their supply chain processes and reduce
costs.
6. Customer Experience: IoT devices can be used to collect data on
customer behavior and preferences, allowing businesses to
personalize their products and services to meet customer needs.
7. Security: IoT devices can be vulnerable to security threats, and
businesses need to have processes in place to secure their IoT
networks and protect against cyber-attacks.
Overall, the use of IoT devices and data can help businesses to optimize
their operations, reduce costs, and improve customer experiences. However,
it is important to have robust business processes in place to effectively
manage the data generated by these devices and utilize it to drive business
outcomes.