0% found this document useful (0 votes)
383 views

Iotcp Unit 1

The document discusses the fundamentals of Internet of Things (IoT) technology. It begins with an introduction to IoT, describing it as connecting physical objects with sensors and software to exchange data over the internet. It then covers IoT architecture, including asset layers, resource layers, communication layers, and more. It also discusses IoT standards like Bluetooth Smart, ZigBee and Z-Wave that enable communication between low-power devices. Finally, it describes the basic components of an IoT system, including IoT devices and gateways that connect devices to networks.

Uploaded by

Ch Shanthi Priya
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
383 views

Iotcp Unit 1

The document discusses the fundamentals of Internet of Things (IoT) technology. It begins with an introduction to IoT, describing it as connecting physical objects with sensors and software to exchange data over the internet. It then covers IoT architecture, including asset layers, resource layers, communication layers, and more. It also discusses IoT standards like Bluetooth Smart, ZigBee and Z-Wave that enable communication between low-power devices. Finally, it describes the basic components of an IoT system, including IoT devices and gateways that connect devices to networks.

Uploaded by

Ch Shanthi Priya
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

UNIT - I

Introduction: IoT architecture outline, standards - IoT Technology


Fundamentals- Devices and gateways, Local and wide area networking, Data
management, Business processes in IoT, Everything as a Service (XaaS), M2M
and IoT Analytics

Introduction: The Internet of Things (IoT) describes the network of physical


objects—“things”—that are embedded with sensors, software, and other
technologies for the purpose of connecting and exchanging data with other
devices and systems over the internet.

The goal of the Internet of Things is to enable things to be connected anytime,


anyplace, with anything and anyone ideally using any path/network and any
service.

Characteristics:

1) Dynamic & Self Adapting: IoT devices and systems may have the
capability to dynamically adapt with the changing contexts and take actions
based on their operating conditions, user‘s context or sensed environment.

Eg: the surveillance system is adapting itself based on context and changing
conditions.
2) Self Configuring: allowing a large number of devices to work together
to provide certain functionality.

3) InterOperable Communication Protocols: support a number of


interoperable communication protocols and can communicate with other
devices and also with infrastructure.

4) Unique Identity: Each IoT device has a unique identity and a unique
identifier(IP address).

5) Integrated into an Information Network: that allows them to


communicate and exchange data with other devices and systems.

Applications of IoT:

1) Home 2) Cities 3) Environment 4) Energy 5) Retail 6) Logistics 7)


Agriculture 8) Industry 9) Health & LifeStyle
IOT ARCHITECTURE OUTLINE :

IoT architecture consists of the devices, network structure, and cloud


technology that allows IoT devices to communicate with each other.

Asset Layers: This layer comprises basic elements or objects which are used
for Monitoring and Controlling. This layer has various digital representations
and Identifiers.

Ex: Building, Utility Systems, Home and People.

Resource Layer : Sensing, Actuation and Embedded Identities are the main
functionality of this layer. It has two types Primary Resources such as
Sensors, Actuator and RFID Tags, Readers etc and Secondary Resources such
as Gateways.

Communication Layer: Mainly used for communication among the


interconnected different objects to provide specific services. Generally, the
IoT nodes are operated using LLN(Low Power Lossy Network
Communication) which are used for Resource Constraint applications.
For example WiFi, Bluetooth, IEEE 802.15.4, Z-wave, and LTE-
Advanced. Apart from this new identity technologies also used in IoT like
RFID, Near Field Communication (NFC) and ultra-wide bandwidth (UWB).
RFID –Radio Frequency Identification is a new technology used to identify
objects using unique identity in M2M technology. The RFID technology has
Tags, Readers components. Tags are small chips, attached to provide an
object's identity which is normally assigned with a Unique ID. The RFID
reader is another component which is used to transmit a query signal to the tag
and receives reflected signal from the tag. This signal is passed to the database
for further processing.

Service Support Layer: This layer typically executes in a Data Center or


Servers inside an Organization or Cloud Environment. This layer can provide
numerous functions such as Remote Device Management, Remote
Diagnostics or Recovery, Setting Event Filters and Communication related
Functions such as LBS(Location Based Services) and GIS(Geographic
Information Services).

Data and Information Layers : Abstract services are provided in this layer.
Important goal is to capture knowledge and provide advanced Control Logic
and Support 244 Enhancement of IoT-Based Smart Hospital System Survey
Paper.

Application Layer: Customers request a variety of services which are


provided by this layer. It is present above the Data and Information Layer.
This application layer can provide Blood Pressure, temperature and air
humidity measurements of the patient who asks for analysis using machine
learning concepts. The main aim of this layer is to provide High Quality
Services to satisfy Customer requirements and their needs. Smart home, Smart
building, Transportation, Industrial automation and Smart healthcare are
numerous application fields which are covered by Application Layer.

Business Layer :The business (management) layer is mainly useful for


different types of System activity and Services. They received data from this
application layer which is used to build a business model, graphs, flowcharts,
etc which are the unique Functions of this layer. This layer is responsible for
the Designing, analyzing, implementing, evaluation and Monitoring process.
Based on Big Data Concepts an Intelligent Decision Making process is
implemented in this layer. Security and Privacy enhancements are added
advantages in this layer.
Management, Security and Data Services: IoT Management Layer is
responsible for Various Operations, Maintenance, Administration and
Provisioning. IoT Security Layer is responsible for Communication and
Information Security, Identity Management and Authentication, Authorization
and used to protect from threats and Harms. Finally, the Data and Services
layer is responsible for Event filtering, Data aggregation, Data Averaging and
Contextual Metadata.

IoT Standards
Smart objects produce large volumes of data. This data needs to be managed,
processed, transferred and stored securely. Standardization is key to achieving
universally accepted specifications and protocols for true interoperability
between devices and applications.

The fact that any of the electronic devices we are using these days is way
smarter than the devices used a decade back. On one side people had to leave
their sofa to change the TV channel or to press their AC button, on the other
side manually, they could speak to give instructions to their TV or AC on what
to do, and this is how technology has changed the way we are using the
devices.

To make the devices work more efficiently or to offer more functionality, the
concept of IoT has been introduced. The implementation of this technology has
changed the life of mankind. It is concerned with getting the devices together
with the other devices so that they can contribute to enhancing their
functionality. To manage this, of course, there exists some standard to make
sure everything is happening in a controlled way, and here we will be focusing
on those standards.

● Bluetooth Smart – Bluetooth smart is one of the most important


standards of IoT. This standard provides the devices to work using
Bluetooth connectivity. Moreover, it makes it possible for the device
and the users to communicate or share the instructions using Bluetooth’s
simple connection.
● ULE – ULE stands for Ultra-low emission. The amount of power
involved in this is way too less, as stated by its name. The common
telephone network we use at our homework using this standard and the
embedded devices leverages it wherever possible in order to facilitate
communication with other devices.
● IEEE 802.11ah – These standards are concerned with the wifi
connectivity that runs on low power. In the internet of things, the
devices preferably work with low power consumption mechanism
involvement. Though Wifi doesn’t fall under the low power
consumption part, this standard is concerned with the lower power
consumption of devices. This standard has been considered as the most
effective one as the availability of wifi is very common.
● ZigBee – This is the other standard that helps to take the IoT to the next
level. It has been developed by an organization called the ZigBee
industry. The main purpose of this standard is to offer a network of
devices that consume less power to function. The common devices that
are being used in houses leverage this standard in order to communicate
with low power requirements.
● Z-Wave – Z-Wave is the most commonly used standard. Similar to the
other standards, it is also concerned with working devices that use less
power to work well in the network. Sigma Designs own this standard,
and the changes or improvements in this standard are taken by this
organization only. The outcome of this standard is the low power mesh
technology of networking.
● 6LoWPAN – This is another standard influenced by IEEE. It is
concerned with creating the IoT system that consists of devices that are
connected to the internet and use less power to facilitate communication.
IPV6 has been used in this standard when it comes to connecting the
devices that are available on the internet.

The use of standards:

● ensures interoperable and cost-effective solutions


● opens up opportunities in new areas
● allows the market to reach its full potential

All of the standards for IoT are concerned about the way devices interact with
each other to create the network of the devices. The more things are connected,
the greater the security risk. So, security standards are also needed to protect
the individuals, businesses and governments which will use the IoT

IOT TECHNOLOGY FUNDAMENTALS: Devices and Gateways


IoT works through a combination of wireless networking technology, physical
devices, advanced data analytics and cloud computing. A group of physical
devices is wired or wirelessly linked to each other and/or a central area .

IoT Devices: IoT devices are pieces of hardware , such as sensors , actuators,
gadgets , appliances or machines, that are programmed for certain applications
and can transmit data over the internet or other networks.

IoT devices are two types, they are Basic IoT Device and Advanced IoT
Device.

Basic IoT devices are good for performing simple processes like alarms,
metering, standalone smart thermostats and others.

Advanced IoT devices are designed for more complex processes,


representing automated units, and processing multiple different actions at the
same time

Internet of Things Devices are non-standard devices that connect wirelessly to


a network with each other and are able to transfer the data. IoT devices are
enlarging the internet connectivity beyond standard devices such as
smartphones, laptops, tablets, and desktops. Embedding these devices with
technology enables us to communicate and interact over the networks and they
can be remotely monitored and controlled,they are programmed for certain
applications and can be embedded into other IoT devices..For example, an IoT
device in your car can identify the traffic ahead and send out a message
automatically to the person you are about to meet of your impending delay.

Most IoT devices are configured and managed through a software application.
For example, an app on your smartphone to control the lights in your home.
Some devices also have integrated web servers, which eliminates the need for
external applications.
For example, the lights switch on immediately when you enter a room.
There are large varieties of IoT devices available based on IEEE 802.15.4
standard. These devices range from wireless motes, attachable sensor-boards to
interface-boards which are useful for researchers and developers.

IoT devices include computer devices, software, wireless sensors, and


actuators. These IoT devices are connected over the internet and enable the data
transfer among objects or people automatically without human intervention.
Examples of IoT Devices

Home Security

The key driver behind smart and secure homes is IoT. A variety of sensors,
lights, alarms and cameras (all of which can be controlled from a smartphone)
are connected via IoT to provide 24x7 security.

Activity Trackers

Smart home security cameras provide alerts and peace of mind. Activity
trackers are sensor devices that can monitor and transmit key health indicators
in real-time. You can track and manage your blood pressure, appetite, physical
movement and oxygen levels.

Industrial Security and Safety

IoT-enabled detection systems, sensors and cameras can be placed in restricted


areas to detect trespassers. They can also identify pressure buildups and small
leaks of hazardous chemicals and fix them before they become serious
problems.

Augmented Reality Glasses

Augmented Reality (AR) glasses are wearable computer-enabled glasses that


help you get extra information such as 3D animations and videos to the user's
real-world scenes. The information is presented within the lenses of the glasses
and can help users access Internet applications.
Motion Detection

Motion sensors can detect vibrations in buildings, bridges, dams and other
large-scale structures. These devices can identify anomalies and disturbances in
the structures that could lead to catastrophic failures. They can also be used in
areas susceptible to floods, landslides, and earthquakes.

IoT Gateways: An IoT gateway acts as a network router, routing data between IoT
devices and the cloud.IoT gateway is a physical device or virtual platform that
connects sensors, IoT modules, and smart devices to the cloud. Gateways serve as a
wireless access portal to give IoT devices access to the Internet.

A gateway is a network node used in telecommunications that connects two networks


with different transmission protocols together. IoT (Internet of Things) gateways are
devices that enable the communication between IoT devices and the cloud or other
network infrastructures. They act as a bridge between local networks and the internet,
enabling secure and reliable data transfer.

There are several types of IoT gateways available, and each type has its unique
features and functionalities. Here are some of the common types of IoT
gateways:

1. Cloud IoT Gateways: These gateways are designed to connect IoT


devices to cloud-based platforms. They provide the necessary security,
protocol translation, and data processing functionalities required for
transmitting data to the cloud. Cloud IoT gateways are widely used in
industries such as healthcare, manufacturing, and logistics.
2. Edge IoT Gateways: These gateways are used to process data locally at
the edge of the network, closer to the devices generating the data. They
can perform data filtering, aggregation, and analysis, reducing the need
for data transfer to the cloud. Edge IoT gateways are often used in
applications such as smart buildings, energy management, and industrial
automation.
3. Cellular IoT Gateways: These gateways use cellular networks to connect
IoT devices to the internet. They are ideal for applications where Wi-Fi
or Ethernet connectivity is not available. Cellular IoT gateways are
commonly used in fleet management, asset tracking, and remote
monitoring applications.
4. LoRaWAN IoT Gateways: These gateways are designed to work with
low-power, long-range LoRaWAN (Long Range Wide Area Network)
devices. They are typically used in smart city applications, such as smart
parking, waste management, and environmental monitoring.
5. Zigbee IoT Gateways: These gateways are used to connect Zigbee
devices to the internet. Zigbee is a low-power wireless communication
protocol commonly used in home automation and smart building
applications. Zigbee IoT gateways provide the necessary security and
protocol translation functionalities required for transmitting data to the
cloud.

IoT gateways play a crucial role in enabling secure and reliable communication
between IoT devices and the cloud or other network infrastructures. The choice
of IoT gateway type depends on the specific application requirements, such as
data processing capabilities, connectivity options, and power consumption.

# Advantages of using IoT Gateway devices

IoT gateways are configured with higher specifications to achieve better


performance, and so do the benefits they create. Following are some of the major
advantages.

Inter-device and device-to-device communication: As a centralized hub, an IoT


gateway not only provides access for multiple IoT devices to communicate with one
another but also enables data flow between devices and cloud platforms. Without your
IoT gateways, it’s more of a hassle that these smart devices and sensors work
individually and cannot communicate with each other.

Edge computing:This could be a significant benefit of the IoT gateway. By pre-


processing the collected raw data before sending them to the cloud, advanced IoT
gateways are enabled to perform complex computing, thus reducing the network
response time.

High energy and cost efficiency: IoT gateways are enabled to manage data transfers,
reduce bandwidth consumption, and reduce latency for IoT devices, making them
ideal for deployment in any IoT ecosystem. In addition, the cost savings from one IoT
gateway are negligible, but you’ll notice a considerable reduction when deploying a
large number of gateways.

Security risk mitigation:With the explosion of IoT devices, the security risks against
them crop up here and there, making the communication bridge – IoT gateways attach
more importance than ever. As expected, IoT gateways are equipped with multiple
security options to ensure an extra security layer between the Internet and the devices.

Durable and Reliable: While a commercial IoT gateway has all the advantages
above, it is not exactly the same as an Industrial IoT gateway. They differ in that IIoT
gateways can withstand extremely hostile industrial conditions. IIoT gateways are
usually built with robust industrial materials that are more durable and reliable,
allowing them to endure wide-ranging temperatures, humidity, radiation, dust,
vibration, and even explosions.

Local and wide area networking:


Local area networking(LAN): LAN stands for local area network. A network
is a group of two or more connected computers, and a LAN is a network
contained within a small geographic area, usually within the same
building.Home WiFi networks and small business networks are common
examples of LAN’s.

A LAN can be set up using wired or wireless technologies and allows devices
to communicate and share resources, such as files, printers, and internet
access.In a LAN, devices are typically connected to a central device called a
switch or router, which manages the flow of data between devices.
LANs are commonly used in business and educational settings to improve
communication and collaboration between employees or students, and to
share resources efficiently.

They can also be used in homes to connect multiple devices, such as


computers, smartphones, and smart home devices, to the internet and each
other.

In local area networks, computers can exchange data and messages easily
and quickly. This saves time and gets things done faster. LAN allows any user
to share messages and data with any other user on the network. Users can
access the network from any computer and access the data stored on the
server.

Wide area networking(WAN):


Wide Area Networking (WAN) is a type of computer network that spans a large
geographic area, such as a city, country, or even multiple countries. WANs allow
multiple LANs to be connected and communicate with each other over long distances
using various communication technologies such as leased lines, satellite links, and
microwave transmissions.

WANs are used by organizations that have multiple locations, such as businesses,
government agencies, and educational institutions, to connect their various sites and
allow for communication and collaboration between them. WANs enable the sharing
of resources such as data, applications, and services between geographically dispersed
sites.

The internet is the largest example of a WAN, connecting millions of devices across
the globe. Internet Service Providers (ISPs) provide connectivity to the internet via
various technologies such as cable, DSL, and fiber-optic connections. WANs also
support virtual private networks (VPNs), which allow remote users to securely access
resources on the network over the internet.

WANs provide organizations with the ability to communicate and collaborate across
large distances, making it possible for businesses to operate on a global scale and for
individuals to connect with people from all over the world.
WANs can facilitate communication, the sharing of information and much more
between devices from around the world through a WAN provider.

Data management & Business processes in IoT

Data management:Modern enterprises need to be agile and dynamically support


multiple decision-making processes taken at several levels. In order to achieve this,
critical information needs to be available at the right point in a timely manner, and in
the right form. All this info is the result of data being acquired increasingly by M2M
interactions, which in conjunction with the processes involved, assist in better
decision-making.

Some of the key characteristics of M2M data include:

• Big Data: Huge amounts of data are generated, capturing detailed aspects of the
processes where devices are involved.

• Heterogeneous Data: The data is produced by a huge variety of devices and is itself
highly heterogeneous, differing on sampling rate, quality of captured values, etc.

• Real-World Data: The overwhelming majority of the M2M data relates to real-
world processes and is dependent on the environment they interact with.

• Real-Time Data: M2M data is generated in real-time and overwhelmingly can be


communicated also in a very timely manner. The latter is of pivotal importance since
many times their business value depends on the real-time processing of the info they
convey.

• Temporal Data: The overwhelming majority of M2M data is of temporal nature,


measuring the environment over time.

• Spatial Data: Increasingly, the data generated by M2M interactions are not only
captured by mobile devices, but also coupled to interactions in specific locations, and
their assessment may dynamically vary depending on the location their assessment
may dynamically vary depending on the location

● Polymorphic Data: The data acquired and used by M2M processes may be
complex and involve various data, which can also obtain different meanings
depending on the semantics applied and the process they participate in.
● Proprietary Data: Up to now, due to monolithic application development, a
significant amount of M2M data is stored and captured in proprietary formats.
However, increasingly due to the interactions with heterogeneous devices and
stakeholders, open approaches for data storage and exchange are used.
● Security and Privacy Data Aspects: Due to the detailed capturing of
interactions by M2M, analysis of the obtained data has a high risk of leaking
private information and usage patterns, as well as compromising security.
Billions of devices interact and generate data at exponential growth rates, data
management is of critical importance as it sets the basis upon which any other
processes can rely and operate. Several aspects of data management need to be
addressed in order to fully take advantage of the M2M data and their business
relevance.

Managing M2M data

The data flow from the moment it is sensed (e.g. by a wireless sensor node) up
to the moment it reaches the backend system has been processed manifold
(and often redundantly), either to adjust its representation in order to be easily
integrated by the diverse applications, or to compute on it in order to extract
and associate it with respective business intelligence (e.g. business process
affected, etc.). We see a number of data processing network points between
the machine and the enterprise that act on the datastream (or simply
forwarding it) based on their end-application needs and existing context.

Dealing with M2M data may be decomposed into several stages, which we
briefly outline below. Not all of the stages are necessary in every solution, and
may be used in orders other than those described below.

Data generation: Data generation is the first stage within which data is
generated actively or passively from the device, system, or as a result of its
interactions. The sampling of data generation depends on the device and its
capabilities as well as potentially the application needs. Usually default
behaviors for data generation exist, which are usually further configurable to
strike a good benefit between involved costs, e.g. frequency of data collection.

Data acquisition: Data acquisition deals with the collection of data (actively
or passively) from the device, system, or as a result of its interactions .The
data acquisition systems usually communicate with distributed devices over
wired or wireless links to acquire the needed data, and need to respect
security, protocol, and application requirements. The nature of acquisition
varies, e.g. it could be continuous monitoring, interval-poll, event-based, etc.

Data validation: Data acquired must be checked for correctness and


meaningfulness within the specific operating context. Data validation in the
M2M, where the acquired data may not conform to expectations, is a must as
data may be intentionally or unintentionally corrupted during transmission,
altered, or not make sense in the business context. As real-world processes
depend on valid data to draw business-relevant decisions, this is a key stage,
which sometimes does not receive as much attention as it should.

Data storage: The data generated by M2M interactions is what is commonly


referred to as “Big Data.” Machines generate an incredible amount of
information that is captured and needs to be stored for further processing. As
this is proving challenging due to the size of information, a balance between
its business usage vs. storage needs to be considered; that is, only the fraction
of the data relevant to a business need may be stored for future reference.

Data management: That in a specific scenario, (usually for on-the-fly data


that was used to make a decision) once this is done, the processed result can be
stored but not necessarily the original data. However, one has to carefully
consider what the value of such data is to business not only in current
processes, but also potentially other directions that may be followed in the
future by the company as different assessments of the same data may provide
other, hidden competitive advantages in the future. Due to the massive
amounts of M2M data, as well as their envisioned processing (e.g. searching),
specialized technologies such as massively parallel processing DBs,
distributed file systems, cloud computing platforms, etc. are needed.

Data processing Data processing enables working with the data that is either
at rest (already stored) or is in-motion (e.g. stream data). The scope of this
processing is to operate on the data at a low level and “enhance” them for
future needs. For example is the transformation of incoming data; for example,
a stream can be converted on the fly (e.g. temperature values are converted
from F to C), or repackaged in another data model, etc. Missing or invalid data
that is needed for the specific time-slot may be forecasted and used until, in a
future interaction, the actual data comes into the system.

Data remanence: M2M data may reveal critical business aspects, and hence
their lifecycle management should include not only the acquisition and usage,
but also the end-of-life of data. However, even if the data is erased or
removed, residues may still remain in electronic media, and may be easily
recovered by third parties often referred to as data remanence. Several
techniques have been developed to deal with this, such as overwriting,
degaussing, encryption, and physical destruction.

Data analysis: Data available in the repositories can be subjected to analysis


with the aim to obtain the information they encapsulate and use it for
supporting decision-making processes. The analysis of data at this stage
heavily depends on the domain and the context of the data. For instance,
business intelligence tools process the data with a focus on the aggregation
and key performance indicator assessment.This stage is the basis for any
sophisticated applications that take advantage of the information hidden
directly or indirectly on the data, and can be used, for example, for business
insights, etc.

Business processes in IoT


IoT (Internet of Things) refers to the network of physical devices, vehicles,
home appliances, and other items embedded with sensors, software, and
connectivity to enable the exchange of data between them and other
internet-enabled devices. The business processes in IoT typically involve
collecting, analyzing, and utilizing the data generated by these devices to
improve business operations and enhance customer experiences. Some of
the common business processes in IoT include:

1. Data Collection: IoT devices generate a large amount of data, and the
first step in utilizing this data is to collect it. This can be done using
various sensors and devices that are connected to the IoT network.
2. Data Analytics: Once the data is collected, it needs to be analyzed to
extract meaningful insights. This involves using analytics tools and
techniques to identify patterns, trends, and anomalies in the data.
3. Predictive Maintenance: IoT devices can be used to monitor the
performance of equipment and predict when maintenance is needed.
This can help to prevent costly breakdowns and downtime.
4. Inventory Management: IoT sensors can be used to monitor inventory
levels in real-time, allowing businesses to optimize their inventory
management processes and reduce waste.
5. Supply Chain Management: IoT devices can be used to track
shipments and monitor the condition of goods in transit. This can help
businesses to optimize their supply chain processes and reduce
costs.
6. Customer Experience: IoT devices can be used to collect data on
customer behavior and preferences, allowing businesses to
personalize their products and services to meet customer needs.
7. Security: IoT devices can be vulnerable to security threats, and
businesses need to have processes in place to secure their IoT
networks and protect against cyber-attacks.

Overall, the use of IoT devices and data can help businesses to optimize
their operations, reduce costs, and improve customer experiences. However,
it is important to have robust business processes in place to effectively
manage the data generated by these devices and utilize it to drive business
outcomes.

You might also like