0% found this document useful (0 votes)
18 views26 pages

IoT Unit 1

Uploaded by

rakeshr0026
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views26 pages

IoT Unit 1

Uploaded by

rakeshr0026
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

INTERNET OF THINGS – LECTURE MATERIAL

UNIT – I
INTRODUCTION TO INTERNET OF THINGS

Introduction:
The concept of a network of smart devices was discussed as early as 1982, with a
modified Coke machine at Carnegie Mellon University becoming the first internet-connected
appliance, able to report its inventory and whether newly loaded drinks were cold. Kevin Ashton
(born 1968) is a British technology pioneer who is known for inventing the term "the Internet of
Things" to describe a system where the Internet is connected to the physical world via ubiquitous
sensors. IoT is able to interact without human intervention. Some preliminary IoT applications
have been already developed in healthcare, transportation, and automotive industries. IoT
technologies are at their infant stages; however, many new developments have occurred in the
integration of objects with sensors in the Internet. The development of IoT involves many issues
such as infrastructure, communications, interfaces, protocols, and standards. The objective of this
paper is to give general concept of IoT, the architecture and layers in IoT, some basic terms
associated with it and the services provided. The below fig 1.1 give an example things connected
to internet.
The IOT concept was coined by a member of the Radio Frequency Identification
(RFID) development community in 1999, and it has recently become more relevant to the
practical world largely because of the growth of mobile devices, embedded and ubiquitous
communication, cloud computing and data analytics

Fig 1.1: Things connected to Internet.

MRITS/ECE/IV-I 1
INTERNET OF THINGS – LECTURE MATERIAL

Definition of IoT:
The Internet of Things (IoT) is the network of physical objects—devices, instruments,
vehicles, buildings and other items embedded with electronics, circuits , software, sensors and
network connectivity that enables these objects to collect and exchange data. The Internet of
Things allows objects to be sensed and controlled remotely across existing network
infrastructure, creating opportunities for more direct integration of the physical world into
computer-based systems, and resulting in improved efficiency and accuracy.
IoT refers to the interconnection via the internet of computing devices embedded in
everyday objects, enabled them to send and receive the data.
A dynamic global network infrastructure with self- configuring capabilities based on
standard and interoperable communication protocols, where physical and virtual “things” have
identities, physical attributes, and use intelligent interfaces, and are seamlessly integrated into
information network that communicate data with users and environments.

Characteristics of IoT :
1. Dynamic & Self-Adapting: IoT device and system may have the capability to dynamically
adapt with the changing contexts and take actions based on their operating conditions, user’s
context, or sensed environment. For example, consider a surveillance adpt their modes based on
the weather it is day or night, cameras could switch from lower resolution to higher resolution
modes when any motion is detected and alert nearby cameras to do the same.
2. Self-Configuring: IoT devices may have self-configuring capability, allowing a large number of
devices to work together to provide certain functionality (such as weather monitoring). These
devices have the ability configure themselves, setup the networking and fetch latest software
upgrades with minimal manual or user intervention.
3. Interoperable Communication Protocols: IoT devices may support a number of interoperable
communication protocols and can communicate with other devices and also with the
infrastructure.
4. Unique Identity: Each IoT device has a unique identity and a unique identifier (such as an IP
address). IoT systems may have intelligent interface which adapt based on the context, allow
communicating with user and the environmental contexts, IoT device interfaces allow users to
query the devices, monitor their status and control them remotely.
5. Integrated into Information Network: IoT devices are usually integrated into the information
network that allows them to communicate and exchange data with other devices and systems,
IoT dvices can be dynamically discovered in the network, by other devices and/or the network,
and have the capability to describe themselves to other devices or user applications.

MRITS/ECE/IV-I 2
INTERNET OF THINGS – LECTURE MATERIAL

Physical Design of IoT


Things in IoT
1. Refers to IoT devices which have unique identities that can perform sensing, actuating
and monitoring capabilities.
2. IoT devices can exchange data with other connected devices or collect data from other
devices and process the data either locally or send the data to centralized servers or cloud
– based application back-ends for processing the data.

Generic Block Diagram of an IoT Device:


An IoT device may consist of several interfaces for connections to other devices,
both wired and wireless. The below Fig 1.2 shows the block diagram of an IoT
Device.
◦ I/O interfaces for sensors
◦ Interfaces for internet connectivity
◦ Memory and storage interfaces
◦ Audio/video interfaces

Fig 1.2: Block Diagram of an IoT Device


IoT Protocols:

The IoT devices are typically connected to the Internet via an IP (Internet Protocol) network.
However, devices such as Bluetooth and RFID allow IoT devices to connect locally. In these
cases, there’s a difference in power, range, and memory used. Connection through IP networks

MRITS/ECE/IV-I 3
INTERNET OF THINGS – LECTURE MATERIAL

are comparatively complex, requires increased memory and power from the IoT devices while
the range is not a problem. On the other hand, non-IP networks demand comparatively less
power and memory but have a range limitation.

As far as the IoT communication protocols or technologies are concerned, a mix of both IP and
non-IP networks can be considered depending on usage.

Fig 1.3 shows Four Layer of IoT Protocol


1. Link Layer
2. Network Layer
3. Transport Layer
4. Application Layer

Fig 1.3 Four Layer IoT Protocol


1. Link Layer:
In computer networking, the link layer is the lowest layer in the Internet protocol suite,
the networking architecture of the Internet. The link layer is the group of methods and
communications protocols confined to the link that a host is physically connected to. The link is
the physical and logical network component used to interconnect hosts or nodes in the network
MRITS/ECE/IV-I 4
INTERNET OF THINGS – LECTURE MATERIAL

and a link protocol is a suite of methods and standards that operate only between adjacent
network nodes of a network segment.

Table 1.1: different methods of link layer with standards.


Ethernet Standard

Sr.No Standard Shared medium

1 802.3 Coaxial cable

2 802.3.i Copper Twisted pair

3 802.3.j Fiber Optic

4 802.3.ae Fiber…..10Gbits/s

WiFi Standard

S.No Standard Operates in

1 802.11a 5 GHz band

2 802.11b& 802.11g 2.4GHz band

3 802.11.n 2.4/5 GHz bands

4 802.11.ac 5GHz band

5 802.11.ad 60Hz band


WiMax Standard

S.No Standard Data Rate

1 802.16m 100Mb/s for mobile stations, 1Gb/s for fixed stations

Mobile Communication Standard

Sr.No Standard Operates in

1 2G GSM-CDMA

2 3G UMTS and CDMA 2000

3 4G LTE

MRITS/ECE/IV-I 5
INTERNET OF THINGS – LECTURE MATERIAL

The above Table 1.1 shows the different method of link layer with different
standards. For Ethernet method Data Rates are provided from 10Gbit/s to 40Gb/s and
higher. Collection of Wireless LAN Data Rates from 1Mb/s to 6.75 Gb/s. Collection of
Wireless Broadband standards Data Rates from 1.5Mb/s to 1 Gb/s. LR-WPAN:
Collection of standards for low-rate wireless personal area networks, Basis for high level
communication protocols such as Zigbee, Data Rates from 40Kb/s to 250Kb/s. 2G/3G/4G
–Mobile Communication: Data Rates from 9.6Kb/s (for 2G) to up to 100Mb/s (for 4G).

2. Network/Internet Layer:
The internet layer is a group of internetworking methods, protocols, and specifications in
the Internet protocol suite that are used to transport network packets from the originating host
across network boundaries; if necessary, to the destination host specified by an IP address. The
internet layer derives its name from its function facilitating internetworking, which is the concept
of connecting multiple networks with each other through gateways.
• Responsible for sending of IP datagrams from source to destination network
• Performs the host addressing and packet routing
• Host identification is done using hierarchical IP addressing schemes such as IPV4 or
IPV6
IPV4
Used to identify the devices on a network using hierarchical addressing scheme
Uses 32-bit address scheme
IPV6
Uses 128-bit address scheme
6LoWPAN (IPV6 over Low power Wireless Personal Area Network)
Used for devices with limited processing capacity, Operates in 2.4 Ghz , Data Rates of
250Kb/s.

3. Transport Layer:
In computer networking, the transport layer is a conceptual division of methods in the
layered architecture of protocols in the network stack in the Internet protocol suite and the OSI
model. The protocols of this layer provide host-to-host communication services for applications.
It provides services such as connection-oriented communication, reliability, flow control, and
multiplexing.

MRITS/ECE/IV-I 6
INTERNET OF THINGS – LECTURE MATERIAL

The best-known transport protocol of the Internet protocol suite is the Transmission
Control Protocol (TCP). It is used for connection-oriented transmissions, whereas the
connectionless User Datagram Protocol (UDP) is used for simpler messaging transmissions.

• Provide end-to-end message transfer capability independent of the underlying network


• It provides functions such as error control, segmentation, flow-control and congestion
control
Transmission Control Protocol (TCP):
• Connection Oriented
• Ensures Reliable transmission
• Provides Error Detection Capability to ensure no duplicacy of packets and retransmit lost
packets
• Flow Control capability to ensure the sending data rate is not too high for the receiver
process
• Congestion control capability helps in avoiding congestion which leads to degradation of
n/w performance
User Datagram Protocol (UDP):
• Connectionless
• Does not ensures Reliable transmission
• Does not do connection before transmitting
• Does not provide proper ordering of messages
• Transaction oriented and stateless

4. Application Layer:
An application layer is an abstraction layer that specifies the shared communications
protocols and interface methods used by hosts in a communications network. The application
layer abstraction is used in both of the standard models of computer networking: the Internet
Protocol Suite (TCP/IP) and the OSI model. Although both models use the same term for their
respective highest level layer, the detailed definitions and purposes are different.
Hyper Transfer Protocol:
• Forms foundation of World Wide Web(WWW)
• Includes commands such as GET,PUT, POST, HEAD, OPTIONS, TRACE..etc
• Follows a request-response model
• Uses Universal Resource Identifiers(URIs) to identify HTTP resources.
Constrained Application Protocol (CoAP):
• Used for Machine to machine (M2M) applications meant for constrained devices and
n/w’s
• Web transfer protocol for IoT and uses request-response model

MRITS/ECE/IV-I 7
INTERNET OF THINGS – LECTURE MATERIAL

• Uses client –server architecture


• Supports methods such as GET,POST, PUT and DELETE
WebSocket:
 Allows full-duplex communication over single socket, Based on TCP, Client can be a
browser, IoT device or mobile application
Message Queue Telemetry Transport (MQTT):
 light-weight messaging protocol, Based on publish-subscribe model, Well suited for
constrained environments where devices have limited processing, low memory and n/w
bandwith requirement
XMPP:
• Extensible messaging and presence protocol, For Real time communication and
streaming XML data between n/w entities, Used for Applications such as Multi-party
chat and voice/video calls.

Logical Design of IoT:


 Logical design of an IoT system refers to an abstract representation of the entities
and processes without going into the low-level specifics of the implementation.

 An IoT system comprises a number of functional blocks that provide the system the
capabilities for identification, sensing, actuation, communication and management.
 Fig 1.4 shows the functional block diagram of IoT. Blew are the individual block
explanation.
1. Device : Devices such as sensing, actuation, monitoring and control functions.
2. Communication : IoT Protocols
3. Services like device monitoring, device control services, data publishing services and
device discovery
4. Management : Functions to govern the system
5. Security : Functions as authentication, authorization, message and content integrity, and
data security Applications

MRITS/ECE/IV-I 8
INTERNET OF THINGS – LECTURE MATERIAL

Fig 1.4: Functional Block Diagram of IoT.


IoT Communication Modules:
1. Request–Response Communication Model:
 Request–Response is a communication model in which the client sends requests to the
server and the server responds to the requests.
 When the server receives a request, it decides how to respond, fetches the data, retrieves
resource representations, prepares the response and then sends the response to the client.
 Stateless communication model, Fig 1.5 shows the block diagram of Request-Response
Communication Model.

Fig 1.5: Request–Response Communication Model.

MRITS/ECE/IV-I 9
INTERNET OF THINGS – LECTURE MATERIAL

2. Publish–Subscribe Communication Model:


 Publish–Subscribe is a communication model that involves publishers, brokers and
consumers.
 Publishers are the source of data. Publishers send the data to the topics which are
managed by the broker. Publishers are not aware of the consumers.
 Consumers subscribe to the topics which are managed by the broker.
 When the broker receives data for a topic from the publisher, it sends the data to all the
subscribed consumers. Fig 1.6 shows the block diagram of Publish-Subscribe
Communication Model.

Fig 1.6: Publish–Subscribe Communication Model.


3. Push–Pull Communication Model:
 Push–Pull is a communication model in which the data producers push the data to
queues and the consumers pull the data from the queues. Producers do not need to be
aware of the consumers.
 Queues help in decoupling the messaging between the producers and consumers.
 Queues also act as a buffer which helps in situations when there is a mismatch between
the rate at which the producers push data and the rate at which the consumers pull data.
Fig 1.7 shows the block diagram of Push-Pull Communication Model.

MRITS/ECE/IV-I 10
INTERNET OF THINGS – LECTURE MATERIAL

Fig 1.7: Push–Pull Communication Model.

4. Exclusive Pair Communication Model:


 Exclusive Pair is a bidirectional, fully duplex communication model that uses a persistent
connection between the client and the server.
 Once the connection is set up it, remains open until the client sends a request to close the
connection.
 Client and server can send messages to each other after connection setup. Fig 1.8 shows
the block diagram of Exclusive Pair Communication Model

Fig 1.8: Exclusive Pair Communication Model.

MRITS/ECE/IV-I 11
INTERNET OF THINGS – LECTURE MATERIAL

IoT Communication APIs:


1. REST-based Communication APIs:
 Representational State Transfer (REST) is a set of architectural principles by
which you can design web services and web APIs that focus on a system’s
resources and how resource states are addressed and transferred.
 REST APIs follow the request–response communication model. Fig 1.9 shows the
RESET API Architecture diagram.
 REST architectural constraints apply to the components, connectors and data
elements within a distributed hypermedia system.

Fig 1.9: REST API Architecture.


Constraints:
 Client – Server
 Stateless
 Cacheable
 Layered System
 Uniform Interface
 Code on demand

MRITS/ECE/IV-I 12
INTERNET OF THINGS – LECTURE MATERIAL

Fig 1.10: RESET API Constrants.


2. Web Socket-based Communication APIs:
 WebSocket APIs allow bi-directional, full duplex communication between clients
and servers.
 WebSocket APIs follow the exclusive pair communication model.

Fig1.11 WebSocket Protocol.

MRITS/ECE/IV-I 13
INTERNET OF THINGS – LECTURE MATERIAL

Difference between REST and WebSocket-based Communication APIs:

Comparison Based REST Websocket


on

State Stateless Stateful

Directional Unidirectional Bidirectional

Req-Res/Full Duplex Follow Request Response Model Exclusive Pair Model

TCP Connections Each HTTP request involves Involves a single TCP


setting up a new TCP Connection Connection for all
requests

Header Overhead Each request carries HTTP Does not involve


Headers, hence not suitable for overhead of headers.
real-time

Scalability Both horizontal and vertical are Only Vertical is easier


easier

MRITS/ECE/IV-I 14
INTERNET OF THINGS – LECTURE MATERIAL

IoT Enabling Technologies:


1. Wireless Sensor Network(WSN):
 Distributed Devices with sensors used to monitor the environmental and physical
conditions
 Consists of several end-nodes acting as routers or coordinators too
 Coordinators collects data from all nodes / acts as gateway that connects WSN to
internet
 Routers route the data packets from end nodes to coordinators.
Example:
 Weather monitoring system
 Indoor Air quality monitoring system
 Soil moisture monitoring system
 Survelliance systems
 Health monitoring systems
Protocols:
 Zigbee

Fig 1.12: wireless Sensors.


2. Cloud Computing:
 Deliver applications and services over internet
 Provides computing, networking and storage resources on demand
 Cloud computing performs services such as Iaas, Paas and Saas
 Iaas : Rent Infrastructure
 Paas : supply an on-demand environment for developing, testing, delivering and
managing software applications.
 Saas : method for delivering software applications over the Internet, on demand
and typically on a subscription basis.

MRITS/ECE/IV-I 15
INTERNET OF THINGS – LECTURE MATERIAL

Fig 1.13 Cloud Computing Physical Diagram


3. Big Data Analytics:
 Collection of data whose volume, velocity or variety is too large and difficult to
store, manage, process and analyze the data using traditional databases.
 It involves data cleansing, processing and visualization
 Lots of data is being collected and warehoused
 Web data, e-commerce
 purchases at department/ grocery stores
 Bank/Credit Card transactions
 Social Network

Fig 1.14 Big Data Analytics Physical Diagram.


Variety Includes different types of data
 Structured, Unstructured, SemiStructured, All of above
Velocity Refers to speed at which data is processed
 Batch, Real-time, STreams
Volume refers to the amount of data
 Terabyte, Records, Transactions, Files, Tables

4. Embedded Systems:
MRITS/ECE/IV-I 16
INTERNET OF THINGS – LECTURE MATERIAL

An Embedded System is a computer system that has computer hardware and


software embedded toperform specific tasks. In constrast to general purpose computers
which can perform various typpes of asks, embedded systems are designed to pperform a
specific set of tasks. Key components of an embedded system include, microproceessor
or microcontroller, memory(RAM, ROM, Cache) and Input/Output Units.

Communication Protocols:
Communication protocols from the backbone of IoT systems and enabled network
connectivity and coupling to applications. Communication protocols allow devices to
exchange data over the network. In internet protocol session we discussed about various
Link, Network, Transport and Application Layer protocols.
IoT Levels and Deployment Templates:
An IoT system comprises the following components:
• Device: An IoT device allows identification, remote sensing, actuating and remote
monitoring capabilities.
• Resource: Resources are software components on the IoT device for accessing,
processing and storing sensor information, or for controlling actuators connected to the
device. Resources also include the software components that enable network access for
the device.
• Controller Service: Controller service is a native service that runs on the device and
interacts with the web services. Controller service sends data from the device to the web
service and receives commands from the application (via web services) for controlling
the device.
• Database: Database can be either local or in the cloud and stores the data generated by
the IoT device.
• Web Service: Web services serve as a link between the IoT device, application, database
and analysis components. Web service can be implemented using HTTP and REST
principles (REST service) or using the WebSocket protocol (WebSocket service).
• Analysis Component: This is responsible for analyzing the IoT data and generating
results in a form that is easy for the user to understand.
• Application: IoT applications provide an interface that the users can use to control and
monitor various aspects of the IoT system. Applications also allow users to view the
system status and the processed data.

IoT Level-1:
• A level-1 IoT system has a single node/device that performs sensing and/or actuation,
stores data, performs analysis and hosts the application.

MRITS/ECE/IV-I 17
INTERNET OF THINGS – LECTURE MATERIAL

• Level-1 IoT systems are suitable for modelling low-cost and low-complexity solutions
where the data involved is not big and the analysis requirements are not computationally
intensive.

Example -Home Automation System:

MRITS/ECE/IV-I 18
INTERNET OF THINGS – LECTURE MATERIAL

IoT Level-2:
• A level-2 IoT system has
a single node that
performs sensing and/or
actuation and local
analysis.
• Data is stored in the cloud and the application is usually cloud-based.
• Level-2 IoT systems are suitable for solutions where the data involved is big; however,
the primary analysis requirement is not computationally intensive and can be done
locally.

Example-Smart Irrigation:

MRITS/ECE/IV-I 19
INTERNET OF THINGS – LECTURE MATERIAL

IoT Level-4:
• A level-4 IoT system has multiple nodes that perform local analysis. Data is stored in the
cloud and the application is cloud-based.
• Level-4 contains local and cloud-based observer nodes which can subscribe to and
receive information collected in the cloud from IoT devices.
• Level-4 IoT systems are suitable for solutions where multiple nodes are required, the data
involved is big and the analysis requirements are computationally intensive.

MRITS/ECE/IV-I 20
INTERNET OF THINGS – LECTURE MATERIAL

Example-Noise Monitoring:

IoT Level-5:
• A level-5 IoT system has multiple end nodes and one coordinator node.

MRITS/ECE/IV-I 21
INTERNET OF THINGS – LECTURE MATERIAL

• The end nodes perform sensing and/or actuation.


• The coordinator node collects data from the end nodes and sends it to the cloud.
• Data is stored and analyzed in the cloud and the application is cloud-based.
• Level-5 IoT systems are suitable for solutions based on wireless sensor networks, in
which the data involved is big and the analysis requirements are computationally
intensive.

IoT Level-6:
• A level-6 IoT system has multiple independent end nodes that perform sensing and/or
actuation and send data to the cloud.
• Data is stored in the cloud and the application is cloud-based.
• The analytics component analyzes the data and stores the results in the cloud database.
• The results are visualized with the cloud-based application.
• The centralized controller is aware of the status of all the end nodes and sends control
commands to the nodes.

MRITS/ECE/IV-I 22
INTERNET OF THINGS – LECTURE MATERIAL

DOMAIN SPECIFIC IoTs

1) Home Automation:

a) Smart Lighting: helps in saving energy by adapting the lighting to the ambient conditions and
switching on/off or diming the light when needed.
b) Smart Appliances: make the management easier and also provide status information to the
users remotely.
c) Intrusion Detection: use security cameras and sensors (PIR sensors and door sensors) to detect
intrusion and raise alerts. Alerts can be in the form of SMS or email sent to the user.
d) Smoke/Gas Detectors: Smoke detectors are installed in homes and buildings to detect smoke
that is typically an early sign of fire. Alerts raised by smoke detectors can be in the form of
signals to a fire alarm system. Gas detectors can detect the presence of harmful gases such as
CO, LPG etc.,

MRITS/ECE/IV-I 23
INTERNET OF THINGS – LECTURE MATERIAL

2) Cities:
a) Smart Parking: make the search for parking space easier and convenient for drivers. Smart
parking are powered by IoT systems that detect the no. of empty parking slots and send
information over internet to smart application back ends.
b) Smart Lighting: for roads, parks and buildings can help in saving energy.
c)Smart Roads: Equipped with sensors can provide information on driving condition, travel time
estimating and alert in case of poor driving conditions, traffic condition and accidents.
d) Structural Health Monitoring: uses a network of sensors to monitor the vibration levels in the
structures such as bridges and buildings.
e) Surveillance: The video feeds from surveillance cameras can be aggregated in cloud based
scalable storage solution.
f) Emergency Response: IoT systems for fire detection, gas and water leakage detection can help
in generating alerts and minimizing their effects on the critical infrastructures.

3) Environment:
a) Weather Monitoring: Systems collect data from a no. of sensors attached and send the data to
cloud based applications and storage back ends. The data collected in cloud can then be analyzed
and visualized by cloud based applications.
b) Air Pollution Monitoring: System can monitor emission of harmful gases (CO2, CO, NO,
NO2 etc.,) by factories and automobiles using gaseous and meteorological sensors. The collected
data can be analyzed to make informed decisions on pollutions control approaches.
c) Noise Pollution Monitoring: Due to growing urban development, noise levels in cities have
increased and even become alarmingly high in some cities. IoT based noise pollution monitoring
systems use a no. of noise monitoring systems that are deployed at different places in a city. The
data on noise levels from the station is collected on servers or in the cloud. The collected data is
then aggregated to generate noise maps.
d) Forest Fire Detection: Forest fire can cause damage to natural resources, property and human
life. Early detection of forest fire can help in minimizing damage.
e) River Flood Detection: River floods can cause damage to natural and human resources and
human life. Early warnings of floods can be given by monitoring the water level and flow rate.
IoT based river flood monitoring system uses a no. of sensor nodes that monitor the water level
and flow ratesensors.

4) Energy:
a) Smart Grids: is a data communication network integrated with the electrical grids that collects
and analyze data captured in near-real-time about power transmission, distribution and
consumption. Smart grid technology provides predictive information and recommendations to
utilities, their suppliers, and their customers on how best to manage power. By using IoT based

MRITS/ECE/IV-I 24
INTERNET OF THINGS – LECTURE MATERIAL

sensing and measurement technologies, the health of equipment and integrity of the grid can be
evaluated.
b) Renewable Energy Systems: IoT based systems integrated with the transformers at the point
of interconnection measure the electrical variables and how much power is fed into the grid. For
wind energy systems, closed-loop controls can be used to regulate the voltage at point of
interconnection which coordinate wind turbine outputs and provides power support.
c) Prognostics: In systems such as power grids, real-time information is collected using
specialized electrical sensors called Phasor Measurment Units (PMUs) at the substations. The
information received from PMUs must be monitored in real-time for estimating the state of the
system and for predicting failures.

5) Retail:
a) Inventory Management: IoT systems enable remote monitoring of inventory using data
collected by RFID readers.
b) Smart Payments: Solutions such as contact-less payments powered by technologies such as
Near Field Communication (NFC) and Bluetooth.
c) Smart Vending Machines: Sensors in a smart vending machines monitors its operations and
send the data to cloud which can be used for predictive maintenance.

6) Logistics:
a) Route generation & scheduling: IoT based system backed by cloud can provide first response
to the route generation queries and can be scaled up to serve a large transportation network.
b) Fleet Tracking: Use GPS to track locations of vehicles in real-time.
c) Shipment Monitoring: IoT based shipment monitoring systems use sensors such as temp,
humidity, to monitor the conditions and send data to cloud, where it can be analyzed to detect
food spoilage.
d) Remote Vehicle Diagnostics: Systems use on-board IoT devices for collecting data on Vehicle
operations (speed, RPM etc.,) and status of various vehicle subsystems.

7) Agriculture:
a) Smart Irrigation: to determine moisture amount in soil.
b) Green House Control: to improve productivity.

8) Industry:
a)Machine diagnosis and prognosis
b) Indoor Air Quality Monitoring

MRITS/ECE/IV-I 25
INTERNET OF THINGS – LECTURE MATERIAL

9) Health and Life Style:


a) Health & Fitness Monitoring
b) Wearable Electro

MRITS/ECE/IV-I 26

You might also like