Unit 1 Notes
Unit 1 Notes
UNIT -1
Fundamentals of IoT
Dr SUNIL KUMAR
[email protected]
Aassistant Professor
School of Computing & Intelligent Systems
Department of IoT & IS
Manipal University, Dehmi Kalan, Jaipur Rajasthan
Syllabus
Fundamentals of IoT:
Introduction, Definitions & Characteristics of IoT, Evolution IoT, IoT Architectures,
Physical & Logical Design of IoT, IoT frameworks.
∙ Self-configuring:
I.IoT devices can be able to upgrade the software with minimal intervention of user, whenever
they are connected to the internet.
II.They can also setup the network i.e a new device can be easily added to the existing network.
ex: Whenever there will be free wifi access one device can be connected easily.
Characteristics of IoT
∙ Interoperable Communication: IoT allows different devices (different in architecture) to
communicate with each other as well as with different network.
ex: MI Phone is able to control the smart AC and smart TV of different manufacturer.
∙ Unique identities:
I. The devices which are connected to the internet have unique identities i.e IP address through which
they can be identified throughout the network.
II.The IoT devices have intelligent interfaces which allow communicating with users. It adapts to the
environmental contexts.
III.It also allows the user to query the devices, monitor their status, and control them remotely, in
association with the control, configuration and management infrastructure.
Characteristics of IoT
∙ Integrated into information network:
I. The IoT devices are connected to the network to share some information with other connected
devices. The devices can be discovered dynamically in the network by other devices.
ex. If a device has wifi connectivity then that will be shown to other nearby devices having wifi
connectivity.
II.The devices SSID will be visible through out the network. Due to these things the network is
also called as information network.
III.The IoT devices become smarter due to the collective intelligence of the individual devices in
collaboration with the information network.
Ex: weather monitoring system. Here the information collected from different monitoring nodes
(sensors, arduino devices) can be aggregated and analysed to predict the weather.
Benefits of IoT
Benefits of IoT
I. Real time Information.
VIII.IoT encourages companies to rethink the ways they approach their business, industries,
markets and can also improve their strategists
Physical Design of IoT
Things in IoT
∙ Things refers to the devices which have unique identities and can
perform remote sensing, actuating & monitoring capabilities.
∙ SD: SD cards are a type of flash memory card that are small and non-volatile. They were introduced
in 1999 by SanDisk, Panasonic, and Toshiba as an improvement on MMCs. SD cards are used in
many consumer devices, such as mobile phones, digital cameras, and video game consoles
∙ MMC: MMCs can be used in many of the same devices as SD cards, such as digital cameras,
cellular phones, and digital audio players. MMCs can be up to 16 gigabytes in size and can be easily
removed for access by a PC using an MMC reader.
∙ SDIO: Secure Digital Input/Output, is a communication interface that allows devices to connect to
an SD card and exchange data. It was introduced in 2001 as an extension to the SD card standard,
which was originally developed for storing and transferring data in portable devices.
Things in IoT
∙ UART: Universal Asynchronous Receiver Transmitter (UART) is a hardware protocol that allows two
devices to exchange serial data using two wires. It's a popular choice for communication between
devices in embedded systems, microcontrollers, and computers.
∙ SPI: stands for Serial Peripheral Interface, a communication protocol that enables fast,
synchronous data transfer between a controller and a peripheral device. It's commonly used in
embedded systems for short-distance wired communication between integrated circuits.
∙ I2C: or Inter-Integrated Circuit, is a serial communication protocol that allows multiple devices to
communicate with each other over a two-wire interface
∙ CAN: stands for Control Area Network, which is a serial communication protocol that allows
devices to exchange data efficiently and reliably.
IoT Protocols and Standards for IoT Ecosystem
Smart connected IoT devices are more vulnerable to threats. And to minimize these
security loopholes it’s important to use the right protocols.
IoT communication protocols are modes of communication that ensure optimum security
to the data being exchanged between IoT connected devices.
The IoT devices can be connected via an IP network or a non-IP network. Though there
is a difference in their connectivity range, power, and memory used.
Connections through IP networks are complex, and take high memory and power from the
IoT devices while the range is not a problem. On the other hand, non-IP networks like
Bluetooth require less memory and power but have a range limitation.
Why there’s need of IoT protocols?
For every interaction between devices, there is a need for a medium; preferably a common language that all the
devices in the given IoT ecosystem would be able to understand.
This very medium is provided by the IoT protocols. And a standardized communication protocol brings these key
benefits:
Global scalability-
Every scaling business wants to adopt IoT connectivity that can be implemented globally. And standard
communication protocols ensure universal connectivity while minimizing the installation complexity
Types of IoT Protocols
IoT Network Protocols –
IoT network protocols are designed to connect
medium to high power devices over the network.
IoT network protocols allow data communication
within the scope of the network. HTTP, LoRaWAN,
bluetooth, zigbee are some of
the popular IoT Network protocols.
∙ Link layer
∙ Network/Internet layer
∙ Transport Layer
∙ Application Layer
Link Layer Protocol
∙ It determines how the data is physically sent over the network’s physical layer.
∙ Hosts on the same link exchange data packets over the link layer protocols.
∙ This layer determines how the packets are coded and signalled by the hardware
device over the medium to which the host is attached.
∙ The datagrams contain the source & destination addresses which are used to route them from source to
destination across multiple network.
∙ IP protocols establish connections on packet networks, but do not guarantee delivery of packets.
∙ It provides functions as
o Error control
o Segmentation
o Flow control
o Congestion control
Transport Layer Protocol - TCP
∙ Transmission Control Protocol
∙ Used for
o Web browser (HTTP)
o Email programs (SMTP)
o File transfer (FTP)
∙ Error detection capability: discard duplicate packets & retransmit lost packets
∙ Flow control capability: rate at which the sender sends data is not too high for the receiver to
process.
∙ Congestion control capability: avoid network congestion and collapse that leads to degradation of
network performance
Transport Layer Protocol - UDP
∙ User Datagram Protocol
∙ Connectionless, transaction oriented and stateless protocol
∙ Useful for time sensitive applications that have very small data units to exchange
and do not want the overhead of connection setup.
o Ordering of message
o Duplicate elimination
Application Layer Protocol - HTTP
Define how the applications interface with lower layer protocols to send the data
over the network. The application data, typically in files, is encoded by the
application layer protocol and encapsulated in the transport layer protocol.
Which provides connection or transaction oreiented communication over the
network
Stateless protocol
Each HTTP request is independent of other
∙ Full duplex communication over a single socket connection for sending messages
between client and server.
∙ Based on TCP
∙ Allows stream of messages to be sent back or forth between the client and server
while keeping the TCP connection open
the brokers.
broker.
∙ Queues:
Act as a buffer.
∙ It is a statefull connection.
REQUEST RESPONSE
COMMUNICATION WITH REST APIs MODEL USED BY REST
REST ARHITECTURAL CONSTRIANTS
∙ Layered system:
It constrains the behaviour of components such that each component cannot see beyond the
immediate layer with which they are interacting.
Example : a client cannot tell if it is directly connected to server or intermediatory along the way
∙ Uniform interface:
It emphasis that the method of communication between client and server must be uniform.
Resources identified in the request & are themselves separate from the representation of the
resources that are returned to the client.
∙ Code on demand:
Server can provide executable code or scripts for clients to execute in their context.
REST- BASED COMMUNICATION APIs
WEBSOCKET BASED COMMUNICATION APIs
∙ It allows bi-directional, full duplex communication
between client and server.
3. Edge IT
∙ The process starts with sensors and actuators, the connected devices that monitor (in the case of
sensors) or control (in the case of actuators) some “thing” or physical process.
∙ In some cases, a sensor might detect a condition or event that requires an almost immediate response
so that an actuator can perform remediation actions in real time, for example, adjusting the flow rate
of a fluid, or the movements of an industrial robot.
∙ To avoid the delay of a round-trip of data to the server, analysis of data to determine failure and
sending of control to the “thing”, this critical processing is performed in close proximity to the process
being monitored or controlled.
Stage 2– Internet Gateways and Data Acquisition
Systems
∙ A data acquisition system (DAS) collects raw data from the sensors and converts it from analog into
digital format.
∙ The DAS then aggregates and formats the data before sending it through an Internet gateway via
wireless WANs (such as Wi-Fi or Cellular) or wired WANs for the next stage of processing.
∙ The quantities can be huge, especially, for example, in a factory setting where hundreds of sensors
may be gathering data simultaneously.
∙ For that reason, the data is also filtered and compressed to an optimum size for transmission.
Stage 3– Pre-processing: Analytics at the Edge
∙ Once the IoT data has been digitized and aggregated, it will need processing to further reduce the
data volume before it goes to the data center or cloud.
∙ The edge device may perform some analytics as part of the pre-processing.
∙ Machine learning can be very helpful at this stage to provide feedback into the system and improve
the process on an ongoing basis, without waiting for instructions to come back from the corporate
data center or cloud.
∙ Processing of this type will generally take place on a device in a location close to where the sensors
reside, such as in an on-site wiring closet.
Stage 4– In-depth Analysis in the Cloud or Data Center
∙ At Stage 4, systems can be brought to bear to analyze, manage, and securely store the data.
∙ This usually takes place in the corporate data center or in the cloud, where data from multiple field
sites/sensors can be combined to provide a broader picture of the overall IoT system and deliver actionable
insights to both IT and business managers.
∙ A company may have operations in different geographies and IoT data can be analyzed to identify key
trends and patterns, or to spot anomalies.
∙ At this level, industry-specific and/or company-specific applications can be used to perform in-depth
analysis and apply business rules to determine whether action needs to be taken.
∙ The incoming data may indicate desirable changes to device settings or other ways to optimize the process,
forming a loop that facilitates constant improvement.
∙ Stage 4 also includes storage in a data warehouse, both for record keeping and for further analysis.
IoT Framework
IoT Framework
∙ IoT (Internet of Things) is a network of devices which are connected to the internet
for transferring and sensing the data without much human intervention and the
frame work is used to achieve this.
∙ The framework has required capabilities for the cloud support and other needs
which is needed to satisfy the IoT technology.
∙ It allows device management, handles communication protocols on software and
hardware, collects / analyses information, improves information flow and intelligent
apps functionality.
IoT Framework - KAA IoT
∙ KAA IoT is one of the most effective and rich Open Source Internet of Things Cloud
Platforms, where anyone can freely implement their smart product concepts.
∙ It can monitor the machine in actual time by providing and configuring remote
devices.
∙ KAA enables information exchange between linked devices, the IoT Cloud,
information and visualization systems, as well as other elements of IoT Ecosystems.
IoT Framework - Cisco IoT Cloud Connect
∙ Cisco IoT Cloud Connect provides robust, automated, and highly secure connectivity
for the enterprise.
∙ IoT data management is done by the Cisco Kinetic IoT platform to extract, move and
compute the data.
∙ As Cisco is very famous for its security services, it protects IoT deployment against
threats with a secure IoT architecture.
IoT Framework - ZETTA IoT
∙ Zetta is nothing but a server-oriented platform developed based on the REST,
NodeJS, and the Siren hypermedia-API-strip flow-based reactive programming
philosophy.
∙ After being abstracted as REST APIs they are connected with cloud services.
∙ These internet services include tools for visualizing machine analytics and support
such as Splunk.
∙ Many businesses now develop their apps or migrate to Salesforce on the Salesforce platform.
∙ This has raised demand for developers and administrators from Salesforce.
IoT Framework - DeviceHive IoT
∙ DeviceHive is another rich IoT open-source platform that is distributed under the
Apache 2.0 license and can be used and changed free of charge.
∙ It provides deployment options for Docker and Kubernetes and can be downloaded
and used both by public and personal cloud.
∙ You can run batch analysis and machine learning above and beyond your device
information.
∙ Oracle supports the processing and builds large-scale IoT networks with very wide
data.
∙ The use of advanced security systems to protect IoT systems against external
threats is another worth mentioning.
∙ Since these systems usually have different devices, some of which have no security
tool, it is not sufficiently justifiable to implement centralized security measures.
IoT Framework - SAP IoT
∙ The SAP Internet of Things cloud platform has everything you need to build and
handle an IoT application.
∙ The Microsoft Azure IoT Suite provides preconfigured solutions and the ability to
personalize and develop new solutions to meet the project requirements.
∙ The strongest safety mechanisms, superb scalability and simple integration with
your current or future systems are achieved through Microsoft Azure Internet of
thing Suite.
IoT Framework - Google Cloud Platform
∙ Google Cloud is one of the best IoT systems available today with its end-to-end
platform.
∙ Google stands out from the others because it can process the large quantity of
information using Cloud IoT Core.
∙ Due to Google’s Cloud Data Studio and Big Query you get advanced analysis.
IoT Framework - IBM Watson
∙ IBM Watson is very popular among the internet of thing platform among developers.
∙ The Bluemix hybrid cloud-supported Watson IoT platform allows developers to use
IoT-applications easily.
∙ IBM Watson manages the secure communication and also data storage.
∙ Real-time data exchange also is done by IBM Watson.
IoT Framework - Hewlett Packard Enterprise
∙ Hewlett Packard Enterprise’s universal business platform offers scalability for its customers
by offering solutions to most of their problems.
∙ The data monetization of several businesses has been carried out by HPE.
∙ Hewlett Packard Enterprise Collects analyzes information in order to grow the company.
∙ In the Hewlett Packard Enterprise M 2 M device management in Single point, Single seller.
IoT Framework - DataV by Bsquare
∙ Bsquare takes its services seriously and has introduced the DataV application, the
hybrid framework for managing IoT services.
∙ It offers a variety of services that predict and analyze all of your ecosystem
problems.
∙ The cost-efficient platform allows you to connect all your appliances to a cloud
solution.
∙ In accordance with the DIn ISO / IEC 27001 standard, Siemens claims every stored
information is strictly confidential.
∙ In addition to the Ayla agile platform, AMAP is an agile mobile app platform from
Ayla that develops and guides consumers through app development.
IoT Framework - MBED
∙ The open-source service is available on the Apache 2.0 Arm MBED computer
platform.
∙ It involves cloud services, developer tools, and operating systems, that facilitate the
creation and operation of business goods.
∙ There are so many other services such as Regions, Availability Zones, and Virtual Private
Clouds (VPCs).
∙ It helps to ease out the improving durability, distribution, availability of the application.
∙ It provides Registry for recognizing devices, Secure Device Gateway, Compatible Software
Development Kit for devices which AWS partnered with H W manufacturers like Intel,
Texas Instruments, Broadcom and Qualcomm.
IoT Framework - RTI
∙ RTI is one of the IoT platforms that is the oldest and most pioneering provider and
also it is the most influent industrial of the internet of thing firm.
∙ Connext DDS is built especially for smart computers and their corresponding cyber-
physical systems.
∙ Connext DDS does not require response brokers, directory services, servers, as well
as administration, unlike messaging middleware designed mainly for IT systems.
Thank You