0% found this document useful (0 votes)
87 views

IOT Based System Design Unit I

Uploaded by

dhanush23022004
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views

IOT Based System Design Unit I

Uploaded by

dhanush23022004
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY

INTRODUCTION TO IoT In 1990 John Romkey developed a toaster that could be turned on and off over the
Internet. It was a toaster wired to the computer as there was no Wi-Fi then!! This toaster is
Internet of things (IoT) is more than device to device communication, it is a collection of many
considered to be the first IoT device – the first “thing” that began Internet of Things.
services, objects, humans and devices that are interconnected that can communicate as well share
data and information in order to attain a common goal in different areas and applications. Kevin The next milestone in development of IoT came in 1999 when Kevin Ashton, current
Ashton coined INTERNET OF THINGS (IoT) and defined in various ways. Executive Director of the Auto-ID Labs, coined the term internet of things. In March 2008, the

 A phenomenon which connects a Variety of things – Everything that Has the ability to first IoT conference was held in Zurich. It brought together researchers and practitioners from

communicate both academia and industry to facilitate sharing of knowledge. In the same year, the US National
Intelligence Council included the Internet of Things as one of the six disruptive civil
 A global network infrastructure, linking physical and virtual objects through the
technologies. Cisco Internet Business Solutions Group (CIBSG) said that internet of things can
exploitation of data capture and communication capabilities
truly be said to be born between 2008 and 2009 when the number of things connected to the
 A global infrastructure for the information society, enabling advanced services by
internet exceeded the number of people connected to it. CIBSG calculated that the things to
interconnecting (physical and virtual) things based on, existing and evolving,
people ratio grew from approximately 0.8 in 2003 to 1.84 in 2010. Fig.1.1 depicts the Evolution
interoperable information and communication technologies
of IoT.
Goal of IoT:
 Connect the unconnected
 Objects that are not currently joined to a computer Network-Internet, will be
connected so that they can communicate and interact with people and other
objects.
 IoT is a technology transition in which the devices will allow us to sense and
control the physical world by making objects smarter and connecting them through an
intelligent network.
 When objects and machines can be sensed and controlled remotely by across a network, a
tighter integration between physical world and computers are enabled. This allows
enablement of advanced applications.

Evolution of IoT:

ARPANET was the first connected network – granddad of the Internet as we know it today. The
history of IoT starts with ARPANET. In 1989 Tim Berners Lee proposed the framework of
world wide web, which laid the foundation of the Internet.

Fig.1.1 Evolution of IoT

CEC368 IOT BASED SYSTEMS DESIGN CEC368 IOT BASED SYSTEMS DESIGN
ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY

Self-configuring:

Definition of IoT(Internet of Things):  IoT devices can be able to upgrade the software with minimal intervention of user,
whenever they are connected to the internet.
The IoT can be defined in two ways based on
 They can also setup the network i.e a new device can be easily added to the existing
 existing Technology
network. For ex: Whenever there will be free wifi access one device can be connected
 Infrastructure
easily.
Definition of IoT based on existing technology: IoT is a new revolution to the internet due to
Interoperable Communication:
the advancement in sensor networks, mobile devices, wireless communication, networking and
IoT allows different devices (different in architecture) to communicate with each other as well as
cloud technologies.
with different network. For ex: MI Phone is able to control the smart AC and smart TV of
Definition of IoT based on infrastructure: IoT is a dynamic global network infrastructure of
different manufacturer.
physical and virtual objects having unique identities, which are embedded with software,
Unique identities:
sensors, actuators, electronic and network connectivity to facilitate intelligent applications by
collecting and exchanging data.  The devices which are connected to the internet have unique identities i.e IP address
through which they can be identified throughout the network.
 The IoT devices have intelligent interfaces which allow communicating with users. It
Characteristics of IoT:
adapts to the environmental contexts.
Various characteristics of IoT are:  It also allows the user to query the devices, monitor their status, and control them
remotely, in association with the control, configuration and management infrastructure.
 Dynamic and self-adapting
Integrated into information network:
 Self-configuring
 Interoperable Communication protocols  The IoT devices are connected to the network to share some information with other
 Unique identity connected devices. The devices can be discovered dynamically in the network by other
 Integrated into information network devices. For ex. If a device has wifi connectivity, then that will be shown to other nearby
devices having wifi connectivity.

Dynamic and self-adapting: The IoT devices can dynamically adapt with sensed environment,  The devices ssid will be visible though out the network. Due to these things the network

their operating conditions, and user’s context and take actions accordingly. For ex: Surveillance is also called as information network.

System.  The IoT devices become smarter due to the collective intelligence of the individual
devices in collaboration with the information network. For Ex: weather monitoring
system. Here the information collected from different monitoring nodes (sensors, arduino
devices) can be aggregated and analysed to predict the weather.

CEC368 IOT BASED SYSTEMS DESIGN CEC368 IOT BASED SYSTEMS DESIGN
ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY

Web 3.0 view of IoT • Sub-search engine pull feeds automatically for you
• High level of personalized vocabularies and structure
• Micro formats
Web 3.0 describes the next evolution of the World Wide Web, the user interface that provides
• Define semantic vocabularies by user
access to documents, applications and multimedia on the internet. Web 3.0 will place a strong
• Variety of options: RDF, XML, XFN
emphasis on decentralized applications and probably make extensive use of block chain-based
• Bridge the gap between understandings by human and machine
technologies. It also uses machine learning and AI to empower a more intelligent and adaptive
web.

web3 in IoT is a network that runs an application on decentralized, community-powered


networks and aims to give back ownership to its users. Web 3.0 aims at democratization of the
internet by allowing users to regain control of their personal data. At the same time, IoT aims to
connect almost everything around us to the internet, thereby dissolving the barrier between
physical and virtual worlds.

Web 3.0 Machine Centric Web

• Services that emphasize a machine facilitated understanding of information on the web


• Semantic Web-Publishing in languages specified for data
 Resource Description Framework(RDF)
 Web Ontology Language(WOL)
 Extensible Markup Language (XML)
• Development of web 3.0 focuses on adding metadata or information to describe the
content of web
 Provide an intelligent level to the website
 Enable the user to communicate completely with the machine
 Enables machines to communicate with each other

Pillars of Web 3.0

• Tagging
• Adding meta data to index and describe resource
• Web 3.0 allows not only text search, but also images, audio and video

CEC368 IOT BASED SYSTEMS DESIGN CEC368 IOT BASED SYSTEMS DESIGN
ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY

IoT Enabling Technologies 2. On demand: we invoke cloud services only when we need them, they are not permanent part
of IT infrastructure.
3. Pay as you go model: You pay for the cloud services when you use them, either for the short
The technologies which are cooperative with IoT those are as follows. period of time or longer duration (for cloud based storage).
• Wireless sensor networks 4. Cloud provides various services such as
• Cloud computing i. IAAS: Infrastructure as a service
• Big Data analytics Instead of creating a server room we will hire it from a cloud service provider. Here
• Embedded systems user will not use its local computer, storage and processing resources rather it will use
virtual machine and virtual storage, servers, networking of third party. Here the client
• Communication protocols can deploy the OS (operating system), application of his own choice. User can start,
stop, configure and manage the virtual machine instances and virtual storage.

Wireless Sensor networks: ii. PAAS: Platform as a service


User can develop and deploy applications. For ex. We are using various online editors
1. Wireless sensor network comprises of distributed devices, wireless sensors. These devices
to write codes like online arduino IDE, C IDE, APIs, software libraries. Here we
with sensors are used to monitor the environment and physical conditions. Since all the nodes are
don’t need to install anything. The cloud service provider will manage servers,
wireless so they communicate with each other through wifi or Bluetooth.
network, OS and storage. The users will develop, deploy, configure and manage
2. A WSN consists of several end nodes and routers as well as coordinator. applications on the cloud infrastructure.
3. Sensors are attached with end nodes. Each router can also be called as end node. iii. SAAS: Software as a service
4. Routers are responsible for routing the data packets from end nodes to the coordinator nodes. It provides complete software application or the user interface to the application
Coordinator node connects the WSN to the internet. The Coordinator node can be another itself. The user is not concerned about the underlying architecture of cloud only
arduino, raspberry pi or any other IoT DIY device. 5. It collects the data from all the nodes. service provider is responsible for this. It is platform independent and can be accessed
from various client devices such as workstation, laptop, tablet and smart phone,
6. WSNs are enabled by wireless communication protocols such as IEEE802.15.4. 7. It can also running different OS. Ex: The online software we use like online image converter,
be enabled by ESP 8266 and ZigBee. doc converter etc.
8. ZigBEE Bluetooth module is based on IEEE802.15.4. It operates at 2.4 GHz frequency. It
offers data rate up to 250 KB/s and ranges from 10 to 100 meters depending upon power output
and environmental conditions. In WSN the devices can reconfigure themselves i.e new nodes can Big data analytics:
be added to the networks and software can be updated automatically whenever they will be Big data refers to large amount of data which cannot be stored, processed and analysed using
connected to the internet. traditional database like (oracle, mysql) and traditional processing tools. In big data analytics
9. Ex. of Wireless sensor network: Weather monitoring system, Indoor air quality monitoring, BIG refers to 5 Vs.
soil moisture monitoring, surveillance system, smart grids, machine prognosis and diagnosis. • Volume
• Velocity
Cloud Computing: • Variety
1. It is an emerging technology which enables on-demand network access to computing • Veracity
resources like network servers, storage, applications and services that can be rapidly provisioned
and released. • Value

CEC368 IOT BASED SYSTEMS DESIGN CEC368 IOT BASED SYSTEMS DESIGN
ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY

Volume: volume refers to the massive amount of data generated from the IoT systems. There is Embedded Systems:
no threshold value for generated data. It is difficult to store, process and analyse using traditional
 An embedded system is a computer system that has hardware and software embedded to
database and processing tools. Ex: The volume of data generated by modern IT, industrial and
healthcare system. perform specific task.
 The key components of an embedded system include microprocessor or micro controller,

Velocity: The rate at which the data is generated from the IoT system. This is the primary reason memory (RAM, ROM, Cache), networking units (Ethernet, Wi-Fi adapter), input/output
for the exponential growth of data. Velocity refers to how fast the data is generated and how units (display, keyboard, etc) and storage (flash memory). They use some special types of
frequently it varies. Ex: Modern IT, industrial and other systems like social networking sites are
processor such as digital signal processor, graphics processor and application specific
generating data at increasingly higher speed.
processor). Embedded system uses embedded OS like RTOS.
 Ex. of embedded systems: digital watch, digital camera, vending machines.
Variety: Variety refers to different forms of data. Since there is various domain of IoT so
various type of data is generated from different IoT domain. Those data are called as sparse data.
Those data include text, audio, video etc.. The variety of data is mainly divided into 3 types i.e. Communication protocols:
 structured  Protocol is nothing but rules and regulations. Communication protocol is the backbone of
 semi structured the IoT system.
 unstructured  It allows interoperability among various devices. It enables network connectivity and
Structured data: The data which has a fixed format to be stored is known as structured data. The coupling to applications.
data stored in database like oracle, mysql is an example of structured data. With a simple query  It allows devices to exchange data over the network. These protocols define data
data can be retrieved from the database.
exchange format, data encoding, addressing schemes for devices and routing of packets
Semi-structured data: The data which has not a fixed format to be stored but uses some elements
from source to destination. It also includes sequence control, flow control and
and components through which they can be analyzed easily is known as semi structured data. Ex:
HTML, XML, JSON data retransmission of lost packets.

Unstructured data: The data which has not any fixed format. It is difficult to store and analyse. It
can be analyzed after converting into structured data. Ex: Audio, video (gif, audio with lyrics),
Text (containing special symbols).

Veracity: The data in doubt is known as veracity. Sometimes what happen it is very difficult
accept the data stored in database. This happens due to typical error, corrupted storage or data.
Value: It is efficient to access big data if we can turn it into values i.e we can find greater
insights from it so that we can perform some action to get the desired output. This will be
beneficial for the organisation. Otherwise it has no use.

CEC368 IOT BASED SYSTEMS DESIGN CEC368 IOT BASED SYSTEMS DESIGN
ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY

Fog, Edge and Cloud in IoT

Fog Computing

The solution to the challenges in IoT is to distribute data management throughout the IoT system, as
close to the edge of the IP network as possible. The best-known embodiment of edge services in IoT is
fog computing. Any device with computing, storage, and network connectivity can be a fog node.
Examples include industrial controllers, switches, routers, embedded servers, and IoT gateways.
Analyzing IoT data close to where it is collected minimizes latency, offloads gigabytes of network
traffic from the core network, and keeps sensitive data inside the local network.

Fog services are typically accomplished very close to the edge device, sitting as close to the IoT
endpoints as possible. One significant advantage of this is that the fog node has contextual awareness
of the sensors it is managing because of its geographic proximity to those sensors. For example, there
might be a fog router on an oil derrick that is monitoring all the sensor activity at that location. Because
the fog node is able to analyze information from all the sensors on that derrick, it can provide contextual
analysis of the messages it is receiving and may decide to send back only the relevant information over Fig.1.3 Fog computing
the backhaul network to the cloud. In this way, it is performing distributed analytics such that the
volume of data sent upstream is greatly reduced and is much more useful to application and analytics The defining characteristic of fog computing are as follows:
servers residing in the cloud. Contextual location awareness and low latency: The fog node sits as close to the IoT endpoint as
possible to deliver distributed computing.

Geographic distribution: In sharp contrast to the more centralized cloud, the services and applications
targeted by the fog nodes demand widely distributed deployments.
Deployment near IoT endpoints: Fog nodes are typically deployed in the presence of a large number
of IoT endpoints. For example, typical metering deployments often see 3000 to 4000 nodes per
gateway router, which also functions as the fog computing node.
Wireless communication between the fog and the IoT endpoint: Although it is possible to connect
wired nodes, the advantages of fog are greatest when dealing with a large number of endpoints, and
wireless access is the easiest way to achieve such scale.

Use for real-time interactions: Important fog applications involve real-time interactions rather than
CEC368 IOT BASED SYSTEMS DESIGN CEC368 IOT BASED SYSTEMS DESIGN
ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY

batch processing. Pre-processing of data in the fog nodes allows upper-layer applications to perform Edge Computing
batch processing on a subset of the data.
Fog computing solutions are being adopted by many industries, and efforts to develop distributed
applications and analytics tools are being introduced at an accelerating pace. The natural place for a

Advantages of fog computing in IoT fog node is in the network device that sits closest to the IoT endpoints, and these nodes are typically
spread throughout an IoT network. However, in recent years, the concept of IoT computing has been
The fogging approach has many benefits for the Internet of Things, Big Data, and real-time pushed even further to the edge, and in some cases it now resides directly in the sensors and IoT
analytics. The main advantages of fog computing over cloud computing are as follows: devices.
Some new classes of IoT endpoints have enough compute capabilities to perform at least
o Low latency - Fog tends to be closer to users and can provide a quicker response.
low-level analytics and filtering to make basic decisions. For example, consider a water sensor
o There is no problem with bandwidth - pieces of information are aggregated at separate
on a fire hydrant. While a fog node sitting on an electrical pole in the distribution network may
points rather than sent through a channel to a single hub.
have an excellent view of all the fire hydrants in a local neighborhood, a node on each hydrant
o Due to the many interconnected channels - loss of connection is impossible. would have clear view of a water pressure drop on its own line and would be able to quickly
o High Security - because the data is processed by multiple nodes in a complex distributed generate an alert of a localized problem.
system.
Another example is in the use of smart meters. Edge compute–capable meters are able to
o Improved User Experience - Quick responses and no downtime make users satisfied. communicate with each other to share information on small subsets of the electrical distribution
o Power-efficiency - Edge nodes run power-efficient protocols such as Bluetooth, Zigbee, grid to monitor localized power quality and consumption, and they can inform fog node of events
or Z-Wave. that may pertain to only tiny sections of the grid. Models such as these help ensure the highest
quality of power delivery to customers.
Disadvantages of fog computing in IoT

The technology has no obvious disadvantages, but some shortcomings can be named: Cloud computing

o Fog is an additional layer in a more complex system - a data processing and storage The delivery of on-demand computing services is known as cloud computing. We may use
system. applications to store and process power over the Internet. Without owning any computing
o Additional expenses - companies must buy edge devices: routers, hubs, gateways. infrastructure or data center, anyone can rent access to anything from applications to storage
o Limited scalability - Fog is not scalable like a cloud. from a cloud service provider.It is a pay-as-you-go service.By using cloud computing services
and paying for what we use, we can avoid the complexity of owning and maintaining
infrastructure. Cloud computing service providers can benefit from significant economies of
scale by providing similar services to customers.

Cloud computing technology provides a variety of services that are classified into three groups:

CEC368 IOT BASED SYSTEMS DESIGN CEC368 IOT BASED SYSTEMS DESIGN
ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY

o IaaS (Infrastructure as a Service) - A remote data center with data storage capacity, Disadvantages of Cloud for IoT
processing power, and networking resources.
Unfortunately, nothing is spotless, and cloud technology has some drawbacks, especially for
o PaaS (Platform as a Service) - A development platform with tools and components to
Internet of Things services.
build, test, and launch applications.
o SaaS (Software as a Service) - Software tailored to suit various business needs. o High latency - More and more IoT apps require very low latency, but the Cloud cannot
guarantee this due to the distance between client devices and data processing centers.
By connecting your company to the Cloud, you can access the services mentioned above from
o Downtimes - Technical issues and network interruptions can occur in any Internet-based
any location and through various devices.
system and cause customers to suffer from outages; Many companies use multiple
Therefore, availability is the biggest advantage. Plus, there's no need to maintain local servers connection channels with automatic failover to avoid problems.
and worry about downtimes - the vendor supports everything for you, saving you money. o Security and Privacy - your data is transferred via globally connected channels along
with thousands of gigabytes of other users' information; No wonder the system is
Integrating the Internet of Things with the Cloud is an affordable way to do business. Off-
vulnerable to cyber-attacks or data loss; the problem can be partially solved with the help
premises services provide the scalability and flexibility needed to manage and analyze data
of hybrid or private clouds.
collected by connected devices. At the same time, specialized platforms (e.g., Azure IoT Suite,
IBM Watson, AWS, and Google Cloud IoT) give developers the power to build IoT apps Difference between Fog Computing and Cloud Computing:
without major investments in hardware and software.
o In fog computing, data is received from IoT devices using any protocol.
Advantages of Cloud for IoT o Cloud computing receives and summarizes data from different fog nodes.

Since connected devices have limited storage capacity and processing power, integration with Structure:

cloud computing comes to the aid of: o Fog has a decentralized architecture where information is located on different nodes at
the source closest to the user.
o Improved performance - faster communication between IoT sensors and data o There are many centralized data centers in the Cloud, making it difficult for users to
processing systems. access information on the networking area at their nearest source.
o Storage Capacity - Highly scalable and unlimited storage space can integrate, aggregate,
Protection:
and share huge data.
o Fog is a more secure system with different protocols and standards, which minimizes the
o Processing Capabilities - Remote data centers provide unlimited virtual processing chances of it collapsing during networking.
capabilities on demand. o As the Cloud operates on the Internet, it is more likely to collapse in case of unknown
o Low Cost - The license fee is less than the cost of on-premises equipment and its ongoing network connections.
maintenance.

CEC368 IOT BASED SYSTEMS DESIGN CEC368 IOT BASED SYSTEMS DESIGN
ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY ROHINI COLLEGE OF ENGINEERNG AND TECHNOLOGY

Component: o On the other hand, Cloud servers communicate only with IP and not with the endless
o Fog has some additional features in addition to the features provided by the components other protocols used by IoT devices.
of the Cloud that enhance its storage and performance at the end gateway.
Real-time analysis:
o Cloud has different parts such as frontend platform (e.g., mobile device), backend
platform (storage and servers), cloud delivery, and network (Internet, intranet, o Fog computing analyzes the most time-sensitive data and operates on the data in less than
intercloud). a second, whereas cloud computing does not provide round-the-clock technical support.

Accountability: Operating Expenses:

o Here, the system's response time is relatively higher compared to the Cloud as fogging o The license fee and on-premises maintenance for cloud computing are lower than fog
separates the data and then sends it to the Cloud. computing. Companies have to buy edge device routers.
o Cloud service does not provide any isolation in the data while transmitting the data at the
gate, increasing the load and thus making the system less responsive.

Application: Fog Computing vs. Cloud Computing for IoT

o Edge computing can be used for smart city traffic management, automating smart
According to Statista, by 2020, there will be 30 billion IoT devices worldwide, and by 2025 this
buildings, visual Security, self-maintenance trains, wireless sensor networks, etc.
number will exceed 75 billion connected things.
o Cloud computing can be applied to e-commerce software, word processing, online file
storage, web applications, creating image albums, various applications, etc. These tools will produce huge amounts of data that will have to be processed quickly and

Reduces latency: permanently. Fog computing works similarly to cloud computing to meet the growing demand
for IoT solutions.
o Fog computing cascades system failure by reducing latency in operation. It analyzes the
data close to the device and helps in averting any disaster.

Flexibility in Network Bandwidth:

o Large amounts of data are transferred from hundreds or thousands of edge devices to the
Cloud, requiring fog-scale processing and storage.
o For example, commercial jets generate 10 TB for every 30 minutes of flight. Fog
computing sends selected data to the cloud for historical analysis and long-term storage.

Wide geographic reach:

o Fog computing provides better quality of services by processing data from devices that
are also deployed in areas with high network density.

CEC368 IOT BASED SYSTEMS DESIGN CEC368 IOT BASED SYSTEMS DESIGN
Rohini College of Engineering & Technology Department of ECE Rohini College of Engineering & Technology Department of ECE

Functional blocks of an IoT ecosystem • Uniquely identifiable devices with a unique IP address so that they can be easily
identifiable over a large network.
Internet of Things (IoT) ecosystem – a broad network of connected and interdependent devices
• Able to collect real-time data. These can either be autonomous in nature or user-controlled.
and technologies that are applied by specialists towards a specific goal, such as the creation of a smart
• Examples of sensors are gas sensors, water quality sensors, moisture sensors, etc.
city. Obviously, there are limitless applications to the IoT and therefore we can speak of endless
coexisting IoT ecosystems. IoT ecosystem come up with a simple scheme: a device that collects data and Actuators

sends it across the network to a platform that aggregates the data for future use by the agent. And so • Both sensors and actuators are transducers, which means they’re responsible for
we have the key components to an IoT ecosystem: devices, networks, platforms, and agents. converting signals from one form to another.

• Actuators are responsible for performing actions.

• Sensors and actuators work together to remotely monitor and control physical processes
or systems.

• Sensors and actuators are only endpoints that connect physically to the environment,
whereas analysis of the information they collect actions in a control layer, is referred to as
an IoT gateway.

2. Processors:

Processors are the brain of the IoT system. Processors are primarily real-time devices that can be
readily manipulated by software. These are also in charge of data security, which includes data
encryption and decryption.

• Main function is to process the data captured by the sensors.

• Extract the valuable data from the huge amount of raw data collected (intelligence to the
data).
Fig.1.4 Building Blocks of the IoT system
• Processors mostly work on a real-time basis and are easily controlled by applications.
[Ref:https://www.drpankajdadhich.com/2022/06/building-blocks-of-iot.html]
Five basic building blocks of the IoT system –sensors, processors, gateways, applications, and database. • Also responsible for securing the data – perform encryption and decryption of data.
1.Sensors & Actuators: • Embedded hardware devices, microcontrollers, etc process the data
• The front end of the IoT devices. These are the so-called “Things” of the system.

• The main purpose is to collect data from its surroundings (sensors) or give out data to its 3. Gateways:
surrounding (actuators). • Gateway is a device that’s used for the basic analysis of data coming from connected
sensors.
Rohini College of Engineering & Technology Department of ECE Rohini College of Engineering & Technology Department of ECE

• Gateways are responsible for routing the processed data and sending it to proper locations IoT levels and deployment templates
for its (data) proper utilization.
• Work as decision points, sending certain control commands to actuators which, in turn, Based upon the number of monitoring nodes used, type of data base used, complexity/ simplicity of

perform appropriate actions. analysis, computation there are 6 levels of IoT. Different applications are implemented based on this

• Gateway helps in to and from the communication of the data.It provides network level. The IoT systems consist of these following components.

connectivity to the data. Network connectivity is essential for any IoT system to ✓ Device
✓ Resources
communicate. LAN, WAN, PAN, etc are examples of network gateways. Both
microcomputers and microprocessors can be used as gateways for IoT applications. ✓ Controller Service

✓ Database
4. Applications:
• Applications are essential for proper utilization of all the collected data.These are cloud- ✓ Web Service

based. ✓ Analysis Component


• Responsible for rendering the effective meaning to the data collected. Applications are ✓ Application

controlled by users and are a delivery point of particular services. Device: The Io T device allows identification, remote sensing, actuating, and remote monitoring
• Examples of applications are home automation apps, security systems, industrial control capabilities.
hubs, etc. Resource: Resources are the software components on the IoT device for accessing, processing and
storing sensor information, or controlling actuators connected to the device Resources include the
5. Data Storage:
software components that enable network access for the device.
After reaching its final destination, the sensor value is typically stored in a computer database that
For ex:
can easily serve other systems (hence the name “server”). Data stored on the server which may be
The programs that we have written for object detection using IR sensor, to find out the distance
either local or cloud and both.
using ultra sonic sensor etc.
Controller Service: Controller service is a native service that runs on the device and interacts with
the web services. Controller service sends data from the device to the web service and receives
commands from the application for controlling the web services. For ex: The ESP 8266
programming, setting of API keys, SSID etc.
Database: Database can be either local or in the cloud and stores the data generated by the IoT
device.
Web Service: This act as an interface between IoT device, application, database and analysis
components. Web services can be implemented using HTTP and REST principle or using Web
Socket protocol.
Rohini College of Engineering & Technology Department of ECE Rohini College of Engineering & Technology Department of ECE

Analysis Component: The analysis component is responsible for analysing the IoT data and • It has single node/device for sensing, monitoring, actuating, performing analysis and
generates results inform which are easy for the user to understand. Analysis can be performed hosting application.
either locally or in the clouds. • Data involved is big. So data is stored in cloud.It uses cloud based application to visualise
Application: IoT applications provide an interface that the user can use to control and monitor data.
various aspects of the IoT system. • Primary analysis requirement is not computationally intensive. So can be analysed
locally.
IoT level -1: • EX: smart irrigation.

• It has single node/device for sensing, monitoring, actuating, storing data, performing
analysis and hosting application.
• Data involved is not big. So data is stored in local database.
• It is suitable for modelling design low cost and low complexity solution.
• Primary analysis requirement is not computationally intensive. So can be analysed
locally.
• EX: Home automation

Fig. 1.6 IoT level -2

IoT level -3:

• It has single node/device for sensing, monitoring, actuating and hosting application.
• Data involved is big. So data is stored in cloud.
• It uses cloud based application to visualize data.
• Primary analysis requirement is computationally intensive. So can be aggregated and
analyzed in cloud. EX: tracking package handling

Fig. 1.5 IoT level -1

IoT level -2:


Rohini College of Engineering & Technology Department of ECE Rohini College of Engineering & Technology Department of ECE

Fig. 1.7 IoT level -3

IoT level 4:
• It has multiple nodes/devices for sensing, monitoring, actuating, performing analysis and Fig. 1.8 IoT level -4
hosting application.
• Data involved is big. So data is stored in cloud. It uses cloud based application to visualise
IoT level 5:
data.
• Primary analysis requirement is computationally intensive. So can be aggregated and • It has multiple nodes/devices for sensing, monitoring, actuating.

analysed in cloud. • One coordinator node for collecting and sending the data to cloud by controller service.
• Data involved is big. So data is stored in cloud. It uses cloud based application to visualise
• It has two observer nodes i.e local and cloud based. They can subscribe to and receive
data. Suitable for wireless sensor network.
information collected in cloud from IoT device. They can process and use that information
for various applications • Primary analysis requirement is computationally intensive.
• Analytic component analyse the data and stores result in cloud and make prediction.
• Observer node does not perform any control function.
• Ex: Forest Fire Detection
• EX: Noise monitoring
Rohini College of Engineering & Technology Department of ECE

Fig. 1.9 IoT level -5

IoT level- 6:

• It has multiple independent nodes/devices for sensing, monitoring, actuating and sending
the data to cloud by controller service.
• Data involved is big. So data is stored in cloud. It uses cloud based application to visualize
data. Primary analysis requirement is computationally intensive.
• Analytic component analyse the data and stores result in cloud.
• It has centralized controller which is aware of the status of all the end nodes and sends
control command to the nodes.
• Ex:Weather monitoring and structural health monitoring.

You might also like