IOT Notes Unit 1 (1)
IOT Notes Unit 1 (1)
Karoshi
||SHREE||
Unit 1
Introduction to Internet of Things (IoT)
Contents:
1.1 Introduction to IoT: Definition vision & characteristics of IoT, IBM IoT conceptual
Framework, and IoT Architectural view.
1.2 Physical design of IoT: Things in IoT, IoT Protocols.
1.3 Logical design of IoT: IoT Fundamental blocks, IoT Coinmunication Model, IoT
Communication API's
1.4 IoT Enabling Technologies: Wireless Sensor Networks, Cloud Computing. Big Data
Analytics, Communication Protocols, Embedded Systems
1 .5 IoT Levels and Deployment templates — IoT Level-1, IoT Leve1-2, IoT Level-3, IoT
Level-4, IoT Level-5, IoT Level- 6.
1.6 Challenges in IoT.
1
Internet of Things AO6I Mrs.R.V.Karoshi
Internet of Things is a vision where things (wearable watches, alarm clocks, home devices,
surrounding objects) become ‘smart’ and function like living entities by sensing, computing
and communicating through embedded devices which interact with remote objects (servers,
clouds, applications, services and processes) or persons through the Internet or Near-Field
Communication (NFC) etc. The vision of IoT can be understood through Examples 1.1 and
1.2.
Example 1.1
Through computing, an umbrella can be made to function like a living entity. By installing a
tiny embedded device, which interacts with a web based weather service and the devices owner
through the Internet the following communication can take place. The umbrella, embedded
with a circuit for the purpose of computing and communication connects to the Internet. A
website regularly publishes the weather report. The umbrella receives these reports each
morning, analyses the data and issues reminders to the owner at intermittent intervals around
his/her office-going time. The reminders can be distinguished using differently coloured LED
flashes such as red LED flashes for hot and sunny days, yellow flashes for rainy days. A
reminder can be sent to the owner’s mobile at a pre-set time before leaving for office using
NFC, Bluetooth or SMS technologies. The message can be—(i) Protect yourself from rain. It
is going to rain. Don’t forget to carry the umbrella; (ii) Protect yourself from the sun. It is going
to be hot and sunny. Don’t forget to carry the umbrella. The owner can decide to carry or not
to carry the umbrella using the Internet connected umbrella.
2
Internet of Things AO6I Mrs.R.V.Karoshi
Example 1.2
Streetlights in a city can be made to function like living entities through sensing and computing
using tiny embedded devices that communicate and interact with a central control-and-
command station through the Internet. Assume that each light in a group of 32 streetlights
comprises a sensing, computing and communication circuit. Each group connects to a group-
controller (or coordinator) through Bluetooth or ZigBee. Each controller further connects to
the central command-and-control station through the Internet. The station receives information
about each streetlight in each group in the city at periodic intervals. The information received
is related to the functioning of the 32 lights, the faulty lights, about the presence or absence of
traffic in group vicinity, and about the ambient conditions, whether cloudy, dark or normal
daylight. The station remotely programs the group controllers, which automatically take an
appropriate action as per the conditions of traffic and light levels. It also directs remedial
actions in case a fault develops in a light at a specific location. Thus, each group in the city is
controlled by the ‘Internet of streetlights’. Figure 1.1 shows the use of the IoT concept for
streetlights in a city.
1. Universal Connectivity
IoT envisions a world where systems are not just connected but also intelligent. Devices
should analyze data, learn from it, and take actions autonomously (e.g., smart
thermostats adjusting temperature based on user habits).
By optimizing resource usage, IoT aims to reduce waste and energy consumption,
contributing to sustainable development (e.g., smart grids, precision agriculture).
3
Internet of Things AO6I Mrs.R.V.Karoshi
IoT connects diverse domains such as healthcare, transportation, agriculture, and smart
cities, fostering collaboration and innovation.
IoT systems generate vast amounts of data, which, when analyzed using AI and
machine learning, can lead to better insights and improved decision-making across
industries.
The vision includes ensuring robust cybersecurity and protecting user privacy as IoT
devices become more pervasive.
4
Internet of Things AO6I Mrs.R.V.Karoshi
4. Dynamic
We need to create IoT devices in a way that they can adapt to the environment. For example,
an AC should have a sensor that can send a signal to the cloud and adjust it to the premises of
the place. Similarly, the camera can easily click photographs by adjusting to light situations,
like day and night.
5. Scalability
Scalability means the amount of data one can handle efficiently. The IoT has created a setup to
handle enormous data and generate useful analysis.
6. Self Upgradation
As we saw above, updating the software regularly is important. But who has the time to
remember to do that? Thus, with its artificial intelligence, IoT upgrades itself without human
help. It also allows the set up of a network for the addition of any new IoT devices. Thus, the
technology can quickly start working without delay if the setup has already been done.
7. Architecture
The architecture of IoT is designed in a way that it is capable of supporting various devices,
technologies, and protocols. Its main work is to confirm whether each connected device does
not interfere with the other. This way, the safety and security of each device's data are
maintained.
8. Security
With the increasing number of IoT devices, issues regarding the security of personal data have
arisen. There might be a chance of data leakage as a large amount of data is collected,
exchanged, and generated. There is a chance of personal data being transferred without
approval, which is a matter of concern.
To overcome this challenge, IoT has created networks, systems, and devices wherein privacy
is well maintained. Maintaining safety and security is a big dare for IoT. However, it still
handles it without any disruption.
9. Network
With the increasing number of IoT devices in a network, it becomes difficult to maintain
communication for proper functioning. However, cloud service and gateway are a few methods
that can solve such problems.
Often, one device can use the connectivity of another device to establish network connectivity
even if the second device is not connected to a network. Because IoT devices can communicate
with one another, it is more effective and adaptable than other current technologies.
10. Data
The data gathered from IoT devices are analyzed for future prediction. For example, a calorie
meter. It helps to regulate the number of calories each day. We also have fitness data,
thermostats, and various devices that monitor our health. Therefore, we can use the data
collected through these devices.
5
Internet of Things AO6I Mrs.R.V.Karoshi
level 2, for example, by transcoding at the gateway. Transcoding means coding or decoding
before data transfer between two entities.
3. A communication management subsystem sends or receives data streams at level 3.
4. Device management, identity management and access management subsystems receive the
device’s data at level 4.
5. A data store or database acquires the data at level 5.
6. Data routed from the devices and things organises and analyses at level 6. For example,
data is analysed for collecting business intelligence in business processes.
6
Internet of Things AO6I Mrs.R.V.Karoshi
Following figure shows blocks and subsystems for IoT in the IBM conceptual framework.
The equation below (1.3) is an alternative conceptual representation for a complex system. It
is based on IBM IoT conceptual framework. The equation shows the actions and
communication of data at successive levels in IoT. The framework manages the IoT services
using data from internetwork of the devices and objects, internet and cloud services, and
represents the flow of data from the IoT devices for managing the IoT services using the
cloud server.
Gather + Consolidate + Connect + Collect + Assemble + Manage and Analyse = Internet
of Things with connectivity to cloud services…………………………………………...1.3
Equation 1.3 represents a complex conceptual framework for IoT using cloud-platformbased
processes and services. The steps are as follows:
1. Levels 1 and 2 consist of a sensor network to gather and consolidate the data. First level
gathers the data of the things (devices) using sensors circuits. The sensor connects to
a gateway. Data then consolidates at the second level, for example, transformation at
the gateway at level 2.
2. The gateway at level 2 communicates the data streams between levels 2 and 3. The
system uses a communication-management subsystem at level 3.
7
Internet of Things AO6I Mrs.R.V.Karoshi
4. Real time series analysis, data analytics and intelligence subsystems are also at levels 4 and
5. A cloud infrastructure, a data store or database acquires the data at level 5.
Standards for an architectural framework for the IoT have been developed under IEEE project
P2413.
IEEE suggested P24133 standard for architecture of IoT. It is a reference architecture which
builds upon the reference model(s). The reference architecture covers the definition of basic
architectural building blocks and their integration capability into multi-tiered systems.
A reference model could be identified to specify reference architecture. Several reference
architectures are expected to co-exist in the IoT domain. Following diagram shows an Oracle
suggested IoT architecture.
8
Internet of Things AO6I Mrs.R.V.Karoshi
9
Internet of Things AO6I Mrs.R.V.Karoshi
10
Internet of Things AO6I Mrs.R.V.Karoshi
1. Link Layer
Link layer protocols determine how data is physically sent over the network’s physical layer
or medium (Coxial calbe or other or radio wave). This Layer determines how the packets are
coded and signaled by the hardware device over the medium to which the host is attached
(eg. coxial cable).
1. 802.3 – Ethernet :
Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first
standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the physical layer and the
medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks.
Ethernet is classified into two categories: classic Ethernet and switched Ethernet.
2. 802.11 – WiFi :
IEEE 802.11 is part of the IEEE 802 set of LAN protocols, and specifies the set of media
access control (MAC) and physical layer (PHY) protocols for implementing wireless local
area network (WLAN) Wi-Fi computer communication in various frequencies, including but
not limited to 2.4 GHz, 5 GHz, and 60 GHz frequency bands.
3. 802.16 – Wi-Max :
The standard for WiMAX technology is a standard for Wireless Metropolitan Area Networks
(WMANs) that has been developed by working group number 16 of IEEE 802, specializing
in point-to-multipoint broadband wireless access.
4. 802.15.4 -LR-WPAN :
A collection of standards for Low-rate wireless personal area network. The IEEE’s 802.15.4
standard defines the MAC and PHY layer used by, but not limited to, networking
specifications such as Zigbee®, 6LoWPAN, Thread, WiSUN and MiWi™ protocols. The
standards provide low-cost and low-speed communication for power constrained devices.
These are different types of telecommunication generations. IoT devices are based on these
standards can communicate over the culler networks.
11
Internet of Things AO6I Mrs.R.V.Karoshi
2. Network Layer
Responsible for sending of IP datagrams from the source network to the destination network.
Network layer performs the host addressing and packet routing. We used IPv4 and IPv6 for
Host identification. IPv4 and IPv6 are hierarchical IP addrssing schemes.
1. IPv4 :
An Internet Protocol address (IP address) is a numerical label assigned to each device
connected to a computer network that uses the Internet Protocol for communication. An IP
address serves two main functions: a. host or network interface identification b. location
addressing. Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number.
However, because of the growth of the Internet and the depletion of available IPv4 addresses,
a new version of IP (IPv6), using 128 bits for the IP address, was standardized in 1998. IPv6
deployment has been ongoing since the mid-2000s.
2. IPv6 :
Internet Protocol version 6 (IPv6) is successor of IPv4. IPv6 was developed by the Internet
Engineering Task Force (IETF) to deal with the long problem of IPv4 address exhaustion. IPv6
uses a 128-bit address, theoretically allowing 2^128, or approximately 3.4×10^38 addresses.
3. 6LoWPAN :
It is an acronym of IPv6 over Low-Power Wireless Personal Area Networks. This protocol
allows for the smallest devices with limited processing ability to transmit information
wirelessly using an internet protocol.
3. Transport Layer
This layer provides functions such as error control, segmentation, flow control and
congestion control. So this layer protocols provide end-to-end message transfer capability
independent of the underlying network.
1. TCP :
Transmission Control Protocol (TCP) is the most widely used transport layer protocol, that is
used by web browsers , email programs and file transfer. TCP is a connection oriented and
stateful protoeol. While IP protocol deals with sending packets, TCP ensures reliable
transmission of packets in-order. TCP also provides error detection capability so that
duplicate packets can be discarded and lost packets are retransmitted. The flow control
capability of TCP ensure that rate at which the sender sends the data is not too high for the
receiver to process. The congestion control capability of TCP helps in avoiding network
coagestion and congestion collapse which can lead to degradation of network performance.
2. UDP :
User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of Internet
Protocol suite, referred as UDP/IP suite. Unlike TCP, it is unreliable and connectionless
protocol. So, there is no need to establish connection prior to data transfer.
12
Internet of Things AO6I Mrs.R.V.Karoshi
4. Application Layer
Application layer protocols define how the applications interface with the lower layer
protocols to send over the network.
1. HTTP:
Hypertext Transfer Protocol (HTTP) is the application layer protocol that forms the
foundation of the World Wide Web (WWW).
HTTP includes commands such as GET, PUT, POST,DELETE, HEAD, TRACE, OPTIONS,
etc.The protocol follows a request-response model where a client sends requests to a server
usilig the HTTP commands.
HTTP is a stateless protocol and each HITP request is independent of the other requests. An
HTTP client can be browser or an application running on the client (e.g.an application
running on an loT device, a mobile application or other software).
2. CoAP:
3. WebSocket:
The WebSocket Protocol enables two-way communication between a client running untrusted
code in a controlled environment to a remote host that has opted-in to communications from
that code. The security model used for this is the origin-based security model commonly used
by web browsers.
4. MQTT:
The WebSocket Protocol enables two-way communication between a client running untrusted
code in a controlled environment to a remote host that has opted-in to communications from
that code. The security model used for this is the origin-based security model commonly used
by web browsers.
Along with this there are some more application layer protocols like XMPP, DDS, AMQP.
13
Internet of Things AO6I Mrs.R.V.Karoshi
1. Device:
An IoT system comprises of devices that provide sensing, actuation, monitoring and control
functions.
2. Communication:
Handles the communication for the IoT system.
3. Services:
Services for device monitoring, device control service, data publishing services and services
for device discovery.
4. Management:
This blocks provides various functions to govern the IoT system.
5. Security:
This block secures the IoT system and by providing functions such as authentication ,
authorization, message and content integrity, and data security.
6. Application:
This is an interface that the users can use to control and monitor various aspects of the IoT
system. Application also allow users to view the system status and view or analyze the
processed data.
14
Internet of Things AO6I Mrs.R.V.Karoshi
1. Request-Response Model
Request-response model is communication model in which the client sends requests to the
server and the server responds to the requests. When the server receives a request, it decides
how to respond, fetches the data, retrieves resource representation, prepares the response, and
then sends the response to the client. Request-response is a stateless communication model and
each request-response pair is independent of others.
HTTP works as a request-response protocol between a client and server. A web browser may
be the client, and an application on a computer that hosts a web site may be the server.
Example: A client (browser) submits an HTTP request to the server; then the server returns a
response to the client. The response contains status information about the request and may also
contain the requested content.
15
Internet of Things AO6I Mrs.R.V.Karoshi
2. Publish-Subscribe Model
Publish-Subscribe is a communication model that involves publishers, brokers and
consumers. Publishers are the source of data. Publishers send the data to the topics which are
managed by the broker. Publishers are not aware of the consumers. Consumers subscribe to
the topics which are managed by the broker. When the broker receive data for a topic from
the publisher, it sends the data to all the subscribed consumers.
16
Internet of Things AO6I Mrs.R.V.Karoshi
3. Push-Pull Model
Push-Pull is a communication model in which the data producers push the data to queues and
the consumers Pull the data from the Queues. Producers do not need to be aware of the
consumers. Queues help in decoupling the messaging between the Producers and Consumers.
Queues also act as a buffer which helps in situations when there is a mismatch between the
rate at which the producers push data and the rate rate at which the consumer pull data.
17
Internet of Things AO6I Mrs.R.V.Karoshi
6. Code on demand –
Servers can provide executable code or scripts for clients to execute in their context. this
constraint is the only one that is optional.
A RESTful web service is a ” Web API ” implemented using HTTP and REST principles.
REST is most popular IoT Communication APIs.
Websocket APIs allow bi-directional, full duplex communication between clients and
servers. Websocket APIs follow the exclusive pair communication model.
Unlike request-response model such as REST, the WebSocket APIs allow full duplex
communication and do not require new coonection to be setup for each message to be
sent. Websocket communication begins with a connection setup request sent by the
client to the server.
The request (called websocket handshake) is sent over HTTP and the server interprets
it is an upgrade request.
If the server supports websocket protocol, the server responds to the websocket
handshake response.
After the connection setup client and server can send data/mesages to each other in full
duplex mode.
Websocket API reduce the network traffic and letency as there is no overhead for
connection setup and termination requests for each message.
Websocket suitable for IoT applications that have low latency or high throughput
requirements. So Web socket is most suitable IoT Communication APIs for IoT
System.
19
Internet of Things AO6I Mrs.R.V.Karoshi
20
Internet of Things AO6I Mrs.R.V.Karoshi
IoT is enabled by several technologies including wireless sensor networks, cloud computing,
big data analytics, Embedded Systems, Security Protocols and architectures, communication
protocols, web services, Mobile Internet, and Semantic Search engines.
So following is an overview of some of these technologies which play a key-role in IoT.
1. Wireless Sensor Networks:
A wireless sensor network comprises of distributed device with sensor which are used to
monitor the environmental and physical conditions. A WSN consists of a number of end-nodes
and routers and a coordinator. End Nodes have several sensors attached to them in node can
also act as routers. Routers are responsible for routing the data packets from end-nodes to the
coordinator. The coordinator collects the data from all the nodes.
Some examples of WSNs used in IoT systems are described as follows:
1. Weather monitoring system use WSNs in which the nodes collect temperature humidity
and other data which is aggregated and analyzed.
2. Indoor air quality monitoring systems use WSNs to collect data on the indoor air quality
and concentration of various gases
3. Soil moisture monitoring system use WSNs to monitor soil moisture at various
locations.
4. Surveillance system use WSNs for collecting Surveillance data (such as motion
detection data)
5. Smart grid use WSNs for monitoring the grid at various points.
6. Structural health monitoring system use WSNs to monitor the health of structures (
buildings, bridges) by collecting vibration data from sensor nodes de deployed at
various points in the structure.
2. Cloud Computing:
Cloud computing is a trans-formative computing paradigm that involves delivering
applications and services over the Internet Cloud computing involves provisioning of
computing, networking and storage resources on demand and providing these resources as
metered services to the users, in a “pay as you go” model. C loud computing resources can be
provisioned on demand by the users, without requiring interacyions with the cloud service
Provider. The process of provisioning resources is automated. Cloud computing resources can
be accessed over The network using standard access mechanisms that provide platform
independent access through the use of heterogeneous client platforms such as the workstations,
laptops, tablets and smartphones.
21
Internet of Things AO6I Mrs.R.V.Karoshi
Platform as a Service (PaaS): in addition to hardware, operating system layer is managed for
user.
Software as a Service (SaaS): further to the above two, an application layer is provided and
managed for user.
Big Data analytics is the process of collecting, organizing and analyzing large sets of data
(called Big Data) to discover patterns and other useful information. Big Data analytics can help
organizations to better understand the information contained within the data and will also help
identify the data that is most important to the business and future business decisions. Analysts
working with Big Data typically want the knowledge that comes from analyzing the data.
Some examples of big data generated by IoT systems are described as follows:
1. Volume – The quantity of generated and stored data. The size of the data determines
the value and potential insight, and whether it can be considered big data or not.
2. Variety – The type and nature of the data. This helps people who analyze it to
effectively use the resulting insight. Big data draws from text, images, audio, video;
plus it completes missing pieces through data fusion.
3. Velocity – In this context, the speed at which the data is generated and processed to
meet the demands and challenges that lie in the path of growth and development. Big
data is often available in real-time. Compared to small data, big data are produced more
continually. Two kinds of velocity related to Big Data are the frequency of generation
and the frequency of handling, recording, and publishing.
22
Internet of Things AO6I Mrs.R.V.Karoshi
4. Communication Protocols:
Communication protocols form the backbone of IoT systems and enable network connectivity
and coupling to applications. Communication protocols allow devices to exchange data over
the network. Multiple protocols often describe different aspects of a single communication. A
group of protocols designed to work together are known as a protocol suite; when implemented
in software they are a protocol stack.
Internet communication protocols are published by the Internet Engineering Task Force
(IETF). The IEEE handles wired and wireless networking, and the International Organization
for Standardization (ISO) handles other types. The ITU-T handles telecommunication
protocols and formats for the public switched telephone network (PSTN). As the PSTN and
Internet converge, the standards are also being driven towards convergence.
5. Embedded Systems:
As its name suggests, Embedded means something that is attached to another thing. An
embedded system can be thought of as a computer hardware system having software
embedded in it. An embedded system can be an independent system or it can be a part of a
large system. An embedded system is a controller programmed and controlled by a real-time
operating system (RTOS) with a dedicated function within a larger mechanical or electrical
system, often with real-time computing constraints. It is embedded as part of a complete
device often including hardware and mechanical parts. Embedded systems control many
devices in common use today. Ninety-eight percent of all microprocessors are manufactured
to serve as embedded system component.
1. It has hardware.
2. It has application software.
3. It has Real Time Operating system (RTOS) that supervises the application software
and provide mechanism to let the processor run a process as per scheduling by
following a plan to control the latencies. RTOS defines the way the system works. It
sets the rules during the execution of application program. A small scale embedded
system may not have RTOS.
23
Internet of Things AO6I Mrs.R.V.Karoshi
1 .5 IoT Levels and Deployment templates — IoT Level-1, IoT Leve1-2, IoT Level-3,
IoT Level-4, IoT Level-5, IoT Level- 6.
We can’t use same approach for every problem statement. Hence following are 6 IoT
Deployment templates based on Complexity.
An IoT system comprises of the following components:
2. Resource: These are Software components on the IoT device for accessing,
processing, and storing sensor information, or controlling
actuators connected to the device.
3. Controller Service: A native service that runs on the device and work between node
device and web services. Controller service sends data from the device to the web
service and receives commands from the application (via web services) for controlling
the device.
4. Database: A storage place for Collected or generated data. It can be local or cloud
based.
5. Web Service: Web services serve as a link between the IoT device, application,
database and analysis components. Web service can be either implemented using
HTTP and REST principles (REST service) or using WebSocket protocol
(WebSocket service).
6. Analysis Component: Responsible for analyzing the IoT data and generate results in
a form which are easy for the user to understand.
7. Application: IoT applications provide an interface that the users can use to control
and monitor various aspects of the IoT system. It allow users to view the system
Monitor and processed data.
24
Internet of Things AO6I Mrs.R.V.Karoshi
1. IoT Level-1:
25
Internet of Things AO6I Mrs.R.V.Karoshi
2. IoT Level-2:
26
Internet of Things AO6I Mrs.R.V.Karoshi
3. IoT Level-3:
27
Internet of Things AO6I Mrs.R.V.Karoshi
4. IoT Level-4:
28
Internet of Things AO6I Mrs.R.V.Karoshi
5. IoT Level-5:
29
Internet of Things AO6I Mrs.R.V.Karoshi
6. IoT Level-6:
30
Internet of Things AO6I Mrs.R.V.Karoshi
2. Interoperability:
3. Scalability:
4. Reliability:
5. Privacy:
6. Regulation:
7. Integration:
Integrating IoT devices and data into existing systems and infrastructure.
8. Cost:
Balancing the costs of deploying and maintaining IoT devices with their benefits.
9. Power consumption:
10. Complexity:
31