0% found this document useful (0 votes)
8 views

IOT Notes Unit 1 (1)

Uploaded by

Sujal Moolya
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

IOT Notes Unit 1 (1)

Uploaded by

Sujal Moolya
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Internet of Things AO6I Mrs.R.V.

Karoshi

||SHREE||

Unit 1
Introduction to Internet of Things (IoT)
Contents:

1.1 Introduction to IoT: Definition vision & characteristics of IoT, IBM IoT conceptual
Framework, and IoT Architectural view.
1.2 Physical design of IoT: Things in IoT, IoT Protocols.
1.3 Logical design of IoT: IoT Fundamental blocks, IoT Coinmunication Model, IoT
Communication API's
1.4 IoT Enabling Technologies: Wireless Sensor Networks, Cloud Computing. Big Data
Analytics, Communication Protocols, Embedded Systems
1 .5 IoT Levels and Deployment templates — IoT Level-1, IoT Leve1-2, IoT Level-3, IoT
Level-4, IoT Level-5, IoT Level- 6.
1.6 Challenges in IoT.

1
Internet of Things AO6I Mrs.R.V.Karoshi

1.1 Introduction to IoT: Definition, vision & characteristics of IoT, IBM


IoT conceptual Framework, IoT Architectural view.
1.1.1 Definition:
Internet of Things means a network of physical things (objects) sending, receiving, or
communicating information using the Internet or other communication technologies and
network just as the computers, tablets and mobiles do, and thus enabling the monitoring,
coordinating or controlling process across the Internet or another data network.
IoT devices—also known as “smart objects”—can range from simple “smart home” devices
like smart thermostats, to wearable like smart watches and RFID-enabled clothing, to
complex industrial machinery and transportation systems. Technologists are even envisioning
entire “smart cities” predicated on IoT technologies.
IoT enables these smart devices to communicate with each other and with other internet-
enabled devices. Like smartphones and gateways, creating a vast network of interconnected
devices that can exchange data and perform various tasks autonomously. This can include:
 Monitoring environmental conditions in farms.
 Managing traffic patterns with smart cars and other smart automotive devices.
 Controlling machines and processes in factories.
 Tracking inventory and shipments in warehouses.

1.1.2. Vision of IoT:

Internet of Things is a vision where things (wearable watches, alarm clocks, home devices,
surrounding objects) become ‘smart’ and function like living entities by sensing, computing
and communicating through embedded devices which interact with remote objects (servers,
clouds, applications, services and processes) or persons through the Internet or Near-Field
Communication (NFC) etc. The vision of IoT can be understood through Examples 1.1 and
1.2.
Example 1.1
Through computing, an umbrella can be made to function like a living entity. By installing a
tiny embedded device, which interacts with a web based weather service and the devices owner
through the Internet the following communication can take place. The umbrella, embedded
with a circuit for the purpose of computing and communication connects to the Internet. A
website regularly publishes the weather report. The umbrella receives these reports each
morning, analyses the data and issues reminders to the owner at intermittent intervals around
his/her office-going time. The reminders can be distinguished using differently coloured LED
flashes such as red LED flashes for hot and sunny days, yellow flashes for rainy days. A
reminder can be sent to the owner’s mobile at a pre-set time before leaving for office using
NFC, Bluetooth or SMS technologies. The message can be—(i) Protect yourself from rain. It
is going to rain. Don’t forget to carry the umbrella; (ii) Protect yourself from the sun. It is going
to be hot and sunny. Don’t forget to carry the umbrella. The owner can decide to carry or not
to carry the umbrella using the Internet connected umbrella.

2
Internet of Things AO6I Mrs.R.V.Karoshi

Example 1.2
Streetlights in a city can be made to function like living entities through sensing and computing
using tiny embedded devices that communicate and interact with a central control-and-
command station through the Internet. Assume that each light in a group of 32 streetlights
comprises a sensing, computing and communication circuit. Each group connects to a group-
controller (or coordinator) through Bluetooth or ZigBee. Each controller further connects to
the central command-and-control station through the Internet. The station receives information
about each streetlight in each group in the city at periodic intervals. The information received
is related to the functioning of the 32 lights, the faulty lights, about the presence or absence of
traffic in group vicinity, and about the ambient conditions, whether cloudy, dark or normal
daylight. The station remotely programs the group controllers, which automatically take an
appropriate action as per the conditions of traffic and light levels. It also directs remedial
actions in case a fault develops in a light at a specific location. Thus, each group in the city is
controlled by the ‘Internet of streetlights’. Figure 1.1 shows the use of the IoT concept for
streetlights in a city.

Key aspects of this vision include:

1. Universal Connectivity

 Every device, from household appliances to industrial machinery, is connected to the


internet, enabling real-time communication and data sharing.

2. Automation and Intelligence

 IoT envisions a world where systems are not just connected but also intelligent. Devices
should analyze data, learn from it, and take actions autonomously (e.g., smart
thermostats adjusting temperature based on user habits).

3. Efficiency and Sustainability

 By optimizing resource usage, IoT aims to reduce waste and energy consumption,
contributing to sustainable development (e.g., smart grids, precision agriculture).

3
Internet of Things AO6I Mrs.R.V.Karoshi

4. Enhanced User Experiences

 IoT promises personalized, intuitive experiences for users by understanding their


preferences and needs (e.g., wearable health monitors suggesting fitness plans).

5. Seamless Integration Across Domains

 IoT connects diverse domains such as healthcare, transportation, agriculture, and smart
cities, fostering collaboration and innovation.

6. Data-Driven Decision Making

 IoT systems generate vast amounts of data, which, when analyzed using AI and
machine learning, can lead to better insights and improved decision-making across
industries.

7. Safety and Security

 The vision includes ensuring robust cybersecurity and protecting user privacy as IoT
devices become more pervasive.

1.1.3 Characteristics of IoT:


1. Connectivity
Connectivity is an essential feature of IoT. IoT lets you connect mobile phones, laptops, and
other internet devices. Any person can get information about anything at any time and place.
IoT can connect through several wireless devices, like sensors, mobile phones, trackers, etc.
This way, the person will not have to wait for an internet connection to operate a device.
2. Identity of Things
The collaboration of name and number gives an identity to an internet device. Giving an
identity to the device is an essential aspect of loT. Identity helps to differentiate between
various internet devices and select the device we want to send the command.
Every device needs a different controlling power based on the type of data provided. It is
essential to give a unique identity to every device so that we can set up passwords or other
security means. For example, fingerprints, face recognition IP addresses, and Face lock systems
are several means of security given to the different identified devices to protect them.
3. Intelligence
The intelligence of IoT devices depends on the sensors' intelligence. The sensors send the data
to the user for further analysis.
We need to update the IoT devices regularly to get the smart work done. It adds to their features
and makes them smarter.

4
Internet of Things AO6I Mrs.R.V.Karoshi

4. Dynamic
We need to create IoT devices in a way that they can adapt to the environment. For example,
an AC should have a sensor that can send a signal to the cloud and adjust it to the premises of
the place. Similarly, the camera can easily click photographs by adjusting to light situations,
like day and night.
5. Scalability
Scalability means the amount of data one can handle efficiently. The IoT has created a setup to
handle enormous data and generate useful analysis.
6. Self Upgradation
As we saw above, updating the software regularly is important. But who has the time to
remember to do that? Thus, with its artificial intelligence, IoT upgrades itself without human
help. It also allows the set up of a network for the addition of any new IoT devices. Thus, the
technology can quickly start working without delay if the setup has already been done.
7. Architecture
The architecture of IoT is designed in a way that it is capable of supporting various devices,
technologies, and protocols. Its main work is to confirm whether each connected device does
not interfere with the other. This way, the safety and security of each device's data are
maintained.
8. Security
With the increasing number of IoT devices, issues regarding the security of personal data have
arisen. There might be a chance of data leakage as a large amount of data is collected,
exchanged, and generated. There is a chance of personal data being transferred without
approval, which is a matter of concern.
To overcome this challenge, IoT has created networks, systems, and devices wherein privacy
is well maintained. Maintaining safety and security is a big dare for IoT. However, it still
handles it without any disruption.
9. Network
With the increasing number of IoT devices in a network, it becomes difficult to maintain
communication for proper functioning. However, cloud service and gateway are a few methods
that can solve such problems.
Often, one device can use the connectivity of another device to establish network connectivity
even if the second device is not connected to a network. Because IoT devices can communicate
with one another, it is more effective and adaptable than other current technologies.
10. Data
The data gathered from IoT devices are analyzed for future prediction. For example, a calorie
meter. It helps to regulate the number of calories each day. We also have fitness data,
thermostats, and various devices that monitor our health. Therefore, we can use the data
collected through these devices.

5
Internet of Things AO6I Mrs.R.V.Karoshi

1.1.4 IBM IoT conceptual Framework


The following equation describes a simple conceptual framework of IoT:
Physical Object + Controller, Sensor and Actuators + Internet = Internet of Things…1.1
Equation 1.1 conceptually describes the Internet of umbrellas as consisting of an umbrella, a
controller, sensor and actuators, and the Internet for connectivity to a web service and a mobile
service provider. Generally, IoT consists of an internetwork of devices and physical objects
wherein a number of objects can gather the data at remote locations and communicate to units
managing, acquiring, organising and analysing the data in the processes and services.
Gather + Enrich + Stream + Manage + Acquire + Organise and Analyse = Internet of
Things with connectivity to data Centre, enterprise or cloud server…………………...1.2
Equation 1.2 is an IoT conceptual framework for the enterprise processes and services, based
on a suggested IoT architecture given by Oracle (Figure 1.5 in Section 1.3). The steps are as as
follows:
1. At level 1 data of the devices (things) using sensors or the things gather the pre data from
the internet.
2. A sensor connected to a gateway, functions as a smart sensor (smart sensor refers to a
sensor with computing and communication capacity). The data then enriches at

level 2, for example, by transcoding at the gateway. Transcoding means coding or decoding
before data transfer between two entities.
3. A communication management subsystem sends or receives data streams at level 3.

4. Device management, identity management and access management subsystems receive the
device’s data at level 4.
5. A data store or database acquires the data at level 5.

6. Data routed from the devices and things organises and analyses at level 6. For example,
data is analysed for collecting business intelligence in business processes.

6
Internet of Things AO6I Mrs.R.V.Karoshi

Following figure shows blocks and subsystems for IoT in the IBM conceptual framework.

The equation below (1.3) is an alternative conceptual representation for a complex system. It
is based on IBM IoT conceptual framework. The equation shows the actions and
communication of data at successive levels in IoT. The framework manages the IoT services
using data from internetwork of the devices and objects, internet and cloud services, and
represents the flow of data from the IoT devices for managing the IoT services using the
cloud server.
Gather + Consolidate + Connect + Collect + Assemble + Manage and Analyse = Internet
of Things with connectivity to cloud services…………………………………………...1.3
Equation 1.3 represents a complex conceptual framework for IoT using cloud-platformbased
processes and services. The steps are as follows:

1. Levels 1 and 2 consist of a sensor network to gather and consolidate the data. First level
gathers the data of the things (devices) using sensors circuits. The sensor connects to
a gateway. Data then consolidates at the second level, for example, transformation at
the gateway at level 2.

2. The gateway at level 2 communicates the data streams between levels 2 and 3. The
system uses a communication-management subsystem at level 3.

7
Internet of Things AO6I Mrs.R.V.Karoshi

3. An information service consists of connect, collect, assemble and manage subsystems at


levels 3 and 4. The services render from level 4.

4. Real time series analysis, data analytics and intelligence subsystems are also at levels 4 and
5. A cloud infrastructure, a data store or database acquires the data at level 5.

1.1.5 IoT Architectural view:


An IoT system has multiple levels (Equations 1.1 to 1.3). These levels are also known as tiers.
A model enables conceptualisation of a framework. A reference model can be used to depict
building blocks, successive interactions and integration.
Following diagram shows a reference model for architectural view:

Standards for an architectural framework for the IoT have been developed under IEEE project
P2413.

IEEE suggested P24133 standard for architecture of IoT. It is a reference architecture which
builds upon the reference model(s). The reference architecture covers the definition of basic
architectural building blocks and their integration capability into multi-tiered systems.
A reference model could be identified to specify reference architecture. Several reference
architectures are expected to co-exist in the IoT domain. Following diagram shows an Oracle
suggested IoT architecture.

8
Internet of Things AO6I Mrs.R.V.Karoshi

An architecture has the following features:

1. The architecture serves as a reference in applications of IoT in services and business


processes.
2. A set of sensors which are smart, capture the data, perform necessary data element
analysis and transformation as per device application framework and connect directly
to a communication manager.
3. A set of sensor circuits is connected to a gateway possessing separate data capturing,
gathering, computing and communication capabilities. The gateway receives the data
in one form at one end and sends it in another form to the other end.
4. The communication-management subsystem consists of protocol handlers, message
routers and message cache.
5. This management subsystem has functionalities for device identity database, device
identity management and access management.
6. Data routes from the gateway through the Internet and data centre to the application
server or enterprise server which acquires that data.
7. Organisation and analysis subsystems enable the services, business processes,
enterprise integration and complex processes

9
Internet of Things AO6I Mrs.R.V.Karoshi

1.2 Physical design of IoT


1.2.1 Things in IoT

10
Internet of Things AO6I Mrs.R.V.Karoshi

1.2.2 IoT Protocols.


IoT protcols help to establish Communication between IoT Device (Node Device) and Cloud
based Server over the Internet. It help to sent commands to IoT Device and received data from
an IoT device over the Internet.
Different types of Protocols are explained below:

1. Link Layer

Link layer protocols determine how data is physically sent over the network’s physical layer
or medium (Coxial calbe or other or radio wave). This Layer determines how the packets are
coded and signaled by the hardware device over the medium to which the host is attached
(eg. coxial cable).

Here we explain some Link Layer Protocols:

1. 802.3 – Ethernet :

Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first
standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the physical layer and the
medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks.
Ethernet is classified into two categories: classic Ethernet and switched Ethernet.

2. 802.11 – WiFi :

IEEE 802.11 is part of the IEEE 802 set of LAN protocols, and specifies the set of media
access control (MAC) and physical layer (PHY) protocols for implementing wireless local
area network (WLAN) Wi-Fi computer communication in various frequencies, including but
not limited to 2.4 GHz, 5 GHz, and 60 GHz frequency bands.

3. 802.16 – Wi-Max :

The standard for WiMAX technology is a standard for Wireless Metropolitan Area Networks
(WMANs) that has been developed by working group number 16 of IEEE 802, specializing
in point-to-multipoint broadband wireless access.

4. 802.15.4 -LR-WPAN :

A collection of standards for Low-rate wireless personal area network. The IEEE’s 802.15.4
standard defines the MAC and PHY layer used by, but not limited to, networking
specifications such as Zigbee®, 6LoWPAN, Thread, WiSUN and MiWi™ protocols. The
standards provide low-cost and low-speed communication for power constrained devices.

5. 2G/3G/4G- Mobile Communication :

These are different types of telecommunication generations. IoT devices are based on these
standards can communicate over the culler networks.

11
Internet of Things AO6I Mrs.R.V.Karoshi

2. Network Layer
Responsible for sending of IP datagrams from the source network to the destination network.
Network layer performs the host addressing and packet routing. We used IPv4 and IPv6 for
Host identification. IPv4 and IPv6 are hierarchical IP addrssing schemes.

1. IPv4 :

An Internet Protocol address (IP address) is a numerical label assigned to each device
connected to a computer network that uses the Internet Protocol for communication. An IP
address serves two main functions: a. host or network interface identification b. location
addressing. Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number.
However, because of the growth of the Internet and the depletion of available IPv4 addresses,
a new version of IP (IPv6), using 128 bits for the IP address, was standardized in 1998. IPv6
deployment has been ongoing since the mid-2000s.

2. IPv6 :

Internet Protocol version 6 (IPv6) is successor of IPv4. IPv6 was developed by the Internet
Engineering Task Force (IETF) to deal with the long problem of IPv4 address exhaustion. IPv6
uses a 128-bit address, theoretically allowing 2^128, or approximately 3.4×10^38 addresses.

3. 6LoWPAN :

It is an acronym of IPv6 over Low-Power Wireless Personal Area Networks. This protocol
allows for the smallest devices with limited processing ability to transmit information
wirelessly using an internet protocol.

3. Transport Layer

This layer provides functions such as error control, segmentation, flow control and
congestion control. So this layer protocols provide end-to-end message transfer capability
independent of the underlying network.

1. TCP :

Transmission Control Protocol (TCP) is the most widely used transport layer protocol, that is
used by web browsers , email programs and file transfer. TCP is a connection oriented and
stateful protoeol. While IP protocol deals with sending packets, TCP ensures reliable
transmission of packets in-order. TCP also provides error detection capability so that
duplicate packets can be discarded and lost packets are retransmitted. The flow control
capability of TCP ensure that rate at which the sender sends the data is not too high for the
receiver to process. The congestion control capability of TCP helps in avoiding network
coagestion and congestion collapse which can lead to degradation of network performance.

2. UDP :
User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of Internet
Protocol suite, referred as UDP/IP suite. Unlike TCP, it is unreliable and connectionless
protocol. So, there is no need to establish connection prior to data transfer.

12
Internet of Things AO6I Mrs.R.V.Karoshi

4. Application Layer

Application layer protocols define how the applications interface with the lower layer
protocols to send over the network.

1. HTTP:

Hypertext Transfer Protocol (HTTP) is the application layer protocol that forms the
foundation of the World Wide Web (WWW).

HTTP includes commands such as GET, PUT, POST,DELETE, HEAD, TRACE, OPTIONS,
etc.The protocol follows a request-response model where a client sends requests to a server
usilig the HTTP commands.

HTTP is a stateless protocol and each HITP request is independent of the other requests. An
HTTP client can be browser or an application running on the client (e.g.an application
running on an loT device, a mobile application or other software).

2. CoAP:

CoAP-Constrained Application Protocol is a specialized Internet Application Protocol for


constrained devices, as defined in RFC 7252. It enables devices to communicate over the
Internet. The protocol is especially targeted for constrained hardware such as 8-bits
microcontrollers, low power sensors and similar devices that can’t run on HTTP

3. WebSocket:

The WebSocket Protocol enables two-way communication between a client running untrusted
code in a controlled environment to a remote host that has opted-in to communications from
that code. The security model used for this is the origin-based security model commonly used
by web browsers.

4. MQTT:

The WebSocket Protocol enables two-way communication between a client running untrusted
code in a controlled environment to a remote host that has opted-in to communications from
that code. The security model used for this is the origin-based security model commonly used
by web browsers.

Along with this there are some more application layer protocols like XMPP, DDS, AMQP.

13
Internet of Things AO6I Mrs.R.V.Karoshi

1.3 Logical design of IoT: IoT Fundamental blocks, IoT Coinmunication


Model, IoT Communication API's
Logical design of IoT system refers to an abstract representation of the entities & processes
without going into the low-level specifies of the implementation. For understanding Logical
Design of IoT, we describes given below terms.

1. IoT Functional Blocks


2. IoT Communication Models
3. IoT Communication APIs

1. IoT Functional Blocks


An IoT system comprises of a number of functional blocks that provide the system the
capabilities for identification, sensing, actuation, communication and management. Functional
blocks are:

1. Device:
An IoT system comprises of devices that provide sensing, actuation, monitoring and control
functions.
2. Communication:
Handles the communication for the IoT system.
3. Services:
Services for device monitoring, device control service, data publishing services and services
for device discovery.
4. Management:
This blocks provides various functions to govern the IoT system.
5. Security:
This block secures the IoT system and by providing functions such as authentication ,
authorization, message and content integrity, and data security.
6. Application:
This is an interface that the users can use to control and monitor various aspects of the IoT
system. Application also allow users to view the system status and view or analyze the
processed data.

14
Internet of Things AO6I Mrs.R.V.Karoshi

IoT Functional Blocks

2. IoT Communication Models


Basically, there are 4 types of Models
1. Request-Response Model
2. Publish-Subscribe Model
3. Push-Pull Model
4. Exclusive Pair Model

1. Request-Response Model
Request-response model is communication model in which the client sends requests to the
server and the server responds to the requests. When the server receives a request, it decides
how to respond, fetches the data, retrieves resource representation, prepares the response, and
then sends the response to the client. Request-response is a stateless communication model and
each request-response pair is independent of others.
HTTP works as a request-response protocol between a client and server. A web browser may
be the client, and an application on a computer that hosts a web site may be the server.

Example: A client (browser) submits an HTTP request to the server; then the server returns a
response to the client. The response contains status information about the request and may also
contain the requested content.

15
Internet of Things AO6I Mrs.R.V.Karoshi

2. Publish-Subscribe Model
Publish-Subscribe is a communication model that involves publishers, brokers and
consumers. Publishers are the source of data. Publishers send the data to the topics which are
managed by the broker. Publishers are not aware of the consumers. Consumers subscribe to
the topics which are managed by the broker. When the broker receive data for a topic from
the publisher, it sends the data to all the subscribed consumers.

16
Internet of Things AO6I Mrs.R.V.Karoshi

3. Push-Pull Model
Push-Pull is a communication model in which the data producers push the data to queues and
the consumers Pull the data from the Queues. Producers do not need to be aware of the
consumers. Queues help in decoupling the messaging between the Producers and Consumers.
Queues also act as a buffer which helps in situations when there is a mismatch between the
rate at which the producers push data and the rate rate at which the consumer pull data.

4. Exclusive Pair Model


Exclusive Pair is a bidirectional, fully duplex communication model that uses a persistent
connection between the client and server. Connection is setup it remains open until the client
sends a request to close the connection. Client and server can send messages to each other
after connection setup. Exclusive pair is stateful communication model and the server is
aware of all the open connections.

17
Internet of Things AO6I Mrs.R.V.Karoshi

3. IoT Communication APIs


Generally we used Two APIs For IoT Communication. These IoT Communication APIs are:

1. REST-based Communication APIs

2. WebSocket-based Communication APIs

1. REST-based Communication APIs


Representational state transfer (REST) is a set of architectural principles by which you can
design Web services the Web APIs that focus on systems’s resources and how resource states
are addressed and transferred. REST APIs that follow the request response communication
model, the rest architectural constraint apply to the components, connector and data elements,
within a distributed hypermedia system. The rest architectural constraint are as follows:
1. Client-server –
The principle behind the client-server constraint is the separation of concerns. for example
clients should not be concerned with the storage of data which is concern of the serve. Similarly
the server should not be concerned about the user interface, which is concern of the clien.
Separation allows client and server to be independently developed and updated.
2. Stateless –
Each request from client to server must contain all the information necessary to understand the
request, and cannot take advantage of any stored context on the server. The session state is kept
entirely on the client.
3. Cache-able –
Cache constraints requires that the data within a response to a request be implicitly or explicitly
leveled as cache-able or non cache-able. If a response is cache-able, then a client cache is given
the right to reuse that repsonse data for later, equivalent requests. caching can partially or
completely eliminate some instructions and improve efficiency and scalability.
4. Layered system –
layered system constraints, constrains the behavior of components such that each component
cannot see beyond the immediate layer with they are interacting. For example, the client cannot
tell whether it is connected directly to the end server or two an intermediaryalong the way.
System scalability can be improved by allowing intermediaries to respond to requests instead
of the end server, without the client having to do anything different.
5. Uniform interface –
uniform interface constraints requires that the method of communication between client and
server must be uniform. Resources are identified in the requests (by URIsin web based systems)
and are themselves is separate from the representations of the resources data returned to the
client. When a client holds a representation of resources it has all the information required to
update or delete the resource you (provided the client has required permissions). Each message
includes enough information to describe how to process the message.
18
Internet of Things AO6I Mrs.R.V.Karoshi

6. Code on demand –
Servers can provide executable code or scripts for clients to execute in their context. this
constraint is the only one that is optional.
A RESTful web service is a ” Web API ” implemented using HTTP and REST principles.
REST is most popular IoT Communication APIs.

2. WebSocket-based Communication APIs

 Websocket APIs allow bi-directional, full duplex communication between clients and
servers. Websocket APIs follow the exclusive pair communication model.
 Unlike request-response model such as REST, the WebSocket APIs allow full duplex
communication and do not require new coonection to be setup for each message to be
sent. Websocket communication begins with a connection setup request sent by the
client to the server.
 The request (called websocket handshake) is sent over HTTP and the server interprets
it is an upgrade request.
 If the server supports websocket protocol, the server responds to the websocket
handshake response.
 After the connection setup client and server can send data/mesages to each other in full
duplex mode.
 Websocket API reduce the network traffic and letency as there is no overhead for
connection setup and termination requests for each message.
 Websocket suitable for IoT applications that have low latency or high throughput
requirements. So Web socket is most suitable IoT Communication APIs for IoT
System.

19
Internet of Things AO6I Mrs.R.V.Karoshi

20
Internet of Things AO6I Mrs.R.V.Karoshi

1.4 IoT Enabling Technologies: Wireless Sensor Networks, Cloud


Computing, Big Data Analytics, Communication Protocols, Embedded
Systems

IoT is enabled by several technologies including wireless sensor networks, cloud computing,
big data analytics, Embedded Systems, Security Protocols and architectures, communication
protocols, web services, Mobile Internet, and Semantic Search engines.
So following is an overview of some of these technologies which play a key-role in IoT.
1. Wireless Sensor Networks:
A wireless sensor network comprises of distributed device with sensor which are used to
monitor the environmental and physical conditions. A WSN consists of a number of end-nodes
and routers and a coordinator. End Nodes have several sensors attached to them in node can
also act as routers. Routers are responsible for routing the data packets from end-nodes to the
coordinator. The coordinator collects the data from all the nodes.
Some examples of WSNs used in IoT systems are described as follows:
1. Weather monitoring system use WSNs in which the nodes collect temperature humidity
and other data which is aggregated and analyzed.
2. Indoor air quality monitoring systems use WSNs to collect data on the indoor air quality
and concentration of various gases
3. Soil moisture monitoring system use WSNs to monitor soil moisture at various
locations.
4. Surveillance system use WSNs for collecting Surveillance data (such as motion
detection data)
5. Smart grid use WSNs for monitoring the grid at various points.
6. Structural health monitoring system use WSNs to monitor the health of structures (
buildings, bridges) by collecting vibration data from sensor nodes de deployed at
various points in the structure.

2. Cloud Computing:
Cloud computing is a trans-formative computing paradigm that involves delivering
applications and services over the Internet Cloud computing involves provisioning of
computing, networking and storage resources on demand and providing these resources as
metered services to the users, in a “pay as you go” model. C loud computing resources can be
provisioned on demand by the users, without requiring interacyions with the cloud service
Provider. The process of provisioning resources is automated. Cloud computing resources can
be accessed over The network using standard access mechanisms that provide platform
independent access through the use of heterogeneous client platforms such as the workstations,
laptops, tablets and smartphones.

21
Internet of Things AO6I Mrs.R.V.Karoshi

Cloud computing services are offered to users in different forms:

Infrastructure as a Service (IaaS): Here hardware is provided by an external provider which


is managed for user.

Platform as a Service (PaaS): in addition to hardware, operating system layer is managed for
user.

Software as a Service (SaaS): further to the above two, an application layer is provided and
managed for user.

3. Big Data Analytics:

Big Data analytics is the process of collecting, organizing and analyzing large sets of data
(called Big Data) to discover patterns and other useful information. Big Data analytics can help
organizations to better understand the information contained within the data and will also help
identify the data that is most important to the business and future business decisions. Analysts
working with Big Data typically want the knowledge that comes from analyzing the data.

Some examples of big data generated by IoT systems are described as follows:

1. Sensor data generated by IoT system such as weather monitoring stations.


2. Machine sensor data collected from sensors embedded in industrial and energy systems
for monitoring their health and detecting Failures.
3. Health and fitness data generated by IoT devices such as wearable fitness bands
4. Data generated by ioT systems for location and tracking of vehicles
5. Data generated by retail inventory monitoring systems

Big data can be described by the following characteristics:

1. Volume – The quantity of generated and stored data. The size of the data determines
the value and potential insight, and whether it can be considered big data or not.

2. Variety – The type and nature of the data. This helps people who analyze it to
effectively use the resulting insight. Big data draws from text, images, audio, video;
plus it completes missing pieces through data fusion.

3. Velocity – In this context, the speed at which the data is generated and processed to
meet the demands and challenges that lie in the path of growth and development. Big
data is often available in real-time. Compared to small data, big data are produced more
continually. Two kinds of velocity related to Big Data are the frequency of generation
and the frequency of handling, recording, and publishing.

22
Internet of Things AO6I Mrs.R.V.Karoshi

4. Communication Protocols:

Communication protocols form the backbone of IoT systems and enable network connectivity
and coupling to applications. Communication protocols allow devices to exchange data over
the network. Multiple protocols often describe different aspects of a single communication. A
group of protocols designed to work together are known as a protocol suite; when implemented
in software they are a protocol stack.

Internet communication protocols are published by the Internet Engineering Task Force
(IETF). The IEEE handles wired and wireless networking, and the International Organization
for Standardization (ISO) handles other types. The ITU-T handles telecommunication
protocols and formats for the public switched telephone network (PSTN). As the PSTN and
Internet converge, the standards are also being driven towards convergence.

In IoT we used MQTT, COAP, AMQP etc. protocols.

5. Embedded Systems:
As its name suggests, Embedded means something that is attached to another thing. An
embedded system can be thought of as a computer hardware system having software
embedded in it. An embedded system can be an independent system or it can be a part of a
large system. An embedded system is a controller programmed and controlled by a real-time
operating system (RTOS) with a dedicated function within a larger mechanical or electrical
system, often with real-time computing constraints. It is embedded as part of a complete
device often including hardware and mechanical parts. Embedded systems control many
devices in common use today. Ninety-eight percent of all microprocessors are manufactured
to serve as embedded system component.

An embedded system has three components −

1. It has hardware.
2. It has application software.
3. It has Real Time Operating system (RTOS) that supervises the application software
and provide mechanism to let the processor run a process as per scheduling by
following a plan to control the latencies. RTOS defines the way the system works. It
sets the rules during the execution of application program. A small scale embedded
system may not have RTOS.

23
Internet of Things AO6I Mrs.R.V.Karoshi

1 .5 IoT Levels and Deployment templates — IoT Level-1, IoT Leve1-2, IoT Level-3,
IoT Level-4, IoT Level-5, IoT Level- 6.
We can’t use same approach for every problem statement. Hence following are 6 IoT
Deployment templates based on Complexity.
An IoT system comprises of the following components:

1. Device: Allows identification, remote sensing, actuating and remote monitoring


capabilities. IoT devices include wireless sensors, software, actuators, and computer
devices. They are attached to a particular object that operates through the internet,
enabling the transfer of data among objects or people automatically without human
intervention.

2. Resource: These are Software components on the IoT device for accessing,
processing, and storing sensor information, or controlling
actuators connected to the device.

3. Controller Service: A native service that runs on the device and work between node
device and web services. Controller service sends data from the device to the web
service and receives commands from the application (via web services) for controlling
the device.

4. Database: A storage place for Collected or generated data. It can be local or cloud
based.

5. Web Service: Web services serve as a link between the IoT device, application,
database and analysis components. Web service can be either implemented using
HTTP and REST principles (REST service) or using WebSocket protocol
(WebSocket service).

6. Analysis Component: Responsible for analyzing the IoT data and generate results in
a form which are easy for the user to understand.

7. Application: IoT applications provide an interface that the users can use to control
and monitor various aspects of the IoT system. It allow users to view the system
Monitor and processed data.

24
Internet of Things AO6I Mrs.R.V.Karoshi

1. IoT Level-1:

25
Internet of Things AO6I Mrs.R.V.Karoshi

2. IoT Level-2:

26
Internet of Things AO6I Mrs.R.V.Karoshi

3. IoT Level-3:

27
Internet of Things AO6I Mrs.R.V.Karoshi

4. IoT Level-4:

28
Internet of Things AO6I Mrs.R.V.Karoshi

5. IoT Level-5:

29
Internet of Things AO6I Mrs.R.V.Karoshi

6. IoT Level-6:

30
Internet of Things AO6I Mrs.R.V.Karoshi

1.6 Challenges in IoT:


1. Security:

Protecting sensitive data and devices from hacking and cyber-attacks.

2. Interoperability:

Ensuring devices from different manufacturers can work together seamlessly.

3. Scalability:

Managing a growing number of devices and the data they generate.

4. Reliability:

Ensuring devices work consistently and correctly.

5. Privacy:

Protecting user privacy and sensitive data.

6. Regulation:

Navigating evolving government regulations and industry standards.

7. Integration:

Integrating IoT devices and data into existing systems and infrastructure.

8. Cost:

Balancing the costs of deploying and maintaining IoT devices with their benefits.

9. Power consumption:

Minimizing the power consumption of IoT devices to extend battery life.

10. Complexity:

Simplifying the deployment and management of large numbers of IoT devices.

31

You might also like