IOT UNIT - 1 (1)
IOT UNIT - 1 (1)
FUNDAMENTALS OF IOT
DEFINITION
The Internet of Things (IoT) describes the network of physical objects things
that are embedded with sensors, software, and other technologies for the
purpose of connecting and exchanging data with other devices and systems over
the internet.
[ OR ]
CHARACTERISTICS OF IoT
SENSORS
Sensors are devices that detect external information, replacing it with a signal
that humans and machines can distinguish.
TRANSDUCER :
A transducer converts a signal from one physical structure to another.
It converts one type of energy into another type.
It might be used as actuators in various systems.
SENSORS CHARACTERISTICS :
Static
Dynamic
1. STATIC CHARACTERISTICS :
It is about how the output of a sensor changes in response to an input change after
steady state condition.
ACCURACY
Gives the highest and the lowest value of the physical quantity within which the
sensor can actually sense. Beyond these values, there is no sense or no kind of
response.
Provide the smallest changes in the input that a sensor is able to sense.
PRECISION
It is the capacity of a measuring instrument to give the same
reading when repetitively measuring the same quantity
under the same prescribed conditions. It implies agreement
between successive readings, NOT closeness to the true value.
SENSITIVITY
Sensitivity indicates the ratio of incremental change in the response of the
system with respect to incremental change in input parameters. It can be found
from the slope of the output characteristics curve of a sensor. It is the smallest
amount of difference in quantity that will change the instrument’s reading.
LINEARITY
The deviation of the sensor value curve from a particular straight line. Linearity
is determined by the calibration curve. The static calibration curve plots the
output amplitude versus the input amplitude under static conditions.
DRIFT
The difference in the measurement of the sensor from a specific reading when
kept at that value for a long period of time.
REPEATABILITY
2. DYNAMIC CHARACTERISTICS :
PROPERTIES OF
THESYSTEMS
ZERO-ORDER
SYSTEM
The output shows a response to the input signal with no delay. It does not
include energy-storing elements. Ex. potentiometer measure, linear and rotary
displacements.
FIRST-ORDER SYSTEM
SECOND-ORDER SYSTEM
Complex output response. The output response of the sensor oscillates before
steady state.
SENSOR CLASSIFICATION :
Passive & Active
Analog & digital
Scalar & vector
Passive Sensor
Cannot independently sense the input. Ex- Accelerometer, soil moisture, water
level and temperature sensors.
Active Sensor
Independently sense the input. Example- Radar, sounder and laser altimeter
sensors.
Analog Sensor
The response or output of the sensor is some continuous function of its input
parameter. Ex- Temperature sensor, LDR, analog pressure sensor and analog
hall effect.
Digital sensor
Scalar sensor
Detects the input parameter only based on its magnitude. The answer for the
sensor is a function of magnitude of some input parameter. Not affected by the
direction of input parameters.
Example – temperature, gas, strain, color and smoke sensor.
Vector sensor
The response of the sensor depends on the magnitude of the direction and
orientation of input parameter. Example – Accelerometer, gyroscope, magnetic
field and motion detector sensors.
ACTUATORS
Actuator is a device that converts energy into motion. It does this by taking an
electrical signal and combining it with an energy source.
The control system acts upon an environment through the actuator. It requires a
source of energy and a control signal. When it receives a control signal, it
converts the source of energy to a mechanical operation. On this basis, on which
form of energy it uses, it has different types given below.
TYPES OF ACTUATORS :
1. Hydraulic Actuators
ADVANTAGES :
Hydraulic actuators can produce a large magnitude of force and high speed.
Used in welding, clamping, etc.
Used for lowering or raising the vehicles in car transport
carriers.
DISADVANTAGES :
Hydraulic fluid leaks can cause efficiency loss and issues of cleaning.
It is expensive.
It requires noise reduction equipment, heat exchangers, and
high maintenance systems.
2. Pneumatic Actuators
ADVANTAGES :
They are a low-cost option and are used at extreme temperatures where
using air is a safer option than chemicals.
They need low maintenance, are durable, and have a long operational life.
It is very quick in starting and stopping the motion.
DISADVANTAGES :
3. Electrical Actuators
ADVANTAGES :
DISADVANTAGES :
It is expensive.
It depends a lot on environmental conditions.
The “Things” in IoT usually refers to IoT devices which have unique
identities and can perform remote sensing, Actuating and monitoring
capabilities.
IoT devices can exchange data with other connected devices and applications
directly or indirectly.
It collect data from other devices and process the data locally or send the data
to Centralized servers or cloud based applications back ends for processing the
data i.e : Memory, processing calibrators, communication latencies and speed
and deadlines.
An IoT Device can collect various types of data from the onboard or attached
sensors, such as temperature e , humidity, light intensity.
IoT devices can also be varied types, for instance, wearable sensors, smart
watches, LED light automobiles and industrial machines.
Almost all I would advise generate data in Some form or the other which
when processed by Data Analytics systems leads to Useful information to guide
further actions locally or remotely.
IoT PROTOCOLS
LINK LAYER:
Link layer protocols determine how data is physically sent over the network’s
physical layer or medium (Coaxial cable or other or radio wave). This Layer
determines how the packets are coded and signalled by the hardware device
over the medium to which the host is attached (e.g. coaxial cable).
802.3 – ETHERNET :
IEEE 802.3 defines the physical layer and the medium access control (MAC)
sub-layer of the data link layer for wired Ethernet networks.
For example :
o called WiMAX.
Wimax standard provides a data rates from from 1.5 Mb/s to 1Gb/s the
recent update provides data rates of hundred megabits per second for
mobile station.
802.15.4 LR-WPAN: Low rate Wireless Personal Area Network.
IEEE 802.1 5.4 is a collections of standard for low rate wireless personal area
network(LRWPAN).These standard form the basis of specifications for high
level communication.
Zigbee- LR-WPAN standards provide data rates from 40 kb/ s. These standards
provide low cost and low speed Communications for power constrained devices.
NETWORK LAYER:
IPV4:
IPv6:
It is the newest versions of internet protocol and successor to IPv4. IPv6 uses 128
bit address schemes that are lost total of 2 128 are 3.4* 10 38 address.
6LoWPAN:
IPv6 over low power wireless personal area networks brings IP protocol to the
low power device which have limited processing capability it operate in the 2.4
GHz frequency range and provide the data transfer rate off to 50 kb/s.
TRANSPORT LAYER
This layer provides functions such as error control, segmentation, flow control
and congestion control. So this layer protocols provide end-to-end message
transfer capability independent of the underlying network.
TCP works with the Internet Protocol (IP), which defines how computers
send packets of data to each other.
APPLICATION LAYER
Application layer protocols define how the applications interface with the
lower layer protocols to send over the network.
WEBSOCKET:
Web socket protocol allows full duplex communication over a single socket
connections for sending message between client and server.
Web socket is based on TCP and Allows streams of messages to be sent back
and forth between the client and server while keeping the TCP connection open.
The client can be a browser, a mobile application and IoT
device. MQTT: Message Queue Telemetry Transport
AMQP support point to point and publish subscribe model routing and
queuing.
Services : An IoT system uses various types of IoT services such as services for
device monitoring ,device control services ,data publishing services and services
for device Discovery.
Application: IoT application provides and interface that the user can used to
control and monitor various aspects of the IoT system. Application also allow
users to view the system status and view or analyze the processed to data.
The client, when required, requests the information from the server. This
request is usually in the encoded format.
This model is stateless since the data between the requests is not retained
and each request is independently handled.
The server Categories the request, and fetches the data from the database and
its resource representation.
This data is converted to response and is transferred in an encoded format to
the client. The client, in turn, receives the response.
When the server receives the request it decides how to respond, fetches the
data retrieves resources, and prepares the response, and sends it to the client.
2. PUBLISHER-SUBSCRIBER MODEL
Publishers are the source of data. It sends the data to the topic which are
managed by the broker. They are not aware of consumers.
The push-pull model constitutes data publishers, data consumers, and data
queues.
Publishers publish the message/data and push it into the queue. The
consumers, present on the other side, pull the data out of the queue.
Thus, the queue acts as the buffer for the message when the difference occurs
in the rate of push or pull of data on the side of a publisher and consumer.
The connection is constant and remains open till the client sends a request to
close the connection.
The Server has the record of all the connections which has been opened.
This is a state-full connection model and the server is aware of all open
connections.
REST-basedCommunicationAPIs:
REPRESENTATIONALSTATE TRANSFER (REST)
It is a set of architectural principles by which you can design Web services
the Web APIs that focus on systems’s resources and how resource states are
addressed and transferred.
REST APIs that follow the request response communication model, the rest
architectural constraint apply to the components, connector and data elements,
within a distributed hypermedia system.
Stateless: Each request from client to server must contain all the information
necessary to understand the request, and cannot take advantage of any stored
context on the server.
If a response is cache-able, then a client cache is given the right to reuse that
response data for later, equivalent requests. caching can partially or completely
eliminate some instructions and improve efficiency and scalability.
Layered system: layered system constraints, constrains the behavior of
components such that each component cannot see beyond the immediate layer
with they are interacting.
For example, the client cannot tell whether it is connected directly to the end
server or two an intermediary along the way.
Resources are identified in the requests (by URIsin web based systems) and
are themselves is separate from the representations of the resources data
returned to the client.
When a client holds a representation of resources it has all the information
required to update or delete the resource you (provided the client has required
permissions).
Code on demand – Servers can provide executable code or scripts for clients to
execute in their context. this constraint is the only one that is optional.
Web Socket APIs allow bi- directional, full duplex communication between
clients and servers. WebSocket APIs follow the exclusive pair communication
model.
Once the connection is setup it remains open until the client sends a
request to close the connection.
Client and server can send messages to each other after connection setup.
IoT ENABLED TECHNOLOGIES
A WSN comprises distributed devices with sensors which are used to monitor
the environmental and physical conditions. A wireless sensor network consists
of end nodes, routers and coordinators. End nodes have several sensors attached
to them where the data is passed to a coordinator with the help of routers. The
coordinator also acts as the gateway that connects WSN to the internet.
Example :
With Cloud computing, users can access any resources from anywhere like
databases, webservers, storage, any device, and any software over the internet.
Characteristics :
SaaS applications run on a SaaS provider’s service and they manage security
availability and performance.
Big data is gathered from a variety of sources including social network videos,
digital images, sensors and sales transaction records.
Data cleaning
Munging
Processing
Visualization
Examples :
Bank transactions
Data generated by IoT systems for location and tracking of vehicles
E-commerce and in Big-Basket
Health and fitness data generated by IoT system such as a fitness bands
COMMUNICATIONS PROTOCOLS
They are the backbone of IoT systems and enable network connectivity and
linking to applications. Communication protocols allow devices to exchange
data over the network. Multiple protocols often describe different aspects of a
single communication. A group of protocols designed to work together is
known as a protocol suite; when implemented in software they are a protocol
stack.
They are used in
Data encoding
Addressing schemes
EMBEDDED SYSTEMS
Examples :
Digital camera
DVD player, music player
Industrial robots
Wireless Routers etc.
Database: Database can be either local or in the cloud and stores the data
generated by the IoT device.
Web Service: Web services serve as a link between the IoT device,
application, database and analysis components.
Web service can be either implemented using HTTP and REST principles
(REST service) or using WebSocket protocol (WebSocket service).
Application: IoT applications provide an interface that the users can use to
control and monitor various aspects of the IoT system. Applications also allow
users to view the system status and view the processed data.
IoT Level 1:
A level-1 IoT system has a single node/device that performs sensing and/or
actuation, stores data, performs analysis and hosts the application.
Level-1 IoT systems are suitable for modeling low- cost and low-complexity
solutions where the data involved is not big and the analysis requirements are
not computationally intensive.
IoT Level 2:
A level-2 IoT system has a single node that performs sensing and/or
actuation and local analysis.
Data is stored in the cloud and application is usually cloud- based.
Level-2 IoT systems are suitable for solutions where the data involved is
big, however, the primary analysis requirement is not computationally intensive
and can be done locally itself.
IoT Level 3:
A level-3 IoT system has a single node. Data is stored and analyzed in the
cloud and application is cloud- based.
Level-3 IoT systems are suitable for solutions where the data involved is big
and the analysis requirements are computationally intensive.
IoT Level 4:
A level-4 IoT system has multiple nodes that perform local analysis. Data is
stored in the cloud and application is cloud-based.
Level-4 contains local and cloud- based observer nodes which can subscribe
to and receive information collected in the cloud from IoT devices.
Level-4 IoT systems are suitable for solutions where multiple nodes are
required, the data involved is big and the analysis requirements are
computationally intensive.
IoT Level 5:
A level-5 IoT system has multiple end nodes and one coordinator node.
The end nodes that perform sensing and/or actuation.
Coordinator node collects data from the end nodes and sends to the cloud.
Data is stored and analyzed in the cloud and application is cloud-based.
Level-5 IoT systems are suitable for solutions based on wireless sensor
networks, in which the data involved is big and the analysis requirements are
computationally intensive.
IoT Level 6:
A level-6 IoT system has multiple independent end nodes that perform
sensing and/or actuation and send data to the cloud.
Data is stored in the cloud and application is cloud-based.
The analytics component analyzes the data and stores the results in the
cloud database.
The results are visualized with the cloud-based application.
The centralized controller is aware of the status of all the end nodes and
sends control commands to the nodes.
HOME AUTOMATION
b) Smart Appliances: make the management easier and also provide status
information to the users remotely.
c) Intrusion Detection: use security cameras and sensors(PIR sensors and door
sensors) to detect intrusion and raise alerts. Alerts can be in the form of SMS or
email sent to the user.
CITIES
a) Smart Parking: It make the search for parking space easier and convenient
for drivers. Smart parking are powered by IoT systems that detect the no. of
empty parking slots and send information over internet to smart application
backends.
b) Smart Lighting: for roads, parks and buildings can help in saving energy.
ENVIRONMENT
d) Forest Fire Detection: Forest fire can cause damage to natural resources,
property and human life. Early detection of forest fire can help in minimizing
damage.
e) River Flood Detection: River floods can cause damage to natural and
human resources and human life. Early warnings of floods can be given by
monitoring the water level and flow rate. IoT based river flood monitoring
system uses a no. of sensor nodes that monitor the water level and flow rate
sensors.
ENERGY
RETAIL
LOGISTICS
a) Route generation & scheduling: IoT based system backed by cloud can
provide first response to the route generation queries and can be scaled upto
serve a large transportation network.
b) Fleet Tracking: Use GPS to track locations of vehicles in real-time.
c) Shipment Monitoring: IoT based shipment monitoring systems use sensors
such as temp, humidity, to monitor the conditions and send data to
cloud, where it can be analyzed to detect food spoilage.
AGRICULTURE
b) Wearable Electronics
UNIT II
IOT PROTOCOLS
DEFINE PROTOCOL:
It define the rules and formats for setting up and managing IoT networks,
along with how data are transmitted across these networks.
M2M:
Machine-to-Machine (M2M) refers to networking of machines (or devices)
for the purpose of remote monitoring and control and data exchange.
Fig. Shows the end-to-end architecture of M2M systems comprises of M2M area
networks, communication networks and application domain.
Since non-IP based protocols are used within M2M area network, the M2M
nodes within one network cannot communicate with nodes in an external
network
Depending on the environment, the types of networks are decided so that those
can be deployed underwater, underground, on land, and so on. Different types of
WSNs include:
1. Terrestrial WSNs
2. Underground WSNs
3. Underwater WSNs
4. Multimedia WSNs
5. Mobile WSNs
Terrestrial WSNs
Underground WSNs
The underground wireless sensor networks are more expensive than the
terrestrial WSNs in terms of deployment, maintenance, and equipment
cost considerations and careful planning.
The WSNs networks consist of several sensor nodes that are hidden in the
ground to monitor underground conditions. To relay information from the
sensor nodes to the base station, additional sink nodes are located above
the ground.
The underground wireless sensor networks deployed into the ground are
difficult to recharge. The sensor battery nodes equipped with limited
battery power are difficult to recharge. In addition to this, the underground
environment makes wireless communication a challenge due to the high
level of attenuation and signal loss.
Multimedia WSNs
Mobile WSNs
Mobile wireless sensor networks are much more versatile than static
sensor networks. The advantages of MWSN over static wireless sensor
networks include better and improved coverage, better energy efficiency,
superior channel capacity, and so on
IoT data is collected in the cloud and can be accessed by cloud applications such
as analytics applications, enterprise applications, remote diagnosis and
management applications, etc.
WSN Protocol
The data sensed by the sensor nodes in a wireless sensor network (WSN) is
typically forwarded to the base station that connects the sensor network with the
other networks (may be internet) where the data is collected, analyzed and some
action is taken accordingly.
LIST OF WSN PROTOCOLS:
SCADA
SCADA (supervisory control and data acquisition) is a category of
software applications for controlling industrial processes, which is the
gathering of data in real time from remote locations in order to control
equipment and conditions. SCADA provides organizations with the tools
needed to make and deploy data-driven decisions regarding their
industrial processes.
One of the most commonly used types of industrial control system,
SCADA can be used to manage almost any type of industrial process.
SCADA systems include hardware and software components. The
hardware gathers and feeds data into field controller systems, which
forward the data to other systems that process and present it to a human-
machine interface (HMI) in a timely manner. SCADA systems also record
and log all events for reporting process status and issues. SCADA
applications warn when conditions become hazardous by sounding
alarms.
Components of a SCADA system
SCADA systems include components deployed in the field to gather real-
time data, as well as related systems to enable data collection and
enhance industrial automation.
SCADA components include the following:
Sensors and actuators. A sensor is a feature of a device or
system that detects inputs from industrial processes.
An actuator is a feature of the device or system that controls the
mechanism of the process. In simple terms, a sensor functions
like a gauge or meter, which displays the status of a machine;
an actuator acts like a switch, dial or control valve that can be
used to control a device. Both sensors and actuators are
controlled and monitored by SCADA field controllers.
SCADA field controllers. These interface directly with sensors
and actuators. There are two categories of field controllers:
1. Remote telemetry units, also called remote terminal
units (RTUs), interface with sensors to
collect telemetry data and forward it to a primary system for
further action.
2. Programmable logic controllers (PLCs) interface with
actuators to control industrial processes, usually based on
current telemetry collected by RTUs and the standards set
for the processes.
SCADA supervisory computers. These control all SCADA
processes and are used to gather data from field devices and to
send commands to those devices to control industrial processes.
HMI software. This provides a system that consolidates and
presents data from SCADA field devices and enables operators
to understand and, if needed, modify the status of SCADA-
controlled processes.
Communication infrastructure. This enables SCADA
supervisory systems to communicate with field devices and
field controllers. This infrastructure enables SCADA systems to
collect data from field devices and to control those devices.
Tags
RFID devices fall into two broad categories, those with a power supply (a
battery) and those without. An RFID device that actively transmitted to a
reader is known as a transponder (TRANSmitter/resPONDER).
Unpowered passive devices are known as “tags”.
Active tags are typically also read/write devices while passive tags are
generally read only. Active tags are larger and more expensive that
passive tags. The use of a battery places a limit on the life of the device,
although with current battery technology this may be as much as ten
years.
Passive tags have an unlimited life, are lighter, smaller and cheaper. The
trade-off is limited data storage capability, a shorter read range and they
require a higher-power reader. Performance is reduced in
electromagnetically “noisy” environments.
There are also semi-passive tags where the battery runs the chip’s
circuitry but the device communicates by drawing power from the reader.
Tags are available in a wide variety of shapes, sizes and protective
housings. Animal tracking tags, which are injected beneath the skin, are
approximately 10mm long and 1mm in diameter. Some tags are
encapsulated in credit card sized packages, typically building access
cards. Others are for use in harsh environments such as container tracking
applications and can measure 120x100x50mm. The smallest devices
commercially available measure 0.4x0.4mm and are thinner than a sheet
of paper.
Tag Data
Tags can incorporate read only memory (ROM), volatile read/write
random access memory (RAM) or write once/read many memory
(WORM). ROM is used to store security data, a unique device identifier
and operating system instructions. RAM is used for data storage during
transponder interrogation and response.
Data will comprise a unique identifier and may also include:
An operating system;
Data storage (volatile or non-volatile);
An electronic product code (EPC - the successor to the bar-code).
Tag Operation
Passive tags draw their power from the transmission of the reader through
inductive coupling. The passive tags will then respond to the enquiry.
Inductive coupling usually requires close proximity.
Active tags usually communicate through propagation coupling and
respond to the reader’s transmission drawing on internal power to
transmit
The RFID reader acts like an access point for RFID tagged items so that
the tags' data can be made available to business applications
There are many different levels of protocols, but the ones that most directly
relate to business and social issues are the ones closest to the top, the so-
called application protocols such as HTML/ HTTP for the web.
With the addition of technologies like the canvas element, Web GL, and
scalable vector graphics (SVG) images in HTML5, this is no longer the case.
In fact, many new features deal with graphics on the web with HTML5.
SOAP and RESTful protocol frameworks are extensions on top of HTTP for
web services.SOAP and REST frameworks can be used to provide data
exchange protocols for IoT applications.
XML is a markup language used to create smart data and documents for
applications. A newer standard such as ebXML incorporates as part of its
design solution some borrowed ideas from both EDI and XML.
There are many efforts to create a unified, cross- segment data representation
standard for WoT. Due to domain knowledge differences, this is a great
technological challenge or even mission impossible.
Even within a pillar segment, it’s not an easy task to create a unified data
standard.
Unified Identification of Objects
One of the key issues of unified data format for IoT is the unique identification of
objects. When the IoT application is within the intranet or extranet of an
organization, which is the case most often currently, the identification is not an
issue.
The long- term solution is IPv6, which enables orders of magnitude larger
numbers of available IP addresses. Most mobile network operators (MNOs)
are in the planning stages for this transition to IPv6 or have already made the
transition.
However, it’s a bit complex to use compared with other schemes such as
UUID, EPC, or uID.
EPC, uID, UUID, and so forth are basically fixed- length IDs, while OID and
others are variable- length IDs. OID is more flexible in intranet and extranet
IoT applications.