0% found this document useful (0 votes)
19 views

Unit 5 - IoT

IOT

Uploaded by

Ramesh Kumar A
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Unit 5 - IoT

IOT

Uploaded by

Ramesh Kumar A
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 59

INTERNET OF THINGS UNIT - 5

WHAT IS IOT ? | INTERNET OF


THINGS
Internet of things (IoT) provides IP connectivity to various Things apart from general
Desktops, Laptops and Mobile Devices. The term “things” means any physical
parameter that could be sensed and connected to Internet. For example a device
monitoring temperature and humidity at certain location and relaying the data will
become a “thing’” in IoT domain.
Internet of things is a connecting bridge between physical world and cyber world
and Machine to Machine communication i.e. without human intervention is one of
the subset of it. IoT Refers to uniquely identifiable objects and their virtual
representations in an Internet like structure. IoT all together a new environment in
which current Internet will be smartly utilized by all new range of embedded
connected things.
WHAT IS AN EXAMPLE OF AN
INTERNET OF THINGS DEVICE?
Any physical object can be transformed into an IoT device if it can be connected to
the internet to be controlled or communicate information. A lightbulb that can be
switched on using a smartphone app is an IoT device, as is a motion sensor or a
smart thermostat in your office or a connected streetlight. An IoT device could be as
fluffy as a child’s toy or as serious as a driverless truck. Some larger objects may
themselves be filled with many smaller IoT components, such as a jet engine that’s
now filled with thousands of sensors collecting and transmitting data back to make
sure it is operating efficiently. At an even bigger scale, smart cities projects are
filling entire regions with sensors to help us understand and control the environment.
IOT SENSORS AND
ACTUATORS
WHAT IS THE SCOPE OF
INTERNET OF THINGS?
Internet of Things can connect devices embedded in various systems to the
internet. When devices/objects can represent themselves digitally, they can be
controlled from anywhere. The connectivity then helps us capture more data
from more places, ensuring more ways of increasing efficiency and
improving safety and IoT security.
IoT is a transformational force that can help companies improve performance
through IoT analytics and IoT Security to deliver better results. Businesses
in the utilities, oil & gas, insurance, manufacturing, transportation,
infrastructure and retail sectors can reap the benefits of IoT by making more
informed decisions, aided by the torrent of interactional and transactional
data at their disposal.
HOW CAN INTERNET OF
THINGS HELP?
IoT platforms can help organizations reduce cost through improved process
efficiency, asset utilization and productivity. With improved tracking of
devices/objects using sensors and connectivity, they can benefit from real-
time insights and analytics, which would help them make smarter decisions.
The growth and convergence of data, processes and things on the internet
would make such connections more relevant and important, creating more
opportunities for people, businesses and industries.
PHYSICAL DESIGN OF IOT
Things
Basically Things refers to IoT Devices which have unique identities and can perform
remote sensing, actuating and monitoring capabilities. Things are is main part of IoT
Application. IoT Devices can be various type, Sensing Devices, Smart Watches,
Smart Electronics appliances, Wearable Sensors, Automobiles, and industrial
machines. These devices generate data in some forms or the other which when
processed by data analytics systems leads to useful information to guide further
actions locally or remotely.
 For example, Temperature data generated by a Temperature Sensor in Home or other
place, when processed can help in determining temperature and take action according
to users. Above picture, shows a generic block diagram of IoT device. It may consist of
several interfaces for connections to other devices. IoT Device has I/O interface for
Sensors, Similarly for Internet connectivity, Storage and Audio/Video. IoT Device collect
data from on-board or attached Sensors and Sensed data communicated either to
other device or Cloud based sever. Today many cloud servers available for especially
IoT System. These Platfrom known as IoT Platform. Actually these cloud especially
design for IoT purpose. So here we can analysis and processed data easily.

IoT Protocols
IoT protcols help to establish Communication between IoT Device
(Node Device) and Cloud based Server over the Internet. It help to sent
commands to IoT Device and received data from an IoT device over the
Internet. An image is given below. By this image you can understand
which protocols used.
LINK LAYER
Link layer protocols determine how data is physically sent over the network’s physical layer
or medium (Coxial calbe or other or radio wave). This Layer determines how the packets are
coded and signaled by the hardware device over the medium to which the host is attached
(eg. coxial cable).
Here we explain some Link Layer Protocols:
802.3 – Ethernet : Ethernet is a set of technologies and protocols that are used primarily in
LANs. It was first standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the
physical layer and the medium access control (MAC) sub-layer of the data link layer for
wired Ethernet networks. Ethernet is classified into two categories: classic Ethernet and
switched Ethernet.
802.11 – WiFi : IEEE 802.11 is part of the IEEE 802 set of LAN protocols, and specifies the
set of media access control (MAC) and physical layer (PHY) protocols for implementing
wireless local area network (WLAN) Wi-Fi computer communication in various frequencies,
including but not limited to 2.4 GHz, 5 GHz, and 60 GHz frequency bands.
LINK LAYER
802.16 – Wi-Max : The standard for WiMAX technology is a standard for Wireless
Metropolitan Area Networks (WMANs) that has been developed by working group number
16 of IEEE 802, specializing in point-to-multipoint broadband wireless access.
802.15.4 -LR-WPAN : A collection of standards for Low-rate wireless personal area
network. The IEEE’s 802.15.4 standard defines the MAC and PHY layer used by, but not
limited to, networking specifications such as Zigbee®, 6LoWPAN, Thread, WiSUN and
MiWi™ protocols. The standards provide low-cost and low-speed communication for power
constrained devices.
2G/3G/4G- Mobile Communication : These are different types of telecommunication
generations. IoT devices are based on these standards can communicate over the celluer
networks.
NETWORK LAYER
Responsible for sending of IP datagrams from the source network to the destination network. Network layer
performs the host addressing and packet routing. We used IPv4 and IPv6 for Host identification. IPv4 and IPv6 are
hierarchical IP addrssing schemes.
IPv4 :
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer
network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network
interface identification and location addressing. Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit
number. However, because of the growth of the Internet and the depletion of available IPv4 addresses, a new version
of IP (IPv6), using 128 bits for the IP address, was standardized in 1998. IPv6 deployment has been ongoing since
the mid-2000s.
IPv6 : Internet Protocol version 6 (IPv6) is successor of IPv4. IPv6 was developed by the Internet Engineering
Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. In December 1998, IPv6
became a Draft Standard for the IETF, who subsequently ratified it as an Internet Standard on 14 July 2017. IPv6
uses a 128-bit address, theoretically allowing 2 128, or approximately 3.4×1038 addresses. Source – wikipedia
6LoWPAN : It is an acronym of IPv6 over Low-Power Wireless Personal Area Networks. 6LoWPAN is the name of
a concluded working group in the Internet area of the IETF. This protocol allows for the smallest devices with
limited processing ability to transmit information wirelessly using an internet protocol. 6LoWPAN can communicate
with 802.15.4 devices as well as other types of devices on an IP network link like WiFi.
TRANSPORT LAYER
This layer provides functions such as error control, segmentation, flow control and
congestion control. So this layer protocols provide end-to-end message transfer capability
independent of the underlying network.
TCP : TCP (Transmission Control Protocol) is a standard that defines how to establish and
maintain a network conversation through which application programs can exchange data.
TCP works with the Internet Protocol (IP), which defines how computers
send packets of data to each other. Together, TCP and IP are the basic rules defining the
Internet. The Internet Engineering Task Force (IETF) defines TCP in the Request for
Comment (RFC) standards document number 793.
UDP : User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of
Internet Protocol suite, referred as UDP/IP suite. Unlike TCP, it is unreliable and
connectionless protocol. So, there is no need to establish connection prior to data transfer.
APPLICATION LAYER
Application layer protocols define how the applications interface with the lower layer
protocols to send over the network.
HTTP : Hypertext Transfer Protocol (HTTP) is an application-layer protocol for transmitting
hypermedia documents, such as HTML. It was designed for communication between web
browsers and web servers, but it can also be used for other purposes. HTTP follows a
classical client-server model, with a client opening a connection to make a request, then
waiting until it receives a response. HTTP is a stateless protocol, meaning that the server
does not keep any data (state) between two requests.

CoAP : CoAP-Constrained Application Protocol is a specialized Internet Application


Protocol for constrained devices, as defined in RFC 7252. It enables devices to communicate
over the Internet. The protocol is especially targeted for constrained hardware such as 8-bits
microcontrollers, low power sensors and similar devices that can’t run on HTTP or TLS.
APPLICATION LAYER
WebSocket : The WebSocket Protocol enables two-way communication between a
client running untrusted code in a controlled environment to a remote host that has
opted-in to communications from that code. The security model used for this is the
origin-based security model commonly used by web browsers.
MQTT : MQTT is a machine-to-machine (M2M)/”Internet of Things” connectivity
protocol. It was designed as an extremely lightweight publish/subscribe messaging
transport and useful for connections with remote locations where a small code
footprint is required and/or network bandwidth is at a premium.
XMPP : Extensible Messaging and Presence Protocol (XMPP) is a
communication protocol for message-oriented middleware based on XML
(Extensible Markup Language). It enables the near-real-time exchange of structured
yet extensible data between any two or more network entities.
APPLICATION LAYER
DDS : The Data Distribution Service (DDS™) is a middleware protocol and API
standard for data-centric connectivity from the Object Management Group®
(OMG®). It integrates the components of a system together, providing low-latency
data connectivity, extreme reliability, and a scalable architecture that business and
mission-critical Internet of Things (IoT) applications need.
AMQP : The AMQP – IoT protocols consist of a hard and fast of components that
route and save messages within a broker carrier, with a set of policies for wiring the
components together. The AMQP protocol enables patron programs to talk to the
dealer and engage with the AMQP model.
LOGICAL DESIGN OF IOT
In this article we discuss Logical design of Internet of things. Logical design of IoT
system refers to an abstract representation of the entities & processes without going
into the low-level specifies of the implementation. For understanding Logical Design
of IoT, we describes given below terms.
1. IoT Functional Blocks
2. IoT Communication Models
3. IoT Communication APIs
IOT FUNCTIONAL BLOCKS
An IoT system comprises of a number of functional blocks that provide the system the capabilities for
identification, sensing, actuation, communication and management.
functional blocks are:
Device: An IoT system comprises of devices that provide sensing, actuation, monitoring and control
functions.
Communication: Handles the communication for the IoT system.
Services: services for device monitoring, device control service, data publishing services and services
for device discovery.
Management: this blocks provides various functions to govern the IoT system.
Security: this block secures the IoT system and by providing functions such as authentication ,
authorization, message and content integrity, and data security.
Application: This is an interface that the users can use to control and monitor various aspects of the
IoT system. Application also allow users to view the system status and view or analyze the processed
data.
IOT FUNCTIONAL BLOCKS
IOT COMMUNICATION
MODELS
REQUEST-
RESPONSE

MODEL
Request-response model is communication
model in which the client sends requests to the
server and the server responds to the requests.
When the server receives a request, it decides
how to respond, fetches the data, retrieves
resource representation, prepares the response,
and then sends the response to the client.
Request-response is a stateless communication
model and each request-response pair is
independent of others.
• HTTP works as a request-response protocol
between a client and server. A web browser may
be the client, and an application on a computer
that hosts a web site may be the server.
• Example: A client (browser) submits an
HTTP request to the server; then the server
returns a response to the client. The response
contains status information about the request
and may also contain the requested content.
PUBLISH-
SUBSCRIBE
MODEL
Publish-Subscribe is a communication
model that involves publishers, brokers and
consumers. Publishers are the source of data.
Publishers send the data to the topics which
are managed by the broker. Publishers are
not aware of the consumers. Consumers
subscribe to the topics which are managed by
the broker. When the broker receive data for
a topic from the publisher, it sends the data
to all the subscribed consumers.
PUSH-PULL
MODEL
Push-Pull is a communication model in
which the data producers push the data to
queues and the consumers Pull the data
from the Queues. Producers do not need to
be aware of the consumers. Queues help in
decoupling the messaging between the
Producers and Consumers. Queues also act
as a buffer which helps in situations when
there is a mismatch between the rate at
which the producers push data and the rate
rate at which the consumer pull data.
EXCLUSIVE
PAIR MODEL
Exclusive Pair is a bidirectional, fully
duplex communication model that uses a
persistent connection between the client
and server. Connection is setup it remains
open until the client sends a request to
close the connection. Client and server can
send messages to each other after
connection setup. Exclusive pair is stateful
communication model and the server is
aware of all the open connections.
IOT COMMUNICATION API S
Generally we used Two APIs For IoT Communication. These IoT Communication
APIs are:
 REST-based Communication APIs
 WebSocket-based Communication APIs
REST-BASED COMMUNICATION APIS

Representational state transfer (REST) is a set of architectural principles by which


you can design Web services the Web APIs that focus on systems’s resources and
how resource states are addressed and transferred. REST APIs that follow the request
response communication model, the rest architectural constraint apply to the
components, connector and data elements, within a distributed hypermedia system.
The rest architectural constraint are as follows:
Client-server – The principle behind the client-server constraint is the separation of
concerns. for example clients should not be concerned with the storage of data which
is concern of the serve. Similarly the server should not be concerned about the user
interface, which is concern of the clien. Separation allows client and server to be
independently developed and updated.
Stateless – Each request from client to server must contain all the information
necessary to understand the request, and cannot take advantage of any stored context
on the server. The session state is kept entirely on the client.
REST-BASED COMMUNICATION APIS
Cache-able – Cache constraints requires that the data within a response to a request be implicitly or explicitly
leveled as cache-able or non cache-able. If a response is cache-able, then a client cache is given the right to reuse
that repsonse data for later, equivalent requests. caching can partially or completely eliminate some instructions
and improve efficiency and scalability.
Layered system – layered system constraints, constrains the behavior of components such that each component
cannot see beyond the immediate layer with they are interacting. For example, the client cannot tell whether it is
connected directly to the end server or two an intermediaryalong the way. System scalability can be improved by
allowing intermediaries to respond to requests instead of the end server, without the client having to do anything
different.
Uniform interface – uniform interface constraints requires that the method of communication between client and
server must be uniform. Resources are identified in the requests (by URIsin web based systems) and are
themselves is separate from the representations of the resources data returned to the client. When a client holds a
representation of resources it has all the information required to update or delete the resource you (provided the
client has required permissions). Each message includes enough information to describe how to process the
message.
Code on demand – Servers can provide executable code or scripts for clients to execute in their context. this
constraint is the only one that is optional.
A RESTful web service is a ” Web API ” implemented using HTTP and REST principles. REST is most popular
IoT Communication APIs.
Uniform
Resource GET PUT PATCH POST DELETE
Identifier (URI)
Create a new
entry in the
List the URIs collection. The
Collection, such Replace the
and perhaps new entry’s URI
as https://api.ex entire collection Not generally Delete the entire
other details of is assigned
ample.com/reso with another used collection.
the collection’s automatically
urces/ collection.
members. and is usually
returned by the
operation.
Retrieve a
Not generally
representation of
Replace the used. Treat the
the addressed
Element, such addressed Update the addressed Delete the
member of the
as https://api.ex member of the addressed member as a addressed
collection,
ample.com/reso collection, or if member of the collection in its member of the
expressed in an
urces/item5 it does not exist, collection. own right and collection.
appropriate
create it. create a new
Internet media
entry within it.
type.
WEBSOCKET
BASED
COMMUNICATIO
N API
Websocket APIs allow bi-directional, full duplex
communication between clients and servers. Websocket APIs
follow the exclusive pair communication model. Unlike
request-response model such as REST, the WebSocket APIs
allow full duplex communication and do not require new
coonection to be setup for each message to be sent. Websocket
communication begins with a connection setup request sent by
the client to the server. The request (called websocket
handshake) is sent over HTTP and the server interprets it is an
upgrade request. If the server supports websocket protocol, the
server responds to the websocket handshake response. After the
connection setup client and server can send data/mesages to
each other in full duplex mode. Websocket API reduce the
network traffic and letency as there is no overhead for
connection setup and termination requests for each message.
Websocket suitable for IoT applications that have low latency
or high throughput requirements. So Web socket is most
suitable IoT Communication APIs for IoT System.
IOT ENABLING
TECHNOLOGIES
IoT is enabled by several technologies including wireless sensor networks, cloud
computing, Big data analytics, Embedded Systems, Security Protocols and
architectures, communication protocols, web services, Mobile Internet, and Semantic
Search engines.
WIRELESS SENSOR
NETWORKS
A wireless sensor network comprises of distributed device with sensor which are used to monitor the
environmental and physical conditions. A WSN consists of a number of end-nodes and routers and a coordinator.
End Nodes have several sensors attached to them in node can also act as routers. Routers are responsible for
routing the data packets from end-nodes to the coordinator. The coordinator collects the data from all the nodes.
Coordinator also act as a gateway that connects the WSN to the internet. Some examples of WSNs used in IoT
systems are described as follows:
1. Weather monitoring system use WSNs in which the nodes collect temperature humidity and other data which is
aggregated and analyzed.
2. Indoor air quality monitoring systems use WSNs to collect data on the indoor air quality and concentration of
various gases
3. Soil moisture monitoring system use WSNs to monitor soil moisture at various locations.
4. Surveillance system use WSNs for collecting Surveillance data (such as motion detection data)
5. Smart grid use WSNs for monitoring the grid at various points.
6. Structural health monitoring system use WSNs to monitor the health of structures ( buildings, bridges) by
collecting vibration data from sensor nodes de deployed at various points in the structure.
CLOUD
COMPUTING
Cloud computing is a trans-formative
computing paradigm that involves delivering
applications and services over the Internet Cloud
computing involves provisioning of computing,
networking and storage resources on demand and
providing these resources as metered services to
the users, in a “pay as you go” model. C loud
computing resources can be provisioned on
demand by the users, without requiring Cloud computing services are offered to users in different
interacyions with the cloud service Provider. The forms:
process of provisioning resources is automated. Infrastructure as a Service (IaaS): hardware is provided by an
Cloud computing resources can be accessed over external provider and managed for you
The network using standard access mechanisms Platform as a Service (PaaS): in addition to hardware, your
that provide platform independent access through operating system layer is managed for you
the use of heterogeneous client platforms such as Software as a Service (SaaS): further to the above, an
the workstations, laptops, tablets and smartphones. application layer is provided and managed for you – you won’t
see or have to worry about the first two layers.
BIG DATA ANALYTICS
Big Data analytics is the process of collecting, organizing and
analyzing large sets of data (called Big Data) to discover patterns and Characteristics
other useful information. Big Data analytics can help organizations to Big data can be described by the following characteristics:
better understand the information contained within the data and will
also help identify the data that is most important to the business and Volume – The quantity of generated and stored data. The size of the
future business decisions. Analysts working with Big Data typically data determines the value and potential insight, and whether it can be
want the knowledge that comes from analyzing the data. considered big data or not.
Some examples of big data generated by IoT systems are described as Variety – The type and nature of the data. This helps people who
follows: analyze it to effectively use the resulting insight. Big data draws from
1. Sensor data generated by IoT system such as weather monitoring text, images, audio, video; plus it completes missing pieces through
stations. data fusion.
2. Machine sensor data collected from sensors embedded in industrial Velocity – In this context, the speed at which the data is generated and
and energy systems for monitoring their health and detecting processed to meet the demands and challenges that lie in the path of
Failures. growth and development. Big data is often available in real-time.
Compared to small data, big data are produced more continually. Two
3. Health and fitness data generated by IoT devices such as wearable kinds of velocity related to Big Data are the frequency of generation
fitness bands and the frequency of handling, recording, and publishing.
4. Data generated by ioT systems for location and tracking of vehicles Veracity – It is the extended definition for big data, which refers to the
5. Data generated by retail inventory monitoring systems data quality and the data value. The data quality of captured data can
vary greatly, affecting the accurate analysis.
COMMUNICATION
PROTOCOLS
 Communication protocols form the backbone of IoT systems and enable
network connectivity and coupling to applications. Communication protocols
allow devices to exchange data over the network. Multiple protocols often
describe different aspects of a single communication. A group of protocols
designed to work together are known as a protocol suite; when implemented in
software they are a protocol stack.
 Internet communication protocols are published by the Internet Engineering
Task Force (IETF). The IEEE handles wired and wireless networking, and the
International Organization for Standardization (ISO) handles other types. The
ITU-T handles telecommunication protocols and formats for the public
switched telephone network (PSTN). As the PSTN and Internet converge, the
standards are also being driven towards convergence.
EMBEDDED SYSTEMS
As its name suggests, Embedded means something that is attached to another thing. An embedded
system can be thought of as a computer hardware system having software embedded in it. An
embedded system can be an independent system or it can be a part of a large system. An embedded
system is a controller programmed and controlled by a real-time operating system (RTOS) with a
dedicated function within a larger mechanical or electrical system, often with real-time computing
constraints. It is embedded as part of a complete device often including hardware and mechanical
parts. Embedded systems control many devices in common use today. Ninety-eight percent of all
microprocessors are manufactured to serve as embedded system component.
An embedded system has three components −
1. It has hardware.
2. It has application software.
3. It has Real Time Operating system (RTOS) that supervises the application software and provide
mechanism to let the processor run a process as per scheduling by following a plan to control the
latencies. RTOS defines the way the system works. It sets the rules during the execution of
application program. A small scale embedded system may not have RTOS.
IoT Levels and Deployment Templates
An IoT system comprises the following components:
Device, Resource, Controller Service, Database, Web service, Analysis
Component and Application.
Device :
An IoT device allows identification, remote remote
sensing, monitoring capabilities.

Resource:
• Software components on the IoT device for
-accessing, processing and storing sensor information,
-controlling actuators connected to the device.
- enabling network access for the device.

Controller Service:
• Controller service is a native service that runs on the device and interacts
with the web services.
•It sends data from the device to the web service and receives commands
from the application (via web services) for controlling the device.
Database:
•Database can be either local or in the cloud and stores the data
generated by the IoT device.

Web Service:
•Web services serve as a link between the IoT device, application,
database and analysis components.
•It can be implemented using HTTP and REST principles
(REST
service) or using the WebSocket protocol (WebSocket service).

Analysis Component:
• Analysis Component is responsible for analyzing the IoT data
and
generating results in a form that is easy for the user to understand.

Application:
•IoT applications provide an interface that the users can use
to control and monitor various aspects of the IoT system.
IoT Level-1

A level-1 IoT system has a single node/device


that performs sensing and/or actuation, stores
data, performs analysis and hosts the application.

Level-1 IoT systems are suitable for


modelling low- cost and low-complexity
solutions where the data involved is not
big and the analysis requirements are not
computationally intensive.
IoT – Level 1 Example : Home Automation
System
IoT Level-2
•A level-2 IoT system has a single
node that performs sensing
and/or actuation and local
analysis.
Data is stored in the cloud and
the
application is usually cloud-
based.

•Level-2 IoT systems are suitable for


solutions where the data involved is
big; however, the primary analysis
requirement is not computationally
intensive and can be done locally.
IoT – Level 2 Example: Smart
Irrigation
IoT Level-3

A level-3 IoT system has a


single node. Data is stored
and analyzed in the cloud
and the application is cloud-
based.

Level-3 IoT systems are


suitable for solutions where
the data involved is big and
the analysis requirements
are computationally
intensive.
IoT – Level 3 Example: Tracking Package
Handling

Sensors used
Accelrometer Gyroscope
sense movement or vibrations Gives orientation info

Websocket service is used because sensor data can be sent in real time.
IoT Level-4
A level-4 IoT system has
multiple nodes that perform
local analysis. Data is stored
in the cloud and the
application is cloud-based.

Level-4 contains local and cloud-


based observer nodes which can
subscribe and receive
information collected in the
cloud from IoT devices.

Level-4 IoT systems are suitable


for solutions where multiple
nodes are required, the data
involved is big and the analysis
requirements are
computationally intensive.
IoT – Level 4 Example: Noise
Monitoring
Sound Sensors are
used
IoT Level-5
•A level-5 IoT system has
multiple end nodes and one
coordinator node.
•The end nodes perform
sensing and/or actuation.
•The coordinator node collects
data from the end nodes and
sends it to the cloud.
•Data is stored and analyzed in
the cloud and the application
is cloud- based.

Level-5 IoT systems are suitable for solutions based on


wireless sensor networks, in which the data involved is big
and the analysis requirements are computationally intensive.
IoT – Level 5 Example: Forest Fire
Detection
Detect forest fire in early stages to take action
while the fire is still controllable.
Sensors measure the temperature, smoke, weather,
slope of the earth, wind speed, speed of fire spread,
flame length
IoT Level-6
•A level-6 IoT system has
multiple independent end
nodes that perform sensing
and/or actuation and send data
to the cloud.
•Data is stored in the cloud and
the application is cloud-based.
•The analytics component
analyzes the data and stores
the results in the cloud
database.
•The results are visualized with
the cloud-based application.
•The centralized controller is
aware of the status of all the
end nodes and sends control
commands to the nodes.
IoT – Level 6 Example: Weather Monitoring System

Sensors used
Wind speed and direction Precipitation
Solar radiation Snow depth
Temperature (air, water, soil) Barometric pressure
Relative humidity Soil moisture
IoT Issues and Challenges

Security
• Cyber Attacks, Data Theft

Privacy
• Controlling access and ownership of data.

InterOperability
• Integration Inflexibility

Legality and Rights


• Data Protection laws be followed, Data Retention and destruction policies

Economy and Development


• Investment Incentives, Technical Skill Requirement
IoT vs M2M
IoT vs M2M

 Though both M2M and IoT involve networking of machines or devices, they differ in the
underlying technologies, systems architectures and types of applications.
Communication Protocols

 M2M and IoT can differ in how the communication between the machines or devices
happens.
 M2M uses either proprietary or non-IP based communication protocols for communication
within the M2M area networks.
 Commonly uses m2m protocols include Zigbee, bluetooth, Modbus, M-Bus, wireless M-
bus, Power line communication, 6lowpan, IEEE 802.15.4, Z-wave etc.
 The focus of communication in M2M is usually on the protocols below the network layer.
 The focus of communication in IoT is usually on the protocols above the network layer
such as HTTP, COAP, Websockets, MQTT, XMPP, DDS, AMQP etc.
Machines in M2M vs things in IoT

 The things in IoT refers to physical objects that have unique identifiers and can sense and
communicate with their external environment (and user applications) or their internal
physical States.
 The unique identifier for the things in IoT are the IP addresses (or Mac addresses).
 Things have software components for accessing, processing and storing sensor
information, or controlling actuators connected.
 IoT systems can have heterogeneous thing ( e.g., home automation IoT system can include
IoT system of various types such as fire alarms, door alarms, lighting control devices etc)
 M2M systems, in contrast to IoT, typically have homogeneous machine type within a and
M2M area network.
Hardware vs Software Emphasis

 While the emphasis of M2M is more on hardware with embedded modules, the emphasis
of IoT is more on software. IoT devices run specialized software for sensor data collection,
data analysis and interfacing with the cloud through IP based communication.
Data Collection and Analysis

 M2M data is collected in point Solutions and often in on-premises storage infrastructure.
In context to M2M, the data in IoT is collected in the cloud (can be public, private or
hybrid cloud). The various IoT Levels, and IoT components deployed in the cloud. The
analytics component analyzes the data and stores the results in the cloud database. The IoT
data and analysis results are visualized with the cloud based applications. The centralized
controller is aware of the status of all the end nodes and sends control commands to the
nodes. Observer nodes can process information and use it for various applications,
however, observer nodes do not perform any control functions.
Applications

 M2M data is collected in point Solutions and can be accessed by on-premises application
such as diagnosis applications, service management applications and on-premises
enterprise applications. But We collect IoT Data in the cloud and can be accessed by cloud
applications such as analytics applications, enterprise applications, remote diagnosis and
management applications etc. Since the scale of data collected in IoT is so massive, cloud
based real time and batch data analysis frameworks are used for data analysis.
Communication in IoT is IP based networks. Communication within M2M area network is
based on protocols below the network layer whereas IoT is based on protocols above the
network layer.

You might also like