UNIT 1 IOT
UNIT 1 IOT
INTRODUCTION OF IoT
Definition and characteristics of IoT, Technical Building blocks of IoT,
Device, Communication Technologies, Physical design of IoT, IoT
enabling technologies, IoT Issues and Challenges- Planning, Costs and
Quality , Security and Privacy, Risks.
Introduction
Internet of things (IoT) comprises things that have unique identities and
are connected to the internet.
The focus on IoT is in the configuration, control and networking via the
internet of devices or “things” that are traditionally not associated with
internet.
The scope of IoT is mot limited to just connecting things to the internet,
IoT allows these things to communicate and exchange data while executing
meaningful application towards a common user or machine goal.
IoT Applications
Home - Smart lighting
Cities - Smart Parking
Environment - Weather monitoring
Energy - Smart grids
Retail - Smart payment
Logistics – Remote vehicle diagnostics
Agriculture – Smart Irrigation, Green house model
Industry – Indoor Air Quality monitoring
Health & Lifestyle – Wearable electronics
Definition of IoT
Dynamic & Self-Adapting - IoT devices and systems have the capability
to dynamically adapt with changing contexts and take actions based on
their operating conditions.
Self-Configuring – IoT devices have self configuring capability such as set
up the networking, fetch latest software upgrades with minimal user
intervention.
Interoperable Communication Protocols – It support a number of
interoperable communication protocols and can communicate with other
devices, infrastructure.
Unique Identity – Each IoT device has a unique identity and a unique
identifier (IP address or a URI). IoT device interfaces allow users to
query the devices, monitor their status and control them remotely.
Integrated into Information Network – IoT devices are integrated
into information network which allows them to communicate and
exchange data with other device and systems. It can be dynamically
discovered in the network by other devices and /or the network.
Physical Design of IoT
• The "Things" in IoT usually refers to IoT devices which have unique
identities and can perform remote sensing, actuating and monitoring
capabilities.
• IoT devices can:
• Exchange data with other connected devices and applications (directly or
indirectly), or
• Collect data from other devices and process the data locally or
• Send the data to centralized servers or cloud-based application back-ends for
processing the data, or
• Perform some tasks locally and other tasks within the IoT infrastructure,
based on temporal and space constraints
The network layers are responsible for sending of IP datagrams from the source
network to the destination network. This layer performs the host addressing and
packet routing.
IPv4: Internet Protocol version 4 (IPv4) is the most deployed Internet protocol
that is used to identify the devices on a network using a hierarchical addressing
scheme, IPV4 uses a 32-bit address scheme.
IPv6: Internet Protocol version 6 (IPv6) is the newest version of Internet protocol
and successor to IPv4, IPv6 uses 128-bit address scheme.
6LOWPAN: 6LoWPAN (IPv6 over Low power Wireless Personal Area Networks)
brings IP protocol to the low-power devices which have limited processing
capability. 6LOWPAN operates in the 2.4 GHz frequency range and provides data
transfer rates of 250 Kb/s.
TRANSPORT LAYER
The transport layer protocols provide end-to-end message transfer capability
independent of the underlying network.
TCP: Transmission Control Protocol (TCP) is the most widely used transport layer
protocol, that is used by web browsers (along with HTTP, HTTPS application layer
protocols), email programs (SMTP application layer protocol) and file transfer
(FTP).
TCP is a connection oriented and state ful protocol
TCP ensures reliable transmission of packets in-order
TCP also provides error detection capability
Performs flow control and congestion control.
UDP: UDP is a connectionless protocol. UDP is useful for time-sensitive
applications that have very small data units to exchange and do not want the
overhead of connection setup. UDP does not provide guaranteed delivery,
ordering of messages and duplicate elimination
APPLICATION LAYER
Application layer protocols define how the applications interface with the lower
layer protocols to send the data over the network
HTTP – Hyper text transfer protocol :
It is used to access the webpages in world wide Web,
This protocol uses Request response model where a client sends the request
and server gives the response,
It is a stateless protocol
COAP: Constrained Application Protocol (CoAP) is an application layer protocol
for machine-to-machine (M2M) applications, meant for constrained
environments with constrained devices and constrained networks.
Web Socket: Web Socket protocol allows full-duplex communication over a
single socket connection for sending messages between client and server and it
is based on TCP.
MQTT – Message Queue Telemetry Transport is a light weight messaging protocol
based on Publish subscribe model, It follows client server architecture, where the
client is IoT device and server is broker.
XMPP – Extensible Messaging and Presence protocol is a protocol for real time
communication and streaming XML data between entities, XMPP is a decentralized
protocol and supports both client to server and Server to Server communication
paths.
DDS : Data distribution service is a data centric middle ware standard for deice to
device communication, It uses Publish Subscribe model for transferring data.
AMQP – Advanced Message Queuing protocol is an open application layer protocol
for business messaging, It supports both point to point and Publisher Subscribe
model.
IoT Communication technologies
Communication: The communication block handles the communication for the IoT system.
Services: An IoT system uses various types of IoT services such as services for device monitoring, device
control services, data publishing services and services for device discovery.
Management: Management functional block provides various functions to govern the IoT system.
Security: Security functional block secures the IoT system and by providing functions such as
authentication, authorization, message and content integrity, and data security.
Application: IoT applications provide an interface that the users can use to control and monitor various
aspects of the IoT system. Applications also allow users to view the system status and view or analyse the
processed data.
IoT Communication
Model
Request-Response communication model
• Request-Response is a
communication model in which
the client sends requests to
the server and the server
responds to the requests.
• Publish-Subscribe is a
communication model that
involves publishers, brokers and
consumers.
• Publishers are the source of data.
Publishers send the data to the
topics which are managed by the
broker. Publishers are not aware
of the consumers.
• Consumers subscribe to the topics
which are managed by the broker.
• When the broker receives data for
a topic from the publisher, it
sends the data to all the
subscribed consumers.
• Push-Pull is a communication
model in which the data
producers push the data to
queues and the consumers pull
the data from the queues.
Producers do not need to be
aware of the consumers.
• Queues help in decoupling the
messaging between the producers
and consumers.
• Queues also act as a buffer which
helps in situations when there is a
mismatch between the rate at
which the producers push data
and the rate rate at which the
consumers pull data.
• Exclusive Pair is a
bidirectional, fully duplex
communication model that
uses a persistent connection
between the client and
server.
• Once the connection is setup
it remains open until the
client sends a request to
close the connection.
• Client and server can send
messages to each other after
connection setup.
WSNS are enabled by wireless communication protocols such as IEEE 802.15.4. ZigBee is one of
the most popular wireless technologies used by WSNs. ZigBee specifications are based on IEEE
802.15.4. ZigBee operates at 2.4 GHz frequency and offers data rates upto 250 KB/s and range
from 10 to 100 meters depending on the power output and environmental conditions.
Cloud Computing
Cloud computing is a transformative computing paradigm that involves applications and services
over the Internet. Cloud computing involves provisioning of computing, networking and storage
based on demand.
Cloud computing resources can be accessed over the network using standard access
mechanisms.
Infrastructure-as-a-Service (IaaS): IaaS provides the users the ability to provision computing and
storage resources. These resources are provided to the users as virtual machine instances and
virtual storage. Users can start, stop, configure and manage the virtual machine instances and
virtual storage.
Platform-as-a-Service (PaaS): PaaS provides the users the ability to develop and deploy
application in the cloud using the development tools, application programming interfaces (APIs),
The users, themselves, are responsible for developing, deploying, configuring and managing
applications on the cloud infrastructure.
Software-as-a-Service (SaaS): SaaS provides the users a complete software application or the
user interface to the application itself. The cloud service provider manages the underlying cloud
infrastructure including servers, network, operating systems, storage and application software,
and the user is unaware of the underlying architecture of the cloud.
Big Data Analytics
Big data is defined as collections of data sets whose volume, velocity (in terms of its temporal
variation), or variety, is so large that it is difficult to store, manage, process and analyze the data using
traditional databases and data processing tools.
Some examples of big data generated by IoT systems are described as follows,
Machine sensor data collected from sensors embedded in industrial and energy systems for monitoring
their health and detecting failures.
Health and fitness data generated by IoT devices such as wearable fitness bands.
Data generated by loT systems for location and tracking of vehicles.
Volume: Though there is no fixed threshold for the volume of data to be considered as big data,
however, typically, the term big data is used for massive scale data that is difficult to store, manage and
process using traditional databases and data processing architectures.
Velocity: Velocity of data refers to how fast the data is generated and how frequently it varies.
Variety: Variety refers to the forms of the data. Big data comes in different forms such as structured or
unstructured data, including text data, image, audio, video and sensor data.
Communication Protocols
Communication protocols form the backbone of IoT systems and enable
network connectivity and coupling to applications.
Communication protocols allow devices to exchange data. over the
network.
The function includes,
Data exchange formats and data encoding
addressing schemes for devices and routing of packets from source to
destination,
Sequence control, flow control
Embedded Systems
Lack of encryption
Insufficient testing and updating
Inadequate device security
Lack of standardization
Vulnerability to network attacks
Unsecured data transmission
Software vulnerabilities
Privacy Concerns in IoT
Privacy: Privacy is a critical concern in the Internet of Things (IoT), as IoT
devices collect, store, and transmit large amounts of personal and sensitive
information.
Some of the privacy challenges in IoT include:
Data collection: Ensuring that only the necessary data is collected and that
it is collected in a way that respects individuals’ privacy rights.
Data storage: Ensuring that the data collected by IoT devices is stored
securely and that access to it is strictly controlled.
Data sharing: Controlling who has access to the data collected by IoT
devices and ensuring that it is not shared without proper authorization.
Privacy Concerns in IoT
To address these privacy challenges, organizations should implement
robust privacy policies and procedures, such as data protection, data
minimization, and data retention.