UNIT II IOT
UNIT II IOT
Key Technologies
Every object then has a tuple (OID, NAdr) that is always unique,
although the second entry of the tuple may change with time,
location, or situation. In a stationary, non-variable, or mostly static
environment, one could opt, if one so chose, to assign the OID to be
identical to the NAdr where the object is expected to attach to the
network.
Hierarchical grouping and IPv6
It is useful to have mechanisms for hierarchical grouping to deal with
large populations. The aggregation feature of IPv6 address provides such
hierarchical grouping. For a number of applications, there is a need to
map/bind IP addresses (communications IDs) with other relevant OIDs.
Lightweight WS protocols
Design Goals :
(i) an architecture description,
(ii) deployment models,
(iii) a description of the impacts of LISP,
(iv) LISP security threats and solutions,
(v) allocation of end-point identifier (EID) space,
(vi) alternate mapping system designs, and
(vii) data models for management of LISP.
The locator/ID separation protocol
The basic idea behind the separation is that the Internet
architecture combines two functions, routing locators (where one is
attached to the network) and identifiers (where one is located), in
one number space: the IP address.
Low power (with the requirement that they will run potentially for
years on batteries)
Severely limited code and RAM space (e.g., generally desirable to fit
the required code
Environment Characteristics
In particular, note that IPv6 is an ideal component (but not the only
one) to be employed to support scalability, both for a given
application as it reaches more users and for use for a wide class of
applications spanning many fields
Interoperability
IPv6 auto-configuration
Protocol support in Network layer and
Transport layer
Some applications, especially those using simple sensors and/or
where is there a very large number of dispersed sensors and/or
where there is limited remote energizing power, may have a need to
support leaner protocols both at the network layer (e.g., route
and/or topology management) and at the transport layer (e.g., using
UDP).
Need for proxy gateways
Number of devices operate with a small battery, while other devices use a self-
energizing energy source, for example a small solar cell array.
Yet other devises are passive (e.g., passive RFID) and, thus, need to derive energy
indirectly from the environment, such as an intercepting electric/magnetic field.
In general, wireless technologies require significant amounts of
power; hence, the need for low energy (LE) wireless technologies.
Some evolving technologies use small solar panels embedded in the screen of a
smartphone or object.
Solar cells are an example of an energy harvester, but they are for low efficiency
when converting ambient light into useful electrical energy. A 3 cm2 solar cell
(dimensions similar to the common CR2032 coin cell) yields only 12 μW.
Factors to be considered for selecting battery
There are a number of factors that must be considered in selecting the
most suitable battery for a particular application,
Operating voltage level
Load current and profile
Duty cycle—continuous or intermittent
Service life
Physical requirement
Size
Shape
Weight
Environmental conditions
Temperature
Pressure
Humidity
Vibration
Shock
Safety and reliability
Maintenance and replacement
Environmental impact and recycling capability
Cost
Sensor technology
Sensor technology
Tsunami-alerting sensors can certainly prove useful for nations with extensive
coastlines. Sensors also find extensive applicability in battlefield for reconnaissance
and surveillance. In addition to sensing, one is often also interested in control and
activation.
Networked Sensor
Components
There are four basic components in a sensor network:
(i) an assembly of distributed or localized sensors;
(ii) an interconnecting network (usually, but not always, wireless
based)
(iii) a central point of information clustering; and
(iv) a set of computing resources at the central point (or beyond) to
handle data correlation, event-trending, querying, and data mining.
Wireless sensor network
The radar networks used in air traffic control, the national electrical power grid,
and the nation-wide weather stations deployed are all examples of early-
deployment sensor networks.
Less expensive WSNs are now being planned for novel applications in physical
security, healthcare, and commerce.
The technology for sensing and control includes electric and magnetic field
sensors; radio-wave frequency sensors; optical, electro-optic, and infrared sensors;
radars; lasers; location/navigation sensors; seismic and pressure-wave sensors;
environmental parameter sensors.
Wireless sensor network
Sensors can be described as smart inexpensive devices equipped with multiple
on-board sensing elements: they are low cost, low power, multifunctional nodes
that are logically homed to a central sink node.
Sensors are typically internetworked via a series of multi hop short distance low
power wireless links.
They typically utilize the Internet or some other network for long-haul delivery of
information to a point (or points) of final data aggregation and analysis.
RFID tags are devices that typically have a read-only chip that stores
a unique number but has no processing capability. RFID tags have
broad applications, including the rapid collection of data in
commercial environments.
When an RFID tag or contactless SC passes within a defined range, a reader
generates electromagnetic waves; the tag’s integrated antenna receives the
signal and activates the chip in the tag/SC, and a wireless communications
channel is set up between the reader and the tag enabling the transfer of
pertinent data.
Active RFID. An active RFID tag has its own power source, often a battery.
Passive RFID. A passive RFID tag receives its power from the reading antenna,
whose electromagnetic wave induces a current in the RFID tag's antenna.
Passive RFID tag does not include a constant power source or a battery. Passive
RFID system tags don't need a battery because they collect their energy from
the reader's interrogation signal. To read tags in this arrangement, a reader will
send out a powerful signal to all tags in its read frequency range
RFID Interrogator
Interrogators (also called readers or transceivers) read and write data to and from
tags. Interrogators are responsible for remotely powering the tags establishing the
bidirectional data flow between themselves and the tags, and performing analog
to digital as well as digital to analog signal conversion.
Interrogators can also run attached to peripheral devices, such as light stacks or
alerting horns that provide feedback on conditions within the system; and
triggering devices, which control when the interrogators are turned on and off
Interrogators can also communicate with and control nearby sensors integrated
within the interrogation zone and are responsible for communications over
networks for alerting back-end systems of the assets or goods they are tracking.
RFID Interrogator
According to their capabilities, interrogators are often called either smart or dumb.
Smart interrogators carry built-in computers that run programs, which filter, aggregate,
and analyse data to turn it into meaningful events for the back-end system. A dumb
interrogator reads tag data and reports what it sees to the back-end system.
Interrogators often have a graphical user interface (GUI) by which they can be
controlled. An interrogator GUI is typically accessible through a web interface using any
commercial Internet browser on the computer or through a simple application program.
Following are some typical features of a GUI:
• Read from and write to tag capability
• Network configuration settings
• Antenna settings
• Power settings
• Input/output port configuration settings
• Firmware upgrade capability
RFID Interrogator Components
RFID Layer
Read and Memory capacity of 512 Small memory, often Read only.
bytes with very large memory
storage possible.
Satellite IoT is useful in areas where other internet options are not
available.