0% found this document useful (0 votes)
206 views37 pages

ModuleV IoT

This document provides an introduction to the Internet of Things (IoT). It defines IoT as a dynamic global network infrastructure consisting of physical and virtual "things" connected by standard communication protocols. The document outlines the key characteristics of IoT including being dynamic, self-configuring, using interoperable communication protocols, and having unique identities. It also describes the physical design of IoT including different device types, interfaces, and data generation. Finally, it discusses various protocols used in IoT across the OSI model layers.

Uploaded by

Deepanshu rawat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
206 views37 pages

ModuleV IoT

This document provides an introduction to the Internet of Things (IoT). It defines IoT as a dynamic global network infrastructure consisting of physical and virtual "things" connected by standard communication protocols. The document outlines the key characteristics of IoT including being dynamic, self-configuring, using interoperable communication protocols, and having unique identities. It also describes the physical design of IoT including different device types, interfaces, and data generation. Finally, it discusses various protocols used in IoT across the OSI model layers.

Uploaded by

Deepanshu rawat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Internet of Things

Dr. Debjani Mustafi


Dept. CSE, BIT, Mesra
Road Map

▪ Introduction
▪ Definition of IoT
▪ Characteristics of IoT
▪ Physical design of IoT
▪ IoT protocols
▪ Logical design of IoT
▪ IoT enabling technologies
▪ IoT levels and deployment templates

Introduction to Internet of Things Bahga & Medisetti, 2015


Introduction

• The things which have distinctive identities and are connected to the internet
constitutes IoT.
• The remote computing devices that are connected to the internet, exhibits
revolutionary ability due to the evolution of IoT.
• The scope of IoT is not only connecting things to the internet but also communicate
and exchange data while executing meaningful application.
• Applications on IoT networks extract and create information from raw data by
filtering, processing, categorizing, condensing and contextualizing the data.
• The information obtained from the data are structured and organized to infer
knowledge about the system, environments and its operations and progress towards
its objectives to allow a smarter performance.

Introduction to Internet of Things Bahga & Medisetti, 2015


Inferring Information & Knowledge from Data

Data
Raw and unprocessed data obtained from
IoT devices/ systems.

Information
It is inferred from data by filtering, processing,
categorizing, condensing and contextualizing data.

Knowledge
It is inferred from information by organizing
and structuring and is used to achieve a specific
objective.
Introduction to Internet of Things Bahga & Medisetti, 2015
Definition of IoT
• A dynamic global network infrastructure with self configuring capabilities based on standard and
interoperable communication protocols where physical and virtual things have identities, physical
attributes and use intelligent interfaces which are integrated into information network, often
communicate data associated with users and their environments.

Introduction to Internet of Things Bahga & Medisetti, 2015


Characteristics of IoT

• Dynamic and Self Adapting: Adapt the changes with respect to changing contexts.
• Self-Configuring: Allows a large number of devices to work together to provide
different functionalities.
• Interoperable Communication Protocol: Supports different communication
protocols to communicate with other devices and with the infrastructure.
• Unique Identity: IoT devices consist of unique identifier to connect with the users
and control them remotely.
• Integrated into Information Network: This allows to communicate and exchange
data with other devices to perform certain analysis.

Introduction to Internet of Things Bahga & Medisetti, 2015


Physical Design of IoT
• Physically IoT is categorize into two types: Things in IoT and IoT protocols.
• Things in IoT
• Things in IoT refers to the devices with unique id and can perform sensing, actuating and
monitoring capabilities.
• IoT devices can exchange data and other connected devices and process the data locally.
• They can also send data to the centralized servers or cloud-based application back-ends for
processing or perform some tasks.
• An IoT device consists of several interfaces for connection with other devices in wireless or
wired mode.
• The interfaces are: I/O interfaces for sensors, interfaces for internet connectivity, memory and
storage interfaces, audio/ video interfaces.
• Most of the IoT devices generate data in some form or other which when processed by data
analytics system to generate meaningful information locally or remotely.
• Several types of IoT devices are wearable sensors, smart watches, LED lights, automobiles, air-
conditioner, industrial machines etc.

Introduction to Internet of Things Bahga & Medisetti, 2015


Generic Block Diagram of an IoT Device

Introduction to Internet of Things Bahga & Medisetti, 2015


OSI Model

Introduction to Internet of Things Bahga & Medisetti, 2015


Layers of IoT Protocols

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Protocols
• IoT technology uses four different layers of OSI model which are Data Link layer,
Network layer, Transport layer and Application layer.
• Link layer determine how the data is physically sent over the network physical layer or medium.
• 802.3-Ethernet: IEEE802.3 is a collection of wired ethernet standards for the link layer.
• The shared medium in Ethernet can be coaxial cable, twisted pair wire and fiber optic cable.
• 802.3 is the standard for 10BASE5 Ethernet uses the coaxial cable.
• 802.3.i is the standard for 10BASE-T Ethernet uses the twisted pair cable.
• 802.3.j is the standard for 10BASE-F ethernet uses fiber optic cable.
• 802.11-WiFi: IEEE802.11 is a collection of wireless local area network communication standards
including extensive description of the link layer.
• 802.16-WiMax: IEEE802.16 is a collection of wireless broadband network communication
standards including extensive description of the link layer.
• 802.154-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless personal
area network.
• 2G/ 3G/ 4G –Mobile Communication: These are the different generations of mobile
communication standards.
Introduction to Internet of Things Bahga & Medisetti, 2015
IoT Protocols
• The network layers are responsible for sending IP datagrams from the source network to the
destination network.
• This layer perform the host addressing and packet routing.
• Host identification is done using IP addressing scheme.
• IPV4 is the most deployed internet protocol to identify devices on the network.
• IPV6 is the recent version of internet protocol and successor to IPV4.
• 6LoWPAN is brings IP protocol to the low power devices which has limited processing
capability.
• The transport layer protocols provide end to end message transfer capability independent of the
underlying network.
• The transport layer provides functions like error control, segmentation, flow control and
congestion control.
• Transmission Control Protocol(TCP) and User Defined Protocol (UDP) are two transport layer
protocols.

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Protocols(TCP)
• Transmission Control Protocol.
• Connection Oriented and stateful protocol.
• Ensures Reliable transmission.
• Provides Error Detection Capability to ensure no duplicacy of packets and
retransmit lost packets.
• Flow Control capability to ensure the sending data rate is not too high for the
receiver process.
• Congestion control capability helps in avoiding congestion which leads to
degradation of network performance.

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Protocols(UDP)
• User Datagram Protocol.
• It is connectionless protocol and stateless.
• Does not ensures reliable transmission.
• Does not do connection before transmitting.
• Does not provide proper ordering of messages
• Transaction oriented.

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Protocols
• Application layer protocols define how the applications interface with the lower
layer protocols to send the data over the network.
• The data is encoded by the application layer protocol and encapsulated in the
transport layer protocol which provides transmission and connection over the
network.
• The protocols of this layer enables process to process connection using port.
• Some of the protocols of application layer are:
• HTTP
• CoAP
• WebSocket
• XMPP
• MQTT
• DDS
• AMQP Introduction to Internet of Things Bahga & Medisetti, 2015
IoT Protocols(Application Layer)
• Hypertext Transfer Protocol(HTTP) forms the foundation of WWW.
• Includes commands such as GET, PUT, POST, HEAD, OPTIONS, TRACE..etc
• Follows a request-response model.
• Uses Universal Resource Identifiers(URIs) to identify HTTP resources.
• Constrained Application Protocol(CoAP) is an application layer protocol used
for Machine to machine (M2M) applications meant for constrained devices and
networks.
• Web transfer protocol for IoT and uses request-response model.
• Uses client-server architecture
• Supports methods such as GET, POST, PUT and DELETE

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Protocols(Application Layer)
• WebSocket allows full-duplex communication over single socket.
• Based on TCP.
• Client can be a browser, IoT device or mobile application.
• Message Queue Telemetry Transport(MQTT) , light-weight messaging
protocol
• Based on publish-subscribe model
• Well suited for constrained environments where devices have limited processing,
low memory and network bandwidth requirement.
• Extensible Messaging and Presence Protocol (XMPP) is used for Real time
communication and streaming XML data between network entities.
• Used for Applications such as Multi-party chat and voice/video calls.
• Decentralized protocol and uses client server architecture.
Introduction to Internet of Things Bahga & Medisetti, 2015
IoT Protocols(Application Layer)
• Data Distribution Service(DDS) is a data-centric middleware standard for
device-to-device or machine-to-machine communication.
• Publish subscribe model where publishers create topics to which subscribers can
use.
• Provides Quality-of-service control and configurable reliability.
• Advanced Messaging Queuing Protocol(AMQP) used for business
messaging.
• Supports both point-to-point and publisher/subscriber models, routing and
queuing
• Broker here receives messages from publishers and route them over connections
to consumers through messaging queues.

Introduction to Internet of Things Bahga & Medisetti, 2015


Logical Design of IoT
• Logical design of an IoT system refers to an abstract representation of the
entities and processes without going into the low-level specifics of the
implementation.
• An IoT system comprises a number of functional blocks that provide the system
the capabilities for identification, sensing, actuation, communication and
management.
• IoT Functional Block
• Device : Devices such as sensing, actuation, monitoring and control functions.
• Communication : IoT Protocols are used to communicate between the IoT devices.
• Services: Provide services like device monitoring, device control services, data publishing
services and device discovery
• Management : Functions to govern the system
• Security : Functions as authentication, authorization, message and content integrity, and data
security
• Applications
Introduction to Internet of Things Bahga & Medisetti, 2015
IoT Functional Block

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Communication Model
• Communication models are systematic representation of the process
which helps in understanding how communication works can be done.
• There are four different types of communication models in IoT:
• Request-Response
• Publish-Subscribe
• Push-Pull
• Exclusive Pair

Introduction to Internet of Things Bahga & Medisetti, 2015


Request-Response Communication Model
• Request–Response is a communication model in which the client sends requests to the server and
the server responds to the requests.
• When the server receives a request, it decides how to respond, fetches the data, retrieves resource
representations, prepares the response and then sends the response to the client.
• Stateless communication model.

Introduction to Internet of Things Bahga & Medisetti, 2015


Publish-Subscribe Communication Model
• Publish–Subscribe is a communication model that involves publishers, brokers and consumers.
• Publishers are the source of data. Publishers send the data to the topics which are managed by the
broker. Publishers are not aware of the consumers.
• Consumers subscribe to the topics which are managed by the broker.
• When the broker receives data for a topic from the publisher, it sends the data to all the subscribed
consumers.

Introduction to Internet of Things Bahga & Medisetti, 2015


Push-Pull Communication Model
• Push–Pull is a communication model in which the data producers push the data to queues and the
consumers pull the data from the queues. Producers do not need to be aware of the consumers.
• Queues help in decoupling the messaging between the producers and consumers.
• Queues also act as a buffer which helps in situations when there is a mismatch between the rate at
which the producers push data and the rate at which the consumers pull data.

Introduction to Internet of Things Bahga & Medisetti, 2015


Exclusive Pair Communication Model
• Exclusive Pair is a bidirectional, fully duplex communication model that uses a
persistent connection between the client and the server.
• Once the connection is set up it, remains open until the client sends a request to
close the connection.
• Client and server can send messages to each other after connection setup.

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Communication APIs: REST based
• Representational State Transfer (REST) is a set of architectural principles by
which web services can be designed and web APIs that focus on a system’s resources
and how resource states are addressed and transferred.
• REST APIs follow the request–response communication model.
• REST architectural constraints apply to the components, connectors and data
elements within a distributed hypermedia system.
• The REST architectural constraints are:
• Client-Server
• Stateless
• Cacheable
• Layered System
• Uniform Interface
• Code on demand

Introduction to Internet of Things Bahga & Medisetti, 2015


REST-based APIs

Introduction to Internet of Things Bahga & Medisetti, 2015


WebSocket-based Communication APIs
• WebSocket APIs allow bi-directional, full duplex communication between clients and
servers.
• WebSocket APIs follow the exclusive pair communication model.

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Enabling Technologies
• Wireless Sensor Network
• Cloud Computing
• Big Data Analytics
• Communication Protocols
• Embedded Systems

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Levels and Deployment Templates
An IoT system comprises the following components:
• Device: An IoT device allows identification, remote sensing, actuating and remote
monitoring capabilities.
• Resource: Resources are software components on the IoT device for accessing,
processing and storing sensor information, or for controlling actuators connected to
the device. Resources also include the software components that enable network
access for the device.
• Controller Service: Controller service is a native service that runs on the device and
interacts with the web services. Controller service sends data from the device to the
web service and receives commands from the application (via web services) for
controlling the device.

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Levels and Deployment Templates
• Database: Database can be either local or in the cloud and stores the data generated
by the IoT device.
• Web Service: Web services serve as a link between the IoT device, application,
database and analysis components. Web service can be implemented using HTTP
and REST principles (REST service) or using the WebSocket protocol (WebSocket
service).
• Analysis Component: This is responsible for analyzing the IoT data and generating
results in a form that is easy for the user to understand.
• Application: IoT applications provide an interface that the users can use to control
and monitor various aspects of the IoT system. Applications also allow users to view
the system status and the processed data.

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Level-1
• A level-1 IoT system has a single
node or device that performs
sensing, actuation, stores data,
performs analysis and hosts the
application.
• Level-1 IoT systems are suitable
for modelling low-cost and low-
complexity solutions where the
data involved is not big and the
analysis requirements are not
computationally intensive.
• Example: Home Automation
System.

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Level-2
• A level-2 IoT system has a single node
that performs sensing and/or
actuation and local analysis.
• Data is stored in the cloud and the
application is usually cloud-based.
• Level-2 IoT systems are suitable for
solutions where the data involved is
big; however, the primary analysis
requirement is not computationally
intensive and can be done locally.
• Example: Smart Irrigation

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Level-3
• A level-3 IoT system has a single node.
Data is stored and analyzed in the
cloud and the application is cloud-
based.
• Level-3 IoT systems are suitable for
solutions where the data involved is
big and the analysis requirements are
computationally intensive.
• Example: Tracking Packet Handling

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Level-4
• A level-4 IoT system has multiple
nodes that perform local analysis. Data
is stored in the cloud and the
application is cloud-based.
• Level-4 contains local and cloud-based
observer nodes which can subscribe to
and receive information collected in
the cloud from IoT devices.
• Level-4 IoT systems are suitable for
solutions where multiple nodes are
required, the data involved is big and
the analysis requirements are
computationally intensive.
• Example: Noise Monitoring

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Level-5
• A level-5 IoT system has multiple end nodes
and one coordinator node.
• The end nodes perform sensing and/or
actuation.
• The coordinator node collects data from the
end nodes and sends it to the cloud.
• Data is stored and analyzed in the cloud and
the application is cloud-based.
• Level-5 IoT systems are suitable for solutions
based on wireless sensor networks, in which
the data involved is big and the analysis
requirements are computationally intensive.

• Example: Noise Monitoring

Introduction to Internet of Things Bahga & Medisetti, 2015


IoT Level-6
• A level-6 IoT system has multiple independent
end nodes that perform sensing and/or
actuation and send data to the cloud.
• Data is stored in the cloud and the application
is cloud-based.
• The analytics component analyzes the data
and stores the results in the cloud database.
• The results are visualized with the cloud-based
application.
• The centralized controller is aware of the
status of all the end nodes and sends control
commands to the nodes.

• Example: Weather Monitoring

Introduction to Internet of Things Bahga & Medisetti, 2015

Common questions

Powered by AI

A level-4 IoT system features multiple nodes that perform local analysis, with data stored in and applications hosted on the cloud. It includes local and cloud-based observer nodes that subscribe to and receive information collected from IoT devices. Level-4 is suitable for solutions requiring multiple nodes, handling large data sets, and meeting computationally intensive analysis needs. An example application is noise monitoring, where distributed sensors are required to collect and analyze environmental sound levels across different locations .

The push-pull communication model benefits an IoT system by decoupling producers and consumers via a queuing mechanism. This allows for asynchronous communication, offering flexibility when producer and consumer data rates mismatch, acting as a buffer to smoothen communication load. It is advantageous in scenarios requiring high throughput or where producer and consumer availability are intermittent. This contrasts with the request-response model, which is synchronous and requires immediate response from the server upon receiving a client request, suitable for less demanding applications .

REST APIs in IoT follow a request-response communication model with principles like client-server uniform interface and stateless interactions. They suit scenarios where predictable, stateless HTTP communication suffices. WebSocket APIs, in contrast, enable bidirectional, full-duplex communication following an exclusive pair model. This allows for persistent connections, making them suitable for real-time applications where continuous data exchange between client and server is necessary. While REST is efficient for simple, stateless queries and updates, WebSocket is more effective for dynamic applications needing constant updates like live monitoring dashboards .

IoT technology uses four different layers of the OSI model: Data Link, Network, Transport, and Application layers. The Data Link layer determines how data is physically sent over the network. The Network layer is responsible for sending IP datagrams from the source network to the destination network, performing host addressing, and packet routing using protocols like IPv4 and IPv6. The Transport layer provides end-to-end message transfer capabilities, offering functions like error control and flow control, utilizing protocols like TCP and UDP. Lastly, the Application layer defines how applications interface with lower layers to send data across the network, employing protocols such as HTTP, CoAP, MQTT, and others .

The selection of communication protocols significantly affects the efficiency and scalability of an IoT system. Protocols like MQTT, with low overhead, enhance efficiency by reducing data payload size and conserving network bandwidth, crucial for constrained environments. On the other hand, protocols like HTTP offer simplicity and widespread compatibility, supporting scalability across diverse applications despite potentially higher data overheads. The choice must align with the system's requirements on data throughput, latency, and interoperability to ensure optimal performance and the ability to scale with increasing devices and data volume. Therefore, an informed protocol choice can enhance overall system responsiveness and adaptability to future changes .

The Publish-Subscribe communication model in an IoT system involves publishers, brokers, and consumers. Publishers are the data sources that send data to topics managed by a broker. Consumers subscribe to these topics to receive data. The broker ensures that all data from publishers on a topic is sent to subscribed consumers. This model allows for decoupling between data producers and consumers, enabling scalable and efficient data distribution without requiring producers to know the consumers' identity .

Security functions essential in an IoT functional block include authentication, authorization, message and content integrity, and data security. Authentication ensures that only legitimate devices can access the network, while authorization controls the access level of those devices. Message and content integrity ensure that data is not tampered with during transmission, and data security protects data at rest or in transit against unauthorized access. These security measures are critical to prevent malicious attacks, data breaches, and ensure trustworthiness within the IoT ecosystem, which typically involves numerous devices connected over potentially unsecured networks .

A level-6 IoT system comprises multiple independent end nodes for sensing/actuation that send data to the cloud, where it is stored and analyzed. The analytics component processes this data in the cloud, with results visualized via a cloud-based application. The centralized controller oversees all end nodes and issues control commands. This structure is ideal for extensive monitoring applications needing high-level data processing, such as weather and environmental monitoring, where large-scale, real-time data analysis is required to generate comprehensive insights .

TCP (Transmission Control Protocol) is a connection-oriented, stateful protocol that ensures reliable transmission, error detection, and flow and congestion control. This makes it suitable for scenarios where reliability is critical, such as data transfer applications ensuring no data loss. On the other hand, UDP (User Datagram Protocol) is a connectionless, stateless protocol that does not guarantee reliable transmission or proper message ordering, making it ideal for use cases like real-time applications where speed is prioritized over reliability. In IoT, TCP is preferred for scenarios demanding data integrity, while UDP is favored for applications requiring fast data delivery with acceptable data loss .

Integration of IoT application layer protocols like MQTT, CoAP, and HTTP enhances device interoperability by providing standardized methods for data exchange between devices. For example, MQTT's publish-subscribe model allows devices to communicate via a broker, enabling interoperability between devices with different processing capabilities. CoAP, designed for constrained networks, allows RESTful interactions between low-power sensors and the network, promoting interoperability in resource-limited environments. These protocols help unify communication methods across devices, regardless of underlying hardware or network constraints, ensuring seamless data exchange and device interaction .

You might also like