1.definition and Characteristics of Iot
1.definition and Characteristics of Iot
Definition
A dynamic global network infrastructure with self – configuring based on standard and interoperable
communication protocols where physical and virtual “things” have identified, physical attributes, and
virtual personalities and use intelligent interfaces, often communicate data associated with users and
their environment
characteristics of IoT
Dynamic and self-Adapting: Dynamic and self-Adapting: IoT devices and systems may have the
capability to dynamically adapt with the changing contexts and take actions based on their operating
condition.Ex: Surveillance cameras can adapt their modes based on whether it is day or night.
Self – Configuring: IoT devices may have self-Configuring capability allowing a large number of
devices to work together to provide certain functionality . Ex: weather monitoring.
Integrated into information network: IoT devices are usually integrated into the information
network that allows them to communicate and exchange data with other devices and systems.
2.Architectural Overview
Things of IoT
The “Things” in IoT usually refers to IoT devices which have unique identities and can perform
remote sensing, Actuating and monitoring capabilities.
An IoT device may consist of several interfaces connections to other devices, both wired and wireless.
These include I)IoT interfaces for sensors II) interfaces for internet connectivity III) memory and
storage interfaces IV) audio video interfaces.
IoT Protocol
Link Layer: Link Layer protocols determine how the data is physically sent over the networks
physical layer or medium(example copper wire, electrical cable, or radio wave).
802.3 Ethernet: 802.3 is a collections of wired Ethernet standards for the link layer.
802.1- WI-FI: IEEE 802.3 is a collections of wireless Local area network.(WLAN) communication
standards, including extensive descriptions of the link layer.
802.16 wiMAX: IEEE 802.16 is a collection of wirless broadband and Standards, including extensive
descriptions for the link layer also called WiMAX wimax standard provides a data rates from from 1.5
Mb/s to 1Gb/s the recent update provides data rates of hundred megabits per second for mobile station
802.15.4 LR-WPAN: IEEE 802.1 5.4 is a collections of standard for low rate wireless personal area
network(LRWPAN).These standard form the basis of specifications for high level communication
Zigbee. LR-WPAN standards provide data rates from 40 k b/ s. These standards provide low cost and
low speed Communications for power constrained devices.
Network / internet layer : The network layer are responsible for sending of IP datagrams from the
source network to the destination network. This layer Performs the host addressing and packet
routing.
IPV4: Internet protocol versions for open parents close (IPV4) is there most deployed internet
protocol that is used to identify the device is on a network using a hierarchy latest schemes. It uses 32
bit addresses scheme that allows total of 2 32 address. As more and more devices got connected to the
internet. The Ipv4 has succeeded by IPv6. IPv6: It is the newest versions of internet protocol and
successor to IPv4.
IPv6 uses 128 bit address schemes that are lost total of 2 128 are 3.4* 10 38 address.
6LoWPAN: IPv6 over low power wireless personal area networks brings IP protocol to the low power
device which have limited processing capability it operate in the 2.4 GHz frequency range and
provide the data transfer rate off to 50 kb/s.
Transport layer : The Transport layer protocols provides end-to-end message transfer capability
independent of the underlying network.
TCP: Transmission control protocol is the most widely used to transport layer protocol that is used by
the web browsers along with HTTP , HTTPS application layer protocols email program (SMTP
application layer protocol) and file transfer protocol. TCP is a connection Oriented and stateful
protocol while IP protocol deals with sending packets, TCP ensures reliable transmissions of packets
in order.
UDP: unlike TCP, which requires carrying out an initial setup procedure, UDP is a connection less
protocol. UDP is useful for time sensitive application they have very small data units to exchange and
do not want the overhead of connection setup. UDP is a transactions oriented and stateless protocol.
Application layer : Application layer protocol define how the application interfaces with the lower
layer protocols to send the data over the network.
Http: Hypertext transfer protocol is the application layer protocol that forms the foundations of world
wide web http includes, ,commands such as GET, PUT, POST, DELETE, HEAD, TRACE,
OPTIONS etc. The protocol follows a requestresponse model where are client sends request to server
using the http, commands. Http is a stateless protocol and each http request is independent father
request and http client can be a browser or an application running on the client example and
application running on an IoT device ,mobile mobile applications or other software.
CoAP: Constrained application protocol is an application layer protocol for machine to machine
application M2M meant for constrained environment with constrained devices and constrained
networks. Like http CoAP is a web transfer protocol and uses a request- response model, however it
runs on the top of the UDP instead of TC CoAP uses a client –server architecture where client
communicate with server using connectionless datagrams.It is designed to easily interface with http
like http,CoAP supports method such as GET, PUT, DELETE .
Websocket:Websocket protocol allows full duplex communication over a single socket connections
for sending message between client and server. Websocket is based on TCP and Allows streams of
messages to be sent back and forth between the client and server while keeping the TCP connection
open. The client can be a browser, a mobile application and IoT device
MQTT :Message Queue Telemetry Transport it is a lightweight message protocol based on public -
subscribe model MQTT uses a client server Architecture by the clients such as an IoT device connect
to the server also called the MQTT broker and publishers message to topic on the server. The broker
forward the message to the clients subscribed to topic MQTT is well suited for constrained and
environments.
XMPP: Extensible Messaging and Presence Protocol it is a protocol for real-time communication and
streaming XML data between network entities XMPP powers wide range of applications including
messaging, presence, data syndication, gaming multiparty chat and voice / voice calls. XMPP Allows
sending small chunks of XML data from one network entity to another in real time. XMPP supports
both client to server and server –client communication path.
DDS: Data distribution service is the date centric middleware standard for deviceto-device machine to
machine communication DDS uses a publish subscribe model where publisher example device that
generate data create topics to which subscribers per can subscribe publisher is an object responsible
for data distributions and the subscriber responsible for receiving published data. DDS provide quality
of service (QoS) control and configurable reliability
AMQP: Advanced Message Queuing protocols. it is an open application layer protocol for business
messaging. AMQP support point to point and publish - subscribe model routing and queuing. AMQP
broker receive message from publishers example devices or applications that generate data and about
them over connections to consumers publishers publish the message to exchange which then distribute
message copies to queues.
Logical design of an IoT system refers to an abstract representation of the entities and process without
going into low level specification of the implementations .
Devices: An IoT system comprises of the devices that provide sensing, actuation, monitoring and
control function Communication: communication block handle the communication systems
Services : An IoT system uses various types of IoT services such as services for device
monitoring ,device control services ,data publishing services and services for device Discovery.
Management: Functional blocks provide various functions to govern the IoT system
Security: Security functional block security IoT system and by providing functions such as
application authorization message and content integrity and data security.
Application: IoT application provides and interface that the user can used to control and monitor
various aspects of the IoT system. Application also allow users to view the system status and view or
analyze the processed to data.
Request response: Request-response is a Communications model in which the client sends request to
the server and the server responds to the requests. when the server receives a request it decides how to
respond, if it shows the data retrieved resources definitions for the response , and then send the
response to the client. Access to response model is a stateless communication model and each request
response per is independent of others the crime and server interactions in the request response model.
Publish - Subscribe: Respect is a communication model that involve Publishers brokers and
consumers. Publishers are the source of data. Publishers send the data to the topics which is managed
by the broker. Publishers are not aware of the consumer. Consumers Subscribe to the topic which are
managed by the broker. When the broker receives the data for a topic from the publisher, it send the
data to all the subscribed consumers.
Push pull: Push pull is communication model in which the data producers push the data to queues and
the consumers pull the data from the queues. Producers do not need to be aware of the consumer.
Queues help in decoupling the messaging between the Producers and Consumers .
Exclusive pair: Exclusive pair is a bi directional, fully duplex communication model that uses a
persistent connections between the client and the server. once the condition is setup it remains open
until the client sends a request to close the connection. client and server can send messages to each
other after connection setup. Exclusive pair is a stateful Communications model and the server is
aware of all the open connections.
Client server: The principle behind the client-server conference separations of concerns for example
client should not be concerned with the storage of data which is their concern of the server. Similarly
the server should not be concerned about the user interface which is a concern of the client. separation
allows client and server to be independently deployed and updated.
Stateless: Each request from client to server must contain all the information necessary to
understand the request , and cannot take advantage of any stored context on the server .
Catchable: Catch constrain requires that the data within the response to a request be implicitly or
explicitly labeled as catchable or non-catchable. Then a client cache is given the right to reuse that
response data for later, equivalent requests. completely eliminate some attractions and improve
efficiency and scalability.
Layered system: System constraint come off constraints, constrains the behavior of components
such that each component cannot see beyond the immediate layer with which they are interacting.
Uniform interface: Uniform interface constraints requires that the method of communication
between client and server must be uniform. Resources are identified in the request and separate from
the representation of the resource that are returned to the client. When climbing holds a representation
of your resource it has all the information required to update or delete the resource Code on
demand : Service can provide executable code script for clients to execute in their context.
WebSocket API allow bi directional, full duplex communication between client and server. Unlike
request-response API allow full duplex communication and do not require new connection to be set
up for each message to be sent. Websocket communication begins with connection setup request send
by the client to the server. The request is sent over http and the server interprets it as an upgrade
request. If the server support protocol response to the website handshake response after the connection
setup the client and the server can send data or messages to each other in full duplex model.
WebSocket API reduce network traffic and latency as there is no overhead for connection setup and
determination records to each message.
In the world of IoT, user research and service design are more crucial than ever. While early adopters
are eager to try out new technology, many others are reluctant to take new technology into use and
cautious about using it, due to not feeling confident with it.
IoT solutions typically consist of multiple devices with different capabilities and both physical and
digital touchpoints. The solution may also be provided in co-operation with multiple different service
providers. It is not enough to design one of the touchpoints well, instead you need to take a holistic
look across the whole system, the role of each device and service, and the conceptual model of how
user understands and perceives the system.
While transferring information we have to takecare of data from leakage and we have to transfer safly.
As the IoT solutions are placed in the real world context, the consequences can be serious, when
something goes wrong. At the same time the users of the IoT solutions may be vary of using new
technology, so building trust should be one of your main design drivers.
While designing principles we have to work in that context means we will not go out of context.
IoT solutions exist at the crossroads of the physical and digital worlds. Commands given through
digital interfaces may produce real world effects, but unlike digital commands, the actions happening
in the real-world cannot necessarily be undone.
If all features are good then it will come up with good brand.
Due to the real world context of the IoT solutions, regardless of how carefully you design things and
aim to build trust, something unexpected will happen at some point and your solution is somehow
going to fail.
Test prototype early and often:
Typically HW and SW have quite different lifespans, but as successful IoT solution needs both the
HW and SW elements, the lifespans should be aligned.
IoT solutions can easily generate tons of data. However, the idea is not to hoard as much data as
possible, but instead to identify the data points that are needed to make the solution functional and
useful .
4.IoT Applications
1. Smart Homes
One of the best and the most practical applications of IoT, smart homes really take both, convenience
and home security, to the next level. Though there are different levels at which IoT is applied for
smart homes, the best is the one that blends intelligent utility systems and entertainment together. For
instance, your electricity meter with an IoT device giving you insights into your everyday water
usage, your set-top box that allows you to record shows from remote, Automatic Illumination
Systems,
2. Smart City
Not just internet access to people in a city but to the devices in it as well – that’s what smart cities are
supposed to be made of. And we can proudly say that we’re going towards realizing this dream.
Efforts are being made to incorporate connected technology into infrastructural requirements and
some vital concerns like Traffic Management, Waste Management, Water Distribution, Electricity
Management, and more. All these work towards eliminating some day-to-day challenges faced by
people and bring in added convenience.
3. Self-driven Cars
We’ve seen a lot about self-driven cars. Google tried it out, Tesla tested it, and even Uber came up
with a version of self-driven cars that it later shelved. Since it’s human lives on the roads that we’re
dealing with, we need to ensure the technology has all that it takes to ensure better safety for the
passenger and those on the roads.
If you change your mind and pick up another article, the previous one gets deleted and replaces your
cart with the new item. The best part of the concept store is that there is no cashier to bill your
products. You don’t have to stand in line but just step out after you pick up your products from
shelves.
5. Farming
Farming is one sector that will benefit the most from the Internet of Things. With so many
developments happening on tools farmers can use for agriculture, the future is sure promising. Tools
are being developed for Drip Irrigation, understanding crop patterns, Water Distribution, drones for
Farm Surveillance, and more.
6. Wearables
Wearables remain a hot topic in the market, even today. These devices serve a wide range of purposes
ranging from medical, wellness to fitness. Of all the IoT startups, Jawbone, a wearables maker, is
second to none in terms of funding.
7. Smart Grids
One of the many useful IoT examples, a smart grid, is a holistic solution that applies an extensive
range of Information Technology resources that enable existing and new gridlines to reduce electricity
waste and cost. A future smart grid improves the efficiency, reliability, and economics of electricity.
8. Industrial Internet
The Industrial Internet of Things consists of interconnected sensors, instruments, and other devices
connected with computers’ industrial applications like manufacturing, energy management, etc.
9. Telehealth
Telehealth, or Telemedicine, hasn’t completely flourished yet. Nonetheless, it has great future
potential. IoT Examples of Telemedicine include the digital communication of Medical Imaging,
Remote Medical Diagnosis & Evaluations, Video Consultations with Specialists, etc.
10. Smart Supply-chain Management
Supply-chains have stuck around in the market for a while now. A common example can be Solutions
for tracking goods while they are on the road. Backed with IoT technology, they are sure to stay in the
market for the long run.
5.Basics of Networking
An IoT network refers to a collection of interconnected devices that communicate with other devices
without the need for human involvement, such as autonomous cars, smart appliances, and wearable
tech.
The network infrastructures most associated with IoT networks are 4G LTE and 5G which are built to
support the resource demands of the IoT.
IoT Networks: 5G
IoT is a central use case of 5G infrastructure. This is because the current mobile networks are already
struggling to keep up with the resource demands of the exploding IoT device market.
The internet of things is not waiting patiently for 5G networks to mature. According to Cisco, IoT
devices have been around since between 2008 and 2009, long before 5G network development. For
machine to machine (M2M) connections, LTE networks use the Cat-M1 chipset. M2M connections
are the basis of mMTC.
NB-IoT improves device power consumption, the capacity of the network system, and how efficiently
the available spectrum is used.
6.M2M
whereas M2M can refer to any two machines—wired or wireless—communicating with one another.
The range of connected devices includes anything from vending machines to medical equipment to
vehicles to buildings. Virtually anything that houses sensor or control technology can be connected to
some sort of wireless network.
This process allows a human (or an intelligent control unit) to assess what is going on across the
whole network and issue appropriate instructions to member devices.
M2M Applications
1. MANUFACTURING
2. HOME APPLIANCES
Anything that has a sensor attached to it and can transmit data from one object to another or to people
with the help of internet is known as data.
IoT devices include wireless sensors, software, actuators, and computer devices. They are attached to
a particular object that operates through the internet, enabling the transfer of data among objects or
people automatically without human intervention.
For example, IoT systems in your car identifies the traffic ahead and automatically sends out
messages to the person you are about to meet of your impending delay. Even a pacemakers can be an
IoT device that seamlessly communicates with other machines for a greater ease of life and
convenience.
Gateway provides bridge between different communication technologies which means we can say
that a Gateway acts as a medium to open up connection between cloud and controller(sensors /
devices) in Internet of Things (IoT) . By the help of gateways it is possible to establish device to
device or device to cloud communication. A gateway can be a typical hardware device or software
program.
Data management:
The Internet of Things (IoT) device management enables users to track, monitor and manage the
devices to ensure these work properly and securely after deployment. Billions of sensors interact with
people, homes, cities, farms, factories, workplaces, vehicles, wearables and medical devices, and
beyond. The Internet of Things (IoT) is changing our lives from managing home appliances to
vehicles.
Data management is the process of taking the overall available data and refining it down to important
information. Different devices from different applications send large volumes and varieties of
information. Managing all this IoT data means developing and executing architectures, policies,
practices and procedures that can meet the full data lifecycle needs.
Things are controlled by smart devices to automate tasks, so we can save our time. Intelligent things
can collect, transmit and understand information, but a tool will be required to aggregate data and
draw out inferences, trends and patterns.
Business processes
A business process is a series of repeatable steps designed to achieve a goal. Repetition is the key
aspect of business processes. They should be performed regularly and done in a similar way each
time. Some examples of business processes are:
1. Analyze
2. Design
3. Model
4. Implement
5. Monitor and Control
6. Refine and Improve
Analyze
analyse each business process for its effectiveness and optimization. Start by ensuring that the process
is aligned with the goals and objectives of the organization. Then you can take a closer look at each
step in the process to see what is working and what isn’t.
Design
identified some opportunities for improvement you can begin to develop some ideas for how to
improve and optimize the process. This could be as complicated as implementing automation to
remove a manual step, or it could be as simple as removing a redundant step.
Model
now put your designs in to action or simulate how the changes would impact the process and the
entire organization. Modelling techniques can vary depending on the process that is being refined.
However, running test-cases and prototypes are good ways to see how the proposed changes perform.
Implement
Once the modelling has proven that the proposed changes have a positive impact on the process and
the organization at large, it’s time to implement your modifications.
Once your process has been implemented you will need to monitor and control it to ensure that it is
working properly.
Once your implementation has been completed successfully it’s time to start from the beginning
again. A key part of BPM is to constantly look for ways to improve. Businesses stagnate when they
stand still, and properly executed BPM pushes organizations towards new horizons.
9.Everything as a Service(XaaS)
An extensive number of modern digital services, products and tools are ordered over the Internet and
delivered to users on demand, rather than provided via local channels within enterprises or specialized
organizations.
some practical -aaS cases (apart from SaaS, PaaS and IaaS) that are gaining popularity.
An extensive number of modern digital services, products and tools are ordered over the Internet and
delivered to users on demand, rather than provided via local channels within enterprises or specialized
organizations. To describe this phenomenon, a special term was invented: Everything-as-a-Service
(XaaS). What is Everything-as-a-Service and does it have anything to do with popular cloud
computing models — SaaS, PaaS and IaaS? Read our article for an explanation.
What Is XaaS?
Everything-as-a-Service is a term for services and applications that users can access on the Internet
upon request.
The Everything-as-a-Service definition may seem unclear at first sight, but actually, it is not difficult
to understand. It all started with the cloud computing terms: SaaS (Software-as-a-
Service), PaaS (Platform-as-a-Service) and IaaS (Infrastructure-as-a-Service), meaning that ready-
made software, a platform for its development, or a comprehensive computing infrastructure could be
provided via networks. Gradually, other offerings appeared and now, the designation as-a-Service is
associated with various digital components, e.g. data, security, communication, etc.
What’s more, Anything-as-a-Service (another name for XaaS) is not confined to digital products. You
can get practically everything, from food to medical consultations, without leaving your home or
office, by utilizing certain online services. Hence the “Everything” is in the name.
Now that we’ve covered the XaaS definition, it’s time to demonstrate some practical -aaS cases (apart
from SaaS, PaaS and IaaS) that are gaining popularity.
Hardware-as-a-Service (HaaS)
Managed service providers (MSP) own some hardware and install it on customers’ sites on demand.
Communication-as-a-Service (CaaS)
This model includes different communication solutions such as VoIP (voice over IP or Internet
telephony), IM (instant messaging), video conference applications that are hosted in the vendor’s
cloud.
Desktop-as-a-Service (DaaS)
Desktops are delivered as virtual services along with the apps needed for use.
Security-as-a-Service (SECaaS)
This is the model of outsourced security management. A provider integrates their security services
into your company’s infrastructure and, as a rule, delivers them over the Internet.
Healthcare-as-a-Service (HaaS)
With electronic medical records (EMR) and hospital information systems (HIS), the healthcare
industry is transforming into Healthcare-as-a-Service.
Transportation-as-a-Service (TaaS)
Important trends of modern society are mobility and freedom of transportation at different
distances.
Carsharing (you can rent a car at any place via a special app and drive anywhere you need, paying
for the time you use a car, or for the distance you cover)
Uber taxi services (you order a taxi via an app, which calculates the cost of the rout in advance).
Uber is planning to test flying taxis and self-driving planes in the near future.
Benefits of XaaS
The biggest benefits are:
The primary source of most IoT security issues is that manufacturers do not spend enough
time and resources on security.
Tricking a human is, most of the time, the easiest way to gain access to a network. A type of
IoT security risk that is often overlooked is social engineering attacks. Instead of targeting
devices, a hacker targets a human, using the IoT.
Updates are critical for maintaining security on IoT devices. They should be updated right
after new vulnerabilities are discovered. Still, as compared with smartphones or computers
that get automatic updates, some IoT devices continue being used without the necessary
updates.
The lack of physical hardening can also cause IoT security issues. Although some IoT devices
should be able to operate autonomously without any intervention from a user, they need to be
physically secured from outer threats.
Sometimes, these devices can be located in remote locations for long stretches of
time, and they could be physically tampered with, for example, using a USB flash drive with
Malware.
5) Botnet Attacks
A single IoT device infected with malware does not pose any real threat; it is a collection of
them that can bring down anything. To perform a botnet attack, a hacker creates an army of
bots by infecting them with malware and directs them to send thousands of requests per
second to bring down the target.
Most IoT devices extract and collect information from the external environment.
9) Rogue IoT Devices
One of the most significant IoT security risks and challenges is being able to manage all our
devices and close the perimeter.