Unit 1-I B.Tech (IoT)
Unit 1-I B.Tech (IoT)
Unit I
IoT definition, Characteristics, IoT conceptual and architectural framework, Physical and logical design of
IoT, IoT enablers, Modern day IoT applications, M2M communications, IoT vs M2M, IoT vs WoT, IoT
reference architecture, IoT Network configurations, IoT LAN, IoT WAN, IoT Node, IoT Gateway, IoT Proxy
---------------------------------------------------------------
IoT definition : IoT stands for Internet of Things, which means accessing and controlling daily usable
equipments and devices using Internet.
Let's us look closely at our mobile device which contains GPS Tracking, Mobile Gyroscope, Adaptive
brightness, Voice detection, Face detection etc. These components have their own individual features, but
what about if these all communicate with each other to provide a better environment? For example, the phone
brightness is adjusted based on my GPS location or my direction.
Connecting everyday things embedded with electronics, software, and sensors to internet enabling to collect
and exchange data without human interaction called as the Internet of Things (IoT).
The term "Things" in the Internet of Things refers to anything and everything in day to day life which is
accessed or connected through the internet.
IoT is an advanced automation and analytics system which deals with artificial intelligence, sensor, networking,
electronic, cloud messaging etc. to deliver complete systems for the product or services. The system created
by IoT has greater transparency, control, and performance.
As we have a platform such as a cloud that contains all the data through which we connect all the things
around us. For example, a house, where we can connect our home appliances such as air conditioner, light,
etc. through each other and all these things are managed at the same platform. Since we have a platform, we
can connect our car, track its fuel meter, speed level, and also track the location of the car.
If there is a common platform where all these things can connect to each other would be great because based
on my preference, I can set the room temperature. For example, if I love the room temperature to be set at 25
or 26-degree Celsius when I reach back home from my office, then according to my car location, my AC would
start before 10 minutes I arrive at home. This can be done through the Internet of Things (IoT).
The working of IoT is different for different IoT echo system (architecture). However, the key concept of there
working are similar. The entire working process of IoT starts with the device themselves, such as smartphones,
digital watches, electronic appliances, which securely communicate with the IoT platform. The platforms collect
and analyze the data from all multiple devices and platforms and transfer the most valuable data with
applications to devices.
Characteristics of IoT
The most important Characteristics of IoT on which it works are connectivity, analyzing, integrating, active
engagement, and many more. Some of them are listed below:
Connectivity: Connectivity refers to establish a proper connection between all the things of IoT to IoT platform
it may be server or cloud. After connecting the IoT devices, it needs a high speed messaging between the
devices and cloud to enable reliable, secure and bi-directional communication.
Analyzing: After connecting all the relevant things, it comes to real-time analyzing the data collected and use
them to build effective business intelligence. If we have a good insight into data gathered from all these things,
then we call our system has a smart system.
Integrating: IoT integrating the various models to improve the user experience as well.
Artificial Intelligence: IoT makes things smart and enhances life through the use of data. For example, if we
have a coffee machine whose beans have going to end, then the coffee machine itself order the coffee beans
of your choice from the retailer.
Sensing: The sensor devices used in IoT technologies detect and measure any change in the environment
and report on their status. IoT technology brings passive networks to active networks. Without sensors, there
could not hold an effective or true IoT environment.
Active Engagement: IoT makes the connected technology, product, or services to active engagement
between each other.
Endpoint Management: It is important to be the endpoint management of all the IoT system otherwise, it
makes the complete failure of the system. For example, if a coffee machine itself order the coffee beans when
it goes to end but what happens when it orders the beans from a retailer and we are not present at home for a
few days, it leads to the failure of the IoT system. So, there must be a need for endpoint management.
https://wso2.com/whitepapers/a-reference-architecture-for-the-internet-of-things/
• Devices
• Device manager
• Intel Galileo connected via Ethernet or Wi-Fi Examples of indirectly connected device include
• ZigBee devices connected via a ZigBee gateway
Each device typically needs an identity. The identity may be one of the following:
• A unique identifier (UUID) burnt into the device (typically part of the System-on-Chip,or provided by a
secondary chip)
• A UUID provided by the radio subsystem (e.g. Bluetooth identifier, Wi-Fi MAC address)
For the reference architecture we recommend that every device has a UUID (preferably an unchangeable ID
provided by the core hardware) as well as an OAuth2 Refresh and Bearer token stored in EEPROM.
The specification is based on HTTP; however, (as we will discuss in the communications section) the
reference architecture also supports these flows over MQTT.
• MQTT 3.1/3.1.1
HTTP is well known, and there are many libraries that support it. Because it is a simple textbased protocol,
many small devices such as 8-bit controllers can only partially support the protocol – for example enough code
to POST or GET a resource. The larger 32-bit based devices can utilize full HTTP client libraries that properly
implement the whole protocol.
There are several protocols optimized for IoT use. The two best known are MQTT6 and CoAP7. MQTT was
invented in 1999 to solve issues in embedded systems and SCADA. It has been through some iterations and
the current version (3.1.1) is undergoing standardization in the OASIS MQTT Technical Committee 8. MQTT is
a publish-subscribe messaging system based on a broker model. The protocol has a very small overhead (as
little as 2 bytes per message), and was designed to support lossy and intermittently connected networks.
MQTT was designed to flow over TCP. In addition there is an associated specification designed for ZigBee-
style networks called MQTT-SN (Sensor Networks).
CoAP is a protocol from the IETF that is designed to provide a RESTful application protocol modeled on
HTTP semantics, but with a much smaller footprint and a binary rather than a text-based approach. CoAP is a
more traditional client-server approach rather than a brokered approach. CoAP is designed to be used over
UDP.
For the reference architecture we have opted to select MQTT as the preferred device communication
protocol, with HTTP as an alternative option.
The reasons to select MQTT and not CoAP at this stage are
• Simplified bridging into existing event collection and event processing systems; and
However, both protocols have specific strengths (and weaknesses) and so there will be some situations
where CoAP may be preferable and could be swapped in.
In order to support MQTT we need to have an MQTT broker in the architecture as well as device libraries.
We will discuss this with regard to security and scalability later.
One important aspect with IoT devices is not just for the device to send data to the cloud/ server, but also the
reverse. This is one of the benefits of the MQTT specification: because it is a brokered model, clients connect
an outbound connection to the broker, whether or not the device is acting as a publisher or subscriber. This
usually avoids firewall problems because this approach works even behind firewalls or via NAT.
In the case where the main communication is based on HTTP, the traditional approach for sending data to
the device would be to use HTTP Polling. This is very inefficient and costly, both in terms of network traffic as
well as power requirements. The modern replacement for this is the WebSocket protocol 9 that allows an HTTP
connection to be upgraded into a full two-way connection. This then acts as a socket channel (similar to a pure
TCP channel) between the server and client. Once that has been established, it is up to the system to choose
an ongoing protocol to tunnel over the connection.
For the reference architecture we once again recommend using MQTT as a protocol with WebSockets. In
some cases, MQTT over WebSockets will be the only protocol. This is because it is even more firewall-friendly
than the base MQTT specification as well as supporting pure browser/JavaScript clients using the same
protocol.
Note that while there is some support for WebSockets on small controllers, such as Arduino, the combination
of network code, HTTP and WebSockets would utilize most of the available code space on a typical Arduino 8-
bit device. Therefore, we only recommend the use of WebSockets on the larger 32-bit devices.
1.The ability to support an HTTP server and/or an MQTT broker to talk to the devices;
2.The ability to aggregate and combine communications from different devices and to route communications
The aggregation/bus layer provides these capabilities as well as adapting into legacy protocols. The bus layer
may also provide some simple correlation and mapping from different correlation models (e.g. mapping a
device ID into an owner’s ID or vice-versa).
Finally the aggregation/bus layer needs to perform two key security roles. It must be able to act as an OAuth2
Resource Server (validating Bearer Tokens and associated resource access scopes). It must also be able to
act as a policy enforcement point (PEP) for policy-based access. In this model, the bus makes requests to the
identity and access management layer to validate access requests. The identity and access management layer
acts as a policy decision point (PDP) in this process. The bus layer then implements the results of these calls
to the PDP to either allow or disallow resource access.
Complex event processing for fast in-memory processing and near real-time reaction and autonomic
actions based on the data and activity of devices and other systems
In addition, this layer may support traditional application processing platforms, such as Java Beans,
JAX-RS logic, message-driven beans, or alternatives, such as node.js, PHP, Ruby or Python.
The first is that it provides a developer-focused portal (as opposed to the userfocused portal previously
mentioned), where developers can find, explore, and subscribe to APIs from the system. There is also
support for publishers to create, version, and manage the available and published APIs;
The second is a gateway that manages access to the APIs, performing access control checks (for
external requests) as well as throttling usage based on policies. It also performs routing and load-
balancing;
The final aspect is that the gateway publishes data into the analytics layer where it is stored as well as
Device Management
Device management (DM) is handled by two components. A server-side system (the device manager)
communicates with devices via various protocols and provides both individual and bulk control of devices. It
also remotely manages software and applications deployed on the device. It can lock and/or wipe the device if
necessary. The device manager works in conjunction with the device management agents. There are multiple
The device manager also needs to maintain the list of device identities and map these into owners. It
must also work with the identity and access management layer to manage access controls over devices (e.g.
who else can manage the device apart from the owner, how much control does the owner have vs. the
administrator, etc.)
There are three levels of device: non-managed, semi-managed and fully managed (NM, SM,FM).
Fully managed devices are those that run a full DM agent. A full DM agent supports:
Non-managed devices can communicate with the rest of the network, but have no agent involved. These may
include 8-bit devices where the constraints are too small to support the agent. The device manager may still
maintain information on the availability and location of the device if this is available.
Semi-managed devices are those that implement some parts of the DM (e.g. feature control, but not
software management).
The final layer is the identity and access management layer. This layer needs to provide the following services:
Other identity services including SAML2 SSO and OpenID Connect support for identifying inbound
XACML PDP
The identity layer may of course have other requirements specific to the other identity and access
management for a given instantiation of the reference architecture. In this section we have outlined the major
components of the reference architecture as well as specific decisions we have taken around technologies.
These decisions are motivated by the specific requirements of IoT architectures as well as best practices for
building agile, evolvable, scalable Internet architectures. Of course there are other options, but this reference
architecture utilizes proven approaches that are known to be successful in real-life IoT projects we have
worked on.
• Exchange data with other connected devices and applications (directly or indirectly), or
• Collect data from other devices and process the data locally or
• Send the data to centralized servers or cloud-based application back-ends for processing the data, or
• Perform some tasks locally and other tasks within the IoT infrastructure, based on temporal and space
constraints
• An IoT system comprises of a number of functional blocks that provide the system the
capabilities for identification, sensing, actuation, communication, and management.
Sensors: The IoT Enablers
As the Internet of Things (IoT) enables devices to make intelligent decisions that generate positive business
outcomes, it’s the sensors that enable those decisions. As cost and time-to-market pressures continue to rise,
sensors provide greater visibility into connected systems and empower those systems to react intelligently to
changes driven by both external forces and internal factors.
Sensors are the components that provide the actionable insights that power the IoT and enable organizations to
make more effective business decisions. It’s through this real-time measurement that the IoT can transform an
organization’s ability to react to change.
For example, consider a fleet of garbage collection trucks that periodically empty trash bins. Most trucks have a
consistent weekly route for emptying bins, whether they’re full or not, because the schedule does not account for
how people use them. If an ultrasonic sensor is incorporated into the design of the trash bin, it can provide the
waste management company with valuable data about how much trash is inside, and then optimize trash
collection routes accordingly.
Who are IoT Enablers?
System installers, repairers, craftsmen, electricians, plumbers, designers and do-it-yourselfers who connect
devices and systems to the Internet for personal use and for commercial and other business uses.
M2M communications :Machine-to-machine, or M2M, is a broad label that can be used to describe any
technology that enables networked devices to exchange information and perform actions without the manual
assistance of humans. Artificial intelligence (AI) and machine learning (ML) facilitate the communication between
systems, allowing them to make their own autonomous choices.
M2M technology was first adopted in manufacturing and industrial settings, where other technologies, such
as SCADA and remote monitoring, helped remotely manage and control data from equipment. M2M has since
found applications in other sectors, such as healthcare, business and insurance. M2M is also the foundation for
the internet of things (IoT).
Machine-to-machine communication is often used for remote monitoring. In product restocking, for example, a
vending machine can message the distributor's network, or machine, when a particular item is running low to send
a refill. An enabler of asset tracking and monitoring, M2M is vital in warehouse management systems (WMS) and
supply chain management (SCM).
Connection type The connection is via Network and using The connection is a point to
used various communication types. point
used 2 Consumer(B2C)
IoT vs WoT
The difference between the IoT and the WoT may appear as a straightforward and easy to make distinction
The difference between the Internet of Things (IoT) and the Web of Things (WoT) may appear as a
straightforward and easy to make distinction. However, the differences between both concepts are far more
complicated than one may imagine; each minute detail of both IoT and WoT makes for two vastly differing
subjects, each with their own set of ideas, structures, and uses. Despite their differences, IoT and WoT work in
unison and will rely on each other to run smoothly and the most efficiently.
IoT
In its most basic sense, the Internet of Things refers to everyday objects and devices that are connected through
wireless networks. The wireless networks use special sensors, or other technology, to interconnect with these
everyday objects, thus making up the IoT. These everyday objects are devices embedded with sensors (to
recognize environmental conditions), wireless or wired communication interfaces, computation (for running
complex programs), and/or actuators – all of these make up the “Things” in IoT.
Everything in IoT is indeed connected. IoT turns everyday objects into something intelligent – said objects are
made “readable, recognizable, locatable, addressable, and/or controllable via the Internet” (SRI Consulting
Business Intelligence).
IoT Examples
Examples of devices connected to the Internet of Things can range from very simple to extraordinarily complex.
Teetering on the more simplistic side, a package that is sent out with a tracking number from UPS uses an Auto-
ID tag. This tag may use barcodes, QR codes, NFC, or RFID tags. These tags allow your package to be tracked
from the supplier to the shipping center, all the way up until your package is delivered. A more complex example
is tech used to maintain and repair large equipment and machinery. Sensors can be installed inside machinery
and send alerts and reports to manufacturers when something is not running properly. This can help top
equipment malfunctions, leading to a reduction in injury and loss of money.
Limitations of IoT
With some many Things trying to communicate with one another in different ways, it is challenging to seamlessly
build a single communication platform in which all Things speak together effectively. Many have tried to create
completely new platforms of communication so all devices can communicate effectively, also known as an
application layer protocol (or a language, more simply put). However, this is time-consuming and may be nearly
impossible. Therefore, many others believe we must use a platform that already exists…the World Wide Web.
This is where the WoT comes into play. The web is an already established system that can allow all Things to
communicate with each other. The Web may be used as a type of application where all Things can communicate
together in the most efficient manner.
WoT
The WoT is very similar to the IoT in some ways and in others it is drastically different. WoT was inspired by the
IoT as in common everyday devices are connected to the Web and can communicate through various systems.
However, where both begin to differentiate is the WoT is focused on reusing the already established Web system
to help these everyday connected devices connect to one single application – in this case, the Web. If all
connected devices are able to use one single base, the Web, to store information and communicate with each
other, we can successfully make a global ecosystem for Things to communicate together.
https://whataftercollege.com/internet-of-things/difference-between-iot-and-wot/
IoT reference architecture
https://wso2.com/whitepapers/a-reference-architecture-for-the-internet-of-things/
The devices may not have UIs and certainly are designed to be “everyday” usage, so we need to support
automatic and managed updates, as well as being able to remotely manage these devices.
IoT devices are very commonly used for collecting and analyzing personal data. A model for managing
the identity and access control for IoT devices and the data they publish and consume is a key
requirement.
There are several reasons why a reference architecture for IoT is a good thing:
Our aim is to provide an architecture that supports integration between systems and devices.
In the next section, we will dig into these requirements deeper and outline the specific requirements we are
looking for in a range of categories.
There are some specific requirements for IoT that are unique to IoT devices and the environments that
support them, e.g. many requirements emerge from the limited formfactors and power available to IoT
devices. Other requirements come from the way in which IoT devices are manufactured and used. The
approaches are much more like traditional consumer product designs than existing Internet approaches. Of
course there are a number of existing best practices for the server-side and Internet connectivity that need to
be remembered and factored in.
Wireless personal and local area network technologies that are commonly incorporated into IoT connectivity
solutions are WiFi and Bluetooth. WiFi can be used for applications that run in a local environment, or in a
distributed setting if there are multiple access points integrated into a larger network. One downside to WiFi is
that it works only if the signal is strong and you’re close to the access point. Also, WiFi is generally more power-
hungry than people think, but it is possible to operate it in a way that’s a little more power-efficient (for example,
your device only connects periodically to send data, then goes back to sleep).
Bluetooth Low Energy (BLE) is a more energy-efficient wireless network protocol—if you’re not receiving data
constantly, a single battery running BLE could last up to five years. However, compared to WiFi it is slower to
transmit and is more limited in the amount of data it is capable of sending.
Both WiFi and Bluetooth are easy to connect in most cases, although WiFi does have some security challenges
that may be difficult to overcome.
A well-known and commonly used IoT network protocol in this category is LoRaWAN (long range wireless area
network), which runs on the LoRa (long range) communication network. Advantages of LoRaWAN for IoT devices
are its low power requirement (for long battery life) and relatively low-cost chipsets. Plus, under the right
conditions, a single base station or gateway running on a long-range network is capable of providing service to a
very large area—a few kilometers in dense urban areas and up to 15–30 kilometers in rural areas.
What is an IoT Gateway?
In telecommunications, the primary purpose of a gateway is to provide a bridge between different types of
communication technologies. These technologies can vary in terms of connectivity types, interfaces, or protocols.
For example, your Internet Gateway at home connects your Local Area Network (LAN) with your Internet Service
Provider (ISP). This gateway links the WAN of the ISP through technologies like PPP or HDLC with your LAN
with TCP/IP.
The IoT Gateway follows the same principle of bridging communications for different technologies. It creates a
bridge between the IoT sensors/actuators and the Internet. The IoT gateway aggregates all data, translates
sensor’s protocols, and pre-process the data before sending it.
The IoT devices connect to the IoT Gateway using short-range wireless transmission modes such as Bluetooth
LE, Zigbee, Z-wave, or long-range like LTE, LTE-M, WiFi, and then it links them to the Internet (Public Cloud)
through Ethernet LAN or Fiber Optics WAN (HDLC/PPP).
The IoT gateway understands these transmission modes and data (MQTT, CoAP, AMQP, DDS, Websocket)
protocols and can translate them to other protocols that the data systems needs.