Basics of Iot Networking Common Iot Terms: Iot Architecture and Protocols Unit Ii
Basics of Iot Networking Common Iot Terms: Iot Architecture and Protocols Unit Ii
Basics of Iot Networking Common Iot Terms: Iot Architecture and Protocols Unit Ii
Unit II
Basics of IoT Networking, IoT Components, Functional components of IoT, IoT service oriented
architecture, IoT challenges, 6LowPAN, IEEE 802.15.4, RFID Features, RFID working principle and
applications, NFC (Near Field communication), Bluetooth, Wireless Sensor Networks and its
Applications.
------------------------------------------------
Basics of IoT Networking
IOT Networking
The existing TCP/IP networking model uses a 4 layer model with protocols defined at each level.
See understanding the TCP/IP 4 layer model.
The diagram below shows a side by side comparison of the Internet protocols currently in use and those
that are likely to be used for the IOT.
http://www.steves-internet-guide.com/internet-of-things/
Protocols
MQTT– (Message Queuing Telemetry Transport) Uses TCP/IP. Publish subscribe model
(P/S)requires a message broker (switch).
AMQP -( Advanced Message Queuing Protocol) Uses TCP/IP. Publish subscribe model and
Point to Point .
COAP-(Constrained Application Protocol) - Uses UDP designed specifically for IOT uses
request response model like HTTP. RFC 7252
DDS– (Data Distribution Service) –
At this layer you will have a requirement to connect devices that are nearby e.g. on Local networks, and
that are more distant e.g. Metropolitan and wide area networks.
Current computer networks use Ethernet and Wi-Fi at this level for home/office networking (LANs)
and 3G/4G for Mobile connections (WANs).
However many IOT devices, like sensors, will be low powered (battery only).
Ethernet isn’t suitable for these applications but low powered Wi-fi and low powered Bluetooth are.
Although existing wireless technologies (Wi-Fi, Bluetooth,3G/4G) will be used to connect these devices,
other newer wireless technology, especially designed for IOT applications, will also need to be
considered, and will likely grow in importance.
BLE– Blue tooth Low Energy Bluetooth Low Energy (Bluetooth LE, colloquially BLE, formerly
marketed as Bluetooth Smart) is a wireless personal area network technology designed and marketed by
the Bluetooth Special Interest Group (Bluetooth SIG) aimed at novel applications in the healthcare,
fitness, beacons, security, and home entertainment.
Recent developments in Bluetooth are set to position the technology as ‘the communication protocol of
choice’ for IoT.
LoRaWAN – The technology covers the physical layer, while other technologies and protocols
such as LoRaWAN (Long Range Wide Area Network) cover the upper layers. Physical Range 10Km.
SigFox- Sigfox is a Low Power Wide Area Network (LPWAN) technology specially designed for
the Internet of Things. Devices connected using SigFox consume little power and operate over large
distances compared to WiFi and Bluetooth connection protocols which consume more power and work
best in short range.
LTE-M- LTE-M is the simplified industry term for the LTE-MTC low power wide area (LPWA)
technology standard published by 3GPP in the Release 13 specification. It specifically refers
to LTE CatM1, suitable for the IoT.
At the transport level TCP has dominated the Internet and the web. It is used by HTTP and many other
popular Internet protocols (SMTP, POP3, IMAP4 etc).
MQTT which I expect to be one of the dominant messaging application protocols currently using TCP and
is already deployed.
However because of the requirement for low protocol overhead I would expect UDP to feature much more
in the future IOTs.
MQTT-SN –which runs over UDP is likely to see more widespread use in the future.
This is because it is very lightweight and fast when compared to http and is a one to may protocol as
opposed to a 1 to 1 protocol (http).
There are many current web applications that would have used MQTT as opposed to http if had been
available when they were being developed.
A good example is when information needs to be sent to many receiving clients like in train/bus/aircraft
arrivals and departures.
In this scenario a 1 to 1 protocol like http has a large overhead and places lots of load on the web servers.
With MQTT the clients only connect to a broker and it is easy to add additional brokers to balance the
load.
In a typical IoT ecosystem, sensors are connected with computation layers and intelligent layers
via network or connectivity layers. IoT endpoints need to be always connected with various other
components seamlessly over the connectivity layer. Based on the scale of the implementations IoT
components can be connected overs LANs, MANs or WANs. It can also be connected through
telephony networks like LTE (Long Term Evolution or popularly known as 4G Network) or light-based
technologies like Li-Fi (where light is used as a mode of communication to maintain interconnections).
For local use cases, Bluetooth and Wi-Fi can also be used.
An IoT network consists of various network components like routers, gateways, switches, various
network protocols, etc. Based on the use case and domain proper network infrastructure is needed to
be chosen.
IoT Components
What are the major components of Internet of Things
Devices and sensors are the components of the device connectivity layer. These smart sensors are
continuously collecting data from the environment and transmit the information to the next layer.
Latest techniques in the semiconductor technology is capable of producing micro smart sensors for
various applications.
Most of the modern smart devices and sensors can be connected to low power wireless networks like Wi-
Fi, ZigBee, Bluetooth, Z-wave, LoRAWAN etc… Each of these wireless technologies has its own pros and
cons in terms of power, data transfer rate and overall efficiency.
2.Gateway
IoT Gateway manages the bidirectional data traffic between different networks and protocols.
Another function of gateway is to translate different network protocols and make sure interoperability of
the connected devices and sensors.
Gateways can be configured to perform pre-processing of the collected data from thousands of
sensors locally before transmitting it to the next stage. In some scenarios, it would be necessary due to
compatibility of TCP/IP protocol.
IOT gateway offers certain level of security for the network and transmitted data with higher order
encryption techniques. It acts as a middle layer between devices and cloud to protect the system from
malicious attacks and unauthorized access.
3. Cloud
Internet of things creates massive data from devices, applications and users which has to be
managed in an efficient way. IoT cloud offers tools to collect, process, manage and store huge amount of
data in real time. Industries and services can easily access these data remotely and make critical
decisions when necessary.
Basically, IoT cloud is a sophisticated high performance network of servers optimized to perform
high speed data processing of billions of devices, traffic management and deliver accurate analytics.
Distributed database management systems are one of the most important components of IoT cloud.
Cloud system integrates billions of devices, sensors, gateways, protocols, data storage and
provides predictive analytics. Companies use these analytics data for improvement of products and
services, preventive measures for certain steps and build their new business model accurately.
4. Analytics
Analytics is the process of converting analog data from billions of smart devices and sensors into
useful insights which can be interpreted and used for detailed analysis. Smart analytics solutions are
inevitable for IoT system for management and improvement of the entire system.
One of the major advantages of an efficient IoT system is real time smart analytics which helps
engineers to find out irregularities in the collected data and act fast to prevent an undesired scenario.
Service providers can prepare for further steps if the information is collected accurately at the right time.
Big enterprises use the massive data collected from IoT devices and utilize the insights for their
future business opportunities. Careful analysis will help organizations to predict trends in the market and
plan ahead for a successful implementation.
Information is very significant in any business model and predictive analysis ensures success in
concerned area of business line.
5. User interface
User interfaces are the visible, tangible part of the IoT system which can be accessible by users.
Designers will have to make sure a well designed user interface for minimum effort for users and
encourage more interactions.
Modern technology offers much interactive design to ease complex tasks into simple touch
panels controls. Multicolor touch panels have replaced hard switches in our household appliances and the
trend is increasing for almost every smart home devices.
User interface design has higher significance in today’s competitive market, it often determines
the user whether to choose a particular device or appliance. Users will be interested to buy new devices
or smart gadgets if it is very user friendly and compatible with common wireless standards.
IoT service oriented architecture
A service-oriented architecture is an approach used to create an architecture based upon the use
of services. Services (such as RESTful Web services) carry out some small function, such as producing
data, validating a customer, or providing simple analytical services.
A service-oriented architecture is an architectural pattern in computer software design in which
application components provide services to other components via a communications protocol, typically
over a network. The principles of service-orientation are independent of any vendor, product or
technology.
IoT challenges
The Internet Of Things has been facing many areas like Information Technology, Healthcare, Data
Analytics and Agriculture. The main focus is on protecting privacy as it is the primary reason for other
challenges including government participation. Integrated effort from the government, civil society and
private sectors would play a vital role in protecting the following values given below in to prevent IoT
from getting hampered:
Scalability:
Billions of internet-enabled devices get connected in a huge network, large volumes of data are needed
to be processed. The system that stores, analyses the data from these IoT devices needs to be
scalable. In present, the era of IoT evolution everyday objects are connected with each other via
Internet. The raw data obtained from these devices need big data analytics and cloud storage for
interpretation of useful data.
Interoperability:
Technological standards in most areas are still fragmented. These technologies need to be converged.
Which would help us in establishing a common framework and the standard for the IoT devices. As the
standardization process is still lacking, interoperability of IoT with legacy devices should be considered
critical. This lack of interoperability is preventing us to move towards the vision of truly connected
everyday interoperable smart objects.
Lack of government support:
Government and Regulatory bodies like FDA should come up and bring up regulations by setting up a
standard committee for safety and security of devices and people.
Safety Of Patients:
Most of IoT devices are left unattended, as they are connected with real-world objects. If used on
patients as wearable devices, any technical error in security can be life-threatening for patient.
Security And Personal Privacy:
There has been no research in security vulnerabilities and its improvements. It should ensure
Confidentiality, Integrity and Availability of personal data of patient.
Design Based Challenge:
With the development in technology design challenges are increasing at a faster rate. There have been
issues regarding design like limited computation power, limited energy and limited memory which need
to be sorted out.
What is 6LoWPAN?
6LoWPAN is a somewhat contorted acronym that combines the latest version of the Internet
Protocol (IPv6) and Low-power Wireless Personal Area Networks (LoWPAN). 6LoWPAN, therefore,
allows for the smallest devices with limited processing ability to transmit information wirelessly using an
internet protocol. It’s the newest competitor to ZigBee.
The concept was created because engineers felt like the smallest devices were being left
out from the Internet of Things. 6LoWPAN can communicate with 802.15.4 devices as well as other
types of devices on an IP network link like WiFi. A bridge device can connect the two.
The 6LoWPAN system is used for a variety of applications including wireless sensor networks.
This form of wireless sensor network sends data as packets and using IPv6 - providing the basis for the
name - IPv6 over Low power Wireless Personal Area Networks.
6LoWPAN provides a means of carrying packet data in the form of IPv6 over IEEE 802.15.4
and other networks. It provides end-to-end IPv6 and as such it is able to provide direct connectivity to a
huge variety of networks including direct connectivity to the Internet.
In this way, 6LoWPAN adopts a different approach to the other low power wireless sensor network
solutions.
IEEE 802.15.4
IEEE 802.15.4 is a standard that was developed to provide a framework and the lower layers in
the OSI model for low cost, low power wireless connectivity networks.
IEEE 802.15.4 provides provides the MAC and PHY layers, leaving the upper layers to be
developed for specific higher later standards like Thread, Zigbee, 6LoWPAN and many others.
As a result, IEEE 802.15.4 does not take the limelight in the way that other standards might, but
nevertheless it forms the basis for a large number of standards and accordingly it ifs far more widely
deployed than may be apparent at first sight.
Low power is one of the key elements of 802.15.4 as it is used in many areas where remote
sensors need to operate on battery power, possibly for years without attention.
RFID Features,
2. Automatic recognition
Tags are attached to items and transmit the stored ID to readers. The readers may be positioned at fixed
points such as ‘goods out’ or ‘goods in’ or at specific locations within a chemical processing plant, As
each item passes by, the reader will automatically scan the ID. Alternatively the readers can be built into
tables or mobile phones, enabling the tags to be scanned wherever the entity happens to be.
To achieve the above alternatives, the solution or the technology used is RFID.
Defining RFID:
RFID or Radio Frequency Identification System is a technology based identification system which helps
identifying objects just through the tags attached to them, without requiring any light of sight between the
tags and the tag reader. All that is needed is radio communication between the tag and the reader.
A Basic RFID System:
3 Main Components of a RFID System
A RFID tag: It consists of a silicon microchip attached to a small antenna and mounted on a
substrate and encapsulated in different materials like plastic or glass veil and with an adhesive on the
back side to be attached to objects.
RFID Tag
A reader: It consists of a scanner with antennas to transmit and receive signals and is
responsible for communication with the tag and receives the information from the tag.
An RFID Reader
A Processor or a Controller: It can be a host computer with a Microprocessor or a
microcontroller which receives the reader input and process the data.
NFC Technology
The RF field generated by an NFC Forum Device to communicate with an NFC Forum Tag has three
tasks:
1. To transfer power from the NFC Forum Device to the NFC Forum Tag. Therefore the NFC Forum
Tags don’t need batteries or other power supplies for operation as the necessary power for
communication is provided by the RF field. This technology is also ideal for small IoT devices
acting as an NFC Forum Tag as no additional power is needed for the NFC communication.
For Wireless Charging the primary goal of NFC Technology is to transfer power thus extending
communication. In this case NFC communication is used to regulate the power transfer. When
Wireless Charging mode is active the field strength of the RF field can be increased allowing a
power transfer of up to 1 W.
2. The NFC device is sending information to an NFC Forum Tag by modulating the RF field signal
(signal modulation).
3. The NFC device is receiving information from an NFC Forum Tag by sensing the modulation of
the load generated by the NFC Forum tag (load modulation).
NFC technology is designed for an operation distance of a few centimeters, this makes it more difficult for
attackers to record the communication between an NFC Forum Device and an NFC Forum Tag compared
to other wireless technologies which have a working distance of several meters. In addition, the user of
the NFC Forum Device determines by the touch gesture which entity the NFC communication should take
place, which makes it more difficult for the attacker to get connected. As a result, the security level of the
NFC communication is by default higher compared to other wireless communication protocols.
Additionally, the NFC Forum has added Peer to Peer communication which is a mechanism to cipher all
exchanged data to avoid that a spy can interpret recorded communication.
BLE– Bluetooth Low Energy Recent developments in Bluetooth are set to position the technology as ‘the
communication protocol of choice’ for IoT. According to Bluetooth Specialist Interest Group, by 2020,
more than one-third of all installed IoT devices will be Bluetooth-enabled. In fact, Bluetooth with its ability
to connect disparate devices and industries through short-range technology can transform the way
devices interact with each other.
Wireless sensor network (WSN) refers to a group of spatially dispersed and dedicated sensors for
monitoring and recording the physical conditions of the environment and organizing the collected data at
a central location. WSNs measure environmental conditions like temperature, sound, pollution levels,
humidity, wind, and so on.
These are similar to wireless ad hoc networks in the sense that they rely on wireless connectivity
and spontaneous formation of networks so that sensor data can be transported wirelessly. WSNs are
spatially distributed autonomous sensors to monitor physical or environmental conditions, such
as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main
location. The more modern networks are bi-directional, both collecting data from distributed
sensors[2] and enabling control of sensor activity.[3] The development of wireless sensor networks was
motivated by military applications such as battlefield surveillance;[4] today such networks are used in
many industrial and consumer applications, such as industrial process monitoring and control, machine
health monitoring, and so on.in other word
A Wireless Sensor Network is one kind of wireless network that includes a large number of
circulating, self-directed, minute, low powered devices named sensor nodes called motes. These
networks certainly cover a huge number of spatially distributed, little, battery-operated, embedded devices
that are networked to caringly collect, process, and transfer data to the operators, and it has controlled
the capabilities of computing & processing. Nodes are tiny computers, which work jointly to form
networks.
The sensor node is a multi-functional, energy-efficient wireless device. The applications of motes
in industrial are widespread. A collection of sensor nodes collects the data from the surroundings to
achieve specific application objectives. The communication between motes can be done with each other
using transceivers. In a wireless sensor network, the number of motes can be in the order of hundreds/
even thousands. In contrast with sensor n/ws, Ad Hoc networks will have fewer nodes without any
structure.
Wireless Sensor Network Applications
Wireless sensor networks may comprise numerous different types of sensors like low sampling rate,
seismic, magnetic, thermal, visual, infrared, radar, and acoustic, which are clever to monitor a wide range
of ambient situations. Sensor nodes are used for constant sensing, event ID, event detection & local
control of actuators. The applications of wireless sensor networks mainly include health, military,
environmental, home, & other commercial areas.
These networks are used in environmental trackings, such as forest detection, animal tracking, flood
detection, forecasting and weather prediction, and also in commercial applications like seismic activity
prediction and monitoring.
Military applications, such as tracking and environment monitoring surveillance applications use these
networks. The sensor nodes from sensor networks are dropped to the field of interest and are remotely
controlled by a user. Enemy tracking, security detections are also performed by using these networks.
Health applications, such as Tracking and monitoring of patients and doctors use these networks.
The most frequently used wireless sensor networks applications in the field of Transport systems
such as monitoring of traffic, dynamic routing management, and monitoring of parking lots, etc., use
these networks.
Rapid emergency response, industrial process monitoring, automated building climate control,
ecosystem and habitat monitoring, civil structural health monitoring, etc., use these networks.