0% found this document useful (0 votes)
55 views13 pages

UNIT-1 Iot

The document discusses the architecture and layers of an IoT system including the sensing, network, and application layers. It then provides details on the roles of different layers including sensing, network, data processing, and application. It also discusses the differences between M2M and IoT and lists the advantages and limitations of IoT. Finally, it explains the roles of data management, cloud computing, and gateways in IoT systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views13 pages

UNIT-1 Iot

The document discusses the architecture and layers of an IoT system including the sensing, network, and application layers. It then provides details on the roles of different layers including sensing, network, data processing, and application. It also discusses the differences between M2M and IoT and lists the advantages and limitations of IoT. Finally, it explains the roles of data management, cloud computing, and gateways in IoT systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

UNIT -1

1. Draw and explain IOT Architecture?


IoT architecture consists of the devices, network structure, and cloud technology
that allows IoT devices to communicate with each other. A basic IoT architecture
consists of three layers:

 Perception (the sensors, gadgets, and other devices)


 Network (the connectivity between devices)
 Application (the layer the user interacts with)

These layers support IoT devices through data collection and processing. This
architecture goes beyond the OSI model to include the transformation of data
into usable information. These insights allow businesses to take immediate
action through the use of automation, machine learning, and artificial intelligence.

1. Sensing Layer –
Sensors, actuators, devices are present in this Sensing layer. These
Sensors or Actuators accepts data(physical/environmental parameters),
processes data and emits data over network.
2. Network Layer –
Internet/Network gateways, Data Acquisition System (DAS) are present in
this layer. DAS performs data aggregation and conversion function
(Collecting data and aggregating data then converting analog data of
sensors to digital data etc). Advanced gateways which mainly opens up
connection between Sensor networks and Internet also performs many basic
gateway functionalities like malware protection, and filtering also some times
decision making based on inputted data and data management services, etc.
3. Data processing Layer –
This is processing unit of IoT ecosystem. Here data is analyzed and pre-
processed before sending it to data center from where data is accessed by
software applications often termed as business applications where data is
monitored and managed and further actions are also prepared. So here
Edge IT or edge analytics comes into picture.
4. Application Layer –
This is last layer of 4 stages of IoT architecture. Data centers or cloud is
management stage of data where data is managed and is used by end-user
applications like agriculture, health care, aerospace, farming, defense, etc.

2. a) Write the difference between M2M & IOT?

Basis of IoT M2M

Abbreviation Internet of Things Machine to Machine

Some degree of
Devices have objects that are intelligence is observed in
Intelligence responsible for decision making this.

The connection is via Network


Connection type and using various The connection is a point
used communication types. to point

Internet protocols are used Traditional protocols and


Communication such as HTTP, FTP, communication technology
protocol used and Telnet. techniques are used

Data is shared between other


applications that are used to
improve the end-user Data is shared with only
Data Sharing experience. the communicating parties.

Internet connection is required Devices are not dependent


Internet for communication on the Internet.

Type of It supports cloud It supports point-to-point


Communication communication communication.
Basis of IoT M2M

Involves the usage of both Mostly hardware-based


Computer System Hardware and Software. technology

A large number of devices yet


Scope scope is large. Limited Scope for devices.

Business Type Business 2 Business(B2B) and


used Business 2 Consumer(B2C) Business 2 Business (B2B)

Supports Open API There is no support for


Open API support integrations. Open APIs

Smart wearables, Big Data and Sensors, Data and


Examples Cloud, etc. Information, etc.

2. b) write the advantages and limitations of IOT?


The Internet of Things (IoT) is a network of interconnected, embedded devices
that can capture and transmit data without the need for human interaction over
a wireless network.
IoT applications in everyday life include smart wearables, smart health
monitoring, traffic monitoring, IoT in agriculture with many sensors, smart
devices, robots in hospitals, smart grid and water supply, and so on.

Advantages:
 It can assist in the smarter control of homes and cities via mobile phones. It
enhances security and offers personal protection.
 By automating activities, it saves us a lot of time.
 Information is easily accessible, even if we are far away from our actual
location, and it is updated frequently in real time.
 Electric Devices are directly connected and communicate with a controller
computer, such as a cell phone, resulting in efficient electricity use. As a
result, there will be no unnecessary use of electricity equipment.
 Personal assistance can be provided by IoT apps, which can alert you to
your regular plans.
 It is useful for safety because it senses any potential danger and warns
users. For example, GM OnStar, is a integrated device that system which
identifies a car crash or accident on road. It immediately makes a call if an
accident or crash is found.
 It minimizes human effort because IoT devices connect and communicate
with one another and perform a variety of tasks without the need for human
intervention.
 Patient care can be performed more effectively in real time without the need
for a doctor’s visit. It gives them the ability to make choices as well as
provide evidence-based care.
 Asset tracking, traffic or transportation tracking, inventory control, delivery,
surveillance, individual order tracking, and customer management can all be
made more cost-effective with the right tracking system.

IOT Advantages

Disadvantages:
 Hackers may gain access to the system and steal personal information.
Since we add so many devices to the internet, there is a risk that our
information as it can be misused.
 They rely heavily on the internet and are unable to function effectively
without it.
 With the complexity of systems, there are many ways for them to fail.
 We lose control of our lives—our lives will be fully controlled and reliant on
technology.
 Overuse of the Internet and technology makes people unintelligent because
they rely on smart devices instead of doing physical work, causing them to
become lazy.
 Unskilled workers are at a high risk of losing their jobs, which could lead to
unemployment. Smart surveillance cameras, robots, smart ironing systems,
smart washing machines, and other facilities are replacing security guards,
maids, ironmen, and dry-cleaning services etc.
 It is very difficult to plan, build, manage, and enable a broad technology to
IoT framework.
 Deploying IoT devices is very costly and time-consuming.
3. Explain the role of data management in IOT?
4. Discuss the role of cloud in IOT?
The Cloud is a centralised system that helps to deliver and transport data and
various files across the Internet to data centres. The different data and
programmes can be accessed easily from the centralised Cloud system. Cloud
Computing is an economic solution, as it does not require on-site infrastructure
for storage, processing and analytics. The scalability of Cloud Computing means
that as your business grows, your technological and analytical capabilities can
too.
There are different types of Cloud services available, including Microsoft
Azure Cloud development, and more information on each of these varying types
of Cloud solutions can be found in our previous guide.
The IoT and Cloud Computing complement one another, often being branded
together when discussing technical services and working together to provide an
overall better IoT service. However, there are crucial differences between them,
making each of them an effective technical solution separately and together.

Cloud Computing in IoT works as part of a collaboration and is used to store IoT
data. The Cloud is a centralised server containing computer resources that can
be accessed whenever required. Cloud Computing is an easy travel method for
the large data packages generated by the IoT through the Internet. Big Data can
also help in this process. Combined, IoT and Cloud Computing allow systems to
be automated in a cost-effective way that supports real-time control and data
monitoring.
5. a) write a short notes of Gateway?

Gateway provides bridge between different communication technologies which


means we can say that a Gateway acts as a medium to open up connection
between cloud and controller(sensors / devices) in Internet of Things (IoT). By
the help of gateways it is possible to establish device to device or device to
cloud communication. A gateway can be a typical hardware device or software
program.
It enables a connection between sensor network and Internet along with
enabling IoT communication, it also performs many other tasks such as this IoT
gateway performs protocol translation, aggregating all data, local processing
and filtering of data before sending it to cloud, locally storing data and
autonomously controlling devices based on some inputted data, providing
additional device security.
The below figure shows how IoT Gateways establish communication between
sensors and cloud (Data System)

As IoT devices work with low power consumption(Battery power) in other words
they are energy constrained so if they will directly communicate to
cloud/internet it won’t be effective in terms of power. So they communicate with
Gateway first using short range wireless transmission modes/network like
ZigBee, Bluetooth, etc as they consume less power or they can also be
connected using long range like Cellular and WiFi etc.
Then Gateway links them to Internet/ cloud by converting data into a standard
protocol like MQTT. using ethernet, WiFi/cellular or satellite connection. And in
mostly Gateway is Mains powered unlike sensor nodes which are battery
powered. In practice there are multiple Gateway devices.
Key functionalities of IoT Gateway :
 Establishing communication bridge
 Provides additional security.
 Performs data aggregation.
 Pre processing and filtering of data.
 Provides local storage as a cache/ buffer.
 Data computing at edge level.
 Ability to manage entire device.
 Device diagnostics.
 Adding more functional capability.
 Verifying protocols.

Working of IoT Gateway :


1. Receives data from sensor network.
2. Performs Pre processing, filtering and cleaning on unfiltered data.
3. Transports into standard protocols for communication.
4. Sends data to cloud.
IoT Gateways are key element of IoT infrastructure as Gateways establish
connection for communication and also performs other task as described
above. So IoT Gateway is one of most essential thing when we start think about
an IoT ecosystem

5 .b) Discuss the different security aspects in IOT?

IoT security is critical largely because of the expanded attack surface of


threats that have already been plaguing networks. Adding to these threats
are insecure practices among users and organizations who may not have
the resources or the knowledge to best protect their IoT ecosystems.

These security issues include the following:

 Vulnerabilities. Vulnerabilities are a large problem that constantly


plague users and organizations. One of the main reasons IoT devices
are vulnerable is because they lack the computational capacity for
built-in security. Another reason that vulnerabilities can be so
pervasive is the limited budget for developing and testing secure
firmware, which is influenced by the price point of devices and their
very short development cycle. Vulnerable standard components also
affect millions of devices, as demonstrated
by Ripple20 and URGENT/11. Aside from the devices themselves,
vulnerabilities in web applications and related software for IoT
devices can lead to compromised systems. Malware operators are on
the lookout for such opportunities and are knowledgeable even
about older vulnerabilities.
 Malware. Despite the limited computing capacity of most IoT
devices, they can still be infected by malware. This is something
cybercriminals have used to great effect in the past few years. IoT
botnet malware are among the most frequently seen variants, as
they are both versatile and profitable for cybercriminals. The most
notable attack was in 2016, when Mirai took down major websites
and services using an army of ordinary IoT devices. Other malware
families include cryptocurrency mining malware and ransomware.
 Escalated cyberattacks. Infected devices are often used for
distributed-denial-of-service (DDoS) attacks. Hijacked devices can also
be used as an attack base to infect more machines and mask
malicious activity, or as an entry point for lateral movement in a
corporate network. While organizations may seem like the more
profitable targets, smart homes also see a surprising number of
unforeseen cyberattacks.
 Information theft and unknown exposure. As with anything
dealing with the internet, connected devices increase the chances of
exposure online. Important technical and even personal information
can be unknowingly stored and targeted in these devices.
 Device mismanagement and misconfiguration. Security
oversights, poor password hygiene, and overall device
mismanagement can assist in the success of these threats. Users may
also simply lack the knowledge and the capability to implement
proper security measures, wherein service providers and
manufacturers may need to help their customers achieve better
protection.

Emerging issues

The lack of industry foresight gave little time to develop strategies and
defenses against familiar threats in growing IoT ecosystems. Anticipating
emerging issues is one of the reasons research on IoT security must be
done continuously. Here are some of the emerging issues that need to be
monitored:

 Complex environments. In 2020, most U.S. households had access


to an average of 10 connected devices. This research paper
defined complex IoT environments as an interconnected web of at
least 10 IoT devices. Such an environment is nearly impossible for
people to oversee and control because of its elaborate web of
interconnected functions. An overlooked misconfiguration in such a
scenario can have dire consequences and even put the physical
household security at risk.
 Prevalence of remote work arrangements. The Covid-19 pandemic
has usurped many expectations for the year 2020. It brought about
large-scale work-from-home (WFH) arrangements for organizations
around the globe and pushed heavier reliance on home networks.
IoT devices also proved useful for many users’ WHF setups. These
changes have highlighted the need to reexamine IoT security
practices.
 5G connectivity. The transition to 5G comes with much anticipation
and expectations. It is a development that will also enable other
technologies to evolve. At present, much of the research on 5G
remains largely focused on how it will affect enterprises and how
they can implement it securely.

6. Explain about integration with enterprise in system?

Integration with Enterprise system

The industries are moving from individual systems to the integrated system. A service-oriented
architecture or SOA has been proposed to integrate IoT into Enterprise system and services.
The layers in this architecture are Service management, Application interface, Security, Device
management, platform, and devices. This theory also proves that IoT devices can handle all
integrated enterprise services. A domain made of IoT and legacy system highlights that SOA is a
key to integrate IoT in large-scale systems in enterprises. Classification of IoT services based on
the physical interaction of the devices supposed that SOA may offer integrated services made
of business process tools like enterprise resource planning system. The devices are proposed
to use as resources for documentation and automation purposes. A business process
architecture, which uses web service technologies, can implement and enhance the IoT system
to present the system to trace a supply chain. (Lu & Cecil, 2016)

Benefits of IoT Integration

To gain the advantages, efficiency, productive workforce, IoT can lead the enterprises to the
following benefits-

 Data Security and data access to develop security mechanism.


 Data security for client-server interaction and while data is on the client's storage.
 Data management and application management.
 Companies can gather information about customer's habits and choices to offer a customized
experience.
 Identifying issues, faster product development, and personalized marketing benefits.
 Processes, like supply chain optimization and management, can be optimized more efficiently.
 IoT can be used to get information about the demand for products. (Tang et al. 2017)
SAVE DISTINCTION MARKS IN EACH ENTERPRISE SYSTEM INTEGRATION WITH IOT
ASSIGNMENT WHICH IS WRITTEN BY OUR PROFESSIONAL WRITER!

Limitations of IoT in Enterprise integration:

However, this next-generation technology has many benefits in business and manufacturing
units, it comes with some major limitations, such as-

 Technical limitations, which include addressing and sensing issues, network issues, routing
protocol, and traffic control issues and data buffering problems.
 IoT depends upon software and thus software and algorithm issues are a major constraint.
 Security and privacy issues while accessing, processing or transferring data.
 Communication issues are a big drawback in IoT integration.
 Pubic electricity is the primary source of energy in IoT and the power managenment
technologies are ran by specific requirements. Thus it needs a suitable energy source.
 It needs to find better compatible ways for IoT systems to work with legacy systems.
 Device management is still a big problem for IoT implantation.
 The waste management for e-waste has been one of the major problems regarding the new
technologies and IoT is not an exception.
 Social issues like user acceptance, educational trainings and privacy issues can be identified as
the big issues for IoT to integrate with people.
 Governance is still absent in different regions regarding IoT.

7. Discuss the role of distributed business process in IOT?


The IoT is changing the way we live our lives and that is something that will only grow and
grow, and it’s certainly something that all businesses need to adapt to. There are some obvious
benefits and some aspects that will require adjustments to processes. Here are some of the main
changes and challenges facing companies as the IoT becomes more ever-present:

 Data: As consumers use more and more devices that record data, there are opportunities for
businesses to use this data for marketing and product development purposes, but only if the
processes are in place to measure, analyze and report on this data. Business process management
can automate this process and ensure that it remains effective and agile enough to keep pace with
technological changes.
 New ways of buying: The IoT gives consumers the chance to buy directly from their devices,
whether it’s an Amazon Echo or a smartphone or even that legendary refrigerator ordering fresh
milk. Technology is making everything faster and more easily, so they will also be expecting
faster deliveries and better service. BPM needs to be used to manage the processes that will
allow this kind of development to meet the demand. IoT software and tools can help with this
though, with inventories able to be tracked automatically.
 Innovation: Whether it’s new product development or upgrading existing products or services,
the IoT offers the opportunities for businesses to deliver exciting new benefits for their
customers.
 Customer service: Another area where processes need to be managed carefully because of the
changes that the IoT have brought in is customer service. Products that utilize the internet should
really be able to be fixed over the internet when something goes wrong. Consumers expect it and
businesses should be able to deliver it, so BPM is needed to ensure that customer service
processes are effective, efficient and resilient enough to cope.
 Centralized BPM: Business process management isn’t simply something that is needed to make
the IoT run more smoothly, the benefits can flow back in the opposite direction too. Integrating
BPM software into devices means that the data can be analyzed from a central location and any
changes can be fed back out again.

8 . Illustrate the building blocks of IOT device?


The Internet of Things denotes the connection of devices,
machines, and sensors to the Internet. An IoT system
comprises four basic building blocks: sensors, processors,
gateways, and applications. This article will thoroughly
discuss what each component of the IoT architecture
represents.

The architecture of IoT components:


1. Sensors convert a non-electrical input to an electrical signal. Sensors
are classified into two types: active and passive sensors. Whereas
active sensors use and emit their own energy to collect real-time data
(ex.: GPS, X-ray, radars), passive sensors use energy from external
sources (ex: cameras). Additionally, sensors differentiate themselves
by position, occupancy, and motion, velocity and acceleration, force,
pressure, flow, humidity, light, radiation, temperature, etc.
2. Processors are the brain, the main part of the IoT system. They
process the raw data captured by the sensors and extract valuable
information. Examples of processors are microcontrollers and
microcomputers.

3. Gateways are the combination of hardware and software used to


connect one network to another. Gateways are responsible for bridging
sensor nodes with the external Internet or World Wide Web. The figure
below depicts how using gateways works.
4. Applications provide a user interface and effective utilization of the data
collected.

You might also like