0% found this document useful (0 votes)
169 views41 pages

Iot Unit-1

The document provides an overview of unit 1 of an Internet of Things course. It covers the definition and characteristics of IoT, physical design of IoT, IoT protocols, communication models and APIs, embedded systems, and IoT levels and templates.

Uploaded by

Gowtam Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
169 views41 pages

Iot Unit-1

The document provides an overview of unit 1 of an Internet of Things course. It covers the definition and characteristics of IoT, physical design of IoT, IoT protocols, communication models and APIs, embedded systems, and IoT levels and templates.

Uploaded by

Gowtam Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

SVEC TIRUPATI

COURSE MATERIAL

SUBJECT INTERNET OF THINGS (20A05603T)

UNIT I

COURSE B.TECH

ELECTRONICS AND
DEPARTMENT COMMUNICATION ENGINEERING

SEMESTER 3-2

PREPARED BY K. R. SURENDRA
(Faculty Name/s) Assistant Professor

Version V-1

PREPARED / REVISED DATE 23-03-2023

1|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

TABLE OF CONTENTS – UNIT 3


S. NO CONTENTS PAGE NO.
1 COURSE OBJECTIVES 1
2 PREREQUISITES 1
3 SYLLABUS 1
4 COURSE OUTCOMES 1
5 CO - PO/PSO MAPPING 1
6 LESSON PLAN 2
7 ACTIVITY BASED LEARNING 2
8 LECTURE NOTES 2
1.1 Definition and Characteristics of the IoT 5
1.2 Physical Design of IoT 7
1.3 IoT Protocols 8
1.4 IoT Communication Models 11
1.5 IoT Communication APIs 13
1.6 Communication Protocols 18
1.7 Embedded Systems 22
1.8 IoT Levels and Templates 33
10 ASSIGNMENTS 35
11 PART A QUESTIONS & ANSWERS (2 MARKS QUESTIONS) 35
12 PART B QUESTIONS 37
13 SUPPORTIVE ONLINE CERTIFICATION COURSES 37
14 REAL TIME APPLICATIONS 37
15 CONTENTS BEYOND THE SYLLABUS 38
16 PRESCRIBED TEXT BOOKS & REFERENCE BOOKS 38
17 MINI PROJECT SUGGESTION 39

2|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

1. Course Objectives
The objectives of this course is to
1. Understand the basics of Internet of things and Protocols.
2. Discuss the requirement of IoT technology.
3. Introduce some of the application areas where IoT can be applied.
4. Understand the vision of IoT from a global perspective understand its
applications; determine its market perspective using gateway, devices and
data management.

2. Prerequisites
Students should have knowledge on
1. Internet of things
2. Arduino/Node MCU Controllers

3. Syllabus
UNIT I
Introduction to IoT:
Definition and Characteristics of the IoT, Physical Design of IoT, IoT Protocols, IoT
Communication Models, IoT Communication APIs, Communication Protocols,
Embedded Systems, IoT Levels and Templates.

4. Course outcomes
1. Choose the sensors and actuators for an IoT application
2. Select protocols for a specific IoT application
3. Utilize the cloud platform and APIs for IoT applications
4. Experiment with embedded boards for creating IoT prototypes
5. Design a solution for a given IoT application

3|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

5. Co-PO / PSO Mapping


Machine
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 P10 PO11 PO12 PSO1 PSO2
Tools
CO1

CO2

CO3

CO4

CO5

6. Lesson Plan
Lecture
Weeks Topics to be covered References
No.
1 Definition and Characteristics of the IoT T1, R1
2 Physical Design of IoT T1, R1
3 1 IoT Protocols T1, R1
4 IoT Communication Models T1, R1
5 IoT Communication APIs T1, R1
6 Communication Protocols T1, R1
7 Embedded Systems T1, R1
2
8 IoT Levels and Templates T1, R1
9 REVISION

7. Activity Based Learning

1. Explain IoT architecture


2. Interpret the design principles that govern connected devices
3. Summarize the roles of various organizations for IoT
4. Interpret the significance of Prototyping

4|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

8. Lecture Notes

1.1 DEFINATION AND CHARACTERISTICS OF IOT

IoT comprises things that have unique identities and are connected to internet. By
2020 there will be a total of 50 billion devices /things connected to internet. IoT is
not limited to just connecting things to the internet but also allow things to
communicate and exchange data.
Definition:
A dynamic global n/w infrastructure with self configuring capabilities based on
standard and interoperable communication protocols where physical and
virtual ―things‖ have identities, physical attributes and virtual personalities and use
intelligent interfaces, and are seamlessly integrated into information n/w, often
communicate data associated with users and their environments.
Characteristics:
1) Dynamic & Self Adapting: IoT devices and systems may have the capability to
dynamically adapt with the changing contexts and take actions based on their
operating conditions, user‗s context or sensed environment.
Eg: the surveillance system is adapting itself based on context and changing
conditions.
2) Self Configuring: allowing a large number of devices to work together to
provide certain functionality.
3) Inter Operable Communication Protocols: support a number of interoperable
communication protocols and can communicate with other devices and also with
infrastructure.
4) Unique Identity: Each IoT device has a unique identity and a unique identifier (IP
address).

5|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

5) Integrated into Information Network: that allow them to communicate and


exchange data with other devices and systems.

Applications of IoT:

1. Home
2. Cities
3. Environment
4. Energy
5. Retail
6. Logistics
7. Agriculture
8. Industry
9. Health & Life Style

6|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

1.2 PHYSICAL DESIGN OF IOT

Things in IoT:

7|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

The things in IoT refer to IoT devices which have unique identities and perform
remote sensing, actuating and monitoring capabilities. IoT devices can
exchange data with other connected devices applications. It collects data
from other devices and process data either locally or remotely.
An IoT device may consist of several interfaces for communication to other
devices both wired and wireless. These includes
(i) I/O interfaces for sensors,
(ii) Interfaces for internet connectivity
(iii) Memory and storage interfaces and
(iv) Audio /video interfaces.

1.3 IOT PROTOCOLS

a) Link Layer: Protocols determine how data is physically sent over the
networks physical layer or medium. Local network connect to which host
is attached. Hosts on the same link exchange data packets over the link
layer using link layer protocols. Link Layer determines how packets are
coded and signaled by the h/w device over the medium to which the
host is attached.

8|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

Protocols:

• 802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer.
Eg: 802.3 uses co-axial cable; 802.3i uses copper twisted pair connection; 802.3j
uses fiber optic connection; 802.3ae uses Ethernet over fiber.
• 802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN) communication
standards including extensive description of link layer. Eg: 802.11a operates in
5GHz band, 802.11b and 802.11g operates in 2.4GHz band, 802.11n operates in
2.4/5GHz band, 802.11ac operates in 5GHz band, 802.11ad operates in
60Ghzband.
• 802.16 - WiMax: IEEE802.16 is a collection of wireless broadband standards
including exclusive description of link layer. WiMax provide data rates from 1.5
Mb/s to 1Gb/s.
• 802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless
personal area network(LR-WPAN). Basis for high level communication protocols
such as ZigBee. Provides data rate from 40kb/s to250kb/s.
• 2G/3G/4G-Mobile Communication: Data rates from 9.6kb/s(2G) to up
to100Mb/s(4G).

B) Network/Internet Layer: Responsible for sending IP datagrams from source n/w to


destination n/w. performs the host addressing and packet routing. Datagrams contains
source and destination address.

Protocols:

• IPv4: Internet Protocol version4 is used to identify the devices on a n/w using a
hierarchical addressing scheme. 32 bit address. Allows total of 2*32 addresses.

9|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

• IPv6: Internet Protocol version6 uses 128 bit address scheme and allows 2**128
addresses.
• 6 LOW PAN: (I Pv6 over Low power Wireless Personal Area Network) operates in2.4
GHz frequency range and data transfer 250 kb/s.
C) Transport Layer: Provides end-to-end message transfer capability independent of the
underlying n/w. Set up on connection with ACK as in TCP and without ACK as in UDP.
Provides functions such as error control, segmentation, flow control and congestion
control.

Protocols:
• TCP: Transmission Control Protocol used by web browsers(along with HTTP and HTTPS),
email(along with SMTP, FTP). Connection oriented and stateless protocol. IP Protocol
deals with sending packets, TCP ensures reliable transmission of protocols in order.
Avoids n/w congestion and congestion collapse.
• UDP: User Datagram Protocol is connectionless protocol. Useful in time sensitive
applications, very small data units to exchange. Transaction oriented and stateless
protocol. Does not provide guaranteed delivery.

D) Application Layer: Defines how the applications interface with lower layer protocols to
send data over the n/w. Enables process-to-process communication using ports.
Protocols:

• HTTP: Hyper Text Transfer Protocol that forms foundation of WWW. Follow request-
response model Stateless protocol.
• CoAP: Constrained Application Protocol for machine-to-machine (M2M)
applications with constrained devices, constrained environment and constrained
n/w. Uses client- server architecture.
• Web Socket: allows full duplex communication over a single socket connection.

10|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

• MQTT: Message Queue Telemetry Transport is light weight messaging protocol based
on publish-subscribe model. Uses client server architecture. Well suited for
constrained environment.
• XMPP: Extensible Message and Presence Protocol for real time communication and
streaming XML data between network entities. Support client-server and server-server
communication.
• DDS: Data Distribution Service is data centric middleware standards for device-to-
device or machine-to-machine communication. Uses publish-subscribe model.
• AMQP: Advanced Message Queuing Protocol is open application layer protocol for
business messaging. Supports both point-to-point and publish-subscribe model.

1.4 IOT COMMUNICATION MODELS

1. Request-Response
2. Publish-Subscribe
3. Push-Pull
4. Exclusive Pair

1. Request-Response Model:

11|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

In which the client sends request to the server and the server replies to requests.
Is a stateless communication model and each request-response pair is
independent of others.

2) Publish-Subscribe Model

Involves publishers, brokers and consumers. Publishers are source of data. Publishers
send data to the topics which are managed by the broker. Publishers are not aware
of the consumers. Consumers subscribe to the topics which are managed by the
broker. When the broker receives data for a topic from the publisher, it sends the
data to all the subscribed consumers.

3) Push-Pull Model: In which data producers push data to queues and consumers pull
data from the queues. Producers do not need to aware of the consumers. Queues help in
decoupling the message between the producers and consumers.

12|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

4) Exclusive Pair:

It is bi-directional, fully duplex communication model that use


sapersistent connection between the client and server. Once
connection is set up it remains open until the client send a request to
close the connection. Is a state ful communication model and server is
aware of all the open connections.

1.5 IOT COMMUNICATION APIS:

A. REST based communication APIs (Request-Response Based Model)


B. Web Socket based Communication APIs (Exclusive Pair Based Model)

13|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

A.REST based communication APIs:


Representational State Transfer (REST) is a set of architectural principles by which we
can design web services and web APIs that focus on a systems resources and have
resource states are addressed and transferred. The REST architectural constraints: Fig.
shows communication between client server with REST APIs.

Client-Server: The principle behind client-server constraint is the separation of


concerns. Separation allows client and server to be independently developed and
updated.
Stateless: Each request from client to server must contain all the info. Necessary to
understand the request, and cannot take advantage of any stored context on the
server.
Cache-able: Cache constraint requires that the data within a response to a request
be implicitly or explicitly labeled as cache-able or non-cacheable. If a response is
cache-able, then a client cache is given the right to reuse that response data for
later, equivalent requests.

14|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

Layered System: constraints the behavior of components such that each component
cannot see beyond the immediate layer with which they are interacting.
User Interface: constraint requires that the method of communication between a
client and a server must be uniform.
Code on Demand: Servers can provide executable code or scripts for clients to
execute in their context. This constraint is the only one that is optional.
Request-Response model used by REST:

RESTful web service is a collection of resources which are represented by URIs.


RESTful web API has a base URI(e.g: http://example.com/api/tasks/). The clients
and requests to these URIs using the methods defined by the HTTP protocol(e.g:
GET, PUT, POST or DELETE). A RESTful web service can support various internet
media types.
B. Web Socket Based Communication APIs:
Web Socket APIs allow bi-directional, full duplex communication between clients
and servers. Web Socket APIs follow the exclusive pair communication model.

15|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

IoT Enabling Technologies

IoT is enabled by several technologies including Wireless Sensor Networks, Cloud


Computing, Big Data Analytics, Embedded Systems, Security Protocols and
architectures, Communication Protocols, Web Services, Mobile internet and
semantic search engines.
1) Wireless Sensor Network (WSN):
Comprises of distributed devices with sensors which are used to monitor the
environmental and physical conditions. Zig Bee is one of the most popular wireless
technologies used by WSNs.
WSNs used in IoT systems are described as follows:
• Weather Monitoring System: in which nodes collect temp, humidity and other
data, which is aggregated and analyzed.
• Indoor air quality monitoring systems: to collect data on the indoor air quality and
concentration of various gases.
• Soil Moisture Monitoring Systems: to monitor soil moisture at various locations.
• Surveillance Systems: use WSNs for collecting surveillance data(motion data
detection).

16|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

• Smart Grids : use WSNs for monitoring grids at various points.


• Structural Health Monitoring Systems: Use WSNs to monitor the health of structures
(building, bridges) by collecting vibrations from sensor nodes deployed at various
points in the structure.

2) Cloud Computing: Services are offered to users in different forms.


• Infrastructure-as-a-service (IaaS):provides users the ability to provision computing
and storage resources. These resources are provided to the users as a virtual
machine instances and virtual storage.
• Platform-as-a-Service(PaaS): provides users the ability to develop and deploy
application in cloud using the development tools, APIs, software libraries and
services provided by the cloud service provider.
• Software-as-a-Service(SaaS): provides the user a complete software application
or the user interface to the application itself.

3) Big Data Analytics: Some examples of big data generated by IoT are
• Sensor data generated by IoT systems.
• Machine sensor data collected from sensors established in industrial and energy
systems.
• Health and fitness data generated IoT devices.
• Data generated by IoT systems for location and tracking vehicles.
• Data generated by retail inventory monitoring systems.
4) Communication Protocols: form the back-bone of IoT systems and enable network
connectivity and coupling to applications.
• Allow devices to exchange data over network.
• Define the exchange formats, data encoding addressing schemes for device
and routing of packets from source to destination.

17|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

• It includes sequence control, flow control and retransmission of lost packets.


5) Embedded Systems:
It is a computer system that has computer hardware and software embedded to
perform specific tasks. Embedded System range from low cost miniaturized
devices such as digital watches to devices such as digital cameras, POS terminals,
vending machines, appliances etc.,
1.6 COMMUNICATION PROTOCOLS

Several Communication Protocols and Technology used in the internet of Things.


Some of the major IoT technology and protocol (IoT Communication Protocols) are
Bluetooth, Wifi, Radio Protocols, LTE-A, and WiFi-Direct.

a. Bluetooth

An important short-range IoT communications Protocols / Technology.


Bluetooth, which has become very important in computing and many consumer
product markets. It is expected to be key for wearable products in particular,
again connecting to the IoT albeit probably via a smart phone in many cases. The
new Bluetooth Low-Energy (BLE) – or Bluetooth Smart, as it is now branded – is a
significant protocol for IoT applications. Importantly, while it offers a similar range
to Bluetooth it has been designed to offer significantly reduced power
consumption.

b. Zigbee

ZigBee is similar to Bluetooth and is majorly used in industrial settings. It has some
significant advantages in complex systems offering low-power operation, high
security, robustness and high and is well positioned to take advantage of wireless
control and sensor networks in IoT applications. The latest version of ZigBee is the

18|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

recently launched 3.0, which is essentially the unification of the various ZigBee
wireless standards into a single standard.

c. Z-Wave

Z-Wave is a low-power RF communications IoT technology that primarily design


for home automation for products such as lamp controllers and sensors among
many other devices.

A Z-Wave uses a simpler protocol than some others, which can enable faster
and simpler development, but the only maker of chips is Sigma Designs compared
to multiple sources for other wireless technologies such as ZigBee and others.

d. Wi-Fi

Wi-Fi connectivity is one of the most popular IoT communication protocol, often
an obvious choice for many developers, especially given the availability of WiFi
within the home environment within LANs.There is a wide existing infrastructure as
well as offering fast data transfer and the ability to handle high quantities of data.
Currently, the most common WiFi standard used in homes and many businesses is
802.11n, which offers range of hundreds of megabit per second, which is fine for
file transfers but may be too power-consuming for many IoT applications.

e. Cellular

Any IoT application that requires operation over longer distances can take
advantage of GSM/3G/4G cellular communication capabilities. While cellular is
clearly capable of sending high quantities of data, especially for 4G, the cost and
also power consumption will be too high for many applications. But it can be ideal
for sensor-based low-bandwidth-data projects that will send very low amounts of
data over the Internet.

19|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

f. NFC

NFC (Near Field Communication) is an IoT technology. It enables simple and


safe communications between electronic devices, and specifically for smart
phones, allowing consumers to perform transactions in which one does not
have to be physically present. It helps the user to access digital content and
connect electronic devices. Essentially it extends the capability of contactless
card technology and enables devices to share information at a distance that is
less than 4cm.

g. LoRaWAN

LoRaWAN is one of popular IoT Technology, targets wide-area network (WAN)


applications. The LoRaWAN design to provide low-power WANs with features
specifically needed to support low-cost mobile secure communication in IoT,
smart city, and industrial applications. Specifically meets requirements for low-
power consumption and supports large networks with millions and millions of
devices, data rates range from 0.3 kbps to 50 kbps.

IoT Protocols

1. Constrained Application Protocol (CoAP)

CoAP is an internet utility protocol for constrained gadgets. It is designed to


enable simple, constrained devices to join IoT through constrained networks
having low bandwidth availability. This protocol is primarily used for machine-to-
machine (M2M) communication and is particularly designed for IoT systems that
are based on HTTP protocols.

2. Message Queue Telemetry Transport Protocol (MQTT)

20|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

MQTT (Message Queue Telemetry Transport) is a messaging protocol developed


with the aid of Andy Stanford-Clark of IBM and Arlen Nipper of Arcom in 1999 and
is designed for M2M communication. It’s normally used for faraway tracking in IoT.
Its primary challenge is to gather statistics from many gadgets and delivery of its
infrastructure. MQTT connects gadgets and networks with packages and
middleware. All the devices hook up with facts concentrator servers like IBM’s new
message sight appliance. MQTT protocols paintings on top of TCP to offer easy
and dependable streams of information. These IoT protocols include 3 foremost
additives: subscriber, publisher, and dealer. The writer generates the information
and transmits the facts to subscribers through the dealer. The dealer guarantees
safety by means of move-checking the authorization of publishers and subscribers.

3. Advanced Message Queuing Protocol (AMQP)

This was evolved by John O’Hara at JP Morgan Chase in London. AMQP is a


software layer protocol for message-oriented middleware environment. It
supports reliable verbal exchange through message transport warranty
primitives like at-most-once, at least once and exactly as soon as shipping. The
AMQP – IoT protocols consist of hard and fast components that route and save
messages within a broker carrier, with a set of policies for wiring the components
together. The AMQP protocol enables patron programs to talk to the dealer
and engage with the AMQP model.

This version has the following three additives, which might link into processing
chains in the server to create the favored capabilities.

Exchange: Receives messages from publisher primarily based programs and


routes them to ‘message queues’.

21|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

Message Queue: Stores messages until they may thoroughly process via the
eating client software.

Binding: States the connection between the message queue and the change.

4. Data Distribution Service (DDS)

It enables a scalable, real-time, reliable, excessive-overall performance and

interoperable statistics change via the submit-subscribe technique. DDS makes use

of multicasting to convey high-quality QoS to applications.DDS is deployed in

platforms ranging from low-footprint devices to the cloud and supports green

bandwidth usage in addition to the agile orchestration of system additives.

The DDS – IoT protocols have fundamental layers: facts centric submit-subscribe

(dcps) and statistics-local reconstruction layer (dlrl). Dcps plays the task of handing

over the facts to subscribers, and the dlrl layer presents an interface to dcps

functionalities, permitting the sharing of distributed data amongst IoT enabled

objects.

1.7 EMBEDDED SYSTEMS


A system is a set of interrelated and interdependent components placed in an
orderly manner that work together given an input to achieve some expected
output. An Automated system is the one that function without any manual
intervention. It works without a human operator physically located at the site where
the system is installed.
• It is an integrated system with a combination of hardware and software which
together form a component of a larger machine.

22|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

• An example of an embedded system is a microprocessor that controls an


automobile engine.
• An embedded system is designed to run on its own without human intervention,
and may be required to respond to events in real time.
o It is a dedicated computer system, designed to work for single or few specific
functions often within a larger system.
o Embedded Systems, therefore, are Built to function with little or no human
intervention.
 These systems are different from the general-purpose computers (desktops and
laptops) – the general-purpose computer can handle a wide range of processing
tasks unlike embedded systems.
Applications Areas of Embedded system:
• Television
• stereo
• remote control
• phone / mobile phone
• refrigerator
• microwave
• washing machine
• electric tooth brush
• oven / rice or bread cooker
• watch
• alarm clock
• electronic musical instruments
• electronic toys (stuffed animals, handheld toys, pin balls, etc.)
• medical home equipment (e.g. blood pressure, thermometer)

23|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

 Medical Systems - pace maker, patient monitoring systems, injection


systems, intensive care units,
 Office Equipment - printer, copier, fax, …
 Tools – multi-meter, oscilloscope, line tester, GPS, …
 Banking -ATMs, statement printers, …
 Transportation - (Planes/Trains/[Automobiles] and Boats) -radar, traffic
lights, signaling systems,
• Automobiles -engine management, trip computer, cruise control,
immobilizer, car alarm, air bag,
• ABS, ESP, …
• Building Systems -elevator, heater, air conditioning, lighting, key card
entries, locks, alarm systems, …
• Agriculture -feeding systems, milking systems, …
• Space - satellite systems,

Categories of Embedded Systems (Classification) :


Embedded Systems are classified based on the two factors i.e.
I. Performance and Functional Requirements
II. Performance of Micro-controllers
I. Based on Performance and Functional Requirements
It is divided into different types as follows :
1. Real-Time Embedded Systems :
A Real-Time Embedded System is strictly time specific which means these
embedded systems provides output in a particular/defined time interval.
These type of embedded systems provide quick response in critical situations
which gives most priority to time based task performance and generation of
output. That‘s why real time embedded systems are used in defense sector,

24|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

medical and health care sector, and some other industrial applications
where output in the right time is given more importance.Further this RealTime
Embedded System is divided into two types i.e.
 Soft Real Time Embedded Systems –
In these types of embedded systems time/deadline is not so strictly
followed. If deadline of the task is passed (means the system didn‘t give
result in the defined time) still result or output is accepted.
 Hard Real-Time Embedded Systems –
In these types of embedded systems time/deadline of task is strictly
followed. Task must be completed in between time frame (defined time
interval) otherwise result/output may not be accepted.
Examples:
 Traffic control system
 Military usage in defense sector
 Medical usage in health sector

2. Stand Alone Embedded Systems:


Stand Alone Embedded Systems are independent systems which can work by
themselves they don‘t depend on a host system. It takes input in digital or
analog form and provides the output.
Examples:
 MP3 players
 Microwave ovens
 Calculator

25|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

1.8 IOT LEVELS AND DEPLOYMENT TEMPLATES

1) IoT Level1: System has a single node that performs sensing and/or actuation,
stores data, performs analysis and host the application as shown in fig. Suitable for
modeling low cost and low complexity solutions where the data involved is not big
and analysis requirement are not computationally intensive. An e.g., of IoT Level1 is
Home automation.

2) IoT Level2: has a single node that performs sensing and/or actuating and local
analysis as shown in fig. Data is stored in cloud and application is usually cloud
based. Level2 IoT systems are suitable for solutions where data are involved is big,

26|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

however, the primary analysis requirement is not computationally intensive and can
be done locally itself. An e,g., of Level2 IoT system for Smart Irrigation.

3) IoT Level3: system has a single node. Data is stored and analyzed in the cloud
application is cloud based as shown in fig. Level3 IoT systems are suitable for
solutions where the data involved is big and analysis requirements are
computationally intensive. An example of IoT level3 system for tracking package
handling.

4) IoT Level4: System has multiple nodes that perform local analysis. Data is stored
in the cloud and application is cloud based as shown in fig. Level4 contains local
and cloud based observer nodes which can subscribe to and receive information
collected in the cloud from IoT devices. An example of a Level4 IoT system for
Noise Monitoring.

27|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

5) IoT Level5: System has multiple end nodes and one coordinator node as shown
in fig. The end nodes that perform sensing and/or actuation. Coordinator node
collects data from the end nodes and sends to the cloud. Data is stored and
analyzed in the cloud and application is cloud based. Level5 IoT systems are
suitable for solution based on wireless sensor network, in which data involved is big
and analysis requirements are computationally intensive. An example of Level5
system for Forest Fire Detection.

28|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

6) IoT Level6: System has multiple independent end nodes that perform sensing
and/or actuation and sensed data to the cloud. Data is stored in the cloud and
application is cloud based as shown in fig. The analytics component analyses the
data and stores the result in the cloud data base. The results are visualized with
cloud based application. The centralized controller is aware of the status of all the
end nodes and sends control commands to nodes. An example of a Level6 IoT
system for Weather Monitoring System.

DOMAIN SPECIFIC IoTs


1) Home Automation:
a) Smart Lighting: helps in saving energy by adapting the lighting to the ambient
conditions and switching on/off or diming the light when needed.
b) Smart Appliances: make the management easier and also provide status
information to the users remotely.

29|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

c) Intrusion Detection: use security cameras and sensors(PIR sensors and door
sensors) to detect intrusion and raise alerts. Alerts can be in the form of SMS or
email sent to the user.
d) Smoke/Gas Detectors: Smoke detectors are installed in homes and buildings
to detect smoke that is typically an early sign of fire. Alerts raised by smoke
detectors can be in the form of signals to a fire alarm system. Gas detectors
can detect the presence of harmful gases such as CO, LPGetc.,

2) Cities:
a) Smart Parking: make the search for parking space easier and convenient for
drivers. Smart parking are powered by IoT systems that detect the no. of
empty parking slots and send information over internet to smart application
backends.
b) Smart Lighting: for roads, parks and buildings can help in saving energy.
c) Smart Roads: Equipped with sensors can provide information on driving
condition, travel time estimating and alert in case of poor driving conditions,
traffic condition and accidents.
d) Structural Health Monitoring: uses a network of sensors to monitor the vibration
levels in the structures such as bridges and buildings.
e) Surveillance: The video feeds from surveillance cameras can be aggregated
in cloud based scalable storage solution.
f) Emergency Response: IoT systems for fire detection, gas and water leakage
detection can help in generating alerts and minimizing their effects on the
critical infrastructures.

30|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

3) Environment:
a) Weather Monitoring: Systems collect data from a no. of sensors attached
and send the data to cloud based applications and storage back ends.
The data collected in cloud can then be analyzed and visualized by cloud
based applications.
b) Air Pollution Monitoring: System can monitor emission of harmful gases(CO2,
CO, NO, NO2 etc.,) by factories and automobiles using gaseous and
meteorological sensors. The collected data can be analyzed to make
informed decisions on pollutions control approaches.
c) Noise Pollution Monitoring: Due to growing urban development, noise levels
in cities have increased and even become alarmingly high in some cities.
IoT based noise pollution monitoring systems use a no. of noise monitoring
systems that are deployed at different places in a city. The data on noise
levels from the station is collected on servers or in the cloud. The collected
data is then aggregated to generate noise maps.
d) Forest Fire Detection: Forest fire can cause damage to natural resources,
property and human life. Early detection of forest fire can help in minimizing
damage.
e) River Flood Detection: River floods can cause damage to natural and
human resources and human life. Early warnings of floods can be given by
monitoring the water level and flow rate. IoT based river flood monitoring
system uses a no. of sensor nodes that monitor the water level and flow rate
sensors.

4) Energy:
a) Smart Grids: is a data communication network integrated with the electrical
grids that collects and analyze data captured in near-real-time about power

31|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

transmission, distribution and consumption. Smart grid technology provides


predictive information and recommendations to utilities, their suppliers, and
their customers on how best to manage power. By using IoT based sensing
and measurement technologies, the health of equipment and integrity of the
grid can be evaluated.
b) Renewable Energy Systems: IoT based systems integrated with the
transformers at the point of interconnection measure the electrical variables
and how much power is fed into the grid. For wind energy systems, closed-
loop controls can be used to regulate the voltage at point of interconnection
which coordinate wind turbine outputs and provides power support.
c) Prognostics: In systems such as power grids, real-time information is collected
using specialized electrical sensors called Phasor MeasurmentUnits(PMUs) at
the substations. The information received from PMUs must be monitored in
real-time for estimating the state of the system and for predicting failures.
5) Retail:
a) Inventory Management: IoT systems enable remote monitoring of inventory
using data collected by RFIDreaders.

b) Smart Payments: Solutions such as contact-less payments powered by


technologies such as Near Field Communication(NFC) and Bluetooth.
c) Smart Vending Machines: Sensors in a smart vending machines monitors its
operations and send the data to cloud which can be used for predictive
maintenance.
6) Logistics:
a) Route generation & scheduling: IoT based system backed by cloud can
provide first response to the route generation queries and can be scaled
upto serve a large transportation network.

32|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

b) Fleet Tracking: Use GPS to track locations of vehicles inreal-time.


c) Shipment Monitoring: IoT based shipment monitoring systems use sensors such
as temp, humidity, to monitor the conditions and send data to cloud, where it
can be analyzed to detect foods poilage.
d) Remote Vehicle Diagnostics: Systems use on-board IoT devices for collecting
data on Vehicle operations(speed, RPMetc.,) and status of various vehicle
subsystems.
7) Agriculture:
a) Smart Irrigation: to determine moisture amount in soil.
b) Green House Control: to improve productivity.
8) Industry:
a) Machine diagnosis and prognosis
b) Indoor Air Quality Monitoring
9) Health and LifeStyle:
a) Health & Fitness Monitoring
b) Wearable Electronics

9. Practice Quiz

1. What is the format of IP address?


a) 34 bit
b) 64 bit
c) 16 bit
d) 32 bit

2. Version 6 of IP address has how many bits.


a) 64 bits
b) 128 bits
c) 32 bits
d) 256 bits

33|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

3. IANA stands for __________


a) Internet Assigned Numbers Authority
b) Internal Assigned Numbers Authority
c) Internet Associative Numbers Authoritative
d) Internal Associative Numbers Authority

4. Many desktops and operating systems include which protocol?


a) IPv6 protocol
b) IPv4 protocol
c) Both IPv6 and IPv4 protocol
d) IPv3 protocol

5. Hardware address is known as ______


a) MAC address
b) IP Address
C) Network Interface Card
d) Address Resolution Protocol

6. MAC stands for ________


a) Media Area Control
b) Memory Access Control
c) Memory Area Control
d) Media Access Control

7. What are the functions of the transport layer?


a) Multiplexing/ Demultiplexing
b) Connection less Services
c) Connection oriented service
d) Congestion control

8. TCP and UDP are called ________


a) Application protocols
b) Session protocols
c) Transport protocols

34|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

d) Network protocols

9. TCP is the standard protocol with std no?


a) 5
b) 4
c) 7
d) 3

10. How many protocols are used in the application layer?


a) 15
b) 10
c) More than 15
d) More than 10

10. Assignments

S.No Question BL CO
1 Explain about TCP and UDP Ports 2 3
2 Explain the application layer protocols 2 3
3 Explain different types IP Addresses 2 3
4 Explain briefly about prototyping online components 2 3
5 Explain about communications in IOT 3 3

11. Part A- Question & Answers

S.No Question& Answers BL CO


1 List layers of IoT protocol stack

Ans. Layers of IoT protocol stack are: 1 3


1) Sensing and information, 2) Network connectivity,
3) Information processing layer, 4) Application layer.
2 What are mostly used IoT protocols?
1 3
Ans. IoT protocols are:
 XMPP

35|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

 AMQP
 Very Simple Control Protocol (VSCP)
 Data Distribution Service (DDS)
 MQTT protocol
 Wi-Fi
 Simple Text Oriented Messaging Protocol(STOMP)
 Zigbee

3 What is MQTT?

Ans. The full form of MQTT is Message Queue Telemetry 1 3


Transport Protocol. It is a messaging protocol that is used
for tracking devices in IoT.
4 What is the difference between M2M and IoT?

Ans.
M2M IoT

Communication is done within Communication is done for


an embedded software grand-scale projects.
at the client site.
It uses isolated systems of It uses integrated devices,
devices having the same applications, and data
standards. across varying standards.
1 3
M2M offers limited scalability IoT is inherently more scalable.
options.
A cellular network or wired It uses an active Internet
network is used for device connection for device
connectivity. connectivity.

Machines can communicate Many machines can


with one machine at a communicate with each
time. other over the Internet.

5 Differentiate between Arduino and Raspberry pi


1 3
Ans. The difference between Arduino and Raspberry pi is:

36|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

Arduino Raspberry pi

Arduino is an open, Raspberry pi is a credit card


programmable USB size computer.
microcontroller.
It can execute one program at a Users can run more than
time. one program at a time.

12. Part B- Questions

S.No Question BL CO
1 Explain about TCP and UDP Ports 1 3
2 Explain the application layer protocols 2 3
3 Explain different types IP Addresses 2 3
4 Explain briefly about prototyping online components 3 3
5 Explain about communications in IOT 3 3

13. Supportive Online Certification Courses


1. Introduction to Internet of Things ByProf. Sudip Misraconducted by IIT Kharagpur
– 12 weeks

14. Real Time Applications

S.No Application CO
1 IOT BASED SMART CROP PROTECTION USING ARDUINO 3
Agriculture has always been the primary and the most important sectors
of Indian economy. Farmers are the back bone of one’s country, so it is
important for us to make sure he has the access to resources that are
essential. Conventional methods like scare crows are used even today in
an agricultural field to avoid birds and animals from feeding on growing
crops. There are many loopholes in such ideas and so improvising
agricultural security has become a major issue these days. Thus, this

37|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

paper focuses on proposing a system which detects the intruders,


monitors any suspicious activity and then reports to the owner of the field.
It acts as an adaptable system which provides a practicable system to
the farmers for ensuring complete safety of their farmlands from any
attacks or trespassing activities. This is an Node MCU based framework
utilizing microcontroller. This framework utilizes a LDR sensor to identify
intruders close to the field and additional to it a Flame sensor to identify
the smoke produced from the fire and a soil moisture sensor to detect
the volumetric water content in the soil. And finally water sprinkle will be
done based on soil conditions.

2 IoT Based Smart Agriculture Monitoring System 3


In every country agriculture is done from ages which are considered to
be science and also art of cultivating plants. In day today life,
technology is updating and it is also necessary to trend up agriculture
too. IoT plays a key role in smart agriculture. Internets of Things (IoT)
sensors are used to provide necessary information about agriculture
fields. The main advantage of IoT is to monitor the agriculture by using the
wireless sensor networks and collect the data from different sensors which
are deployed at various no des and send by wireless protocol. By using
IoT system the smart agriculture is powered by NodeMCU. It includes the
humidity sensor, temperature sensor, moisture sensor and DC motor. This
system starts to check the humidity and moisture level. The sensors are
used to sense the level of water and if the level is below the range then
the system automatically stars watering. According to the change in
temperature level the sensor does its job. IoT also shows the information of
humidity, moisture level by including date and time. The temperature
level based on type of crops cultivated can also be adjusted.

15. Contents Beyond the Syllabus


1. How to integrate cloud with Arduino microcontroller

2. Use of cloud services like ubidots.com

38|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

16. Prescribed Text Books & Reference Books

Text Book
1. Vijay Madisetti and ArshdeepBahga, “ Internet of Things ( A Hands-on-Approach)”,
1st Edition, VPT, 2014.
2. Handbook of unmanned aerial vehicles, K Valavanis; George J Vachtsevanos,
New York, Springer, Boston, Massachusetts : Credo Reference, 2014. 2016.

References:
1. Jan Holler, VlasiosTsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis Karnouskos,
David Boyle, “ From Machine-to-Machine to the Internet of Things: Introduction to a
New Age of Intelligence”, 1st Edition, Academic Press, 2014.
2. ArshdeepBahga, Vijay Madisetti - Internet of Things: A Hands-On Approach,
Universities. Press 2014.

17. Mini Project Suggestion


1. Solar Powered Autonomous Multipurpose Agricultural Robot Using Bluetooth

The main objective idea of this paper is to automate the procedure of planting,
Grass Cutting, pesticide spraying, Water Sprinkling, seeding and tunneling to
decrease the humanoid effort and increase the harvest. The farming of seeds is
robotically done by using DC motor. It is also possible to develop different kinds
of seeds with dissimilar distance. The projected idea contains sprayer, which
would be used for reducing the wastage of fertilizers that is done by spraying
appropriate amount of fertilizers required for the specific crop. The mode of
process can be changed with the help of directions existing n the robot
application. Arduino Controller between inputs and outputs are controlled by
using this method.

2. LI-FI BASED BLIND INDOOR NAVIGATION SYSTEM

The main aim of our project is transmitted the data through the VLC
communication. LI-FI is transmission of data using visible light by sending data
through LED light. This system has regulated the speed which human eyes have

39|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

not be perceived its blinking. This system can be demonstrated as bidirectional


VLC system, high speed communication similar to WI-FI. The main idea of our
project is to create internal navigation system, using Arduino software and
Arduino hardware. The transmission of data can acts as transceiver, where LED
and photodiode were in same line of sight. It is visually impaired using LI-FI
technology.

3. IoT Based Smart Helmet for Reducing Accidents


Most of the people lost their lives in road accidents, due to severe head injuries,
it is also important to those who survived faced injuries. An attempt to reduce
the probability of bike rider accidents, drunk and drive cases. These incidents
made us develop a smart helmet using internet of things which reduce the
accidents and risk of deaths, which has following features, the bike starts only if
the rider wears a helmet if the rider is over drunken then the ignition will be
automatically offered and if any accident occurs then through IoT it will send
the message to the registered Mail. This paper implements and develops the
Smart helmet for bike riders. Also, the smart helmet system analyzed in this
project is used in mining industry to alert the miners from hazardous events in the
mine. The research also helps to understand the smart helmet system evolved
over the period and currently by using emerging technology like Internet of
Things (IOT). The user can get the flexible riding, using this system. The proposed
system is user-friendly and ensures safety and surveillance at a low maintenance
cost.

4. IoT Based Pregnant Women Health Monitoring System Using Arduino


The swiftly mounting progress in data transmission technologies of contemporary
smart objects gave an eye opening to a new era of application development
for Internet of Things oriented network. In exacting, due to the effectiveness of
the data retrieval with mobile objects, such as wearable equipment, several
sophisticated types of healthcare monitoring system with body sensor networks
have been proposed. In this paper work, we have introduced a secure Internet
of Things -based pregnant women healthcare monitoring system, which
operates with the Wi-Fi module interface. To accomplish system competence
and robustness of communication, we utilize user entry authentication in a web

40|I O T - U N I T - I

BTECH_CSE-SEM 3-2
SVEC TIRUPATI

page to retrieve or view the data. Moreover, the implementation of the


proposed healthcare monitoring system with Arduino platform to augment the
achievability and practicability of the proposed mechanisms.

5. Arduino based Gestures to Speech Conversion System

This paper presents a system display that can therefore see sign language to
help normal people with imparting even more suitably with the gathering or talk
ruined people. This endeavor includes an Arduino controller interfaced with flex
sensors and Voice play back circuit. By using flex sensors we can convey
particular motions, for each motion we coded a voice track .so other
conventional individuals will easily fathom the thwarted individual. Despite it we
using a Gyro Sensor particular device. By using Gyro Sensor we can change
over the voice headings into Text. These Text headings will appear on LCD
which is useful for hard of hearing individuals as well.

41|I O T - U N I T - I

BTECH_CSE-SEM 3-2

You might also like