Iot Unit-1
Iot Unit-1
COURSE MATERIAL
UNIT I
COURSE B.TECH
ELECTRONICS AND
DEPARTMENT COMMUNICATION ENGINEERING
SEMESTER 3-2
PREPARED BY K. R. SURENDRA
(Faculty Name/s) Assistant Professor
Version V-1
1|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
2|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
1. Course Objectives
The objectives of this course is to
1. Understand the basics of Internet of things and Protocols.
2. Discuss the requirement of IoT technology.
3. Introduce some of the application areas where IoT can be applied.
4. Understand the vision of IoT from a global perspective understand its
applications; determine its market perspective using gateway, devices and
data management.
2. Prerequisites
Students should have knowledge on
1. Internet of things
2. Arduino/Node MCU Controllers
3. Syllabus
UNIT I
Introduction to IoT:
Definition and Characteristics of the IoT, Physical Design of IoT, IoT Protocols, IoT
Communication Models, IoT Communication APIs, Communication Protocols,
Embedded Systems, IoT Levels and Templates.
4. Course outcomes
1. Choose the sensors and actuators for an IoT application
2. Select protocols for a specific IoT application
3. Utilize the cloud platform and APIs for IoT applications
4. Experiment with embedded boards for creating IoT prototypes
5. Design a solution for a given IoT application
3|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
CO2
CO3
CO4
CO5
6. Lesson Plan
Lecture
Weeks Topics to be covered References
No.
1 Definition and Characteristics of the IoT T1, R1
2 Physical Design of IoT T1, R1
3 1 IoT Protocols T1, R1
4 IoT Communication Models T1, R1
5 IoT Communication APIs T1, R1
6 Communication Protocols T1, R1
7 Embedded Systems T1, R1
2
8 IoT Levels and Templates T1, R1
9 REVISION
4|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
8. Lecture Notes
IoT comprises things that have unique identities and are connected to internet. By
2020 there will be a total of 50 billion devices /things connected to internet. IoT is
not limited to just connecting things to the internet but also allow things to
communicate and exchange data.
Definition:
A dynamic global n/w infrastructure with self configuring capabilities based on
standard and interoperable communication protocols where physical and
virtual ―things‖ have identities, physical attributes and virtual personalities and use
intelligent interfaces, and are seamlessly integrated into information n/w, often
communicate data associated with users and their environments.
Characteristics:
1) Dynamic & Self Adapting: IoT devices and systems may have the capability to
dynamically adapt with the changing contexts and take actions based on their
operating conditions, user‗s context or sensed environment.
Eg: the surveillance system is adapting itself based on context and changing
conditions.
2) Self Configuring: allowing a large number of devices to work together to
provide certain functionality.
3) Inter Operable Communication Protocols: support a number of interoperable
communication protocols and can communicate with other devices and also with
infrastructure.
4) Unique Identity: Each IoT device has a unique identity and a unique identifier (IP
address).
5|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
Applications of IoT:
1. Home
2. Cities
3. Environment
4. Energy
5. Retail
6. Logistics
7. Agriculture
8. Industry
9. Health & Life Style
6|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
Things in IoT:
7|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
The things in IoT refer to IoT devices which have unique identities and perform
remote sensing, actuating and monitoring capabilities. IoT devices can
exchange data with other connected devices applications. It collects data
from other devices and process data either locally or remotely.
An IoT device may consist of several interfaces for communication to other
devices both wired and wireless. These includes
(i) I/O interfaces for sensors,
(ii) Interfaces for internet connectivity
(iii) Memory and storage interfaces and
(iv) Audio /video interfaces.
a) Link Layer: Protocols determine how data is physically sent over the
networks physical layer or medium. Local network connect to which host
is attached. Hosts on the same link exchange data packets over the link
layer using link layer protocols. Link Layer determines how packets are
coded and signaled by the h/w device over the medium to which the
host is attached.
8|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
Protocols:
• 802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer.
Eg: 802.3 uses co-axial cable; 802.3i uses copper twisted pair connection; 802.3j
uses fiber optic connection; 802.3ae uses Ethernet over fiber.
• 802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN) communication
standards including extensive description of link layer. Eg: 802.11a operates in
5GHz band, 802.11b and 802.11g operates in 2.4GHz band, 802.11n operates in
2.4/5GHz band, 802.11ac operates in 5GHz band, 802.11ad operates in
60Ghzband.
• 802.16 - WiMax: IEEE802.16 is a collection of wireless broadband standards
including exclusive description of link layer. WiMax provide data rates from 1.5
Mb/s to 1Gb/s.
• 802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless
personal area network(LR-WPAN). Basis for high level communication protocols
such as ZigBee. Provides data rate from 40kb/s to250kb/s.
• 2G/3G/4G-Mobile Communication: Data rates from 9.6kb/s(2G) to up
to100Mb/s(4G).
Protocols:
• IPv4: Internet Protocol version4 is used to identify the devices on a n/w using a
hierarchical addressing scheme. 32 bit address. Allows total of 2*32 addresses.
9|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
• IPv6: Internet Protocol version6 uses 128 bit address scheme and allows 2**128
addresses.
• 6 LOW PAN: (I Pv6 over Low power Wireless Personal Area Network) operates in2.4
GHz frequency range and data transfer 250 kb/s.
C) Transport Layer: Provides end-to-end message transfer capability independent of the
underlying n/w. Set up on connection with ACK as in TCP and without ACK as in UDP.
Provides functions such as error control, segmentation, flow control and congestion
control.
Protocols:
• TCP: Transmission Control Protocol used by web browsers(along with HTTP and HTTPS),
email(along with SMTP, FTP). Connection oriented and stateless protocol. IP Protocol
deals with sending packets, TCP ensures reliable transmission of protocols in order.
Avoids n/w congestion and congestion collapse.
• UDP: User Datagram Protocol is connectionless protocol. Useful in time sensitive
applications, very small data units to exchange. Transaction oriented and stateless
protocol. Does not provide guaranteed delivery.
D) Application Layer: Defines how the applications interface with lower layer protocols to
send data over the n/w. Enables process-to-process communication using ports.
Protocols:
• HTTP: Hyper Text Transfer Protocol that forms foundation of WWW. Follow request-
response model Stateless protocol.
• CoAP: Constrained Application Protocol for machine-to-machine (M2M)
applications with constrained devices, constrained environment and constrained
n/w. Uses client- server architecture.
• Web Socket: allows full duplex communication over a single socket connection.
10|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
• MQTT: Message Queue Telemetry Transport is light weight messaging protocol based
on publish-subscribe model. Uses client server architecture. Well suited for
constrained environment.
• XMPP: Extensible Message and Presence Protocol for real time communication and
streaming XML data between network entities. Support client-server and server-server
communication.
• DDS: Data Distribution Service is data centric middleware standards for device-to-
device or machine-to-machine communication. Uses publish-subscribe model.
• AMQP: Advanced Message Queuing Protocol is open application layer protocol for
business messaging. Supports both point-to-point and publish-subscribe model.
1. Request-Response
2. Publish-Subscribe
3. Push-Pull
4. Exclusive Pair
1. Request-Response Model:
11|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
In which the client sends request to the server and the server replies to requests.
Is a stateless communication model and each request-response pair is
independent of others.
2) Publish-Subscribe Model
Involves publishers, brokers and consumers. Publishers are source of data. Publishers
send data to the topics which are managed by the broker. Publishers are not aware
of the consumers. Consumers subscribe to the topics which are managed by the
broker. When the broker receives data for a topic from the publisher, it sends the
data to all the subscribed consumers.
3) Push-Pull Model: In which data producers push data to queues and consumers pull
data from the queues. Producers do not need to aware of the consumers. Queues help in
decoupling the message between the producers and consumers.
12|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
4) Exclusive Pair:
13|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
14|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
Layered System: constraints the behavior of components such that each component
cannot see beyond the immediate layer with which they are interacting.
User Interface: constraint requires that the method of communication between a
client and a server must be uniform.
Code on Demand: Servers can provide executable code or scripts for clients to
execute in their context. This constraint is the only one that is optional.
Request-Response model used by REST:
15|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
16|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
3) Big Data Analytics: Some examples of big data generated by IoT are
• Sensor data generated by IoT systems.
• Machine sensor data collected from sensors established in industrial and energy
systems.
• Health and fitness data generated IoT devices.
• Data generated by IoT systems for location and tracking vehicles.
• Data generated by retail inventory monitoring systems.
4) Communication Protocols: form the back-bone of IoT systems and enable network
connectivity and coupling to applications.
• Allow devices to exchange data over network.
• Define the exchange formats, data encoding addressing schemes for device
and routing of packets from source to destination.
17|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
a. Bluetooth
b. Zigbee
ZigBee is similar to Bluetooth and is majorly used in industrial settings. It has some
significant advantages in complex systems offering low-power operation, high
security, robustness and high and is well positioned to take advantage of wireless
control and sensor networks in IoT applications. The latest version of ZigBee is the
18|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
recently launched 3.0, which is essentially the unification of the various ZigBee
wireless standards into a single standard.
c. Z-Wave
A Z-Wave uses a simpler protocol than some others, which can enable faster
and simpler development, but the only maker of chips is Sigma Designs compared
to multiple sources for other wireless technologies such as ZigBee and others.
d. Wi-Fi
Wi-Fi connectivity is one of the most popular IoT communication protocol, often
an obvious choice for many developers, especially given the availability of WiFi
within the home environment within LANs.There is a wide existing infrastructure as
well as offering fast data transfer and the ability to handle high quantities of data.
Currently, the most common WiFi standard used in homes and many businesses is
802.11n, which offers range of hundreds of megabit per second, which is fine for
file transfers but may be too power-consuming for many IoT applications.
e. Cellular
Any IoT application that requires operation over longer distances can take
advantage of GSM/3G/4G cellular communication capabilities. While cellular is
clearly capable of sending high quantities of data, especially for 4G, the cost and
also power consumption will be too high for many applications. But it can be ideal
for sensor-based low-bandwidth-data projects that will send very low amounts of
data over the Internet.
19|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
f. NFC
g. LoRaWAN
IoT Protocols
20|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
This version has the following three additives, which might link into processing
chains in the server to create the favored capabilities.
21|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
Message Queue: Stores messages until they may thoroughly process via the
eating client software.
Binding: States the connection between the message queue and the change.
interoperable statistics change via the submit-subscribe technique. DDS makes use
platforms ranging from low-footprint devices to the cloud and supports green
The DDS – IoT protocols have fundamental layers: facts centric submit-subscribe
(dcps) and statistics-local reconstruction layer (dlrl). Dcps plays the task of handing
over the facts to subscribers, and the dlrl layer presents an interface to dcps
objects.
22|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
23|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
24|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
medical and health care sector, and some other industrial applications
where output in the right time is given more importance.Further this RealTime
Embedded System is divided into two types i.e.
Soft Real Time Embedded Systems –
In these types of embedded systems time/deadline is not so strictly
followed. If deadline of the task is passed (means the system didn‘t give
result in the defined time) still result or output is accepted.
Hard Real-Time Embedded Systems –
In these types of embedded systems time/deadline of task is strictly
followed. Task must be completed in between time frame (defined time
interval) otherwise result/output may not be accepted.
Examples:
Traffic control system
Military usage in defense sector
Medical usage in health sector
25|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
1) IoT Level1: System has a single node that performs sensing and/or actuation,
stores data, performs analysis and host the application as shown in fig. Suitable for
modeling low cost and low complexity solutions where the data involved is not big
and analysis requirement are not computationally intensive. An e.g., of IoT Level1 is
Home automation.
2) IoT Level2: has a single node that performs sensing and/or actuating and local
analysis as shown in fig. Data is stored in cloud and application is usually cloud
based. Level2 IoT systems are suitable for solutions where data are involved is big,
26|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
however, the primary analysis requirement is not computationally intensive and can
be done locally itself. An e,g., of Level2 IoT system for Smart Irrigation.
3) IoT Level3: system has a single node. Data is stored and analyzed in the cloud
application is cloud based as shown in fig. Level3 IoT systems are suitable for
solutions where the data involved is big and analysis requirements are
computationally intensive. An example of IoT level3 system for tracking package
handling.
4) IoT Level4: System has multiple nodes that perform local analysis. Data is stored
in the cloud and application is cloud based as shown in fig. Level4 contains local
and cloud based observer nodes which can subscribe to and receive information
collected in the cloud from IoT devices. An example of a Level4 IoT system for
Noise Monitoring.
27|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
5) IoT Level5: System has multiple end nodes and one coordinator node as shown
in fig. The end nodes that perform sensing and/or actuation. Coordinator node
collects data from the end nodes and sends to the cloud. Data is stored and
analyzed in the cloud and application is cloud based. Level5 IoT systems are
suitable for solution based on wireless sensor network, in which data involved is big
and analysis requirements are computationally intensive. An example of Level5
system for Forest Fire Detection.
28|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
6) IoT Level6: System has multiple independent end nodes that perform sensing
and/or actuation and sensed data to the cloud. Data is stored in the cloud and
application is cloud based as shown in fig. The analytics component analyses the
data and stores the result in the cloud data base. The results are visualized with
cloud based application. The centralized controller is aware of the status of all the
end nodes and sends control commands to nodes. An example of a Level6 IoT
system for Weather Monitoring System.
29|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
c) Intrusion Detection: use security cameras and sensors(PIR sensors and door
sensors) to detect intrusion and raise alerts. Alerts can be in the form of SMS or
email sent to the user.
d) Smoke/Gas Detectors: Smoke detectors are installed in homes and buildings
to detect smoke that is typically an early sign of fire. Alerts raised by smoke
detectors can be in the form of signals to a fire alarm system. Gas detectors
can detect the presence of harmful gases such as CO, LPGetc.,
2) Cities:
a) Smart Parking: make the search for parking space easier and convenient for
drivers. Smart parking are powered by IoT systems that detect the no. of
empty parking slots and send information over internet to smart application
backends.
b) Smart Lighting: for roads, parks and buildings can help in saving energy.
c) Smart Roads: Equipped with sensors can provide information on driving
condition, travel time estimating and alert in case of poor driving conditions,
traffic condition and accidents.
d) Structural Health Monitoring: uses a network of sensors to monitor the vibration
levels in the structures such as bridges and buildings.
e) Surveillance: The video feeds from surveillance cameras can be aggregated
in cloud based scalable storage solution.
f) Emergency Response: IoT systems for fire detection, gas and water leakage
detection can help in generating alerts and minimizing their effects on the
critical infrastructures.
30|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
3) Environment:
a) Weather Monitoring: Systems collect data from a no. of sensors attached
and send the data to cloud based applications and storage back ends.
The data collected in cloud can then be analyzed and visualized by cloud
based applications.
b) Air Pollution Monitoring: System can monitor emission of harmful gases(CO2,
CO, NO, NO2 etc.,) by factories and automobiles using gaseous and
meteorological sensors. The collected data can be analyzed to make
informed decisions on pollutions control approaches.
c) Noise Pollution Monitoring: Due to growing urban development, noise levels
in cities have increased and even become alarmingly high in some cities.
IoT based noise pollution monitoring systems use a no. of noise monitoring
systems that are deployed at different places in a city. The data on noise
levels from the station is collected on servers or in the cloud. The collected
data is then aggregated to generate noise maps.
d) Forest Fire Detection: Forest fire can cause damage to natural resources,
property and human life. Early detection of forest fire can help in minimizing
damage.
e) River Flood Detection: River floods can cause damage to natural and
human resources and human life. Early warnings of floods can be given by
monitoring the water level and flow rate. IoT based river flood monitoring
system uses a no. of sensor nodes that monitor the water level and flow rate
sensors.
4) Energy:
a) Smart Grids: is a data communication network integrated with the electrical
grids that collects and analyze data captured in near-real-time about power
31|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
32|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
9. Practice Quiz
33|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
34|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
d) Network protocols
10. Assignments
S.No Question BL CO
1 Explain about TCP and UDP Ports 2 3
2 Explain the application layer protocols 2 3
3 Explain different types IP Addresses 2 3
4 Explain briefly about prototyping online components 2 3
5 Explain about communications in IOT 3 3
35|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
AMQP
Very Simple Control Protocol (VSCP)
Data Distribution Service (DDS)
MQTT protocol
Wi-Fi
Simple Text Oriented Messaging Protocol(STOMP)
Zigbee
3 What is MQTT?
Ans.
M2M IoT
36|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
Arduino Raspberry pi
S.No Question BL CO
1 Explain about TCP and UDP Ports 1 3
2 Explain the application layer protocols 2 3
3 Explain different types IP Addresses 2 3
4 Explain briefly about prototyping online components 3 3
5 Explain about communications in IOT 3 3
S.No Application CO
1 IOT BASED SMART CROP PROTECTION USING ARDUINO 3
Agriculture has always been the primary and the most important sectors
of Indian economy. Farmers are the back bone of one’s country, so it is
important for us to make sure he has the access to resources that are
essential. Conventional methods like scare crows are used even today in
an agricultural field to avoid birds and animals from feeding on growing
crops. There are many loopholes in such ideas and so improvising
agricultural security has become a major issue these days. Thus, this
37|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
38|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
Text Book
1. Vijay Madisetti and ArshdeepBahga, “ Internet of Things ( A Hands-on-Approach)”,
1st Edition, VPT, 2014.
2. Handbook of unmanned aerial vehicles, K Valavanis; George J Vachtsevanos,
New York, Springer, Boston, Massachusetts : Credo Reference, 2014. 2016.
References:
1. Jan Holler, VlasiosTsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis Karnouskos,
David Boyle, “ From Machine-to-Machine to the Internet of Things: Introduction to a
New Age of Intelligence”, 1st Edition, Academic Press, 2014.
2. ArshdeepBahga, Vijay Madisetti - Internet of Things: A Hands-On Approach,
Universities. Press 2014.
The main objective idea of this paper is to automate the procedure of planting,
Grass Cutting, pesticide spraying, Water Sprinkling, seeding and tunneling to
decrease the humanoid effort and increase the harvest. The farming of seeds is
robotically done by using DC motor. It is also possible to develop different kinds
of seeds with dissimilar distance. The projected idea contains sprayer, which
would be used for reducing the wastage of fertilizers that is done by spraying
appropriate amount of fertilizers required for the specific crop. The mode of
process can be changed with the help of directions existing n the robot
application. Arduino Controller between inputs and outputs are controlled by
using this method.
The main aim of our project is transmitted the data through the VLC
communication. LI-FI is transmission of data using visible light by sending data
through LED light. This system has regulated the speed which human eyes have
39|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
40|I O T - U N I T - I
BTECH_CSE-SEM 3-2
SVEC TIRUPATI
This paper presents a system display that can therefore see sign language to
help normal people with imparting even more suitably with the gathering or talk
ruined people. This endeavor includes an Arduino controller interfaced with flex
sensors and Voice play back circuit. By using flex sensors we can convey
particular motions, for each motion we coded a voice track .so other
conventional individuals will easily fathom the thwarted individual. Despite it we
using a Gyro Sensor particular device. By using Gyro Sensor we can change
over the voice headings into Text. These Text headings will appear on LCD
which is useful for hard of hearing individuals as well.
41|I O T - U N I T - I
BTECH_CSE-SEM 3-2