Internet of Things (Iot) - Systems and Applications
Internet of Things (Iot) - Systems and Applications
net/publication/368690982
CITATIONS READS
0 527
1 author:
Ashok John
Eritrea Institute of Technology
30 PUBLICATIONS 25 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Ashok John on 22 February 2023.
Dr. N. Rajendran
Assistant Professor (Senior Grade)
Department of Information Technology at B.S. Abdur Rahman Crescent
Institute of Science and Technology, Chennai
Dr. R. Priyadarshini
Assistant Professor Senior Grade II,
School of Computer Science and Engineering,
Vellore Institute of Science and Technology, Chennai
Dr. Ashok J
Associate Professor,
Department of Electronic and Communication Engineering,
V. S. B. Engineering College, Karur
ISBN: “978-81-953929-2-6”
Pages: 198
Price: ₹490/-
CONTENTS
CHAPTER 1
INTRODUCTION TO INTERNET OF THINGS
1.1 Introduction
It is a network of physical objects or things that send, receive, or
communicate via the internet or other communication technologies. The
intelligent link between the physical and digital worlds, often known as the
Internet of Things (IoT), is expected to fundamentally alter every aspect of
how we work and do business. By integrating apps with their integrated
systems, businesses have the potential to significantly transform their
industries. Currently, 90% of the data produced by tablets, smartphones,
and linked devices is not utilised. Think about how you may be able to
change it. No other technological platform has ever combined this level of
complexity, global reach, and uniqueness, it is reasonable to claim. The
Internet of Things (IoT) has created opportunities for directly integrating
the real world with computer-based systems via sensors and the internet
since it allows items to be handled remotely. Automation in practically
every industry as well as the development of cutting-edge applications will
result from the integration of these many embedded devices. As a result,
accuracy, efficiency, and economic value have increased with reduced
human influence. Among the technologies explored are smart grids, smart
homes, intelligent transportation, and smart cities. Some of the main
benefits of IoT include the ones listed below:
❖ Greater Customer Engagement - By automating the process, the
Internet of Things (IoT) enhances the customer experience. For
instance, the sensors on an automobile will detect any issue right away.
Both the driver and the manufacturer will be communicated. Before the
driver arrives the gas station, his or her time is not over.
❖ The manufacturer will make that the faulty component is accessible at
the servicing facility.
❖ Technical Optimization - The Internet of Things has aided
technological advancement. In order to improve the vehicle's design
and efficiency, the manufacturer may make data from numerous
automobile sensors and analyse it.
Reduced Waste – Our current understanding is limited, but real-time
data from the Internet of Things (IoT) enables improved information
management and decision-making. For instance, if a manufacturer finds a
flaw in several engines, he may track the factory where the engines are
produced and correct the issue with the production belt.
Page 1
Internet of Things (IoT): Systems and Applications
Page 2
Internet of Things (IoT): Systems and Applications
Page 3
Internet of Things (IoT): Systems and Applications
There are new business models with the Internet of Things (IoT).
Without strong and reliable business models for IoT, we risk experiencing
another bubble. This model must satisfy all requirements for consumer
markets, vertical markets, and horizontal markets. The inclusion of services
with the product is essential; otherwise, devices like Amazon's Alexa would
just be seen as another wireless speaker. Examples of these services include
voice recognition, music streaming, and Uber booking. The Internet of
applications has the potential to improve almost every aspect of our daily
life. The list below includes a few of the examples.
1. Prediction of natural disasters: By integrating sensors with their
autonomous coordination and modelling, it will be able to anticipate
when landslides and other natural disasters will occur and take
appropriate time in advance.
2. Applications for industry: For instance, managing a fleet of cars might
be done using the Internet of applications in the industry. The
processing of data to identify and choose the ones that need repair and
monitoring of their environmental performance are made easier with
the help of the Internet of Things.
3. Monitoring water scarcity: The Internet of Things may assist identify
water shortages in different locations. When the networks of sensors
are combined with the appropriate simulation exercises, they can be
used to monitor long-term water interventions like catchment area
management as well as warn stream users when an upstream event,
like the unintentional release of sewage into the stream, may have
potentially dangerous effects.
4. Smart home design: The Internet of Things (IoT) may assist with smart
home design in a number of ways, including energy consumption
management, appliance interaction, crisis detection, home safety and
simple item location, home security, and more.
5. Medical applications: The Internet of applications (IoT) can be used in
the medical field to save lives and improve quality of life. For instance,
monitoring health parameters, monitoring activities, assisting with
independent living, monitoring medication intake, and other similar
things are some examples of how the IoT can be used in the medical
field.
6. Agriculture application: A network of sensors may identify data,
analyse it, and notify the farmer through communication infrastructure,
such as a text message to a mobile phone, about data of land that need
particular attention. Examples of this include smart seed packaging,
Page 4
Internet of Things (IoT): Systems and Applications
Page 5
Internet of Things (IoT): Systems and Applications
Internet of Things - 7
Page 6
Internet of Things (IoT): Systems and Applications
Page 7
Internet of Things (IoT): Systems and Applications
Efficacious Procedures
By tying a lot of devices to the internet, IoT enables organisations to
become smarter with operational insights in real-time while lowering
operating costs. Inventory, time to market, and maintenance downtime will
all be decreased with the help of the data acquired from the logistics
network, production floor, and supply chain.
Increased Productivity
The profitability of each company depends on how productive it is.
The Internet of skills increases corporate productivity by enabling
employees to get just-in-time training, increase labour productivity, and
reduce skill mismatches.
Cost-Cutting
Utilization of resources, output, and process effectiveness You may
perhaps all save money with 1iency. For instance, real-time diagnostics and
predictive analytics save maintenance costs. The hype around emerging
technology has culminated in the Internet of Things (IoT). Despite the
potential benefits of IoT, businesses face significant obstacles to adoption,
including issues with data and information management, a shortage of
appropriate technologies, privacy and security concerns, and the skills
necessary to handle IoT's growing complexity. On the other hand, a
knowledgeable IoT service provider may assist you in overcoming these
obstacles and increasing your return on investment.
Page 8
Internet of Things (IoT): Systems and Applications
Logistics
IoT sensors greatly improve order fulfilment and supply chain
management processes to meet order demand. Managers can track their
shipments and make sure they reach at their destination on time thanks to
sensors on delivery containers and moving vehicles, for instance, which
provide managers real-time status updates. an organised industry IoT
provides automation potential for businesses that must manage and
replenish their stockpiles. When data from IoT devices is connected to your
enterprise resource planning (ERP) system, you can carefully monitor your
inventory, evaluate purchase and consumption habits of a certain product,
and automatically reorder products when IoT sensors show that supply is
running low. There are fewer instances of being out of stock, and extra
stock is avoided.
Fast Payment
The Internet of Things has the potential to transform how businesses
conduct transactions given that the majority of payments are done
electronically through point-of-sale systems or the internet. Examples of
this may already be seen today, thanks to ApplePay, which enables
customers to purchase products and services not only via smartphone
applications but also through wearable technology.
Thanks to IoT devices, restaurants and businesses may soon be able to
register or charge clients as soon as they walk through the door.
Market Research
Businesses will have a competitive edge if they can understand the data
that IoT devices are collecting. Marketers, for instance, may discover a lot
about how consumers use their products and which groups are most
interested in them. Then, using this data, businesses can make better
decisions about how to improve their products and services for consumers
and direct future marketing initiatives. Businesses adopting the Internet of
Things will likely face a number of challenges, but those that are successful
will gain fully from this quickly developing technology.
Page 9
Internet of Things (IoT): Systems and Applications
Page 10
Internet of Things (IoT): Systems and Applications
Page 11
Internet of Things (IoT): Systems and Applications
Designing a Design
A gateway is a device that joins two disparate networks to allow data
to pass between them. This is usually a link between a private network and
the Internet.
Page 12
Internet of Things (IoT): Systems and Applications
Page 13
Internet of Things (IoT): Systems and Applications
Page 14
Internet of Things (IoT): Systems and Applications
Aside from these facts, there are certain benefits and drawbacks of
Internet of Things devices that can significantly affect humans' present and
future generations.
Page 15
Internet of Things (IoT): Systems and Applications
Page 16
Internet of Things (IoT): Systems and Applications
sending commands to IoT devices and receiving data from IoT devices
through the Internet. An illustration is shown below. You can tell which
protocols were used by looking at this graphic.
Page 17
Internet of Things (IoT): Systems and Applications
Page 18
Internet of Things (IoT): Systems and Applications
Page 19
Internet of Things (IoT): Systems and Applications
IEEE 802.11 – WiFi: Part of the IEEE 802 family of LAN protocols,
IEEE 802.11 defines a set of media access control (MAC) and physical
layer (PHY) protocols for integrating wireless local area network (WLAN)
Wi-Fi device communication at different frequencies, including but not
limited to 2.4 GHz, 5 GHz, and 60
GHz.
IEEE 802.11 is a series of medium access control (MAC) and physical
layer (PHY) protocols for incorporating wireless local area network
(WLAN) device communication that is part of the IEEE 802 set of local
area network (LAN) technical standards. The standard and its revisions
serve as the foundation for wireless network devices bearing the Wi-Fi
name. They are the most commonly used wireless computer networking
protocols in the world. IEEE 802.11 is used in most home and office
networks to allow computers, printers, smartphones, and other devices to
communicate and link to the Internet without wires.
The LAN/MAN Standards Committee of the Institute of Electrical and
Electronics Engineers (IEEE) develops and maintains the standards (IEEE
802). The standard's base version was published in 1997, and it has since
been amended. Although each amendment is legally repealed when
introduced into the most recent edition of the standard, the business
community continues to market to amendments because they concisely
denote the capabilities of their goods. As a result, each revision becomes its
standard in the marketplace.
IEEE 802.11 operates at various frequencies, including, but not limited
to, 2.4 GHz, 5 GHz, 6 GHz, and 60 GHz. While the IEEE 802.11
requirements list potential networks, the radio frequency
spectrum availability allowed differs substantially by regulatory
domain.
The protocols, which are usually used in combination with IEEE
802.2, are intended to interoperate easily with Ethernet and often carry
Internet Protocol traffic.
802.16 – Wi-Max: The WiMAX infrastructure standard is a standard
for Wireless Metropolitan Area Networks (WMANs) established by IEEE
802 working group number 16, specializing in point-to- multipoint
broadband wireless networking.
WiMAX is a wireless broadband networking technology that uses the
IEE 802.16 standard to provide high-speed data over a wide region.
WiMAX stands for Worldwide Interoperability for Microwave Access
(AXess), and it is a point-to-multipoint wireless networking
technology.
Page 20
Internet of Things (IoT): Systems and Applications
Page 21
Internet of Things (IoT): Systems and Applications
WiMAX variants
New WiMAX applications have been developed since its introduction.
As a result, there are two "flavors" of WiMAX technology available:
The two flavors of WiMAX broadband technologies are used for
various implementations. Although they are based on the same standard,
Page 22
Internet of Things (IoT): Systems and Applications
each implementation has been optimized for its specific use. 802.16d - DSL
substitute The 802.16d version is also known as 802.16-2004, and it is
closer to the original version of WiMAX described by 802.16a. It is
targeted at fixed applications and provides a wireless counterpart to DSL
broadband data, commonly referred to as WiMAX broadband. In reality,
the WiMAX Forum defines the technology as "a standards-based
technology that enables the distribution of last-mile wireless broadband
service as an alternative to cable and DSL."
Because 802.16d can have data speeds of up to 75 Mbps, it is suitable
for fixed, DSL replacement applications such as WiMAX broadband. It can
also be used for backhaul, transmitting the final data to individual users.
Cell radii can range up to 75 kilometers.
802.16e - Mobile / Nomadic Although 802.16 / WiMAX was initially
intended to be a fixed-only technology, people on the move demand high-
speed data at a lower cost than wireless networks, created a need for a
mobile version, and 802.16e was established. This standard is often referred
to as 802.16-2005. It currently allows users to bind to a WiMAX cell from
some locations, with potential updates to include cell handover.
Data speeds of up to 15 Mbps are possible with 802.16e, and cell
radius lengths are usually between 2 and 4 km. Competition
There are some implementations of the IEEE 802.3 protocol. The most
well- known are -
The rivalry between WiMAX and 802.16 is dependent on the form or
variant used. While it was originally believed that WiMAX would be a
major competitor to Wi-Fi, there are other places where WiMAX is a
challenge.
❖ Cable DSL bars WiMAX is capable of providing customers with high-
speed data connections. As such, it can pose a challenge to DSL cable
operators.
❖ Cell phone service providers Cell phone providers viewed the
smartphone version of WiMAX as a potential challenge as LTE was
being established and the first roll-outs began. It was also proposed as
the IMT 4G standard. However, LTE was chosen as the standard,
leaving WiMAX for fixed WiMAX broadband, last-mile connections,
and other point-to-point applications.
WiMAX technology has been used in a variety of applications.
Although it was originally seen as a contender for 4G, its use is dwindling.
However, it is still used for WiMAX broadband and last-mile connections.
802.15.4 -LR-WPAN: A collection of Low-rate wireless personal area
network standards. The IEEE 802.15.4 standard specifies the MAC and
Page 23
Internet of Things (IoT): Systems and Applications
Page 24
Internet of Things (IoT): Systems and Applications
History of Subnetting
During the early stages of Internet Protocol development, the network
number was always the highest order octet (most significant eight bits).
Since this approach only allowed for 256 networks. It quickly proved
insufficient when new networks emerged independently of the existing
networks already designated by a network number. With the
implementation of classful network architecture in 1981, the addressing
specification was updated. [2] Formalized paraphrase
Classful network architecture allowed more individual network
assignments and fine-grained subnetwork design. The class of an IP address
was specified as the first three bits of the most important octet. Three
classes (A, B, and C) were specified for universal unicast addressing.
Depending on the class, the network recognition depended on the entire
address's octet boundary segments. Each class used an increasing number
of octets in the network identifier, decreasing the available number of hosts
in higher-order classes (B and C). The table below provides an outline of
this now-defunct scheme.
Page 25
Internet of Things (IoT): Systems and Applications
addresses per
Start address
Leading bits
End address
Size of rest
Number of
Number of
networks
network
bit field
Class
Private Addresses
When universal end-to-end connectivity was envisioned for
communications with all Internet hosts, IP addresses were meant to be
internationally exclusive. However, as private networks grew and public
address space needed to be conserved, it was discovered that this was not
always possible.
Computers that are not wired to the Internet, such as factory machines
that communicate only through TCP/IP, do not need globally specific IP
addresses. Today, such private networks are common, and they usually link
to the Internet through network address translation (NAT) when necessary.
Three non-overlapping IPv4 address ranges are reserved for private
networks. [8] Formalized paraphrase Since these addresses are not
accessible on the Internet; their use would not require coordination with an
Page 26
Internet of Things (IoT): Systems and Applications
The goal of the new design was not only to have a sufficient number of
addresses but also to reinvent Internet routing by enabling a more effective
aggregation of subnetwork routing prefixes. This slowed the development
of routing tables in routers. The smallest individual allocation available is a
subnet for 264 hosts, which is the square of the whole IPv4 Internet. Real
address consumption ratios on any IPv6 network segment would be poor at
these stages. The new architecture also allows for separating a network
segment is addressing infrastructure, i.e., the local management of the
segment's usable capacity, from the addressing prefix used to redirect
traffic to and from external networks. If the global connectivity or routing
strategy changes, IPv6 has facilities that instantly adjust the routing prefix
of whole networks without requiring internal overhaul or manual
renumbering. Because of the vast IPv6 addresses available, large blocks
may be allocated for specific purposes and aggregated for efficient routing.
There is no need for complicated address conservation approaches like
CIDR with a huge address space.
Private Addresses
IPv6 addresses are reserved in the same way as IPv4 addresses for
private networks. In IPv6, these are known as special local addresses
(ULAs). This block has the routing prefix fc00::/7 reserved for it,[9] and is
separated into two /8 blocks of separate implicit policies. The addresses
contain a 40-bit pseudorandom integer, which reduces the possibility of
address collisions if sites merge or packets are misrouted.
Page 27
Internet of Things (IoT): Systems and Applications
For this reason, early practices used a separate block (fec0::), which
was called site-local addresses.
[10] Formalized paraphrase; however, the concept of what constituted
a location remained vague. The ill-defined addressing strategy generated
routing ambiguities. This address form has been deprecated and can not be
used in modern systems. [11] Formalized paraphrase
Link-local addresses begin with fe80::, are allocated to interfaces for
communication over the attached link. The operating system produces
addresses for each network interface automatically. This allows for
immediate and automated communication between all IPv6 hosts on a link.
This functionality is used in IPv6 network administration's lower layers,
such as the Neighbor Discovery Protocol.
Page 28
Internet of Things (IoT): Systems and Applications
Page 29
Internet of Things (IoT): Systems and Applications
Page 30
Internet of Things (IoT): Systems and Applications
Page 31
Internet of Things (IoT): Systems and Applications
Publish-Subscribe Model
Publish-Subscribe is a communication model involving authors,
brokers, and customers. Data were gathered from publishers. The
publishers send the data to the topics handled by the broker. Publishers are
ignorant of their clients. Consumers subscribe to the issues that the broker
manages. When the broker receives data for an issue from the publisher, it
distributes it to all subscribers.
Page 32
Internet of Things (IoT): Systems and Applications
Page 33
Internet of Things (IoT): Systems and Applications
Page 34
Internet of Things (IoT): Systems and Applications
Page 35
Internet of Things (IoT): Systems and Applications
Http Methods
Websocket Based Communication API
Websocket APIs allow full-duplex bidirectional communication
between clients and servers. Websocket APIs use the exclusive pair
communication model. Unlike the request-response model used by REST,
WebSocket APIs support complete duplex communication and do not
require a new link to be formed for each message sent. The client sends a
link configuration request to the server, initiating websocket
communication. The request (known as a websocket handshake) is sent
over HTTP and is treated by the server as an update request. The server
responds to the websocket handshake answer by whether it accepts the
websocket protocol. After the link is established, the client and server can
send data and messages in full duplex mode. Since there is no overhead for
link setup and termination demands for each packet, the Websocket API
eliminates network traffic and letency. Websockets are ideal for IoT
applications that require low latency or high throughput. As a result, Web
sockets are the perfect IoT communication APIs for IoT systems.
Page 36
Internet of Things (IoT): Systems and Applications
Page 37
Internet of Things (IoT): Systems and Applications
A Bluetooth a.
A vital short-range IoT communication protocol/technology,
Bluetooth, which has grown in popularity in the computer and consumer
goods industries, is supposed to be critical for wearable devices in
particular, which would once again be bound to the IoT, but most likely
from a smartphone in many situations. The new Bluetooth Low-Energy
(BLE) – or Bluetooth Smart, as it is now called –is critical for IoT
applications. Importantly, although it has a similar range to Bluetooth, it
has been built to use less power.
Z-Wave
Z-Wave is a low-power RF communications IoT technology designed
specifically for home automation products such as lamp controllers and
sensors, among many other applications. Z-Wave uses a simpler protocol
than most, making for quicker and smoother development. However, the
only producer of chips is Sigma Designs, instead of numerous sources for
other wireless technologies such as ZigBee and others.
Page 38
Internet of Things (IoT): Systems and Applications
Molecular
Any IoT program that needs service over longer distances can use
GSM/3G/4G cellular communication features. Although cellular
technology can transmit significant data, especially for 4G, the cost and
power usage would be prohibitively expensive for many applications.
However, it could be suitable for sensor-based low-bandwidth data ventures
that transmit very small volumes of data across the Internet.
NFC
NFC (Near Field Communication) is an Internet of Things (IoT)
technology. It enables easy and secure communication between electronic
devices, especially smartphones, enabling consumers to conduct
transactions without physically being present. It allows the user to attach
mobile devices and view digital information. It expands the capability of
contactless card technologies by allowing devices to exchange information
at less than 4 cm.
LoRaWAN LoRaWAN is a popular IoT technology aimed at wide-area
network (WAN) applications. LoRaWAN was created to provide low-
power WANs with features directly needed to enable low-cost mobile
secure communication in IoT, smart city, and industrial applications. It
meets low- power consumption standards and serves vast networks of
millions of users, with data speeds ranging from 0.3 kbps to 50 kbps.
Page 39
Internet of Things (IoT): Systems and Applications
Page 40
Internet of Things (IoT): Systems and Applications
Page 41
Internet of Things (IoT): Systems and Applications
❖ Data collection is done at a local level. The cloud is mainly used for
computing.
❖ A control operation is initiated using a web interface or a smartphone
app. Based on data analysis.
Page 42
Internet of Things (IoT): Systems and Applications
Page 43
Internet of Things (IoT): Systems and Applications
Page 44
Internet of Things (IoT): Systems and Applications
Page 45
Internet of Things (IoT): Systems and Applications
CHAPTER 2
SMART OBJECTS
Page 46
Internet of Things (IoT): Systems and Applications
The work of the smart object has been focused on technical elements
(such as software infrastructure, hardware platforms, etc.) and application
scenarios. Supply-chain management, corporate applications (for the home
and hospital), healthcare, and workplace assistance in industry are just a
few examples of application fields. The environment is only beginning to
pay attention to smart object technologies' human interface features.
Smartphone
Up to 10 sensors may be found in a contemporary smartphone, which
makes it possible to record anything from location to device orientation to
lighting conditions. Together, these sensors generate a considerable
quantity of data, both organised (like GPS or acceleration data) and
unstructured (like images or movies). With the popularity of wearables like
the Apple Watch and Android Wear, your smartphone plays an even bigger
part. Given the storage and communication capabilities of the smart phone,
this new role may be referred to as the "brain" of your Body Area Network
(BAN). Last but not least, thanks to technologies like Near Field
Communications (NFC), a growing number of smartphones may function
as actuators, triggering things like payments or controlling other things like
TVs and cars, in addition to being sensors.
Here are the four IoT application areas and where smartphones may or
have been utilised in an IoT setup:
We see an increase in the number of fitness and health-related services
in the Personal IoT. Then there are a number of devices designed to help
with jobs and issues encountered every day, such as Tile, which lets you
use your phone to locate things, and NFC rings, which can be used to
unlock your phone.
Smart phones are useful for a number of Group IoT applications,
including connected automotive applications that use them to control or
check system status. The same is true for smart homes, a subject we shall
go into more depth about in a later piece.
Smart phones are essential for the Community IoT; for additional role,
check the prior blog article on smart cities. For instance, residents may
contribute to a smart city using crowd-sourcing applications.
Smart phones are utilised for B2C reasons in the context of Industrial
IoT applications, such as giving contextualised and tailored suggestions in
real-time and vouchers. Additionally, solutions for client 360-degree views
are emerging in the retail sector, and the insurance services sector may
profit from employing smart phones and Internet of Things applications
Page 47
Internet of Things (IoT): Systems and Applications
(think: adaptive policies that take place, time or type of travel into account).
I recommend reading through the following sites if you want to learn
more about the IoT applications available or maybe want to get ready with
regard to tooling:
IoT applications, both current and planned, are listed on iotlist.
An good sandbox environment is provided by the Eclipse Foundation
IoT.
It is possible to use a number of development frameworks, including
AllJoyn, thethingsystem, or smartthings.
Web APIs and services such as freeboard.io, wit.ai, and dweet.io
Televisions and the Internet of Things Since they are connected
devices, TVs—at least smart TVs, which account for the majority of those
sold today—are already a component of the Internet of Things. A wide
number of practical applications currently exist for smart connected TVs.
For instance, a Smart TV may now be used as a video calling device,
allowing families to converse while seeing one other in all their splendour.
Up until now, the major uses of Smart TVs have been for Internet
content streaming or showing private images and movies. In internet, more
and more people are watching TV online via streaming. Nowadays, a lot of
Smart TVs will pick up on your favourite programmes and suggest new
programmes you should watch out based on that information. There is no
reason why a Smart TV can't also be utilised as a control platform, even if
the majority of IoT devices normally use Smartphones and tablets for their
controls since such applications are very simple to install.
The Internet of Things in the home has just recently begun, particularly
when compared to its potential. It is yet unclear what role the TV will
eventually serve in comparison to a computer or a mobile device, but it is
possible that it will play a significantly larger role. For instance, all of your
home's sensors may be connected and shown on a large screen, saving you
from having to goggle at your smartphone. While you are eating breakfast,
the TV may converse with you using speech recognition, informing you
what it thinks is the best course of action for the day based on the weather,
your calendar, your body monitor, etc.
Then there is software that you might utilise on a Smart TV, such as
IFTTT (If this, then that). You want to unwind and watch your favourite
programmes, but you need to wait for a call or an email from your parents,
your work, or someone else. Using IFTTT, you can automatically pause
your programme (and start recording it on your PVR) and show the email
or connect the important phone call you are waiting for while still allowing
Page 48
Internet of Things (IoT): Systems and Applications
Page 49
Internet of Things (IoT): Systems and Applications
Agriculture
Healthcare IoT: Our Bodies as Internet-connected "Things"
IoT "things" may also be "wearables" with medical applications.
Devices that continuously track your body's systems and functions may
serve as an early warning system for health problems and a tool for you to
hold yourself responsible for achieving your health objectives.
Page 50
Internet of Things (IoT): Systems and Applications
Page 51
Internet of Things (IoT): Systems and Applications
Systems
Tractors, soil sensors, and irrigation systems: IoT for Agriculture We
have been modifying how we produce and collect food for thousands of
years, whether it is via irrigation, crop rotation, fertilisation, or genetic
manipulation. Farms have evolved from being tiny, family- or community-
run businesses to huge conglomerates spanning thousands or perhaps
millions of acres. In order to satisfy rising needs, farmers have resorted to
technology as populations have increased over the 20th century. Farmers
continue to come up with creative solutions to satisfy the world's growing
supply for food in an interconnected and unpredictable environment in the
twenty- first century.
A wide range of agricultural improvements are made possible via IoT.
Farmers are beginning to employ IoT, drones, and AI to "improve the
quantity and quality of products while optimising the human labour needed
by manufacturing," according to SciForce's article on IoT For All.
The image below demonstrates how a remote, large-scale soil
monitoring system called "CropX" is being used to assist farmers better
understand which fields require irrigation when and how soil conditions
change over time.
Page 52
Internet of Things (IoT): Systems and Applications
Page 53
Internet of Things (IoT): Systems and Applications
The new Data Economy greatly benefits from the Internet of Things.
When it comes to automation, for instance, the value of an IoT system
expands beyond its initial use case. This is due to the fact that an IoT
system's intelligence has additional value. IoT data is generated by sensors.
Additionally, IoT sensors and actuators may work to allow automation on
an industrial scale. Finally, over time, analysis of the data generated by
these sensors and actuators might provide insightful business information.
Sensor technology is developing at an ability never before seen, driven
by advances in materials science and nanotechnology. As a result, it is
becoming more accurate, smaller and less expensive, and able to measure
or detect things that weren't before feasible. In fact, in a few years we'll see
a trillion new sensors deployed yearly since sensing technology is
developing so quickly.
Sensors
A transducer is a more appropriate name for a sensor. Any physical
device that converts one kind of energy into another is referred to as a
transducer. As a case, for a sensor, the transducer converts a physical
phenomena into an electrical impulse that determines the reading. A
microphone is a sensor that converts sound waves from vibrational energy
to electrical energy in an usable fashion so that other parts of the system
may link the electrical energy back to the original sound.
Actuators
Actuator is another type of transducer that is used extensively in IoT
systems. Simply said, an actuator works the opposite way from a sensor. It
transforms an electrical input into physical movement. Actuators come in a
variety of forms, such as electric motors, hydraulic systems, and pneumatic
systems.
Controller
A sensor may gather data and send it to a control centre in a
conventional Internet of Things system. There, the judgement is governed
by previously established rationale. As a result, the perceived input causes a
matching instruction to control an actuator. As a result, with the IoT,
sensors and actuators collaborate from opposing ends. We'll talk more
about the location of the control centre inside the larger IoT system later.
Page 54
Internet of Things (IoT): Systems and Applications
Sensor Calibration
We would need to use a container with a known carrying capacity,
such as a pint glass, to calibrate the sensor. Then, in order to determine
what the electrical pulse signal looked like, we would have to fill the
container under a number of circumstances. Then, keep an eye on the
actuator that controls the other end's flow by turning it on and off.
For instance, the initial pour from a fresh keg could have a tendency to
have more froth, which would affect how it reads in comparison to a pour
from the centre of the keg that had just beer. We can only be certain that we
can interpret the data after many trials and a large amount of data. IoT
sensors and actuators can work to automate tasks like filling bottles.
Page 55
Internet of Things (IoT): Systems and Applications
Page 56
Internet of Things (IoT): Systems and Applications
Power-Connected or Battery-Powered -
Whether or whether an object includes its own energy source or
continuously draws electricity from an external source determines how it is
classified. Objects powered by batteries can be transported more easily than
things powered by lines.
Riding transmission fluctuates in frequency because batteries limit the
amount of power and longevity that the object may use.
Rich or Simple Data?
This classification is entirely based on the volume of records
transferred throughout each reporting cycle. While an engine sensor may
also record many characteristics, such as temperature to pressure,
compression speed, carbon index, etc., a humidity sensor in a specific area
may also produce an easy daily index value (on a binary scale from zero to
255). Richer records often result in higher energy use.
The object information throughput is often determined by combining
this classification with the previous (low throughput to excessive
throughput). A medium-throughput object may also convey successful
information at a low frequency instead of a high frequency (in which case
the glide shape seems continuous) (in which case the flow shape appears
bursty).
Page 57
Internet of Things (IoT): Systems and Applications
longer required to report band data to the phone. On the other hand, a
moisture sensor embedded in a street's asphalt may likewise want to speak
with its reader hundreds of metres or even miles distant.
Page 58
Internet of Things (IoT): Systems and Applications
Page 59
Internet of Things (IoT): Systems and Applications
Cellular Technologies
An overview of these technologies is provided below.
Page 60
Internet of Things (IoT): Systems and Applications
Page 61
Internet of Things (IoT): Systems and Applications
Page 62
Internet of Things (IoT): Systems and Applications
Page 63
Internet of Things (IoT): Systems and Applications
CHAPTER 3
IOT LAYERS
Page 64
Internet of Things (IoT): Systems and Applications
Page 65
Internet of Things (IoT): Systems and Applications
Page 66
Internet of Things (IoT): Systems and Applications
Cellular
Low-power, low-cost IoT communication methods using current
cellular networks are addressed by the LPWAN NB-IoT and LTE-M
standards. The newest of these standards, NB-IoT, is focused on long-range
communication between a significant number of devices, mostly indoor
ones. Although current cellular technologies are frequently used for long-
range wireless communication, LTE-M and NB-IoT were adopted
expressly for IoT. In addition to 2G (GSM), which is now being phased out
in older devices, and CDMA, which is also being retired or phased out, 3G
is also being phased out quickly, with numerous network operators retiring
all 3G devices. Up until the time when 5G is completely implemented and
available,
4G will continue to be in use.
ZigBee
On the 2.4GHz wireless communication frequency, ZigBee runs. Its
range is up to 100 metres longer than BLE's. Additionally, compared to
BLE, it offers a little lower maximum data rate (250 kbps as opposed to
270 kbps). A mesh network protocol is zigbee. Not all devices can sleep in
between bursts, unlike BLE. Their location inside the mesh and whether
Page 67
Internet of Things (IoT): Systems and Applications
they must act as controllers or routers within the mesh will both have a
significant impact. ZigBee was designed for applications in home and
building automation. The Z- Wave technology, which is likewise based on
IEEE 802.15.4, is a near relative of ZigBee. For home automation, Z-Wave
was designed.
NFC
In order to hold an NFC card or tag adjacent to a reader, for example,
the near field communication (NFC) protocol is used for extremely short
range communication (up to 4 cm). NFC is frequently utilised in payment
systems, but it is also beneficial in check-in systems and asset monitoring
using smart labels.
RFID
Radio Frequency Identification is referred to as RFID. Identifiers and
data are stored on RFID tags. An RFID reader reads the tags after they have
been affixed to devices. RFID typically has a range of less than one metre.
Active, passive, or assisted passive RFID tags are all possible. Since the
reader reads the ID passively, passive tags are ideal for battery-free devices.
While aided passive tags become active when an RFID reader is available,
active tags periodically broadcast their ID. Dash7 is an active RFID-based
communication protocol designed for Industrial IoT applications that need
secure long-range
communication. Similar to NFC, monitoring inventory goods in retail
and industrial IoT applications is a popular use case for RFID.
Wifi
Based on IEEE 802.11a/b/g/n standards, WiFi is a standard for
wireless networking. IoT devices could only utilise 802.11b or g in order to
save power as 802.11n has the best data speed but also the highest power
consumption. Although many prototype and current- generation IoT
devices use wifi, it is expected that lower-power alternatives may
eventually replace wifi as longer-range and less- powerful options become
more accessible.
Ethernet
Ethernet implements the IEEE 802.3 standard for wired connectivity
inside local area networks. Not all Internet of Things (IoT) devices have to
be wireless. For instance, wired networking technologies like Ethernet may
Page 68
Internet of Things (IoT): Systems and Applications
be used by sensor units that are installed into a building automation system.
An alternative hard-wired method called power line communication (PLC)
substitutes pre-existing electrical wiring for specialised network lines.
Page 69
Internet of Things (IoT): Systems and Applications
MQTT
The publish/subscribe-based messaging protocol Message Queue
Telemetry Transport (MQTT) was designed for use in low bandwidth
scenarios, notably for sensors and mobile devices on unreliable networks.
AMQP
Message-oriented middleware uses the Advanced Message Queuing
Protocol (AMQP), an open standard messaging protocol. In particular,
RabbitMQ implements AMQP.
Page 70
Internet of Things (IoT): Systems and Applications
XMPP
Extensible Messaging and Presence Protocol (XMPP) was first
designed for instant messaging and other forms of real-time human-to-
human communication. To implement lightweight middleware and to route
XML data for machine-to-machine (M2M) communication, this protocol
has been adapted. Smart appliances are where XMPP is most often utilised.
The exact application needs of your IoT project will determine the
technologies you use for this layer. For instance, MQTT would be a wise
choice for a low-cost home automation system with several sensors since
the protocol is easy to implement and lightweight, making it ideal for
messaging on devices with limited storage or processing power.
Page 71
Internet of Things (IoT): Systems and Applications
The IoT devices should provide data to your network, which should
then transmit it to the correct location. An appropriate network protocol
must be required for the range. For a WAN application, for instance, that
has to operate over a range of many kilometres, avoid using BLE. Consider
edge computing if sending data across the required range is difficult.
Instead of using data from a far-off data centre or somewhere else, edge
computing examines data that is straight from the devices.
Bandwidth
The volume of data that may be sent during a transmitted amount of
time is known as the bandwidth. It restricts the amount of data that may be
transmitted from IoT devices and sent upstream. There are several factors
that impact bandwidth, including:
The volume of data that each device collects and sends
The number of deployed devices
Whether data is being transferred continuously or in short bursts, and
whether there are any particularly busy times.
The networking protocol's packet size should correspond to the volume
of data that is typically transmitted. Sending packets padded with useless
data is inefficient. In contrast, there are costs associated with dividing
bigger data amounts across too many little packets. Not all data
transmission speeds are symmetrical (that is, upload rates might be slower
than download rates). Data transmission must thus be taken into
consideration if there is two- way communication between the devices.
Because cellular and wireless networks typically have little bandwidth,
think carefully before deciding if a wireless technology is the best choice
for high- volume applications.
Think about whether or not all raw data has to be transmitted. Reduce
the amount of data that is collected by sampling less frequently as one
option. As a result, you'll record fewer variables and could filter the
device's data to eliminate irrelevant information. The volume of data
transmitted is decreased if the data is aggregated before being transmitted.
However, the granularity and flexibility of the upstream analysis are
impacted by this procedure. Time- sensitive or latency-sensitive data may
not always be suited for aggregation or bursting. All of these methods raise
the IoT device's storage and data processing needs.
Power use
Power is used when a device transmits data. In comparison to small
ranges, long range data transmission demands greater power. A device's
power source, such as a battery, solar cell, or capacitor, as well as its whole
Page 72
Internet of Things (IoT): Systems and Applications
lifespan, must be taken into account. A lengthy and robust lifespan will
increase reliability and save operating costs. Longer power supply
lifecycles may be achieved with the aid of actions. For instance, you may
put the device in sleep mode while it is inactive to increase battery life. To
make sure that the device's power supply and storage capacity correspond
with the power required to transmit the necessary data using the networking
technologies you adopted, it's also a recommended practise to model the
energy consumption of the device under various loads and network
circumstances.
Sporadic connectivity
The Internet of Things (IoT) devices are not always connected.
Devices may sometimes be designed with periodic connections in mind.
However, sometimes a faulty network may result in devices ceasing to
function as a result of connectivity problems. On a wireless network using
shared spectrum, there may sometimes be quality of service problems, such
as dealing with interference or channel congestion. If intermittent
connectivity is a key consideration in the design of the IoT landscape,
designs should take that into account and look for any solutions that can
guarantee continuous service.
Interoperability
Devices are interoperable; they can operate with other devices,
machinery, systems, and technology. Interoperability may be difficult with
the IoT since there are so many different types of connected devices. The
usual method for preserving interoperability on the Internet has been to
adopt standard protocols. Industry participants have established standards
that prevent the use of several unique designs and approaches.
Interoperability problems may be avoided with appropriate standards and
people who agree to them.
However, standardisation procedures often find it difficult to keep up
with innovation and change in the IoT. They are created and based in
accordance with standards that are currently under development and may
change. Take into account the technological ecosystem: Are they often
used? Are they proprietary or open? How many different implementations
are there?
These planning questions might help you create IoT networks with
improved interoperability and greater strength.
Security
Priority one is security. It is essential to use networking technologies
that implement end-to-end security, including open port protection,
Page 73
Internet of Things (IoT): Systems and Applications
Much of the technology needed for the Internet of Things (IoT) has
been available for some time, but connecting a world’s worth of devices to
Page 74
Internet of Things (IoT): Systems and Applications
Page 75
Internet of Things (IoT): Systems and Applications
Page 76
Internet of Things (IoT): Systems and Applications
and data paths. Today you are leveraging either public infrastructure or
leased infrastructure. That does not necessarily give you the underlining
performance that you need.
That is probably going to be a business opportunity for service
providers – to provide different classes of infrastructure. You may pay
more for something that has low latency or high determinism, and there are
services that have adapted to the ‘good-enough’ model – video streaming as
an example. On the other hand, in a lot of end- user applications, where you
have maybe security or safety-critical applications, ‘good-enough’ is not
good enough.
“The concept here is if you are providing different types of traffic over
a single IP pipe – if you are transmitting video, monitoring data, tweets, e-
mails, and a bunch of things all over one pipe, you are probably going to
want to have a better quality of service with protocol data,” Noyes
continues. “What the Intelligent Network Platform allows you to do is look
at different flows and on a packet- by-packet basis, determine what you
want to do with the packet (Figure 2). You can make it high priority or
more critical.”
Page 77
Internet of Things (IoT): Systems and Applications
Page 78
Internet of Things (IoT): Systems and Applications
The vast number of devices and rapid adoption rate demonstrates that
businesses are increasingly leveraging the opportunities enabled by IoT.
This is resulting in increased challenges for network operators and service
providers.
Page 79
Internet of Things (IoT): Systems and Applications
Page 80
Internet of Things (IoT): Systems and Applications
Page 81
Internet of Things (IoT): Systems and Applications
To learn about physical and data link layer protocols developed for
LPWAN, check out the following tutorial –
https://www.engineersgarage.com/articles/part-5physical-and-data-
link- layer-protocols-lpwan
Physical and Data Link Layer Protocols for LPWAN
To learn about physical and data link layer protocols developed for
PAN, HAN and LAN, check out the following tutorial –
Physical and Data Link Layer Protocols for LAN HAN and PAN
To learn about RFID and Mobile standards with applications in IOT,
check out the following tutorial –
Physical and Data Link Layer Protocols – RFID and Mobile Standards
To learn about various network layer protocols, check out the
following tutorial –
Page 82
Internet of Things (IoT): Systems and Applications
Page 83
Internet of Things (IoT): Systems and Applications
Page 84
Internet of Things (IoT): Systems and Applications
Page 85
Internet of Things (IoT): Systems and Applications
Page 86
Internet of Things (IoT): Systems and Applications
Page 87
Internet of Things (IoT): Systems and Applications
Page 88
Internet of Things (IoT): Systems and Applications
Page 89
Internet of Things (IoT): Systems and Applications
Page 90
Internet of Things (IoT): Systems and Applications
Page 91
Internet of Things (IoT): Systems and Applications
❖ No QoS Support
❖ Text Based Communication (XML Payload)
❖ Secure Authentication (SASL) and TLS Based Security
❖ XML Payload creation and parsing may need extra compute and
battery power.
Page 92
Internet of Things (IoT): Systems and Applications
HTTP commands.
❖ Key Highlights:
❖ Request/Response Architecture
❖ TCP/IP Based
❖ No QoS Support
❖ Complex Implementation at Client Side
❖ Larger Header compared to other IoT Protocols (Higher
Bandwidth
❖ Requirement)
❖ Uses SSL/TLS for Security
Page 93
Internet of Things (IoT): Systems and Applications
CHAPTER 4
DATA ANALYTICS AND
SUPPORTING SERVICES
4.1 Introduction
Traditional data management systems are simply unprepared for the
demands of what has come to be known as “big data.” As discussed
throughout this book, the real value of IoT is not just in connecting things
but rather in the data produced by those things, the new services you can
enable via those connected things, and the business insights that the data
can reveal. However, to be useful, the data needs to be handled organized
and controlled. Thus, a new approach to data analytics is needed for the
Internet of Things.
In IoT, the creation of massive amounts of data from sensors is
common and one of the biggest challenges—not only from a transport
perspective but also from a data management standpoint. A great example
of the deluge of data that IoT can generate is in the commercial aviation
industry and the deployed sensors throughout an aircraft. Modern jet
engines are fitted with thousands of sensors that generate 10GB of data per
second.
For example, modern jet engines, similar to the one shown in Figure 1,
may be equipped with around 5000 sensors. Therefore, a twin engine
commercial aircraft with these engines operating on average 8 hours a day
will generate over 500 TB of data daily, and this is just the data from the
engines! Aircraft today have thousands of other sensors connected to the
airframe and other systems. A single wing of a modern jumbo jet is
equipped with 10,000 sensors.
The potential for a petabyte (PB) of data per day per commercial
airplane is not farfetched—and this is just for one airplane. Across the
world, there are approximately 100,000 commercial flights per day. The
amount of IoT data coming from the commercial airline business is
overwhelming. This example is one of many highlighting the big data
problem that IoT exacerbates. Analyzing this amount of data in the most
efficient manner possible falls under the umbrella of data analytics. Data
analytics must offer actionable insights and knowledge from data, no matter
the amount or style, on time, or the full benefits of IoT cannot be realized.
Before diving deeper into data analytics, it is important to define a few
key concepts related to data. Not all data is the same; it can be categorized
Page 94
Internet of Things (IoT): Systems and Applications
Page 95
Internet of Things (IoT): Systems and Applications
Page 96
Internet of Things (IoT): Systems and Applications
final destination. This is often processed at the edge, using fog computing.
When data is processed at the edge, it may be filtered and deleted or
forwarded on for further processing and possible storage at a fog node or in
the data center. Data does not come to rest at the edge.
When data arrives at the data center, it is possible to process it in real-
time, just like at the edge, while still in motion. Tools with this sort of
capability, such as Spark, Storm, and Flink, are relatively nascent compared
to the tools for analyzing stored data. Later sections of this chapter provide
more information on these real-time streaming analysis tools that are part of
the Hadoop ecosystem. Data at rest in IoT networks can be typically found
in IoT brokers or some storage array at the data center. Myriad tools,
especially tools for structured data in relational databases, are available
from a data analytics perspective. The best known of these tools is Hadoop.
Hadoop not only helps with data processing but also data storage. It is
discussed in more detail later.
Descriptive: Descriptive data analysis tells you what is happening,
either now or in the past. For example, a thermometer in a truck engine
reports temperature values every second. From a descriptive analysis
perspective, you can pull this data at any moment to gain insight into the
current operating condition of the truck engine. If the temperature value is
too high, there may be a cooling problem or the engine experiencing too
much load.
Page 97
Internet of Things (IoT): Systems and Applications
engine failed. Diagnostic analysis might show that the engine's temperature
was too high and overheated. Applying diagnostic analysis across the data
generated by a wide range of smart objects can provide a clear picture of
why a problem or an event occurred.
Predictive: Predictive analysis aims to foretell problems or issues
before they occur. For example, with historical values of temperatures for
the truck engine, predictive analysis could estimate the remaining life of
certain components in the engine. These components could then be
proactively replaced before failure occurs. Or perhaps if temperature values
of the truck engine start to rise slowly over time, this could indicate the
need for an oil change or some other sort of engine cooling maintenance.
Prescriptive: Prescriptive analysis goes beyond predictive and
recommends solutions for upcoming problems. A prescriptive analysis of
the temperature data from a truck engine might calculate various
alternatives to cost- effectively maintain our truck. These calculations could
range from the cost necessary for more frequent oil changes and cooling
maintenance to installing new cooling equipment or upgrading to a lease on
a model with a more powerful engine. Prescriptive analysis looks at a
variety of factors and makes the appropriate recommendation.
Page 98
Internet of Things (IoT): Systems and Applications
Data acquiring
Having learnt about devices, devices-network data, messages and
packet communication to the Internet, let us understand the functions
required for applications, services and business processes at application-
Page 99
Internet of Things (IoT): Systems and Applications
support and application layers. These functions are data acquiring, data
storage, data transactions, analytics, results visualisations, IoT applications
integration, services, processes, intelligence, knowledge discovery and
knowledge management.
First, let us discuss the following terms and their meanings in IoT
application layers.
Application refers to application software or a collection of software
components. An application enables a user to perform a group of
coordinated activities, functions and tasks. Streetlights control and
monitoring is an example of an application. Software for tracking and
inventory control are other examples of applications. Tracking applications
use tags and locations data of the RFIDs.
An application enables a user to withdraw cash using an Automatic
Teller Machine (ATM). An umbrella sending warning messages for
weather (Example 1.1), a waste container management, health monitoring,
traffic lights control, synchronisation and monitoring are other examples of
IoT applications. Service denotes a mechanism, which enables the
provisioning of access to one or more capabilities. An interface for the
service provides the access to capabilities. The access to each capability is
consistent with constraints and policies, which a service-description
specifies. Examples of service capabilities are automotive maintenance or
service capabilities for the Automatic Chocolate Vending Machines
(ACVMs) for timely filling of chocolates into the machines.
Service consists of a set of related software components and their
functionalities. The set is reused for one or more purposes. Usage of the set
is consistent with the controls, constraints, and policies specified in the
service description for each service. A service also associates a Service
Level Agreement (SLA).
A service consists of a collection of self-contained, distinct and
reusable components. It provides logically grouped and encapsulated
functionalities. Traffic lights synchronising service, automobile
maintenance service, devices location, detection and tracking service, home
security-breach detection and management service, waste containers
substitution service, and health-alerts service are the examples of IoT
services.
Service Oriented Architecture (SOA) is a software architecture model
consisting of services, messages, operations, and processes. SOA
components are distributed over a network or the Internet in a high-level
business entity. New business applications and applications integration
architecture in an enterprise can be developed using an SOA.
Page 100
Internet of Things (IoT): Systems and Applications
Page 101
Internet of Things (IoT): Systems and Applications
Data Acquiring
1. Data Generation
Data generates at devices that transfer to the Internet through a
gateway later on.
Data generates as follows:
Passive devices data: Data generate at the device or system, following
the result of interactions. A passive device does not have its power source.
An external source helps such a device to generate and send data. Examples
are an RFID or an ATM debit card. The device may or may not have an
Page 102
Internet of Things (IoT): Systems and Applications
Data Acquisition
Data acquisition means acquiring data from IoT or M2M devices. The
data communicates after the interactions with a data acquisition system
(application). The application interacts and communicates with many
devices for acquiring the needed data. The devices send data on demand or
at programmed intervals. Data of devices communicate using the network,
transport and security layers.
An application can configure the devices for the data when devices
have configuration capability. For example, the system can configure
devices to send data at defined periodic intervals. Each device
configuration controls the frequency of data generation. For example,
system can configure an umbrella device to acquire weather data from the
Page 103
Internet of Things (IoT): Systems and Applications
Internet weather service, once each working day in a week. An ACVM can
be configured to communicate machine and other information sales data
every hour. The ACVM system can be configured to communicate
instantaneously in case of fault or if a specific chocolate flavour needs the
Fill service.
Application can configure sending of data after filtering or enriching at
the gateway at the data-adaptation layer. The gateway in-between
application and the devices can provision for one or more of the following
functions— transcoding, data management and device management. Data
management may be provisioning of the privacy and security, and data
integration, compaction and fusion
Device-management software provisions for device ID or address,
activation, configuring (managing device parameters and settings),
registering, deregistering, attaching, and detaching
Data validation
Data acquired from the devices does not mean that data are correct,
meaningful or consistent. Data consistency means within expected range
data or as per pattern or data not corrupted during transmission. Therefore,
data needs validation checks. Data validation software do the validation
checks on the acquired data. Validation software applies logic, rules and
semantic annotations. The applications or services depend on valid data.
Then only the analytics, predictions, prescriptions, diagnosis and decisions
can be acceptable.
Large data is acquired from a large number of devices, especially, from
machines in industrial plants or embedded components data from many
automobiles or health devices in ICUs or wireless sensor networks, and so
on. Validation software, therefore, consumes significant resources. An
appropriate strategy needs to be adopted. For example, the adopted strategy
may be filtering out the invalid data at the gateway or device itself or
controlling the frequency of acquiring or cyclically scheduling the set of
devices in industrial systems. Data enriches, aggregates, fuses or compacts
at the adaptation layer.
Page 104
Internet of Things (IoT): Systems and Applications
Data Store
A data store is a data repository of a set of objects which integrate into
the store.
Features of data store are:
Objects in a data-store are modeled using Classes which are defined by
the database schemas
A data store is a general concept. It includes data repositories such as
database, relational database, flat file, spreadsheet, mail server, web server,
directory services and VMware
A data store may be distributed over multiple nodes. Apache Cassandra
is an example of distributed data store.
A data store may consist of multiple schemas or data in only one
scheme. Example of only one scheme data store is a relational database.
Repository in English means a group related to looking for required
things, for special information or knowledge. For example, a repository of
paintings of artists. A database is a repository of data which can be relied
Page 105
Internet of Things (IoT): Systems and Applications
Server Management
Server management means managing services, setup and maintenance
of systems of all types associated with the server. A server needs to serve
around the clock. Server management includes managing the following:
Short reaction times when the system or network is down
High security standards by routinely performing system maintenance
and updation
Periodic system updates for state-of-the art setups
Optimised performance
Monitoring of all critical services, with SMS and email notifications
Security of systems and protection
Maintaining confidentiality and privacy of data
High degree of security and integrity and effective protection of data,
files and databases at the organisation Protection of customer data or
enterprise internal documents by attackers which includes spam mails,
unauthorised use of the access to the server, viruses, malwares and worms
Strict documentation and audit of all activities.
Page 106
Internet of Things (IoT): Systems and Applications
9. Spatial Storage
Consider goods with RFID tags. When goods move from one place to
another, the IDs of goods and locations are needed in tracking or inventory
control applications. Spatial storage is a spatial database that is optimised to
store and receives queries from the applications. Suppose a digital map is
required for parking slots in a city. Spatial data refers to data which
represents objects defined in a geometric space. Points, lines and polygons
are common geometric objects represented in spatial databases. Spatial
database can also represent database for 3D objects, topological coverage,
linear networks, triangular irregular networks and other complex structures.
Additional functionality in spatial databases enables efficient processing.
Internet communication by RFIDs, ATMs, vehicles, ambulances, traffic
lights, streetlights, waste containers are examples of where spatial database
are used.
Spatial database functions optimally for spatial queries. A spatial
database can perform typical SQL queries, such as select statements, and
various spatial operations. Spatial database has the following features:
❖ Can perform geometry constructors. For example, creating new
geometries
❖ Can define a shape using the vertices (points or nodes)
❖ Can perform observer functions using queries which replies
specific spatial information such as location of the centre of a
geometric object
❖ Can perform spatial measurements which mean computing
distance between geometries, lengths of lines, areas of polygons
and other parameters
❖ Can change the existing features to new ones using spatial
functions and predicate spatial relationships between geometries
using true or false type queries.
Page 107
Internet of Things (IoT): Systems and Applications
Page 108
Internet of Things (IoT): Systems and Applications
Page 109
Internet of Things (IoT): Systems and Applications
Page 110
Internet of Things (IoT): Systems and Applications
Page 111
Internet of Things (IoT): Systems and Applications
Page 112
Internet of Things (IoT): Systems and Applications
Virtualization
A characteristic of virtualized environment is that it enables
applications and services to execute in an independent execution
environment (heterogeneous computing environment). Each one of them
stores and executes in isolation on the same platform. It may execute or
access a set of data centers or servers or distributed services and computing
systems. The applications or services which are hosted remotely and are
accessible using the Internet can easily be deployed at a user application or
service in a virtualized environment, provided the Internet or other
communications are present.
Applications need not be aware of the platform, just Internet
connectivity to the platform, called cloud platform, is required. The storage
is called cloud storage. The computing is called cloud computing. The
services are called cloud services in line with the web services which host
on web servers.
Virtualization of storage means user application or service accesses
physical storage using abstract database interface or file system or logical
drive or disk drive. Storage may be accessible using multiple interfaces or
servers. For example, Apple iCloud offers storage to a user or user group
that enables sharing albums, music, videos, data store, editing files, and
collaboration among the user group members.
Network Function Virtualisation (NFV) means a user application or
service accesses the resources appearing as just one network. However, the
network access to the resources may be through multiple resources and
networks. Virtualisation of server means user application accesses not only
one server but accesses multiple servers.
Virtualised desktop means the user application can change and deploy
multiple desktops, though the access by the user is through their computer
platform (OS) that in fact may be through multiple OSs and platforms or
remote computers
Page 113
Internet of Things (IoT): Systems and Applications
Page 114
Internet of Things (IoT): Systems and Applications
Page 115
Internet of Things (IoT): Systems and Applications
CHAPTER 5
IOT PHYSICAL DEVICES AND ENDPOINTS
5.1 Introduction
Device for the Internet of Things
Any object with a unique identifier and the ability to send/receive data
(including user data) over a network qualifies as a "Thing" in the Internet of
Things (IoT) (e.g., smart phone, smartTV, computer, refrigerator, car, etc.).
Internet-connected IoT devices transmit information about themselves
or their surroundings (e.g., information sensed by connected sensors) over a
network (to other devices or servers/storage) or enable remote actuation of
physical entities/environments.
Page 116
Internet of Things (IoT): Systems and Applications
Sensors:
These are the IoT devices' front ends. These are the system's so-called
"Stuff." Their primary function is to gather data from the environment
(sensors) or transmit data to the environment (actuators).
❖ These must be individually recognisable devices with their IP address
to be easily identified over a vast network.
❖ They must be interested in nature, which means they must be able to
gather data in real time. This can either function on their own
(autonomous) or be programmed by the user to meet their specific
requirements (user-controlled).
❖ Gas, water quality, moisture, and other sensors are examples of
sensors.
❖ Processors:Processors are the IoT system's brain. Their primary
purpose is to process the data collected by the sensors in order to
derive useful information from the massive data of raw data collected.
In a nutshell, it provides intelligence to the data.
❖ Processors are often real-time devices that can be easily operated by
software. These are also in charge of data security, including
encryption and decryption.
❖ Embedded hardware devices, such as microcontrollers, process data
❖ because they have processors connected to them. Gateways:
❖ Gateways are in charge of routing processed data and directing it to the
appropriate locations for proper (data) use.
❖ In other words, a gateway facilitates data exchange between two
points. It allows data to be accessed over a network. Any IoT machine
that wants to communicate needs to be connected to the internet.
❖ Network gateways include things like LANs, WANs, and PANs.
Applications:
❖ An IoT system's applications are another end. Applications are needed
for the correct use of all collected data.
❖ These cloud-based systems are in charge of giving the data obtained a
meaningful value. Users manage applications, which serve as a
delivery point for specific services.
❖ Home automation software, security systems, industrial control hubs,
❖ and other applications are examples.
❖ In Figure 2, the extreme right block forms the application end of the
IoT system.
Page 117
Internet of Things (IoT): Systems and Applications
Page 118
Internet of Things (IoT): Systems and Applications
Page 119
Internet of Things (IoT): Systems and Applications
Page 120
Internet of Things (IoT): Systems and Applications
Page 121
Internet of Things (IoT): Systems and Applications
Page 122
Internet of Things (IoT): Systems and Applications
Page 123
Internet of Things (IoT): Systems and Applications
Page 124
Internet of Things (IoT): Systems and Applications
ports, ethernet, built-in Wi-Fi, and a 40-pin header for controlling external
circuits.
Page 125
Internet of Things (IoT): Systems and Applications
GPIO
GPIO is the Raspberry Pi's most critical function, and it's the Arduino's
equivalent of GPIO pins. These pins can read electrical signals from
circuits and provide electrical signals for controlling circuits in
programmes. When using GPIO, be cautious since they are easily damaged
and use 3.3V logic. A driver circuit (see 3.3 connecting I/O) should be used
to operate external devices that draw more than 20mA current. Relays,
inductors, and high- brightness LEDs are examples of such instruments.
MicroSD Slot
This slot stores the Raspberry Pi operating system on a microSD
card. The Pi does not come with a microSD card. This SD card also stores
all users' files, directories, notes, and photos. It is simply the computer's
hard drive.
Page 126
Internet of Things (IoT): Systems and Applications
Page 127
Internet of Things (IoT): Systems and Applications
❖ Pi (Raspberry Pi)
❖ SD card with Raspbian OS
❖ Display with HDMI input
❖ Mouse and keyboard
A Python programme that requires external libraries could not operate
on Raspbian using any of the methods mentioned below. PIP can be used to
instal additional libraries. However, it only does so for programmes that run
in the terminal window. This could be because the Python IDE programmes
have their local copy of Python. As a result, it is recommended that you run
Python programmes that require external libraries installed using PIP from
the terminal window.
Page 128
Internet of Things (IoT): Systems and Applications
Page 129
Internet of Things (IoT): Systems and Applications
Page 130
Internet of Things (IoT): Systems and Applications
Page 131
Internet of Things (IoT): Systems and Applications
Page 132
Internet of Things (IoT): Systems and Applications
Page 133
Internet of Things (IoT): Systems and Applications
CHAPTER 6
IOT PHYSICAL SERVERS AND
CLOUD OF FERINGS
Page 134
Internet of Things (IoT): Systems and Applications
Concept
In truth, cloud computing and IoT are tightly coupled. The growth of
IoT and the rapid development of associated technologiescreate a
widespread connection of ―things.‖This has lead to the production of large
amounts of data, which needs to be stored, processed and accessed. Cloud
computing as a paradigm for big data storage and analytics. While IoT is
exciting, the real innovation will come from combining it with cloud
computing. The combination of cloud computing and IoT will enable new
monitoring services and powerful processing of sensory data streams. For
example, sensory data can be uploaded and stored with cloud computing,
later used intelligently for smart monitoring and actuation with other smart
devices. Ultimately, the goal is to be able to transform data to insight and
drive productive, cost-effective action from those insights. The cloud
effectively serves as the brain to improved decision-making and optimized
internet- based interactions.However, when IoT meets cloud, new
challenges arise. There is an urgent need for novel network architectures
that seamlessly integrate them. During integration, the critical concerns are
quality of service (quality of service) and qualityof experience (QoE) and
data security, privacy, and reliability. The virtual infrastructure for practical
mobile computing and interfacing includes integrating applications, storage
devices, monitoring devices, visualization platforms, analytics tools and
client delivery. Cloud computing offers a practical utility-based model that
will enable businesses and users to access applications on demand anytime
and fromanywhere.
6.2 Characteristics
First, the cloud computing of IoT is an on-demand self service,
meaning it‘s there when you need it. Cloud computing is a web-based
service that can be accessed without any special assistance or permission
from other people; however, you need at minimum some sort of internet
access.
Second, the cloud computing of IoT involves broad network access,
meaning it offers several connectivity options. Cloud computing resources
can be accessed through many internet-connected devices such as tablets,
mobile devices and laptops. This level of convenience means users can
access those resources in a wide variety of manners, even from older
devices. Again, though, this emphasizes the need for network access points.
Third, cloud computing allows for resource pooling, meaning information
can be shared with those who know where and how (have permission) to
Page 135
Internet of Things (IoT): Systems and Applications
Page 136
Internet of Things (IoT): Systems and Applications
Page 137
Internet of Things (IoT): Systems and Applications
data to it and access and work with data stored. To the application, the
cloud storage system is just another target device, like tape or disk-based
storage. An application program interface (API) is code that allows two
software programs to communicate with each other. The API defines the
correct way for a developer to write a program that requests services from
an operating system (OS) or other application. APIs are implemented by
function calls composed of verbs and nouns. The required syntax is
described in the documentation of the application beingcalled.
Page 138
Internet of Things (IoT): Systems and Applications
Page 139
Internet of Things (IoT): Systems and Applications
These motivating examples illustrate the merit and need for converging
IoT and cloud computing infrastructure. Despite these merits, this
convergence has always been challenging mainly due to the conflicting
properties of IoT and cloud infrastructures, in particular, IoT devices tend
to be location- specific, resource-constrained, expensive (in terms of
development/ deployment cost), and generally inflexible (in terms of
resource access and availability). On the other hand, cloud computing
resources are typically location-independent and inexpensive, while at the
same time providing rapid and flexibly elasticity. To alleviate these
incompatibilities, sensors and devices are virtualized before integrating
their data and services in the cloud, to enable their distribution across cloud
resources. Furthermore, service and sensor discovery functionalities are
implemented on the cloud to discover services and sensors in different
locations.
Based on these principles, IoT/cloud convergence efforts have started
over a decade, i.e. since the early days of IoT and cloud computing. Early
efforts in the research community (i.e. during 2005-2009) have focused on
streaming sensor and WSN data in a cloud infrastructure. Since 2007 we
have also witnessed the emergence of public IoT clouds, including
commercial efforts. One of the earliest efforts has been the famous
Pachube.com infrastructure (used extensively for radiation detection and
production of radiation maps during earthquakes in Japan).
Pachube.com has evolved (following several evolutions and acquisitions of
this infrastructure) to Xively.com, which is nowadays one of the most
prominent public IoT clouds.
Nevertheless, there are tens of other public IoT clouds, such as
ThingsWorx, ThingsSpeak,Sensor-Cloud,Realtime.io, etc. The list is
certainly non-exhaustive. These public IoT clouds offer commercial pay-as-
you-go access to end-users wishing to deploy IoT applications on the cloud.
Most of them come with developer-friendly tools, which enable the
development of cloud applications, thus acting like a PaaS for IoT in the
cloud. Similarly to cloud computing infrastructures, IoT/cloud
infrastructures and related services can be classified into the following
models:
Infrastructure-as-a-Service (IaaS) IoT/Clouds: These services provide
access to sensors and actuators in the cloud. The associated business model
involves the IoT/Cloud provides to act either as a data or sensor provider.
IaaS services for IoT provide access control to resources as a prerequisite
for offering related pay-as-you-go services.
Page 140
Internet of Things (IoT): Systems and Applications
Page 141
Internet of Things (IoT): Systems and Applications
WAMP
Transport: Transport is a channel that connects two peers.
Session: The session is a conversation between two peers that run over
a transport.
Client: Clients are peers that can have one or more roles. In the
publish- subscribe model client can have the following roles:
Publisher: Publisher publishes events (including payload) to the topic
maintained by the broker.
Subscriber: Subscriber subscribes to the topics and receives the events
including the payload.
In the RPC model client can have the following roles: –
Caller: Caller issues calls to the remote procedures along with call
arguments. Callee executes the procedures to which the calls are issued by
the caller and returns the results to the caller. • Router: Routers are peers
that perform generic call and event routing. In the publish-subscribe model,
the Router has the role of a Broker: – Broker: Broker acts as a router and
routes messages published to a topic to all subscribers subscribed to the
topic.
In RPC model Router has the role of a Broker: – Dealer: Dealer acts as
a router and routes RPC calls from the Caller to the
Callee and routes results from Callee to Caller.
Application Code: Application code runs on the Clients (Publisher,
Subscriber, Callee, or Caller).
Page 142
Internet of Things (IoT): Systems and Applications
AutoScaling Policies:
AutoScaling Policies:
After creating an AutoScaling group, the scaling up and scaling down
policies are defined.
This example defines a scale-up policy with adjustment type
ChangeInCapacity and scaling_ad justment = 1.
Similarly, a scale-down policy with adjustment type ChangeInCapacity and
scaling_ad justment = -1 is defined.
CloudWatch Alarms
#Connecting to CloudWatch
cloudwatch = boto.ec2.cloudwatch.connect_to_region(REGION,
aws_access_key_id=ACCESS_KEY,
Page 143
Internet of Things (IoT): Systems and Applications
aws_secret_access_key=SECRET_KEY)
alarm_dimensions = {"AutoScalingGroupName": 'My-Group'}
#Creating a scale-up alarm scale_up_alarm = MetricAlarm(
name='scale_up_on_cpu', namespace='AWS/EC2',
metric='CPUUtilization', statistic='Average', comparison='>',
threshold='70',
period='60', evaluation_periods=2,
alarm_actions=[scale_up_policy.policy_arn],
dimensions=alarm_dimensions) cloudwatch.create_alarm(scale_up_alarm)
#Creating a scale-down alarm scale_down_alarm =MetricAlarm(
name='scale_down_on_cpu',namespace='AWS/EC2',
metric='CPUUtilization', statistic='Average', comparison='<',threshold='40',
period='60', evaluation_periods=2,
alarm_actions=[scale_down_policy.policy_arn],
dimensions=alarm_dimensions)
cloudwatch.create_alarm(scale_down_alarm)
With the scaling policies defined, the next step is to create Amazon
CloudWatch alarms that trigger these policies.
The scale-up alarm is defined using the CPUUtilization metric with the
Average statistic and threshold greater than 70% for 60 sec. The scale-up
policy created previously is associated with this alarm. This alarm is
triggered when the average CPU utilization of the instances in the group
becomes greater than 70% for more than 60seconds.
The scaled-down alarm is defined similarly with a threshold of less
than50%.
Page 144
Internet of Things (IoT): Systems and Applications
line.split(‘‘) if current_word
word: current_docids.append(doc_id) else: if current_word: print ‘%s%s‘
%
(current_word, current_docids) current_docids = []
current_docids.append(doc_id) current_word = word
The example shows an inverted index reducer program. The key-value
pairs emitted by the map phase are shuffled to the reducers and grouped by
the key. The reducer reads the key-value pairs grouped by the same key
from the standard input (stdin) and creates a list of document-IDs in which
the word occurs. The reducer's output contains key-value pairs where the
key is a unique word and value is the list of document-IDs in which the
word occurs.
Python Packages of Interest
JSON: JavaScript Object Notation (JSON) is easy to read and write
data- interchange format. JSON is used as an alternative to XML and it is
easy for machines to parse and generate. JSON is built on two structures - a
collection of name-value pairs (e.g. a Python dictionary) and ordered lists
of values (e.g.. a Python list).
XML: XML (Extensible Markup Language) is a data format for
structured document interchange. The Python minidom library provides
minimal Document Object Model interface implementation. It has an API
similar to that in other languages.
HTTPLib & URLLib: HTTPLib2 and URLLib2 are Python libraries
used in network/internetprogramming
SMTPLib: Simple Mail Transfer Protocol (SMTP) is a protocol that
handles sending email and routing e-mail between mail servers. The Python
smtplib module provides an SMTP client session object that can be used to
send emails.
NumPy:NumPy is a package for scientific computing in Python.
NumPy provides support for large multi-dimensional arrays and matrices
Scikit-learn: Scikit-learn is an open-source machine learning library for
Python that implements various machine learning algorithms for
classification, clustering, regression, and dimension reduction problems.
Page 145
Internet of Things (IoT): Systems and Applications
Page 146
Internet of Things (IoT): Systems and Applications
CHAPTER 7
INDUSTRIAL INTERNET OF THINGS (IOT)
7.1 Introduction
The Industrial Internet of Things (IIoT), sometimes known as
Industrial IoT, is a critical component of Industry 4.0. The Industrial
Internet of Things (IIoT) combines the capability of smart devices with
real-time analysis to make better use of the data that industrial equipment
has been producing for years. Smart machines are the main driver of IIoT
for two reasons. The first is that smart machines, unlike humans, can
acquire and analyse data in real time. The second benefit is that smart
machines show their results in a clear and timely way, which makes it
easier for businesses to make faster and more accurate business decisions.
Page 147
Internet of Things (IoT): Systems and Applications
Page 148
Internet of Things (IoT): Systems and Applications
Page 149
Internet of Things (IoT): Systems and Applications
Page 150
Internet of Things (IoT): Systems and Applications
Page 151
Internet of Things (IoT): Systems and Applications
Page 152
Internet of Things (IoT): Systems and Applications
Page 153
Internet of Things (IoT): Systems and Applications
transportation. IIoT may improve operational efficiency, paving the way for
new business models to emerge. It has a wide range of applications in a
variety of industries.
Production
At the moment, the most IIoT technology is used in the production
sector. Smart machines that are connected to the internet of things (IIoT)
may self-monitor and predict potential production issues. As a result, there
is less downtime and more efficiency.
Building Management
Most concerns with building management can be solved using IIoT
technology. Sensor-driven climate control eliminates any uncertainty in
maintaining a building's interior environment by taking into account all
relevant factors such as the number of people, ventilation spots, equipment,
and so on. The IIoT makes buildings more secure by having smart devices
that look for threats at every entrance point.For a long time, healthcare has
been embracing smart devices. Healthcare experts may keep an eye on
patients from afar and be notified if their condition changes. This improves
the precision and personalization of healthcare. Artificial intelligence might
allow physicians to make more accurate and effective diagnoses, allowing
them to treat patients more successfully.
Retail
In retail, IIoT technology allows for swift marketing choices tailored to
each location. Companies may update storefronts based on consumer
preferences in certain regions, and they can better target audiences with
targeted marketing. These data-driven insights make a shop different from
its competitors.
Sensors are not a new technology; companies have been using them for
years to track cargo and monitor machinery. This is because the IIoT makes
Page 154
Internet of Things (IoT): Systems and Applications
it easier for more people to use sensors, complete wiring networks, and big-
data analytics at the same time.
According to IDC, manufacturers spend $197 billion on IIoT each
year. It has received a total investment of $71 billion from transportation
companies alone. Companies are allocating funds for IIoT, but how they
spend these funds differs from company to company, depending on their
goals.
Page 155
Internet of Things (IoT): Systems and Applications
Page 156
Internet of Things (IoT): Systems and Applications
The higher the security threats, the more networked an environment is:
❖ Software flaws are simple prey for hackers to attack.
Internet-connected devices and systems are searchable by the
general public.
❖ The number of hacking attempts is increasing, resulting in targeted
attacks and data loss.
❖ System manipulation or sabotage efforts cause operations to be
interrupted.
❖ System failure causes equipment damage or, even worse, bodily
harm to personnel.
❖ Extortion attempts as a result of hacked operational technologies
❖ Increased penalties for making private information public in
violation of the law.
As a result, IoT and IIoT have a lot of different types of technology,
which could lead to systems that don't work if processes aren't properly or
efficiently managed.
Page 157
Internet of Things (IoT): Systems and Applications
Full-Stack Protection
Security must be built into all of the important parts of the IIoT.
The device: This layer comprises of IIoT devices and the
accompanying applications offered by different manufacturers and service
providers. IIoT adopters should know how manufacturers and service
providers use, transmit, and keep data. If there is a security breach,
manufacturers and service providers need to be able to quickly tell
businesses about it, so they don't lose money.
The network area has a gateway via which data is collected from
devices. Organizations need to have state-of-the-art intrusion prevention
systems (IPSs) to screen for potential assaults. The control centre houses
this gateway, which sends orders to numerous devices. To protect the
control center from malware and hackers, security measures must be put in
place.
Cloud security: Providers must have server-based protection against
hackers who try to take control of systems and data from them.
Page 158
Internet of Things (IoT): Systems and Applications
Page 159
Internet of Things (IoT): Systems and Applications
❖ Interconnected logistics
❖ Smart metering and smart grid
❖ Eco-friendly alternatives
❖ Smart city applications
❖ Intelligent farming and livestock monitoring.
❖ Industrial facility security systems
❖ energy consumption optimization
❖ Workplace HVAC (heating, ventilation, and air conditioning)
❖ manufacturing equipment monitoring
❖ Asset tracking and smart logistics are two of the most important
aspects of asset management.
❖ Ozone, gas, and temperature monitoring in industrial settings.
❖ monitoring of employees' safety and health conditions.
❖ Asset performance management
❖ Remote service, field service, remote maintenance, and control use
cases
❖ The Industrial Internet of Things market's size, growth, and
economic impact
The IIoT presents a massive market potential. According to
IndustryARC research (June 2016), the industrial IoT market is expected to
reach $123.89 billion by 2021.
In the picture below, you can also see Morgan Stanley's estimates,
Accenture's data on the impact of IIoT on the global economy, and
Research and Markets' forecast. Leaders in the IIoT field, including GE,
have similarly high projections. Again, it depends on how you define IIoT
and what you measure.
There was a lot of information about the size and impact of the
Industrial Internet of Things that Morgan Stanley, IndustryARC,
Accenture, and Research and Markets gave to us.
The primary challenges in implementing the Industrial Internet of
Things
Even though the Industrial Internet of Things is expected to grow,
there are still problems.
Visual Capitalist's infographic at the bottom of this page, as well as
Morgan Stanley's and other research, illustrates a few. An overview of the
IIoT challenges as seen by executives
Page 160
Internet of Things (IoT): Systems and Applications
Page 161
Internet of Things (IoT): Systems and Applications
Page 162
Internet of Things (IoT): Systems and Applications
5
steps to start and optimize IIoT projects – based upon Dell IIoT
presentation Based on a Dell IIoT presentation, here are five steps to get
started and optimise IIoT initiatives.
Page 163
Internet of Things (IoT): Systems and Applications
Create Partnerships
As previously mentioned, partnerships between OT and IT are crucial.
However, business decision-makers must be engaged as well. IDC says that
for every digital transformation project, you should build partnerships and
work with people who aren't obvious.
Determine the business consequences and return on investment.
This may seem self-clear, but as almost every IoT expert will tell you,
the business benefits aren't always evident.
For IIoT initiatives, as for others, unclear business benefits are just
fatal. An IIoT project begins with the discovery of an idea, a need, or an
opportunity. However, the business case must be clear.
Page 164
Internet of Things (IoT): Systems and Applications
studies are excellent for helping you see the benefits without relying on too
much theory.
Manufacturing: ABB Robotics' IIoT-connected services offering
Thanks to the Industrial Internet of Things, ABB Robotics was able to
increase productivity, improve customer service, and create a new linked
services approach.
ABB Robotics, a branch of the automation giant ABB, creates
industrial robots for its customers. Because of the Internet of Things, the
company was able to go from fixing problems with robots after the fact to
being able to fix them remotely and completely change the company's
service offerings in this technologically dense environment.
Engineers may analyze difficulties without having to travel to the
client by creating a linked ecosystem of the industrial robots that the
company has deployed for them, often at difficult-to-reach customers. In an
environment where uptime is critical, this results in actual benefits for
customers. The Internet of Things (and the platforms that exploit the data
and insights gained from it) opened new opportunities for ABB Robotics to
build new services and online applications that allow monitoring, asset
optimization, and more.
Page 165
Internet of Things (IoT): Systems and Applications
CHAPTER 8
IOT APPLICATIONS & CASE STUDIES
Page 166
Internet of Things (IoT): Systems and Applications
Page 167
Internet of Things (IoT): Systems and Applications
Connected Car
Page 168
Internet of Things (IoT): Systems and Applications
Page 169
Internet of Things (IoT): Systems and Applications
Page 170
Internet of Things (IoT): Systems and Applications
Page 171
Internet of Things (IoT): Systems and Applications
❖ Butler IoT anticipates your arrival and ensures that your home is
fully prepared.Its visual displays bring together your assets,
family, and the kingdom of your own home. It takes action to
resolve any problems that arise.
❖ Chef – An IoT kitchen may prepare meals for you or assist you in
preparing them.
❖ In the event of an emergency, Nanny IoT can act as a mother or
father by regulating access, providing supplies, and notifying the
appropriate people.
❖ Gardner A farm's IoT infrastructure may be used for home
landscaping as well.
❖ Repairman Smart systems both perform routine maintenance and
repairs and make requests for them.
❖ The IoT security shield monitors you 24 hours a day, seven days a
week.It may detect suspicious people from a long distance and
predict the potential of young equipment problems.
c. Wearable technology
Wearables are often used for personal healthcare, but they're also
gaining popularity for applications other than smartwatches and health
monitors.
Wearables, for example, are used to keep factory workers safe. This
means they are part of the commercial web of things.
The majority of wearables, on the other hand, are consumer
electronics. The market is on the lookout for smart wearables that are less
reliant on cellphone technology.
Page 172
Internet of Things (IoT): Systems and Applications
e. Workplace
Have fun with it.
For my part, the IoT learns just as much about you as it does
professionally. This enables the next generation to direct their delight.
❖ Entertainment and nightlifeIoT can look at what you do and how
you react in the real world to help you find more things and places
you like, like suggesting restaurants and events based on your
preferences and past events.
❖ ## Holidays For some, making plans and budgeting for vacations
is tough, and many firms that use IoT can be replaced.
❖ Goods and servicesDue to its deeper access, IoT provides a more
accurate assessment of the products you desire and need than
existing analytics. It uses data from important areas of your life,
such as your money, to make answers.
❖ IIoT (Industrial Internet of Things) Applications
The Industrial Internet of Things (IIoT) is a fast-rising market that
accounts for the majority of worldwide IoT investment.
Industrialists and manufacturers in practically every industry have a
fantastic chance to not only monitor but also to act. However, many
complicated manufacturing processes may be automated.
Sensors and systems have been used to measure development in
businesses and facilities for a long time. IoT, on the other hand, goes a step
farther and adds complexity to even the tiniest problems.
Let's have a look at some of the IoT's applications in manufacturing
and industrial operations.
Page 173
Internet of Things (IoT): Systems and Applications
a. Precision Farming
Precision farming is a process or a practice that makes the farming
procedure more accurate and controlled for raising livestock and growing
crops. In this approach, the use of IT and items like sensors, autonomous
vehicles, automated hardware, control systems, robotics, etc in this
approach are key components.
Precision agriculture in the recent years has become one of the most
famous applications of IoT in agricultural sector and a vast number of
organizations have started using this technique around the world.
The products and services offered by IoT systems include soil moisture
probes, VRI optimization, virtual optimizer PRO, etc.
VRI (Variable Rate Irrigation) optimization is a process that
maximizes the profitability on irrigated crop fields with soil variability,
thereby improving yields and increasing water use efficiency.
b. Agriculture Drones
Agricultural drones are a very good example of IoT applications in
Agriculture. Today, agriculture industries have become one of the major
industries that drones can incorporate.
Two types of drones, that is, ground-based and aerial-based drones are
being incorporated in agriculture in many ways such as, for crop health
assessment, irrigation, planting, and soil & field analysis.
Page 174
Internet of Things (IoT): Systems and Applications
The benefits that the usage of drones brings to the table include, ease
of use, time-saving, crop health imaging, integrated GIS mapping, and the
ability to increase yields.
The drone technology will give a high-tech makeover to the agriculture
industry by using strategy and planning based on real- time data collection
and processing.
The farmers through drones can enter the details of what field they
want to survey. Select an altitude or ground resolution from which they
what fields' data.
From the data collected by the drone, useful insights can be drawn on
various factors such as plant counting and yield prediction, plant health
indices, plant height measurement, canopy cover mapping, nitrogen content
in wheat, drainage mapping, and so on.
The drone collects data and images that are thermal, multispectral and
visual during the flight and then lands at the same location it took off
initially.
c. Livestock Monitoring
IoT applications help farmers collect data regarding the location, well-
being, and health of their cattle. This information helps them in identifying
the condition of their livestock.
Such as, finding sick animals so that they can separate from the herd,
preventing the spread of the disease to the entire cattle. The feasibility of
ranchers locating their cattle with the help of IoT-based sensors helps bring
down labor costs by a substantial amount.
One example of an IoT system used by a company is JMB North
America. Which is an organization that provides cow monitoring solutions
to cattle producers? One of the many solutions provided is to help the cattle
owners observe their cows that are pregnant and about to give birth.
From them, a battery that is sensor powered is expelled when its water
breaks. An information is then sent to the herd manager or the rancher. The
sensor thus enables farmers will more focus.
d. Smart Greenhouses
Greenhouse farming is a technique that enhances the yield of crops,
vegetables, fruits etc. Greenhouses control environmental parameters in two
ways; either through manual intervention or a proportional control
mechanism.
Page 175
Internet of Things (IoT): Systems and Applications
Page 176
Internet of Things (IoT): Systems and Applications
content cloth companies and digital marketers determine how many human
beings noticed the identical advert on a couple of structures and how many
impressions precipitated conversions.
27% of agencies that leverage IoT-driven records for advertising
purposes record a regular revenue increase.
d. Advanced Advertising
Modern advertising and marketing is poorly concentrated on. No
matter modern day analytics, contemporary-day advertising fails. IoT
guarantees exceptional and personalized advertising and marketing in
preference to one-size-fits-all strategies.
It transforms marketing from noise to a realistic part of life because of
the truth purchasers engage with advertising and marketing through IoT in
preference to in reality receiving it.
This makes advertising and marketing extra realistic and beneficial to
humans searching the market for answers or questioning if those solutions
exist.
Page 177
Internet of Things (IoT): Systems and Applications
The wi-fi network is used by the smart devices on campus to send facts
and receive orders. A computational internet of things device can be used
by teachers and learning facilities to make better lesson plans, keep track of
important resources, improve admission records, make campuses safer, and
more.
These are some key areas in which the Internet of Things may be used
in education.
C. Learning can Take Place at any Time and from any Location.
The Internet of Things (IoT) plays a vital role in the construction of a
network using unique internet-based solutions. Academics may use
advanced technology to show how their scholars have progressed. Edmodo
is a fantastic tool for trainer-pupil communication.
Edmodo enables newcomers to have access to information from any
place. Using the Internet of Things, students and teachers can connect in
new ways. For example, they can keep an eye on messages and upcoming
events while they're not in the classroom, or even respond to social media
posts.
Page 178
Internet of Things (IoT): Systems and Applications
It's a powerful program that ensures a secure network and total privacy.
It also enables you to preserve your individual ideas and class assignments
without fear of losing secrecy.
Extraordinary safety features
IoT's application in education is critical, since applying advanced
technology solutions in classrooms and training areas may be quite
beneficial. It features emergency indications, audio augmentation, wi-fi
clocks, and hearing-impaired warnings, all of which provide a sense of
security to the scholars and workers.
It may also help to mitigate the destruction and save lives that can
occur in the aftermath of a catastrophe. Colleges and educational
institutions are using particular security measures to help calm down their
campuses.
Special emergency tones, live bulletins, a couple of bell schedules, and
pre-recorded instructional messages may all be used with the IoT-enabled
communications system to lead a group of workers and students in an
emergency.
Page 179
Internet of Things (IoT): Systems and Applications
and the medication they will be taking. It also gives students the option of
verifying their daily meal.
a. National Defense
Threats to a country's national security vary in severity and complexity.
IoT enhances and supports militia systems and services, as well as provides
the technology required to control the national defense landscape.
It helps to increase border security by providing more affordable, high-
performance devices that are both controllable and outstanding.
IoT automates the safety obligations that are often distributed across
various departments and people. This is accomplished while improving
accuracy and speed.
Page 180
Internet of Things (IoT): Systems and Applications
d. Creating Jobs
This is one of the most Important government applications in IoT. IoT
offers thorough economic evaluation. It makes previous blind spots seen
and helps better monetary tracking and modeling. It analyzes the industry
and the market to spot possibilities for increase and obstacles.
Page 181
Internet of Things (IoT): Systems and Applications
Page 182
Internet of Things (IoT): Systems and Applications
a. Dependability
The IoT system ensures system dependability by providing actionable
data and analytics. In addition to efficient utilisation, the IoT prevents a
system from being throttled or overwhelmed.
By paying attention to system performance and stability issues, the
system is protected from things like broken equipment, down time, and
injuries.
B. Industrial Power
Small firms' high energy organizations, which result in increased
energy waste, may have a significant influence on enterprises. Smaller
organisations deliver products with lower profit margins. They struggle to
keep company expenditures in check while working with limited cash and
technology.
Larger organisations are in charge of monitoring a vast, complicated
ecology of energy consumption with few effective and easy energy
management solutions.
Page 183
Internet of Things (IoT): Systems and Applications
C. Domestic Energy
The growing technology of energy is a result of technological
advancements. Consumers are always looking for strategies to control or
minimise their consumption. IoT has a wide range of ways to look at and
improve use across the whole home system as well as at the level of each
individual device.
This could be as simple as dimming the lights, turning them off, or
changing different home settings or gadget settings to use less energy.
IoT also has the capability of detecting problematic consumption
patterns that are caused by problems like defective appliances, ageing
appliances, or faulty system components. Environmental Monitoring using
the Internet of Things We'll go through four key IoT environmental
monitoring applications that are good for the environment.
Page 184
Internet of Things (IoT): Systems and Applications
providing a better service to residents who can use those slots and as an
efficient tool to spot any violations quickly.
Things-on-the-internet IoT Environmental Monitoring – Vehicle
Tracking
Manual labour, complex instrumentation, and lab processing
procedures are mostly used in the present monitoring technology for air and
water safety. The use of IoT systems reduces the requirement for physical
labour.
As a result, more frequent sampling is allowed, broadening the range
of monitoring and sampling, enabling comprehensive on-site testing and
reacting to detecting systems. In this way, there is less risk that more water
bodies and other natural resources will become polluted and that there will
be more natural disasters, too.c. Severe Weather
Deep monitoring is possible because of today's powerful, modern
weather forecasting technologies. They do, however, suffer from the use of
widespread equipment like radar and satellites. These small- scale gadgets
lack the precision targeting capabilities of smart technology.
Benefits of IoT Environmental Monitoring-Extreme Weather
Now, thanks to recent IoT advancements, the IoT system can get more
detailed data, be more flexible, and be more accurate now, too.
Weather forecasting processes that are effective need a high level of
detail and flexibility in terms of equipment kind, range, and deployment. As
a result, early interventions are possible, preventing the loss of life and
property.
a. Vehicle
Most automotive firms have begun to imagine a future for automobiles
in which IoT makes vehicles "smart," providing enticing options similar to
MRT, yet IoT provides few significant advantages to private automobiles.
Better control over connected infrastructure and the inherent
weaknesses in vehicle transportation provide the greatest advantages. On
the other hand, IoT improves private motors in non- public areas. IoT
Page 185
Internet of Things (IoT): Systems and Applications
D. Industrial Transportation
The benefits of managing the transportation arm of enterprises extend
to commercial enterprises and manufacturing.
Analytical tools make it easier to control and monitor things like idling
and fuel use, as well as idling and travel time. This lowers and eliminates
problems caused by poor fleet control.
Page 186
Internet of Things (IoT): Systems and Applications
B. Devices
Even if existing devices are advancing in terms of power, precision,
and availability, they still fall short of the advantages and attributes
provided by an IoT system. The Internet of Things has the potential to
unlock current technologies and lead to improved healthcare and medical
device solutions.
By developing a system rather than merely tools, the Internet of Things
seeks to bridge the gap between how we deliver healthcare and the
equipment. It then looks for weaknesses, trends, and missing aspects in
healthcare, and makes recommendations for changes.
Benefits of IoT in Healthcare – Devices
Benefits of the Internet of Things in Healthcare – Devices Benefits of
the Internet of Things in Healthcare – Devices C. Take care
The Internet of Things allows healthcare practitioners to better use
their expertise and training to address issues. It enables them to make
greater use of data and equipment, allowing them to take more accurate and
quick actions.
IoT empowers healthcare professionals to advance their careers by
allowing them to put their skills to use rather than wasting time on
administrative activities.
Applications of the Internet of Things in Healthcare - Care
Page 187
Internet of Things (IoT): Systems and Applications
E. Immediate Care
Limited resources and disconnections from the base facility have
traditionally plagued emergency response services. IoT's sophisticated
automation and analytics address this issue in the healthcare industry.
An emergency may be assessed from a long way away, even
kilometres distant. Providers have access to patient profiles well in advance
of their arrival. They have the ability to provide critical care to patients on
schedule. Associated losses are decreased as a result, and emergency health
care is improved.
The Internet of applications in Healthcare - Emergency Care
Applications of the Internet of Things in Law Enforcement Regulation
enforcement in an area that plays a significant role in securing people and
ensuring that they are protected is one way to enhance human life. Because
criminal charges are on the rise all across the world, policing is vital.
Law enforcement agencies are using technology to make that its staff
are up to date on technology in order to better do their responsibilities as
part of their mission to reduce crime rates.
It's no surprise that bundles of IoT in law enforcement are being sought
to improve the government's present reputation.
The Internet of Things (IoT), a dynamic age that has delivered
significant improvements in a variety of sectors, is now altering the realm
of law enforcement. Here are several IoT applications in law enforcement
that might help people and authorities boost law enforcement's cutting-edge
reputation.
Page 188
Internet of Things (IoT): Systems and Applications
Page 189
Internet of Things (IoT): Systems and Applications
e. Surveillance
It's not always easy to enforce the law. Through greater information,
data sharing, and superior automation, the Internet of Things serves as a
regulatory enforcement instrument that helps people expend less effort and
make better judgments.
IoT technologies save costs by reducing human labour in certain
regions while also reducing positive traffic offences.
IoT contributes in the development of better solutions to challenges via
the use of generation in the pressure area.
A far-flung statement, documented film of infractions, and digital
ticketing, for example, may be replaced by moderate in-person or women
examinations of suspicious activities. It also decreases corruption by
removing human control and opinion in the case of a few minor infractions.
Page 190
Internet of Things (IoT): Systems and Applications
Acronyms
HVAC Heating Ventilation and Air Conditioning
MWSN Mobile Wireless Sensor Network
WSN Wireless Sensor Network
IoT Internet of Things
IoE Internet of Everything AWS
Amazon Web Services
MitM Man in the Middle (attack)
MEMSMicro Electro Mechanical Systems
RFID Radio Frequency Identification
FCC Federal Communications Commision
M2M Machine to Machine
IP Internet Protocol
IPv6 Internet Protocol version 6
BPME Business Process Management Everywhere
EIoT Enterprise Internet of Things
A2DP Advanced Audio Distribution Profile
ACL Asynchronous Connection-Less
ASB Active Slave Broadcast
ATT ATTribute protocol
AVCTP Audio/Video Control Transport Protocol
AVDTP Audio/Video Distribution Transport Protocol
AVRCP Audio/Video Remote Control Profile
BLE/LE Bluetooth Low Energy / Low Engery
(Both terms are used to alternately)
Bluetooth SIG Bluetooth Special Interest Group
BNEP Bluetooth Network Encapsulation Protocol BR/EDR Basic
Rate / Enhanced Data Rate
DUN Dial-Up Networking
GATT Generic ATTribute profile
HCI Host Controller Interface
HCRP Hard Copy Replacement Profile
HFP Hands-Free Profile
HID Human Interface Device
HOGP HID over GATT Profile
IPSP Internet Protocol Support Profile L2CAPLogical Link
Control and Adaptation Protocol LC Link Control (protocol)
LELL Low Energy Link Layer
LL Link Layer
Page 191
Internet of Things (IoT): Systems and Applications
References
1. Internet of Things - A Hands-on Approach, Arshdeep Bahga and
Vijay Madisetti, Universities Press, 2015, ISBN: 9788173719547
2. Getting Started with Raspberry Pi, Matt Richardson & Shawn
Wallace, O'Reilly (SPD), 2014,ISBN: 9789350239759
Vijay Madisetti, Arshdeep Bahga, Internet of Things: A Hands-On
3. Approach
4. Waltenegus Dargie,Christian Poellabauer, “Fundamentals of
Wireless Sensor Networks: Theory and Practice”
5. Beginning Sensor networks with Arduino and Raspberry Pi –
Charles Bell, Apress, 2013
Page 192
View publication stats