Arch
Arch
Arch
Perception Layer :
This is the first layer of IoT architecture. In the perception layer, number
of sensors and actuators are used to gather useful information like
temperature, moisture content, intruder detection, sounds, etc. The main
function of this layer is to get information from surroundings and to pass
data to another layer so that some actions can be done based on that
information.
Network Layer :
As the name suggests, it is the connecting layer between perception and
middleware layer. It gets data from perception layer and passes data to
middleware layer using networking technologies like 3G, 4G, UTMS, Wi-
Fi, infrared, etc. This is also called communication layer because it is
responsible for communication between perception and middleware layer.
All the transfer of data done securely keeping the obtained data
confidential.
Middleware Layer :
Middleware Layer has some advanced features like storage, computation,
processing, action taking capabilities. It stores all data-set and based on
the device address and name it gives appropriate data to that device. It
can also take decisions based on calculations done on data-set obtained
from sensors.
Application Layer :
The application layer manages all application process based on
information obtained from middleware layer. This application involves
sending emails, activating alarm, security system, turn on or off a device,
smartwatch, smart agriculture, etc.
Business Layer :
The success of any device does not depend only on technologies used in
it but also how it is being delivered to its consumers. Business layer does
these tasks for the device. It involves making flowcharts, graphs, analysis
of results, and how device can be improved, etc.
super powers
As the Internet of Things (IoT) continues to expand and evolve, understanding its
architecture is key for any organization looking to become a data-driven digital
enterprise. IoT is transforming how we connect and interact with devices. What
makes it even more remarkable is its intricately designed architecture, which enables
all the pieces of a system to function together seamlessly. By understanding IoT
architecture, you can help create a more intelligent world with better connectivity and
communication.
Perception Layer
This layer is also called the physical layer. It is the base of IoT and consists of
physical components such as sensors, power networks, and embedded systems.
The physical layer is responsible for capturing data and physical events from the
physical environment. This layer handles the physical connections between objects,
sensors, and other physical devices.
Transport Layer
The transport layer is an essential component of IoT architecture. It allows data
collection and transmission between networks like 3G, radio-frequency identification
(RFID), and ZigBee. The network layer is responsible for relaying data between
networks. It ensures the reception of data in an organized and secure manner.
The transport layer provides an interface between networks, allowing them to
communicate with each other. Security is also important at this layer, as it ensures
data integrity, confidentiality, and authentication. It also provides methods for
accessing networks, such as IP addressing and port numbers. By providing these
services, the transport layer ensures the security and reliability of the networks that
are part of an IoT system.
Processing Layer
The processing layer has the responsibility to store, analyse, and transform data
from the transport layer. This layer consists of cloud computing systems that can
process data from the physical environment and make sense of it. It receives the raw
data collected from sensors and processes it into useful information through cloud
services and big data modules.
The processing layer also enables the system to act on data and respond in real-
time. It's responsible for making decisions and taking action based on the data it
receives. This layer is also used to make predictions and provide insights based on
the data collected in the perception stage. It's also referred to as the middleware
layer, because it is the third of the five layers in IoT architecture.
Application Layer
This layer consists of applications and services created on top of the processing
layer. It is the most visible layer to end users. It consists of smart home applications,
connected cars, smart health, and smart cities. The layer provides you with access
to the data collected and processed in the other layers. It allows you to view,
analyse, and act on data from the network.
The application layer enables secure and user-friendly interaction, which is
necessary for the successful implementation of IoT architecture.
Business Layer
The business layer is designed to control the business models and transactions
associated with the connected devices. This layer encompasses business rules,
business analytics, and business process management. It is the layer responsible for
handling the business logic and setting up business processes to ensure that all the
business goals of the IoT system are met.
The layer also plays an important role in protecting your privacy. It ensures that the
data collected is stored securely and that users have control over the use of their
data. This layer can also improve the user experience through personalized services
based on user profiles and preferences.
WSN can be used for processing, analysis, storage, and mining of the data.
Applications of WSN:
1. Quality of Service
2. Security Issue
3. Energy Efficiency
4. Network Throughput
5. Performance
6. Ability to cope with node failure
7. Cross layer optimisation
8. Scalability to large scale of deployment
A modern Wireless Sensor Network (WSN) faces several challenges,
including:
Limited power and energy: WSNs are typically composed of battery-
powered sensors that have limited energy resources. This makes it
challenging to ensure that the network can function for
long periods of time without the need for frequent battery replacements.
Limited processing and storage capabilities: Sensor nodes in a WSN
are typically small and have limited processing and storage capabilities.
This makes it difficult to perform complex tasks or store large amounts of
data.
Heterogeneity: WSNs often consist of a variety of different sensor types
and nodes with different capabilities. This makes it challenging to ensure
that the network can function effectively and
efficiently.
Security: WSNs are vulnerable to various types of attacks, such as
eavesdropping, jamming, and spoofing. Ensuring the security of the
network and the data it collects is a major challenge.
Scalability: WSNs often need to be able to support a large number of
sensor nodes and handle large amounts of data. Ensuring that the
network can scale to meet these demands is a significant
challenge.
Interference: WSNs are often deployed in environments where there is a
lot of interference from other wireless devices. This can make it difficult to
ensure reliable communication between sensor nodes.
Reliability: WSNs are often used in critical applications, such as
monitoring the environment or controlling industrial processes. Ensuring
that the network is reliable and able to function correctly
in all conditions is a major challenge.
Components of WSN:
1. Sensors:
Sensors in WSN are used to capture the environmental variables and
which is used for data acquisition. Sensor signals are converted into
electrical signals.
2. Radio Nodes:
It is used to receive the data produced by the Sensors and sends it to the
WLAN access point. It consists of a microcontroller, transceiver, external
memory, and power source.
3. WLAN Access Point:
It receives the data which is sent by the Radio nodes wirelessly, generally
through the internet.
4. Evaluation Software:
The data received by the WLAN Access Point is processed by a software
called as Evaluation Software for presenting the report to the users for
further processing of the data which can be used for processing, analysis,
storage, and mining of the data.
Advantages of Wireless Sensor Networks (WSN):
Low cost: WSNs consist of small, low-cost sensors that are easy to deploy,
making them a cost-effective solution for many applications.
Wireless communication: WSNs eliminate the need for wired connections,
which can be costly and difficult to install. Wireless communication also
enables flexible deployment and reconfiguration of the network.
Energy efficiency: WSNs use low-power devices and protocols to conserve
energy, enabling long-term operation without the need for frequent battery
replacements.
Scalability: WSNs can be scaled up or down easily by adding or removing
sensors, making them suitable for a range of applications
and environments.
Real-time monitoring: WSNs enable real-time monitoring of physical
phenomena in the environment, providing timely information for decision
making and control.
Disadvantages of Wireless Sensor Networks (WSN):
Limited range: The range of wireless communication in WSNs is limited,
which can be a challenge for large-scale deployments or in environments
with obstacles that obstruct radio signals.
Limited processing power: WSNs use low-power devices, which may have
limited processing power and memory, making it difficult to perform complex
computations or support advanced applications.
Data security: WSNs are vulnerable to security threats, such as
eavesdropping, tampering, and denial of service attacks, which can
compromise the confidentiality, integrity, and availability of data.
Interference: Wireless communication in WSNs can be susceptible to
interference from other wireless devices or radio signals, which can degrade
the quality of data transmission.
Deployment challenges: Deploying WSNs can be challenging due to the
need for proper sensor placement, power management, and network
configuration, which can require significant time and resources.
while WSNs offer many benefits, they also have limitations and challenges
that must be considered when deploying and using them in real-world
applications.
2. Cloud Computing :
It provides us the means by which we can access applications as utilities
over the internet. Cloud means something which is present in remote
locations.
With Cloud computing, users can access any resources from anywhere like
databases, webservers, storage, any device, and any software over the
internet.
Characteristics –
1. Broad network access
2. On demand self-services
3. Rapid scalability
4. Measured service
5. Pay-per-use
Provides different services, such as –
IaaS (Infrastructure as a service)
Infrastructure as a service provides online services such as physical
machines, virtual machines, servers, networking, storage and data center
space on a pay per use basis. Major IaaS providers are Google Compute
Engine, Amazon Web Services and Microsoft Azure etc.
Ex : Web Hosting, Virtual Machine etc.
PaaS (Platform as a service)
Provides a cloud-based environment with a very thing required to support
the complete life cycle of building and delivering West web based (cloud)
applications – without the cost and complexity of buying and managing
underlying hardware, software provisioning and hosting. Computing
platforms such as hardware, operating systems and libraries etc.
Basically, it provides a platform to develop applications.
Ex : App Cloud, Google app engine
SaaS (Software as a service)
It is a way of delivering applications over the internet as a service. Instead
of installing and maintaining software, you simply access it via the
internet, freeing yourself from complex software and hardware
management.
SaaS Applications are sometimes called web-based software on demand
software or hosted software.
SaaS applications run on a SaaS provider’s service and they manage
security availability and performance.
Ex : Google Docs, Gmail, office etc.
4. Communications Protocols :
They are the backbone of IoT systems and enable network connectivity and
linking to applications. Communication protocols allow devices to exchange
data over the network. Multiple protocols often describe different aspects of a
single communication. A group of protocols designed to work together is
known as a protocol suite; when implemented in software they are a protocol
stack.
They are used in
1. Data encoding
2. Addressing schemes
5. Embedded Systems :
It is a combination of hardware and software used to perform special tasks.
It includes microcontroller and microprocessor memory, networking units
(Ethernet Wi-Fi adapters), input output units (display keyword etc. ) and
storage devices (flash memory).
It collects the data and sends it to the internet.
Embedded systems used in
Examples –
1. Digital camera
2. DVD player, music player
3. Industrial robots
4. Wireless Routers etc.
The essential component of the embedded system is a RISC family microcontroller like
Motorola 68HC11, PIC 16F84, Atmel 8051 and many more. The most important factor
that differentiates these microcontrollers with the microprocessor like 8085 is their
internal read and writable memory. The essential embedded device components and
system architecture are specified below.
Fig: Basic Embedded System