KCS 712 IOT Notes
KCS 712 IOT Notes
Topics to be covered
Definition-The Internet of Things, also called The Internet of Objects, refers to a wireless
network between objects. By embedding short-range mobile transceivers into a wide array of
additional gadgets and everyday items, enabling new forms of communication between
people and things, and between things themselves. The term Internet of Things has come to
describe a number of technologies and research disciplines that enable the Internet to reach
out into the real world of physical objects. Things having identities and virtual personalities
operating in smart spaces using intelligent interfaces to connect and communicate within
social, environmental, and user contexts. From any time, any place connectivity for anyone,
we will now have connectivity for anything.
2. Access Layer-
Context Data will be reached to internet via IoT Gateway as captured by short range
devices in form of raw data. Access layer comprises topology definition, network
initiation, creation of domains etc. This layer also includes connection setup, intra-
inter domain communication, scheduling, packet transmissions between flow-sensors
and IoT gateway. The simulation was run later in this paper for different scenario
based on this layer. Feature management contains a feature filter which accepts only
acceptable context data and redundant data are rejected. Large number of sensor
maintains lots of features but only a small subset of features is useful generate a
context data.
Feature filter helps to reduce irrelevant data transmission, increases the data transfer
rate of useful data and reduce energy and CPU consumption too. Number of features
can be different based on the application requirements and context data types.
3. Abstraction Layer-
interrelated and combined in order to meet the demand socio- economic factors such
as environment analysis, safety measurement, climate management, agriculture
modernization etc.
IOT Functional View-The Internet of Things concept refers to uniquely identifiable things
with their virtual representations in an Internet-like structure and IoT solutions comprising a
number of components such as
(1) Module for interaction with local IoT devices. This module is responsible for acquisition of
observations and their forwarding to remote servers for analysis and permanent storage.
(2) Module for local analysis and processing of observations acquired by IoT devices.
(3) Module for interaction with remote IoT devices, directly over the Internet. This module is
responsible for acquisition of observations and their forwarding to remote servers for
analysis and permanent storage.
(4) Module for application specific data analysis and processing. This module is running on an
application server serving all clients. It is taking requests from mobile and web clients and
relevant IoT observations as input, executes appropriate data processing algorithms and
generates output in terms of knowledge that is later presented to users.
(5) User interface (web or mobile): visual representation of measurements in a given context
(for example on a map) and interaction with the user, i.e. definition of user queries. The
Designs are shown below:
Physical Design of IOT-The Internet of Things will become part of the fabric of everyday life.
It will become part of our overall infrastructure just like water, electricity, telephone, TV and
most recently the Internet. Whereas the current Internet typically connects full-scale
computers, the Internet of Things (as part of the Future Internet) will connect everyday
objects with a strong integration into the physical world.
1. Plug and Play Integration
IOT applications-Potential applications of the IoT are numerous and diverse, permeating into
practically all areas of every-day life of individuals, enterprises, and society as a whole. The
IoT application covers smart environments/spaces in domains such as: Transportation,
Building, City, Lifestyle, Retail, Agriculture, Factory, Supply chain, Emergency, Healthcare,
User interaction, Culture and tourism, Environment and Energy. Below are some of the IoT
applications.
IOsL (Internet of smart living)-Remote Control Appliances: Switching on and off
remotely appliances to avoid accidents and save energy, Weather: Displays outdoor
weather conditions such as humidity, temperature, pressure, wind speed and rain
levels with ability to transmit data over long distances, “mart Home Appliances:
Refrigerators with LCD screen telling what’s inside, food that’s about to expire,
ingredients you need to buy and with all the information available on a Smartphone
app. Washing machines allowing you to monitor the laundry remotely, and. Kitchen
ranges with interface to a Smartphone app allowing remotely adjustable temperature
control and monitoring the oven’s self-cleaning feature, Safety Monitoring: cameras,
and home alarm systems making people feel safe in their daily life at home, Intrusion
Detection Systems: Detection of window and door openings and violations to prevent
intruders, Energy and Water Use: Energy and water supply consumption monitoring
to obtain advice on how to save cost and resources.
patterns, Power Supply Controllers: Controller for AC-DC power supplies that
determines required energy, and improve energy efficiency with less energy waste for
power supplies related to computers, telecommunications, and consumer electronics
applications, Photovoltaic Installations: Monitoring and optimization of performance
in solar energy plants.
IOsA (internet of smart agriculture)-Green Houses: Control micro-climate conditions
to maximize the production of fruits and vegetables and its quality, Compost: Control
of humidity and temperature levels in alfalfa, hay, straw, etc. to prevent fungus and
other microbial contaminants, Animal Farming/Tracking: Location and identification of
animals grazing in open pastures or location in big stables, Study of ventilation
and air quality in farms and detection of harmful gases from excrements, Offspring
Care: Control of growing conditions of the offspring in animal farms to ensure its
survival and health, field Monitoring: Reducing spoilage and crop waste with better
monitoring, accurate ongoing data obtaining, and management of the agriculture
fields, including better control of fertilizing, electricity and watering.
Physical View-It defines different layered level component required to create the device as
mentioned in diagram.
The internet of things (IoT) promises a smarter future. One in which a faltering bridge informs local
transportation authorities that it needs repair. Or a bridge that can warn oncoming smart cars to
prepare to drive over a frozen surface. An automated manufacturing plant that orders its own supplies
and even schedules and executes maintenance. An environment with every thing connected to and
aware of every other thing, sharing information to assist the next thing down the line or provide
feedback in any direction.
Two layers are required to actualize the reality of an insightful and intuitive everything: Application
and connectivity. The application layer is composed of physical products and services such as
intelligent cars, smart roads, and connected thermostats. Connectivity breathes life into these objects,
creating a cohesive experience that adds value to the system and its users.
Most importantly, the internet of things is about much more than just things. It is the promise to
create intelligent, connected systems, smarter than the sum of their parts, that provide real-time
analytics, useful projections, and tangible value from that data and interactivity. In addition to the set
of physical objects that make up an IoT network, there are several technologies that bring it to life.
Digital Foundry has completed a handful of projects that exist in this space. If you represent a global
business that is looking for partners to help develop an IoT project, we’d love to hear from you.
Otherwise, please enjoy this post, an introduction to the primary protocols behind the IoT
technologies: ZigBee, Thread, Z-Wave, and Wi-Fi.
ZigBee
ZigBee is a wireless mesh networking standard developed for wireless control and monitoring
applications that require long battery life. It is a simple and inexpensive way to create personal area
networks with low-power radios. The standards are maintained and published by the ZigBee
Alliance, a nonprofit association of nearly 450 global companies.
The low latency and simple, short messaging mode requirements set by the ZigBee Alliance make
Zigbee devices desirable for engineering teams working on IoT applications. Similarly, the high
standard that all manufacturers are required to meet decreases the business risk for a product owner
investing in this protocol. For most users the most important ZigBee requirement is the minimum 2-
year radio battery life, which practically eliminates the risk of a dead IoT product at the most
important time – such as a fire alarm that must be on constantly but only responds once, if ever, over
a long period of time.
In order for a radio to perform for 2 years on a single battery, ZigBee compromises the signal’s
amplitude and range. This is not a problem, however, for its primary purpose to connect equipment
that is close together and does not need high rates of data transfer. This includes most household
electronics, traffic management systems, and many industrial applications.. The mesh network
provides high reliability and security and can transmit over greater distances by going through
intermediate devices to reach distant devices.
To learn more about the ZigBee radio protocol or the ZigBee alliance, go to www.ZigBee.org to get
the latest news and in-depth articles on the global radio standards.
Thread
Thread is an IPv6-based protocol that was developed specifically for IoT smart home products. It
was released in 2014 by the Thread Group, a working group of companies such as Google, Samsung,
Arm Holdings, Yale Locks, and Silicon Labs. Intent on becoming the standard for household IoT
devices, the Thread Group announced intentions for a partnership and cross certification with the
ZigBee alliance in early 2016.
Engineers are drawn to Thread as an IP-addressable protocol that easily creates and manages secure
connections between hundreds of devices with cloud access and AES encryption. Product owners
looking to place faith in Thread’s technology can take solace from the number of innovative and
leading brands around the world that have come together to develop and support this protocol. Users
love that the security that comes with Thread’s AES encryption is enabled through simple-to-set-up
systems that are fully operational within minutes of plugging in.
One of the few critiques on Thread is its existence. Admittedly, yet another wireless communication
protocol aimed at the IoT applications market creates more fragmentation in an expanding selection
of radio platforms for wireless devices. If you want to learn more about the Thread Group, other
companies or applications that use the Thread protocol, or expand on the functionality of Thread,
visit www.ThreadGroup.org
Z-Wave
The Z-Wave wireless communications protocol was designed for home automation by a Danish
startup later acquired by Sigma Designs. Joining Sigma in the Z-Wave Alliance are Nortek Security,
ADT Corporation, Ingersoll Rand, and LG Uplus. Z-Wave is one of the most widely used IoT
wireless protocols, employed by brands such as Honeywell, AT&T, Verizon, GE, LG, and ADT
home security.
Working on a 900 MHz band, far from Bluetooth and Wi-Fi, makes Z-Wave radios practically
immune to interference and thus ideal from an engineering point of view. Product owners should
appreciate the Z-Wave full mesh network, which can link up to 232 devices for incredibly scalable
platforms that won’t be outgrown by their application. End users already enjoy many Z-Wave
products, probably without knowing it, and this wide adoption makes it a well-tested networking
protocol.
Products that use the Z-Wave wireless protocol rely Sigma Designs as the sole licensor of Z-Wave.
While this helps to maintain uniformity and reliability, it is worth noting that this could be a deal-
breaking risk for some applications.
Anyone interested in learning more about the Z-Wave wireless protocol should visit www.Z-
WaveAlliance.org to learn more about their certification policy and visit www.Z-Wave.com to learn
more about current applications and products that use Z-Wave radios.
Wi-Fi
Wi-Fi is the most generally known protocol for wireless communication across connected devices.
The standard on which it is based, IEEE 802.11, was released in 1997. In 1999, the WiFi Alliance
was formed to oversee and hold the Wi-Fi trademark, under which products using this technology are
sold.
As a commonly used home wireless local area network (WLAN) between devices this protocol
almost always has an existing network which users are already familiar with. With such broad use
there are high standards for network encryption with WPA2 and WPS satisfying the majority of
engineers and global customers. The high penetration and existing security should similarly please
product owners considering this protocol as their IoT platform’s radio standard.
Wi-Fi requires strong radios to achieve the distance and penetration necessary for a constant and
stable connection between a consumer’s desktops, laptops, mobile devices, and home network. This
strength requires the most significant power of all the traditional IoT protocols available. While high
signal strength requirements are great for connectivity and reliability, they also require high power
usage, which will usually require a Wi-Fi device to either be connected to a wall outlet, like a home
router, or to charge daily as in the case of a mobile device.
If you’re looking to learn more about the Wi-Fi protocol, its trademark, and associated products, go
to www.Wi-Fi.org.
2. Business Applications
Data silos are still very common in industrial organizations. And this leads to missed opportunities
because the data is already there. The right people just don’t have access to it when they need it.
Data from applications like your CRM, ERP or EAM can provide context that goes beyond what’s wrong
with a machine.
IoT-enabled field service can dramatically improve customer experience. Giving technicians access to
CRM data from their tablet shows them a detailed customer history. And they won’t have to call the
office to answer the customer’s questions.
You can also build upon predictive maintenance with business data. When the machine learning
algorithm predicts an asset failure you connect to your EAM system and check the warranty.
If the EAM data shows that the asset is still under warranty, you don’t send a maintenance crew.
Instead, you can have it kick off a task for someone to call out the manufacturer to fix the problem.
By automatically checking the warranty, you can prevent compromising warranties and reduce
maintenance costs.
3. Wearables
Data from smart watches and fitness trackers aren’t as useful as machine data for IIoT. But there is a
new breed of industrial wearables making a name for itself.
These new wearables promise to make difficult and often dangerous jobs safer and easier.
Data from wearable gas detection sensors can track employee exposure levels. That data can then be
displayed alongside their work schedule. This helps dispatchers adjust the schedule based on the
worker’s exposure. And ultimately it leads to fewer health issues.
Another wearable that’s gaining popularity with large mines and constructions companies is
the SmartCap. The SmartCap was created to prevent accidents. It measures truck driver fatigue
levels by monitoring their brain activity.
When it picks up driver fatigue, an alarm will trigger to stop the driver and also let their manager know
of the event. The possibilities to use this data go even further than just sounding alarms.
If you have a lot of drivers, you can use machine learning to predict where and when they are likely to
get tired. This also helps you improve schedules, routes and safety practices. You’ll know which times
and areas are high risk for fatigue.
Libelium Smart Water Sensor
6. Media
Smartphones have made it possible to get real-time access to photos, videos and audio from the field.
But in industrial cases, we can go beyond using smartphones to upload a picture of a broken machine.
One way to use media as a data source in oil and gas is to stream real-time infrared images when
inspecting flare stacks. Flare systems need to be inspected regularly for fouling and corrosion.
By using a UAV to do the inspection, you can get information without interrupting operations. You also
won’t be putting workers in danger.
Keep an eye out for a more in-depth use case we’ll be publishing about this soon.
Image from ArcGIS maps
7. Location
Location data could come from mobile devices, location beacons, GIS systems or even drones (UAV’s).
You could combine GPS data from a vehicle with traffic reports to optimize your delivery routes in real-
time. Or you could place track-and-trace sensors on expensive mobile assets that often get stolen or
misplaced.
But to prove how powerful the use of real-time location data can be, let’s take the example of avoiding
accidents with mining vehicles.
Mining trucks accidents are often fatal. Like this accident in 2013, where a contractor’s Toyota Land
Cruiser collided with a loaded dump truck weighing 380 tons.
Because the truck driver is seated in such an elevated position, it is often hard to see what’s happening
directly in front of him.
Streaming real-time data from location beacons can help prevent fatal accidents like these. When a
vehicle passes a beacon, the IoT application can automatically check whether the vehicle has the correct
clearance certificate.
You can also add GPS data displays (similar to radars in aircraft) to show truck drivers where light
vehicles are around them.
Conclusion
There’s more to industrial IoT than just using machine data for predictive maintenance.
By using and combining these 7 types of industrial IoT data sources, you can enable smarter decision
making and faster responses across your organization.
You’ll see the results in your bottom line, customer happiness and your safety record.
The term "machine-to-machine" communication technology is used to describe any form of connection
between two devices that don't require human assistance. M2M cornerstone of the IoT. The Internet of
Things is a system of devices with unique identifiers (known as UID) capable of transmitting information
over a network, IoT requires no human-to-human or human-to-machine interaction. Now IoT is widely
used in industries like the automotive (autonomous car, vehicle-to-vehicle communication), logistics and
supply (supply chain tracking), manufacturing (warehouse management), banking (connected branches),
and so on. While M2M enables device-to-device communication, the Internet of Things allows multiple
machines to design a connected data network.
M2M communication is a point to point communication that allows the network to transmit
information via public networking technologies such as Ethernet and cellular networks. Sensor telemetry
is one of the applications of M2M. Businesses are using M2M to remotely monitor factors such as
temperature, energy consumption, moisture, pressure, etc. The second example of M2M is.ATM. ATM's
internal computer is continually communicating with a host computer that routes appropriate banks and
accounts. The bank sends back approval codes through the host computer; allowing transactions to be
completed. The entire transaction happens remotely and without any human interaction on the bank's
side. Machine communication efficiently, automatically allowing transactions to be authorized in
seconds.
The main purpose of machine-to-machine technology is to tap into sensor data and transmit it to a
network. Unlike SCADA or other remote monitoring tools, M2M systems often use public networks and
access methods -- for example, cellular or Ethernet - to make it more cost-effective. The main
components of an M2M system include sensors and RFID. a Wi-Fi or cellular communications link, and
autonomic computing software programmed to help a network device interpret data and make
decisions. These M2M applications translate the data, which can trigger preprogrammed, automated
actions.
Features of M2M
Low power consumption, in an effort to improve the system's ability to service M2M applications.
effectively
A network operator that provides packet-switched service
Monitoring abilities that provide the functionality to detect events.
Time tolerance, meaning data transfers can be delayed.
Time control, meaning data can only be sent or received at specific predetermined periods.
Location-specific triggers that alert or wake up devices when they enter a particular area.
The ability to continually send and receive small amounts of data.
Requirements of M2M
According to the European Telecommunications Standards Institute (ETSI), requirements of an M2M
system include:
Scalability - The M2M system should be able to continue to function efficiently more connected objects
are added.
Anonymity - The M2M system must be able to hide the identity of M2M devices when requested,
subject to regulatory requirements.
Logging - M2M systems must support the recording of important events, such as failed installation
attempts, service not operating, or the occurrence of faulty information. The logs should be available by
request.
M2M Application Communication Principles - M2M systems should enable communication between
M2M applications in the network and the M2M device or gateway using communication techniques,
such as short message service (SMS) and IP Connected devices should also be able to communicate with
each other in a peer-to-peer (P2P) manner.
Delivery Methods - The M2M system should support unicast, anycast, multicast, and broadcast
communication modes, with the broadcast being replaced by multicast or anycast whenever possible to
minimize the load on the communication network.
Message Transmission Scheduling - M2M systems must be able to control network access and
messaging schedules and should be conscious of M2M application scheduling delay tolerance.
Message Communication Path Selection - Optimization of the message communication paths within an
M2M system must be possible and based on policies like transmission failures, delays when other paths
exist, and network costs.
M2M Security
Machine-to-machine systems face a number of security issues, from unauthorized access to wireless
intrusion to device hacking. Physical security, privacy, fraud, and the exposure of mission-critical
applications must also be considered. Typical M2M security measures include making devices and
machines tamper-resistant, embedding security into the machines, ensuring communication security
through encryption, and securing back-end servers, among others. Segmenting M2M devices onto their
own network and managing device identity, data confidentiality and device availability can also help
combat M2M security risks.
M2M Standards
Machine-to-machine technology does not have a standardized device platform, and many M2M systems
are built to be task- or device-specific. Several key M2M standards, many of which are also used in IoT
settings, have emerged over the years, including:
OMA LightweightM2M, a device management protocol
MQTT, a messaging protocol
TR-069 (Technical Report 069), an application layer protocol
HyperCat, a data discovery protocol
OneM2M, a communications protocol
Google Thread, a wireless mesh protocol
AllJoyn, an open-source software framework
Unit -2
Topics to be covered
Machine-to-machine (M2M), SDN (software defined networking) and NFV (network function
virtualization) for IOT, data storage in IOT, IOT Cloud Based Services.
-----------------------------------------------------------------------------------------------------------------------------
-----------------
Machine-to-machine (M2M)
Machine to machine (M2M) is a broad label that can be used to describe any
technology that enables networked devices to exchange information and perform
actions without the manual assistance of humans. M2M communication is often used
for remote monitoring. In product restocking, for example, a vending machine can
message the distributor when a particular item is running low. M2M communication
is an important aspect of warehouse management, remote control, robotics, traffic
control, logistic services, supply chain management, fleet management and
telemedicine.
SDN (software defined networking)-SDN deployment will enable Internet of Things devices
to share network resources efficiently and reliably, and further cut hardware investment, but
the possibilities are still emerging. Software-defined networking will meet the Internet of
Things (IoT) at the crossroads of VPN exhaustion, uptime challenges and limited network
resources. The expected result is that SDN will help drive the expansion of IoT-enabled
devices, enable more efficient network resource sharing and improve IoT service-level
agreements (SLAs).
SDN Benefits-SDN brings three important capabilities to IoT:
Centralization of control through software that has complete knowledge of the
network, enabling automated, policy-based control of even massive, complex
networks. Given the huge potential scale of IoT environments, SDN is critical in
making them simple to manage.
Abstraction of the details of the many devices and protocols in the network, allowing
IoT applications to access data, enable analytics and control the devices, and add new
sensors and network control devices, without exposing the details of the underlying
infrastructure. SDN simplifies the creation, deployment and ongoing management of
the IoT devices and the applications that benefit from them.
The flexibility to tune the components within the IoT (and manage where data is
stored and analyzed) to continually maximize performance and security as business
needs and data flows change. IoT environments are inherently dispersed with many
end devices and edge computing. As a result, the network is even more critical than in
standard application environments. “DN’s ability to dynamically change network
behavior based on new traffic patterns, security incidents and policy changes will
enable IoT environments to deliver on their promise.
Features of SDN-
SDN will make it easier to find and fight security threats through the improved
visibility they provide into network traffic right to the edge of the network. They also
make it easy to apply automated policies to redirect suspicious traffic to, for example,
a honey net where it can be safely examined. By making networking management less
complex, SDN allows IT to set and enforce more segmented access controls.SDN can
provide a dynamic, intelligent self-learning layered model of security that provides
walls within walls and ensures people can only change the configuration of the
devices they’re authorized to “touch.” This is far more useful than the traditional
“wall” around the perimeter of the network, which won’t work with the IoT because
of its size and the fact the enemy is often inside the firewall, in the form of
unauthorized actors updating firmware on unprotected devices.
SDN will allow IT to effectively program the network to make automatic, real-time
decisions about traffic flow. They will allow the analysis of not only sensor data, but
data about the health of the network, to be analyzed close to the network edge to
give IT the information it needs to prevent traffic jams and security risks. The
centralized configuration and management of the network, and the abstraction of
network devices, also makes it far easier to manage applications that run on the edge
of the IoT.
For example, SDN will allow IT to fine-tune data aggregation, so data that is less
critical is held at the edge and not transmitted to core systems until it won’t slow
critical application traffic. This edge computing can also perform fast, local analysis
and speed the results to the network core if the analysis indicates an urgent situation,
such as the impending failure of a jet engine.
Relevance of NFV in IoT System-NFV can play a crucial role in achieving the goal with IoT
network combining both hardware and software network features in a single virtual network.
NFV helps accelerate the deployment of new services, operations, and maintenance of a
network allowing high level of network optimization. It brings multiples benefits to service
operators and service providers including ROI. The relevance of NFV lies with the promise of
benefits across network architecture.
subsystems is to be made available to the IoT network, depending on the level of privacy
desired by the subsystem owners.
IoT data has distinctive characteristics that make traditional relational-based
database management an obsolete solution. A massive volume of heterogeneous,
streaming and geographically-dispersed real-time data will be created by millions of
diverse devices periodically sending observations about certain monitored
phenomena or reporting the occurrence of certain or abnormal events of interest .
Periodic observations are most demanding in terms of communication overhead and
storage due to their streaming and continuous nature, while events present time-
strain with end-to-end response times depending on the urgency of the response
required for the event. Furthermore, there is metadata that describes “Things” in
addition to the data that is generated by “Things”; object identification, location,
processes and services provided are an example of such data. IoT data will statically
reside in fixed- or flexible-schema databases and roam the network from dynamic and
mobile objects to concentration storage points. This will continue until it reaches
centralized data stores. Communication, storage and process will thus be defining
factors in the design of data management solutions for IoT.
A data management framework for IoT is presented that incorporates a layered,
data-centric, and federated paradigm to join the independent IoT subsystems in an
adaptable, flexible, and seamless data network. In this framework, the “Things” layer
is composed of all entities and subsystems that can generate data. Raw data, or
simple aggregates, are then transported via a communications layer to data
repositories. These data repositories are either owned by organizations or public, and
IOT Data Management-Traditional data management systems handle the storage, retrieval,
and update of elementary data items, records and files. In the context of IoT, data
management systems must summarize data online while providing storage, logging, and
auditing facilities for offline analysis. This expands the concept of data management from
offline storage, query processing, and transaction management operations into online-offline
communication/storage dual operations. We first define the data lifecycle within the context
of IoT and then outline the energy consumption profile for each of the phases in order to
have a better understanding of IoT data management.
IOT Data Lifecycle-The lifecycle of data within an IoT system proceeds from data
production to aggregation, transfer, optional filtering and preprocessing, and finally to
storage and archiving. Querying and analysis are the end points that initiate (request) and
consume data production, but data production can be set to be pushed to the IoT consuming
services. Production, collection, aggregation, filtering, and some basic querying and
preliminary processing functionalities are considered online, communication- intensive
operations. Intensive preprocessing, long-term storage and archival and in-depth
processing/analysis are considered offline storage-intensive operations.
Fig 2.2 data Production
Storage operations aim at making data available on the long term for constant
access/updates, while archival is concerned with read-only data. Since some IoT systems may
generate, process, and store data in-network for real-time and localized services, with no
need to propagate this data further up to concentration points in the system, edges that
combine both processing and storage elements may exist as autonomous units in the cycle. In
the following paragraphs, each of the elements in the IoT data lifecycle is explained.
is a known procedure in data mining called data cleaning. Schema integration does
not imply brute- force fitting of all the data into a fixed relational (tables) schema, but
rather a more abstract definition of a consistent way to access the data without
having to customize access for each source's data format(s). Probabilities at different
levels in the schema may be added at this phase to IoT data items in order to handle
uncertainty that may be present in data or to deal with the lack of trust that may exist
in data sources.
Storage/Update—Archiving: This phase handles the efficient storage and
organization of data as well as the continuous update of data with new information as
it becomes available. Archiving refers to the offline long-term storage of data that is
not immediately needed for the system's ongoing operations. The core of centralized
storage is the deployment of storage structures that adapt to the various data types
and the frequency of data capture. Relational database management systems are a
popular choice that involves the organization of data into a table schema with
predefined interrelationships and metadata for efficient retrieval at later stages.
NoSQL key-value stores are gaining popularity as storage technologies for their
support of big data storage with no reliance on relational schema or strong
consistency requirements typical of relational database systems. Storage can also be
decentralized for autonomous IoT systems, where data is kept at the objects that
generate it and is not sent up the system. However, due to the limited capabilities of
such objects, storage capacity remains limited in comparison to the centralized
storage model.
Processing/Analysis: This phase involves the ongoing retrieval and analysis
operations performed and stored and archived data in order to gain insights into
historical data and predict future trends, or to detect abnormalities in the data that
may trigger further investigation or action. Task-specific preprocessing may be
needed to filter and clean data before meaningful operations take place. When an IoT
subsystem is autonomous and does not require permanent storage of its data, but
rather keeps the processing and storage in the network, then in-network processing
may be performed in response to real-time or localized queries.
Data Management Framework for IOT-Most of the current data management proposals are
targeted to WSNs, which are only a subset of the global IoT space, and therefore do not
explicitly address the more sophisticated architectural characteristics of IoT.
WSNs are a mature networking paradigm whose data management solutions revolve
mainly around in-network data processing and optimization. Sensors are mostly of
stationary, resource- constrained nature, which does not facilitate sophisticated
analysis and services.
The main focus in WSN-based data management solutions is to harvest real-time
data promptly for quick decision making, with limited permanent storage capacities
for long-term usage. This represents only a subset of the more versatile IoT system,
which aims at harnessing the data available from a variety of sources; stationary and
mobile, smart and embedded, resource- constrained and resource-rich, real-time
and archival.
The main focus of IoT-based data management therefore extends the provisions
made for WSNs to add provisions of a seamless way to tap into the volumes of
heterogeneous data in order to find interesting global patterns and
strategic opportunities.
IOT Cloud Based Services-As these devices start to become connected, we need a place to
send, store, and process all of the information. Setting up your own in-house system isn’t
practical anymore. The cost of maintaining, upgrading and securing a system is just too high,
and there are some great services available.
Amazon Web Services IOT Platform-Amazon dominates the consumer cloud market.
They were the first to really turn cloud computing into a commodity way back in
2004. “ince then they’ve put a lot effort into innovation and building features, and
probably have the most comprehensive set of tools available.
Microsoft Azure IoT Hub-Microsoft is taking their Internet of Things cloud services
very seriously. They have cloud storage, machine learning, and IoT services, and have
even developed their own operating system for IoT devices. This means they intend to
provide a complete IoT solution provider.
IBM Watson IoT Platform-IBM is another IT giant trying to set itself up as an Internet
of Things platform authority. They try to make their cloud services as accessible as
possible to beginners with easy apps and interfaces. You can try out their sample apps
to get a feel for how it all works. You can also store your data for a specified period, to
get historical information from your connected devices.
Google Cloud Platform-Search giant Google is also taking the Internet of Things very
seriously. They claim that Cloud Platform is the best place to build IoT initiatives,
taking advantage of Google’s heritage of web-scale processing, analytics, and
machine intelligence.
-----------------------------------------------------------------------------------------------------------------------------
-----------
Unit -3
Topics to be covered
Design Principles for Web Connectivity: Web Communication Protocols for connected devices,
Message Communication Protocols for connected devices, SOAP, REST, HTTP Restful and Web
Sockets. Internet Connectivity Principles: Internet Connectivity, Internet based
communication, IP addressing in IOT, Media Access control.
-----------------------------------------------------------------------------------------------------------------------------
--
Web Communication Protocols for connected devices-The protocols are used for
communication between machines or between a machine and server. Due to constraints in
processing capabilities and the low power requirements of IoT devices (which are generally
meant to be deployed in environments with constant battery power) with limited bandwidth
capabilities, a need was felt for dedicated standards and protocols especially designed for
IoT. Since those who manufacture IoT devices and those who create the IoT platforms are
different, this required industry standards and protocols that were not high on power
consumption, bandwidth usage, or processing power and could be adopted easily by all IoT
players— hardware manufacturers, software developers or cloud solutions/service
providers.
Bluetooth and Bluetooth Low Energy-While MQTT and CoAP are infrastructure-
independent, which means that it doesn’t matter whether you’re connected to a wired or a
wireless network, Bluetooth provides only wireless communication over radio frequency
(2.4GHz spectrum in the ISM band) using an industry standard that was initially used to share
files between mobile phones and is now powerful enough to play music (Advanced Audio
Distribution Profile/A2DP), stream data, or build
your next IoT device. Bluetooth, generally, is divided into three categories.
o Bluetooth Classic: This is meant for high data rate applications like streaming audio
wirelessly.
o Bluetooth Smart or Low Energy/BLE: This is meant for low powered battery-operated
devices that stream low packets of data.
o Bluetooth SmartReady: These are essentially the ‘hub’ devices such as computers,
smartphones, etc. They support both the ‘classic’ and ‘smart’ devices.
Bluetooth is a sophisticated ad hoc networking protocol, and is now especially designed from
the ground up for IoT. It provides a stable connection and communication channel, which is
extremely low profile and low powered. An obvious example is fitness trackers, which even
though powered on throughout the day, can last for months on a single charge or run on a
coin cell battery, all thanks to BLE (Bluetooth Low Energy). Bluetooth Classic has fixed
profiles like UART over Bluetooth class and A2DP class for audio streaming. On the other
hand, Bluetooth Low Energy provides GATT or Generic Attribute Profile, which allows users
to define their own
profile using Bluetooth, like in the case of a heart rate monitor. BLE is extremely flexible and
useful in the IoT space..
Message Communication Protocols for connected devices:
MQTT (Message Queue Telemetry Transport)-It was created about 15 years back for
monitoring remote sensor nodes, and is designed to conserve both power and memory. It is
based on the ‘Publish Subscribe’ communication model, where a broker is responsible for
relaying messages to MQTT clients. This allows multiple clients to post messages and receive
updates on different topics from a central server known as the MQTT broker. This is similar
to subscribing to a YouTube channel, where you get notified whenever a new video is
posted. Using MQTT, a connected device can subscribe to any number of topics hosted by an
MQTT broker.
SOAP-OAP (originally Simple Object Access Protocol) is a protocol specification for
exchanging structured information in the implementation of web services in computer
networks. Its purpose is to induce extensibility, neutrality and independence. It uses XML
Information Set for its message format, and relies on application layer protocols, most often
Hypertext Transfer Protocol (HTTP) or Simple Mail Transfer Protocol (SMTP), for message
negotiation and transmission.
SOAP allows processes running on disparate operating systems (such as Windows and Linux)
to communicate using Extensible Markup Language (XML). Since Web protocols like HTTP
are installed and running on all operating systems, SOAP allows clients to invoke web
services and receive responses independent of language and platforms. SOAP provides the
Messaging Protocol layer of a web services protocol stack for web services. It is an XML-
based protocol consisting of three parts:
an envelope, which defines the message
structure and how to process it
a set of encoding rules for expressing instances of application-defined datatypes
a convention for representing procedure calls and responses
Advantages of REST-A primary benefit of using REST, both from a client and server's
perspective, is REST-based interactions happen using constructs that are familiar to anyone
who is accustomed to using the internet's Hypertext Transfer Protocol (HTTP).
An example of this arrangement is REST-based interactions all communicate their status
using standard HTTP status codes. So, a 404 means a requested resource wasn't found; a 401
code means the request wasn't authorized, a 200 code means everything is OK; and a 500
means there was an unrecoverable application error on the server. Similarly, details such as
encryption and data transport integrity are solved not by adding new frameworks or
technologies, but instead by relying on well-known Secure Sockets Layer (SSL) encryption
and Transport Layer Security (TLS).
Disadvantages of REST-The benefit of REST using HTTP constructs also creates restrictions,
however. Many of the limitations of HTTP likewise turn into shortcomings of the REST
architectural style. For example, HTTP does not store state-based information between
request-response cycles, which means REST-based applications must be stateless and any
state management tasks must be performed by the client.
HTTP Restful-In REST architecture, a REST Server simply provides access to resources and the
REST client accesses and presents the resources. Here each resource is identified by URIs/
Global IDs. REST uses various representations to represent a resource like Text, JSON and
XML. JSON is now the most popular format being used in Web Services.
HTTP Methods
The following HTTP methods are most commonly used in REST based architecture.
GET − Provides a read only access to a resource.
PUT − Used to create a new resource.
DELETE − Used to remove a resource.
POST − Used to update an existing resource or create a new resource.
OPTIONS − Used to get the supported operations on a resource.
Restful Web Services-A web service is a collection of open protocols and standards used for
exchanging data between applications or systems. Software applications written in various
programming languages and running on various platforms can use web services to exchange
data over computer networks like the Internet in a manner similar to inter-process
communication on a single computer. This interoperability (e.g., between Java and Python,
or Windows and Linux applications) is due to the use of open standards. Web services based
on REST Architecture are known as Restful Web Services.
standardized by the IETF as RFC 6455 in 2011, and the WebSocket API in Web IDL is being
standardized by the W3C.
WebSocket is a different TCP protocol from HTTP. Both protocols are located at layer 7
in the OSI model and, as such, depend on
TCP at layer 4. Although they are different, RFC 6455 states that WebSocket "is designed
to work over HTTP ports 80 and 443 as well as to support HTTP proxies and intermediaries"
thus making it compatible with the HTTP protocol. To achieve compatibility, the
WebSocket handshake uses the HTTP Upgrade header to change from the HTTP protocol to
the WebSocket protocol.
Access Providers-They provide access to internet through telephone lines, cable Wi-Fi or fiber
optics.
Mailbox Provider-Such providers offer mailbox hosting services.
Hosting ISPS-Hosting ISPs offers e-mail, and other web hosting services such as virtual
machines, clouds etc.
Virtual ISPS-Such ISPs offer internet access via other ISP services.
Free ISPS-Free ISPs do not charge for internet services.
Connection Types-There exists several ways to connect to the internet. Following are these
connection types available:
Dial-up Connection
ISDN
DSL
Cable TV Internet connections
Satellite Internet connections
Wireless Internet Connections
Internet based communication-In much of the world the Internet is becoming the primary
medium for communication in business. Internet communication tools save money in a
variety of ways. Email, instant messaging and social networking are all free. There are many
different kinds of Internet communications tool, such as email, VoIP, forums, online chat and
social networking among others. Using the latest tools and methods of communicating over
the Internet is essential for bringing your business into the modern age of communication
and marketing.
VoIP and Internet Telephony-It is common for voice communications to be carried out over
the Internet using voice over Internet protocol software. VoIP allows you to call a telephone
-- either a fixed or mobile phone -- over the Internet. This is often considerably cheaper than
calling from a telephone, particularly with international calls. One of the most popular
Internet telephony tools is Skype. With Skype and similar Internet telephony tools, you can
conduct free voice conversations between two computers.
Email-The original Internet communication tool, email is still an essential tool every
business should have. In spite of this, with the rise of messaging through social networking
sites and instant messages, email is not quite as important as it used to be.
Social Networking-Social networking is all about forming groups, sharing online content
and exchanging information. In addition to being a major part of social life in the modern
world, social networking is an invaluable tool for Internet marketing since it provides a user-
friendly and highly accessible platform upon which to exchange information on products and
services. For example, if someone likes an article on your business blog or website, he may
decide to share it with his friends over Facebook or Twitter.
Forums-Forums, like email, have also been around since the dawn of the Internet. Forums
provide a place to exchange messages and participate in conversations. The main differences
from instant messaging are that forums are generally public and the communications are not
in real time. Forums and their regular posters and readers form communities that can be
valuable to your business.
IP addressing in IOT- We can connect Internet of Thing or device to the Internet. How we
connect depends ultimately on what we actually want to do with the device. Shown below is
a typical home network. This would normally consist of a router / firewall that connect to
your ISP (Internet Service Provider). The connection to your ISP could by via ADSL or
Ethernet using a fiber service for example.
When the home router connects to the ISP it will be assigned an IP address which is what is
used to communicate with servers or other service on the Internet. This is a public IP address
and is addressable by the internet. In the diagram above the public IP address is
111.246.59.246.
This is your public IP address you used to connect to the cactus.io server to view this
page.182.73.155.114
(If there is more than one IP then you might be connecting using a proxy server or VPN
service), be aware that this IP address will change every time that your home router is
rebooted or reconnects to the ISP. Some ISP's allow you to pay extra for a fixed IP address.
However most will not for home internet services.
Connect to a Web Server-When we enter a URL into our browser it will use a DNS server to
convert the name to an IP address. The DNS server would normally be provided by your ISP.
In the example above we are using cactus.io for the URL. The DNS server would then return
the IP address of 104.130.130.228. The browser will then try to connect to the server via the
router. The router will connect to the remote server using the public IP address assigned to
your router. The server hosting cactus.io will then send data back to your router using your
public ip address (111.246.59.246). The router will then transmit this data back to your PC
using the private IP address of 192.168.1.10.
Connect to an Internal IoT Device-We can connect to a web server running on our IoT device
by entering the IP address of http://192.168.1.45 into the browser URL. The connection will
be made in this case via the switch built into the home router. The switch knows what port
the IoT device is connected to and transmits and receives data via this port. The router has
no role in this network request as it's a private IP address and the PC and IoT device are on
the same network.
In the diagram above two of the devices send a HTTP REST Post to a server in the cloud. If
the remote server accepts the connection and data it will generally respond with a 200 OK.
The client will then close the connection until the next post is sent.
Option 3) Access the Device from the Internet with Static Public IP Address
The world is running out of IPV4 IP addresses. This means ISP's are pretty strict on giving out
static IP addresses. It's much easier for them to use a dynamic pool of IP addresses to assign
to their clients.
Generally home internet services are not available with a static IP address. However you
might be able to pay extra for this functionality. Some business accounts are available with a
static IP address. The most common reason for wanting a static ip is for hosting a email
server.
In this diagram above we could use http://1.127.48.156 or http://1.127.48.156:49155 to
connect to the IoT server. In the first URL we do not specify a port number so the browser
will use the default port of 80. In the second URL we use the port 49155. By using a random
private port number we improve the security for our IoT server. If someone does a port scan
they will always check port 80 as it's a default. They might not bother scanning private port
numbers
If you have multiple IoT devices you can setup port forwarding on the router to recognize
different port numbers.
Option 4) Access the Device from the Internet with Dynamic Public IP Address-One of the
most common ways of dealing with a dynamic public (WAN) IP addresses is to use a Dynamic
DNS Service provider. Some of these services are free but most require a monthly payment.
Most routers these days support third party Dynamic DNS service providers. You configure
the router with the provider, username and password. When the router detects a WAN
interface IP address change it updates the DDNS service provider with the new IP details.
Fig 3.7 Public IP Addressing
When you sign up with one of these providers you provide a domain name you would like to
use. In the example below the name we used is cactusio. This is a sub domain for dydns.com.
When we enter http://cactusio.dydns.com into the browser it will do a dnslookup on
cactusio.dydns.com. If it’s a valid domain it will respond with the IP address which just
happens to be the public (WAN) IP address of the home / office router.
The office router will detect the data packet matches a record in the port forwarding table
and pass the data onto the IoT device using the static IP of 192.168.1.45. The IoT device will
respond with the appropriate html to view in the internet client browser.
communication channel in a multipoint network. This channel may provide unicast, multicast
or broadcast communication service. The MAC sub-layer uses MAC protocols to prevent
collisions. In Layer 2, multiple devices on the same physical link can uniquely identify one
another at the data link layer, by using the MAC addresses that are assigned to all ports on a
switch. A MAC algorithm accepts as input a secret key and an arbitrary-length message to be
authenticated, and outputs a MAC address.
Unit -4
Topics to be covered
Sensor Technology, Participatory Sensing, Industrial IOT and Automotive IOT, Actuator,
Sensor data Communication Protocols, Radio Frequency Identification Technology, Wireless
Sensor Network Technology.
-----------------------------------------------------------------------------------------------------------------------------
----------------
Sensor Technology
The Internet of Things (IoT) couldn’t exist without smart sensors, and the growing use of
smart technology is already transforming how manufacturers implement the IoT. Smart
sensors are also bringing more connectivity and analytics to the supply chain. There are
some things to know about how and why this is happening.
First, smart sensors are the indispensable enablers of the IoT and the industrial IoT. Smart
sensors, including radio frequency identification (RFID) tags, serve three broad purposes.
They identify items, locate them and determine their environmental conditions, all of which
have major implications for the supply chain and manufacturing. Smart sensors are
particularly useful in plants or warehouses because they can keep track of temperature and
humidity, log data for historical records and quality management, or be used as triggers for
alarms or process management.
Second, smart sensors impact the supply chain by being embedded in products, which can
help improve the manufacturing process or the products themselves. “ensors can live inside
products to create “smart products” and new revenue sources from the enhanced features.
They can also permeate the manufacturing process to monitor, control, and improve
operations, or be added to logistics to streamline how products are delivered. There are a
number of specific purposes of sensors, such as measuring temperature, humidity,
vibrations, motion, light, pressure and altitude. Companies will need to develop new
applications to take advantage of all the big data that the sensors are generating.
Third, the lower costs and more advanced capabilities of RFID tags are starting to enable
wider and more effective use. The cost of RFID, which has come down dramatically, is in
more than just the tag itself. To determine the true cost per use you have to include the
software applications and deployment costs. The combination of lowered costs for tags and
improved capabilities means that their value proposition has changed, and represents an
opportunity for enterprises to rethink RFID.
A sensor is a device that detects and responds to some type of input from the physical
environment. The specific input could be light, heat, motion, moisture, pressure, or any one
of a great number of other environmental phenomena. The output is generally a signal that
is converted to human-readable display at the sensor location or transmitted electronically
over a network for reading or further processing.
Here are a few examples of the many different types of sensors:
In a mercury-based glass thermometer, the input is temperature. The liquid contained
expands and contracts in response, causing the level to be higher or lower on the marked
gauge, which is human- readable.
An oxygen sensor in a car's emission control system detects the gasoline/oxygen ratio,
usually through a chemical reaction that generates a voltage. A computer in the engine reads
the voltage and, if the mixture is not optimal, readjusts the balance.
Motion sensors in various systems including home security lights, automatic doors and
bathroom fixtures typically send out some type of energy, such as microwaves, ultrasonic
waves or light beams and detect when the flow of energy is interrupted by something
entering its path.
A photo sensor detects the presence of visible light, infrared transmission (IR), and/or
ultraviolet (UV) energy.
Industrial IOT - The IIoT is part of a larger concept known as the Internet of Things (IoT). The
IoT is a network of intelligent computers, devices, and objects that collect and share huge
amounts of data. The collected data is sent to a central Cloud-based service where it is
aggregated with other data and then shared with end users in a helpful way. The IoT will
increase automation in homes, schools, stores, and in many industries.
The application of the IoT to the manufacturing industry is called the IIoT (or Industrial
Internet or Industry 4.0). The IIoT will revolutionize manufacturing by enabling the
acquisition and accessibility of far greater amounts of data, at far greater speeds, and far
more efficiently than before. A number of innovative companies have started to implement
the IIoT by leveraging intelligent, connected devices in their factories.
Benefits of IIOT
The IIoT can greatly improve connectivity, efficiency, scalability, time savings, and cost
savings for industrial organizations. Companies are already benefitting from the IIoT through
cost savings due to predictive maintenance, improved safety, and other operational
efficiencies. IIoT networks of intelligent devices allow industrial organizations to break open
data silos and connect all of their people, data, and processes from the factory floor to the
executive offices. Business leaders can use IIoT data to get a full and accurate view of how
their enterprise is doing, which will help them make better decisions.
IIOT Protocols
One of the issues encountered in the transition to the IIoT is the fact that different edge-of-
network devices have historically used different protocols for sending and receiving data.
While there are a number of different communication protocols currently in use, such as
OPC-UA, the Message Queueing Telemetry Transport (MQTT) transfer protocol is quickly
emerging as the standard for IIoT, due to its lightweight overhead, publish/subscribe model,
and bidirectional capabilities.
Challenges of IIOT
Interoperability and security are probably the two biggest challenges surrounding the
implementation of IIoT. As technology writer Margaret Rouse observes, “A major concern
surrounding the Industrial IoT is interoperability between devices and machines that use
different protocols and have different architectures.” Ignition is an excellent solution for this
since it is cross-platform and built on open-source, IT-standard technologies.
Companies need to know that their data is secure. The proliferation of sensors and other
smart, connected devices has resulted in a parallel explosion in security vulnerabilities. This
is another factor in the rise of MQTT since it is a very secure IIoT protocol.
Future of IIOT
The IIoT is widely considered to be one of the primary trends affecting industrial businesses
today and in the future. Industries are pushing to modernize systems and equipment to
meet new regulations, to keep up with increasing market speed and volatility, and to deal
with disruptive technologies. Businesses that have embraced the IIoT have seen significant
improvements to safety, efficiency, and profitability, and it is expected that this trend will
continue as IIoT technologies are more widely adopted.
The Ignition IIoT solution greatly improves connectivity, efficiency, scalability, time savings,
and cost savings for industrial organizations. It can unite the people and systems on the plant
floor with those at the enterprise level. It can also allow enterprises to get the most value
from their system without being constrained by technological and economic limitations. For
these reasons and more, Ignition offers the ideal platform for bringing the power of
the IIoT into your enterprise.
Ability to view the entire population of connected products together marketing data and
product trends
& increased trouble shooting ability for Manufacturer’s tech support
Real-time remote monitoring of performance
Multi site monitoring improving the operational efficiency and reducing the site downtime
Availability of real time data for the production environment and alerts generated to the
local administrators mobile phone reducing the clean room downtime
Full manufacturing & SCM traceability
Predictive Maintenance and quality
For information to complete the loop and create value, it passes through the loop’s stages,
each enabled by specific technologies. An act is monitored by
a sensor that creates information, that information passes through a network so that it can
be communicated, and standards—be they technical, legal, regulatory, or social—allows that
information to be aggregated across time and space. Augmented intelligence is a generic
term meant to capture all manner of analytical support, collectively used
to analyze information. The loop is completed via augmented behavior technologies that
either enable automated autonomous action or shape human decisions in a manner leading
to improved action.
Getting information around the Value Loop allows an organization to create value; how
much value is created is a function of the value drivers, which capture the characteristics of
the information that makes its way around the value loop. The drivers of information value
can be captured and sorted into the three categories: magnitude, risk, and time.
Communications Protocols
Sensor data Communication Protocols-Wireless sensors networks are networks of tiny,
battery powered sensor nodes with limited on –board processing storage and radio
capabilities. Nodes sense and send their reports towards a processing centre which is called
“sink”. The design of protocols and applications for such network has to be energy aware in
order to prolong the lifetime of the network, because the replacement of the embedded
batteries is a very difficult process once these nodes have been deployed. the regular nodes
sense the field, generate the data, and send them to associated nodes. Then the after
performing some processes transmit them to the BS in a multi-hop approach. Eventually the
user receives the data from the BS through the Internet.
Wireless sensor networks (WSNs) are composed of a huge number of sensor nodes. There
are many applications for WSNs and depending on the application, different types of sensors
are used, such as sensors measuring moisture, temperature, pressure and movement. WSNs
have themselves characteristics that make them different from other types of networks. One
for example is that the applicability of the networks is related to energy supply of the nodes,
so energy conservation is one of the most important challenges in these networks. Different
types of protocols for WSN are following:
Direct transmission protocols-Using a direct communication protocol, each sensor sends its
data directly
to the base station. If the base station is far away from the nodes, direct communication
will require a
large amount of transmit power from each node. This will quickly drain the battery of the
nodes and reduce the system lifetime. How- ever, the only receptions in this protocol occur
at the base station, so if either the base station is close to the nodes, or the energy required
receiving data is large, this may be an acceptable method of communication.
Minimum transfer energy protocols- In these protocols, nodes act as routers for other
nodes’ data in addition to sensing the environment. These protocols differ in the way the
routes are chosen. Some of these protocols only consider the energy of the transmitter and
neglect the energy dissipation of the receivers in determining the routes. Depending on the
real time costs of the transmit amplifier and the radio electronics, the total energy expended
in the system might actually be greater using MTE routing than direct transmission to the
base station.
Clustering protocol -A final conventional protocol for wireless networks is clustering, where
nodes are organized into clusters that communicate with a local base station, and these local
base stations transmit the data to the global base station, where it is accessed by the end-
user. This greatly reduces the distance nodes need to transmit their data, as typically the
local base station is close to all the nodes in the cluster. Thus, clustering appears to be an
energy-efficient communication protocol. However, the local base station is assumed to be a
high-energy node; if the base station is an energy-constrained node, it would die quickly, as
it is being heavily utilized. Thus, conventional clustering would perform poorly for our model
of micro sensor networks.
Genetic Algorithm- a genetic algorithm (GA) is used to create energy efficient clusters for
data dissemination in wireless sensor networks. A GA is used at the base
station, which provides energy efficient solutions to the optimizer. This provides the base
station with the ability to determine the best cluster formation that will give minimum
energy consumption during run time. The base station analyses the current network
condition and applies the GA after every iteration. The optimizer at the base station selects
the best solution based on the acquired knowledge through the GA fitness function. The
proposed fitness function is based on parameters such as energy consumption, number of
clusters, cluster size, direct distance to sink, and cluster distance. Upon completion of
iteration, the optimizer improves its decisions by receiving feedback, which is then used to
adjust the weights of the parameters of the fitness function for the next iteration
Hierarchical Cluster-Based Routing (HCR) Protocol- In HCR nodes self organize into clusters
and each cluster is managed by a set of associates called head-set. Using round-robin
technique, each associate acts as a cluster head (CH).[3] The sensor nodes transmit data to
their cluster heads, which transmit the aggregated data to the base station. Moreover, the
energy-efficient clusters are retained for a longer period of time; the energy-efficient clusters
are identified using heuristics-based approach.
Radio Frequency Identification Technology-Radio-frequency identification (RFID)
uses electromagnetic fields to automatically identify and track tags attached to objects. The
tags contain electronically stored information. Passive tags collect energy from a nearby RFID
reader's interrogating radio waves. Active tags have a local power source (such as a battery)
and may operate hundreds of meters from the RFID reader. Unlike a barcode, the tag need
not be within the line of sight of the reader, so it may be embedded in the tracked object.
RFID is one method for Automatic Identification and Data Capture (AIDC).
RFID tags are used in many industries, for example, an RFID tag attached to an automobile
during production can be used to track its progress through the assembly line; RFID-tagged
pharmaceuticals can be tracked through warehouses; and implanting RFID microchips in
livestock and pets allows for positive identification of animals.
as temperature, sound, pressure, etc. and to cooperatively pass their data through the
network to a main locations. The more modern networks are bi-directional, also enabling
control of sensor activity. The development of wireless sensor networks was motivated by
military applications such as battlefield surveillance; today such networks are used in many
industrial and consumer applications, such as industrial process monitoring and control,
machine health monitoring, and so on.
Potential Applications-Engineers have created WSN applications for areas including health
care, utilities, and remote monitoring. In health care, wireless devices make less invasive
patient monitoring and health care possible. For utilities such as the electricity grid,
streetlights, and water municipals, wireless sensors offer a lower-cost method for collecting
system health data to reduce energy usage and better manage resources. Remote
monitoring covers a wide range of applications where wireless systems can complement
wired systems by reducing wiring costs and allowing new types of measurement
applications. Remote monitoring applications include:
Environmental monitoring of air, water, and soil
Structural monitoring for buildings and bridges
Industrial machine monitoring
Process monitoring
Asset tracking
Wireless technology offers several advantages for those who can build wired and wireless
systems and take advantage of the best technology for the application. To do this, you need
flexible software architecture like the NI Lab VIEW graphical system design platform. Lab
VIEW offers the flexibility needed to connect a wide range of wired and wireless devices.
WSN Network Topologies-WSN nodes are typically organized in one of three types of
network topologies. In a star topology, each node connects directly to a gateway. In a cluster
tree network, each node connects to a node higher in the tree and then to the gateway, and
data is routed from the lowest node on the tree to the gateway. Finally, to offer increased
reliability, mesh networks feature nodes that can connect to multiple nodes in the system
and pass data through the most reliable path available. This mesh link is often referred to as
a router.
Fig. 4.6. Common WSN Network Topologies
Components of a WSN Node-A WSN node contain several technical components. These
include the radio, battery, microcontroller, analog circuit, and sensor interface. When using
WSN radio technology, you must make important trade-offs. In battery-powered systems,
higher radio data rates and more frequent radio use consume more power. Often three
years of battery life is a requirement, so many of the WSN systems today are based on
ZigBee due to its low-power consumption.
The second technology consideration for WSN systems is the battery. In addition to long life
requirements, you must consider the size and weight of batteries as well as international
standards for shipping batteries and battery availability. The low cost and wide availability of
carbon zinc and alkaline batteries make them a common choice. To extend battery life, a
WSN node periodically wakes up and transmits data by powering on the radio and then
powering it back off to conserve energy. WSN radio technology must efficiently transmit a
signal and allow the system to go back to sleep with minimal power use. This means the
processor involved must also be able to wake power up, and return to sleep mode
efficiently. Microprocessor trends for WSNs include reducing power consumption while
maintaining or increasing processor speed. Much like your radio choice, the power
consumption and processing speed trade-off is a key concern when selecting a processor for
WSNs. This makes the x86 architecture a difficult option for battery-powered devices.
Fig 4.7 WSN Sensor Node Components
Unit -5
Topics to be covered
IOT Design methodology: Specification -Requirement, process, model, service,
functional & operational view.IOT Privacy and security solutions, Raspberry Pi &
arduino devices. IOT Case studies: smart city streetlights control & monitoring.
-----------------------------------------------------------------------------------------------------------------------------
--
Requirement
Privacy is an essential implementation requirement. Supported by privacy laws,
almost all systems require secure communication to the cloud to ensure personal
data cannot be accessed or modified and liabilities are eliminated. Furthermore,
the management of devices and the data that appears in the cloud need to be
managed separately. Without this feature, users’ critical personal information is
not protected properly and available to anyone with management access.
Fig .5.1 M2M System Architecture
integration for seamless billing is important. Also credit card dependence creates
issues including over the limit issues, expired cards and deleted accounts.
Self-supporting users are a key to implementation success, too. This includes
things like remote field service so devices never return to the factory, intelligent
or automatic configuration, online help, community help, and very intuitive
products are all key.
Application integration is also important. Today point systems predominate, but
in the future the key will be making sensors available to a broad set of
applications that the user chooses. Accuracy and reliability can substantially
influence results application results and competition is expected in this area as
soon as standard interfaces emerge. Indirect access via a server ensures security,
evolution without application changes and billing control.
Discontinuous Operation and Big Data go hand in hand. With devices connecting
and disconnecting randomly, a need to preserve data for the sensors and update
the cloud later is required. Storage limitations exist for both power and cost
reasons. If some data is critical, it may be saved while other data is discarded. All
data might be saved and a selective update to the cloud performed later.
Algorithms to process the data can run in either the cloud or the sensors or any
intermediate nodes. All of these options present particular challenges to the
sensor, cloud, communications, and external applications.
Multiple connection sensor access is also a requirement to make sensors truly
available to a broad set of applications. This connection will most likely happen
through a server to simplify the sensors and eliminate power requirements for
duplicate messages.
Process:
Three types of actions have been extensively recognized and researched in IoT design Process:
In-context artefacts: By placing working products or prototypes in
context, we can obtain insights into how people live with networked
products in their daily lives. This allows us to understand in which ways
technology can be used to support people in their day-to-day efforts, or
which values we could focus on. A good example of this is Bill Gaver’s
history tablecloth, a digitally connected product created as an
experiential prototype. Only by living with this product on a day-to-day
basis you can fully experience and understand its functionality and value.
Involving stakeholders: When it comes to designing with ‘novel’
technologies, it is not easy to present ideas to end users or other
stakeholders in early stages of the design process. But the literature
thoroughly explores way to better explore concepts and early ideas. A
school book example of such a technique is Wizard of Oz testing, which
originated in the 1980s. Wizard of Oz testing comes down to providing an
end user with the illusion that a digital system is functional, whereas it is
actually being controlled manually.
Design tools: When designing digitally connected physical products, a
design challenge is to constantly keep track of which design choices in
either medium influence each other. For example, adding a physical
button to a hardware device might be impossible because the micro
controller does not have any spare pins to use: In this case, a digital
constraint limits a physical design choice. Research by Bjorn Hartmann
(2006) and
others has been tackling these challenges. Hartmann created a set of
software and
Model
The development projects for even the simplest IoT products must integrate
technical elements and effectively coordinate the activities of experts from many
disciplines across multiple organizations.
There are also new challenges posed by system testing, security, maintenance,
support, warranty, regulatory compliance, data governance, and user privacy—
IoT development faces unique obstacles in all these areas. No wonder the risks of
delays, cost overruns, and overall failures are so great.
To help companies understand the complexity of IoT device development, IoT
technology stack model can be referenced below figure 5.2. It shows IoT devices
are made up of multiple technology layers including, the physical hardware
device, IoT cloud platform, embedded software, network communication
protocols, and security.
Fig .5.2 IoT Technology Stack Model
Service:
For sensor-driven IoT networks, suite of Internet of Things design services ranging
from IoT architecture design can be referenced as:
1. Smart Sensor Design
The smart sensor, or “edge device,” sits on the outer edge of the IoT network and collects the
granular data required by businesses, individuals, and intelligent systems. Our services
include:
Development of custom single- or multi-function sensors
Sensor integration (e.g. acoustic, motion, temperature, moisture)
Smart power management (e.g. ultra-low-power states)
Video security and data capture
Wired or wireless networking enablement and integration
2. IoT Gateway Design
The gateway is the bridge between the sensor network and the cloud. It collects
all the data transmitted by the sensors and can also push periodic firmware
updates to them.
Embedded software development of sensor data collection solutions
Latency management to deliver near real-time performance
Data flow management for large data sets
PCB design and I/O integration (e.g. Ethernet, USB)
Power management
Cloud connectivity (e.g. cellular, Ethernet, Wi-Fi)
3. Sensor Networking
A business-critical requirement for any IoT network is a secure and highly reliable
connectivity infrastructure. Our services include:
Communications firmware development and cross-platform integration
Secure communications encryption and device identification
Support for wireless protocols (e.g. Bluetooth 2.1 and Bluetooth Smart,
Wi-Fi, 802.xx.x, Sub-1GHz, 2.4 GHz, custom radio protocols)
RF Design
o Co-location testing
o Certifications such as FCC part 15, ETSI, EN60251, and others
o RF tuning and optimization for discrete solutions
o 4GHz Industrial, Scientific, and Medical (ISM) bands
o 868MHz/915MHz – custom point to point and broadcast
protocols for sensor data, status messages, distributing
firmware upgrades and media content
4. Cloud Connectivity
Many types of IoT data translate into true business value via connectivity with the
cloud. Have the gateway send periodic “heartbeats” to the cloud server to let it
know that the sensor network is alive and healthy
Have the gateway and smart sensor devices receive “pushed”
commands, configuration
and software updates
Support for application-level system management and analytics software
Functional & Operational view
Following table summarizes functional and operational view as:
Describes how the system will be operated, administered, and supported when
Definition
it is running in its production environment
installation and upgrade
functional migration
data migration
operational monitoring and control
alerting
Concerns configuration management
performance monitoring
support
backup and restore
operation in third-party environments
installation models
migration models
configuration management models
Models
administration models
support models
IOT Privacy and security solutions-The IoT has to protect against attacks from
the following categories: authentication, access control, confidentiality, integrity,
and availability. Authentication involves the mutual verification of routing peers
before they share route information and ensures shared data origin is accurate.
In the IoT, authentication has to be strong and highly automated. Access control
is the prevention of unauthorized node use, i.e. making sure nodes are not
compromised. Confidentiality is the protection of information, especially when
shared over a publicly accessible medium such as air for wireless. Integrity
involves the protection of data and confirms no unauthorized modifications
occur.
Fig .5.3 Privacy and security Architecture
A major difference between traditional Internet and the IoT is the amount of
data being collected about the user. Data is collected universally in the IoT and
this data can be used to build an invasive profile of the consumer. The
organizations recognized three major privacy concerns: facilitation of the
collection of large amounts of consumer data, using that data in ways
unexpected by the consumer, and security of data. This ubiquitous data
collection makes the Internet of Things a much more data driven economy. With
massive quantities of continuous data, new discoveries can be made, but little to
no regulation can by harmful to the consumers. Privacy issues are especially hard
to discuss because, by nature, privacy is subjective. The organizations aim to
promote three best practices: privacy by design, simplified consumer choice,
transparency. Companies have to make an effort to build consumer protection in
from the beginning.
With such an asymmetry of power between businesses and their consumers, the
organizations are looking for ways to protect users against abuse of their data.
The IoT, a data-driven ecosystem, requires a trust between the business and
consumer that exists even now. A user shares data with a business and in return
receives a service. The organizations is seeking to push businesses and
companies towards built-in security and designing security into new devices. For
the IoT, the data is usually passively and ubiquitously collected. As a result, the
organizations believes businesses will have to earn user trust and at a data level,
which means
involving the user. A similar problem exists in the energy industry. A Green Butto
n was created
Raspberry Pi:
1. Introduction
“Pi is a single-board computer”. Pi is a small scale computer in the size little
bigger than a credit card, it packs enough power to run games, word processor
like open office, image editor like Gimp and any program of similar magnitude.
Pi was introduced as an educational gadget to be used for protyping by hobbyists
and for those who want to learn more about programming. It certainly cannot be
a substitute for our day to day Linux, Mac or Windows PC.
Pi is based on a Broadcom SoC (System of Chip) with an ARM processor [~700
MHz], a GPU and 256 to 512 MB RAM. The boot media is an SD card [which is not
included], and the SD card can also be used for persist data. Now that you know
that the RAM and processing power are not nearly close to the power house
machines you might have at home, these Pi’s can be used as a Cheap computer
for some basic functions, especially for experiments and education. The Pi comes
in three Configurations and we will discuss the specifications of those in the
coming sections. The cost of a Pi is around $35 for a B Model and is available
through many online and physical stores.
Fig 5.4: Raspberry Pi Board
2. System Specifications
Computer A Raspberry Pi
SD Card and a SD card reader to image the OS [These days laptops have
Storage
inbuilt card readers]
Power supply 5 volt micro USB adapter, mostly your android phone charger would work
3. Raspberry Pi uses
It can be used in following areas/applications:
1. Retro Gaming
2. Raspberry Pi Tablet
3. Low-Cost Desktop PC
4. Raspberry Pi Cluster
5. Raspberry Pi Cloud Server
6. Raspberry Pi Media Center
7. Web Server
8. Home Automation System
9. VPN
10. Robotics
Arduino devices
1. Introduction
Arduino is an open source computer hardware and software company, project,
and user
community that designs and manufactures sin
gle board microcontrollers and microcontroller kits for building
digital devices and interactive objects that can sense and control objects in
the physical world. The project's products are distributed as open-source
hardware and software, which are licensed under the GNU Lesser General Public
License (LGPL) or the GNU General Public License (GPL), permitting the
manufacture of Arduino boards and software distribution by anyone. Arduino
boards are available commercially in preassembled form, or as do-it-
yourself (DIY) kits.
Arduino board designs use a variety of microprocessors and controllers. The
boards are equipped with sets of digital and analog input/output (I/O) pins that
may be interfaced to various expansion boards (shields) and other circuits. The
boards feature serial communications interfaces, including Universal Serial
Bus (USB) on some models, which are also used for loading programs from
personal computers. The microcontrollers are typically programmed using a
dialect of features from the programming languages C and C++. In addition to
using traditional
compiler tool chains, the Arduino project provides an integrated developme
nt environment (IDE) based on the Processing language project.
Fig 5.5: Raspberry Pi Boar
2. System Specifications
Component Specification
Microcontroller ATmega328
Operating Voltage 5V
Input Voltage (recommended) 7-12V
Input Voltage (limits) 6-20V
Digital I/O Pins 14 (of which 6 provide PWM output)
Analog Input Pins 6
DC Current per I/O Pin 40 mA
DC Current for 3.3V Pin 50 mA
Flash Memory 32 KB (ATmega328)
SRAM 2 KB (ATmega328)
EEPROM 1 KB (ATmega328)
Clock Speed 16 MHz
Length 68.6 mm
Width 53.4 mm
Weight 25 g
3. Arduino uses
It can be used in following areas/applications:
1. Tiny Weather display
2. MIDI Controller
3. Fingerprint Scanner to Your Garage Door Opener
4. Auto-Trigger Spray Gun
5. Make Your Own Arduino
6. Add Motion-Triggered Night Lights Under the Bed
7. Mute Any Phrase You Want on Your TV
8. Add an Ambilight Sensor to Your LCD Display
IOT Case studies: Smart City Street lights control & monitoring.
Component descriptions
1. Energy efficiency using SSL-SSL is nothing but the smart street light system.
The SSL system, a framework for fast, reliable, and power efficient street lamp
switching based on pedestrians’ location and personal desires of safety . In the
developed prototype user location, detection as well as safety zone definition
and announcement of other configuration information is accomplished using
standard Smartphone capabilities. An application on the phone is periodically
sending location and other information to the SSL server. For street lamp control,
each and every lamppost is extended with a ZigBee-based radio device, receiving
control information from the SSL server via multi-hop routing.