Iot (1-5 Units) - 1
Iot (1-5 Units) - 1
INTRODUCTION
Internet of Things- Domain Specific IoTs - IoT and M2M-Sensors for IoT Applications–
Structure of IoT– IoT Map Device- IoT System Management with NETCONF-YANG
The Internet of Things (IoT)
• Today the Internet has become ubiquitous, has touched almost every corner of the
globe, and is affecting human life in unimaginable ways.
• We are now entering an era of even more pervasive connectivity where a very wide
variety of appliances will be connected to the web.
• One year after the past edition of the Clusterbook 2012 it can be clearly statedthat the
Internet of Things (IoT) has reached many different players and gainedfurther recognition. Out
of the potential Internet of Things application areas,Smart Cities (and regions), Smart Car and
mobility, Smart Home and assistedliving, Smart Industries, Public safety, Energy &
environmental protection,Agriculture and Tourism as part of a future IoT Ecosystem (Figure
1.1) haveacquired high attention.
IOT Ecosystem.
• We are entering an era of the “Internet of Things” (abbreviated as IoT).There are 2
definitions: First one is defined by Vermesan and second by Pe˜na-L´opez
1. The Internet of Things as simply an interaction between the physical and digital worlds.
The digital world interacts with the physical world using a plethora of sensors and actuators.
2. Another is the Internet of Things is defined as a paradigm in which computing and
networking capabilities are embedded in any kind of conceivable object.
• We use these capabilities to query the state of the object and to change its state if
possible.
• In common parlance, the Internet of Things refers to a new kind of world where almost
all the devices and appliances that we use are connected to a network.
• We can use them collaboratively to achieve complex tasks that require a high degree of
intelligence.
• For this intelligence and interconnection, IoT devices areequipped with embedded
sensors, actuators, processors, andtransceivers.
• IoT is not a single technology; rather it is anagglomeration of various technologies that
work together intandem.
• Sensors and actuators are devices, which help in interactingwith the physical
environment.
• The data collected by thesensors has to be stored and processed intelligently in order
toderive useful inferences from it.
• Note that we broadly definethe term sensor; a mobile phone or even a microwave
ovencan count as a sensor as long as it provides inputs about itscurrent state (internal state +
environment).
• An actuator is adevice that is used to effect a change in the environment suchas the
temperature controller of an air conditioner.
• The storage and processing of data can be done on theedge of the network itself or in a
remote server.
• If any preprocessingof data is possible, then it is typically done at eitherthe sensor or
some other proximate device.
• The processeddata is then typically sent to a remote server.
• The storageand processing capabilities of an IoT object are also restrictedby the
resources available, which are often very constraineddue to limitations of size, energy, power,
and computationalcapability.
• As a result the main research challenge is toensure that we get the right kind of data at
the desired levelof accuracy.
• Along with the challenges of data collection, and handling, there are challenges in
communication aswell.
• The communication between IoT devices is mainlywireless because they are generally
installed at geographicallydispersed locations.
• The wireless channels often have high rates of distortion and are unreliable.
• In this scenario reliablycommunicating data without too many retransmissions is
animportant problem and thus communication technologiesare integral to the study of IoT
devices.
• We can directly modify the physical world through actuators or we may do something
virtually. For example,we can send some information to other smart things.
• The process of effecting a change in the physical world is often dependent on its state
at that point of time. This is called context awareness. Each action is taken keeping in
consideration the context because an application can behave differently in different contexts.
• For example, a person may not like messages from his office to interrupt him when he
is on vacation. Sensors, actuators, compute servers, and the communication network form the
core infrastructure of an IoT framework. However, there are many software aspects that need
to be considered.
• First, we need a middleware that can be used to connect and manage all of these
heterogeneous components. We need a lot of standardization to connect many different devices.
• The Internet of Things finds various applications in health care, fitness, education,
entertainment, social life, energy conservation, environment monitoring, home automation, and
transport systems.
Domain-specific IoT
Domain-specific IoT refers to the use of IoT technology in a specific domain or industry.
1. Home Automation: IoT applications for smart homes include smart lighting, smart appliances,
intrusion detection, and smoke/gas detectors .
2. Cities: IoT applications for smart cities include traffic management, waste management, public
safety, and environmental monitoring .
3. Environment: IoT applications for the environment include weather monitoring, air quality
monitoring, and water quality monitoring .
4. Energy Systems: IoT applications for energy systems include smart grids, energy
management, and renewable energy monitoring .
5. Retail: IoT applications for retail include inventory management, customer tracking, and
personalized marketing .
6. Logistics: IoT applications for logistics include fleet management, supply chain management,
and asset tracking .
7. Industry: IoT applications for industry include predictive maintenance, machine diagnosis,
and quality control .
8. Agriculture: IoT applications for agriculture include smart irrigation, crop monitoring, and
livestock management .
9. Health: IoT applications for health include remote patient monitoring, telemedicine, and health
and fitness monitoring
Domain-specific IoT refers to the application of Internet of Things (IoT) technology within
specific industries or domains to address their unique needs and challenges. Instead of a one-
size-fits-all approach, domain-specific IoT solutions are tailored to particular sectors such as
healthcare, agriculture, manufacturing, smart cities, and more.
Here’s a breakdown:
Customization: IoT solutions are customized to suit the requirements of a particular industry.
For instance, in healthcare, IoT devices might focus on remote patient monitoring, while in
agriculture, they could aid in precision farming by monitoring soil moisture and temperature.
Industry Relevance: These solutions are designed to solve specific problems within an industry.
For instance, in manufacturing, IoT might be utilized for predictive maintenance to reduce
machinery downtime, while in transportation, it could optimize route planning and logistics.
Data Collection and Analytics: Domain-specific IoT involves collecting industry-specific data
through sensors, devices, and systems. This data is then processed, analyzed, and utilized to
derive meaningful insights and improve processes within that particular domain.
Integration with Existing Systems: These solutions often integrate with existing systems and
technologies within an industry. For instance, in smart cities, IoT devices might integrate with
traffic management systems or public transportation networks.
Security and Privacy Concerns: Each domain has its own set of security and privacy concerns.
For instance, in healthcare, patient data security is of utmost importance, while in smart homes,
securing personal information and devices against cyber threats is crucial.
In essence, domain-specific IoT solutions are tailored to the unique requirements, challenges,
and characteristics of different industries, ensuring that IoT technology is applied in a way that
maximizes its benefits within specific domains.
The goal of this committee was to create a common architecture that would help the
implementation of M2M applications and devices. (embedded Hardware/software)
Eg. Today’s Mobile Devices can’t perform much of M2M communication. Data sharing do but
not calls. Over time, the scope has expanded to include the Internet of Things.
SENSORS/END DEVICES/NODES must be intelligent to transmit data wo seeking any
intermediary devices for establishing logical connection, to find the best path / shortest path
and to delivery data to respective destination
platforms.
automation etc
One of the greatest challenges in designing an IoT architecture is dealing with the heterogeneity
(different) of devices, software, and access methods.
The oneM2M IoT Standardized Architecture The oneM2M architecture divides IoT functions
into three major domains:
1. application layer,
2. services layer,
3. network layer.
application layer
It is the oneM2M architecture's top layer. IoT applications and services reside in this layer. IoT
applications may take many different forms, from industrial monitoring to smart home
automation. To access and manage IoT resources and data, the application layer communicates
with the services layer. The role of the IoT M2M Application Layer is to integrate IoT devices
with apps, such as connecting smart devices to your phone. Additionally, it ensures that these
gadgets can exchange data with other crucial systems, such as business intelligence tools.
Services Layer
The service layer acts as a connecting layer between IoT devices and communication networks.
It is essential for abstracting away the difficulties of device connectivity and data transfer. This
layer standardizes data formats and communication protocols, providing interoperability across
IoT platforms and devices. We can also say this layer functions as the background control hub.
It manages the logical parts of the network and the rules they follow to work together
efficiently.
Network Layer
All devices, or "things," connect at the network layer. It also includes the physical network
connections, such as cellular or Wi-Fi networks that link them. The network layer manages the
connectivity and data transmission between IoT devices. It ensures that data is sent quickly and
securely between devices, the cloud, and other data processing facilities.
1. Temperature sensors: These sensors are used to measure the temperature of an object or
environment. They are commonly used in industrial settings to monitor the temperature of
machinery and equipment 3.
2. Pressure sensors: These sensors are used to measure the pressure of a gas or liquid. They are
commonly used in the oil and gas industry to monitor pipeline pressure and detect leaks 4.
3. Humidity sensors: These sensors are used to measure the amount of moisture in the air. They
are commonly used in HVAC systems to monitor and control indoor humidity levels .
4. Accelerometers: These sensors are used to measure acceleration and vibration. They are
commonly used in the automotive industry to monitor the performance of vehicles .
5. GPS sensors: These sensors are used to determine the location of an object or person. They
are commonly used in fleet management systems to track the location of vehicles .
These are just a few examples of M2M sensors. There are many other types of sensors that can
be used in M2M IoT applications, depending on the specific use case.
While there are some similarities between IoT and M2M, they are two distinct technologies
that are used in different ways 23. Here are some of the differences between IoT and M2M:
1. Scope: IoT has a larger scope than M2M, as it includes a wide range of devices and applications
that are connected to the internet. M2M, on the other hand, is limited to machine-to-machine
communication and is often used in specific industries such as manufacturing and logistics 12.
1. Intelligence: IoT devices are typically more intelligent and capable of operating autonomously,
while M2M devices rely on pre-programmed rules and algorithms 3.
2. Data Sharing: In IoT, data is shared between other applications that are used to improve the
end-user experience. In M2M, data is shared with only the communicating parties 1.
3. Internet: IoT devices are dependent on the internet for communication, while M2M devices
do not require an internet connection 4.
4. Communication: IoT supports cloud communication, while M2M supports point-to-point
communication 1.
5. API Support: IoT supports Open API integrations, while M2M does not 1.
Despite these differences, both IoT and M2M share some common characteristics, such as data
exchange, connectivity, automation, and real-time data 23.
Structure of IoT
IoT (Internet of Things) is a system of interrelated devices, objects, and sensors that are
connected to the internet and can communicate with each other without human intervention 1.
The architecture of IoT depends on its functionality and implementation in different sectors,
but there is a basic process flow based on which IoT is built. Here is a brief overview of the 4-
stage IoT architecture 1:
1. Sensing Layer: This is the first layer of the IoT architecture and is responsible for collecting
data from different sources. This layer includes sensors and actuators that are placed in the
environment to gather information about temperature, humidity, light, sound, and other
physical parameters. These devices are connected to the network layer through wired or
wireless communication protocols.
2. Network Layer: The network layer of an IoT architecture is responsible for providing
communication and connectivity between devices in the IoT system. It includes protocols and
technologies that enable devices to connect and communicate with each other and with the
wider internet. Examples of network technologies that are commonly used in IoT include WiFi,
Bluetooth, Zigbee, and cellular networks such as 4G and 5G. Additionally, the network layer
may include gateways and routers that act as intermediaries between devices and the wider
internet, and may also include security features such as encryption and authentication to protect
against unauthorized access.
3. Data Processing Layer: The data processing layer of IoT architecture refers to the software
and hardware components that are responsible for collecting, analyzing, and interpreting data
from IoT devices. This layer is responsible for receiving raw data from the devices, processing
it, and making it available for further analysis or action. The data processing layer includes a
variety of technologies and tools, such as data management systems, analytics platforms, and
machine learning algorithms. These tools are used to extract meaningful insights from the data
and make decisions based on that data. Example of a technology used in the data processing
layer is a data lake, which is a centralized repository for storing raw data from IoT devices.
4. Application Layer: The application layer of IoT architecture is the topmost layer that interacts
directly with the end-user. It is responsible for providing user-friendly interfaces and
functionalities that enable users to access and control IoT devices. This layer includes various
software and applications such as mobile apps, web portals, and other user interfaces that are
designed to interact with the underlying IoT infrastructure.
IOT (Internet of Things) map device
It seems like you're asking about mapping devices in the context of the Internet of Things (IoT).
In IoT, devices are often connected to the internet and can communicate with each other to
collect and exchange data. Mapping devices in this context could refer to several different
aspects, and I'll provide information on a few possibilities:
Geographical Mapping:
● Device Location: Tracking and mapping the physical location of IoT devices
can be crucial for various applications. This could involve using GPS modules
or other location-tracking technologies embedded in the devices.
● Geofencing: Creating virtual boundaries or geofences on a map to trigger
specific actions when devices enter or exit predefined areas.
Network Topology Mapping:
● Communication Paths: Understanding how devices are connected and
communicate with each other within a network. This involves mapping the
network topology to identify relationships and dependencies between devices.
Data Flow Mapping:
● Mapping Data Flows: Visualizing how data moves between different IoT
devices in a network. This can help optimize data flow and identify potential
bottlenecks or areas for improvement.
Device Health and Status:
● Health Monitoring: Mapping the health and status of IoT devices, including
real-time information about their operational conditions. This can aid in
proactive maintenance and troubleshooting.
Security and Compliance Mapping:
● Security Posture: Mapping the security features and vulnerabilities of IoT
devices to ensure compliance with security standards and regulations.
● Access Control: Visualizing and managing the access control policies for each
device within the IoT ecosystem.
Application-Specific Mapping:
● Custom Maps for Applications: Depending on the specific IoT application,
mapping may involve custom features. For example, in a smart home system,
mapping could involve visualizing the layout of devices within a house and their
interactions.
Mapping devices in the IoT space often involves the use of software tools, platforms, and
protocols that facilitate device communication, data exchange, and visualization. Additionally,
considerations for data privacy and security are crucial when dealing with location and other
sensitive information in IoT environments.
IOT Map Device An IOT (Internet of Things) map device is a device that is connected to the
internet and is capable of gathering and transmitting location-based data to other devices or
systems. These devices typically use a combination of GPS (Global Positioning System), Wi-
Fi, Bluetooth, and cellular technologies to determine their location and transmit that
information to a central server or cloud-based system. IOT map devices can be used for a
variety of purposes, such as tracking the location of assets, vehicles, or people. They can also
be used for geo fencing, which involves setting up virtual boundaries around a specific area
and triggering alerts or actions when a device enters or leaves that area. The Internet of Things
(IoT) is growing rapidly with an estimated 23billion connected devices deployed worldwide in
2018 [28]. These devices range from expensive infrastructure components, such as actuators in
smart cities, through to low-cost commodity devices such as radio frequency beacons (e.g.
iBeacons). 16 IOT Map device Deployment strategies for such IoT devices range from
carefully controlled large-scale rollouts with sign cant organizational support through to ad-
hoc deployments by individuals. While the number of devices, and the degree of connectivity
is growing, it is striking that as a society we are increasingly unaware of the locations and
purposes of such devices. In keeping with Weise's vision of technology that fades into the
background, much of the IoT technology being deployed is essentially designed to be invisible.
This lack of awareness both limits the services that can be provided and raises concerns for
users and system owners. Fully harnessing the capabilities of IoT deployments while avoid-ing
potential disadvantages, e.g. related to privacy and security concerns, requires knowledge about
available devices, their locations, and capabilities. In other words, IoT devices should be
mapped. While there have been previous attempts at cataloguing IoT devices these have mostly
focused on registering networked de-vices without providing detailed information about the
locations and capabilities of devices
NETCONF
• NETCONF uses XML-encoded Remote Procedure Calls (RPCs) for framing request and
response messages.
• The RPC layer provides mechanism for encoding of RPC calls and notifications.
• NETCONF provides various operations to retrieve and edit configuration data from network
devices.
• The Content Layer consists of configuration and state data which is XML-encoded.
• The schema of the configuration and state data is defined in a data modeling language called
YANG.
• The configuration data resides within a NETCONF configuration datastore on the server.
YANG
YANG is a data modeling language used to model configuration and state data manipulated by
the NETCONF protocol • YANG modules contain the definitions of the configuration data,
state data, RPC calls that can be issued and the format of the notifications. • YANG modules
defines the data exchanged between the NETCONF client and server.
• A module comprises of a number of 'leaf' nodes which are organized into a hierarchical tree
structure.
• The 'leaf' nodes are specified using the 'leaf' or 'leaf-list' constructs.
• YANG can model both configuration data and state data using the 'config' statement.
• Management System
• Management API
• Transaction Manager
• Rollback Manager
• Configuration Validator
• Configuration Database
• Configuration API
• Data Provider AP
UNIT -II
IoT ARCHITECTURE, GENERATIONS AND PROTOCOLS
IETF architecture for IoT - IoT reference architecture -First Generation – Description
&Characteristics–Advanced Generation – Description & Characteristics–
Integrated IoT Sensors –Description & Characteristics
IETF ARCHITECTURE
The Internet Engineering Task Force (IETF) is a standards organization for the Internet and is
responsible for the technical standards that make up the Internet protocol suite (TCP/IP).[3] It
has no formal membership roster or requirements and all its participants are volunteers. Their
work is usually funded by employers or other sponsors.
The IETF was initially supported by the federal government of the United States but since 1993
has operated under the auspices of the Internet Society, a non-profit organization with local
chapters around the world.
IETF organizational structure
IETF members are volunteers, drawn from the Internet Society's individual and organization
membership. Members form working groups and area directors appoint a chairperson (or co-
chairs) to deal with a particular area discussed in IETF meetings.
Ultimately, the area directors, working groups and chairs form the Internet Engineering
Steering Group (IESG), which is responsible for creating internet standards expressed in the
form of Requests for Comments (RFCs).
Decisions on a standards track are made by rough consensus instead of formal voting protocols.
As part of overseeing the work of the IETF, the IAB supervises the RFC editor and offers
technical direction to ensure the smooth operation of the internet.
They are also responsible for the Internet Research Task Force (IRTF), an organization parallel
to the IETF that focuses on long-term research on issues relevant to the evolution of the
internet.
Additionally, the Internet Assigned Numbers Authority (IANA), an organization responsible
for overseeing global IP address allocation, root zone management in the Domain Name
System (DNS), autonomous system number allocation, and other Internet Protocol-related
symbols and numbers, also works closely with the IETF.Funding for IETF activities is provided
by meeting dues, sponsors and proceeds provided by organizational membership to the Public
Interest Registry.
IETF areas of focus
The common areas of focus for the IETF include:
● applications
● general
● infrastructure
● internet
● operations and management
● real-time applications
● routing
● security
● transport
IOT REFERENCE ARCHITECTURE:
A reference architecture serves as a standardized blueprint that provides a clear structure and
guidelines for designing and implementing an IoT system. It enables consistency, promotes
best practices, and facilitates communication and collaboration among stakeholders. By
leveraging a reference architecture, developers can reduce design complexity, ensure
interoperability, and accelerate the development process, ultimately leading to more efficient
and reliable IoT solutions.
Layers of IoT Reference Architecture
IoT reference architectures typically consist of multiple layers that work together to enable the
functioning of an IoT system. While the specific layering may vary based on different
frameworks or standards, a commonly used layered structure includes the following:
● Perception Layer:This layer comprises the physical devices or sensors that collect data
from the environment or interact with the physical world. These devices can include
temperature sensors, motion detectors, cameras, and other IoT−enabled devices.
● Network Layer: The network layer facilitates the connectivity and communication
between the IoT devices and the cloud or other data processing components. It includes
protocols, gateways, routers, and other networking infrastructure to ensure seamless
data transfer and reliable connections.
● Data Processing Layer: This layer involves processing and analyzing the data
collected from IoT devices. It may include edge computing devices or cloud−based
platforms where data is aggregated, filtered, transformed, and analyzed to derive
valuable insights.
● Application Layer: The application layer encompasses the software applications or
services that utilize the processed IoT data to provide specific functionalities or address
specific use cases. These applications can range from real−time monitoring and control
systems to predictive analytics, machine learning algorithms, and automation
Key Components of IoT Reference Architecture
The key components of an IoT reference architecture include:
● Devices: These physical objects, ranging from sensors to smart appliances, play a
crucial role in collecting data and transmitting it to the cloud.
● Network: The network infrastructure, which can be wired or wireless, connects the
devices to the cloud, enabling seamless data transfer and communication.
● Cloud: The cloud serves as the centralized storage and processing hub for the data
collected by the devices. It can be a public, private, or hybrid cloud, depending on
specific requirements.
● Applications: Software applications leverage the data collected by devices to deliver
insights and value. These applications can be tailored for various purposes, including
monitoring, control, and automation.
● Security: Security measures are essential to protect the data collected by devices from
unauthorized access. Techniques like encryption, authentication, and authorization
ensure data security.
● Privacy: Privacy measures safeguard personal data collected by devices from
unauthorized access. Anonymization, pseudonymization, and data minimization
techniques contribute to maintaining privacy.
● Governance: Governance policies ensure responsible and ethical use of the IoT
system. These policies address aspects such as data ownership, data sharing, and
appropriate data usage.
By considering these key components, an IoT reference architecture provides a comprehensive
framework for designing and implementing robust and secure IoT solutions.
Benefits of Using IoT Reference Architecture
● Common Framework: IoT reference architecture provides a standardized framework
for designing and implementing IoT solutions, ensuring consistency and
interoperability across systems.
● Security and Scalability: The architecture serves as a foundation for implementing
robust security and scalability measures, safeguarding IoT systems against threats and
enabling future growth.
● Cost Efficiency: By leveraging a reference architecture, organizations can avoid
reinventing the wheel and utilize existing technologies and expertise, reducing the cost
of development and deployment.
● Faster Time to Market: Utilizing a reference architecture accelerates the
implementation of IoT solutions, enabling organizations to get their systems up and
running more quickly and efficiently.
FIRST GENERATION IOT ARCHITECTURES
First-generation IoT (Internet of Things) architectures typically involve a basic framework for
connecting devices and collecting data. Here are some key components and characteristics of
early IoT architectures:
SCADA and RFID Protocols - BACnet Protocol -Zigbee Architecture - 6LowPAN - CoAP
-Wireless Sensor Structure–Energy Storage Module–Power Management Module–RF
Module –Sensing Module
SCADA (Supervisory Control and Data Acquisition) and RFID (Radio Frequency
Identification) protocols are two critical technologies that have transformed various industries.
SCADA systems allow for remote monitoring and control of industrial processes in the oil and
gas, energy, and manufacturing industries. These systems collect data from sensors and deliver
it in real-time to human operators, allowing them to monitor and adjust the process as needed.
On the other hand, RFID is a wireless technology that communicates with tags attached to
objects via radio waves. These tags contain one-of-a-kind identification codes that allow the
system to track the object’s location, movements, and other data. RFID has a wide range of
applications, including supply chain management, inventory control, and security and access
control.
SCADA and RFID technologies have significantly improved industrial processes, making them
more efficient, safe, and secure. We can expect even more advancements and opportunities in
the future as these technologies continue to evolve.
Both Supervisory Control and Data Acquisition (SCADA) and Radio Frequency Identification
(RFID) protocols are widely used in a variety of industries. SCADA is a system that allows
operators to remotely monitor and control industrial processes, whereas RFID is a wireless
technology used for object tracking and identification.
SCADA systems collect data from sensors installed in the process and transmit it to a central
control system via communication protocols. This data is then analyzed to provide human
operators with real-time information, allowing them to make informed decisions and remotely
control the process. SCADA systems are used in many industries, including oil and gas, water
treatment, energy, and manufacturing.
RFID, on the other hand, communicates with tags attached to objects using radio waves. These
tags have a unique identification code that RFID readers can read, allowing the system to track
the object’s location, movement, and other data. RFID is widely used in inventory
management, asset tracking, access control, and security applications.
The integration of SCADA and RFID technologies has given industrial environments a new
level of visibility and control. Operators can quickly identify issues and take action to prevent
further problems by using RFID to track objects and SCADA to monitor and control the
process. Due to this integration, businesses have been able to optimize their operations, reduce
downtime, and improve safety and security.
The combination of SCADA and RFID protocols has given industries powerful tools for
increasing efficiency, productivity, and safety. We can expect to see even more innovative
applications in the future as these technologies continue to evolve.
SCADA (Supervisory Control and Data Acquisition) protocols are used in industrial processes
to enable communication and control. Sensors, controllers, and communication devices are
among the components of a SCADA system. The SCADA protocols used to control and
communicate with these components are critical for ensuring that industrial processes run
efficiently and safely.
SCADA communication protocols are used to transfer data between SCADA system
components. Modbus, DNP3 (Distributed Network Protocol), and IEC 60870-5 are the most
common communication protocols used in SCADA systems. These protocols define the
structure of the data being transmitted, the type of data, and the method of data transfer.
Control protocols are used to manage the various components of a SCADA system. OPC (OLE
for Process Control), BACnet (Building Automation and Control Networks), and SNMP are
the most common control protocols used in SCADA systems (Simple Network Management
Protocol). These protocols are used to configure devices, set and adjust system parameters, and
manage alarms and events.
SCADA systems allow for remote monitoring and control of industrial processes while
providing real-time data to human operators. These systems are used in various industries,
including energy and water treatment, manufacturing, and transportation. SCADA protocols
allow these systems to operate seamlessly, ensuring the process’s efficiency and safety.
Understanding SCADA protocols is critical for ensuring that industrial processes run
efficiently and safely. Properly selecting and implementing communication and control
protocols are critical for a SCADA system’s integrity. SCADA systems are poised to continue
revolutionizing industries and providing critical support for industrial processes as new
protocols, and technological advancements emerge.
RFID (Radio Frequency Identification) protocols identify and track objects using radio waves.
RFID protocols of various types and standards are used in various industries for various
applications.
The most common RFID protocols are low-frequency (LF), high-frequency (HF), and ultra-
high-frequency (UHF). LF RFID operates at a frequency of 125-134 kHz and is used for short-
range communication, typically up to 10 cm. HF RFID operates at a frequency of 13.56 MHz
and is used for short- to medium-range communication (up to 1 meter). UHF RFID operates at
a frequency range of 860-960 MHz and is used for long-range communication up to several
meters.
Aside from these, several RFID standards are used for identification and tracking. The most
widely used standards for HF RFID are ISO 14443 and ISO 15693, and ISO 18000-6c for UHF
RFID. These standards specify the RFID system’s frequency, data rate, and encoding. They
also define the RFID tag’s data structure, including the identification number, manufacturer
code, and other pertinent information.
RFID protocol and standard implementation vary depending on the application. For example,
LF RFID is commonly used in animal identification, whereas HF RFID is used in access
control, payment systems, and inventory management. UHF RFID is used in supply chain
management, asset tracking, and other applications that require long-range communication.
RFID protocols and standards are critical in identifying and tracking objects across industries.
The appropriate protocol and standard are chosen based on the specific application
requirements. RFID is poised to continue revolutionizing industries and enabling a new level
of visibility and control as technology advances, and new standards emerge.
SCADA (Supervisory Control and Data Acquisition) systems are used in industrial settings to
monitor and control critical processes, making them vulnerable to cyber-attacks. SCADA
systems are frequently linked to other systems and networks, posing potential security risks.
SCADA security entails safeguarding industrial control systems against cyber threats that could
cause disruptions, sabotage, or other types of attacks. There are two types of cyber threats to
SCADA systems: external and internal. External threats come from outside the organization,
whereas internal threats come from within the organization.
Security measures that ensure data confidentiality, integrity, and availability must be
implemented to protect SCADA systems from cyber threats. One important measure is to use
strong access controls, such as multi-factor authentication and role-based access controls, to
limit access to sensitive information and systems. In addition to monitoring network traffic and
detecting anomalies that may indicate a security breach, firewalls, and intrusion detection
systems can be used.
Another important precaution is to keep software and hardware systems up to date, as outdated
systems can create vulnerabilities that cyber attackers can exploit. Regular security audits,
penetration testing and vulnerability scans can assist in identifying and correcting security
flaws in SCADA systems.
Furthermore, user training and awareness can be critical in helping employees understand the
risks and best practices for safely and securely using SCADA systems. This includes educating
employees on social engineering attacks, phishing, and other common cyber-attack tactics.
Safeguarding SCADA systems against cyber threats is critical to ensuring the safe and efficient
operation of industrial processes. Strong access controls, current software and hardware, and
regular security assessments are critical measures for protecting SCADA systems from external
and internal cyber threats. Organizations can reduce the risk of cyber attacks on their SCADA
systems by implementing these measures and fostering a culture of security awareness.
RFID and SCADA Integration: Enhancing Visibility and Control in Industrial Environments
RFID and SCADA system integration can provide a variety of benefits, including increased
accuracy, efficiency, and productivity. RFID tags can be attached to assets or inventory,
allowing for real-time tracking and monitoring, and SCADA can use this data to optimize
processes, reduce downtime, and improve overall efficiency.
RFID and SCADA integration can improve security by providing real-time alerts when
unauthorized access is detected, in addition to tracking and monitoring. RFID tags can also be
used to identify employees and track their movements, preventing access to restricted areas and
increasing safety.
Furthermore, integrating RFID and SCADA can improve supply chain management by
providing real-time visibility into the movement and status of goods from production to
delivery. This allows for better decision-making and can aid in cost reduction and customer
satisfaction.
However, integrating RFID and SCADA systems requires careful planning and execution to
ensure that they work effectively and securely together. A thorough assessment of the
organization’s needs and an evaluation of the available technologies, standards, and protocols
should be part of the integration process.
When integrating RFID and SCADA systems, security should be a top priority. This includes
enforcing strict access controls, encrypting data, and conducting regular security audits to
identify and address vulnerabilities.
Integrating RFID and SCADA systems can provide significant benefits to industrial
organizations, such as improved visibility, control, efficiency, and security. However, careful
planning and implementation are required to ensure that the systems work effectively and
securely together. Organizations can improve their operations and gain a competitive
advantage in the market by integrating RFID and SCADA systems.
SCADA and RFID in Smart Manufacturing: Advancements and Challenges
In smart manufacturing environments, SCADA and RFID technologies can provide real-time
monitoring, control, and automation of industrial processes. RFID tags are useful for
identifying and tracking inventory and assets, whereas SCADA systems are useful for
monitoring and controlling critical processes like temperature, pressure, and flow rate.
The integration of SCADA and RFID technologies in smart manufacturing environments has
the potential to improve automation, efficiency, and productivity significantly. Real-time data
from RFID tags, for example, can be used to optimize production lines, reduce waste, and
improve overall efficiency. SCADA systems can also be used to automate routine tasks like
quality control and maintenance, allowing personnel to focus on more difficult tasks.
Another difficulty is the requirement to integrate multiple systems and technologies. Smart
manufacturing environments frequently employ various technologies and platforms that are not
always designed to work in tandem. As a result, it is critical to ensure that the various systems
are compatible and capable of communicating effectively.
The integration of SCADA and RFID technologies in smart manufacturing environments has
the potential to improve automation, efficiency, and productivity significantly. However, it
presents several challenges, including the need to ensure data privacy and security and the
integration of multiple systems and technologies. Organizations can gain a competitive
advantage in the marketplace and improve their operations by addressing these challenges and
leveraging the full potential of these technologies.
Conclusion:
SCADA (Supervisory Control and Data Acquisition) and RFID (Radio Frequency
Identification) protocols are critical technologies with important applications in industrial
settings. SCADA systems monitor and control industrial processes in real-time, while RFID
technology identifies and tracks assets and inventory.
The integration of these technologies has the potential to provide a variety of benefits, including
increased efficiency, productivity, and visibility into industrial processes. RFID and SCADA
integration, for example, can lead to improved security, supply chain management, and
decision-making.
However, integrating these technologies poses difficulties, particularly in terms of security and
interoperability. Strong security measures must be implemented to ensure the successful
integration of SCADA and RFID protocols, and the integration process must be carefully
planned.
Overall, the continued development and integration of SCADA and RFID protocols will be
critical in furthering industrial automation, optimizing processes, and increasing operational
efficiency. Organizations can gain a competitive advantage and achieve their business
objectives by leveraging these technologies with the right approach and investment.
BACnet protocol
BACnet protocol was developed by a committee named ASHRAE or the American Society of
Heating, Refrigerating & Air-Conditioning Engineers in 1987. The main motto of this
committee is to make a protocol that would provide systems from various manufacturers to
communicate together in a pleasant way. So this protocol is a registered brand of ASHRAE.
Since the time protocol was developed it is undergoing continuous changes with an open
agreement procedure. So that all interested parties are welcome to participate with no fees. So
this article discusses an overview of Bacnet Protocol basics – working with applications.
A data communication protocal that is used to build an automated control network, is known
as BACnet or Building Automation Control Network. This data communication protocol is
both an ISO & ANSI standard used for interoperability between cooperating building
automation devices. Bacnet Protocol includes a set of rules for governing the data exchange on
a computer network that simply covers all from what type of cable to utilize, to form a particular
command or request in a normal way.
To attain interoperability across a broad spectrum of equipment, the BACnet specification
includes three major parts. Primary, Secondary, and tertiary. So the primary part defines a
technique to represent any kind of building automation apparatus in a normal way. The
secondary part describes messages that can be transmitted across a network of computers to
check and manage such equipment. The final part describes a set of suitable LANs which are
used for conveying BACnet communications.
BACnet is used as a tool by owners of buildings & system specifiers for the specification of
the interoperable system. This protocol does not change the need for indicating what a
consumer needs. So, it provides simply some consistent tools to assist the creation &
specification of systems that can interoperate.BACnet protocol is used in all types of automated
building systems. So, there are interoperable products available within different categories like
security, fire, lighting, elevators, HVAC, etc. This protocol simply addresses the
interoperability goal through simply defining a general working model of automation devices,
a technique used for defining the data that they include, & also a technique used for explaining
protocols that a single device can utilize to inquire one more device to execute some preferred
action.
The BACnet protocol architecture is predominately restricted to lighting controls, HVAC &
gateways. This protocol highlights lightweight and efficient communication which is optimized
for short messages, small networks, and inter-networks.
BACnet protocol architecture is a collapsed architecture that matches to 4-layers of the OSI
model. The four layers in the BACnet architecture mainly include Application, Network, Data
Link & Physical. Even though, just the Network layer & Application layer are simply BACnet.
The above architecture is the BACnet protocol stack which includes different layers as shown
in the diagram. This protocol is a collapsed version of the OSI stack. The transport and session
layers are not used. The application layer takes on the functions of these two layers.
BACnet Physical Layer
The upper layers of BACnet do not depend on the physical layer. So the Physical layer of
BACnet makes it feasible for BACnet to be executed on different networks. The physical layers
of BACnet have been specified with ARCNET, Ethernet, IP tunnels, BACnet/IP, RS-232,
RS485, and Lonworks/LonTalk. RS232 is for point-to-point communication. RS485 supports
up to 32 nodes with a distance of 1200 m at 76Kbps.
This layer simply specifies the required addresses of the network for routing. BACnet network
includes a minimum of one or above segments that are connected with bridges once they utilize
similar LAN technologies. If they utilize various LAN protocols then they are connected
through routers.
Application Layer
BACnet does not separate presentation as well as application layers. So it takes care of
reliability & sequencing or segmentation mechanisms generally connected with both the
session & transport layers. BACnet includes devices like objects to exchange service primitives
which are described with ASN.1 syntax & serialized with ASN.1 BER.
The concept of BACnet security can be understood easily with an example say when BACnet
device-A requests a session key from the key server for establishing secure communication
through device-B, then this key is transmitted to both the device-A & device-B through the key
server which is known as ‘SKab’. BACnet protocol uses 56-bit DES encryption.
BACnet is a typical electronic communication protocol that works by allowing different kinds
of manufacturers’ building automation as well as monitoring systems like fire alarms, HVAC,
and perimeter security for communicating with each other. This protocol can work with nearly
any normal data protocol including TCP/IP.
al information (physical inputs, outputs) & nonphysical information (software/calculations). It
is very significant to note that every object may signify a single portion of information
otherwise a group of information which executes the same and exact function.
BACnet Object
BACnet object is a concept that allows the communication as well as a group of data related to
i/ps, o/ps, software & calculations to be executed. The BACnet Object can visible itself in
different ways like Single Points, Logical Groups, Program Logic, Schedules & Historical
Data.
The BACnet objects are both physical & non-physical. For instance, a thermostat is considered
a physical concept & the HVAC system is considered the output device. The best example of
a non-physical concept is the maintenance schedule of an HVAC in the software form.
All BACnet objects include different properties of information exchange & commands. These
properties represented in a tabular format with two columns. The first column includes the
name of the property & the second column provides the value of the property. In the second
column, the Information can exist in a write-enable/read-only format.
The BACnet object example for a binary input of a sensor within a building is shown below.
In the above table, the first four properties are necessary by the BACnet standard whereas the
last two properties are simply considered optional. So, these optional objects are frequently
necessary by a developer, however, those objects should match the standard of BACnet. The
example will show simply a few of the properties of an object. In real life, particularly in a
building automation setting, different properties would be there within the object. Most experts
& sources specify there are 23 standard BACnet objects utilized in building automation
systems. So, standard objects operate in the BACnet standard.
The 23 standard BACnet objects are Binary i/p, Binary o/p, Binary value, Analog i/p, Analog
o/p, Analog value, Averaging, LifeSafety Zone, LifeSafety Point, Multi-State i/p, Multi-State
o/p, Multi-State value, Loop, Calendar, Notification Class, Command, File, Program,
Schedule, Trend Log, Group, Event Enrollment & Device.
Once a set of objects executes a specific function then it is known as a BACnet device. All
these objects should include an identifier, data type & additional information like read-only,
modified through other devices, and many more.
Different Types
The different types of BACnet protocols are discussed below.
BACnet/IP
This is normally used with existing VLAN & WAN networks. So the devices can connect
directly to hubs or Ethernet switches. This LAN is a high-performance & fast type, but very
costly. BACnet/IP utilizes UDP/IP for compatibility through existing IP infrastructure. Once
BACnet/IP is utilized with several IP subnets, then extra device functionality known as
BBMDs (BACnet Broadcast Management Devices) is necessary to handle broadcast messages
of inter-subnet BACnet.
BACnet MS/TP
This kind of LAN uses EIA-485 twisted pair for signaling up to 4k feet. So it is a very famous
type of BACnet LAN which is used for unitary as well as application-specific controllers. This
BACnet MS/TP is not expensive.
BACnet is directly used with Ethernet 8802-3 networks which are similar to BACnet/IP in
terms of speed & cost, although restricted to a single physical infrastructure that does not utilize
IP routers.
BACnet over ARCNET
This BACnet is MAC type which includes two forms like 2.5Mbs coax & 156Kbs above EIA-
485. This BACnet is supported by a limited number of vendors with ARCNET.
BACnet Point-to-Point
This BACnet Point-to-Point is simply used over the networks of dial-up telephones. Generally,
thus direct EIA-232 connection is no longer used for a direct Ethernet connection.
This BACnet simply allows LonTalk’s transport component for carrying BACnet messages.
But, the two protocols are not interoperable.
Generally, this MAC is a wireless mesh network used with less costly devices. So it is normally
used as a gateway to ZigBee devices & not like a native BACnet transport.
Bacnet to Modbus Converter
● It includes a front panel that has LED for indication of quick diagnostic
● Windows-based configuration utility.
● It supports up to 100 BACnet devices interface to TCP Master/Slave or Modbus RTU.
● It has the capacity for interfacing up to 5K mapping points.
● It supports the COV bit packing feature.
Advantages
The advantages of the Bacnet Protocol include the following.
The problems or net-worthy attacks which are widely found in this protocol are; Lack of
spoofing & authentication, DoS attacks, immobilized network connections, and lack of
encryption & write access over devices.
The difference between Bacnet Protocol and Modbus include the following.
BACnet Protocol
Modbus
It was developed by ASHRAE. It was developed by Modicon Inc.
Modbus is used for communication
Bacnet is used for communication across
devices. between devices.
Its transmission modes are;
Its transmission modes are; IP, Ethernet,
Zigbee & MS/TP. ASCII, RTU, and TCP/IP.
Its standards are; ANSI/ASHRAE Standard
185; ISO-16484-5; ISO-16484-6. Its standards are; IEC 61158.
It is used in different markets like
It is used in different markets like Industrial,
Lighting, Life Safety, Access Controls,
Energy Management, Transportation, Building
Automation, Regulatory, health & security. HVAC, transportation & maintenance.
Network Interfaces: Traditional serial &
Network Interfaces: Existing LANs &LANs
infrastructure. Ethernet protocols.
Examples: Tasks like fan schedule,
sending a status alarm, and requesting
Examples: Measurements of Tank Level.
Boiler Control. temperature reading.
Applications
The use of Bacnet Protocol includes the following.
● The BACnet is used in HVAC applications, fire control lighting control, security, alarm &
interfacing to utility companies.
● This protocol was particularly designed for building automation as well as control
applications.
● This protocol is used to provide mechanisms, especially for automation devices for
exchanging data irrespective of the specific building service they perform.
● This protocol can be used by digital controllers, computers & application-specific otherwise
unitary controllers with equivalent effect.
● BACnet protocol was initially developed to develop interoperability between building
automation devices; however, its data descriptions, as well as flexible architecture, will
make it work within a broad range of control applications.
● This is an object-oriented protocol, so used to signify network-accessible control equipment.
In this present communication world, there are numerous high data rate communication
standards that are available, but none of these meet the sensors’ and control devices’
communication standards. These high-data-rate communication standards require low-latency
and low-energy consumption even at lower bandwidths. The available proprietary wireless
systems’ Zigbee technology is low-cost and low-power consumption and its excellent and
superb characteristics make this communication best suited for several embedded applications,
industrial control, and home automation, and so on. The Zigbee technology range for
transmission distances mainly ranges from 10 – 100 meters based on the output of power as
well as environmental characteristics.
Zigbee communication is specially built for control and sensor networks on IEEE 802.15.4
standard for wireless personal area networks (WPANs), and it is the product from Zigbee
alliance. This communication standard defines physical and Media Access Control (MAC)
layers to handle many devices at low-data rates. These Zigbee’s WPANs operate at 868 MHz,
902-928MHz, and 2.4 GHz frequencies. The data rate of 250 kbps is best suited for periodic as
well as intermediate two-way transmission of data between sensors and controllers.
Zigbee is a low-cost and low-powered mesh network widely deployed for controlling and
monitoring applications where it covers 10-100 meters within the range. This communication
system is less expensive and simpler than the other proprietary short-range wireless sensor
networks as Bluetooth and Wi-Fi.
Zigbee Modem
Zigbee supports different network configurations for the master to master or master to slave
communications. And also, it can be operated in different modes as a result the battery power
is conserved. Zigbee networks are extendable with the use of routers and allow many nodes to
interconnect with each other for building a wider area network.
Cluster Library
In the year 2006, September, the Specification of Zigbee 2006 was announced by replacing the
2004 stack. So this specification mainly replaces the pair structure of key-value as well as
message utilized within the 2004 stack through a cluster library.
A library includes a set of consistent commands, planned beneath groups called clusters with
names like Home Automation, Smart Energy & Light Link of ZigBee. In the year 2017, the
library was renamed with Dotdot by Zigbee Alliance and announced as a new protocol. So, this
Dotdot has worked for approximately all Zigbee devices as the default application layer.
Zigbee Pro
In the year 2007, Zigbee Pro like Zigbee 2007 was finalized. It is one kind of device which
operates on a legacy Zigbee network. Because of the disparities within the options of routing,
these devices should turn into non-routing ZEDs or Zigbee end devices (ZEDs) on a legacy
Zigbee network. The legacy Zigbee devices have to turn into Zigbee end devices on a network
of Zigbee Pro. It functions through the 2.4 GHz ISM band as well as includes a sub-GHz band.
How does Zigbee Technology Work?
Zigbee technology works with digital radios by allowing different devices to converse through
one another. The devices used in this network are a router, coordinator as well as end devices.
The main function of these devices is to deliver the instructions and messages from the
coordinator to the single end devices such as a light bulb.
In this network, the coordinator is the most essential device which is placed at the origin of the
system. For each network, there is simply one coordinator, used to perform different tasks.
They choose a suitable channel to scan a channel as well as to find the most appropriate one
through the minimum of interference, allocate an exclusive ID as well as an address to every
device within the network so that messages otherwise instructions can be transferred in the
network.
Routers are arranged among the coordinator as well as end devices which are accountable for
messages routing among the various nodes. Routers get messages from the coordinator and
stored them until their end devices are in a situation to get them. These can also permit other
end devices as well as routers to connect the network;
In this network, the small information can be controlled by end devices by communicating with
the parent node like a router or the coordinator based on the Zigbee network type. End devices
don’t converse directly through each other. First, all traffic can be routed toward the parent
node like the router, which holds this data until the device’s receiving end is in a situation to
get it through being aware. End devices are used to request any messages that are waiting from
the parent.
Zigbee Architecture
Zigbee system structure consists of three different types of devices as Zigbee Coordinator,
Router, and End device. Every Zigbee network must consist of at least one coordinator which
acts as a root and bridge of the network. The coordinator is responsible for handling and storing
the information while performing receiving and transmitting data operations.
Zigbee routers act as intermediary devices that permit data to pass to and fro through them to
other devices. End devices have limited functionality to communicate with the parent nodes
such that the battery power is saved as shown in the figure. The number of routers, coordinators,
and end devices depends on the type of networks such as star, tree, and mesh networks.
Zigbee protocol architecture consists of a stack of various layers where IEEE 802.15.4 is
defined by physical and MAC layers while this protocol is completed by accumulating Zigbee’s
own network and application layers.
ZigBee Technology Architecture
Physical Layer: This layer does modulation and demodulation operations upon transmitting
and receiving signals respectively. This layer’s frequency, data rate, and a number of channels
are given below.
MAC Layer: This layer is responsible for reliable transmission of data by accessing different
networks with the carrier sense multiple access collision avoidances (CSMA). This also
transmits the beacon frames for synchronizing communication.
Network Layer: This layer takes care of all network-related operations such as network setup,
end device connection, and disconnection to network, routing, device configurations, etc.
Application Support Sub-Layer: This layer enables the services necessary for Zigbee device
objects and application objects to interface with the network layers for data managing services.
This layer is responsible for matching two devices according to their services and needs.
Application Framework: It provides two types of data services as key-value pair and generic
message services. The generic message is a developer-defined structure, whereas the key-value
pair is used for getting attributes within the application objects. ZDO provides an interface
between application objects and the APS layer in Zigbee devices. It is responsible for detecting,
initiating, and binding other devices to the network.
However, it requires more power supply and its overall power consumption is low because
most of the devices are in an inactive state for over long periods in the network. In a beacon
mode, when there is no data communication from end devices, then the routers and coordinators
enter into a sleep state. Periodically this coordinator wakes up and transmits the beacons to the
routers in the network.
These beacon networks are work for time slots which means, they operate when the
communication needed results in lower duty cycles and longer battery usage. These beacon and
non-beacon modes of Zigbee can manage periodic (sensors data), intermittent (Light switches),
and repetitive data types.
Zigbee Topologies
Zigbee supports several network topologies; however, the most commonly used configurations
are star, mesh, and cluster tree topologies. Any topology consists of one or more coordinators.
In a star topology, the network consists of one coordinator which is responsible for initiating
and managing the devices over the network. All other devices are called end devices that
directly communicate with the coordinator.
This is used in industries where all the endpoint devices are needed to communicate with the
central controller, and this topology is simple and easy to deploy. In mesh and tree topologies,
the Zigbee network is extended with several routers where the coordinator is responsible for
staring them. These structures allow any device to communicate with any other adjacent node
for providing redundancy to the data.
If any node fails, the information is routed automatically to other devices by these topologies.
As redundancy is the main factor in industries, hence mesh topology is mostly used. In a
cluster-tree network, each cluster consists of a coordinator with leaf nodes, and these
coordinators are connected to the parent coordinator which initiates the entire network.
Due to the advantages of Zigbee technology like low cost and low power operating modes and
its topologies, this short-range communication technology is best suited for several applications
compared to other proprietary communications, such as Bluetooth, Wi-Fi, etc. some of these
comparisons such as range of Zigbee, standards, etc., are given below.
We know that different types of wireless technologies are available in the market such as
Bluetooth as well as WiFi which provides high speed of data. But, the data rates in Zigbee are
less because the main purpose behind the ZigBee development is to utilize it in wireless control
as well as monitor.
The amount of data, as well as the frequency of communication used in such applications, is
extremely low. Although, it is probable for a network like IEEE 802.15.4 to attain high data
rates, so the Zigbee technology is based on the network IEEE 802.15.4.
We know that Zigbee is one kind of communication technology similar to Bluetooth as well as
WiFi, however, there are also numerous new rising networking alternatives like Thread which
is an option for the applications of home automation. In major cities, the Whitespace
technologies were implemented for IoT-based wider region use cases.
ZigBee is a low-power WLAN (wireless local area network) specification. It provides fewer
data using less power by frequently connected devices to turn off a battery. Due to this, the
open standard has been connected through M2M (machine-to-machine) communication as well
as the industrial IoT (internet of things).
Zigbee has become an IoT protocol that is accepted globally. It is already competing with
Bluetooth, WiFi, and Thread.
Zigbee Devices
The specification of IEEE 802.15.4 Zigbee mainly includes two devices like Full-Function
Devices (FFD) as well as Reduced-Function Devices (RFD). An FFD Device performs
different tasks which are explained within the specification & it can adopt any task within the
network.
An RFD Device has partial capabilities so it performs limited tasks and this device can converse
with any device within the network. It must act as well as pay attention within the network. An
RFD device can converse simply with an FFD Device & it is used in simple applications such
as controlling a switch by activating and deactivating it.
In an IEEE 802.15.4 n/w, the Zigbee devices play three different roles like Coordinator, PAN
Coordinator & Device. Here, FFD devices are Coordinator as well as PAN Coordinator
whereas the Device is either an RFD/ FFD Device.
The main function of a coordinator is for relaying messages. In a personal area network, a PAN
controller is an essential controller and a device is known as if the device is not a coordinator.
The ZigBee standard can create three protocol devices depending on the Zigbee devices, PAN
coordinator, coordinator, and the standard specification of ZigBee like the coordinator, router,
and end device which are discussed below.
Zigbee Coordinator
In an FFD device, it is a PAN Coordinator is used to form the network. Once the network is
established, then it assigns the address of the network for the devices used within the network.
And also, it routes the messages among the end devices.
Zigbee Router
A Zigbee Router is an FFD Device that allows the range of the Zigbee Network. This Router
is used to add more devices to the network. Sometimes, it acts as a Zigbee End Device.
This is neither a Router nor a Coordinator that interfaces to a sensor physically otherwise
performs a control operation. Based on the application, it can be either an RFD or an FFD.
Why ZigBee is better than WiFi?
In Zigbee, the data transfer speed is less as compared with WiFi, so it’s the highest speed is
simply 250kbps. It is very less as compared with the less speed of WiFi.
One more best quality of Zigbee is the rate of power utilization as well as the life of the battery.
Its protocol lasts for several months because once it is assembled then we can forget.
● Belkin WeMo
● Samsung SmartThings
● Yale smart locks
● Philips Hue
● Thermostats from Honeywell
● Ikea Tradfri
● Security Systems from Bosch
● Comcast Xfinity Box from Samsung
● Hive Active Heating & accessories
● Amazon Echo Plus
● Amazon Echo Show
Instead of connecting every Zigbee device separately, a central hub is required for
controlling all the devices. The above-mentioned devices namely SmartThings as well as
Amazon Echo Plus can also be used like a Wink hub to play a vital role within the network.
The central hub will scan the network for all the supported devices and provides you simple
control of the above devices with a central app
Bluetooth Zigbee
The frequency range of Zigbee is 2.4 GHz
The frequency range of Bluetooth ranges from 2.4
GHz – 2.483 GHz
It has 79 RF channels It has 16 RF channels
The frequency of Bluetooth is 2400 MHz The frequency of Zigbee is 2400 MHz
Tx antenna gain of Bluetooth is 0dB whereas the Tx antenna gain of Zigbee is 0dB whereas
RX -6dB the RX -6dB
Sensitivity is -93 dB Sensitivity is -102 dB
The margin of Bluetooth is 20 dB Margin of zigbee is 20 dB
Bluetooth range is 77 meters The Zigbee range is 291 meters
LoRa Zigbee
The frequency bands of LoRa ranges from
863-870 MHz, 902-928 MHz &779-787 The frequency bands of Zigbee are
MHz 868MHz, 915 MHz, 2450 MHz
LoRa covers the distance in urban areas
like 2 to 5kms whereas in rural areas Zigbee covers the distance from 10-
15kms 100meters
The power utilization of LoRa is low as
compared to Zigbee Power utilization is low
The modulation technique used in Zigbee
The modulation technique used in LoRa is is OQPSK & BPSK, It uses the DSSS
FSK otherwise GFSK method to change bits to chips.
The data rate of Zigbee is 20 kbps for 868
frequency band, 40Kbps for 915
The data rate of LoRa is 0.3 to 22 Kbps for frequency band, and 250 kbps for 2450
LoRa modulation & 100 Kbps for GFSK frequency band)
The network architecture of LoRa
includes servers, LoRa Gateway & end The network architecture of Zigbee
devices. routers, coordinator & end devices.
The protocol stack of Zigbee includes
The protocol stack of LoRa includes PHY, PHY, RF, MAC, network security &
RF, MAC & application layers application layers.
The Physical Layer of LoRa mainly uses
a modulation system & includes error
rectification abilities. It includes a
preamble for the purpose of
synchronization & uses an entire frame Zigbee includes two physical layers like
CRC & PHY header CRC. 868/915 Mhz & 2450 MHz.
LoRa is used as a WAN (Wide Area Zigbee is used like LR-WPAN (low rate
Network) wireless personal area network)
It uses IEEE 802.15.4g standard & Zigbee uses IEEE 802.15.4 specification
Alliance is LoRa and Zigbee Alliance
● It needs the system information to control Zigbee based devices for the owner.
● As compared with WiFi, it is not secure.
● The high replacement cost once any issue happens within Zigbee based home appliances
● The transmission rate of the Zigbee is less
● It does not include several end devices.
● It is so highly risky to be used for official private information.
● It is not used as an outdoor wireless communication system because it has less coverage
limit.
● Similar to other types of wireless systems, this ZigBee communication system is prone to
bother from unauthorized people.
6LoWPAN
What is 6LoWPAN?
The name 6LoWPAN is derived from the Internet Protocol version 6 (IPv6) over Low power
Wireless Personal Area Networks”. It is a communication protocol that enables small, low-
power devices to communicate with each other over a wireless network.
Compared to other IoT networks, 6LoWPAN is connecting more things to the cloud. The
protocol was designed to work with small, resource-constrained devices like sensors, smart
home appliances, and wearable technology.
How Does 6LoWPAN Work?
6LoWPAN works by encapsulating IPv6 packets into smaller frames that can be transmitted
over a low-power wireless network. The protocol uses header compression to reduce the size
of the packets, making it possible for small, low-power devices to send and receive data.
In addition, the 6LoWPAN protocol is made to function with other IoT networking standards
including Bluetooth, Wi-Fi, and Zigbee. This enables seamless communication between
6LoWPAN devices and devices that employ various networking technologies.
1. The uplink to the Internet is handled by the Access Point (AP) acting as an IPv6 router.
2. Several different devices are connected to the AP in a typical setup, such as PCs, servers,
etc.
3. The 6LoWPAN network is connected to the IPv6 network using an edge router.
1. The data exchange between 6LoWPAN devices and the Internet (or other IPv6 network).
2. Local data exchange between devices inside the 6LoWPAN.
3. The generation and maintenance of the radio subnet (the 6LoWPAN network).
By communicating natively with IP, 6LoWPAN networks are connected to other networks
using IP routers.
6LoWPAN: System Stack Overview
6LoWPAN radically changes the IoT landscape.
6LoWPAN solves this dilemma by introducing an adaptation layer between the IP stack’s link
and network layers to enable the transmission of IPv6 datagrams over IEEE 802.15.4 radio
links.
The way we live, work, and communicate is changing as a result of the Internet of
Things (IoT). A more effective and scalable networking solution is required as the number of
linked devices keeps increasing. Introducing 6LoWPAN, the newest advancement in IoT
networking that has the potential to completely transform the market.
A more scalable and effective communication protocol is also provided by 6LoWPAN. With
the growing number of connected devices, traditional networking technologies are quickly
becoming overwhelmed. A more effective option is provided by 6LoWPAN, which lowers
network overhead and allows more devices to connect with one another.
The Future of 6LoWPAN
In the IoT sector, 6LoWPAN has the potential to overtake other networking technologies. It is
the best option for integrating the billions of devices that are anticipated to be a part of the IoT
in the upcoming years because of its efficiency and scalability.
The need for a more effective and scalable networking solution will only increase as more and
more devices are connected. This demand may be met by 6LoWPAN, which offers an IoT
industry solution that is future-proof.
CoAP
The CoAP protocol has a small base specification that can be extended with additional
functionality when needed. It operates over UDP and provides a request/response interaction
model between application endpoints, enabling interoperability among different types of
devices.
CoAP is also highly reliable, with mechanisms in place to ensure message delivery, even in
cases of limited network connectivity or device power. This makes it suitable for IoT devices,
which often operate in challenging network environments.
Key Features of CoAP
RESTful Architecture
CoAP uses a RESTful (Representational State Transfer) architecture. It follows a set of
constraints that allow it to operate efficiently over a large, distributed network. In a RESTful
system, data and functionality are considered resources, and these resources are accessed using
a standard, uniform interface.
In the case of CoAP, this RESTful architecture allows it to provide a high level of
interoperability among different types of devices. It also makes it easy for developers to build
applications that use the protocol, as they can use standard HTTP methods (such as GET,
POST, PUT, and DELETE) to interact with resources.
Built-In Discovery
The CoAP protocol’s built-in discovery mechanism allows devices to discover resources on
other devices without requiring any prior knowledge of their existence. This is especially useful
in IoT networks, where devices may be constantly joining and leaving the network.
The built-in discovery feature in CoAP is achieved through the use of a well-known 'core'
resource that provides a list of available resources on a device. This resource can be queried by
other devices on the network, allowing them to discover what resources are available and how
to interact with them.
This feature uses a message identifier in each CoAP message, which allows a device to match
responses with requests. This, in conjunction with the ability to retransmit lost messages,
ensures a high level of reliability in message exchanges.
This feature allows CoAP to provide reliable communication in environments where network
connectivity is unreliable. Devices can ensure that critical messages are received and processed.
Use Cases of CoAP
Industrial IoT
In industrial IoT applications, reliability and efficiency are crucial. Devices such as sensors
and actuators can communicate using CoAP, allowing for real-time monitoring and control of
industrial processes. The protocol's support for multicast communication is particularly useful
in these scenarios, as it allows a single device to communicate with multiple others
simultaneously.
Energy Management
CoAP is used in energy management systems, where it allows for real-time monitoring and
control of energy usage. Devices such as smart meters and energy management controllers can
use the protocol to communicate with each other and with a central server, providing a high
level of control over energy usage.
Lightweight
The protocol has been designed for constrained environments, such as low-power sensors,
switches, valves, and other IoT devices that need to be controlled or supervised remotely. These
constrained environments often have minimal processing power and memory, so they can
benefit from the CoAP protocol's lightweight nature.
The CoAP protocol uses a simple binary header, which reduces the amount of data transmitted
over the network. The header includes important information about the message, such as the
type of message, the message ID, and the message code. This simplicity and compactness make
the protocol efficient and better suited for resource-constrained devices and networks.
Fast
The CoAP protocol operates over UDP (User Datagram Protocol). UDP is a simple
transmission protocol that does not require the establishment of a connection before data is
sent. This contrasts with TCP (Transmission Control Protocol), which requires a connection to
be established before data can be transmitted.
UDP is useful for IoT devices, which often need to send small amounts of data quickly and
efficiently. With UDP, the devices can send data as soon as it is ready, without waiting for a
connection to be established.
Efficient Encoding
CoAP uses a binary encoding scheme, which is more efficient than the text-based encoding
used by HTTP. Binary encoding reduces the size of the messages, which saves bandwidth and
increases the speed of communication.
The CoAP protocol also supports the use of compressed URIs (Uniform Resource Identifiers),
which further reduces the size of the messages. This is particularly useful in constrained
environments, where bandwidth is often limited.
It also supports the use of separate responses, allowing a device to acknowledge a request
before it has processed it. This improves the efficiency of the communication and allows
devices to manage their resources more effectively.
Stateless Communication
In stateless communication, each request from a client to a server is processed independently,
without any knowledge of the previous requests. This makes the protocol more robust and
resilient, as it is not affected by the failure of individual requests.
Stateless communication also simplifies the implementation of the protocol, as it does not
require the server to maintain a state for each client. This reduces the resource requirements of
the server. Stateless communication also allows CoAP to support asynchronous
communication, which enhances the protocol's flexibility and suitability for a variety of IoT
applications.
The CoAP protocol is also less widely adopted than its alternatives, which can result in
compatibility issues. For example, not all IoT devices support the CoAP protocol, which can
limit its usefulness in certain situations. However, CoAP is gaining popularity, and it is
expected that these issues will be resolved as the protocol matures.
NAT Traversal
Another disadvantage is the protocol’s difficulty with NAT (Network Address Translation)
traversal. NAT is a technique used by routers to share a single IP address among multiple
devices. While this technique is widely used, it can cause problems for CoAP.
Because it uses UDP, which does not establish a connection before sending data, CoAP can
have issues with NAT traversal, as the router may not know where to send the response. To
overcome this issue, the CoAP protocol needs to use techniques such as UDP hole punching,
which can be complex and resource-intensive.
Fragmentation
The CoAP protocol is also prone to fragmentation, which occurs when a message is too large
to fit into a single packet and needs to be divided into smaller fragments. This can increase the
complexity of the protocol and decrease its efficiency.
Fragmentation can also result in issues with reliability, as the loss of a single fragment can
result in the loss of the entire message. This can be particularly problematic in unreliable
networks, where packet loss is common.
MQTT is a more mature protocol, with a large number of resources available for developers.
It is also TCP-based, which makes it more reliable than CoAP in some scenarios. However,
MQTT is more resource-intensive than CoAP, and does not support stateless communication.
CoAP and MQTT can work together. When a constrained CoAP network needs to
communicate with external networks, it can use an MQTT broker to manage the
communications.
The following table summarizes the detailed comparison of the two protocols:
Payload Format Supports binary and text Supports binary and text payloads
payloads
This problem can be solved using EMQX, the leading open source MQTT message broker.
For CoAP devices that need to communicate with external networks, using EMQX as a broker
makes it easy to:
A WSN (Wireless Sensor Network) is a spatially distributed sensor, that is used to monitor the
physical conditions as well as environmental conditions such as sound, temperature, the
pressure to pass their information through the network to the main place. The present networks
are bi-directional, also permitting control of sensor activity. The development of these n/w’s is
inspired by military applications. The applications of wireless sensor networks mainly involve
in consumer and industrial such as health monitoring of a machine, control, and monitoring of
the industrial process and wireless sensor networks projects. The WSN is made with hundreds
and thousands of nodes, where each node is connected with single or multiple sensors. Each
node includes various parts like a radio transceiver with an antenna, an electronic circuit, a
microcontroller, and an energy source. This article list outs Wireless Sensor Network Projects
for engineering students.
Wireless Sensor Network Projects for Engineering Students
The project work offers several opportunities for engineering students to learn important things
and improve practical knowledge. Anyone aspiring to become a full-fledged engineer must
require additional knowledge along with the subject knowledge.
So, an engineering student must obtain more practical knowledge through a pragmatic learning
approach by means of PROJECT WORKs such as electronics projects. Thus, this article
discusses some new wireless sensor networks projects and communication projects for final
year engineering students in 2014- 2015.
It is not possible to achieve manual control over multiple continuous processes going on in
industries. The proposed system is designed to achieve and control the multiple processes in
large scale industries remotely by supervision. The SCADA is one of the great technologies
in basic electronics projects which is used to monitor the remote area without human
interference.
In this project, using four temperature sensors formed as wireless sensor networks projects,
which are located in various places. If sensor temperature increases at the set point of the GUI,
then the relay is made to switch ON and OFF the heater (a lamp load) to maintain the set
temperature. In a SCADA system, different types of sensors can be used for multiple control
systems
Wireless Network based Wireless SCADA
XBEE Based Remote Monitoring System
This is a simple mini project for ECE students that is designed to protect the transformer by
monitoring the parameters of a generator/ transformer such as current, voltage, and temperature
through the sensing devices like a current transformer, temperature sensor, and potential
transformer, respectively; and, to monitor them from a remote location using Zigbee wireless
communication.
Three sensors are fixed at the transmitter end to form wireless sensor network projects with a
certain range of each parameter. If these parameters exceed at the fixed limits, then the
transmitter sends a signal to the receiving end by the XBEE transceiver. To switch a warning
load using a relay and alerts the user through a voice module.
XBEE Based Remote Monitoring of 3 Parameters on Transformer / Generator Health
This system is used to obtain the parameters like voltage, current, the temperature of a
distribution transformer through the measuring devices or sensors network such as temperature
sensor, potential and current transformers to transfer those values to a remote location
through Zigbee wireless technology.
Nowadays, the health care system is highly complex. The proposed system is designed to
provide ultimate solutions to healthcare using wireless sensor networks. This proposed system
is used to monitor the patient’s health by wirelessly using RF technology.
It is a very tedious method. In this proposed system transmitting module continuously reads
the patient’s body temperature through a digital temperature sensor, displays it on the LCD
screen, and sends it to the microcontroller which transmits the encoded serial data over the air
by RF (radio frequency) through an RF module.
Medical Applications Based on Wireless Sensor Networks
Wireless Sensors Based System for Home Energy Consumption
Wireless Sensor Networks (WSN) emerged from advancements in the areas of micro-electro-
mechanical system (MEMS) technology, wireless communication, and digital electronics.
WSNs devices are small in size, low cost, and require low power to work. The basic structure
of WSN sensor nodes as identified is Shown in fig
Mobile and Wireless Sensor Network
There are four main components that make up a sensor node. The parts are mainly a sensing
unit, a processing unit, a transmission unit, and a power unit. Depending on the type of
application, A sensor node may have additional parts such as a situation, finding system,
mobilization, and a power generator.
The Sensing unit usually takes the burden of sensing and gathering sensor data and then passes
data to the processing unit. The processing unit receives the sensed data and processes it
according to the Master of these projects. A transmission unit connects the sensor, not with a
network. The power unit supplies the power required to run a sensor node.
Wireless sensor networks can be used by the military for a number of purposes such as
monitoring militant activity in remote areas and Protecting the force. Being equipped with
appropriate sensors these networks can enable detection of enemy movement, identification of
the enemy force, and analysis of their movement and progress. The focus of this article is on
the military requirements for flexible wireless sensor networks.
Military Applications Based on Wireless Sensor Networks
Based on the main networking characteristics and military use-cases, insight into specific
military requirements is given in order to facilitate the reader’s understanding of the operation
of these networks in the near to medium term (within the next three to eight years). The article
structures the evolution of military sensor networking devices by identical-flying three
generations of sensors along with their capabilities.
Wireless sensor network projects give an enormous profit to several commercial enterprises
such as energy and process improvements, savings of cost, material and energy, labor effort
and raises productivity. Some of the wireless sensor networks project ideas for 2015 are
discussed below.
WSN based Monitoring of Temperature and Humidity of Soil using Arduino
The main purpose of this project is to design an automatic irrigation system that makes a motor
pump to turn ON and OFF by sensing the moisture of the soil. The proper use of an irrigation
system in the field of agriculture is very important. The main advantage of using this project
is, we can reduce the human involvement
This WSN project uses a preprogrammed Arduino board to receive the i/p signal of changing
the moisture condition of soil through a sensing arrangement. The project uses an Arduino
board which is programmed to receive the input signal of varying moisture conditions of the
soil through a sensing arrangement. This process is accomplished by using an operational
amplifier which is used as a comparator. This comparator performs as an interface between the
microcontroller and the sensing arrangement.
When the microcontroller takes the signal, then it produces an o/p signal to drive a relay for
the switch ON the water pump. An LCD display is used to display the status of the water pump
and the soil, that is interfaced to the microcontroller The sensing arrangement of this project is
designed with two metallic stiff rods and the connections of these two rods are given to the
control unit.
Furthermore, this project can be developed by interfacing a GSM module. So that we can send
an SMS to the concerned person regarding the status of the water pump and we can also turn
ON/OFF the water pump by sending an SMS.
WSN and GSM Module based Automated Irrigation System
The main concept of this irrigation system is to turn ON/OFF a motor pump by sensing the soil
using WSN in the field of agriculture, The status of the soil can be known by sending an SMS
using GSM module.
In the agriculture field, the use of irrigation is mandatory. By using this method we can reduce
the manpower. This project is designed with a preprogrammed 8051 microcontroller, that
receives the signal from the sensor arrangement.
Automatic Irrigation System based on Soil Moisture Content
This procedure is attained by using an operational amplifier and it acts as interface b/n the
sensing device & the 8051 microcontrollers.
When the 8051 microcontroller gets this signal, it makes an output to drive a relay for operating
the water pump. Using a GSM modem, it also sends an SMS to the authorized person. An LCD
display is used to display the status of the water pump ON/OFF condition and the soil.
The sensing arrangement is designed with two stiff metallic rods and the connections of these
rods are interfaced with the control unit. Furthermore, this project can be developed with Xbee
or Bluetooth technology, so that when the water pump turns on or off, the data is sent to a
mobile phone.
WSN based Monitoring of Traffic Light
In urban areas, vehicle traffic is increasing day by day so it will cause more traffic congestion
and consequences on human health, environment, and economy. The traditional methods which
are used to reduce the traffic are inefficient in terms of cost, performance, support &
maintenance due to the increased traffic.
This project is used to implement a system to detect a vehicle accident to save human life. At
present, it is essential to reduce vehicle accidents by sending notification to the authorities
efficiently. This project is used to implement an RTTADS (Real-Time Traffic Accident
Detection System) using RFID and WSN technologies.
In this project, sensors are arranged so that it will detect the accident location of a vehicle along
with the vehicle speed before the accident & the no. of the passenger’s within the vehicle. Once
the sensors detect the vehicle location then it sends a signal to a monitoring station so that it
will detect the vehicle location & sends an alert to the concerned person.
WSN based Monitoring of Area
Area monitoring is one of the applications of wireless sensor networks. In the monitoring of
the area, a WSN is arranged where monitoring is required. In military applications, sensors are
mainly used for detecting enemy interruption.
Once the sensors detect the heat or pressure, then the data is transmitted to one of the base
stations, so that appropriate action can be taken. Likewise, WSNs use various sensors to notice
the existence of vehicles which ranges from motorbike to cars.
WSNs play a key role in monitoring the dangerous gases in the air. So these are used in different
cities like London, Stockholm & Brisbane. As compared with wired links, these networks can
take the benefits of wireless links like ad-hoc to make them more portable to test the readings
in different areas.
This project is used to implement a WSN (wireless sensor network) system which is used for
monitoring the patient’s remotely using the Zigbee network. There are different healths
parameters are monitored such as ECG, body temperature, heartbeat using different sensors.
The data which is collected from the sensors can be transmitted to the doctor or central
monitoring station through the Zigbee network. All these parameters can be displayed on the
PC graphically at the receiving end through LabVIEW GUI.
This project is used to design a health monitoring system for an oil well. In this project, WSN
is used to monitor as well as supervising different individual controllers that are placed in oil
wells. Every Zigbee controller through temperature, level & gas sensors can be monitored
remotely from the central position through the Zigbee network.
This project is designed with a controller based on solar for detecting the forest fire remotely.
The arrangement of controller based on solar can be done in the forest with the help of a Zigbee
network. This controller includes different sensors with Zigbee transceiver like temperature,
smoke, rain, and pressure. These parameters can be monitored at the central location remotely.
Wireless sensor networks are used to check the movement in the buildings and transportation
structures like bridges, tunnels, embankments, flyovers, etc. This system will allow the
engineer to monitor the structures without the need for site visits. The data can be collected
usually weekly or monthly by visiting the sites. To overcome this, a WSN based structural
monitoring system is implemented.
Health Monitoring of Machine using WSN
WSNs have been implemented for the CBM of machinery. Here CBM means condition-based
maintenance. This system provides significant cost savings & allows innovative
functionalities. As compared with wireless, wired systems use enough sensors for installation
because sensors are frequently limited through the wiring cost. Previously unreachable regions
like dangerous otherwise controlled areas, mobile assets, and rotary machinery can now be
reached through wireless sensors.
WSN in Agriculture
Wireless sensor networks are applicable in the agriculture field to reduce the maintenance of
wiring in a difficult atmosphere. Water systems to feed the gravity can be checked through
pressure transmitters so that water tank levels can be checked and water pumps can be
controlled with the help of wireless devices. The usage of water can be measured & transmitted
back wirelessly to a center of central control for billing. The automation of irrigation allows
using more efficient water & decreases waste.
An Energy Storage Module (ESM) is a packaged solution that stores energy for use at a later
time. The energy is usually stored in batteries for specific energy demands or to effectively
optimize cost. ESM can store electrical energy and supply it to designated loads as a primary
or supplementary source. Moreover, it provides a stable and continuous power supply
regardless of the supply source status. Voltage and frequency regulation can also be improved
by using ESM modules. ESM contains inverters that rectify the AC energy into DC to store in
the batteries and then invert the DC energy into AC energy. The energy inverted into AC power
can be connected to the electrical network at low (<1000 Volts) or medium voltage (<40.5 kV).
ABB provides the necessary electrical, protective and monitoring equipment along with the
battery system to utilize the batteries safely with a pre-designed system designed to meet ANSI,
IEC, and other international standards. This will guarantee a high level of energy continuity
and superior power quality in a safe and cost effective module.ESM is available in several
capacities with individual modules up to 4 MW and an output voltage range from 120 volts to
40.5 kV at 50 or 60 Hertz, single or three phase system.
The ESM enclosure is engineered to maintain the internal temperature within the design limits
as well as provide protection. Different temperature classes and protection degrees are available
according to the application and size. The degree of protection for the ESM enclosure is
designed according to IP or NEMA standards
Applications
ESM has different applications within the distribution network aiming to improve the quality
and continuity of the power at optimal cost. The main applications of the ESM are: Load
shifting / time of use management: The practice of altering the pattern of energy use so that on-
peak energy use is shifted to off-peak periods.
Benefits:
a) Reduces the cost of energy by charging the system with low priced energy and discharging
later when the energy prices are high
b) Shifts renewable generation to peak times, allowing for participation in capacity markets as
a dispatchable resource, smoothing the renewable output
Peak shaving: Peak shaving is related to Load Shifting. Both are part of the demand
management in which the ultimate goal is to increase the load factor.
Benefits:
a) Commercial and industrial customers reduce their energy charges by improving their load
factor
b) Utilities reduce the operational cost of generating power during peak periods (reducing the
need for peaking units)
c) Investment in infrastructure is delayed because they have flatter loads with smaller peaks.
Graph number 1 below shows a peak shaving/load shifting application. The blue line shows
the customer demand profile, which is peaking late in the afternoon. The purple line shows
what the Energy Storage Module is doing, charging early in the morning when the demand is
low and discharging when the demand is peaking. The yellow line shows the net effect on the
electrical grid (a lower demand peak and a more balanced demand).
Renewable energy smoothing or ramp control: Reduces the impact of quick changes in
renewable generation levels. It can be used to ensure that wind-farm ramp-rates (MW/min) are
kept within design limits and to eliminate rapid voltage and power swings on the electrical grid.
Graph number 2 on the next page shows a renewable smoothing ramp control application. The
wind farm power is shown in orange. The ESM system power is shown in blue. The black line
shows the net effect on the electrical grid (a gentler ramp slope and lower variability).
Renewable capacity firming: Helps maintain the power output at a committed (firm) level for
a period of time.
1. Reduced footprint: Power management modules are compact and integrate multiple
components into a single package, which reduces the overall footprint of the system.
2. Improved efficiency: Power management modules provide precise control over the
power supply, which can help optimize the energy consumption of the device and
improve its efficiency.
3. Simplified design: Power management modules are designed to simplify the power
management process by providing a complete solution that includes a PMIC and other
components such as inductors, capacitors, and resistors.
4. Increased reliability: Power management modules are designed to provide stable and
reliable power to the system, which can help prevent damage to the device and improve
its lifespan.
What are some common issues with power management in IoT devices?
There are several challenges associated with power management in IoT devices. Some of the
common issues include:
1. Battery life: Ensuring that IoT devices have sufficient battery life to operate without
frequent recharging or replacement is a significant challenge1.
2. Energy efficiency: Making sure that IoT devices are designed to use energy efficiently
and reduce the overall power consumption is another challenge1.
3. Power management system design: Designing an effective power management
system that can handle the unique requirements of IoT devices is a complex task.
4. Device security: Ensuring that IoT devices are secure and protected from cyber attacks
is a critical challenge.
What are some best practices for power management in IoT devices?
Here are some best practices for power management in IoT devices:
RF (Radio Frequency) modules play a crucial role in IoT (Internet of Things) applications by
enabling wireless communication between devices. These modules facilitate the transfer of
data over radio waves, allowing devices to communicate with each other without the need for
physical connections. Let's break down the technical aspects of an RF module in IoT:
1. Basic Components:
● Transmitter:
o The transmitter is responsible for converting data from the device into a
modulated radio signal.
o It typically includes components such as an oscillator, modulator, and amplifier.
● Receiver:
o The receiver captures the radio signal and demodulates it to retrieve the original
data.
o Components include an antenna, filter, demodulator, and amplifier.
2. RF Frequency Bands:
3. Modulation Techniques:
4. Communication Protocols:
6. Antenna Design:
● The antenna is a critical component affecting signal strength and range.
● Different types of antennas (e.g., dipole, patch) are suitable for different applications.
7. Power Consumption:
● RF modules must comply with regulatory standards to ensure they operate within legal
limits for power, frequency, and emission.
● Imagine a scenario where sensors in a smart home use RF modules to send data to a
central hub, which then relays the information to a cloud server for analysis. The RF
modules play a crucial role in enabling wireless communication between these devices.
2. RF Planning:
● Understanding the importance of RF planning in wireless networks.
● Site selection criteria and considerations.
● Antenna placement and orientation.
3. Propagation Models:
● Different radio wave propagation models (Free Space Path Loss, Okumura-Hata, COST
231 Hata, etc.).
● Factors affecting radio wave propagation (terrain, buildings, atmospheric conditions).
● Introduction to measurement tools and equipment (spectrum analyzers, drive test tools).
● Understanding key performance indicators (KPIs) and metrics.
● Conducting drive tests to collect data for analysis.
5. Frequency Planning:
7. RF Optimization Algorithms:
8. Antenna Optimization:
RF optimization
1. RF Basics:
o RF refers to radio frequency, which encompasses the range of electromagnetic
frequencies used for wireless communication.
o Communication devices, such as transmitters and receivers, use RF signals to
exchange information wirelessly.
2. Propagation Characteristics:
o RF signals propagate through the air and encounter various obstacles, such as
buildings, trees, and other environmental elements.
o The signal strength weakens as it travels, and external factors like interference
and noise can affect communication quality.
3. Free Space Path Loss (FSPL):
o FSPL is a key factor in RF range testing and represents the loss of signal strength
as it travels through free space without obstacles.
o It is calculated using the Friis transmission equation:
����=20log10(�)+20log10(�)+20log10(4��)FSPL=20log10
(d)+20log10(f)+20log10(c4π), where �d is the distance, �f is the frequency,
and �c is the speed of light.
4. Antenna Gain:
o Antennas play a critical role in RF communication. Antenna gain is the measure
of an antenna's ability to direct or concentrate RF energy in a specific direction.
o Both the transmitting and receiving antennas contribute to the overall link
budget.
5. Link Budget:
o The link budget is the sum of all gains and losses in a communication system.
o It includes transmitter power, cable losses, free space path loss, antenna gains,
receiver sensitivity, and other factors.
o A positive link budget indicates a higher likelihood of successful
communication.
6. RF Range Testing Steps:
a. Preparation:b. Measurements:c. Analysis:d. Optimization:e. Documentation:
o Set up the RF devices with appropriate antennas.
o Define the testing environment and parameters, including frequency,
modulation scheme, and transmission power.
o Conduct measurements at various distances between the transmitter and
receiver.
o Record signal strength, quality, and other relevant metrics.
o Analyze the data to understand the relationship between distance and signal
quality.
o Identify the maximum reliable communication distance.
o If needed, optimize the system by adjusting parameters such as transmission
power, antenna orientation, or using different modulation schemes.
o Document the results, including the effective range under different conditions
and any recommendations for improving performance.
7. Challenges:
o RF range testing may be affected by interference from other devices,
environmental changes, and multipath effects (signal reflections).
8. Regulatory Compliance:
o Consider relevant regulatory requirements and standards for RF communication
in the given frequency band.
RF range testing is an iterative process, and engineers often fine-tune system parameters to
achieve the desired communication range and reliability in real-world scenarios.
Sensing Module
IOT HARDWARE
Transducer :
● A transducer converts a signal from one physical structure to another.
● It converts one type of energy into another type.
● It might be used as actuator in various systems.
Sensors characteristics :
1. Static
2. Dynamic
1. Static characteristics :
It is about how the output of a sensor changes in response to an input change after steady state
condition.
● Accuracy: Accuracy is the capability of measuring instruments to give a result close to the
true value of the measured quantity. It measures errors. It is measured by absolute and
relative errors. Express the correctness of the output compared to a higher prior system.
Absolute error = Measured value – True value
Relative error = Measured value/True value
● Range: Gives the highest and the lowest value of the physical quantity within which the
sensor can actually sense. Beyond these values, there is no sense or no kind of response.
e.g. RTD for measurement of temperature has a range of -200`c to 800`c.
● Resolution: Resolution is an important specification for selection of sensors. The higher
the resolution, better the precision. When the accretion is zero to, it is called the threshold.
Provide the smallest changes in the input that a sensor is able to sense.
● Precision: It is the capacity of a measuring instrument to give the same reading when
repetitively measuring the same quantity under the same prescribed conditions.
It implies agreement between successive readings, NOT closeness to the true value.
It is related to the variance of a set of measurements.
It is a necessary but not sufficient condition for accuracy.
● Sensitivity: Sensitivity indicates the ratio of incremental change in the response of the
system with respect to incremental change in input parameters. It can be found from the
slope of the output characteristics curve of a sensor. It is the smallest amount of difference
in quantity that will change the instrument’s reading.
● Linearity: The deviation of the sensor value curve from a particularly straight line.
Linearity is determined by the calibration curve. The static calibration curve plots the output
amplitude versus the input amplitude under static conditions.
A curve’s slope resemblance to a straight line describes linearity.
● Drift: The difference in the measurement of the sensor from a specific reading when kept
at that value for a long period of time.
● Repeatability: The deviation between measurements in a sequence under the same
conditions. The measurements have to be made under a short enough time duration so as
not to allow significant long-term drift.
Dynamic Characteristics :
Properties of the systems
● Zero-order system: The output shows a response to the input signal with no delay. It does
not include energy-storing elements.
Ex. potentiometer measure, linear and rotary displacements.
● First-order system: When the output approaches its final value gradually.
Consists of an energy storage and dissipation element.
● Second-order system: Complex output response. The output response of the sensor
oscillates before steady state.
Sensor Classification :
● Passive & Active
● Analog & digital
● Scalar & vector
1. Passive Sensor –
Can not independently sense the input. Ex- Accelerometer, soil moisture, water level and
temperature sensors.
2. Active Sensor –
Independently sense the input. Example- Radar, sounder and laser altimeter sensors.
3. Analog Sensor –
The response or output of the sensor is some continuous function of its input parameter.
Ex- Temperature sensor, LDR, analog pressure sensor and analog hall effect.
4. Digital sensor –
Response in binary nature. Design to overcome the disadvantages of analog sensors. Along
with the analog sensor, it also comprises extra electronics for bit conversion. Example –
Passive infrared (PIR) sensor and digital temperature sensor(DS1620).
5. Scalar sensor –
Detects the input parameter only based on its magnitude. The answer for the sensor is a
function of magnitude of some input parameter. Not affected by the direction of input
parameters.
Example – temperature, gas, strain, color and smoke sensor.
6. Vector sensor –
The response of the sensor depends on the magnitude of the direction and orientation of
input parameter. Example – Accelerometer, gyroscope, magnetic field and motion detector
sensors.
Types of sensors –
● Electrical sensor :
Electrical proximity sensors may be contact or non contact.
Simple contact sensors operate by making the sensor and the component complete an electrical
circuit.
Non- contact electrical proximity sensors rely on the electrical principles of either induction
for detecting metals or capacitance for detecting non metals as well.
● Light sensor:
Light sensor is also known as photo sensors and one of the important sensor.
Light dependent resistor or LDR is a simple light sensor available today.
The property of LDR is that its resistance is inversely proportional to the intensity of the
ambient light i.e when the intensity of light increases, it’s resistance decreases and vise versa.
● Touch sensor:
Detection of something like a touch of finger or a stylus is known as touch sensor.
It’s name suggests that detection of something.
They are classified into two types:
1. Resistive type
2. Capacitive type
Today almost all modern touch sensors are of capacitive types.
Because they are more accurate and have better signal to noise ratio.
● Range sensing:
Range sensing concerns detecting how near or far a component is from the sensing position,
although they can also be used as proximity sensors.
Distance or range sensors use non-contact analog techniques. Short range sensing, between a
few millimetres and a few hundred millimetres is carried out using electrical capacitance,
inductance and magnetic technique.
Longer range sensing is carried out using transmitted energy waves of various types eg radio
waves, sound waves and lasers.
● Mechanical sensor:
Any suitable mechanical / electrical switch may be adopted but because a certain amount of
force is required to operate a mechanical switch it is common to use micro-switches.
● Pneumatic sensor:
These proximity sensors operate by breaking or disturbing an air flow.
The pneumatic proximity sensor is an example of a contact type sensor. These cannot be used
where light components may be blown away.
● Optical sensor:
In there simplest form, optical proximity sensors operate by breaking a light beam which falls
onto a light sensitive device such as a photocell. These are examples of non contact sensors.
Care must be exercised with the lighting environment of these sensors for example optical
sensors can be blinded by flashes from arc welding processes, airborne dust and smoke clouds
may impede light transmission etc.
● Speed Sensor:
Sensor used for detecting the speed of any object or vehicle which is in motion is known as
speed sensor .For example – Wind Speed Sensors, Speedometer ,UDAR ,Ground Speed Radar
.
● Temperature Sensor:
Devices which monitors and tracks the temperature and gives temperature’s measurement as
an electrical signal are termed as temperature sensors .These electrical signals will be in the
form of voltage and is directly proportional to the temperature measurement .
● PIR Sensor:
PIR stands for passive infrared sensor and it is an electronic sensor that is used for the tracking
and measurement of infrared (IR) light radiating from objects in its field of view and is also
known as Pyroelectric sensor .It is mainly used for detecting human motion and movement
detection .
● Ultrasonic Sensor:
The principle of ultrasonic sensor is similar to the working principle of SONAR or RADAR in
which the interpretation of echoes from radio or sound waves to evaluate the attributes of a
target by generating the high frequency sound waves .
UNIT - IV
CLOUD ARCHITECTURE BASICS
Definition
1. A frontend platform
2. A backend platform
3. A cloud-based delivery model
4. A network (internet, intranet, or intercloud)
How does cloud architecture work?
Although no two clouds are alike, there are a number of common cloud architecture
models. These include public, private, hybrid, and multi- cloud architectures. Here
is how they compare:
IaaS
Benefits of IaaS
Higher availability: With IaaS a company can create redundant servers easily, and
even create them in other geographies to ensure availability during local power
outages or physical disasters.
Lower latency, improved performance: Because IaaS providers typically
operate data centers in multiple geographies, IaaS customers can locate apps and
services closer to users to minimize latency and maximize performance.
Improved responsiveness: Customers can provision resources in a matter of
minutes, test new ideas quickly and quickly roll out new ideas to more users.
Comprehensive security: With a high-level of security on-site, at data centers, and
via encryption, organizations can often take advantage of more advanced security
and protection they could provide if they hosted the cloud infrastructure in-house.
Faster access to best-of-breed technology: Cloud providers compete with each
other by providing the latest technologies to their users, IaaS customers can take
advantage of these technologies much earlier (and at far less cost) than they can
implement them on premises.
PaaS
Benefits of PaaS
The primary benefit of PaaS is that it allows customers to build, test, deploy run,
update and scale applications more quickly and cost- effectively than they could
if they had to build out and manage their own on-premises platform. Other
benefits include:
Faster time to market: PaaS enables development teams to spin-up development,
testing and production environments in minutes, vs. weeks or months.
Low- to no-risk testing and adoption of new technologies: PaaS platforms
typically include access to a wide range of the latest resources up and down the
application stack. This allows companies to test new operating systems,
languages, and other tools without having to make substantial investments in them,
or in the infrastructure required to run them.
Simplified collaboration: As a cloud-based service, PaaS provides a shared
software development environment, giving development and operations teams
access to all the tools they need, from anywhere with an Internet connection.
A more scalable approach: With PaaS, organizations can purchase additional
capacity for building, testing, staging and running applications whenever they need
it.
Less to manage: PaaS offloads infrastructure management, patches, updates and
other administrative tasks to the cloud service provider.
Amazon Web Services (AWS) is a cloud computing platform which was introduced
in 2002. It offers a wide range of cloud services such as Infrastructure as a Service
(IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
AWS provides the largest community with millions of active customers as well as
thousands of partners globally. Most of the organizations use AWS to expand their
business by moving their IT management to the AWS.
Flexibility, security, scalability, and better performance are some important features
of AWS.
Features
The amazon cloud platform offers almost every feature under the cloud computing
industry. Their cloud services allow you to gain easy access to computing power,
data storage or other functionality necessary for app developers. AWS has many
products that fall under many categories. In addition to the features mentioned
above, they offer developer tools, management tools, mobile services and
applications services. As you can imagine, the application services combined with
the computing and database infrastructure are critical components to a successful
enterprise mobile app development team.
Advantages
On top of that, the Amazon Web Services cloud platform offers developers over 15
years of enterprise infrastructure. Since the admin teams as AWS continuously work
to improve the platform, your development team can benefit from their experience.
When it comes to management capabilities and skills, AWS has some of the best
talent in the market. Of course, you would want to choose a platform that has plenty
of experience to build on.
Microsoft Azure
Features
Similar to AWS cloud services, Azure offers a full variety of solutions for app
developer needs. The platform gives you the ability to deploy and manage virtual
machines as scale. You can process and compute at whatever capacity you need
within just minutes. Moreover, if your custom software needs to run large-scale
parallel batch computing, it can handle it too. This is actually a unique feature to
AWS and Azure over the Google Cloud Platform. The all encompassing Azure
features integrate into your existing systems and processes, offering more power
and capacity for enterprise development.
Advantages
In addition to the full set of features and customizable pricing, the Azure platform
is one of the fastest cloud solutions available. If you are looking for a solution that
excels in speed of deployment, operation or scalability, then you might want to
choose the Azure platform. They are the leader in speed when it comes to cloud
computing solutions.
Google Cloud Platform (GCP)
Features
Once again, the Google Cloud Platform has a myriad of services for developers. As
an enterprise mobile app development team, you might be interested in the App
Engine product. This allows an app developer to create applications without dealing
with the server. It’s a fully managed solution for developing applications in an agile
manner. Furthermore, you can perform high level computing, storage, networking
and databases with GCP. These are all great products to use depending on the type
of app development you are working on. Although Google has a few less services
than the competitors, you can find all the requirements for mobile application
development projects.
Advantages
As GCP continues to grow in the cloud industry, they offer another level of security.
Since Google is no stranger to enterprise level security, you can rely on their secure
solutions. They have over 500 employees that are dedicated to security protection.
You will get data encryption, multiple layers of authentication and third party
validations. For developers who need an extra buffer of security, the Google Cloud
might be the best platform for you.
DIFFERENCES BETWEEN AWS, AZURE AND GOOGEL CLOUD
PLATFORM
Although AWS, Microsoft Azure, and Google cloud platforms offer various high-
level features in terms of computing, management, storage, and other services, but
there are also some differences between these three.
UNIT-V
IOT PROJECTS ON RASPBERRY PI
Building IOT with RASPBERRY PI- Creating the sensor project - Preparing Raspberry Pi -
Clayster libraries – Hardware Interacting with the hardware - Interfacing the hardware- Internal
representation of sensor values - Persisting data - External representation of sensor values -
Exporting sensor data
PREPARING RASPBERRY PI
Preparing a Raspberry Pi involves several key steps that ensure you have the necessary
hardware, software, and configurations to make it operational for your intended purpose. Here's
a more detailed breakdown:
CLAYSTER LIBRARIES
If Clayster has emerged as a new library or framework for IoT or software development since
then, it's essential to refer to the official documentation, website, or resources associated with
it for detailed information. Typically, these sources would provide:
Overview: A description of what Clayster is and its intended use or purpose within IoT or
software development.
Features: Details about the functionalities and capabilities it offers, such as its role in IoT device
management, connectivity, data processing, etc.
Installation and Usage: Instructions on how to install and use Clayster within your IoT or
software development projects. This might include setting up dependencies, integrating it into
your codebase, and using its APIs or tools.
Examples or Tutorials: Code snippets, examples, or tutorials demonstrating how to use Clayster
libraries for various IoT scenarios or software development tasks.
Community and Support: Information about community forums, support channels, or resources
where developers can seek help, ask questions, and engage with other users or developers using
Clayster.
Common features in IoT libraries or frameworks often include:
Device Connectivity: Libraries often facilitate the connection and communication between IoT
devices and other components of an IoT ecosystem such as servers, cloud platforms, or other
devices.
Data Processing and Management: Capabilities to manage and process data generated by IoT
devices, including data storage, analytics, and transformation.
Security: Implementing security measures like encryption, authentication, and secure data
transmission to protect IoT devices and data from vulnerabilities and cyber threats.
Device Management: Tools and APIs for managing IoT device configurations, updates,
monitoring, and remote control.
Protocols and Standards Support: Support for various communication protocols and industry
standards to ensure compatibility and interoperability among different devices and systems.
Scalability and Performance: Libraries designed to handle large-scale IoT deployments while
maintaining efficient performance.
Development Tools and APIs: Providing developers with software development kits (SDKs),
APIs, and tools that simplify the process of building, deploying, and managing IoT
applications.
Wireless and Wired Communication: IoT devices can communicate wirelessly using
technologies like Wi-Fi, Bluetooth, Zigbee, Z-Wave, LoRa, or cellular networks (2G, 3G, 4G,
and now 5G). Wired connections such as Ethernet or RS-485 might also be used in specific
applications.
Programming and Control:
Embedded Programming: Writing code for microcontrollers or processors is an essential part
of IoT development. This involves programming in languages like C/C++, Python, or
specialized languages for embedded systems.
Data Processing: IoT devices often perform data processing locally to reduce the amount of
data transmitted over the network. This involves implementing algorithms for data filtering,
aggregation, and sometimes even machine learning at the edge.
APIs and Middleware: APIs (Application Programming Interfaces) are used to connect IoT
devices to cloud services or other devices. Middleware solutions help manage the
communication between devices, databases, and applications.
Security Considerations:
Encryption and Authentication: IoT systems need robust security measures to protect data and
devices. Implementing encryption (like SSL/TLS), secure authentication methods, and access
controls are vital to prevent unauthorized access or data breaches.
Power Management:
Energy Efficiency: IoT devices often operate on battery power or other limited energy sources.
Optimizing power consumption through efficient coding, sleep modes, or low-power hardware
components is essential for extending the device's battery life and overall efficiency.
Protocols and Communication: IoT devices communicate using various protocols like MQTT,
HTTP, CoAP, etc. Understanding these protocols helps in establishing communication
between the devices and the central system or other connected devices.
Embedded Systems: These systems consist of hardware and software designed for specific
functions within larger systems. Understanding embedded systems is crucial as most IoT
devices operate on embedded platforms.
Cloud Services and APIs: Many IoT solutions leverage cloud services for data storage,
analysis, and management. Knowing how to integrate IoT devices with cloud platforms and
utilize APIs for data processing is vital.
Security Measures: Interacting with hardware in IoT requires attention to security.
Implementing encryption, secure communication protocols, and access control mechanisms is
crucial to prevent unauthorized access or data breaches.
Power Management: IoT devices often operate on limited power sources. Optimizing power
consumption is crucial for longevity and efficiency.
Selecting a Microcontroller/Processor:
Choose the Right Platform: Select a microcontroller or processor that suits your project needs.
Popular choices include Arduino, Raspberry Pi, ESP8266, ESP32, and others, each with its
own strengths and capabilities.
Breadboarding or PCB Design: Depending on the complexity of the project, create a physical
prototype on a breadboard or design a custom PCB (Printed Circuit Board) for a more
permanent solution.
Setup and Configuration: Initialize the communication protocols, configure sensor settings,
and ensure proper communication channels are established between the hardware components
and the microcontroller.
Verification: Test the hardware connections and the code to ensure the expected data is being
received from the sensors or sent to the actuators.
Debugging: Troubleshoot any issues with connectivity, data transmission, or hardware
malfunctions. This might involve checking for loose connections, incorrect wiring, or errors in
the code.
Cloud Integration: If your IoT system involves cloud services, integrate the microcontroller
with the cloud platform's APIs to send and receive data, enabling remote monitoring or control.
Security Considerations:
Implement Security Measures: Ensure the interfaced hardware components and the
communication channels are secured against unauthorized access, data breaches, or tampering.
Implement encryption, secure authentication, and access controls where necessary.
Optimization and Maintenance:
Power Management: Optimize the hardware setup for power efficiency, especially in battery-
operated devices, to prolong battery life.
The internal representation of sensor values refers to how the data collected by sensors is
processed, stored, and represented within the system where the sensors are connected. This
representation can differ based on various factors including the type of sensor, the data format,
the microcontroller or processor used, and the requirements of the application or system. Here
are common aspects of internal representation:
Analog-to-Digital Conversion (ADC): Many sensors output analog signals, like voltage or
current, that represent physical measurements (temperature, light intensity, etc.). These analog
signals need to be converted into digital values for processing within a digital system. This is
typically done using ADC, which samples the analog signal at discrete intervals and quantizes
it into digital values.
Digital Representation: Once converted, the analog data becomes a digital representation, often
in binary format. The resolution of the ADC (e.g., 8-bit, 10-bit, etc.) determines the precision
and range of values that can be represented.
Raw Data: Initially, sensor readings are often raw, unprocessed values directly received from
the sensor. These readings might need calibration, normalization, or filtering for accuracy and
reliability.
Calibration and Scaling: Raw sensor values might be calibrated to correspond to specific
physical units or scaled to fit within desired measurement ranges. For instance, a voltage
reading from a temperature sensor might be calibrated to represent degrees Celsius or
Fahrenheit.
Data Type and Units: Sensor values are usually stored using appropriate data types (integers,
floats, etc.) within the system's memory. They might also be accompanied by units to provide
context for interpretation.
Representation in Software:
Variables or Data Structures: Sensor values are typically stored in variables or data structures
within the software controlling the system. These values are often accessible by the system for
further processing or analysis.
Data Formats: Sensor data might be formatted in various ways for storage or transmission, such
as using JSON, XML, or other formats, depending on the communication protocols and system
requirements.
Data Manipulation: Sensor data might undergo additional processing steps such as noise
filtering, averaging, or data aggregation before being used for decision-making or analysis.
Edge Computing: In more advanced systems, edge devices might perform initial data analysis
or run specific algorithms on the sensor data locally before sending processed information to a
central system or the cloud.
The internal representation of sensor values involves converting raw sensor outputs into a
usable digital format within the system, ensuring accuracy, providing context, and preparing
the data for further processing or transmission within the IoT system.
PERSISTING DATA
Persisting data in IoT involves storing collected sensor data or system state information in a
durable and retrievable manner for future use, analysis, or reference. Several methods and
technologies are commonly used for data persistence in IoT systems:
Databases:
Relational Databases: Systems like MySQL, PostgreSQL, or SQLite are used to organize data
into structured tables with defined relationships. These are suitable for scenarios requiring
complex queries or structured data.
NoSQL Databases: NoSQL databases like MongoDB, Cassandra, or Redis offer more
flexibility in handling unstructured or semi-structured data. They can handle large volumes of
data and are often used for time-series or sensor data.
File Systems:
Local Storage: IoT devices may have local storage capabilities, storing data in files on their
internal storage or external memory cards. This method is useful when continuous internet
connectivity is not available or for storing a backup of critical data.
Cloud Storage:
Object Storage: Cloud-based object storage services like Amazon S3, Google Cloud Storage,
or Azure Blob Storage provide scalable and reliable storage for IoT data. They are accessible
via APIs, allowing easy integration with IoT platforms.
Edge Storage:
Local Buffering: Edge devices might utilize local storage to temporarily buffer data before
transferring it to a central server or the cloud. This buffering helps manage intermittent
connectivity issues or latency concerns.
Blockchain Technology:
Distributed Ledgers: Blockchain offers a decentralized and immutable way to store data. In
IoT, it can ensure the integrity and security of data, especially in applications where data
tampering needs to be prevented.
Data Compression and Optimization:
Compression Techniques: Data compression methods are used to reduce the size of stored data,
optimizing storage space and transmission bandwidth. Compression algorithms like gzip or
deflate can be applied before storage.
Security Considerations:
Encryption: Implementing encryption mechanisms ensures that sensitive IoT data is stored
securely, protecting it from unauthorized access or tampering.
The choice of data persistence method depends on various factors like the volume of data, type
of data, latency requirements, scalability needs, security considerations, and the specific use
case of the IoT system. Often, a combination of these methods is used in complex IoT
deployments to ensure efficient and reliable data storage and retrieval.
EXTERNAL REPRESENTATION OF SENSOR VALUES
The external representation of sensor values in IoT refers to how these values are
communicated, transmitted, and presented outside the immediate context of the device or
system that collected them. This representation is crucial for sharing data across networks,
between devices, or with external systems. Here's an overview:
Data Formats:
XML (eXtensible Markup Language): XML is another format used for data exchange. It allows
hierarchical structuring of data but is generally more verbose compared to JSON.
CSV (Comma-Separated Values): For tabular sensor data, CSV format is commonly used,
allowing easy readability in spreadsheet software.
Protocol Payloads:
HTTP(S): Sensor data can be transmitted via HTTP(S) protocols using JSON or other formats
as payload in HTTP requests. This is commonly used for RESTful APIs.
Unit Specification: Including information about the units of measurement (e.g., Celsius for
temperature, meters for distance) ensures proper interpretation of the sensor values.
Device Identifiers: Identifiers for devices or sensors help in associating the data with specific
sources, especially in systems with multiple connected devices.
Transmission Protocols:
Wi-Fi, Ethernet, Cellular, Bluetooth: Sensor values can be transmitted over various
communication protocols depending on the connectivity available in the IoT system.
Visual Representation:
Dashboards: Sensor data can be visualized on dashboards, displaying real-time or historical
values graphically for easy human interpretation and decision-making.
Graphs and Charts: Representing sensor data in graphical forms helps in quickly understanding
trends, patterns, and anomalies.
RESTful APIs: RESTful APIs provide standardized ways to access and manipulate sensor data,
enabling integration with other systems or applications.
Integration with Cloud Services:
Cloud Platforms: IoT data can be integrated into cloud platforms, where APIs and services are
provided to process, analyze, and store sensor values, making them accessible to authorized
users or applications.
The external representation of sensor values in IoT involves packaging the data in formats that
are understandable, interoperable, and easily consumed by other devices, systems, or users. It
facilitates seamless communication and integration within the broader IoT ecosystem.
RESTful APIs: Implementing REST APIs allows other systems or applications to access sensor
data over HTTP(S). Data can be retrieved, updated, or deleted using standard HTTP methods
(GET, POST, PUT, DELETE).
GraphQL APIs: GraphQL APIs offer more flexibility by allowing clients to specify the exact
data they need, reducing over-fetching or under-fetching of sensor data.
AMQP (Advanced Message Queuing Protocol): AMQP is another messaging protocol suitable
for exchanging sensor data between systems, especially in more complex and enterprise-
oriented setups.
Cloud Integration:
Cloud Platforms: Many IoT solutions leverage cloud services like AWS IoT, Google Cloud
IoT, or Azure IoT Hub. These platforms offer tools and APIs to securely ingest, store, process,
and analyze sensor data, enabling easy export or integration with other cloud-based services.
File-Based Exports:
CSV or JSON Files: Sensor data can be periodically stored in files (CSV, JSON) on local
storage or cloud storage. These files can then be accessed or downloaded for further analysis
or integration with other systems.
Real-Time Dashboards and Visualizations:
Dashboard Exporting: Real-time dashboards displaying sensor data can offer options to export
snapshots or historical data in visual formats like graphs or charts for analysis or reporting
purposes.
Integration with External Systems: