0% found this document useful (0 votes)
54 views158 pages

Ucs1505 - Iot

Internet of things book with all secular content. For all engineering students have a predicate knowledge of all source of server and sensors

Uploaded by

kgpriya2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views158 pages

Ucs1505 - Iot

Internet of things book with all secular content. For all engineering students have a predicate knowledge of all source of server and sensors

Uploaded by

kgpriya2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 158

K.

RAMAKRISHNAN COLLEGE OF ENGINEERING


(Autonomous)
Samayapuram, Tiruchirappalli-62112
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

INSTITUTE VISION AND MISSION


VISION
“To achieve a prominent position among the top technical institutions”
MISSION
M1: To bestow standard technical education par excellence through state of the art
infrastructure, competent faculty and high ethical standards.
M2: To nurture research and entrepreneurial skills among students in cutting edge
technologies.
M3: To provide education for developing high-quality professionals to transform the
society.
DEPARTMENT VISION AND MISSION
VISION
To create eminent professionals of Computer Science and Engineering by imparting
quality education.

MISSION
M1: To provide technical exposure in the field of Computer Science and Engineering
through state of the art infrastructure and ethical standards.

M2: To engage the students in research and development activities in the field of
Computer Science and Engineering.

M3: To empower the learners to involve in industrial and multi-disciplinary projects for
addressing the societal needs.

PROGRAMME EDUCATIONAL OBJECTIVES (PEOs)

PEO1: Analyse, design and create innovative products for addressing social needs.

PEO2: Equip themselves for employability, higher studies and research.

PEO3: Nurture the leadership qualities and entrepreneurial skills for their successful
career.

PROGRAMME SPECIFIC OUTCOMES (PSOs)

PSO1: Apply the basic and advanced knowledge in developing software, hardware and
firmware solutions addressing real life problems.

PSO2: Design, develop, test and implement product-based solutions for their career
enhancement.
K.RAMAKRISHNAN COLLEGE OF ENGINEERING
(Autonomous)
Samayapuram, Tiruchirappalli-62112
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

PROGRAM OUTCOME (PO)


PO1 Engineering knowledge: Apply the knowledge of mathematics, science,
engineering fundamentals, and an engineering specialization to the solution of
complex engineering problems.
PO2 Problem analysis: Identify, formulate, review research literature, and
analyze complex engineering problems reaching substantiated conclusions using
first principles of mathematics, natural sciences, and engineering sciences.
PO3 Design/development of solutions: Design solutions for complex engineering
problems and design system components or processes that meet the specified
needs with appropriate consideration for the public health and safety, and the
cultural, societal, and environmental considerations.
PO4 Conduct investigations of complex problems: Use research-based
knowledge and research methods including design of experiments, analysis and
interpretation of data, and synthesis of the information to provide valid
conclusions.
PO5 Modern tool usage: Create, select, and apply appropriate techniques,
resources, and modern engineering and IT tools including prediction and modelling
to complex engineering activities with an understanding of the limitations.
PO6 The Engineer and Society: Apply reasoning informed by the contextual
knowledge to assess societal, health, safety, legal and cultural issues and the
consequent responsibilities relevant to the professional engineering practice.
PO7 Environment and sustainability: Understand the impact of the professional
engineering solutions in societal and environmental contexts, and demonstrate the
knowledge of, and need for sustainable development.
PO8 Ethics: Apply ethical principles and commit to professional ethics and
responsibilities and norms of the engineering practice.
PO9 Individual and team work: Function effectively as an individual, and as a
member or leader in diverse teams, and in multidisciplinary settings
PO10 Communication: Communicate effectively on complex engineering activities
with the engineering community and with society at large, such as, being able to
comprehend and write effective reports and design documentation, make effective
presentations, and give and receive clear instructions.
PO11 Project management and finance: Demonstrate knowledge and
understanding of the engineering and management principles and apply these to
one’s own work, as a member and leader in a team, to manage projects and in
multidisciplinary environments.
PO12 Life-long learning: Recognize the need for, and have the preparation and
ability to engage in independent and life-long learning in the broadest context of
technological change.
K.RAMAKRISHNAN COLLEGE OF ENGINEERING
(Autonomous)
Samayapuram, Tiruchirappalli-62112
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
SYLLABUS
UNIT DETAILS HOURS
INTRODUCTION Evolution of Internet - IoT Architecture – Web 3.0 View of IoT 9
I – Protocol Standardisation for IoT – Protocols for IoT: IEEE 802.15.1 – IEEE 802.15.4
– BACNet Protocol – Modbus – KNX – Zigbee Architecture
PROGRAMMING MICROCONTROLLER FOR IOT Basics of microcontroller – 9
Setting up – Programming the Board – Reading from Sensors – Connecting
II
Microcontroller with Mobile Devices – Communication via Bluetooth and USB –
Connection with Internet via WIFI/Ethernet.
PROGRAMMING MICROPROCESSOR FOR IOT Installation and Setting up of 9
III the Microprocessor board – Programming the Microprocessor – Communication via
Bluetooth and USB – Connection with Internet via WIFI/Ethernet.

IOT IN CLOUD AND SECURITY Internet of Things (IoT) as Interconnection of


Threats (IoT) – Privacy Preservation for IoT used in Smart Buildings – Preventing
IV Unauthorized Access to Sensor Data – Authentication in IoT – Security Protocols for 9
IoT Access Networks – Cloud and IoT – Drivers for Integration – Cloud Platforms –
Applications.
IOT ANALYTICS AND PLATFORMS IOT Analytics: Role of Analytics in IOT –
V Data visualization Techniques – Introduction to R Programming – Statistical Methods 9
– IoT Platforms – Future Trends of IoT.
TOTAL HOURS 45
TEXT/REFERENCE BOOKS:
T/R BOOK TITLE/AUTHORS/PUBLICATION
T Charalampos Doukas, “Building Internet of Things with the Arduino”, Create space,April 2012.

T Bratko, “Prolog: Programming for Artificial Intelligence”, Fourth edition, Addison- Wesley
Educational Publishers Inc., 2011
T Fei Hu, “Security and Privacy in Internet of Things (IoTs): Models, Algorithms,
and Implementations”, CRC press,2016
R Dieter Uckelmann, Mark Harrison, Florian Michahelles, “Architecting the Internet of
Things”,Springer, 2011.

R Donald Norris, “The Internet of Things: Do-It-Yourself at Home Projects for Arduino, Raspberry Pi
and Beagle Bone Black”, Mc.Graw Hill, 2015.

COURSE OBJECTIVES:

1 To understand the basics of internet of things.

2 To learn about the hands on training for building simple applications using appropriate
sensors.

3 To understand the working of microcontroller boards and its associated components

4 To understand the protocols of Internet of things

5 To outline the data analytics and IoT platforms.


K.RAMAKRISHNAN COLLEGE OF ENGINEERING
(Autonomous)
Samayapuram, Tiruchirappalli-62112
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
COURSE OUTCOMES:

K PO(1..12) &
SNO Level DESCRIPTION PSO(1..2)
MAPPING
CO1 K4 Rephrase the internet of things and the protocols of IoT. PO1,2,3,4,5,6,12

CO2 K6 Identify the various IoT components. PO1,2,3,5,6

CO3 K6 Experiment with connection with internet through PO1,2,3,4,5,12


wifi/ethernet

CO4 K3 Inspect the role of cloud and security in IoT. 5. Organize PO1,2,3,5,12
data analytics and IoT platforms.

CO5 K4 Organize data analytics and IoT platforms. PO1,2,3,5,6,12

COURSE OUTCOMES VS POS MAPPING (DETAILED; HIGH:3; MEDIUM:2; LOW:1):

P P P P P P P P P P P P PS PS
SNO Objective O O O O O O O O O O O O O O
1 2 3 4 5 6 7 8 9 10 11 12 1 2

CO1 Rephrase the


internet of things
3 3 3 2 2 2 2
and the protocols
of IoT.

CO2 Identify the


various IoT 3 3 2 3 3
components.

CO3 Experiment with


connection with
3 2 3 2 3 2
internet through
wifi/ethernet

CO4 Inspect the role


of cloud and
security in IoT.
3 3 2 3 2
5. Organize data
analytics and IoT
platforms.

CO5 Organize data


analytics and IoT 3 3 3 3 3 2
platforms.

* For Entire Course, PO /PSO Mapping; 1 (Low); 2(Medium); 3(High) Contribution to


PO/PSO
Internet of things
(Digitize the
Immersive world)
Networked experiences
Connectivity economy Connecting:
(Digitize (Digitize
Business (Digitize People
business) interaction)
and access)
societal Social Process
impact Email E - commerce
Mobility Data
Web Digital supply
Cloud Things
browser chain
Anytime
any context Transportation

Anything Anyone
any device anybody
Healthcare Robots and
and hospitals drones
Internet Internet
of of
Things Things

Any service Connected Smart


Any place home and
any phones
anywhere offices
business

Any path
any network
Web 3.0 View of IoT

Web 3.0, also known as the third-generation internet, is the next evolution of the World
Wide Web. It provides a data-driven Semantic Web employing a machine-based
understanding of data with the objective of developing a more intelligent and connected
web experience for users.

The Web of today is static and unable to adjust to the individual needs of each person
experiencing it. Web 3.0 promises to be more dynamic and interactive. By implementing
artificial intelligence and blockchain technology, it will redefine the web experience
with structural changes to ensure democratization across all aspects of the internet.In
Web 3.0, data is stored securely and distributed across many devices, removing the need
for centralized servers. Such a design also reduces the risks of massive data leaks
because data is no longer centrally stored — making it more resilient to compromise.
Web 3.0 Definition and Features

Web 3.0 is highly decentralized, driven by machine learning and artificial intelligence,
and leverages blockchain technology. The result is real-world human communication.
Users retain control over their data and content, and they can sell or trade their data
without losing ownership, risking privacy or relying on intermediaries. In this business
model, users can log into a website without having their internet identity tracked.

Key to the innovation in Web 3.0 is the digitization of assets via tokenization.
Tokenization converts assets and rights into a digital representation, or token, on a
blockchain network. Cryptocurrency and fungible tokens are forms of digital currency
that can easily be exchanged across networks, driving a new business model that
democratizes finance and commerce. Non fungible tokens (NFTs) are units of data that
represent unique assets such as avatars, digital art, or trading cards, that can be owned by
users and monetized for their own gain.

It’s relatively easy to identify the major differences between Web 1.0 and Web 2.0. With
the former, users passively consult web pages and, generally, do not generate their own
content. With the latter, users generate content and interact with sites (and each other)
through social media platforms, forums and more. With the Web 3.0 generation of the
internet, the differences are not as clearly defined.

The term Web 3.0, coined by reporter John Markoff of The New York Times in 2006,
refers to a new evolution of the Web which includes specific innovations and practices.
Below are eight main features that can help us define Web 3.0:
1. Semantic Web: The next evolution of the Web involves the Semantic Web. The
Semantic Web improves the abilities of web technologies to generate, share and connect
content through search and analysis by understanding the meaning of words rather than
by keywords or numbers.
2. Artificial Intelligence: By combining semantic capabilities with natural language
processing, computers can understand information on a human-like level to provide
faster and more relevant results. In doing so, they become more intelligent and better
satisfy the needs of users.
3. 3D Graphics: Three-dimensional design is used extensively in websites and
services in Web 3.0. Museum guides, computer games, eCommerce, geospatial contexts
and more are all common examples of this.
4. Connectivity: With Web 3.0, information is more connected thanks to semantic
metadata. As a result, the user experience evolves into a new level of connectivity that
leverages all available information.
5. Ubiquity: Internet content and services can be accessed anywhere at any time via
any number of devices, rather than exclusively via computers and smartphones. Web 2.0
is already ubiquitous in many ways, but the growth of IoT devices will take it to new
levels.
6. Blockchain: With blockchain technology, user data is protected and encrypted.
This prevents large companies from controlling and/or using users’ personal data for
their gain.
7. Decentralized: Decentralized data networks store data within a peer-to-peer
interconnection. Users maintain ownership over their data and digital assets and are able
to log in securely over the internet without being tracked.
8. Edge Computing: Web 3.0 relies on the advance of edge computing in which
apps and data are processed at the network edge on devices such as mobile phones,
laptops, appliances, sensors and even smart cars.
Difference Between Web 1.0, Web 2.0, and Web 3.0
S.
Web 1.0 Web 2.0 Web 3.0
No.

1. Mostly Read-Only Wildly Read-Write Portable and Personal

2. Company Focus Community Focus Individual Focus

3. Home Pages Blogs / Wikis Live-streams / Waves

4. Owning Content Sharing Content Consolidating Content

5. WebForms Web Applications Smart Applications

6. Directories Tagging User behavior

7. Page Views Cost Per Click User Engagement

Interactive
8. Banner Advertising Behavioral Advertising
Advertising

9. Britannica Online Wikipedia The Semantic Web

10. HTML/Portals XML / RSS RDF / RDFS / OWL

Data of many was


Data was personalized and
11. Data was not Focused. controlled by some
no use of mediatory.
mediatory.

Information sharing is
12. Interaction is the goal. Immersion is the goal.
the goal.

It connects information It aims to connect Focuses on relating


13.
as its primary goal. people. knowledge.
S.
Web 1.0 Web 2.0 Web 3.0
No.

Introduction of web Intelligent web-based


14. Static websites
applications functions and apps

A simpler, more passive An enhanced social


15. A semantic web exists.
web. Web

Web and File Servers, AJAX, JavaScript, Web 3.0 technologies


HTML, and Portals are CSS, and HTML5 are include blockchain,
16.
technologies connected examples of related artificial intelligence, and
to Web 1.0. technology. decentralized protocols.

 Web 3.0 aims at democratization of the internet by allowing users to regain


control of their personal data.
 At the same time, IoT aims to connect almost everything around us to the
internet, thereby dissolving the barrier between physical and virtual worlds.
Protocol Standardization for IoT

The WoT explores the layer on top of connectivity with things and addresses
issues such as fast prototyping, data integration, and interaction with objects.

The WoT is a version where things become seamlessly integrated into the web.
There are also many other WoT applications around the world. Some of the WoT
applications are listed here.
 Arduino
 Japan Geiger Map
 Nanode
 The National Weather Study Project
 AgSphere
Two Pillars of the Web
The application server became the foundation that helped build widely spreading
web-based applications. An application server acts as a set of components accessible to
the software developer through an API defined by the middleware itself.
The application server is based on the three-tiered (Fig. 6.2) or multi- tiered
software architecture. As the two pillars for web applications and the Internet revolution,
the protocols (HTML)/HTTP/URL and the software will continue to be the two pillars
of play an important role in building WoT applications.
APPLICATION LAYER PROTOCOLS:
 MQTT – Message Queue Telemetry Transport Protocol
 DDS – Data Distribution Service
 AMQP – Advanced Message Queuing Protocol
 CoAP – Constrained Application Protocol

1). Message Queue Telemetry Transport Protocol

Machine to machine communication can be with this MQTT. It was developed


by IBM. Message queue telemetry transport protocol is a messaging protocol. This
protocol collects the data from the devices and forwards to the network. So the
connection between the devices and network can be done by this protocol.
It’s a simple protocol which sends the data from the sensors to devices and then
towards the network. This is the top protocol of the TCP/IP protocol reference model.
The three elements in MQTT protocol in IoT. They are subscriber, publisher and
dealer/broker. The data can be interchanged between subscriber and publisher.
The dealer/broker enables the safety connection between the subscriber and
publisher. MQTT runs over the TCP/IP model. Because of this MQTT protocol cannot
be used for all types of IoT applications.

2). Advanced Message Queuing Protocol (AMQP)

This advanced message queuing is a suitable protocol for the message-oriented


middleware environments. This was developed by John Hara from JP Morgan Chase,
London. This IoT communication protocol useful for the exchange of reliable message
can be done with this AMQP.
The publisher can communicate with subscriber through AMQP carrier. The
messages from the publisher can be store in the carrier of AMQP and as per the message
queue and order, they will be forwarded to the relevant subscriber with proper security
system line. AMQP has the following three capabilities which make it more reliable and
secure. This protocol has the below processing chain.
Exchange: Receives the messages from the publishers and based on priorities they are
forwarded to message queues.
Message Queue: Stores the messages until they are properly processed with client
software.
Binding: The connection between the exchange and message queue will state by this
binding component.

3). Data Distribution Service (DDS)

 DDS protocol uses brokerless architecture in IoT (coap,mqtt)


 it’s an IoT protocol developed for M2M (Machine to Machine) Communication
by OMG (Object Management Group).
 It enables data exchange via publish-subscribe methodology.
 It uses multicasting to bring top quality QoS to the applications.
 This DDS can be used in small devices which occupies less area and as well as in
the cloud. This is a middleware protocol (lies between operating system and
application) and API (Application Programming Interface) which enables the
data connectivity between devices.
 This architecture is best suitable for IoT application.
 This protocol software is best for interchanging the information and quick data
integration in IoT systems.
 This one supports the major software programming languages.
 Scalable, real-time and reliable communication can be possible with this
Data Distribution Service (DDS).
This DDS standard has two layers. They are:

 Data-Centric Publish-Subscribe (DCPS)


 Data Local Reconstruction Layer (DLRL)
 DCPS layer delivers the information to all subscribers whereas DLRL providing
the interface to the functionalities of DCPS.

4). Constrained Application Protocol (CoAP)

 The Constrained Application Protocol (CoAP) is a specialized web transfer


protocol for use with constrained nodes and constrained networks in the Internet
of Things.
 The protocol is designed for machine-to-machine (M2M) applications such as
smart energy and building automation.”
 It is a Web Transferred Protocol Used To Exchange Message Between Coap
Client And Server.
 It is Used in Constrained Nodes Or Networks
 If it is Designed For Web Application web Of Thing Protocol
 It follows a stateless client server architecture
 It is suitable for tiny device with low power, computation and communication
capabilities.

This protocol is an internet utility protocol for the few (restricted) IoT gadgets.
It is useful in most of IoT applications. Initially, CoAP is used in the machine to
machine communications. CoAP is the alternate protocol for the HTTP.
This protocol has an effective XML interchange data format technique. It is a
different technique of binary data format has more preferable in terms of space. This
could be better than plain text HTML/XML file.

CoAP has four different types of messages. They are: non-confirmable,


confirmable, reset and acknowledgment. For reliable and secure transmission over
UDP confirmable messages are used and the responses can be in the form of
acknowledgment. CoAP is a very lightweight protocol and it uses DTLS (Datagram
Transport Layer Security) for providing more security and reliable communications.

The figure-1 depicts CoAP Architecture. As shown it extends normal HTTP


clients to clients having resource constraints. These clients are known as CoAP clients.
Proxy device bridges gap between constained environment and typical internet
environment based on HTTP protocols. Same server takes care of both HTTP and CoAP
protocol messages.
Coap protocol message exchanges

There are two modes in which CoAP protocol messages get exchanged between
CoAP client and CoAP server viz. without separate response and with separate response.
With separate response, server notifies client about receipt of the request message.

This will increase processing time but help in avoiding unnecessary


retransmissions. CoAP IoT is unreliable protocol due to use of UDP. Hence CoAP
messages reach unordered or will get lost when they arrive at destination.

MQTT-SN (MQTT for Sensor networks)

 MQTT-SN (MQTT for Sensor networks) was designed specifically to work on


wireless networks, and , as far as possible, to work in the same way as MQTT.
 It uses the same publish/subscribe model and can be considered as a version of
MQTT.
The main differences between MQTT-SN vs MQTT:
 Reducing the size of the message payload
 Removing the need for a permanent connection by using UDP as the transport
protocol.
SERVICE DISCOVERY LAYER

 Service Discovery layer has a prominent role in an IOT architecture.


 It is the service discovery or service management layer which differentiates an
IOT network with that of typical internet network.
 The IOT devices need to connect and communicate with web or cloud based
services and applications for IOT implementation.

EXTENSIBLE MESSAGING AND PRESENCE PROTOCOL(XMPP)

 It is suitable for multi party chatting ,voice and video calling and telecommunity
 It’s protocol for streaming XML elements over a network in order to exchange
messages and presence information in close to real time.
 This protocol is mostly used by instant messaging applications like WhatsApp.

HTTP

 HTTP stands for HyperText Transfer Protocol.


 It is a protocol used to access the data on the World Wide Web (www).
 The HTTP protocol can be used to transfer the data in the form of plain text,
hypertext, audio, video, and so on.

The current status of IoT standardization


 Fragmented architectures, no coherent unifying concepts, solutions exist only for
application silos.
 No holistic approach to implement the IoT has yet been proposed.
 Many island solutions do exist (RFID, sensor nets, etc.)
 Little cross-sector reuse of technology and exchange of knowledge.
The key objectives of the IoT-A consortium are as follows:
 Create the architectural foundations of an interoperable Internet of Things as a
key dimension of the larger future Internet.
 Architectural reference model together with an initial set of key building blocks:
 Not reinventing the wheel but federating already existing technologies
 Demonstrating the applicability in a set of use cases
 Removing the barriers of deployment and wide-scale acceptance of the IoT by
establishing a strongly involved stakeholder group
 Federating heterogeneous IoT technologies into an interoperable IoT fabric
Working groups of IoT standards
M2M and WSN Protocol
A broad horizontal standard is a key requirement for the M2M industry to move from
its current state of applications existing in isolated silos based on vertical market or
underlying technology to a truly interconnected IoT.
There are a number of standardization bodies in the field of WSNs.
 IEEE  the physical and MAC layers
 IETF  layers or above
SCADA and RFID Protocols
The Object Linking and Embedding for Process Control (OPC) Foundation is an
industry consortium that creates and maintains standards for open connectivity of
industrial automation devices and systems
The OPC standards specify the communication of industrial process data, alarms
and events, historical data and batch process data between sensors, instruments,
controllers, software systems, and notification devices.
The smart cards with contactless interfaces (RFID is a subset) are becoming
increasingly popular for payment and ticketing applications.  The standard for
contactless smart card communications is ISO/IEC 14443.

Issues with IoT Standardization


Standardization is like a double-edged sword: critical to market development, but
it may threaten innovation and inhibit change when standards are accepted by the
market. The following two issues for the IoT standardization in particular and the ICT
standardization in general may never have answers: ICT standardization is a highly
decentralized activity. How can the individual activities of the network of extremely
heterogeneous standards-setting bodies be coordinated? It will become essential to allow
all interested shake-holders to participate in the standardization process toward the IoT
and to voice their respective requirements and concerns.
BLUETOOTH (802.15.1)
Bluetooth is a short-range wireless technology standard that is used for
exchanging data between fixed and mobile devices over short distances using UHF radio
waves in the ISM bands, from 2.402 GHz to 2.48 GHz, and building personal area
networks (PANs).

Bluetooth fills the niche of very short-range communication between mobile


phones, PDAs, Notebook computers, and other personal or peripheral devices. For
example, Bluetooth can be used to connect a mobile phone to a headset, or a notebook
computer to a printer.

Bluetooth is a more convenient alternative to connecting two devices with a


wire. In such applications, it is not necessary to provide much range or bandwidth. This
is fortunate for some of the target battery-powered devices, since it is important that they
not consume much power.

Bluetooth operates in the license-exempt band at 2.45 GHz. It has a range of only
about 10 m. For this reason, and because the communicating devices typically belong to
one individual or group, Bluetooth is sometimes categorized as a personal area network
(PAN). Version 2.0 provides speeds up to 2.1 Mbps. Power consumption is low.

Bluetooth class:

In Bluetooth, "class" refers to the three levels of power for Bluetooth devices:
Class 1, 2, and 3. The following table compares power and range of these three classes:

Class 1 100 mW (20 dBm) 100 meters


Class 2 2.5 mW (4 dBm) 10 meters
Class 3 1 mW (0 dBm) 1 meter

To communicate over the 100 meter range, a class 1 BT device is required at


both ends. To communicate over the 10 meter range, a class 1 or class 2 device is
required at both ends. Note: Class 3 devices are uncommon due to their very limited
range.
Bluetooth Technology Architecture (IEEE 802.15 protocol)
A Bluetooth network (formed by peer devices) is called a piconet, or a small net.
A piconet can have max eight stations (upto 8 connected devices), one of which is called
the primary , the rest are called secondaries.

All the secondary stations synchronize their clocks and hopping sequence in
accordance with the primary. Further a piconet can have only one primary station. The
communication between the primary and the secondary is a one-to-one or one-to-many
relationship.
802.15.1, more commonly known as Bluetooth, is a low-data-rate, low-power
wireless networking standard aimed at replacing cables between lightweight
devices [IEEE802.15.1].
The Bluetooth protocol stack, shown in Figure 1, is somewhat unusual compared
to other IEEE networking stacks. The Bluetooth stack defines many components above
the PHY and MAC layers, some of which are optional
Protocols in the Bluetooth Protocol Architecture
Transport layer

The Bluetooth transport layer is roughly equivalent to the traditional OSI PHY and
MAC layers. All Bluetooth devices are required to implement this layer in hardware.
The transport layer is composed from the radio, baseband, and link manager layers,
which are described below.

 Physical Layer − This includes Bluetooth radio and Baseband (also in the data
link layer.
o Radio − This is a physical layer equivalent protocol that lays down the
physical structure and specifications for transmission of radio waves. It
defines air interface, frequency bands, frequency hopping specifications,
and modulation techniques.
o Baseband − This protocol takes the services of radio protocol. It defines
the addressing scheme, packet frame format, timing, and power control
algorithms.
 Data Link Layer − This includes Baseband, Link Manager Protocol (LMP), and
Logical Link Control and Adaptation Protocol (L2CAP).
o Link Manager Protocol (LMP) − LMP establishes logical links between
Bluetooth devices and maintains the links for enabling communications.
The other main functions of LMP are device authentication, message
encryption, and negotiation of packet sizes.
o Logical Link Control and Adaptation Protocol (L2CAP) − L2CAP
provides adaption between upper layer frame and baseband layer frame
format. L2CAP provides support for both connection-oriented as well as
connectionless services.
 Middleware Layer − This includes Radio Frequency Communications
(RFComm) protocol, adopted protocols, SDP, and AT commands.
o RFComm − It is short for Radio Frontend Component. It provides a serial
interface with WAP.
o Adopted Protocols − These are the protocols that are adopted from
standard models. The commonly adopted protocols used in Bluetooth are
Point-to-Point Protocol (PPP), Internet Protocol (IP), User Datagram
Protocol (UDP), Transmission Control Protocol (TCP), and Wireless
Application Protocol (WAP).
o Service Discovery Protocol (SDP)− SDP takes care of service-related
queries like device information so as to establish a connection between
contending Bluetooth devices.
o AT Commands − ATtention command set.
 Applications Layer − This includes the application profiles that allow the user to
interact with the Bluetooth applications.

Baseband and Link Layers

At the baseband layer, Bluetooth devices form into piconets and/or scatternets.
Piconets consist of one master device that communicates directly with up to 7 active
slave devices. Piconets can also have up to 250 parked (i.e., inactive) slave nodes at any
given time. Multiple piconets can also be combined into a single multi-hop scatternet.

The architecture of Bluetooth defines two types of networks:


1. Piconet
2. Scatternet

Piconet

Piconet is a type of Bluetooth network that contains one primary node called the
master node and seven active secondary nodes called slave nodes. Thus, we can say that
there is a total of 8 active nodes which are present at a distance of 10 meters. The
communication between the primary and secondary nodes can be one-to-one or one-to-
many.

Scatternet

It is formed by using various piconets. A slave that is present in one piconet can
act as master or we can say primary in another piconet. This kind of node can receive a
message from a master in one piconet and deliver the message to its slave in the other
piconet where it is acting as a slave. This type of node is referred to as a bridge node. A
station cannot be mastered in two piconets.
IEEE 802.15.4

Used by several “Internet of Things” protocols:


ZigBee, 6LowPAN, Wireless HART, MiWi, and ISA 100.11a

IEEE 802.15.4 is a wireless access technology for low-cost and low-data-rate


devices that are powered or run on batteries. In addition to being low cost and offering a
reasonable battery life, this access technology enables easy installation using a compact
protocol stack while remaining both simple and flexible.
Several network communication stacks, including deterministic ones, and profiles
leverage this technology to address a wide range of IoT use cases in both the consumer
and business markets.
IEEE 802.15.4 is commonly found in the following types of deployments:
 Home and building automation
 Automotive networks
 Industrial wireless sensor networks
 Interactive toys and remote controls

Criticisms of IEEE 802.15.4 often focus on its MAC reliability, unbounded latency,
and susceptibility to interference and multipath fading. The negatives around reliability
and latency often have to do with the Collision Sense Multiple Access/Collision
Avoidance (CSMA/CA) algorithm.
CSMA/CA is an access method in which a device “listens” to make sure no other
devices are transmitting before starting its own transmission. If another device is
transmitting, a wait time (which is usually random) occurs before “listening” occurs
again.
Interference and multipath fading occur with IEEE 802.15.4 because it lacks a
frequency-hopping technique. Later variants of 802.15.4 from the IEEE start to address
these issues.
Standardization and Alliances:
IEEE 802.15.4 or IEEE 802.15 Task Group 4 defines low-data-rate PHY and
MAC layer specifications for wireless personal area networks (WPAN). This standard
has evolved over the years and is a well-known solution for low-complexity wireless
devices with low data rates that need many months or even years of battery.
Since 2003, the IEEE has published several iterations of the IEEE 802.15.4
specification. Newer releases typically supersede older ones, integrate addendums, and
add features or clarifications to previous versions.
The IEEE 802.15.4 PHY and MAC layers are the foundations for several
networking protocol stacks. These protocol stacks make use of 802.15.4 at the physical
and link layer levels, but the upper layers are different. These protocol stacks are
promoted separately through various organizations and often commercialized. Some of
the most well-known protocol stacks based on 802.15.4 are highlighted in Table 2-1.

S.No Protocol Description

Promoted through the ZigBee alliance, ZigBee defines upper-


layer components (network through application) as well as
application profiles. Common profiles include building
1 ZigBee
automation, home automation, and healthcare. ZigBee also
defines device object functions such as device role, device
discovery, network join and security
6LoWPAN is an IPv6 adaptation layer defined by the IETF
6LoWPAN working group that describes how to transport IPv6
2 6LoWPAN packets over IEEE 802.15.4 layers. RFCs document header
compression and IPv6 enhancement to cope with the specific
details of IEEE 802.15.4
ZigBee IP An evolution of the ZigBee protocol stack, ZigBee IP
3 ZigBee IP
adopts the 6LoWPAN adaptation layer , IPv6 network layer, RPL
routing protocol.In addition, it offers improvement in IP security.
ISA100.11a This is developed by the International Society of
Automation (ISA) as “Wireless Systems for Industrial
4 ISA100.11a automation: Process Control and Related Applications”.It is
based on IEEE 802.15.4-2006. The network and transport layers
are based on IETF 6LoWPAN, IPv6, and UDP standards
Wireless HART promoted by the HART Communication
Wireless Foundation, is a protocol stack that offers a time-synchronized,
5
HART self-organizing, and self healing mesh architecture, leveraging
IEEE 802.15.4-2006 over the 2.4GHz frequency band.
Thread Constructed on top of IETF 6LoWPAN /IPv6, Thread is a
6 Thread protocol stack for a secure and reliable mesh network to connect
and control products in the home.

IEEE 802.15.4 is a low-cost, low-data-rate wireless access technology for devices


that are operated or work on batteries. This describes how low-rate wireless personal
area networks (LR-WPANs) function.

PROPERTIES OF IEEE 802.15.4

1. Standardization and alliances:


It specifies low-data-rate PHY and MAC layer requirements for wireless
personal area networks (WPAN).
2. Physical Layer:
This standard enables a wide range of PHY options in ISM bands, ranging from
2.4 GHz to sub-GHz frequencies. IEEE 802.15.4 enables data transmission speeds of 20
kilobits per second, 40 kilobits per second, 100 kilobits per second, and 250 kilobits per
second.
The fundamental structure assumes a 10-meter range and a data rate of 250
kilobits per second. To further reduce power usage, even lower data rates are possible.
IEEE 802.15.4 regulates the RF transceiver and channel selection, and even
some energy and signal management features, at the physical layer.
Based on the frequency range and data performance needed, there are now six
PHYs specified. Four of them employ frequency hopping techniques known as Direct
Sequence Spread Spectrum (DSSS).
Both PHY data service and management service share a single packet structure
so that they can maintain a common simple interface with MAC.
3. MAC layer:

The MAC layer provides links to the PHY channel by determining that devices
in the same region will share the assigned frequencies. The scheduling and routing of
data packets are also managed at this layer.
The 802.15.4 MAC layer is responsible for a number of functions like:
 Beaconing for devices that operate as controllers in a network.
 used to associate and dissociate PANs with the help of devices.
 The safety of the device.
 Consistent communication between two MAC devices that are in a peer-
to-peer relationship.
Several established frame types are used by the MAC layer to accomplish these
functions. In 802.15.4, there are four different types of MAC frames:
 frame of data
 Frame for a beacon
 Frame of acknowledgement
 Frame for MAC commands
4. Topology:
Networks based on IEEE 802.15.4 can be developed in a star, peer-to-peer, or
mesh topology. Mesh networks connect a large number of nodes. This enables nodes
that would otherwise be out of range to interact with each other to use intermediate
nodes to relay data.
5. Security:
For data security, the IEEE 802.15.4 standard employs the Advanced Encryption
Standard (AES) with a 128-bit key length as the basic encryption technique.
Activating such security measures for 802.15.4 significantly alters the frame
format and uses a few of the payloads. The very first phase in activating AES
encryption is to use the Security Enabled field in the Frame Control part of the 802.15.4
header.
For safety, this field is a single bit which is assigned to 1. When this bit is set, by
taking certain bytes from its Payload field, a field known as the Auxiliary Security
Header is formed following the Source Address field.
6. Competitive Technologies:
The IEEE 802.15.4 PHY and MAC layers serve as a basis for a variety of
networking profiles that operate in different IoT access scenarios. DASH7 is a
competing radio technology with distinct PHY and MAC layers.

The Architecture of IEEE 802.15.4


Advantages of IEEE 802.15.4
IEEE 802.15.4 has the following advantages:
 cheap cost
 long battery life,
 Quick installation
 simple
 extensible protocol stack

Disadvantages of IEEE 802.15.4


IEEE 802.15.4’s drawbacks include:
 IEEE 802.15.4 causes interference and multipath fading.
 doesn’t employ a frequency-hopping approach.
 unbounded latency
 interference susceptibility

Applications of IEEE 802.15.4


IEEE 802.15.4 Applications:
 Wireless sensor networks in the industry
 Building and home automation
 Remote controllers and interacting toys
 Automotive networks
Application

BACnet
BACnet is "a data communication protocol for building automation
and control networks." A data communication protocol is a set of rules governing the
exchange of data over a computer network that covers everything from what kind of
cable to use to how to form a particular request or command in a standard way.
Wireless HART

BACnet is a network protocol used in building automation systems (BAS) to


control the data exchange between different devices and components. BACnet stands for
Building Automation and Control Network.
It is a network standard developed by the American Heating Refrigerating and
Air Conditioning Engineers. The American National Standard Institute (ANSI) and
International Standard for Organization (ISO) have also adopted BACnet as a standard
for networking building automation systems.

Characteristics of BACnet include:


 Open source standard
 No license fee required for its implementation
 A large number of manufacturer have adopted these standards, making it less
dependent on a specific vendor for its implementation
How is BACnet Used in Building Automation?
The advantage of BACnet is its feature of interoperability between the many
systems and devices used in building automation systems. It does so by providing a
standardized method of all the actions that occur and functions in a network
communication system.
The BACnet standard is implemented in three ways to serve the purpose of
interoperability:
 Representation of information as an object
 Communication between BACnet devices
 Selection of network technologies
Representation of BACnet Device and Data Type Information as Objects
With BACnet, all the necessary and concerned information is represented in
terms of an object. It means that every object represents data or information about a
component or device.
It is the object that is accessible over the network. Representing information as
an object provides the advantage that new objects can be created or existing objects can
be changed according to the user’s needs.
An object represents physical information such as physical inputs and outputs, as
well as nonphysical information like software or calculations.
It is important to note that each object may represent a single piece of
information or a group of information performing the same, specific function.

All objects must have an identifier, data type (i.e., analog or digital value), and
additional information such as read-only, modified by other devices, etc.. The BACnet
defines a total of 23 standard objects and covers almost all general-purpose functions in
a building automation system. A collection of objects performing a specific function is
called a BACnet Device.

BACNet Communication

BACnet’s communication model is the Client-Server model. It deals with the


sensing of messages between the controller and different devices. In this model, when
there is a data requirement data, the client sends a request to the server. The server, in
turn, responds with the required information, called a server response.
There are 38 types of services a BACNet offers divided into:
 Alarm and Event Services
 File Access Services
 Object Access Services
 Remote Device Management Services
 Virtual Terminal Services
Network Technologies
The final step in implementing BACnet is the selection of a network technology
through which all of the information travels to and from designated destinations. Some
of the network technologies used include:
 Ethernet
 IP
 Lon Talk
 ZigBee
 ARCnet
 MS/TP

The devices that use BACnet are called Native BACnet, which means that devices
generate signals that are compatible with the BACnet technology, and can be
interconnected with any BACnet network.

BACnet IP
IP is one of the networking technologies that BACnet supports. Support of
BACnet-compatible devices can be connected and utilized over an IP network, called
BACnet IP. BACnet IP represents a network that uses IP as its networking technique
and devices that support IP as a means of communication can be used in the BACnet.
Many companies have their networking technology in the IP structure, even
when not connected to the internet, making it easy and cost-effective to implement a
BACNet structure.
The devices on the BACNet IP have a unique IP address. The IP address is
understandable and recognizable on the BACnet.
Some advantages of BACNet IP are:
 IP based on the Ethernet structure offers a fast response speed. Normally,
Ethernet supports up to 100 megabits per second.
 A large number of devices can be connected to each other on the IP.
 Easy troubleshooting.

Modbus
Modbus is a serial communication protocol developed by Modicon published by
Modicon® in 1979 for use with its programmable logic controllers (PLCs). In simple
terms, it is a method used for transmitting information over serial lines between
electronic devices.
The device requesting the information is called the Modbus Client and the devices
supplying information are Modbus Servers. In a standard Modbus network, there is one
Client and up to 247 Servers, each with a unique Server Address from 1 to 247. The
Client can also write information to the Servers.
Modbus devices communicate using a master-slave (client-server) technique in
which only one device (the master/client) can initiate transactions (called queries). The
other devices (slaves/servers) respond by supplying the requested data to the master, or
by taking the action requested in the query.
A slave is any peripheral device (I/O transducer, valve, network drive, or other
measuring device) which processes information and sends its output to the master using
Modbus. The I/O Modules form slave/server devices, while a typical master device is a
host computer running appropriate application software. Other devices may function as
both clients (masters) and servers (slaves).
Types of Modbus Communication Protocol
Modbus serial protocol (the original version) is a master/slave protocol, e.g. one
master that controls the Modbus data transactions with multiple slaves that respond to
the master’s requests to read from or write data to the slaves. Network architectures are
shown Figures 1.
Modbus TCP, also known as Modbus TCP/IP, uses a client/server architecture.
Network architectures are shown Figures 2. (below)

The difference between Modbus RTU and Modbus ASCII


There are just two basic transmission ways found in RTU, ASCII and MODBUS
connections. These transmission modes determine the way in which the MODBUS
messages are coded. In ASCII format, the messages are readable, whereas in RTU the
messages are in binary coding and cannot be read while monitoring.
The trade off is the RTU messages are smaller-size, which allows for more data
exchange in an identical time period. One must be aware that all nodes within one
MODBUS network should be of exactly the same transmission style, meaning
MODBUS ASCII cannot communicate with MODBUS RTU and vice versa.
Properties of Modbus ASCII and Modbus RTU

Modbus TCP (Ethernet)

Modbus TCP is often referred to as Modbus over Ethernet. Modbus TCP (also
ModbusTCP/IP) is simply the Modbus RTU protocol with a TCP interface that runs on
Ethernet. The Modbus messaging structure is the application protocol that defines the
rules for organizing and interpreting the data independent of the data transmission
medium. TCP/IP refers to the Transmission Control Protocol and Internet Protocol,
which provides the transmission medium for Modbus TCP/IP messaging.

This enables Modbus/TCP devices to immediately and easily connect and


communicate over existing Ethernet and fibre networks. Modbus/TCP also allows many
more addresses than RS485, the use of multiple Masters and speeds in the gigabit range.
While Modbus RTU has a limitation of 247 nodes per network, Modbus/TCP networks
can have as many slaves as the physical layer can handle. Often this number is
somewhere around 1,024. Ethernet’s rapid adoption within the process control and
automation industry has allowed Modbus/TCP to become the most widely used, fastest
growing and supported industrial protocol over Ethernet. Network architectures are
shown Figures 2.
Figure 2: Modbus TCP Architecture

Unlike Modbus RTU and Modbus ASCII, Modbus/TCP will allow multiple
Clients to poll the same Server device simultaneously. This is permitted because over
Ethernet via TCP/IP, multiple messages can be sent, buffered and delivered without the
requirement of token passing or total bus control, which is often the case with many
RS485 and RS422 protocols.

Addressing and messaging

Modbus memory addressing is generally organized around 16-bit registers that


contain 16 coils or on/off (0/1) states or integer values in 16-bit registers (input/output or
holding registers). While some devices will use their own Modbus addressing, typical
Modbus addressing can be seen in Figure.
Modbus messaging is based on what is called an application data unit (ADU) and
a Protocol Data Unit (PDU). The Modbus message includes the slave/server address for
the slave/server involved, a function code, data start addresses, and the data being sent to
(written) or to be send back (read) to the master/client, with an error checksum at the end
(CRC/LRC/Checksum).
The size of the serial Modbus PDU is limited by the size constraint that was
inherited from the first Modbus serial network implementation of 256 bytes. Modbus
slave addresses are limited to 1-255. Addresses 1-247 are available to the user and
addresses 248-255 are reserved.
The Function Code defines the command that the slave device is to execute, such
as read data, accept data, report status, etc.

Benefits of using Modbus

 Development costs are said to be low.


 Minimum hardware is required.
 The specification is available free of charge for download,
 Interoperability among different vendors’ devices and compatibility with an
installed base of compatible devices.

The cons of Modbus and When NOT to Use Modbus


 Modbus does not have any inherent protections against inadvertent or malicious
assaults on its data transactions from cybersecurity attacks, and requires
additional protections.
 Therefore, do not use Modbus TCP if you want to go through a firewall.
 Don’t use Modbus RTU if you need fast data response
 Don’t use Modbus if you need any event-oriented responses. Modbus doesn’t do
events.
 A Modbus Master (RTU) or a Modbus Client (TCP) simply sends requests and
gets These are not networks that can quickly respond to an alarm condition.
 Don’t use Modus for sensitive data transfers. Modbus doesn’t support any kind
of security. Anyone getting access to the network can read the data transmitted
on the network.
 don’t use Modbus if you have a lot of data to transfer. The packets are limited to
around 120 bytes maximum.
 So, Modbus is great for small control applications where a small amount of data
needs to be transferred from point A to point B.

KNX
KNX is the internationally recognized and worldwide standard for smart home
automation and building control. KNX is technology which controls the automation of
integral functions of any residential, commercial or industrial building such as HVAC,
lighting systems, multimedia, security, energy management and more.
In order to transfer control data to all building management components (or
smart home devices/functions), a system is required that avoids the problem of having
isolated devices speaking 'different languages'.
KNX devices can manage lighting, blinds and shutters, HVAC, security systems,
energy management, audio video, white goods, displays, remote control, etc.

Communications that support KNX:


 Twisted pair (Most commonly Implemented, Avg. bit rate: 9.6Kbits/sec)
 Radio frequency
 Infrared Power line
 IP/Ethernet
The KNX Standard includes different Configuration Modes:

S-Mode (System Mode):

S-Mode uses the standard frame format. It needs active Network Management (as
performed by ETS) with Broadcast and Individual Addressing.

Controller Mode:

It uses Group communication with the standard frame format. It needs active Network
Management (as performed by ETS) with Broadcast and Individual Addressing.

Push button mode:

For configuration, PB mode relies only on active management from one device directly
by another. It uses group addressing with the standard frame, with structured binding.

Logical Tag Extended mode:

LTE defines extended frames for its “native”• run-time communication, with tagged
binding on Interface Object properties.
Advantages:

 Decentralized Network Structure


 Independent on the platform
 Low energy consumption
 Open standard
 Millions of installed devices
 Developed specifically for building automation
 Standardized applications assure consistency regardless of vendor
 Supported by hundreds of manufacturers
 Tree topology appropriate for large networks
 Choice of transmission media
 Backward compatible with former European Installation Bus (EIB)

Some of the key features of the architecture for KNX systems are:

 Interworking and distributed application models for the building automation


various tasks.
 Schemes for configuration and management of resources on the network, and to
permit the binding of parts of a distributed application in different nodes.
 A communication system with a message protocol and models for the
communication stack in each node (capable of hosting distributed applications
(KNX Common Kernel).
 Models for the realization of these elements when developing actual devices to
be mounted and linked in an installation.
KNX PROTOCOL STACK

Figure below depicts KNX protocol stack layers. Refer OSI protocol stack
layers which mentions basic and generic functions of each of the layers used in
KNX.
PHYSICAL LAYER:
The KNX physical layer in KNX protocol stack uses any of the following physical
layers.
1.TwistedPair(KNX-TP)
2.PowerLine(KNX-PL)
3.RadioFrequency(KNX-RF)
4.KNX-IP
KNX-TP uses CSMA/CA mechanism at MAC layer using inductive coupling.
The Bus delivers 21-29 Volt power supply. Low power KNX nodes using the twisted
pair and draw power of about 150 mWatt.

KNX-PL version PL110 uses FSK modulation. Each of the PLC line will have
about 64 devices. As PLC is a broadcast open media, the separation of domain is done
using 48 bit domain address.
KNX-RF physical layer uses 868 to 870 MHz frequency band.KNX-IP uses IP
protocols as medium of communication. It uses binary or XML encoded PDUs.

KNX PROTOCOL DATALINK LAYER

Various Physical layers will use different telegram formats in KNX protocol
stack. Figure-2 depicts KNX telegram formats for TP(Twisted Pair), PL(PowerLine) and
RF (Radio Frequency) PHY layer modes.
KNX ROUTING AND NETWORK LAYER
Each of the KNX node has 2 byte unique address assigned. It is used as source of
telegrams or used for configurations.
Source address = {
AreaIdentifier(4bits),
Line identifier(4 bits),
device number ( 8 bits) }
Source address here is used as physical address. It is configured during
installation. Here device number 0 is used for backbone and line couplers.Destination
address can be used either as logical group address(bit 17 = 1) or as physical address (bit
17=0). Group address 0000h will address all the KNX nodes.
The KNX installation will have 64K space. All the individual as well as group
addresses are stored in the address table of the KNX device.
Total 4 priority levels are supported by KNX protocol and encoded as specific values of
control bits in the frame.
THE TRANSPORT LAYER OF KNX PROTOCOL

The transport layer of KNX protocol stack provides connection oriented peer to
peer communication service. It provides connect primitive, disconnect primitive, TL-
ACK, Sequence counter, time out management(about 6sec for configuration mode).
KNX APPLICATION LAYER
It defines group objects and exchange of object values through service requests.
It also defines "property value write" service. This service is used to set values and also
to configure parameters to KNX device for interfacing objects.

ZIGBEE ARCHITECTURE

ZigBee is a Personal Area Network task group with low rate task group 4. It is a
technology of home networking. ZigBee is a technological standard created for
controlling and sensing the network. ZigBee is the Personal Area network of task group
4 so it is based on IEEE 802.15.4 and is created by Zigbee Alliance.
The Zigbee Alliance is an industry group formed to certify interoperability
between vendors and it is committed to driving and evolving ZigBee as an IoT solution
for interconnecting smart objects. ZigBee solutions are aimed at smart objects and
sensors that have low bandwidth and low power needs.
ZigBee is a standard that addresses the need for very low-cost implementation of
Low power devices with Low data rates for short-range wireless communications.
This communication standard defines physical and Media Access Control (MAC) layers
to handle many devices at low-data rates.
These Zigbee’s WPANs operate at 868 MHz, 902-928MHz, and 2.4 GHz
frequencies. The data rate of 250 kbps is best suited for periodic as well as intermediate
two-way transmission of data between sensors and controllers.
Zigbee is a low-cost and low-powered mesh network widely deployed for
controlling and monitoring applications where it covers 10-100 meters within the range.
Zigbee supports different network configurations for the master to master or

MiWi
ZigBee

master to slave communications. Zigbee networks are extendable with the use of routers
and allow many nodes to interconnect with each other for building a wider area network.

6LoWPAN
ZIGBEE PROTOCOL STACK ARCHITECTURE

AC

PHY

802.15.4

802.15.4
802.15.4
802.15.4

Physical Layer:
This layer does modulation and demodulation operations upon transmitting and
receiving signals respectively. This layer’s frequency, data rate, and a number of
channels are given below.
MAC Layer:
This layer is responsible for reliable transmission of data by accessing different
networks with the carrier sense multiple access collision avoidances (CSMA). This also
transmits the beacon frames for synchronizing communication.

Network AND Security Layer:


The ZigBee network and security layer provides mechanisms for network
startup, configuration, routing, and securing communications. This includes calculating
routing paths in what is often a changing topology, discovering neighbors, and managing
the routing tables as devices join for the first time.

The network layer is also responsible for forming the appropriate topology,
which is often a mesh but could be a star or tree as well. From a security perspective,
ZigBee utilizes 802.15.4 for security at the MAC layer, using the Advanced Encryption
Standard (AES) with a 128-bit key and also provides security at the network and
application layers.

Application Support Sub-Layer:


This layer enables the services necessary for Zigbee device objects and
application objects to interface with the network layers for data managing services. This
layer is responsible for matching two devices according to their services and needs.

Application Framework:
It provides two types of data services as key-value pair and generic message
services. The generic message is a developer-defined structure, whereas the key-value
pair is used for getting attributes within the application objects. ZDO provides an
interface between application objects and the APS layer in Zigbee devices. It is
responsible for detecting, initiating, and binding other devices to the network.
Types of zigbee evices

Zigbee Coordinator

In an FFD device, it is a PAN Coordinator is used to form the network. Once the
network is established, then it assigns the address of the network for the devices used
within the network. And also, it routes the messages among the end devices.

Zigbee Router
A Zigbee Router is an FFD Device that allows the range of the Zigbee Network.
This Router is used to add more devices to the network. Sometimes, it acts as a Zigbee
End Device.

Zigbee End Device

This is neither a Router nor a Coordinator that interfaces to a sensor physically


otherwise performs a control operation. Based on the application, it can be either an
RFD or an FFD.
General characteristics of zigbee standard:

 Low Power Consumption


 Low Data Rate (20- 250 kbps)
 Short-Range (75-100 meters)
 Network Join Time (~ 30 msec)
 Support Small and Large Networks (up to 65000 devices (Theory); 240 devices
(Practically))
 Low Cost of Products and Cheap Implementation (Open Source Protocol)
 Extremely low duty cycle.
 3 frequency bands with 27 channels.

Operating Frequency Bands (Only one channel will be selected for use in a network):
1. Channel 0: 868 MHz (Europe)
2. Channel 1-10: 915 MHz (the US and Australia)
3. Channel 11-26: 2.4 GHz (Across the World)

Zigbee network topology

 Star Topology (ZigBee Smart Energy): Consists of a coordinator and several end
devices, end devices communicate only with the coordinator.
 Mesh Topology (Self Healing Process): Mesh topology consists of one coordinator,
several routers, and end devices.
 Tree Topology: In this topology, the network consists of a central node which is a
coordinator, several routers, and end devices. the function of the router is to extend
the network coverage.
Zigbee operating modes
Zigbee two-way data is transferred in two modes: Non-beacon mode and Beacon
mode. In a beacon mode, the coordinators and routers continuously monitor the active
state of incoming data hence more power is consumed.
In this mode, the routers and coordinators do not sleep because at any time any
node can wake up and communicate. However, it requires more power supply and its
overall power consumption is low because most of the devices are in an inactive state
for over long periods in the network.
In a beacon mode, when there is no data communication from end devices, then
the routers and coordinators enter into a sleep state. Periodically this coordinator wakes
up and transmits the beacons to the routers in the network.
These beacon networks are work for time slots which means, they operate when
the communication needed results in lower duty cycles and longer battery usage. These
beacon and non-beacon modes of Zigbee can manage periodic (sensors data),
intermittent (Light switches), and repetitive data types.
Channel Access:
1. Contention Based Method (Carrier-Sense Multiple Access With Collision Avoidance
Mechanism)
2. Contention Free Method (Coordinator dedicates a specific time slot to each device
(Guaranteed Time Slot (GTS)))

The applications of ZigBee technology include the following.


Industrial Automation: In manufacturing and production industries, a communication
link continually monitors various parameters and critical equipment. Hence Zigbee
considerably reduces this communication cost as well as optimizes the control process
for greater reliability.
Home Automation: Zigbee is perfectly suited for controlling home appliances
remotely as a lighting system control, appliance control, heating, and cooling system
control, safety equipment operations and control, surveillance, and so on.
Smart Metering: Zigbee remote operations in smart metering include energy
consumption response, pricing support, security over power theft, etc.
Smart Grid monitoring: Zigbee operations in this smart grid involve remote
temperature monitoring, fault locating, reactive power management, and so on.
Zigbee Technology Advantages and Disadvantages

 This network has a flexible network structure


 Battery life is good.
 Power consumption is less
 Very simple to fix.
 It supports approximately 6500 nodes.
 Less cost.
 It is self-healing as well as more reliable.
 Network setting is very easy as well as simple.
 Loads are evenly distributed across the network because it doesn’t include a central
controller
 Home appliances monitoring as well controlling is extremely simple using remote
 The network is scalable and it is easy to add/remote ZigBee end device to the
network.
The disadvantages of Zigbee include the following.

 It needs the system information to control Zigbee based devices for the owner.
 As compared with WiFi, it is not secure.
 The high replacement cost once any issue happens within Zigbee based home
appliances
 The transmission rate of the Zigbee is less
 It does not include several end devices.
 It is so highly risky to be used for official private information.
 It is not used as an outdoor wireless communication system because it has less
coverage limit.
 Similar to other types of wireless systems, this ZigBee communication system is
prone to bother from unauthorized people.
UNIT II PROGRAMMING MICROCONTROLLER FOR IOT

Introduction

A microcontroller (MCU) is a small computer on a single integrated circuit that is designed to control specific tasks within
electronic systems. It combines the functions of a central processing unit (CPU), memory, and input/output interfaces , all
on a single chip.
Microcontrollers are widely used in embedded systems, such as home appliances, automotive systems, medical devices,
and industrial control systems. They are also used in consumer electronics products, such as gaming systems, digital
cameras, and audio players.
A typical microcontroller consists of a processor core, volatile and non-volatile memory, input/output peripherals, and
various communication interfaces. The processor core is responsible for executing instructions and controll ing the other
components of the microcontroller. The memory is used to store data and program code, while the input/output peripherals
are used to interact with the external environment.
Microcontrollers are programmable, which means that they can be customized to perform specific tasks. The programming
languages used to write code for microcontrollers vary depending on the manufacturer and the type of microcontroller.
Some of the commonly used programming languages include C, C++, and assembly language.
A microcontroller is a self-contained desktop that can be utilized in an embedded system. A few microcontrollers may run
at clock rate rates and use four-bit expressions. Because many of the devices they control are battery-operated,
microcontrollers must often be low-power. Microcontrollers are found in a wide range of products, including consumer
electronics, automobile engines, computer peripherals, and test and measurement equipment. These are also well -suited to
long-term battery usage. The vast majority of microcontrollers in use today are embedded in other devices.
The microcontroller used in Embedded System. for example:
• Security Systems
• Laser Printers
• Automation System
• Robotics
Working of Microcontroller:
The microcontroller chip is a high-speed device, yet it is slow when compared to a computer. As a result, each command
will be executed quickly within the microcontroller. The quartz oscillator is enabled and through control logic register
once the supply is powered on. Parasite capacitors will be recharged for a few seconds while the early preparation is taking
place. Once the voltage level reaches its maximum value and the oscillator’s frequency stabilizes, the operation of writing
bits through special function registers becomes stable. Everything is controlled by the oscillator’s CLK, and the whole
electronics will begin to function. All of this happens in a matter of nanoseconds.
A microcontroller’s major role is that it can be thought of as a self-contained system with a processor memory. Its
peripherals can be used in the same way that an 8051 microcontroller can. The bulk of microcontrollers in use today are
embedded in other types of machinery such as telephones, appliances, vehicles, and computer system peripherals.
Types of Microcontroller:
Here are some of the most common types of microcontrollers:
 8-bit Microcontrollers: These are the most basic type of microcontrollers, typically used in simple applications such
as toys, small appliances, and remote controls. They have a limited processing power and memory capacity, but they
are easy to use and cost-effective.
 16-bit Microcontrollers: These are more advanced than 8-bit microcontrollers and are capable of performing more
complex tasks. They are commonly used in applications such as medical devices, automotive systems, and industrial
control systems.
 32-bit Microcontrollers: These are the most powerful and feature-rich microcontrollers, capable of handling large
amounts of data and performing high-speed processing. They are used in applications such as gaming systems,
multimedia devices, and high-end industrial automation.
 ARM Microcontrollers: These microcontrollers are based on the ARM architecture and are widely used in a variety
of applications, including mobile devices, automotive systems, and industrial control systems.
 PIC Microcontrollers: These microcontrollers are manufactured by Microchip Technology and are commonly used
in a wide range of applications, including home appliances, automotive systems, and medical devices.
 AVR Microcontrollers: These microcontrollers are manufactured by Atmel Corporation and are commonly used in
applications such as robotics, industrial control systems, and consumer electronics.
 FPGA-based Microcontrollers: These microcontrollers use field-programmable gate arrays (FPGAs) to provide
highly customizable and flexible processing capabilities. They are commonly used in applications such as digital signal
processing, video processing, and high-speed networking.
 CPU: The microcontroller is referred to as a CPU device since it is utilized to carry and decode data before effectively
completing the assigned duty. All microcontroller components are connected to a specific system utilizing a central
processing unit. The CPU can decode instructions retrieved from the programmable memory.
 Memory: The memory chip of a microcontroller functions similarly to a microprocessor in that it stores all of the data
as well as programming. Microcontrollers have a limited quantity of RAM/ROM/flash memory for storing program
source code.
 Input and Output ports: In general, these ports are used to interface or otherwise drive various appliances like LEDs,
LCDs, printers, and so on.
 Serial Ports: Serial ports are used to offer serial interfaces between the microcontroller and a range of additional
peripherals, such as the parallel port.
 Timers: Timers and counters are included in a microcontroller. In a microcontroller, they are used to manage all timing
and counting activities. The fundamental function of a counter is to count external pulses, whereas timers conduct clock
tasks, pulse production, modulations, frequency measurement, and oscillations, among other things.
 ADC (Analog to Digital Converter): ADC is an acronym for Automated Data Collection (Analog to Digital
Converter). Analog to digital converter is abbreviated as ADC. The primary function of an ADC is to convert analog
signals to digital signals. The required input signals for ADC are analog, and the resulting digital signal is employed
in a variety of digital applications such as measurement equipment.
 Control Interpretation: This controller is used to provide delayed control to a running application, with internal or
external interpretation.
 Block with Special Functions: A specific function block is included in some special microcontrollers built for
particular devices such as robots and space systems. This block has additional ports for doing specific tasks.
Microcontroller Applications :
In contrast to microprocessors, which are used in personal computers and other devices, microcontrollers are mostly
employed in embedded devices. These are mostly utilized in a variety of products such as implantable medical devices,
machine tools, automotive engine control systems, office equipment, remote-controlled appliances, and so on. The
following are some of the most common uses for microcontrollers.
Microcontroller Properties :
 Microcontroller devices are capable of having words longer than 64 bits.
 Microcontroller consist of RAM , ROM , Timer , I/O Ports.
 Microcontroller ROM is used for program storage and RAM is used for data storage.
 It is designed by using CISC architecture.
 The power consumption of modern microcontrollers is significantly lower and have operating voltage range from 1.8V
to 5.5V
 The latest feature of microcontroller is flash memory like EPROM and EEPROM.
 The most recent feature of a microcontroller is flash memory, such as EPROM and EEPROM.

Uses of Microcontroller :
Microcontrollers are used in a wide range of electronic devices and systems, including:
1. Home Appliances: Many home appliances, such as washing machines, refrigerators, and air conditioners, use
microcontrollers to perform various functions, such as temperature control, timing, and monitoring.
2. Automotive Systems: Microcontrollers are used in automotive systems, such as engine control units, anti-lock braking
systems, and airbag systems, to control various functions and ensure safe and efficient operation.
3. Medical Devices: Medical devices, such as insulin pumps, heart monitors, and blood glucose met ers, use
microcontrollers to perform various functions and provide accurate and reliable results.
4. Industrial Control Systems: Microcontrollers are used in industrial control systems, such as robotics, process control
systems, and manufacturing equipment, to control and monitor various processes and operations.
5. Consumer Electronics: Many consumer electronics devices, such as digital cameras, gaming systems, and audio
players, use microcontrollers to perform various functions and provide advanced features and capabilities.
6. IoT Devices: Internet of Things (IoT) devices, such as smart home systems, wearables, and environmental sensors, use
microcontrollers to connect to the internet and perform various functions.
7. Aerospace and Defense Systems: Microcontrollers are used in aerospace and defense systems, such as satellites,
avionics, and missiles, to control and monitor various functions and ensure safe and efficient operation.
Issues in Microcontroller :
some of the most common issues that can arise with microcontrollers:
1. Timing Issues: Microcontrollers rely on precise timing to execute instructions and perform tasks. Any issues with
timing can cause errors and malfunctions, which can be difficult to diagnose and fix.
2. Power Issues: Microcontrollers require a stable and consistent power supply to operate correctly. Any fluctuations or
disruptions in the power supply can cause the microcontroller to malfunction or fail.
3. Heat Issues: Microcontrollers generate heat during operation, and excessive heat can damage the dev ice or cause it to
malfunction. Heat issues can be caused by poor design, inadequate cooling, or high ambient temperatures.
4. Noise Issues: Microcontrollers can be affected by electromagnetic interference (EMI) and radio frequency interference
(RFI) from other electronic devices, which can cause errors and malfunctions.
5. Code Issues: The programming code used to control the microcontroller can contain errors and bugs, which can cause
the device to malfunction or fail.
6. Security Issues: Microcontrollers can be vulnerable to security breaches, including unauthorized access, data theft, and
malware attacks.
7. Compatibility Issues: Microcontrollers may not be compatible with other electronic components or devices, which can
cause errors and malfunctions.

8051 Architecture

In 1980, Intel introduced a powerful 8051 series of 8 -bit microcontrollers. They are the second generation of 8-bit
microcontrollers. The 8051 microcontrollers are used for a variety of applications involving limited calculations and relatively
some control strategies. They are used for industrial and commercial control applications, appliances control, instrumentation
etc.

The 8051 contains Boolean processor, full duplex serial port and power saving circuitry in addition to essential components
such as 8-bit CPU, RAM, ROM/EPROM/OTPROM, timer/counter and parallel I/O lines.
The pin diagram of 8051 microcontroller consists of 40 pins as given below:

Pin 1-8 (Port1): These are 8-bit bidirectional I/O port with internal pull-up resisters. It does not perform any task; it is just
an I/O port

Pin 9 (RST): It is a Reset input pin which is used to reset the microcontroller to its initial position.

Pin 10 to 17 (Port 3): It is also an 8-bit bidirectional I/O port with internal pull-up resisters. Additionally, it performs some
special functions:

PORT 3 Pin Function Description

P3.0 RXD Serial Input

P3.1 TXD Serial Output

P3.2 INT0 External Interrupt 0

P3.3 INT1 External Interrupt 1

P3.4 T0 Timer 0

P3.5 T1 Timer 1

P3.6 WR External Memory Write

P3.7 RD External Memory Read

Pin 18 and 19: It is XTAL1 and XTAL1 pins respectively. These pins are used for connecting an external crystal to get the
system clock.

Pin 20 (GND): It is a ground pin. It provides the power supply to the circuit.

Pin 21 to 28 (Port 2): These pins are bidirectional I/O port. Higher order address bus signals are multiplexed with this
bidirectional port.

Pin 29 (PSEN): It is a Program Enable Pin. Using this PSEN pin external program memory can be read.

Pin 30 (ALE/PROG): This pin is the Address Latch Enable pin. Using this pin, external address can be separated from data.
Pin 31 (EA/VPP): Named as external Access Enable Pin (EA). It is used to enable or disable the external memory
interfacing.

Pin 32 - 39 (Port 0): These are also a bidirectional I/O pins but without any internal pull-ups. Hence, it requires external pins
in order to use port 0 pins as I/O port. Lower order data and address bus signals are multiplexed with this port.

Pin 40 (VCC): This pin is used to supply power to the circuit.

8051 I/O ports

8051 microcontroller have 4 I/O ports each of 8-bit, which can be configured as input or output. Hence, total 32 I/O pins
allows the microcontroller to be connected with the peripheral devices.

Note: Pin can be configured as 0 for output and 1 for the input.
1) PORT 0

P0 can be used as a bidirectional I/O port or it can be used for address/data connected for accessing external memory. When
control is 1 the port is used for address or data interfacing. When the control is 0 then the port can be used as a bidirectional
I/O port.

Fig: Structure of port 0 pin

PORT 0 as an Input Port

If the control is 0 then the port is used as an input port and 1 is written to the latch. In this type of situation both the output
MOSFETs are off. Since the output pin has floats therefore, whatever data written on pin is directly read by read pin.

PORT 0 as an Output Port


If we want to write 1 on pin of P0, a '1' written to the latch which turns 'off' the lower FET while due to '0' control signal
upper FET also turns off.

Suppose we want to write '0' on pin of port 0, when '0' is written to the latch, the pin is pulled down by the lower FET. Hence
the output becomes zero.

2) PORT 1

PORT 1 is dedicated only for I/O interfacing. When used as an output port, not needed to connect additional pull-up resistor
like port 0.

To use PORT 1 as an input port '1' has to be written to the latch. In this mode 1 is written to the pin by the external device
then it read fine.

Fig: Structure of port 1 pin

3) PORT 2

PORT 2 is used for higher external address byte or a normal I/O port. Here, the I/O operation is similar to PORT 1. Latch of
PORT 2 remains stable when Port 2 pin are used for external memory access.
Fig: Structure of port 2 pin

4) PORT 3

Following are the alternate functions of PORT 3:

PORT 3 Pin Function Description

P3.0 RXD Serial Input

P3.1 TXD Serial Output

P3.2 INT0 External Interrupt 0

P3.3 INT1 External Interrupt 1

P3.4 T0 Timer 0

P3.5 T1 Timer 1

P3.6 WR External Memory Write


P3.7 RD External Memory Read

It works as an I/O port same like port 2. Alternate functions of port 3 makes its architecture different than other ports.

Fig: Structure of port 3 pin

8051 interrupts

Interrupt is a process of creating a temporary halt main program and pass the control to the external sources and execute
their task and then passes the control to the main program where it held left off.

8051 has 5 interrupt signals, i.e.

o INT0,
o TFO,
o INT1,
o TF1,
o RI/TI.

The number of interrupt sources differs from version to version. It varies from 5 to 15.

The important interrupt sources are: one from the serial port, two from timers, two from external interrupts INT0 and INT1.

Each of the interrupts can individually be enabled/disabled by setting/clearing a bit in the special function register IE
(interrupt enable). The IE register also contains a global disable bit, which disables all the interrupts.
Each interrupt can also be programmed to one of the priority level scheme by setting/clearing bits in the special function
register IP (Interrupt Priority register).

A low priority interrupt can be interrupted by a high priority interrupt, but it cannot be interrupted by another low priority
interrupt. A high priority interrupt can?t be interrupted by a low priority interrupt.

Difference between Microprocessor and Microcontroller


Microprocessors Microcontrollers

It is used for big applications. It is used to execute a single task within


an application.

Microprocessor is the heart of computer It is the heart of the embedded system.


system.

It is just a processor. Memory and I/O Microcontroller contains external


components have to be having to be processor along with internal memory
connected externally. and I/O components.

Since I/O and memory connected Since I/O and memory present
externally, the circuit becomes large. internally, the circuit is small.

Can't be used in compact systems and Can be used in compact systems and
hence inefficient. microcontroller is an efficient
technique.

Cost of entire system increases. Cost of entire system is low.

Power consumption is high. Power consumption is low.

Most of the microprocessors do not Most of the microcontrollers have


have power saving modes. power saving mode.

Difficult to replace. Easy to replace.

Mainly used in personal computers. Used mainly in washing machine, MP3


players.
ROLE OF SENSORS

Different types of applications require different types of sensors to collect data from the
environment. This article takes a look at some common IoT sensors. In an Internet of Things (IoT)
ecosystem, two things are very important: the Internet and physical devices like sensorsand actuators.
As shown in Fig. 1, the bottom layer of the IoT system consists of sensor connectivity and network to
collect information. This layer is an essential part of the IoT systemand has network connectivity to the
next layer, which is the gateway and network layer.

Types of sensors

All the parameters i.e. the Sensors (which give inputs to the Computers), the Computers (the
brains of the system) and the mechanics (the outputs of the system like engines and motors)
are equally important in building a successful automated system.
Sensor as an input device which provides an output (signal) with respect to a specific physical
quantity (input). Sensor means that it is part of a bigger system which provides input to a main
control system (like a Processor or a Microcontroller).

S.No Sensor Applications Technology


Industrial machinery, automotive, human
1. Inertial sensors MEMS and
activity
Gyroscope

Speed Measuring Industrial machinery,


2. Magnetic, light
Sensor automotive, human activity
Capacitive, Inductive,
Proximity sensor Industrial machinery, automotive, human
Magnetic, Light,
3. activity
Ultrasound

PassiveIR, Ultrasound
Occupancy sensor Home/office monitoring
mostcommon
4.

Home/office HVAC control,


5. Temperature/humiditysensor Solid state,
automotive,
thermocouple
industrial
Solid state, photocell,
Home/office/industriallighting control
Photoresistor,
6. Light sensor
Photodiode

Coil (Faraday’s law), Hall


Power (current)sensor Home/office/industrial
effect
7. powermonitoring/controlTechnology

Industrial monitoring/control,
Air/fluid pressuresensor Capacitive, Resistive
automotive, agriculture
8.

Industrial
9. Acoustic sensor Diaphragmcondenser
monitoring/control, humaninterface
Industrial Resistive thinfilms
10. Strain sensor
monitoring/control, civilinfrastructure

Fig 3.Examples of Sensors

1. IR LED

It is also called as IR Transmitter. It is used to emit Infrared rays. The range of these frequencies are greater than the
microwave frequencies (i.e. >300GHz to few hundreds of THz). The rays generated by an infrared LED can be sensed
by Photodiode explained below.The pair of IR LED and photodiode is called IR Sensor.

Fig 4. LED sensor


2. Photo Diode (Light Sensor)

It is a semiconductor device which is used to detect the light rays and mostly used as IR
Receiver. Its construction is similar to the normal PN junction diode but the working principle
differs from it. As we know a PN junction allows small leakage currents when it is reverse
biased so, this property is used to detect the light rays. A photodiode is constructed such that
light rays should fall on the PN junction which makes the leakage current increase based on
the intensity of the light that we have applied. So, in this way, a photodiode can be used to
sense the light rays and maintain the current through the circuit. Check here the working
of Photodiode with IR sensor.

Fig. 5 Photo diode

3. Proximity Sensor

A Proximity Sensor is a non-contact type sensor that detects the presence of an object.
Proximity Sensors can be implemented using different techniques like Optical (like Infrared or
Laser), Ultrasonic, Hall Effect, Capacitive, etc.

Fig .6 Proximity sensor


Some of the applications of Proximity Sensors are Mobile Phones, Cars (Parking Sensors),
industries (object alignment), Ground Proximity in Aircrafts, etc. Proximity Sensor in
Reverse Parking is implemented in this Project: Reverse Parking Sensor Circuit.

4. LDR (Light Dependent Resistor)

As the name itself specifies that the resistor that depends upon the light intensity. It works on
the principle of photoconductivity which means the conduction due to the light. It is generally
made up of Cadmium sulfide. When light falls on the LDR, its resistance decreases and acts
similar to a conductor and when no light falls on it, its resistance is almost in the range of
MΩ or ideally it acts as an open circuit. One note should be considered with LDR is that it
won’t respond if the light is not exactly focused on its surface.

Fig. 7 LDR

With a proper circuitry using a transistor it can be used to detect the availability of light. A
voltage divider biased transistor with R2 (resistor between base and emitter) replaced with an
LDR can work as a light detector.

5. Thermistor (Temperature Sensor)

A thermistor can be used to detect the variation in temperature. It has a negative temperature
coefficient that means when the temperature increases the resistance decreases. So, the
thermistor’s resistance can be varied with the rise in temperature which causes more current
flow through it. This change in current flow can be used to determine the amount of change
in temperature. An application for thermistor is, it is used to detect the rise in temperature and
control the leakage current in a transistor circuit which helps in maintaining its stability. Here
is one simple application for Thermistor to control the DC fan automatically.

Fig. 8 Thermistor6.Thermocouple

(Temperature Sensor)

Another component that can detect the variation in temperature is a thermocouple. In its
construction, two different metals are joined together to form a junction. Its main principle is
when the junction of two different metals are heated or exposed to high temperatures a
potential across their terminals varies. So, the varying potential can be further used to measure
the amount of change in temperature.

Fig. 9 Thermo couple

7.Strain Gauge (Pressure/Force Sensor)

A strain gauge is used to detect pressure when a load is applied. It works on the principle of
resistance, we know that the resistance is directly proportional to the length of the wire and is
inversely proportional to its cross-sectional area (R=ρl/a). The same principle can be used
here to measure the load. On a flexible board, a wire is arranged in a zig-zag manner as shown
in the figure below. So, when the pressure is applied to that particular board, it bends in a
direction causing the change in overall length and cross-sectional area of the wire. This leads
to change in resistance of the wire. The resistance thus obtained is very minute (few ohms)
which can be determined with the help of the Wheatstone bridge. The strain gauge is placed
in one of the four arms in a bridge with the remaining values unchanged. Therefore, when the
pressure is applied to it as the resistance changes the current passing through the bridge varies
and pressure can be calculated.

Strain gauges are majorly used to calculate the amount of pressure that an airplane wing can
withstand and it is also used to measure the number of vehicles allowable on a particular road
etc.

Fig .10 Strain Guage

8. Load Cell (Weight Sensor)

Load cells are similar to strain gauges which measure the physical quantity like force and give
the output in form of electrical signals. When some tension is applied on the load cell it
structure varies causing the change in resistance and finally, its value can be calibrated using
a Wheatstone bridge. Here is the project on how to measure weight using Load cell.
Fig 11.Load Cell

9. Potentiometer

A potentiometer is used to detect the position. It generally has various ranges of resistors
connected to different poles of the switch. A potentiometer can be either rotary or linear type.
In rotary type, a wiper is connected to a long shaft which can be rotated. When the shaft has
rotated the position of the wiper alters such that the resultant resistance varies causing the
change in the output voltage. Thus the output can be calibrated to detect the change its
position.

Fig 12.Potentiometer

10. Encoder

To detect the change in the position an encoder can also be used. It has a circular rotatable
disk-like structure with specific openings in between such that when the IR rays or light rays
pass through it only a few light rays get detected. Further, these rays are encoded into a digital
data (in terms of binary) which represents the specific position.

Fig 13.Encoder

11 Hall Sensor

The name itself states that it is the sensor which works on the Hall Effect. It can be defined as
when a magnetic field is brought close to the current carrying conductor (perpendicular to the
direction of the electric field) then a potential difference is developed across the given
conductor. Using this property a Hall sensor is used to detect the magnetic field and gives
output in terms of voltage. Care should be taken that the Hall sensor can detect only one pole
of the magnet.

Fig 14.Hall sensor

The hall sensor is used in few smartphones which are helpful in turning off the screen when
the flap cover (which has a magnet in it) is closed onto the screen. Here is one practical
application of Hall Effect sensor in Door Alarm.
12. Flex Sensor

A FLEX sensor is a transducer which changes its resistance when its shape is changed or
when it is bent. A FLEX sensor is 2.2 inches long or of finger length. Simply speaking the
sensor terminal resistance increases when it’s bent. This change in resistance can do no good
unless we can read them. The controller at hand can only read the changes in voltage and
nothing less, for this, we are going to use voltage divider circuit, with that we can derive the
resistance change as a voltage change.

Fig 15. Flex sensor

13.Microphone (Sound Sensor)

Microphone can be seen on all the smartphones or mobiles. It can detect the audio signal and
convert them into small voltage (mV) electrical signals. A microphone can be of many types
like condenser microphone, crystal microphone, carbon microphone etc. each type of
microphone work on the properties like capacitance, piezoelectric effect, resistance
respectively. Let us see the operation of a crystal microphone which works on the
piezoelectric effect. A bimorph crystal is used which under pressure or vibrations produces
proportional alternating voltage. A diaphragm is connected to the crystal through a drive pin
such that when the sound signal hits the diaphragm it moves to and fro, this movement changes
the position of the drive pin which causes vibrations in the crystal thus an alternating voltage
is generated with respect to the applied sound signal. The obtained voltage is fed to an
amplifier in order to increase the overall strength of the signal.
Fig 16.Microphone

14.Ultrasonic sensor

Ultrasonic means nothing but the range of the frequencies. Its range is greater than audible
range (>20 kHz) so even it is switched on we can’t sense these sound signals. Only specific
speakers and receivers can sense those ultrasonic waves. This ultrasonic sensor is used to
calculate the distance between the ultrasonic transmitter and the target and also used to
measure the velocity of the target.

Ultrasonic sensor HC-SR04 can be used to measure distance in the range of 2cm-400cm
with an accuracy of 3mm. Let’s see how this module works. The HCSR04 module generates
a sound vibration in ultrasonic range when we make the ‘Trigger’ pin high for about 10us
which will send an 8 cycle sonic burst at the speed of sound and after striking the object, it
will be received by the Echo pin. Depending on the time taken by sound vibration to get back,
it provides the appropriate pulse output. We can calculate the distance of the object based on
the time taken by the ultrasonic wave to return back to the sensor.

Fig 17.Utrasonic sensor

There are many applications with the ultrasonic sensor. We can make use of it avoid obstacles
for the automated cars, moving robots etc. The same principle will be used in the RADAR for
detecting the intruder missiles and airplanes. A mosquito can sense the ultrasonic sounds. So,
ultrasonic waves can be used as mosquito repellent.

15.Touch Sensor

In this generation, we can say that almost all are using smartphones which have widescreen
that too a screen which can sense our touch. So, let’s see how this touchscreen works.
Basically, there are two types of touch sensors resistive based and a capacitive based touch
screens. Let’s know about working of these sensors briefly.

The resistive touch screen has a resistive sheet at the base and a conductive sheet under the
screen both of these are separated by an air gap with a small voltage applied to the sheets.
When we press or touch the screen the conductive sheet touches the resistive sheet at that
point causing current flow at that particular point, the software senses the location and relevant
action is performed.

Fig 18.Touch sensor

16.PIR sensor

PIR sensor stands for Passive Infrared sensor. These are used to detect the motion of
humans, animals or things. We know that infrared rays have a property of reflection. When
an infrared ray hits an object, depending upon the temperature of the target the infrared ray
properties changes, this received signal determines the motion of the objects or the living
beings. Even if the shape of the object alters, the properties of the reflected infrared rays can
differentiate the objects precisely. Here is the complete working or PIR sensor.

3. ACTUATOR
Actuators use energy from a source upon the receipt of a signal so as to bring about a
mechanical motion. This blog tells you about how they function and the many types of actuators
used today. Actuators are mechanical or electro-mechanical devices that, upon beingoperated
electrically, manually, or by various fluids, allow controlled and sometimes limited movements
or positioning. They refer to that component of a machine that helps carry out the moving and
controlling of a mechanism or system; take for instance opening a valve. To put itsimply, they
can be called movers.

Actuators basically need a control signal and a source of energy. Upon receiving a control
signal, the actuator uses energy from the source to bring about a mechanical motion. The
control system can be a human, a fixed mechanical or electronic system, or even software-
based, say a printer driver, or a robot control system. Examples of actuators include electric
motors, stepper motors, electroactive polymers, screw jacks, servomechanism, solenoids and
hydraulic cylinders.
1. PHYSICAL DEVICE- INTRODUCTION TO AUDUINO
Arduino is an open-source platform used for building electronics projects. Arduino
consists of both a physical programmable circuit board (often referred to as a microcontroller)
and a piece of software, or IDE (Integrated Development Environment) that runs on your
computer, used to write and upload computer code to the physical board. Accepts analog and
digital signals as input and gives desired output.

BOARD DETAILS:
ARDUIN0 UN0
 Power Supply:
Feature Value
 USB or power barrel jack
OperatingVoltage 5V
 Voltage Regulator
 LED Power Indicator
 Tx-Rx LED Indicator
 Output power,
 Ground
 Analog Input Pins
 Digital I/O Pin
SET UP:

 Power the board by connecting it to a PC via USB cable


 Launch the Arduino IDE
 Set the board type and the port for the board
 TOOLS -> BOARD -> select your board
 TOOLS -> PORT -> select your port
TYPES:

1. Arduino Uno (R3)

2. LilyPad Arduino

3. RedBoard

4. Arduino Mega (R3)

5. Arduino Leonardo
Fig. 1 Arduino Board

Power (USB / Barrel Jack):

Every Arduino board needs a way to be connected to a power source. The Arduino
UNO can be powered from a USB cable coming from your computer or a wall power supply
(like this) that is terminated in a barrel jack. In the picture above the USB connection is labeled
(1) and the barrel jack is labeled (2). The USB connection is also how you will load code onto
your Arduino board.
NOTE: Do NOT use a power supply greater than 20 Volts as you will overpower (and thereby
destroy) Arduino. The recommended voltage for most Arduino models is between 6 and 12
Volts.

Pins (5V, 3.3V, GND, Analog, Digital, PWM, AREF):

The pins on your Arduino are the places where you connect wires to construct a circuit
(probably in conjunction with a breadboard and some wire. They usually have black plastic
‘headers’ that allow you to just plug a wire right into the board. The Arduino has several
different kinds of pins, each of which is labeled on the board and used for different functions.

GND (3): Short for ‘Ground’. There are several GND pins on the Arduino, any of which can
be used to ground your circuit.

5V (4) & 3.3V (5): As you might guess, the 5V pin supplies 5 volts of power, and the 3.3V pin
supplies 3.3 volts of power. Most of the simple components used with the Arduino run happily
off of 5 or 3.3 volts.

Analog (6): The area of pins under the ‘Analog In’ label (A0 through A5 on the UNO) are
Analog In pins. These pins can read the signal from an analog sensor (like a temperature sensor)
and convert it into a digital value that we can read.

Digital (7): Across from the analog pins are the digital pins (0 through 13 on the UNO). These
pins can be used for both digital input (like telling if a button is pushed) and digital output (like
powering an LED).

PWM (8): You may have noticed the tilde (~) next to some of the digital pins (3, 5, 6, 9, 10,
and 11 on the UNO). These pins act as normal digital pins, but can also be used for something
called Pulse-Width Modulation (PWM). We have a tutorial on PWM, but for now, think of
these pins as being able to simulate analog output (like fading an LED in and out).
AREF (9): Stands for Analog Reference. Most of the time you can leave this pin alone. It is
sometimes used to set an external reference voltage (between 0 and 5 Volts) as the upper limit
for the analog input pins.

Reset Button

Just like the original Nintendo, the Arduino has a reset button (10). Pushing it will temporarily
connect the reset pin to ground and restart any code that is loaded on the Arduino. This can be
very useful if your code doesn’t repeat, but you want to test it multiple times. Unlike the original
Nintendo however, blowing on the Arduino doesn’t usually fix any problems.

Power LED Indicator

Just beneath and to the right of the word “UNO” on your circuit board, there’s a tiny LED next
to the word ‘ON’ (11). This LED should light up whenever you plug your Arduino into a power
source. If this light doesn’t turn on, there’s a good chance something is wrong. Time to re-
check your circuit!

TX RX LEDs

TX is short for transmit, RX is short for receive. These markings appear quite a bit in electronics
to indicate the pins responsible for serial communication. In our case, there are twoplaces on
the Arduino UNO where TX and RX appear – once by digital pins 0 and 1, and a second time
next to the TX and RX indicator LEDs (12). These LEDs will give us some nice visual
indications whenever our Arduino is receiving or transmitting data (like when we’re loading a
new program onto the board).

Main IC

The black thing with all the metal legs is an IC, or Integrated Circuit (13). Think of it as the
brains of our Arduino. The main IC on the Arduino is slightly different from board type to
board type, but is usually from the ATmega line of IC’s from the ATMEL company. This can
be important, as you may need to know the IC type (along with your board type) before loading
up a new program from the Arduino software. This information can usually be found in writing
on the top side of the IC. If you want to know more about the difference between various IC’s,
reading the datasheets is often a good idea.p

Voltage Regulator

The voltage regulator (14) is not actually something you can (or should) interact with on the
Arduino. But it is potentially useful to know that it is there and what it’s for. The voltage
regulator does exactly what it says – it controls the amount of voltage that is let into the Arduino
board. Think of it as a kind of gatekeeper; it will turn away an extra voltage that might harm
the circuit. Of course, it has its limits, so don’t hook up your Arduino to anything greater than
20 volts.

ARDINO IDE OVERVIEW:

Program coded in Arduino IDE is called a SKETCH

1. To create a new sketchFile -> New


To open an existing sketch File -> open ->
There are some basic ready-to-use sketches available in the EXAMPLES section
File -> Examples -> select any program
2. Verify: Checks the code for compilation errors
3. Upload: Uploads the final code to the controller board
4. New: Creates a new blank sketch with basic structure
5. Open: Opens an existing sketch
6. Save: Saves the current sketch

Fig. 2 Compilation and Execution


Serial Monitor: Opens the serial console
All the data printed to the console are displayed here

Fig. 3 Structure of SKETCH

A sketch can be divided into two parts:


Setup ()
Loop()
The function setup() is the point where the code starts, just like the main() function in C and
C++
I/O Variables, pin modes are initialized in the Setup() function Loop() function, as the
name suggests, iterates the specified task in the program

DATA TYPES:
Void ,Long, Int ,Char ,Boolean, Unsigned char ,Byte, Unsigned int, Word ,Unsigned long
,Float, Double, Array ,String-char array, String-object, Short

Arduino Function libraries


Input/Output Functions:
The arduino pins can be configured to act as input or output pins using the pinMode() function
Void setup ()
{
pinMode (pin , mode);
}
Pin- pin number on the Arduino board Mode- INPUT/OUTPUT
digitalWrite() : Writes a HIGH or LOW value to a digital pin
analogRead() : Reads from the analog input pin i.e., voltage applied across the pin
Character functions such as isdigit(), isalpha(), isalnum(), isxdigit(), islower(), isupper(),
isspace() return 1(true) or 0(false)

Delay() function is one of the most common time manipulation function used to provide a delay
of specified time. It accepts integer value (time in miliseconds)
EXAMPLE BLINKING LED:
Requirement:
Arduino controller board, USB connector, Bread board, LED, 1.4Kohm resistor, connecting
wires, Arduino IDE
Connect the LED to the Arduino using the Bread board and the connecting wires
Connect the Arduino board to the PC using the USB connector
Select the board type and port Write the sketch in the editor, verify and upload
Connect the positive terminal of the LED to digital pin 12 and the negative terminal to the
ground pin (GND) of Arduino Board

void setup()
{
pinMode(12, OUTPUT); // set the pin mode
} void loop()
{
digitalWrite(12, HIGH); //
Turn on the LED
delay(1000);
digitalWrite(12, LOW);
//Turn of the LED
delay(1000);
}

Set the pin mode as output which is connected


to the led, pin 12 in this case.Use digitalWrite()
function to set the output as HIGH and LOW
Delay() function is used to specify the delay between HIGH-LOW transition of
the output

Connect he board to the PC Set the port and board type Verify the code and
upload,Notice the TX – RX led in the board starts flashing as the code is
uploaded.

Sensors and Actuators

Sensor and actuators are critical components of embedded systems. These are utilized in
various real-world applications, including flight control systems in aircraft, process control
systems in nuclear reactors, and power plants that require automated control. Sensors and
actuators differ primarily in their purpose; the sensor is utilized to track environmental changes
using measurands, whereas the actuator is utilized when monitoring is combined with control,
such as controlling physical changes.

In this article, you will learn about the difference between Sensors and Actuators. But before
discussing the differences, you must know about Sensors and Actuators with their types and
features.

What are Sensors?

A sensor is a device that detects changes and events in a physical environment. It may convert
physical parameters like humidity, pressure, temperature, heat, motion, etc., into electrical
signals. This signal can be converted into a human-readable display and sent across a network
for additional processing. Active sensors and passive sensors are the two primary types of
sensors. Active sensors necessitate a power supply, whereas passive sensors don't require a
power supply.

There are various types of sensors available, including temperature, ultrasonic, pressure, and
location sensors, among others. They are utilized for detecting and measuring the relevant
quantities. A sensor works by sensing a quantity by utilizing a particular detecting device. Each
sensor operates on a distinct principle, such as an electromagnetic sensor, a resistive sensor, a
capacitor sensor, etc. In general, they sense the matching attribute in the environment and
convert it into a proportional magnitude electrical signal.

Some important sensors are as follows:

1. Biosensors

These biosensors utilize electrochemical technology. These sensors are used in medical, food,
and water testing devices. These biosensors also aid in analyzing proteins, cells, nucleic acid,
etc.

2. Accelerometers

These sensors utilize the Micro Electro Mechanical Sensor Technology. These sensors utilize
in patient monitoring, vehicle systems, etc.

3. Image Sensors

These sensors utilize the Complementary Metal Oxide Sensor mechanism. They detect and
transfer data that is utilized to make an image. These image sensors are very useful in consumer
surveillance and electronic systems.

4. Chemical Sensors

These sensors use ultrasonic, microwave, and radar technology, and they are used in security
systems, video games, and other applications.

Features of Sensors

There are various features of Sensors. Some main features of Sensors are as follows:

1. A sensor could be either active or passive. Active sensors necessitate a power source,
but passive doesn't necessitate a power source.
2. It is a device that monitors and measures changes in the environment.
3. It is responsible for converting physical quantities into electrical signals.
4. It is connected to a system's input.
5. It generates an electrical signal as its output.
What are Actuators?

A device that changes electrical signals into mechanical work is known as an actuator. It is
used to cause movement or a change in the surroundings. For instance, a fan is utilized to lower
the temperature, and a servo motor is utilized to change position, among other things.

Actuators are connected to a system's output. It receives an electrical signal as input and
produces mechanical movement as output. It receives input or instruction from a system or a
signal conditioning device and outputs it to the environment.

The actuator is dependent on the sensor data. The sensor sends data to a signal condition unit,
which analyzes the data or information and transmits commands to the actuator depending on
that data. A "temperature control system" is an instance of an actuator system in which a
temperature sensor manages the temperature. If the temperature surpasses a specific limit, the
device instructs the fan to increase its speed and decrease the temperature.

Types of Actuators

There are various types of actuators. Some of these are as follows:

1. Manual Actuator

This type of actuator is manually operated via gears, levers, and wheels, among other things.
They do not need a power source because they are powered by human action.

2. Spring Actuator

It has a loaded spring that is triggered and released to generate mechanical work. It may be
triggered in several ways.

3. Hydraulic Actuator

Hydraulic actuators generate pressure by compressing fluid in a cylinder, allowing mechanical


movement.

4. Electric Actuators

These actuators require power to function. It utilizes an electric motor to produce movement.
They are quick and effective.

Features of Actuators

There are various features of Actuators. Some main features of Actuators are as follows:

1. The actuator assists in managing the environment based on sensor readings.


2. A device that converts electrical signals into mechanical movement is known as an
actuator.
3. It requires an additional power source to function.
4. It receives an electrical signal as input.
5. It is connected to a system's output.
6. It produces mechanical work.

Key Differences between Sensors and Actuators

There are various key differences between Sensors and Actuators. Some main differences
between Sensors and Actuators are as follows:

1. A sensor is a device that detects changes or events in the environment and transmits
that data to other electronic devices. In contrast, an actuator is a machine component
that moves and controls mechanisms.
2. Electrical signals are generated via sensors. On the other hand, an actuator produces
energy in the form of heat or motion.
3. The sensor is placed at the input port to receive input. In contrast, the actuator is located
at the output port.
4. There is some example of sensors that utilize sensors, including Magnetometer,
cameras, microphones, etc. In contrast, actuators are employed in LEDs, loudspeakers,
motor controllers, lasers, etc.
5. Sensors are utilized to measure physical quantities. On the other hand, the actuator is
utilized to measure the discrete and continuous process parameters.
6. The sensor takes input from the environment. In contrast, the actuator receives input
from the system's output conditioning unit.

Head-to-head comparison between Sensors and Actuators

Here, you will learn the head-to-head comparisons between Sensors and Actuators. The main
differences between Sensors and Actuators are as follows:

Features Sensors Actuators

Definition It is a device that detects changes or IIt is a machine component that


events in the environment and moves and controls mechanisms.
transmits that data to another electronic
system.
Basic It converts the physical properties of IIt converts the system's electrical
their environment into electrical signals into various physical
signals for the system. characteristics for their
environments.

Type of Electrical signals are generated via IIt generates energy in the form of
Output sensors. heat or motion.

Source of It receives input from the environment. IIt receives input from the system's
Input output conditioning unit.

Placement These are placed at a system's input IThese are placed at a system's
port. output port.

Output It produces output for the input IIt produces output for their
Generation conditioning unit of a system. environment.

Examples Sensors include biosensors, motion IActuators include electric motors,


sensors, image sensors, and chemical comb drives, stepper motors, and
sensors. hydraulic cylinders.

Communication via Bluetooth with internet

Contemporary homes increasingly rely on smart technology, necessitating the need


to connect IoT device over internet. The Internet of Things (IoT) is essentially a
communication network that links all the appliances and devices in your home. Commercial
spaces also adopt IoT protocols for increased efficiency and productivity. If you’ve been
wondering how remote connect IoT over the internet works, read ahead for more detailed
information.
How Does the IoT Function?

The IoT connects the devices in a location and enables the exchange of regular information and
data. That’s how devices and humans can communicate freely, and you can relay instructions
and settings to the different home appliances.

This communication takes place over the Wi-Fi, wireless Bluetooth systems, and Ethernet
cables linking the devices directly to the router.

The most critical aspect of IoT is efficient and uninterrupted connectivity that defines how well
your end-to-end IoT functions. The Internet of Things communicates via hundreds of different
protocols or languages.

Several factors influence the protocol you’ll choose to connect IoT devices over internet.
Like, for instance:

 Estimated power input for running the entire network


 Types and number of devices linked to the IoT
 Location of the devices and distance from the hub
 Kind of communication relayed between the devices
 Installation and maintenance costs for the IoT
Which devices are used to connect IoT devices to home network?

Although the systems that connect IoT devices over the internet vary in structure, they
essentially have some basic components. You will need these software and hardware
to connect IoT devices over internet.

1. IoT device is the central hub of your home that connects to the internet and transmits
data. Some great examples include Google Home Voice Controller, Amazon
Echo, Apple HomeKit, and Samsung SmartThings.
2. Application protocols are the languages in which the devices communicate with one
another.
3. Communication devices include Wi-Fi, Bluetooth, and Ethernet cables.
4. The network server remains inside the cloud data center. This server accepts commands
and data and transmits it back to the internet.
5. Gateways are responsible for linking local device networks to the internet server by
converting the information into relevant protocols. Gateways process the information
to ensure that the devices understand the commands or messages you send.
6. Cloud applications work like a bridge or translator that processes IoT data into
information that humans can use.
7. In case you opt to use an Ethernet cable, you’ll need adequate lengths of wiring to
connect the various appliances.
8. The user interface is the application’s appearance on the mobile phone or any other
device like a tablet or laptop. This interface enables you to change settings according
to specifications. The app then relays the commands to the IoT appliances.

How to connect iot device over internet?

Using Wi-Fi Networks to Access IoT Device Over Internet

Wi-Fi networks are possibly the most popular ways to connect IoT devices over the internet.
Wi-Fi connectivity technology has the highest throughput and capacity compared to other
options.
Although Wi-Fis use more power than your average Bluetooth system, they are more reliable
and scalable. You can receive signals to your mobile devices and relay signals that penetrate
barriers like walls and objects.

Your Wi-Fi system’s range will depend on factors like the antenna, location, and power of
transmission. The typical range of a standard Wi-Fi is 50 meters, achievable with a
performance standard of 802.11b. If you need more extensive ranges like 90 meters, you’ll go
with the 802.11ac version.

Installing Wi-Fi Communication Systems

You’ll need two main pieces of hardware to get the Wi-Fi system running. For starters, you’ll
create the wireless local area network (LAN) by connecting to a home wireless network.
Next, you’ll need to ensure your hub has a WI-Fi-enabled chip with a micro-controller.

Micro-controllers function like mini computers and carry components like an input/output
(I/O), memory, and processor. Also, make sure that the hub has a compatible antenna that picks
up signals from your Wi-Fi network.

Homeowners can use their Wi-Fi systems to run a whole range of domestic appliances. Smart
home solutions include your Smart TV, HVAC and climate control systems, smart lighting,
voice-activated electronic devices, and cooking appliances.

You can also integrate smart fridges and water and power metering with the hub. Home security
devices are also compatible, and that’s how you use Wi-Fi to connect IoT devices over the
internet.

Using Satellite or Cellular Networks to Access the Internet

Cellular connectivity is possibly one of the cheapest and most efficient ways to connect IoT
devices over the internet. Cellular options are more effective since they connect to satellites
and use the nearest broadcast towers to communicate.

In IoT terms, cellular or satellite connectivity is called “Machine to Machine” communication.


Considering that these towers have a range of 10 to 15 miles, connecting with IoT devices is
much easier.

Unlike Wi-Fis, which have a limited range, cellulars function with your typical SIM or eSIM
card. In other words, you’ll relay commands to your appliances via your cell network. This
option to enable remote connect IoT over internet is very reliable and provides universal
compatibility.

Cellular connectivity does come with a couple of downsides. For one, this networking option
has a high power consumption rate and is not exactly cost-effective. Further, any commands
you send must route via satellites to reach your appliances.
Connecting to the Internet via Ethernet Cable to Remote Connect iot over Internet

Although using wireless methods to connect IoT device over internet seems convenient,
there are several downsides. For instance, Wi-Fi connections have a limited range, and when
you need to integrate multiple appliances, that’s a problem.

Further, you might need higher bandwidth and speeds that could weaken as the distance to the
appliances increases. A good way to get around the problem is to use Ethernet cables.

Should you opt to go with this option, you can expect great speeds thanks to the latest fiber
optic cable technology. Though, the standard DSL cables or standard phone lines are also
efficient. Your home appliances will communicate directly with the central hub via an Ethernet
cable.

This option assures you of reliability, and modern-day homes have a cable network running
through the walls. You can directly plug your appliances into the wall Ethernet jack and link it
to the home automation or IoT. That’s how you can access IoT device over the internet.

This information should give you an overview of the different options available to connect IoT
device over internet. Let’s answer a few of the most commonly asked questions users have.

 Google Wifi gives you whole home coverage.


 Parental controls let you manage screen time.
 Works with all Google Wifi points and can be added to any existing Nest Wifi system

Which mobile technology is applicable for IoT? Bluetooth!

Most smartphones today use Bluetooth technology for short-range communication. The more
advanced versions like Bluetooth Mesh and Bluetooth low energy (BLE) enable you to use
your smartphone or Android like a hub.

So, you might say that Bluetooth is the best mobile technology for IoT. Smartphones use the
“Bluetooth Terminal” app, though the “BT Voice Control for Android” is also compatible with
it. You’ll download and install the Bluetooth interface and send commands to your appliances
by configuring settings on the app.

If you choose to adopt the BT voice App, it receives your voice commands in human English.
Next, it converts the message into protocols and sends the message over to the configured
device. It will interest you to know that these protocols are in the form of numbers.

The app assigns each number to a different appliance and relates numeric commands like “On”
or “Off.” Modern-day Bluetooth consumes very little power, and users can use this
communication type to manage a range of personal devices.
Wearable health devices like smartwatches and health and fitness gadgets also enable remote
connect IoT over the internet. For instance, a pulse oximeter to measure the user’s oxygen
saturation in their blood. Or glucose meters to continuously measure blood sugar levels. Then,
there are wearable devices that relay a constant reading of the user’s blood pressure and heart
rate.

IOT Connections with Internet /Bluetooth/Modem

LPWA (Low-power wide-area networks)

Low power wide area networks typically utilise unlicensed radio technologies to enable
relatively low capacity over sites such as factories, campuses and mines. Most offer a cost-
effective, low power alternative to cellular connectivity, with the exception of NB-IoT, and are
well-suited for IoT applications that require modest throughput.

Key types of LPWA connectivity include:


Bluetooth
Bluetooth is a short-range wireless technology mainly used for exchanging data between
fixed and mobile devices over short distances using UHF radio waves in the ISM bands, from
2.402 GHz to 2.48 GHz, and building personal area networks. Its characteristics make it
suitable only for short distance deployments.
BLE
Bluetooth Low Energy
Bluetooth Low Energy is aimed at applications in healthcare, security, home entertainment
and wireless beacons. Independent of Bluetooth, BLE offers reduced power consumption
while maintaining the range of classic Bluetooth.
LoRaWAN
Low-power wide-area network
LoRaWAN is a networking protocol for connecting wireless battery operated devices to the
internet in regional, national or global networks. It addresses IoT requirements such as bi-
directional communication, end-to-end security, mobility and localisation services.
LoRaWAN baud rates range from 0.3 kbps to 50 kbps.
NB-IoT
Narrowband IoT
NB-IoT is a low power wide area (LPWA) technology developed to enable a wide range of
IoT devices and services. NB-IoT significantly improves the power consumption of user
devices, system capacity and spectrum efficiency, especially in deep coverage in contrast to
cellular networks. Battery life of more than 10 years can be supported for a wide range of use
cases. It provides a simpler, lower bandwidth alternative to cellular connectivity.
Sigfox
Sigfox is similar to LoRaWAN in that it is a technology designed for global roll-out to
provide wireless networks to connect low power objects such as smart meters. It has low
power characteristics and utilises the 900MHz band with networks in 72 countries, covering
5.8 million square kilometres, as of November 2020. Sigfox communication supports up to
140 uplink messages a day, which can carry a payload of 12 octets at a data rate of 100 bits
per second.
Wi-Fi
Wi-Fi is commonly used for local area networking of devices and for internet access. Well
known in home and small office networks, the technology is also utilised in enterprises to
connect devices and provide public internet access for mobile devices. Wi-Fi has a range of
20-150 metres and some versions can achieve speeds of more than 1Gbps.
With the recent Wi-Fi 6 standard, the technology has more to offer IoT. Wi-Fi 6 offers data
rates up to 10 Gbps with eight antennas and the technology can serve power-hungry devices
with large batteries, such as mobile phones, tablets, and laptops. By operating at 5 GHz, Wi-
Fi 6 avoids the highly congested 2.4 GHz frequency band and offers improved data
throughput, increased robustness and reduced power consumption in comparison to previous
Wi-Fi.
Zigbee
Zigbee is a communications protocol used to create personal area networks with small, low
power digital radios. Typical applications include home automation, medical device data
collection and other low power, low bandwidth use cases. The technology is limited to
transmission distances of 10-100 metres with a line of sight in order to keep power
consumption low. Zigbee has a defined data rate of 250Kbps and is suited for intermittent
data transmission.
The Things in IoT
Access point
A wireless network device that acts as a portal for devices to connect to a local area network.
Device
A device is a unit of physical hardware or equipment that provides one or more computing
functions within a system.
Beacons
Small transmitters that connect to Bluetooth and Bluetooth Low Energy (BLE)-enabled
devices such as smartphones or tracked packages.
Gateway
A “hub that translates” communication between two computers or devices that allows these
to understand each other´s data transfer and communication.
Hub
A hardware device that connects other data-transmitting devices to a central station.
Sensor
A device that measures a physical input from its environment and converts it into data that
can be interpreted by either a human or a machine.
The Physical World Meets the Digital
Actuator
A component that is responsible for moving and controlling a mechanism or system, such as
opening a valve.
Cyber-physical systems
Integrations of computation, networking and physical processes with feedback loops where
physical processes affect computations and vice versa.
Contactless
Describes technologies that allow a smart card, mobile phone or other device to connect
wirelessly – without contact – to an electronic reader, typically in order to make a payment.
Digital twins
A digital replica of physical assets, processes, people, places, systems and devices that can be
used for various purposes and integrates historical machine data into a digital model.
Geofencing
The use of GPS or RFID technology to create a virtual geographic boundary in which devices
can operate.
GIS
Geographic Information System
A system designed to capture, manipulate, analyze, manage and present spatial or geographic
data.
GPS
Global Positioning System
A technology created by the US Government that allows for location services.
GNSS
Global Navigation Satellite System
A constellation of satellites providing signals from space that transmit positioning and timing
data to GNSS receivers
Haptics
The science of applying tactile sensation and control to interaction with computer
applications.
HAV
Hardware-Assisted Virtualisation
The use of a computer’s physical components to support the software that creates and
manages virtual machines (VMs).
IMU
Inertial Measurement Unit
A device that measures and reports a body – such as a drone’s – specific force, angular rate,
and sometimes the magnetic field surrounding the body.
LIDAR
Light Detection and Ranging
A remote sensing technology which uses the pulse from a laser to collect measurements
which can then be used to create 3D models and maps of objects and environments.
Mechatronics
Engineering of both electrical and mechanical systems which includes a combination of
robotics, electronics, computing, telecoms, systems, control and product engineering.
RADAR
Radio Detection and Ranging
A detection system that uses radio waves to determine the range, angle, or velocity of objects.
Telematics
A method of monitoring an asset by using GPS and onboard diagnostics to record movements
on a computerised map.
Hardware & Software
eSIM
The embedded SIM (also called eSIM or eUICC) is a secure element designed to remotely
manage multiple mobile network operator subscriptions and be compliant with GSMA
specifications.
ICCID
Integrated Circuit Card Identifier
The unique serial number embedded on a SIM card.
IMSI
International Mobile Subscriber Identity
A unique number, usually fifteen digits, associated with identifying a GSM-connected device.
IoT module
A small electronic device embedded in objects, machines and things that connect to wireless
networks which sends and receives data.
IP Address
An Internet Protocol Address is a unique designating number assigned to a computer (or
other device) that is connected to a network, most notably the Internet
Modem
A hardware device that allows a computer to send and receive data over a telephone line or a
cable or satellite connection.
Router
A hardware device designed to receive, analyse and move incoming IP packets to another
network.
SOC
Subscriber Identity Module
A smart card that stores including identity, location, phone number, network authorisation
data and security keys that is installed into a wireless device.
Wireless modem
A modem that bypasses the telephone system and connects directly to a wireless network,
through which it can directly access the Internet connectivity.
UNIT III PROGRAMMING MICROPROCESSOR FOR IOT

Installation and Setting up of the Microprocessor board – Programming the


Microprocessor – Communication via Bluetooth and USB – Connection with
Internet via WIFI/Ethernet.

1. MICROPROCESSOR
Microprocessor is a controlling unit of a micro-computer, fabricated on a small chip capable of
performing ALU (Arithmetic Logical Unit) operations and communicating with the other devices
connected to it.

Microprocessor consists of an ALU, register array, and a control unit. ALU performs arithmetical
and logical operations on the data received from the memory or an input device. Register array
consists of registers identified by letters like B, C, D, E, H, L and accumulator. The control unit
controls the flow of data and instructions within the computer.

How does a Microprocessor Work?

The microprocessor follows a sequence: Fetch, Decode, and then Execute.

Initially, the instructions are stored in the memory in a sequential order. The microprocessor
fetches those instructions from the memory, then decodes it and executes those instructions till
STOP instruction is reached. Later, it sends the result in binary to the output port. Between these
processes, the register stores the temporarily data and ALU performs the computing functions.
Features of a Microprocessor

Here is a list of some of the most prominent features of any microprocessor −


• Cost-effective − The microprocessor chips are available at low prices and results its low
cost.
• Size − The microprocessor is of small size chip, hence is portable.
• Low Power Consumption − Microprocessors are manufactured by using metaloxide
semiconductor technology, which has low power consumption.
• Versatility − The microprocessors are versatile as we can use the same chip in a number
of applications by configuring the software program.
• Reliability − The failure rate of an IC in microprocessors is very low, hence it is reliable.

MICROPROCESSOR ARCHITECTURE

We have tried to depict the architecture of 8085 with this following image –
Microprocessor – Functional Units
8085 consists of the following functional units −
Accumulator
It is an 8-bit register used to perform arithmetic, logical, I/O & LOAD/STORE operations. It is
connected to internal data bus & ALU.
Arithmetic and logic unit
As the name suggests, it performs arithmetic and logical operations like Addition, Subtraction,
AND, OR, etc. on 8-bit data.
General purpose register
There are 6 general purpose registers in 8085 processor, i.e. B, C, D, E, H & L. Each register can
hold 8-bit data.
These registers can work in pair to hold 16-bit data and their pairing combination is like B-C, D-
E & H-L.
Program counter
It is a 16-bit register used to store the memory address location of the next instruction to be
executed. Microprocessor increments the program whenever an instruction is being executed, so
that the program counter points to the memory address of the next instruction that is going to be
executed.
Stack pointer
It is also a 16-bit register works like stack, which is always incremented/decremented by 2 during
push & pop operations.
Temporary register
It is an 8-bit register, which holds the temporary data of arithmetic and logical operations.
Flag register
It is an 8-bit register having five 1-bit flip-flops, which holds either 0 or 1 depending upon the
result stored in the accumulator.
These are the set of 5 flip-flops −

• Sign (S)
• Zero (Z)
• Auxiliary Carry (AC)
• Parity (P)
• Carry (C)
Its bit position is shown in the following table −

D7 D6 D5 D4 D3 D2 D1 D0

S Z AC P CY
Instruction register and decoder
It is an 8-bit register. When an instruction is fetched from memory then it is stored in the Instruction
register. Instruction decoder decodes the information present in the Instruction register.
Timing and control unit
It provides timing and control signal to the microprocessor to perform operations. Following are
the timing and control signals, which control external and internal circuits −

• Control Signals: READY, RD’, WR’, ALE


• Status Signals: S0, S1, IO/M’
• DMA Signals: HOLD, HLDA
• RESET Signals: RESET IN, RESET OUT

Interrupt control
As the name suggests it controls the interrupts during a process. When a microprocessor is
executing a main program and whenever an interrupt occurs, the microprocessor shifts the control
from the main program to process the incoming request. After the request is completed, the control
goes back to the main program.
There are 5 interrupt signals in 8085 microprocessor: INTR, RST 7.5, RST 6.5, RST 5.5, TRAP.
Serial Input/output control
It controls the serial data communication by using these two instructions: SID (Serial input data)
and SOD (Serial output data).
Address buffer and address-data buffer
The content stored in the stack pointer and program counter is loaded into the address buffer and
address-data buffer to communicate with the CPU. The memory and I/O chips are connected to
these buses; the CPU can exchange the desired data with the memory and I/O chips.
Address bus and data bus
Data bus carries the data to be stored. It is bidirectional, whereas address bus carries the location
to where it should be stored and it is unidirectional. It is used to transfer the data & Address I/O
devices.
2. TYPES OF MICROPROCESSOR:

Microprocessors can be classified in different categories, as follows:.


a) Based on Word Length
✓ First Generation (4 - bit Microprocessors)
✓ Second Generation (8 - bit Microprocessor)
✓ Third Generation (16 - bit Microprocessor)
✓ Fourth Generation (32 - bit Microprocessors)
✓ Fifth Generation (64 - bit Microprocessors)
b) Based in instruction set
✓ Reduced Instruction Set Computer (RISC)
✓ Complex Instruction Set Computer
c) Special Purpose Processors
✓ Vector processors
✓ Array Processors or SIMD Processors
✓ Digital Signal Processors (DSP)
✓ Symbolic Processors
✓ Graphic Processors

Based on instruction set(Scalar and Superscalar Processors

A processor that executes scalar data is called scalar processor.


A scalar processor may be RISC processor or CISC processor.
• Examples of CISC processors are:
• Intel 386, 486; Motorola's 68030, 68040; etc.
• Examples of RISC scalar processors are:
• Intel i860, Motorola MC8810, SUN's SPARC CY7C601, etc.
• A superscalar processor has multiple pipelines and executes more than one
instruction per clock cycle.
• Examples of superscalar processors are:
• Pentium, Pentium Pro, Pentium II, Pentium III, etc.
RISC PROCESSOR

RISC stands for Reduced Instruction Set Computer. It is designed to reduce the execution time
by simplifying the instruction set of the computer. Using RISC processors, each instruction
requires only one clock cycle to execute results in uniform execution time. This reduces the
efficiency as there are more lines of code, hence more RAM is needed to store the instructions.
The compiler also has to work more to convert high-level language instructions into machine code.

Some of the RISC processors are −

• Power PC: 601, 604, 615, 620


• DEC Alpha: 210642, 211066, 21068, 21164
• MIPS: TS (R10000) RISC Processor
• PA-RISC: HP 7100LC

Architecture of RISC
RISC microprocessor architecture uses highly-optimized set of instructions. It is used in portable
devices like Apple iPod due to its power efficiency.
Characteristics of RISC
The major characteristics of a RISC processor are as follows −
• It consists of simple instructions.
• It supports various data-type formats.
• It utilizes simple addressing modes and fixed length instructions for pipelining.
• It supports register to use in any context.
• One cycle execution time.
• “LOAD” and “STORE” instructions are used to access the memory location.
• It consists of larger number of registers.
• It consists of less number of transistors.

CISC PROCESSOR

CISC stands for Complex Instruction Set Computer. It is designed to minimize the number of
instructions per program, ignoring the number of cycles per instruction. The emphasis is on
building complex instructions directly into the hardware.
The compiler has to do very little work to translate a high-level language into assembly level
language/machine code because the length of the code is relatively short, so very little RAM is
required to store the instructions.
Some of the CISC Processors are −

• IBM 370/168
• VAX 11/780
• Intel 80486
Architecture of CISC
Its architecture is designed to decrease the memory cost because more storage is needed in larger
programs resulting in higher memory cost. To resolve this, the number of instructions per program
can be reduced by embedding the number of operations in a single instruction.
Characteristics of CISC
• Variety of addressing modes.
• Larger number of instructions.
• Variable length of instruction formats.
• Several cycles may be required to execute one instruction.
• Instruction-decoding logic is complex.
• One instruction is required to support multiple addressing modes.

Special Processors

These are the processors which are designed for some special purposes.

• Vector processors
• Array Processors or SIMD Processors
• Digital Signal Processors (DSP)
• Symbolic Processors
• Graphic Processors

Few of the special processors are briefly discussed –


Vector processors

• A vector processor is designed for vector computations.


• A vector is an array of operands of the same type. Consider the following vectors:
• Vector A (a1, a2, a3, ......., an)
• Vector B (b1, b2, b3,......., bn)
• Vector C = Vector A + Vector B = C(c1, c2, c3, .......,cn),
• where c1 = a1+ b1, c2 = a2 + b2, .....,Cn= an + bn.
• A vector processor adds all the elements of vector A and Vector B using a single vector
instruction with hardware approach.
• Examples of vector processors are:
• DEC's VAX 9000,
• IBM 390/VF,
• CRAY Research Y-MP family,
• Hitachi's S-810/20, etc.

Array Processors or SIMD Processors

• Array processors are also designed for vector computations.


• The difference between an array processor and a vector processor a vector processor
uses multiple vector pipelines
• whereas an array processor employs a number of processing elements to operate in parallel.
Digital Signal Processors (DSP)

• DSP microprocessors specifically designed to process signals.


• They receive some digitized signal information, perform some mathematical operations on
the information and give the result to an output device.
• They implement integration, differentiation, complex fast Fourier transform, etc. using
hardware.
• Examples of digital signal processors are:
• Texas instruments' TMS 320C25,
• Motorola 56000,
• National LM 32900,Fujitsu MBB 8764, etc.

Symbolic Processors

• Symbolic processors are designed for expert system, machine intelligence, knowledge
based system, pattern-recognition, text retrieval, etc.
• The basic operations which are performed for artificial intelligence are:
• Logic interference,
• compare, search,
• pattern matching, filtering, unification, retrieval, reasoning, etc.
• This type of processing does not require floating point operations.

Symbolic processors are also called LISP processors or PROLOG processors.

Graphics Processors

• Graphics Processors are specially designed processors for graphics.


• Intel has developed Intel 740-3D graphics chip.
• It is designed mostly for such heavy multimedia uses as games and movies.
• Examples of Graphic Processors are:
• Intel 82786 graphics coprocessor
• IBM's 8514/A,
• Texas Instruments' TMS34010 and TMS34020,
• Intel i860 and Intel i750, etc.

Coprocessor
A coprocessor is a specially designed microprocessor, which can handle its particular function
many times faster than the ordinary microprocessor.
For example − Math Coprocessor.
Some Intel math-coprocessors are −

• 8087-used with 8086


• 80287-used with 80286
• 80387-used with 80386
Input/Output Processor
It is a specially designed microprocessor having a local memory of its own, which is used to control
I/O devices with minimum CPU involvement.
For example −

• DMA (direct Memory Access) controller


• Keyboard/mouse controller
• Graphic display controller
• SCSI port controller

Transputer (Transistor Computer)


A transputer is a specially designed microprocessor with its own local memory and having links
to connect one transputer to another transputer for inter-processor communications. It was first
designed in 1980 by Inmos and is targeted to the utilization of VLSI technology.
A transputer can be used as a single processor system or can be connected to external links, which
reduces the construction cost and increases the performance.
For example − 16-bit T212, 32-bit T425, the floating point (T800, T805 & T9000) processors.

DSP (Digital Signal Processor)


This processor is specially designed to process the analog signals into a digital form. This is done
by sampling the voltage level at regular time intervals and converting the voltage at that instant
into a digital form. This process is performed by a circuit called an analogue to digital converter,
A to D converter or ADC.
A DSP contains the following components −
• Program Memory − It stores the programs that DSP will use to process data.
• Data Memory − It stores the information to be processed.
• Compute Engine − It performs the mathematical processing, accessing the program from
the program memory and the data from the data memory.
• Input/Output − It connects to the outside world.
Its applications are −

• Sound and music synthesis


• Audio and video compression
• Video signal processing
• 2D and 3d graphics acceleration.
For example − Texas Instrument’s TMS 320 series, e.g., TMS 320C40, TMS320C50.

3. PROGRAMMING THE MICROPROCESSOR THE


MICROPROCESSOR BOARD
✓ Microprocessors are programmable devices that can take input signals, perform
logic operations and provide output signals.
✓ Stand-alone microprocessors can provide a high level of control over simple
integrated circuits, motors, actuators and LEDs.
✓ once programmed, they can repeatedly perform the same task with precision and
accuracy, making them an integral part of mechatronic engineering design.
Select a Microprocessor
✓ select a microprocessor that has an internal oscillator;
✓ otherwise, the chip will require an external clock.
If you plan to input or output analog signals, get a microprocessor with a digital-to-
analog (A/D) converter and pulse-width modulation

HOW TO PROGRAM MICROPROCESSORS

• Microprocessors understand machine code, but they will require a higher level
programming language such as "C" or "Assembly" to write the program.
• An essential tool for programming a microprocessor is an Integrated Development
Environment (IDE).
• This is software that is developed by the creators of the microprocessors which will
compile the code into a language the machine can understand.

STEPS
Step1: set up the IDE TOOL
Step2 : Write the program
Step3: test the program using the IDE simulation package.
(Debugging the code through the simulation software )
Step 4: This device connects to your serial port and has a socket that
fits up to 60-pin microprocessors.
Step5: Then you can embed your program onto your microprocessor.

Sample microprocessor program

• The first number 84 is placed in the memory location 2501 .


• The second number 99 is placed in the memory location 2502.
• The result is stored in the memory location 2503 .
LXI H, 2501 : "Address of first number in H-L pair"
MOV A, M : "1stt number in accumulator"
INX H : "Address of 2nd number in H-L pair"
CMP M : "compare 2nd number with 1st number"
JC AHEAD : "Yes, smaller number is in accumulator. Go to AHEAD"
MOV A, M : "No, get 2nd number in the accumulator"
STA 2503 : "Store smaller number in 2503"
HLT : "Stop"

UNIT IV IOT IN CLOUD AND SECURITY

Internet of Things (IoT) as Interconnection of Threats (IoT) – Privacy Preservation


for IoT used in Smart Buildings – Preventing Unauthorized Access to Sensor Data –
Authentication in IoT – Security Protocols for IoT Access Networks – Cloud and IoT
– Drivers for Integration – Cloud Platforms – Applications.

1.Preventing Unauthorized Access to Sensor Data

1.1 Unauthorized Access: Prevention Best Practices


Unauthorized access is when a person gains entry to a computer network, system,
application software, data, or other resources without permission. Any access to an information
system or network that violates the owner or operator’s stated security policy is
considered unauthorized access. Unauthorized access is also when legitimate users access a
resource that they do not have permission to use.

The three primary objectives of preventing unauthorized access are:

• Confidentiality—the protection of sensitive information from unauthorized access

• Integrity—the protection of sensitive information from unauthorized modification


or destruction

• Availability—the protection of sensitive information and information systems from


unauthorized disruption.
1.2How Unauthorized Access Occurs
Many common tactics fall into two broad categories: digital and physical.

1.2.1Digital Unauthorized Access Tactics


1.Guessing passwords
Guessing passwords is a common entry vector for unauthorized access. Manual password
guessing is done using social engineering, phishing, or by researching a person to come up with
information that could be the password.
In scaled attacks, software is used to automate the guessing of access information, such as
user names, passwords, and personal identification numbers (PIN).

2.Exploitingsoftwarevulnerabilities
A mistake in software is referred to as a bug. In most cases, these bugs are annoying, but
harmless. However, some bugs are significant vulnerabilities that can be exploited to gain
unauthorized access into applications, networks, operating systems, or hardware. These
vulnerability exploits are commonly executed with software or code that can take control of
systems and steal data.
3.Socialengineering
Cybercriminals often gain unauthorized access by taking advantage of human
vulnerabilities, convincing people to hand over credentials or sensitive data. These attacks, known
as social engineering, often involve some form of psychological manipulation and utilize malicious
links in email, pop-ups on websites, or text messages. Common social engineering tactics used to
gain unauthorized access include phishing, smishing, spear phishing, ransomware,
and impersonation.
1.2.2 Physical Unauthorized Access Tactics

Cybercriminals often gain unauthorized access to physical spaces to carry out their plans.
Some opt to steal laptops or smart devices, then break into them offsite. Others target computers
or routers to insert malware.

1. Tailgating or piggybacking
Tailgating is a tactic used to gain physical access to resources by following an authorized
person into a secure building, area, or room. The perpetrator can be disguised as a delivery or
repair person, someone struggling with an oversized package who may require assistance, or
someone who looks and acts as if they belong there. Most of these situations occur "in plain
sight."

2.Fraudulentuseofaccesscards
Access cards that are lost, stolen, copied or shared pose an unauthorized access risk.

3.Doorpropping
While incredibly simple, propping open a door or window is one of the most effective ways
for an insider to help a perpetrator gain unauthorized access to restricted buildings or spaces.

1.2.3Other Unauthorized Access Tactics


1.Collusion
A malicious insider can collude with an outsider to provide unauthorized access to
physical spaces or digital access to systems. Often, an insider comes up with a plan, then brings in
an outsider to help. A more sophisticated third party can help override internal controls and bypass
security measures.

2.Passbacks
Passbacks are instances of sharing credentials or access cards to gain unauthorized access
to physical places or digital systems.

1.3 Best Practices for Preventing Unauthorized Access


1.Electronic Data Protection

• Monitoring should be in place to flag suspicious attempts to access sensitive information.

• Inventory of the devices on the network should be performed regularly to maintain


comprehensive, up-to-date maps.

• Encryption should be used for viewing, exchanging, and storing sensitive information.
• Network drives should be used to store sensitive information to protect it from unauthorized
access and for disaster recovery.

• Mobile devices and personal computing devices should not be used for storing sensitive
information.

• Removable media and devices should not be used to store sensitive information.

• Access to systems and data should be limited on a need to use basis, also known as the
principle of least privilege.

• Suspected security breaches should be reported immediately.

2.Backup and Disposal of Data

• Data should be backed up and stored according to data governance policies.

• Sensitive data backed up to cloud storage providers should be encrypted.

• Backups should be conducted on a regular basis.

• Data that is no longer needed should be permanently deleted.

• Professional computer recycling programs should be used for decommissioned computers


and devices, with all data removed prior to the recycling process.

• Cross shedders should be used to dispose of paper documents.

3.Password Management and Protection

Organizational leaders should ensure strong password policies and effective compliance programs
are in place to prevent unauthorized access, as well as follow these guidelines themselves.

• Unique passwords should be used for each online account.

• Passwords should be changed for any account or device that has experienced an unauthorized
access incident.

• Strong passwords should be used that include a combination of letters, numbers, and
symbols. A password should not be a word, common phrase, or one that someone with a little
personal knowledge might guess, such as the user’s child’s name, address, or phone number.

• Passwords should never be shared.

• Passwords should be changed periodically.

• Passwords should not be written down or stored in an unsecure location.

4.System and Device Protection


• Multifactor authentication should be used for all systems.

• Malware scans should be regularly run on all systems.

• Computers, laptops, and smart devices should have the lock screen enabled, and should be
shut down when not in use for extended periods.

• Single sign-on (SSO) should be considered to centrally manage users’ access to systems,
applications, and networks.

• Operating systems and applications should be updated when patches and new versions are
available.

• Anti-virus, anti-malware, and anti-ransomware software should be installed on all computers,


laptops, and smart devices.

5.Electronic Communications Protection—Email, Instant Messaging, Text Messaging, and


Social Media

• Sensitive data should only be encrypted or sent as a password-protected file.

• Attachments or links from untrusted sources should not be opened.

• Caution should be taken to avoid phishing scams.

Unauthorized Access Incident Response

• Timing is of the essence in the event of an unauthorized access incident. Prior planning
and having a team ready to respond is critical.

• The National Institute of Standards and Technology offers four steps for incident response
handling:


The Incident Response Lifecycle illustrates the steps involved to recover from an
unauthorized access incident.
2. IoT and Cloud Computing
Internet of Things
Internet of Things (IoT) refers to a system of connected physical objects via the
internet. The ‘thing’ in IoT can refer to a person or any device which is assigned through
an IP address. A ‘thing’ collects and transfers data over the internet without any manual
intervention with the help of embedded technology. It helps them to interact with the
external environment or internal states to take the decisions.
Cloud Computing
Cloud Computing offers services to users on a pay-as-you-go model. Cloud
providers offer three primary services.

The Relationship between Internet of Things and Cloud Computing


The internet of things has evolved the new concept of the Internet network. This
enables communication between several objects which include
• Smart devices
• Mobile devices
• Sensors and others.
The architecture of the Internet of Things provides effective communication
between all elements of architecture. The elements could be
• Objects
• Gates
• Network infrastructure and Cloud infrastructure
There are multiple benefits of using IoT and cloud computing together:
• In a cloud infrastructure, you can deploy applications to process and analyze
data quickly and make decisions as soon as possible.
• It is estimated that almost 4.4 trillion GB data is going to generate by the year
2020. This is no doubt that it will put a massive strain on its infrastructure.
Hence, there is a need to minimize this huge pressure and find a solution to
transfer the data. Cloud computing, on the other hand, provides adequate
performance and scalability to store and operate such a huge volume of data.
• IoT and cloud computing has a complementary relationship. While IoT
generates large amounts of data, many cloud providers allow data transfer via
the internet, that means facilitates a way to navigate the data.
• Cloud computing helps to collaborate in IoT development. Using Cloud
platform, IoT developers can store the data remotely and access easily.
• Cloud computing helps to advance analytics and monitoring of IoT devices.
• IoT devices which utilize common APIs and back-end infrastructure can receive
important security updates instantly through Cloud as soon as any security
breach happens in the infrastructure. This IoT and Cloud computing combined
feature is a vital parameter for user security and privacy.

Benefits And Functions of IoT Cloud:

There are many benefits of combining these services –


1. IoT Cloud Computing provides many connectivity options, implying large network access.
People use a wide range of devices to gain access to cloud computing resources: mobile
devices, tablets, laptops. This is convenient for users but creates the problem of the need
for network access points.
2. Developers can use IoT cloud computing on-demand. In other words, it is a web service
accessed without special permission or any help. The only requirement is Internet access.
3. Based on the request, users can scale the service according to their needs. Fast and flexible
means you can expand storage space, edit software settings, and work with the number of
users. Due to this characteristic, it is possible to provide deep computing power and storage.
4. Cloud Computing implies the pooling of resources. It influences increased collaboration
and builds close connections between users.
5. As the number of IoT devices and automation in use grows, security concerns emerge.
Cloud solutions provide companies with reliable authentication and encryption protocols.
6. Finally, IoT cloud computing is convenient because you get exactly as much from the
service as you pay. This means that costs vary depending on use: the provider measures
your usage statistics. A growing network of objects with IP addresses is needed to connect
to the Internet and exchange data between the components of the network.
Comparison of Internet of Things and Cloud Computing:

Cloud is a centralized system helping to transfer and deliver data and files to data
centers over the Internet. A variety of data and programs are easy to access from a centralized
cloud system. The Internet of Things refers to devices connected to the Internet. In the IoT, data
is stored in real-time, as well as historical data. The IoT can analyze and instruct devices to
make effective decisions, as well as track how certain actions function.
Cloud computing encompasses the delivery of data to data centers over the Internet.
IBM divides cloud computing into six different categories:

1. Platform as a Service (PaaS) –


The cloud contains everything you need to build and deliver cloud applications so there is
no need to maintain and buy equipment, software, etc.
2. Software as a Service (SaaS) –
In this case, applications run in the cloud and other companies operate devices that
connect to users’ computers through a web browser.
3. Infrastructure as a Service (IaaS) –
IaaS is an option providing companies with storage, servers, networks and hubs
processing data for each use.
4. Public cloud –
Companies manage spaces and provide users with quick access through the public
network.
5. Private cloud –
The same as a public cloud, but only one person has access here, which can be an
organization, an individual company, or a user.
6. Hybrid cloud –
Based on a private cloud, but provides access to a public cloud.

The Role of Cloud Computing on the Internet of Things:

Cloud computing works to improve the efficiency of daily tasks in conjunction with the
Internet of Things. Cloud computing is about providing a path for data to reach its destination
while the Internet of Things generates a huge amount of data.
According to Amazon Web Services, there are four benefits of cloud computing:
1. No need to pre-guess infrastructure capacity needs
2. Saves money, because you only need to pay for those resources that you use, the larger the
scale, the more savings
3. In a few minutes, platforms can be deployed around the world
4. Flexibility and speed in providing resources to developers
Thus, the role of cloud computing in IoT is to work together to store IoT data, providing
easy access when needed. It’s important to note that cloud computing is an easy way to move
large data packets across the Internet generated by the IoT.

The three main components of the cloud listed below will revolutionize the Internet of Things:-
1. Computing power
2. Reliability
3. Connectivity

Integration of Cloud Computing into IoT


The huge amounts of data generated from IoT devices coupled with many transactions
they perform cause a significant strain on the internet resources and this lead to the integration
with cloud computing. In reality, cloud computing and IoT are tightly coupled. The growth and
development of IoT and related technologies are mainly dependent on the availability of cloud
services.
There are many Cloud computing platforms now days like Amazon
AWS, ThingSpeak, Adafruit IO, Google firebase, IBM Watson, etc.

Cloud computing offers a wide range of services to IoT such as data storage, processing, and analysing.
Cloud computing also allows IoT device users to carry out common computing tasks using services
that are entirely provided over the internet.

Integrating IoT and cloud computing, especially in an enterprise environment, is very cost-
effective. The enterprise does not have to own all the devices, platforms and services but can hire from
the cloud service providers.

The mobile IoT devices such as smartwatches collect data at different locations and may need
to access these data at any time. The cloud enables the devices to store data and access it from any
location.

Roles of Cloud computing in IoT


1. Provides Remote Services
2. Allow Scalability
3. Provide Security
4. Allow Collaboration

Issues in using the cloud for IoT


1. Latency
2. Ownership of Data
3. Potential Crashes
3. CLOUD PLATFORM
The operating system and hardware of a server in an Internet-based data centre are referred
to as a cloud platform.

Types of Cloud Platforms


Cloud systems come in a range of shapes and sizes. None of them are suitable for all. To
meet the varying needs of consumers, a range of models, forms, and services are available. They
are as follows:

o Public Cloud: Third-party providers that distribute computing services over the Internet
are known as public cloud platforms. A few good examples of trending and mostly used
cloud platform are Google Cloud Platform, AWS (Amazon Web Services), Microsoft
Azure, Alibaba and IBM Bluemix.

o Private Cloud: A private cloud is normally hosted by a third-party service provider or in


an on-site data centre. A private cloud platform is always dedicated to a single company
and it is the key difference between the public and private cloud.
Or we can say that a private cloud is a series of cloud computing services used primarily
by one corporation or organization.

o Hybrid Cloud: The type of cloud architecture that combines both the public and private
cloud systems is termed to as a Hybrid cloud platform. Data and programs are easily
migrated from one to the other. This allows the company to be more flexible while still
improving infrastructure, security, and enforcement.

Organizations can use a cloud platform to develop cloud-native software, test and build them,
and store, back up, and recover data. The major role of it is that will not only help the company to
grow but also it helps to perform the data analysis with the help of different algorithms and the
results can be a true deal breaker. Streaming video and audio, embedding information into
activities, and providing applications on-demand on a global scale are all possibilities.

Simply stated, cloud computing is the distribution of computing services over the Internet
("the cloud") in order to provide quicker innovation, more versatile resources, and economies of
scale.

We usually only pay for the cloud services that we use, which helps us to cut costs, operate
our infrastructure more effectively, and scale as our company grows.
Amazon Web Services (AWS) –

AWS provides different wide-ranging clouds IaaS services, which ranges from virtual
compute, storage, and networking to complete computing stacks. AWS is well known for its
storage and compute on demand services, named as Elastic Compute Cloud (EC2) and Simple
Storage Service (S3). EC2 offers customizable virtual hardware to the end user which can be
utilize as the base infrastructure for deploying computing systems on the cloud.

It is likely to choose from a large variety of virtual hardware configurations including


GPU and cluster instances. Either the AWS console, which is a wide-ranged Web portal for
retrieving AWS services, or the web services API available for several programming language
is used to deploy the EC2 instances. EC2 also offers the capability of saving an explicit running
instance as image, thus allowing users to create their own templates for deploying system. S3
stores these templates and delivers persistent storage on demand.
S3 is well ordered into buckets which contains objects that are stored in binary form and
can be grow with attributes. End users can store objects of any size, from basic file to full disk
images and have them retrieval from anywhere. In addition, EC2 and S3, a wide range of
services can be leveraged to build virtual computing system including: networking support,
caching system, DNS, database support, and others.

Google AppEngine –

Google AppEngine is a scalable runtime environment frequently dedicated to executing


web applications. These utilize benefits of the large computing infrastructure of Google to
dynamically scale as per the demand. AppEngine offers both a secure execution environment
and a collection of which simplifies the development if scalable and high-performance Web
applications. These services include: in-memory caching, scalable data store, job queues,
messaging, and corn tasks.
Developers and Engineers can build and test applications on their own systems by using
the AppEngine SDK, which replicates the production runtime environment, and helps test and
profile applications. On completion of development, Developers can easily move their
applications to AppEngine, set quotas to containing the cost generated, and make it available to
the world. Currently, the supported programming languages are Python, Java, and Go.
Microsoft Azure –

Microsoft Azure is a Cloud operating system and a platform in which user can develop the
applications in the cloud. Generally, a scalable runtime environment for web applications and
distributed applications is provided. Application in Azure are organized around the fact of roles,
which identify a distribution unit for applications and express the application’s logic. Azure
provides a set of additional services that complement application execution such as support for
storage, networking, caching, content delivery, and others.

Hadoop –
Apache Hadoop is an open source framework that is appropriate for processing large
data sets on commodity hardware. Hadoop is an implementation of MapReduce, an application
programming model which is developed by Google. This model provides two fundamental
operations for data processing: map and reduce.
Yahoo! Is the sponsor of the Apache Hadoop project, and has put considerable effort in
transforming the project to an enterprise-ready cloud computing platform for data processing.
Hadoop is an integral part of the Yahoo! Cloud infrastructure and it supports many business
processes of the corporates. Currently, Yahoo! Manges the world’s largest Hadoop cluster,
which is also available to academic institutions.
Force.com and Salesforce.com –

Force.com is a Cloud computing platform at which user can develop social enterprise
applications. The platform is the basis of SalesForce.com – a Software-as-a-Service solution
for customer relationship management. Force.com allows creating applications by composing
ready-to-use blocks: a complete set of components supporting all the activities of an enterprise
are available.
From the design of the data layout to the definition of business rules and user interface
is provided by Force.com as a support. This platform is completely hostel in the Cloud, and
provides complete access to its functionalities, and those implemented in the hosted applications
through Web services technologies.

4. Applications of Cloud Computing


Cloud service providers provide various applications in the field of art, business, data storage
and backup services, education, entertainment, management, social networking, etc.
1. Online Data Storage
Cloud Computing allows storage and access to data like files, images, audio, and videos
on the cloud storage. In this age of big data, storing huge volumes of business data locally requires
more and more space and escalating costs. This is where cloud storage comes into play, where
businesses can store and access data using multiple devices. The interface provided is easy to use,
convenient, and has the benefits of high speed, scalability, and integrated security.

2. Backup and Recovery


Cloud service providers offer safe storage and backup facility for data and resources on
the cloud. In a traditional computing system, data backup is a complex problem, and often, in case
of a disaster, data can be permanently lost. But with cloud computing, data can be easily recovered
with minimal damage in case of a disaster.
3. Big Data Analysis
One of the most important applications of cloud computing is its role in extensive data
analysis. The extremely large volume of big data makes it impossible to store using traditional data
management systems. Due to the unlimited storage capacity of the cloud, businesses can now store
and analyze big data to gain valuable business insights.
4. Testing and Development
Cloud computing applications provide the easiest approach for testing and development
of products. In traditional methods, such an environment would be time-consuming, expensive due
to the setting up of IT resources and infrastructure, and needed manpower. However, with cloud
computing, businesses get scalable and flexible cloud services, which they can use for product
development, testing, and deployment.
5. Antivirus Applications

With Cloud Computing comes cloud antivirus software which is stored in the cloud
from where they monitor viruses and malware in the organization’s system and fixes them. Earlier,
organizations had to install antivirus software within their system and detect security threats.

6. E-commerce Application

Ecommerce applications in the cloud enable users and e-businesses to respond quickly
to emerging opportunities. It offers a new approach to business leaders to make things done with
minimum amount and minimal time. They use cloud environments to manage customer data,
product data, and other operational systems.

7. Cloud Computing in Education

E-learning, online distance learning programs, and student information portals are some
of the key changes brought about by applications of cloud computing in the education sector. In
this new learning environment, there’s an attractive environment for learning, teaching,
experimenting provided to students, teachers, and researchers so they can connect to the cloud of
their establishment and access data and information.
UNIT V
IOT ANALYTICS AND PLATFORMS
IOT Analytics: Role of Analytics in IOT – Data visualization Techniques –
Introduction to R Programming – Statistical Methods – IoT Platforms –
Future Trends of IoT.

1. IOT Analytics: Role of Analytics in IOT

Introduction
IoT devices are connected to the internet, producing large amounts of
heterogeneous data. This data, also known as big data, is generated by multiple
machines and devices that exchange information. Once these data are stored in a
database, they can be analyzed by advanced analytic tools. These tools are highly
efficient and can be used to analyze IoT-related big data. This can provide detailed
descriptions of the examined data.

IoT devices generate huge amounts of data


This data must be managed and analyzed by organizations to understand its
meaning. By using data analytics tools, organizations can effectively analyze real-
time data. Moreover, because of the large amount of data generated by IoT
devices, there may be significant differences in the data structures. Data analytics
tools are crucial to analyze these varying data sets in such a case.

DATA ANALYTICS

• Data analytics is the science of analyzing raw data to make conclusions


about that information.

• Many of the techniques and processes of data analytics have been automated
into mechanical processes and algorithms that work over raw data for human
consumption.”
• Data analytics is examined as a procedure to examine small and big data sets
with different properties to extract conclusions from the data sets. These
conclusions are in the form of statistics and patterns that help businesses to
make effective decisions. It plays a major role in the success of IoT
applications along with investments.

• Data Analytics is a method of collecting both quantitative and qualitative

data about a digital property to extract meaningful conclusions from these

data sets. These conclusions usually in the form of statistics, dashboards,

trends & patterns that help organizations in effective decision-making

processes.

• Data Analytics has a significant role to play in the growth and success of IoT

applications and investments. Analytics tools will allow the business units to

make effective use of their data sets.


How do you collect and process analog information from IoT
devices, to transform into useful Business Intelligence?

The kind of information we get from the Internet of Things (IoT) devices is

analog and we need a way to capture that analog information. And then

locate it to the place from where we can access the data at any time with help

analytics tools. The IoT devices & it’s applications have the potential to

generate a lot of data that might challenge traditional data infrastructure.

Three primary components of the Internet of Things (IoT)


• Device – The Physical object located in the real world.

• Gateway – It is responsible for collecting data from devices & relaying it.

• Cloud – The nervous system of a business or application, where this IoT data

can be combined with other non – IoT.


Analytics tools will allow the businesses to make effective use of
their data as explained below:
• Data Volume : There are huge amount of data that IoT devices make use of.
The organizations need to manage these large volumes of data and need to

analyze the same for extracting relevant information. These data sets along

with real-time data can be analyzed easily and efficiently with data analytics

tools.
• Data Structure : IoT applications involve data that may have a variable
structure. There may also be a significant difference in data formats and

types. Data analytics will allow the business executive to analyze all of these

varying sets of data using automated tools.


• Driving Revenue: The use of data analytics in IoT investments will allow
the business units to gain insight into customer preferences and choices. This

would lead to the development of services and offers as per the customer

demands and expectations.


• Competitive Edge: IoT is a buzzword in the current era of technology and
there are numerous IoT application developers and providers present in the

market. The use of data analytics in IoT will provide a business unit to offer

better services and will, therefore, provide the ability to gain a competitive

edge in the market.

Benefits of IoT analytics


 Data analytics in IoT can benefit organizations in several ways.
 Taking advantage of the data can improve decision-making, optimization,
supervisory control, and environmental compliance.
 While these technologies can bring enormous benefits to organizations,
many are unsure how to use them.
 Data must be analyzed to provide meaningful information to end-users.
 To leverage IoT data effectively, businesses must adopt a streamlined
approach to analyzing the information.
The role of Data Analytics in the IoT
It can significantly impact the success of an IoT application. The role of
Data Analysis in IoT is vital for companies looking to leverage the benefits of the
IoT. With this technology, businesses can make better-informed decisions and
make better-informed business decisions.

 Helps companies in improving customer experiences


By collecting data from the IoT, companies can better understand the needs
and preferences of their customers. Using predictive and prescriptive analytics,
they can schedule downtimes and determine whether or not a product will be
profitable. Ultimately, IoT data analytics can lead to more effective operations and
reduced costs.

 Assist companies to make better decisions


The role of data analytics in IoT can help companies make better decisions
based on the data they collect. By gathering and analyzing real-time data from IoT
devices, companies can improve customer experiences. The ability to predict
future needs and respond quickly to changing circumstances positively impacts
businesses. IoT analytics has the potential to transform the business landscape for
many industries. They can also improve customer experience.

 Predicts customers’ behavior


IoT analytics can help organizations predict future customer behaviour,
preferences and new services. IoT analytics can also help organizations improve
their production efficiency.
There are various kinds of data analytics that can be applied in IoT
investments to reap benefits. These are some of them:

Streaming Analytics:

This kind of data analytics is known as event streaming processing and examines
big data-sets. Real-time data assets are analyzed to detect urgent situations. IoT
applications on the lines of financial transactions, air fleet tracking, and traffic
analysis can gain from this method.

Spatial Analytics:

This is used to examine geographic patterns to understand spatial relationships


between physical objects. In fact, location built IoT applications like smart parking
applications can gain from this kind of data analytics.

Time Series Analytics:

 This type of data analytics is built upon time-based data which is examined
to expose trends.
 IoT applications, such as weather prediction and health monitoring systems
can gain a lot.

Prescriptive Analysis:

 It is a combination of predictive analytics and descriptive. It is used to


comprehend the ideal steps to be taken in a certain manner.
 Interestingly, commercial IoT applications can use this type of data analytics
to make worthy conclusions.
 At the same time, with profound changes in the advancement of technology,
there are certain areas in which data analytics can be used in IoT. For
example, actionable marketing can be done by using data analytics in the
product usage.

 Healthcare is one of the prime sectors of every country and the utilization of
data analytics in IoT based healthcare applications can provide
breakthroughs in this area. The reduction of the healthcare costs,
enhancement of telehealth monitoring, and remote health services, increased
diagnosis and treatment can be achieved using the same.
Big Data Tools for Data Analysis
1. Tableau
The primary objective of Tableau is to focus on business intelligence. It is the best
efficient data visualization tool.
In tableau, users do not have to write a program in order to create maps, charts, etc.
For live data in the visualization, tableau explored the web connector to connect
the database or API.

Features of Tableau :
 Tableau provides a central location to delete, manage schedules and tag, and
change permissions.
 It does not require complicated software setup.
 In this real-time collaboration is available.
 Without any integration cost, it can blend various datasets like relational
datasets, structured datasets, etc.
2. Cloudera Distribution for hadoop
If you are searching for a highly secure Big data platform, then Cloudera is the best
option for your project. It is the fastest, modern and most accessible platform.
Using this cloudera hadoop, you will easily get any data across any environment
within a single and scalable platform.

Features of Cloudera Hadoop:


 Provides real-time insights for monitoring and detection.
 Delivers an enterprise-grade and hybrid cloud solution.
 Develops and trains the data model.
 Spins up and terminates clusters, and only pays for what is needed.
3. Teradata
Teradata is a tool used for developing large scale data warehousing applications. It
is a well known relational database management system.

It generally offers end to end solutions for data warehousing. Its development is
based on the MPP (Massively Parallel Processing Architecture ).

Features of Teradata :
 Teradata can connect network-attached systems or mainframes.
 Its significant components are a node, parsing engine, the message passing
layer, and the access module processor (AMP).
 It is highly scalable.
 It supports industry-standard SQL in order to interact with the data.
4. R – Programming
R Programming language is used for statistical computing, graphics and for big
data analysis. It provides a wide variety of statistical tests.

Features of R programming tool:


 R programming tools provide an effective data handling and storage facility.
 It provides a coherent and integrated collection of big data tools for data
analysis.
 It also provides graphical facilities for data analysis which display either on-
screen or on hardcopy.
5. Spark
Apache Spark is one of the most powerful open-source big data analytics tools. It
is used by many organizations to process large datasets. It offers high-level
operators that make it easy to build parallel apps.

Features of Spark:
 It offers Fast Processing
 Has the ability to integrate with Hadoop and existing Hadoop Data
 Using Spark an application can be run in a Hadoop cluster, up to 100 times
faster in memory, and ten times faster on disk.
6. Lumify
Lumify is a platform that involves big data fusion, analysis, and visualization. It is
a free and open source tool for analytics.

It supports the cloud-based environment and also works well with Amazon’s
AWS.
Features of Lumify:
 Lumify’s primary features include the full-text search, 2D and 3D graph
visualizations, link analysis between graph entities, automatic layout,
integration with mapping systems, geospatial layouts, multimedia analysis,
real-time collaboration through a set of projects or workspaces.
 It is usually built on proven, scalable big data technologies.
 It is secure, scalable, and supported by a dedicated full-time development
team.
7. Talend
Talend simplifies and automates big data integration. Its graphical wizard
generates native code. It also allows big data integration, check data quality, and
master data management.

Features of Talend:
 Talend Big Data Platform generates native code which simplifies using
MapReduce and Spark.
 It accelerates time to value for big data projects.
 It also simplifies ETL & ELT for big data.
8. Microsoft HDInsight
Azure HDInsight is a Spark and Hadoop service in the cloud. Standard and
Premium are the two data cloud offerings provided by Azure HDInsight.

For running the Big data workloads of the organization it also provides an
enterprise-scale cluster.

Features of HDInsight:
 Offers enterprise-grade security and monitoring.
 Protects data assets and extends on-premises security and governance controls
to the cloud.
 Provides a high-productivity platform for developers and scientists.
9. Skytree
Skytree is a big data analytics tool that helps data scientists to build more accurate
models faster. It also offers accurate predictive machine learning models that are
easy to use.

Features of Skytree:
 Helps to develop Highly Scalable Algorithms.
 Allows data scientists to visualize and understand the logic behind Machine
Learning decisions.
 Solves robust predictive problems with data preparation capabilities.
10. Pentaho
Pentaho is a software that can access, prepare and can analyze any data from any
source. It is a best and trendy choice for data integration, orchestration, and
business analytics platform.

The main motto of this too is to turn Big data analytics into big insights.

Features of Pentaho:
 Pentaho generally supports a wide range of Big data sources.
 No such coding is required and it can deliver the data effortlessly to your
business.
 It generally permits to check data with easy access to analytics, like charts,
visualizations, etc.
 It can also access and integrate data for data visualization effectively.

2. Data visulation techniques:


One of the greatest challenges facing the IoT industry is the management
and interpretation of its vast streams of data. IoT visualizations of data,
taking the form of real-time, interactive graphs and charts, are crucial for
processing and deriving actionable insights from big data analytics in IoT.

• Data visualization is the process of creating a visual representation of the


information within a dataset.
• Data Visualization is referred as the process of representing information or
data into a visual context that provides useful insights from the data.
• It is a way to display the vast amount of data in a meaningful way that
clearly presents trends and patterns from the raw data collected.
• Data Visualization tools and technologies help to slice and dice the data to
the minute granular level
NEED OF VISUALIZATION
• The real purpose of Data Visualization is nothing but ‘making sense of data’.
• It provides a quick and effective way to communicate information to identify
trends and patterns and flag inconsistencies and errors in the data.
• visualize the output to monitor results, get actionable insights and evaluate
the factors affecting businesses and customer behaviour.
• A good visualization tells a story, removing the noise from the data and
highlighting the useful information.
Role of data visualization in IOT
• Internet of Things (IOT) and data are interlinked together as IOT is all about
collecting data and making sense of it.
• One of the challenges for IoT industry is data analysis and interpretation.
• Trillions of data is generated every day from the IOT sensors and devices in
the physical world and this data can potentially become a source of business
value.
• The data collected is impractical if we cannot extract useful information
from it and analyse and
• translate that information to identify hidden trends, outliers, and patterns in
data and make data-driven decisions.
• Considering an example of data collected from the sensors connected to the
windmill of a windfarm,
• sensors are connected to various components of the windmill to calculate the
wind speed, energy produced and temperature of different components of the
windmill.


Categories of Data Visualization

Numerical Data:

• Numerical data is also known as Quantitative data. Numerical data is any


data where data generally represents amount such as height, weight, age of a
person, etc. Numerical data visualization is easiest way to visualize data. It is
generally used for helping others to digest large data sets and raw numbers
in a way that makes it easier to interpret into action.
• Numerical data is categorized into two categories :

ContinuousData–
It can be narrowed or categorized (Example: Height measurements).

DiscreteData–
This type of data is not “continuous” (Example: Number of cars or children’s

a household has).

The type of visualization techniques that are used to represent


numerical data visualization is Charts and Numerical Values. Examples are
Pie Charts, Bar Charts, Averages, Scorecards, etc.
Categorical Data :

Categorical data is also known as Qualitative data. Categorical data is


any data where data generally represents groups.
It simply consists of categorical variables that are used to represent
characteristics such as a person’s ranking, a person’s gender, etc. Categorical
data visualization is all about depicting key themes, establishing
connections, and lending context.
Categorical data is classified into three categories :
BinaryData–
In this, classification is based on positioning (Example: Agrees or
Disagrees).
NominalData–
In this, classification is based on attributes (Example: Male or
Female).
OrdinalData–
In this, classification is based on ordering of information (Example:
Timeline or processes).
This type of visualization techniques that are used to represent categorical
data is Graphics, Diagrams, and Flowcharts. Examples are Word clouds,
Sentiment Mapping, Venn Diagram, etc.
There are hundreds of ways to visualize data, some of the most common data
visualization techniques include:

• Pie charts
• Bar charts
• Histograms
• Gantt charts
• Heat maps
• Box-and-whisker plots
• Waterfall charts
• Area charts
• Scatter plots
• Infographics
• Maps
What Are Data Visualization Tools?

A data visualization tool is a form of software that’s designed to visualize


data. Each tool's capabilities vary but, at their most basic, they allow you to input a
dataset and visually manipulate it. Most, but not all, come with built-in templates
you can use to generate basic visualizations.

DATA VISUALIZATION TOOLS FOR BUSINESS

1. Microsoft Excel (and Power BI)

In the strictest sense, Microsoft Excel is a spreadsheet software, not a data


visualization tool. Even so, it has useful data visualization capabilities. Given that
Microsoft products are widely used at the enterprise level, you may already have
access to it.

According to Microsoft’s documentation, you can use Excel to design at least 20


types of charts using data in spreadsheets. These include common options, such as
bar charts, pie charts, and scatter plots, to more advanced ones like radar charts,
histograms, and treemaps.

There are limitations to what you can create in Excel. If your organization is
looking for a more powerful data visualization tool but wants to stay within the
Microsoft ecosystem, Power BI is an excellent alternative. Built specifically as a
data analytics and visualization tool, Power BI can import data from various
sources and output visualizations in a range of formats.

2. Google Charts

For professionals interested in creating interactive data visualizations destined to


live on the internet, Google Charts is a popular free option.

The tool can pull data from various sources—including Salesforce, SQL databases,
and Google Sheets—and uses HTML5/SVG technology to generate charts, which
makes them incredibly accessible. It offers 18 types of charts, including bar charts,
pie charts, histograms, geo charts, and area charts.
Members of the Google community occasionally generate new charts and share
them with other users, which are arranged in a gallery on Google's website. These
charts tend to be more advanced but may not be HTML5-compliant.

3. Tableau

Tableau is one of the most popular data visualization tools on the market for two
main reasons: It’s relatively easy to use and incredibly powerful. The software can
integrate with hundreds of sources to import data and output dozens of
visualization types—from charts to maps and more. Owned by Salesforce, Tableau
boasts millions of users and community members, and it’s widely used at the
enterprise level.

Tableau offers several products, including desktop, server, and web-hosted


versions of its analytics platform, along with customer relationship management
(CRM) software.

A free option, called Tableau Public, is also available. It’s important to note,
however, that any visualizations created on the free version are available for
anyone to see. This makes it a good option to learn the software's basics, but it’s
not ideal for any proprietary or sensitive data.

4. Zoho Analytics

Zoho Analytics is a data visualization tool specifically designed for professionals


looking to visualize business intelligence. As such, it’s most commonly used to
visualize information related to sales, marketing, profit, revenues, costs, and
pipelines with user-friendly dashboards. More than 500,000 businesses and two
million users currently leverage the software.

Zoho Analytics has several paid options, depending on your needs. There’s also a
free version that allows you to build a limited number of reports, which can be
helpful if you’re testing the waters to determine which tool is best for your
business.

There are many other tools that work similarly to Zoho Analytics and are tailored
to sales and marketing professionals. HubSpot and Databox are two examples, both
of which include powerful data visualization capabilities.
5. Datawrapper

Datawrapper is a tool that, like Google Charts, is used to generate charts, maps,
and other graphics for use online. The tool’s original intended audience was
reporters working on news stories, but any professional responsible for managing a
website can find value in it.

While Datawrapper is easy to use, it’s somewhat limited, especially compared to


others on this list. One of the primary limitations is that it doesn’t integrate with
data sources. Instead, you must manually copy and paste data into the tool, which
can be time-consuming and liable to error if you aren’t careful.

Some common outputs include scatterplots, line charts, stacked bar charts, pie
charts, range plots, and a variety of maps and tables. Free and paid options are
available, depending on how you intend to use the tool.

6. Infogram

Infogram is another popular option that can be used to generate charts, reports, and
maps.

What sets Infogram apart from the other tools on this list is that you can use it to
create infographics (where its name comes from), making it especially popular
among creative professionals. Additionally, the tool includes a drag-and-drop
editor, which can be helpful for beginners.

Visualizations can be saved as image files and GIFs to be embedded in reports and
documents, or in HTML to be used online. Like most of the other tools on this list,
Infogram has tiered pricing, ranging from a free to enterprise-level version.
8115 - K.RAMAKRISHNAN COLLEGE OF ENGINEERING
(AUTONOMOUS)
Department of Computer Science and Engineering
UCS1505 – INTERNET OF THINGS

1 Differentiate microprocessor and microcontroller.

2 List the characteristics of RISC and CISC.

3
Write down the steps to install microprocessor on the board.
1. Step 1: Getting the processor ready for removal. ...
2. Step 2: Open the computer case. ...
3. Step 3: Remove the CPU fan. ...
4. Step 4: Remove the Processor. ...
5. Step 5: Insert new CPU on motherboard. ...
6. Step 6: Apply thermal paste. ...
7. Step 7: Install Heat Sink and CPU Fan. ...
8. Step 8: Power computer on.
4 Differentiate IEEE 802.11 and IEEE 802.15

5 Identify the sensors needed in smart health care environment.


 In this system, five sensors are used to capture the data from hospital environment
named
 heart beat sensor,
 body temperature sensor,
 room temperature sensor,
 CO sensor, and
 CO2 sensor.

6 What are the phases of IOT?

7 List out the benefits of cloud computing according to amazon web service.
 No need to pre-guess infrastructure capacity needs
 Saves money, because you only need to pay for those resources that you use, the
larger the scale, the more savings
 In a few minutes, platforms can be deployed around the world
 Flexibility and speed in providing resources to developers

8 What is meant by wormhole attack and sinkhole attack?


Wormhole attack:
It is a severe and popular attack in VANETs and other ad-hoc networks. This
attack involves two or more than two malicious nodes and the data packet from one end of
the malicious node is tunneled to the other spiteful/malicious node at the other point, and
these data packets are broadcasted.
Sinkhole attack:
It is the most destructive routing attacks in IoT environment. It creates the
network traffic and collapses the network communication. It used different routing metrics.
The metrics are fake link quality, shortest path etc.

9 Construct the diagram for impersonation attack and reflection attack.

10 List out the role of a microprocessor in embedded systems for IoT.


Processor is the heart of an embedded system. It is the basic unit that
takes inputs and produces an output after processing the data. For an embedded
system designer, it is necessary to have the knowledge of both microprocessors
and microcontrollers.
Processors in a System
1.A processor has two essential units −
2. Program Flow Control Unit (CU)
3. Execution Unit (EU)

11.What is microprocessor in IoT?


A microprocessor is a single integrated chip that contains a device's CPU. However, it doesn't contain
any RAM or ROM memory or other peripherals that a device may have. The chip instead relies on
inputs/outputs (I/Os) to connect to memory and peripherals

12. Which microprocessor is used in IoT devices?

 Intel® Celeron® Processor N6211


 Intel® Pentium® Processor N6415
 Intel Atom® x6211E Processor

13. Determine the popular languages for IOT?

 Java
 C
 Java Script
14. Different types of communication available in IoT.
 Human to Machine (H2M)
 Machine to Machine (M2M)
 Machine to Human (M2H)

15.Role of USB in IoT.


Implementing USB in an IoT platform chip means that features can be added to an IoT product either by
adding a chip to the system PCB, or by plugging in a USB peripheral. USB host drivers, which are widely
available for Linux and other open-source operating systems, support either form of integration.

16.Which layer is used for wireless connection in IoT devices?


Data link layer is used for wireless connection in IoT devices

17.How cloud platform is used in IoT system?


IoT Cloud Computing provides many connectivity options, implying large network access. People use a
wide range of devices to gain access to cloud computing resources: mobile devices, tablets, laptops. This
is convenient for users but creates the problem of the need for network access points.

18.Examine the benefits of cloud platform in IoT.

 High Speed – Quick Deployment.


 Automatic Software Updates and Integration.
 Efficiency and Cost Reduction.
 Data Security.
 Scalability.

19.Differentiate between smart homes and smart buildings.


A difference is that in smart buildings the focus is more on local IT solutions. The BMS (Building
Management System) is largely 'analog' and not necessarily interactive or remotely controllable. A smart
home is more likely to be fully 'digital' and remotely controllable via the Internet.

20.List out the cloud application in IoT.


 Traffic management.
 Smart grids.
 Environmental monitoring.
 Smart buildings and smart homes.
 Smart cities.
PART B

1. Explain in detail about the microprocessor architecture with neat sketch.


2. How to connect microprocessor with internet via Ethernet.
3. Explain the procedure to connect microprocessor with internet via Wi-Fi
4. How to communicate with microprocessor via Bluetooth. Explain in detail with
sketch.
5. How to program the microprocessor explain in detail with sample program
6. Briefly discuss about how the privacy preservation system for IOT is used in smart
building
7. Explain in detail about the security protocols used in IOT access networks.
8. Explain in detail about the authentication in IOT.
9. Write short notes on phases of IOT.
10. How to prevent unauthorized access to sensor data explain in detail.
11. Discuss in detail about the cloud architecture with neat sketch.
12. Explain in detail about the types of attacks on the phases of IOT.
13. Outline Bluetooth Enhances the IoT Architecture
14. Describe a realm of devices interconnected through a variety of communication
technologies.
15. Explain in detail about Cloud and IoT
16. Investigate about cloud platforms available for IOT devices and suggest the cloud
platform if you are doing the industry automation.
Q.No Questions
1 How to select a microcontroller for your internet of things devices? Microcontrollers
are tiny, self-contained computers hosted on a microchip. They enable connectivity and control
in all the things which could be connected to the internet. Microcontrollers are designed to
perform specific
functions, and they can be integrated into almost anything ranging from
industrial equipment, warehouse inventory items, wearable’s devices, to home
appliances and much more.
2 If you are automating the home using internet of things, list the some of the sensors can
be utilized for that.
✓ Temperature Sensor.
✓ Proximity Sensor.
✓ Accelerometer.
✓ IR Sensor (Infrared Sensor)
✓ Pressure Sensor.
✓ Light Sensor.
3 Analyze the impact of IPv6 on internet of things devices.
IPv6 provides improved remote access and management for large fleets of
IoT devices. Another major advantage of IPv6 is its highly efficient multicast
communication feature, which all but eliminates the need for routine
broadcast messaging.
4 What do you meant by participatory sensor?
Participatory Sensing is an approach to data collection and interpretation in which
individuals, acting alone or in groups, use their personal mobile devices and web services to
systematically explore interesting aspects of their worlds ranging from health to culture.
5 Mention the real world design constraints for IOT Applications.
The majority devices that will constitute the IoT are Constrained Devices (also known as
sensors, smart objects, or smart devices) with limited CPU, memory, and power resources.

6 List out the features of microprocessor.


✓ Memory.
✓ Decision making power based on previously entered values.
✓ Repeatability of the reading.
✓ Digital read-out and interactiveness.
✓ Parallel Processing.
✓ Time sharing and multiprocessing.
✓ Data storage, retrieval and transmission.
7 Examine the statistical methods used in internet of things.

8 What is the role of Analytics in IOT?


Internet of Things (IoT) analytics enables organizations to leverage the massive
amounts of data generated by IoT devices, using analytics stacks. IoT analytics is often
considered a subset of big data, involved with combining heterogeneous streams and
transforming them into consistent and accurate insights
9 List the data visualization techniques.
✓ Pie Chart. ...
✓ Bar Chart. ...
✓ Histogram. ...
✓ Gantt Chart. ...
✓ Heat Map. ...
✓ A Box and Whisker Plot. ...
✓ Waterfall Chart. ...
✓ Area Chart.

10 Design the future trends of internet of things.


The IoT market in India is poised to reach USD 15 billion by 2020, accounting for nearly
5 per cent of the total global market. With nearly 120 firms offering solutions in the IoT segment,
there are tremendous opportunities for further growth.
11 Differentiate microprocessor and microcontroller.

12 List the characteristics of RISC and CISC.

13 Write down the steps to install microprocessor on the board.


1. Step 1: Getting the processor ready for removal. ...
2. Step 2: Open the computer case. ...
3. Step 3: Remove the CPU fan. ...
4. Step 4: Remove the Processor. ...
5. Step 5: Insert new CPU on motherboard. ...
6. Step 6: Apply thermal paste. ...
7. Step 7: Install Heat Sink and CPU Fan. ...
8. Step 8: Power computer on.
14 Differentiate IEEE 802.11 and IEEE 802.15

15 Identify the sensors needed in smart health care environment.


✓ In this system, five sensors are used to capture the data from hospital
environment named
➢ heart beat sensor,
➢ body temperature sensor,
➢ room temperature sensor,
➢ CO sensor, and
➢ CO2 sensor.

16 What are the phases of IOT?

17 List out the benefits of cloud computing according to amazon web service.
✓ No need to pre-guess infrastructure capacity needs
✓ Saves money, because you only need to pay for those resources that
you use, the larger the scale, the more savings
✓ In a few minutes, platforms can be deployed around the world
✓ Flexibility and speed in providing resources to developers
18 What is meant by wormhole attack and sinkhole attack?
Wormhole attack:
It is a severe and popular attack in VANETs and other ad-hoc networks.
This attack involves two or more than two malicious nodes and the data packet from
one end of the malicious node is tunneled to the other spiteful/malicious node at the
other point, and these data packets are broadcasted.
Sinkhole attack:
It is the most destructive routing attacks in IoT environment. It creates
the network traffic and collapses the network communication. It used different
routing metrics. The metrics are fake link quality, shortest path etc.

19 Construct the diagram for impersonation attack and reflection attack.

20 List out the role of a microprocessor in embedded systems for IoT.


Processor is the heart of an embedded system. It is the basic unit that
takes inputs and produces an output after processing the data. For an embedded
system designer, it is necessary to have the knowledge of both microprocessors
and microcontrollers.
Processors in a System
1.A processor has two essential units −
2. Program Flow Control Unit (CU)
3. Execution Unit (EU)
21.What is microprocessor in IoT?

A microprocessor is a single integrated chip that contains a device's CPU.


However, it doesn't contain any RAM or ROM memory or other peripherals that a
device may have. The chip instead relies on inputs/outputs (I/Os) to connect to
memory and peripherals

22. Which microprocessor is used in IoT devices?


• Intel® Celeron® Processor N6211
• Intel® Pentium® Processor N6415
• Intel Atom® x6211E Processor

23. Determine the popular languages for IOT?

• Java
• C
• Java Script
24. Different types of communication available in IoT.
• Human to Machine (H2M)
• Machine to Machine (M2M)
• Machine to Human (M2H)

25.Role of USB in IoT.


Implementing USB in an IoT platform chip means that features can be added to an
IoT product either by adding a chip to the system PCB, or by plugging in a USB
peripheral. USB host drivers, which are widely available for Linux and other open-
source operating systems, support either form of integration.

26.Which layer is used for wireless connection in IoT devices?


Data link layer is used for wireless connection in IoT devices

27.How cloud platform is used in IoT system?


IoT Cloud Computing provides many connectivity options, implying large network
access. People use a wide range of devices to gain access to cloud computing
resources: mobile devices, tablets, laptops. This is convenient for users but creates
the problem of the need for network access points.

28.Examine the benefits of cloud platform in IoT.

• High Speed – Quick Deployment.


• Automatic Software Updates and Integration.
• Efficiency and Cost Reduction.
• Data Security.
• Scalability.
29.Differentiate between smart homes and smart buildings.

A difference is that in smart buildings the focus is more on local IT solutions.


The BMS (Building Management System) is largely 'analog' and not necessarily
interactive or remotely controllable. A smart home is more likely to be fully 'digital'
and remotely controllable via the Internet.

30.List out the cloud application in IoT.


• Traffic management.
• Smart grids.
• Environmental monitoring.
• Smart buildings and smart homes.
• Smart cities.

You might also like