UNIT-2 - Architecture
UNIT-2 - Architecture
This document is confidential and intended solely for the educational purpose of
RMK Group of Educational Institutions. If you have received this document
through email in error, please notify the system manager. This document
contains proprietary information and is intended only to the respective group /
learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender
immediately by e-mail if you have received this document by mistake and delete
this document from your system. If you are not the intended recipient you are
notified that disclosing, copying, distributing or taking any action in reliance on
the contents of this information is strictly prohibited.
20EC004 Industrial IoT
Applications
Department: CSE, CSD & IT
Batch/Year: 2023 -2024/ IVYear
Date: 23.03.2023
CONTENTS
1 Course Objectives
2 Pre Requisites
3 Syllabus
4 Course outcomes
6 Lecture Plan
7 Lecture Notes
8 Assignments
9 Part A Q & A
10 Part B Questions
15 Assessment Schedule
5
1. Course Objectives
6
1. Course Objectives
OBJECTIVES:
7
2. Pre Requisites
8
3. PRE REQUISITES
Pre-requisite Chart
9
3. Syllabus
10
3. Syllabus
20EC004:Industrial IoT Applications LTPC:3003
UNIT I INTRODUCTION
Introduction to IOT, What is IIOT? IOT Vs. IIOT, History of IIOT, Components of IIOT –
Sensors,Interface, Networks, People Process, Hype cycle, IOT Market, Trends; future Real life
examples,Key terms IOT Platform, Interfaces, API, clouds, Data Management Analytics,
Mining Manipulation;Role of IIOT in Manufacturing Processes, Use of IIOT in plant
maintenance practices, Sustainability through Business excellence tools Challenges, Benefits
in implementing IIOT
UNIT II ARCHITECTURE AND PROTOCOLS
Overview of IOT components; Various Architectures of IOT and IIOT, Advantages
&disadvantages,Industrial Internet - Reference Architecture; IIOT System components:
Sensors, Gateways, Routers,Modem, Cloud brokers, servers and its integration, WSN, WSN
network design for IOT; Need for protocols, Wi-Fi, Zigbee, Bacnet, IIOT protocols COAP,
MQTT, 6LoWPAN, LWM2M, AMPQ.
UNIT III SENSORS AND INTERFACING
Introduction to sensors, Transducers, Classification, Roles of sensors in IIOT , Various types
of sensors ,Design of sensors, sensor architecture, special requirements for IIOT sensors,
Role of actuators, types of actuators. Hardwire the sensors with different protocols such as
HART, MODBUS-Serial,Parallel,Ethernet, BACNet , Current, M2M
UNIT IV CLOUD, SECURITY AND GOVERNANCE
IIOT cloud platforms: Overview of cots cloud platforms, predix, thingworks, azure,. Data
analytics, cloud services, Business models: Saas, Paas, Iaas; Introduction to web security,
Conventional web technology and relationship with IIOT, Vulnerabilities of IoT, IoT security
tomography and layered attacker model,Identity establishment, Access control, Message
integrity; Management aspects of cyber security
UNIT V IOT ANALYTICS AND APPLICATIONS
IOT Analytics : Role of Analytics in IOT, Data visualization Techniques, Statistical Methods;
IOT Applications : Smart Metering, e-Health Body Area Networks, City Automation,
Automotive Applications, Plant Automation, Real life examples of IIOT in Manufacturing
Sector
11
4. Course outcomes
12
5. COURSE OUTCOME
7
13
5. CO- PO/PSO Mapping
14
5. CO- PO/PSO Mapping
16
6. Lecture Plan
30.08.2023 30.08.2023
9 6LoWPAN, LWM2M, AMPQ.
31.08.2023 31.08.2023
10 Revision
17
7. Lecture Notes
18
UNIT II
IoT refers to the network of interconnected devices and objects that can
communicate and exchange data over the internet. These devices are equipped with
transmit data for various purposes. Here are the key components of IoT:
1. Devices/Things: These are the physical objects or devices that are equipped with
They can range from simple sensors to complex devices like smartphones,
2. Sensors: Sensors are devices that detect and measure physical attributes such as
temperature, humidity, light, motion, pressure, and more. They collect real-world
data and convert it into a digital format for processing and transmission.
3. Actuators: Actuators are devices that perform actions based on the data received
solenoids, and relays. Actuators enable devices to have an impact on the physical
UNIT-II- ARCHITECTURE AND PROTOCOLS
world.
communicate with each other and the central systems. Common connectivity options
include Wi-Fi, cellular networks (3G, 4G, 5G), Bluetooth, Zigbee, LoRaWAN, and NFC
5. Data Processing: The data collected by sensors is often raw and needs processing
and even basic analysis at the edge (on the device itself) or in the cloud.
6. IoT Platforms: IoT platforms provide a set of tools and services for managing,
connecting, and analyzing IoT devices and data. They often include features like
Examples of IoT platforms are AWS IoT, Google Cloud IoT, and Microsoft Azure IoT.
7. Cloud Services: Cloud services play a crucial role in IoT by providing scalable
storage and computational resources. They enable data storage, processing, and
analysis on a larger scale. Cloud platforms can also host applications that interact
UNIT-II- ARCHITECTURE AND PROTOCOLS
9. Security Mechanisms: IoT devices are vulnerable to security threats due to their
10. User Interface: IoT devices often have user interfaces that allow users to interact
with them. This can be through mobile apps, web dashboards, voice commands, or
11. Data Analytics and Machine Learning: IoT data is valuable for gaining insights
and making predictions. Data analytics and machine learning techniques can be
maintenance.
UNIT-II- ARCHITECTURE AND PROTOCOLS
12. Edge Computing: Edge computing involves processing data closer to the source
(on the device or at a local server) rather than sending all data to the cloud. This
responses.
can collect, transmit, and act on data, enabling a wide range of applications across
more.
by means of specific technologies, and we will discuss options for realizing each
component.
management.
• Devices
• Device manager
The bottom layer of the architecture is the device layer. Devices can be of various
types, butin order to be considered as IoT devices, they must have some
• A unique identifier (UUID) burnt into the device (typically part of the System-on
•A UUID provided by the radio subsystem (e.g. Bluetooth identifier, Wi-Fi MAC
UNIT-II- ARCHITECTURE AND PROTOCOLS
address)
For the reference architecture we recommend that every device has a UUID
COMMUNICATIONS LAYER
The communication layer supports the connectivity of the devices. There are
multiple potential protocols for communication between the devices and the cloud.
HTTP is well known, and there are many libraries that support it. Because it
is a simple textbased protocol, many small devices such as 8-bit controllers can only
UNIT-II- ARCHITECTURE AND PROTOCOLS
partially support theprotocol – for example enough code to POST or GET a resource.
The larger 32-bit baseddevices can utilize full HTTP client libraries that properly
There are several protocols optimized for IoT use. The two best known are
MQTT6 and CoAP7. MQTT was invented in 1999 to solve issues in embedded
has been through some iterations and the current version (3.1.1) is undergoing
subscribe messaging systembased on a broker model. The protocol has a very small
overhead (as little as 2 bytes permessage), and was designed to support lossy and
protocol modeled on HTTPsemantics, but with a much smaller footprint and a binary
approach. CoAP isdesigned to be used over UDP. For the reference architecture we
have opted to select MQTTas the preferred device communication protocol, with
The reasons to select MQTT and not CoAP at this stage are
• Simplified bridging into existing event collection and event processing systems;
and
However, both protocols have specific strengths (and weaknesses) and so there will
be somesituations where CoAP may be preferable and could be swapped in. In order
device libraries.
approach for sending data to the device would be to use HTTP Polling. This isvery
inefficient and costly, both in terms of network traffic as well as power requirements.
The modern replacement for this is the WebSocket protocol9 that allows an HTTP
connection to be upgraded into a full two-way connection. This then acts as a socket
UNIT-II- ARCHITECTURE AND PROTOCOLS
channel(similar to a pure TCP channel) between the server and client. Once that has
the connection.
with WebSockets. In some cases, MQTT over Web Sockets will be the only protocol.
This is because itis even more firewall-friendly than the base MQTT specification as
Note that while there is some support forWeb Sockets on small controllers, such as
Arduino, the combination of network code, HTTPand Web Sockets would utilize most
AGGREGATION/BUS LAYER:
An important layer of the architecture is the layer that aggregates and brokers
1. The ability to support an HTTP server and/or an MQTT broker to talk to the
devices
3. The ability to bridge and transform between different protocols, e.g. to offer
HTTP basedAPIs that are mediated into an MQTT message going to the
The bus layer may also provide some simple correlation and mapping from different
Finally, the aggregation/bus layer needs to perform two key security roles. It must
enforcement point (PEP) for policy-based access. In this model, the bus makes
requests to the identity and access management layer to validate access requests.
The identity and access management layer acts as a policy decision point (PDP) in
this process. The bus layer then implements the results of these calls to the PDP to
UNIT-II- ARCHITECTURE AND PROTOCOLS
This layer takes the events from the bus and provides the ability to process and act
upon these events. A core capability here is the requirement to store the data into
a database. This may happen in three forms. The traditional model here would be
a database. However, there are many approaches where we can support more agile
This is a cloud calable platform that supports technologies such as Apache Hadoop
to provide highly scalable map reduce analytics on the data coming from then
near real time activities and actions based on data from the devices and from the
• Complex event processing for fast in-memory processing and near real-time
reaction and autonomic actions based on the data and activity of devices and other
systems
The reference architecture needs to provide a way for these devices to communicate
outside of the device-oriented system. This includes three main approaches. Firstly,
we need thea bility to create web-based front-ends and portals that interact with
devices and with the event-processing layer. Secondly, we need the ability to create
dashboards that offer views into analytics and event processing. Finally, we need to
UNIT-II- ARCHITECTURE AND PROTOCOLS
communications (APIs). These APIs need to be managed and controlled and this
the web front end is to utilize a modular front-end architecture, such as a portal,
Of course, the architecture also supports existing Web server-side technology, such
as Java Servlets/JSP, PHP, Python, Ruby, etc. Our recommended approach is based
on the Java framework and the most popular Java-based web server, Apache
Tomcat. The dashboard is a re-usable system focused on creating graphs and other
visualizations of data coming from the devices and the event processing layer.
• The first is that it provides a developer-focused portal (as opposed to the user
focused portal previously mentioned), where developers can find, explore, and
subscribe to APIs from the system. There is also support for publishers to create,
• The second is a gateway that manages access to the APIs, performing access
• The final aspect is that the gateway publishes data into the analytics layer where
it is stored as well as processed to provide insights into how the APIs are used.
DEVICE MANAGEMENT:
device manager) communicates with devices via various protocols and provides both
individual and bulk control of devices. It also remotely manages software and
applications deployed on the device. It can lock and/or wipe the device if necessary.
The device manager works in conjunction with the device management agents.
There are multiple different agents for different platforms and device types. The
device manager also needs to maintain the list of device identities and map these
into owners. It must also work with the identity and access management layer to
manage access controls over devices (e.g. who else can manage the device apart
from the owner, how much control does the owner have vs. the administrator, etc.)
There are three levels of device: non-managed, semi-managed and fully managed
(NM,SM, FM). Fully managed devices are those that run a full DM agent.
location if
available
Non-managed devices can communicate with the rest of the network, but have no
agent
involved. These may include 8-bit devices where the constraints are too small to
support the agent. The device manager may still maintain information on the
availability and location of the device if this is available. Semi-managed devices are
those that implement some parts of the DM (e.g. feature control, but not software
management).
The final layer is the identity and access management layer. This layer needs to
• Other identity services including SAML2 SSO and OpenID Connect support for
identifying
• XACML PDP
The identity layer may of course have other requirements specific to the other
architecture. In this section we have outlined the major components of the reference
The three-tier architecture pattern comprises edge, platform and enterprise tiers.
UNIT-II- ARCHITECTURE AND PROTOCOLS
These tier splay specific roles in processing the data flows and control flows involved
in usage
The edge tier collects data from the edge nodes, using the proximity network. The
location, governance scope and the nature of the proximity network, vary depending
The edge tier collects data from the edge nodes, using the proximity network. The
UNIT-II- ARCHITECTURE AND PROTOCOLS
location, governance scope and the nature of the proximity network, vary depending
The platform tier receives, processes and forwards control commands from the
enterprise tier to the edge tier. It consolidates processes and analyzes data flows
from the edge tier and other tiers. It provides management functions for devices
and assets. It also offers non-domain specific services such as data query and
analytics.
receives data flows from the edge and platform tier. It also issues control commands
In the above figure, functional blocks are shown in each tier. These functional blocks
are indicative of the primary functional location of the tier yet are not exclusively
assigned to that tier. For example, the 'data transform' function in the platform tier
could also be found in the edge tier (e.g. performed by a gateway) although it would
be implemented in a different way and for a different purpose. For example, 'data
UNIT-II- ARCHITECTURE AND PROTOCOLS
specific configuration and interfaces, unlike the platform tier where it is usually
supported as a higher-level service that operates on data that has been abstracted
The proximity network connects the sensors, actuators, devices, control systems
and assets, collectively called edge nodes. It typically connects these edge nodes,
The access network enables connectivity for data and control flows between the
edge and the platform tiers. For example, it could be a corporate network, an overlay
Service network enables connectivity between the services in the platform tier and
the enterprise tier, and the services within each tier. It may be an overlay private
network over the public Internet or the Internet itself, allowing the enterprise grade
From the tier and domain perspective, the edge tier implements most of the control
domain; the platform tier most of the information and operations domains; the
enterprise tier most of the application and business domains. This mapping
functional mapping of IIoT system tiers depends greatly on the specifics of the
close to the edge tier, along with some application logic and rules to enable
of the platform tier to manage the assets in the edge tier. The operations domain
component of the platform tier itself provides services (asset management service
The data services (information domain) component of the platform tier may request
services from the operations domain component for the verification of asset
credentials it receives in the data flows from the edge tier, and query of asset
metadata so it can augment the data received from the assets before the data are
components may use data services from the information domain component in order
to get better intelligence from asset data, e.g. for diagnostics, prognostics and
As a result, components from all functional domains may leverage the same data
and use analytic platforms and services to transform data into information for their
specific purposes.
Advantages:
Cost Reduction − IOT devices catch any problem very fast as compared to traditional
troubleshooting. It not only saves time but also saves costs of large repairs.
Efficiency and Productivity − An automated PDF conversion and creation tool will
remove the hustle of PDF editing and archiving. Hence, increase in Efficiency and
Productivity.
UNIT-II- ARCHITECTURE AND PROTOCOLS
Business Opportunities − IOT provides advanced analytics, smart utility grids which
help Small Management Businesses to provide more valuable content and things to
their customers.
connected, customers need not have to worry about appliances. One can turn off
Mobility and Agility − With the help of IoT, employees can do their work from any
Disadvantages
Security − The data is travelling all over the Internet. So maintaining its privacy is
equipment.
Complexity − Most of the devices still contain some software bugs. Each device must
Safety − Suppose a patient is left unattended by a doctor. And some notorious guy
Policies − Government authorities must take some steps to make policies and
2.Cloud
4.Embedded Systems
UNIT-II- ARCHITECTURE AND PROTOCOLS
The digital industrial company, General Electric (GE), coined the term Industrial
Internet.
Industrial Internet is not exactly the same as Industrial Internet of Things (IIoTs),
The Industrial Revolution lasted for around 150 years which began in 1750 and
ended in 1900
Commercialization and the mass production of steam engines marked the beginning
The Second Stage started in 1870 with the invention of internal combustion engines
and electricity
Even though Industrial Revolution brought significant leap in the economy and
3. Inefficient
The Internet Revolution started around 1950 and lasted for around 50 years
Rapid information exchange over large geographical distance was made possible.
According to GE, Industrial Internet can be defined as “the association of the global
a) Intelligent machines
b) Advanced analytics
c) People at work
Intelligent machines
These machines can be monitored using advanced sensors and actuators using
related software.
Advanced analytics:
The huge data generated from different kinds of machines and sensors, advance
analytic and prediction techniques make possible in shaping a whole new era of
People at work:
Through web and mobile interfaces, everybody can connect with one another
A doctor can interact with his patient virtually, a worker can control a machine
This makes the system more intelligent, maintenance and operations become
easier, safety and the quality of services also enhances at the same time.
APPLICATIONS:
Commercial Aviation
Rail Transportation
Power Production
Healthcare
UNIT-II- ARCHITECTURE AND PROTOCOLS
Commercial Aviation:
Airline operation
cancellations of flight
Asset Management
Timely repairing
Rail Transportation:
UNIT-II- ARCHITECTURE AND PROTOCOLS
the rail operator can monitor the trains and make optimal decisions
Power Production:
Therefore
analysis of the incoming data will provide new insights relating to potential
Industrial Internet
enhances production
flow
reduces costs
Healthcare:
devices and also know the status of the connected devices and the patients
monitor by them
Gas and Power segment of Power plants will save $66 billion
Freight transportation through world rail network will save $27 billion
The IIRA viewpoints are defined by analyzing the various IIoT use cases developed
by the IIC and elsewhere, identifying the relevant stakeholders of IIoT systems and
Business Viewpoint
Usage Viewpoint
Functional Viewpoint
Implementation Viewpoint
UNIT-II- ARCHITECTURE AND PROTOCOLS
As shown in Figure, these four viewpoints form the basis for the four views that
address the IIoT system concerns. Architects can then use these industrial internet
views as the basis of their architecture and may extend them by defining additional
views and viewpoints as needed to organize system concerns based on their specific
system requirements.
BUSINESS VIEWPOINT
The business viewpoint frames the concerns of the business stakeholders and their
business vision, values and objectives in establishing an IIoT system in its business
The concerns for the business viewpoint are business-oriented and are of interest
UNIT-II- ARCHITECTURE AND PROTOCOLS
USAGE VIEWPOINT:
The usage viewpoint frames the concerns of expected system usage. It is typically
system components) users that deliver its intended functionality in achieving its
managers and others, including those involved in the specification of the IIoT system
The usage view contains models of context model kind. A context model depicts a
FUNCTIONAL VIEWPOINT:
their structure and interrelations, the interfaces and interactions between them, and
the relation and interactions of the system with external elements in the
developers and integrators. The functional view contains two models, a functional
narrative statement model kind. A concepts model depicts a set of concepts and
provides text tobe used as a part of one or more architecture views to address
concerns
IMPLEMENTATION VIEWPOINT:
and their life cycle procedures. These elements are coordinated by activities (usage
These concerns are of interest to system and component architects, developers and
The patterns in the implementation view are of architecture pattern model kind. An
architecture pattern model kind describes the structure of a system and are used in
the construction of new systems. Architecture patterns are described using both
The Industrial Internet of Things (IIoT) refers to the application of IoT technologies
Sensors:
temperature, pressure, vibration, humidity, and more. These sensors collect real-
time data from machines, equipment, and processes. The collected data forms the
Gateways:
Gateways act as intermediaries between sensors and the central infrastructure. They
UNIT-II- ARCHITECTURE AND PROTOCOLS
aggregate data from multiple sensors, preprocess and filter the data, and then
Routers:
IIoT environment. They ensure that data flows efficiently and securely between
Modems:
Modems are communication devices that modulate and demodulate digital signals
Cloud Brokers:
Cloud brokers facilitate communication and data exchange between IIoT devices
and cloud platforms. They ensure secure and reliable data transfer, often utilizing
IIoT data is often sent to cloud-based servers for storage, processing, and analysis.
handle large volumes of data and run complex analytics. This enables organizations
Integration:
monitor the system, physical or environmental conditions. Sensor nodes are used in
WSN with the onboard processor that manages and monitors the environment in a
particular area. They are connected to the Base Station which acts as a processing
unit in the WSN System. Base Station in a WSN System is connected through the
Internet to share data. WSN can be used for processing, analysis, storage, and
UNIT-II- ARCHITECTURE AND PROTOCOLS
Applications of WSN:
6. Agriculture
7. Landslide Detection
Challenges of WSN:
UNIT-II- ARCHITECTURE AND PROTOCOLS
1. Quality of Service
2. Security Issue
3. Energy Efficiency
4. Network Throughput
5. Performance
including:
sensors that have limited energy resources. This makes it challenging to ensure
that the network can function for long periods of time without the need for frequent
battery replacements.
typically small and have limited processing and storage capabilities. This makes it
nodes with different capabilities. This makes it challenging to ensure that the
UNIT-II- ARCHITECTURE AND PROTOCOLS
jamming, and spoofing. Ensuring the security of the network and the data it
nodes and handle large amounts of data. Ensuring that the network can scale to
interference from other wireless devices. This can make it difficult to ensure
Reliability: WSNs are often used in critical applications, such as monitoring the
Components of WSN:
Sensors:
Sensors in WSN are used to capture the environmental variables and which is used
for data acquisition. Sensor signals are converted into electrical signals.
Radio Nodes:
It is used to receive the data produced by the Sensors and sends it to the WLAN
UNIT-II- ARCHITECTURE AND PROTOCOLS
power source.
It receives the data which is sent by the Radio nodes wirelessly, generally through
the internet.
Evaluation Software:
The data received by the WLAN Access Point is processed by a software called as
Evaluation Software for presenting the report to the users for further processing
of the data which can be used for processing, analysis, storage, and mining of
the data.
Low cost: WSNs consist of small, low-cost sensors that are easy to deploy, making
which can be costly and difficult to install. Wireless communication also enables
energy, enabling long-term operation without the need for frequent battery
replacements.
UNIT-II- ARCHITECTURE AND PROTOCOLS
and control.
Limited processing power: WSNs use low-power devices, which may have
tampering, and denial of service attacks, which can compromise the confidentiality,
interference from other wireless devices or radio signals, which can degrade the
while WSNs offer many benefits, they also have limitations and challenges that
used for deploying a large number of wireless sensors that monitor the system,
engineers are very well equipped to provide you with an all round solution if you are
Sensor network is widely used. Sub-1 GHz, Zigbee,Thread etc are also used to
UNIT-II- ARCHITECTURE AND PROTOCOLS
connect sensor networks and gateway and data collected from this sensor network
can be sent to cloud using cellular networks such as NBIoT, LTE-M or wifi etc.
UNIT-II- ARCHITECTURE AND PROTOCOLS
Sensor Nodes- Sensors play the vital role of capturing environmental variables.
Radio Nodes- Radio nodes or master nodes in a Wireless sensor network receive
Access Point or Gateway-It is used to receive the data sent by the radio nodes
wirelessly typically through the internet and send it over the cloud.
is analysed. This data is further analyzed on the cloud and displayed on IoT mobile
WSN protocols in IoT are used to provide a connectivity medium between IoT sensor
nodes and a central gateway. IoT consists of different tech stacks, WSN is just one
and is a subset of IoT. It is a part where data is transmitted among several IoT
Fault Tolerance – Fault tolerance is the ability of the network to work even when
Mobility of Nodes – Nodes can be moved anywhere within the sensor field in order
Scalability – WSN is designed in such a way that it can have thousands of nodes
in a network.
exchange data over the network, it informs the base station immediately without
any delay.
UNIT-II- ARCHITECTURE AND PROTOCOLS
Protocols of IIOT
Wi-Fi(Wireless Fidelity)
Wireless Fidelity Is One Of The Most Hassle-Free And Fast Wireless Communication
Personal Computers, Smartphones, Laptops, Printers, And Cars Use This Protocol.
UNIT-II- ARCHITECTURE AND PROTOCOLS
Features-
Communication Direction-Bidirectional.
Range – Up To 50 M.
Advantages-
Cost-Effective
Convenient
Explanadibility
Disadvantages-
Low-Level Security
Low Range
ZigBee
Zigbee Is One Of The Wireless Technology That Has A Vast User Base And It
Widely Used In Home Automation Systems, Medical Data Collection, Or Any Small
Scale Project With Low Bandwidth Requirement. In Our Day To Day Life, The
Features-
Range-10-100m.
Advantages-
Low Cost.
Disadvantages-
Low Bandwidth.
BACnet
BACnet Modbus
Proprietary No
Transmission
Ethernet, IP, MS/TP, Zigbee
Modes
dial-up
MT/TP-Wire Length
Disadvantages Ethernet-Infrastructure
in all devices
6LoWPAN
IPv6 Over Low Power Personal Area Network Or 6LoWPAN Is An IP-Also Based
Protocol That Ensures Connectivity Of Even Low Data Rate Networks. It Ensures
That Even The Smallest Or Low Power Device Should Be A Part Of IoT. It Helps
Features-
Range-25-50m.
UNIT-II- ARCHITECTURE AND PROTOCOLS
Topology-Mesh.
Advantages-
Low Cost.
Disadvantages-
Less Secure.
Problem Of Interference.
MQTT
which occupies half of the IoT Protocol because of its simplicity, supporting QoS,
MQTT Protocol is widely used in the fields of IoT, Mobile Internet, Intelligent
Hardware, IoV, Energy&Utilities, etc., which can not only be used as a gateway to
Communication Protocol. Most gateway protocols such as ZigBee and LoRa are
Light-weight and reliable: The MQTT message is compact, which can realize
stable transmission on severely limited hardware equipment and network with low
advantage of publishing and subscribing mode is that the publisher and subscriber
Created for the IoT: It provides comprehensive IoT application features such
has mature Broker server software, which can support massive Topic and ten-
Communication Mode
MQTT uses the publish-subscribe mode, which is different from the traditional client-
server mode. It separates the client who sends the message (publisher) from the
UNIT-II- ARCHITECTURE AND PROTOCOLS
client who receives the message (subscriber), and the publisher does not need to
establish direct contact with the subscriber. We can let multiple publishers publish
Market Conditions
MQTT is one of the most important standard protocols in the IoT field, which is
widely used in industries such as IoV, Industrial Internet of Things (IIoT), Smart
manufacturers such as AWS IoT Core, Azure IoT Hub, and Alibaba Cloud IoT
platform, and it is the preferred protocol for Cloud in various industries (such as
industrial Internet, car networking, and smart home) and many gateway protocols.
As one of the most popular MQTT brokers in the world, EMQX provides the cloud-
native distributed IoT messaging platform of "run anywhere, connect once, integrate
everything", with an all-in-one distributed MQTT broker and SQL-based IoT rule
CoAP
UNIT-II- ARCHITECTURE AND PROTOCOLS
Most IoT devices are resource-constrained, such as CPU, RAM, Flash, network
broadband, etc. For this kind of device, it is unrealistic to realize the information
exchange directly by using TCP and HTTP of the existing network. CoAP Protocol
emerges as the times require, in order to make this part of devices connect to the
network smoothly.
CoAP refers to many design ideas of HTTP, and it also improves many design details
and adds many practical functions according to the specific situation of limited
resource-limited devices.
format, while CoAP is binary format, which is more compact than HTTP
It supports IP multicast
UNIT-II- ARCHITECTURE AND PROTOCOLS
Market Conditions
Compared with MQTT, CoAP is lighter with lower overhead, and it is more suitable
for certain device and network environments. EMQX and some public cloud IoT
LwM2M
equipment management. LwM2M Protocol was born at the end of 2013, which was
proposed and defined by OMA (Open Mobile Alliance). At present, the mature
version number is still 1.0, and OMA experts are working on version 1.1.
• The most important entities of LwM2M Protocol include LwM2M Server and
LwM2M Client.
• As a server, the LwM2M Server is deployed at the M2M service provider or the
LwM2M Protocol adopts REST to keep pace with the times and realize a simple and
easy-to-understand style.
However, because the protocol’s service object is the terminal equipment with
limited resources, the traditional HTTP data transmission mode is too cumbersome
to support the limited resources, so the REST-style CoAP is chosen to complete the
message and data transfer. On the one hand, compared with TCP, CoAP is based
on UDP. It is more flexible in environments where network resources are limited and
devices cannot be always on-line (for security reasons, UDP-based DTLS secure
transport protocol is used). On the other hand, the message structure of CoAP itself
is very simple, the message is compressed, and the main part of CoAP can be made
For similar reasons, the protocol’s data structure must be simple enough. The
LwM2M Protocol defines a resource-based model, each resource may not only carry
a numerical value, but also point to an address to represent each item of information
available in the LwM2M client. All resources exist in an object instance, that is, the
UNIT-II- ARCHITECTURE AND PROTOCOLS
For scalability, the Protocol also allows more objects to be customized according to
actual needs. In such a data model, resources, object instances, and objects are
that any resource can be represented in a concise manner of at most 3 levels, e.g.,
/1/0/1 represents the server short ID resource in the first instance of the Server
Object. At the registration stage, the LwM2M client transmits the object instance
carrying the resource information to the LwM2M server, so as to notify the server of
EMQ also realizes LwM2M access capability on the EMQX server and most functions
of the LwM2M Protocol. LwM2M device can register to EMQX-LWM2M to access and
AMQP
While one plans to bring AMQP into action, getting to know some of its key
terminologies is imperative. In this post part, we have explained the widely used
ones.
UNIT-II- ARCHITECTURE AND PROTOCOLS
responsible for connection building that ensure better data routing and queuing at
the client-side.
of by consumer.
Components Of AMQP
Other than the above AMQP terminologies, developers must be aware of certain
Exchange handles the responsibility of fetching messages and placing them carefully
in the right queue. Its 4 categories are: Fanout, Headers, Topic, and Direct. To detail
Channel
Channel refers to a multiplexed virtual connection among AMQP peers, which is built
Message Queue
UNIT-II- ARCHITECTURE AND PROTOCOLS
It is an identified entity that helps link messages with their resources or point of
origin.
Binding
Virtual Hosts
vhost is a platform offering the segregation facility inside the broker. Based upon
users and their access rights, there could be multiple vhost functional at a time.
The functional mechanism that AMQP follows is simple; however, only after
The exchanges play a crucial role in trading messages as they start with delivering
the messages to client, perform processing as per the rules, and direct the output
of previous stage to 1 or multiple queues. Its type in use decides which routing
For instance, in the case of ‘direct’ type, the newly-added data contains final
routing method. Instead, It broadcasts the same piece of information to all queues
attached.
UNIT-II- ARCHITECTURE AND PROTOCOLS
Now that you are well-aware of what is AMQP and how it works, let us explain how
communication;
You may consider a few scenarios where AMQP can be used in APIs, for example:
1. Adding money to your digital wallet, such as Paytm will require selecting a
2. Now comes the authentication step. If verified the details, the next service
are crucial events and you won’t want inconsistency in them, there can be an extra
service events that will keep track of the outcome of each message so that the next
So, you see, asynchronous nature of AMQP will cause the need for callbacks in
comparison to HTTP. Also, it is more complex to design ‘fetch’ endpoints using this
protocol.
To conclude, if you could develop its API functionality well, AMQP can work well with
significantly. If you cannot bear the complexity of the development process, HTTP
1
8. Assignments
3
1. What is IIoT, and what are some of its key benefits?
IIoT stands for Industrial Internet of Things, which refers to the use of
connected sensors, devices, and machines to collect and analyze data in industrial
settings. Some key benefits of IIoT include increased efficiency and productivity,
improved quality control, predictive maintenance, and reduced downtime and
costs.
3. What are some common types of sensors used in IIoT systems, and
how are they deployed in industrial settings?
Common types of sensors used in IIoT systems include temperature sensors,
pressure sensors, and vibration sensors. These sensors can be deployed in
industrial settings in various ways, such as using wireless sensor networks or
attaching sensors directly to machines and equipment.
4. What are some data processing and analysis methods used in IIoT
systems, and what are some of their applications?
Some data processing and analysis methods used in IIoT systems include
machine learning algorithms, data visualization tools, and statistical analysis
techniques. These methods can be used for applications such as predictive
maintenance, supply chain optimization, and quality control.
7. What is the difference between IIoT and IoT, and how does IIoT benefit
industrial settings specifically?
IoT (Internet of Things) refers to the use of connected devices and sensors in
various settings, while IIoT (Industrial Internet of Things) specifically refers to the
use of such technology in industrial settings. IIoT benefits industrial settings by
improving efficiency, reducing downtime, and enabling predictive maintenance and
quality control.
8. What is the role of IIoT in smart factories, and how can it be used to
improve production processes?
IIoT can play a key role in smart factories by providing real-time data on machine
performance, energy usage, and quality control. This data can be used to optimize
production processes, reduce downtime, and improve overall efficiency.
9. Define actuators.
Actuators are devices that perform actions based on the data received from
sensors or through remote commands. Examples include motors, servos, solenoids,
and relays. Actuators enable devices to have an impact on the physical world.
10. Compare and contrast the features of AWS IoT, Google Cloud IoT, and
Microsoft Azure IoT platforms.
IoT platforms provide a set of tools and services for managing, connecting, and
analyzing IoT devices and data. They often include features like device
management, data storage, analytics, security, and remote monitoring. Examples of
IoT platforms are AWS IoT, Google Cloud IoT, and Microsoft Azure IoT.
Synchronous (or
Asynchronous, event-
Messaging Mode asynchronous with
based
observe extension)
15. What are some use cases for IoT data analytics?
• Predictive maintenance.
• Smart metering.
• Improving customer experience.
• Supply chain management.
• Smart parking.
• Smart building monitoring.
• Smart grids.
• Agriculture.
10
10. Part B Questions
1 Measure the extent of benefits that can be provided by IOT for K5 CO2 A
Home Automation, Health monitoring system, Smart
Transportation and Smart Shopping.
(i)WIFI (4)
(ii)Zigbee (4)
(iii)BACnet (5)
(ii) How many protocols are there in IoT? How to choose the
right IoT protocol (7)
11. Activity based learning
12
11. Activity based learning
14
12. Supportive online Certification courses
https://onlinecourses.nptel.ac.in/noc23_cs83
https://www.udemy.com/course/introduction-to-industrial-iot-for-it-professionals/
13. Real time Applications in day to day life
and to Industry
16
13. Real time Applications in day to day life and to Industry
• Manage building automation data from multiple locations- all Star hotels
• IIoT can be used to monitor and control the heating, lighting, energy consumption, fire
protection, employee safety and many other systems for multiple buildings from a
central location. The real-time machine data can be transferred to a central cloud
application, using industrial communication networks.
14. Contents beyond the Syllabus
18
14. Contents beyond the Syllabus
What is edge computing?
•Edge computing is an emerging computing paradigm which refers to a
range of networks and devices at or near the user. Edge is about
processing data closer to where it’s being generated, enabling processing
at greater speeds and volumes, leading to greater action-led results in real
time.
•It offers some unique advantages over traditional models, where computing power
is centralized at an on-premise data center. Putting compute at the edge allows
companies to improve how they manage and use physical assets and create new
interactive, human experiences. Some examples of edge use cases include self-
driving cars, autonomous robots, smart equipment data and automated retail.
•Possible components of edge include:
•Edge devices: We already use devices that do edge computing every day—like
smart speakers, watches and phones – devices which are locally collecting and
processing data while touching the physical world. Internet of Things (IoT) devices,
point of sales (POS) systems, robots, vehicles and sensors can all be edge devices—
if they compute locally and talk to the cloud.
•Network edge: Edge computing doesn’t require a separate “edge network” to
exist (it could be located on individual edge devices or a router, for example). When
a separate network is involved, this is just another location in the continuum
between users and the cloud and this is where 5G can come into play. 5G brings
extremely powerful wireless connectivity to edge computing with low latency and
high cellular speed, which brings exciting opportunities like autonomous drones,
remote telesurgery, smart city projects and much more. The network edge can be
particularly useful in cases where it is too costly and complicated to put compute on
premises and yet high responsiveness is required (meaning the cloud is too distant).
•On-premises infrastructure: These are for managing local systems and
connecting to the network and could be servers, routers, containers, hubs or
bridges.
15. Assessment Schedule
20
15. Assessment Schedule
SCHEDULED ON 24/09/23
SCHEDULED ON 28/10/23
16. Prescribed Text Books &
Reference Books
22
Prescribed Text Books & Reference Books
TEXT BOOKS:
•1. Daniel Minoli, Building the Internet of Things with IPv6 and MIPv6: The Evolving World
of M2M Communications,First Edition, Wiley Publications, 2013
•2. Dieter Uckelmann , Mark Harrison, Florian Michahelles, Architecting the Internet of
Things, Springer-Verlag Berlin Heidelberg 2011 Industry 4.0: The Industrial Internet of Things
REFERENCES:
•1. Hakima Chaouchi,The Internet of Things Connecting Objects to the Web Willy
Publications.
•2. Olivier Hersent, David Boswarthick, Omar Elloumi, The Internet of Things: Key
Applications and Protocols, Second Edition,Wiley Publications
• 3. Internet of Things - From Research and Innovation to Market Deployment; by
OvidiuVermesan & Peter Friess; 2014, River Publishers Series
•4. How Protocol Conversion Addresses IIoT Challenges:White Paper By RedLion.
•5. Alasdair Gilchrist, Industry 4.0: The Industrial Internet of Things,First Edition,Kindle
Edition
17. Mini Project suggestions
24
17. Mini Project suggestions
Disclaimer:
This document is confidential and intended solely for the educational purpose of RMK
Group of Educational Institutions. If you have received this document through email in
error, please notify the system manager. This document contains proprietary
information and is intended only to the respective group / learning community as
intended. If you are not the addressee you should not disseminate, distribute or copy
through e-mail. Please notify the sender immediately by e-mail if you have received this
document by mistake and delete this document from your system. If you are not the
intended recipient you are notified that disclosing, copying, distributing or taking any
action in reliance on the contents of this information is strictly prohibited.