IOT Architecture and Protocols Unit-1
IOT Architecture and Protocols Unit-1
Ms.SHRUTI SAXENA 1
Definition
IOT is a term that refers to the connection of objects to
each other and to human through the internet.
It s a network of physical devices embedded with
sensors software and other technologies.
Ms.SHRUTI SAXENA 3
Goals of IOT
To extend Internet connectivity from standard devices
such as Computers mobile phones and electronic
devices
Ms.SHRUTI SAXENA 4
IoT Evolution
Ms.SHRUTI SAXENA 5
IoT: People Connecting with Things
ECG sensor
Internet
Motion sensor
Motion sensor
Motion sensor
Ms.SHRUTI SAXENA 6
IoT: Things Connecting with Things
Ms.SHRUTI SAXENA 7
Iot sensors
An IoT sensor, short for Internet of Things sensor, is a
mechanism embedded in a physical device to collect
data from its surrounding environment.
These sensors transfer the gathered data to other
devices or systems over the internet. Various sensor
types, such as pressure, temperature, sound sensors,
etc.
Ms.SHRUTI SAXENA 8
Actuators
An IoT device is made up of a Physical object (“thing”) +
Controller (“brain”) + Sensors + Actuators + Networks
(Internet).
An actuator is a machine component or system that moves
or controls the mechanism of the system. Sensors in the
device sense the environment, then control signals are
generated for the actuators according to the actions needed
to perform.
Ms.SHRUTI SAXENA 10
Ms.SHRUTI SAXENA 11
Characteristics of IoT
Unique identity
Ms.SHRUTI SAXENA 12
Characteristics of IoT
Interconnectivity
Heterogeneity
Things related services
Intelligence
Enormity of scale: The word enormity
means something is of extreme scale,
greatness, or immensity
Ms.SHRUTI SAXENA 13
Benefits of IoT/Drawbacks of IoT
Minimize human efforts Security Flaws
Saves time Complexity
Efficient resource
Increasing unemployment
utilization
Associated Costs
Improving Quality of life
Security Compatibility
1. Wind turbines: A wind turbine can contain about 400 sensors. The sensors can deliver
information like the wind's speed, its direction, temperature, vibration, noise level etc. to wind
turbines. This data, nowadays is packaged and shipped into the cloud.
2. Machines for farming: All equipment related to farming are fitted with sensors only.
3. Clinical Analysers: Hematology analysers used in clinics are also based on IoT. For example
sysmex XE-5000 reports 31 whole blood parameters at a rate of 150 samples per hour.
4. Alarm: The alarm makes you get up in time for you to catch the train. This is checked by the
clock with the train timings online.
5. Medicine time: A blinking light might alert you about your medicine time.
6. Smart cities: IoT has made remarkable progress for smart cities by providing smart buildings,
smart power, smart water, better air quality, noise control and monitoring, traffic congestion
control, smart streetlights, smart parking and smart communications.
7. Safe home security system, water level monitoring, digital clock, street light control, motor
speed control, home automations are some of the areas where IoT has contributed a lot.
8. Present day Artificial Intelligence(ML+DL) applications along with IoT has proved to be very
useful.[
9. Researchers have found 5G as a driving force for IoT.
Ms.SHRUTI SAXENA 15
Applications of IoT
Ms.SHRUTI SAXENA 16
Building an architecture:
Ms.SHRUTI SAXENA 17
Ms.SHRUTI SAXENA 18
Ms.SHRUTI SAXENA 19
Ms.SHRUTI SAXENA 20
Ms.SHRUTI SAXENA 21
Ms.SHRUTI SAXENA 22
Main design principles and needed
capabilities
Basic design principles for IoT architecture design are:
Open source:IoT open source architecture refers to the use of
open source frameworks and devices in the Internet of Things
(IoT):
Open source frameworks
These frameworks provide access to the code of the platform,
which allows for modifications and more freedom in building
IoT applications.
Ms.SHRUTI SAXENA 24
Design for ensuring the privacy,security and trusted
real world services.
Scalability, performance and effectiveness
Evolvability , heterogeneity and simplicity integration
Simplicity of management
Design of different service delivery models
Life cycle support
Ms.SHRUTI SAXENA 25
NEEDED CAPABILITIES
Five entities behind IoT are:
1-Device platform consists of device and
microcontrollers(at custom chips or circuit boards)
2-Software for device APIs and Interfacing
3-Connecting and Networking protocols
4-Server and Application program
5-Cloud platform for storage and computing
Ms.SHRUTI SAXENA 26
Application (Servics and Applications)L4
Ms.SHRUTI SAXENA 27
IoT Capabilities are required to design device layer with Device
and Gateway capabilities. The following are the components:
Ms.SHRUTI SAXENA 28
Transport and Network capabilities
The Internet of Things (IoT) has many capabilities in transportation,
including:
Fleet management
IoT allows fleet managers to monitor driver activity and on-duty time, and
assign work more efficiently.
Real-time tracking
IoT enables companies to track the location of their vehicles and cargo in real
time. This can help with route management and responding to issues.
Predictive analytics
IoT can analyze traffic data to help transportation systems learn from patterns
and trends. This can help with route planning and minimizing delays.
Supply chain visibility
IoT can help logistics businesses provide real-time shipment tracking and
delivery estimates.
.
Ms.SHRUTI SAXENA 29
Cargo monitoring
IoT can monitor the condition of cargo, such as
temperature, humidity, and vibrations. This can help
ensure the integrity of the cargo, especially for perishable
goods, electronics, or pharmaceuticals.
Public transportation
IoT can help decongest traffic and roads, and ensure that
there is efficient monitoring and compliance with parking
specifications.
Intelligent transportation system
IoT can help drivers find the best route based on real-time
conditions, alert drivers of potentially hazardous
situations, and guide drivers to empty parking spaces
Ms.SHRUTI SAXENA 30
Transport and Network capabilities
Some network requirements for IoT applications include:
Reliable internet connection: IoT applications need a
reliable internet connection to function properly.
Low latency: Low latency is important for real-time IoT
applications where delays can impact critical operations.
Scalability: IoT applications need to be scalable.
Data security: IoT applications need to ensure data
security.
Interoperability: IoT applications need to be interoperable.
Ms.SHRUTI SAXENA 31
Service and Application Support Layer
(Generic and specific Support capabilities
In IOT generic support capabilities are common capabilities that can be
used by many IoT applications, while specific support capabilities are
capabilities that are tailored to the needs of specific applications:
Generic support capabilities
These capabilities are common and can be used by many IoT
applications, such as data storage and data processing. They can also be
used by specific support capabilities to build other specific support
capabilities.
Specific support capabilities
These capabilities are tailored to the needs of specific applications,
such as telematics/Telecommunication or e-health. They can be made
up of various detailed capability groupings that provide different
support functions to different IoT applications.
Ms.SHRUTI SAXENA 32
Main Design Principles of
IoT
We understand the design principles of IoT from
two perspectives:-
Ms.SHRUTI SAXENA 33
PHYSICAL DESIGN OF
IOT
protocols
Iot devices
Ms.SHRUTI SAXENA 34
IOT DEVICES OR THINGS:
The "Things" in IoT usually refers to IoT devices which have
unique identities and can perform remote sensing and
actuating and have monitoring capabilities.
IoT devices can:
Exchange data with other connected devices and
applications (directly or indirectly), or
Collect data from other devices and process the data locally,
or
Send the data to centralized servers or cloud-based
application back-ends f or processing the data, or
Perform some tasks locally and other tasks within the IoT
Ms.SHRUTI SAXENA 35
IOT DEVICES
HOME APPLIANCE
SMART PHONE
WEARABLE AUTOMOBILE
ENERGY SYSTEM
RETAIL
POINTER
INDUSTRIAL MACHINE
HEALTHCARE SYSTEM
SURVELIANCE CAMERA
Ms.SHRUTI SAXENA 36
Generic Block Diagram of an IoT
Device (Architecture)
Ms.SHRUTI SAXENA 37
Generic Block Diagram of an IoT Device
(Architecture)
1. Functional Blocks
2. Communication Models
Ms.SHRUTI SAXENA 39
Architectural/Functional View
Device
These devices are used to provide sensing and
monitoring control functions that collect data from
the outer environment.
Communication
This block handles the communication between the
client and the cloud-based server and sends/receives
the data using protocols.
Services
This functional block provides some services like
monitoring and controlling a device and publishing
and deleting the data and restoring the system.
Management
This functional block provides various functions that
are used to manage an IoT system.
Security
This block is used to secure an IoT system using some
functions like authorization, data security, Fig:- IoT Functional model
authentication, 2-step verification, etc.
IoT system consists of many functional blocks that
Application provide the system capability for identification,
It is an interface that provides a control system that communication, sensing, management, security and
use by users to view the status and analyze of system.
Ms.SHRUTI SAXENA actuation. 40
IoT Communication Models
Ms.SHRUTI SAXENA 41
IoT Communication Models
There are several different types of models available in an IoT system that is used to communicate between the
system and server like the request-response model, publish-subscribe model, push-pull model, exclusive pair
model, etc.
Example
When we search a query on a browser then the browser
submits an HTTP request to the server and then the server
returns a response to the browser(client).
Ms.SHRUTI SAXENA 42
IoT Communication Models
Publish-Subscribe Communication
Model
Example
On the website many times we subscribed to their
newsletters using our email address. these email
addresses are managed by some third-party services and
when a new article is published on the website it is
directly sent to the broker and then the broker sends
these new data or posts to all the subscribers.
Ms.SHRUTI SAXENA 43
IoT Communication Models
Push-Pull Communication Model
Example
Ms.SHRUTI SAXENA 44
IoT Communication Models
Exclusive Pair Communication Model
and the server and remain open until the client sends a
connection setup.
Ms.SHRUTI SAXENA 45
IoT Communication APIs
1. Client-Server
Here the client is not aware of the storage of data because it is concerned about the server and
similarly the server should not be concerned about the user interface because it is a concern of
the client. and this separation is needed for independent development and updating of server
and client, no matter how the client is using the response of the server and no matter how the server is
using the request of the client.
Ms.SHRUTI SAXENA 46
2. Stateless
It means each request from the client to the server must contain all the
necessary information to understand by the server, because if the server can't
understand the request of the client then it can't fetch the request data in a
proper manner.
3. Cacheable
In response, if the cache constraints are given then a client can reuse that
response in a later request. it improves the efficiency and scalability of the
system without loading the extra data.
A RESTful web APIs is implemented using HTTP and REST principles.
WebSocket Based Communication API
This type of API allows bi-directional full-duplex communication between
server and client using the exclusive pair communication model.
this API uses full-duplex communication so it does not require a new
connection setup every time when it requests new data. WebSocket API begins
with a connection setup between the server and client and if the WebSocket is
supported by the server then it responds back to the client with the successful
response after the setup of a connection server and the client can send data to
each other in full-duplex mode.
this type of API reduces the traffic and latency of data and makes sure that each
time when we request new data it cannot terminate the request.
Ms.SHRUTI SAXENA 47
IoT Communication APIs
Ms.SHRUTI SAXENA 49
Ms.SHRUTI SAXENA 50
Ms.SHRUTI SAXENA 51
Ms.SHRUTI SAXENA 52
Ms.SHRUTI SAXENA 53
Ms.SHRUTI SAXENA 54
Ms.SHRUTI SAXENA 55
Design Standards considerations:
Ms.SHRUTI SAXENA 56
Design Standards
1. ITU-T
2. ETSI
3. OGC
Ms.SHRUTI SAXENA 57
Design Standards
Ms.SHRUTI SAXENA 58
Design Standards
Ms.SHRUTI SAXENA 59
Design Standards
Ms.SHRUTI SAXENA 60
M2M and IoT Technology:-
Machine-to-Machine Communication
(M2M)
Machine-to-Machine (M2M) communication is a form of data communication that
involves one or more entities that do not necessarily require human interaction or
intervention in the process of communication. M2M is also named as Machine Type
Communication (MTC) in 3GPP. It is different from the current communication
models in the ways that it involves: -
- new or different market scenarios
- lower costs and effort
- a potentially very large number of communicating terminals
- little traffic per terminal, in general
M2M communication could be carried over mobile networks (e.g. GSM-GPRS,
CDMA EVDO networks). In the M2M communication, the role of mobile network is
largely confined to serve as a transport network. With a potential market of probably
50 million connected devices, M2M offers tremendous opportunities as well as
unique challenges. These devices vary from highly-mobile vehicles communicating in
real-time, to immobile meter-reading appliances that send small amounts of data
periodically.
Ms.SHRUTI SAXENA 61
Ms.SHRUTI SAXENA 62
Applications of M2M
The applications of M2M cover many areas and the areas in which M2M is
currently used are given below:
a.Security : Surveillances, Alarm systems, Access control, Car/driver
security
b.Tracking & Tracing : Fleet Management, Order Management,
Pay as you drive, Asset Tracking, Navigation, Traffic information, Road
tolling, Traffic optimization/steering
c.Payment : Point of sales, Vending machines, Gaming machines
d.Health : Monitoring vital signs, Supporting the aged or
handicapped, Web Access Telemedicine points, Remote diagnostics
e.Remote Maintenance/Control : Sensors, Lighting, Pumps,
Valves, Elevator control, Vending machine control, Vehicle diagnostics
f. Metering : Power, Gas, Water, Heating, Grid control, Industrial
metering
g.Manufacturing : Production chain monitoring and automation
h.Facility Management : Home / building / campus automation
Ms.SHRUTI SAXENA 63
IoT/M2M Systems Layers and design
standardization
Ms.SHRUTI SAXENA 64
Layers of OSI Model
1. Physical Layer (Layer 1) :
The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual physical connection between the
devices. The physical layer contains information in the form of bits. It is responsible for transmitting individual bits from one
node to the next. When receiving data, this layer will get the signal received and convert it into 0s and 1s and send them to the
Data Link layer, which will put the frame back together.
2. Data Link Layer (DLL) (Layer 2) :
The data link layer is responsible for the node-to-node delivery of the message. The main function of this layer is to make sure
data transfer is error-free from one node to another, over the physical layer. When a packet arrives in a network, it is the
responsibility of DLL to transmit it to the Host using its MAC address.
Data Link Layer is divided into two sub layers: (a) Logical Link Control (LLC) (b) Media Access Control (MAC)
3. Network Layer (Layer 3) :
The network layer works for the transmission of data from one host to the other located in different networks. It also takes care
of packet routing i.e. selection of the shortest path to transmit the packet, from the number of routes available. The sender &
receiver’s IP addresses are placed in the header by the network layer.
4. Transport Layer (Layer 4) :
The transport layer provides services to the application layer and takes services from the network layer. The data in the transport
layer is referred to as Segments. It is responsible for the End to End Delivery of the complete message. The transport layer also
provides the acknowledgementof the successful data transmission and re-transmits the data if an error is found.
5. Session Layer (Layer 5) :
This layer is responsible for the establishment of connection, maintenance of sessions, authentication, and also ensures
security.
6. Presentation Layer (Layer 6):
The presentation layer is also called the Translation layer. The data from the application layer is extracted here and
manipulated as per the required format to transmit over the network.
7. Application Layer (Layer 7) :
At the very top of the OSI Reference Model stack of layers, we find the Application layer which is implemented by the network
applications. These applications produce the data, which has to be transferred over the network. This layer also serves as a
window for the application services to access the network and for displaying the received information to the user.
Example: Application – Browsers, Skype Messenger, etc.
Ms.SHRUTI SAXENA 65
IoT v/s M2M
Ms.SHRUTI SAXENA 66
M2M vs IoT
Ms.SHRUTI SAXENA 67
Comparison between IoT and M2M:
Ms.SHRUTI SAXENA 68
Ms.SHRUTI SAXENA 69
Ms.SHRUTI SAXENA 70
LOCAL AND WIDE AREA NETWORKING:-
Ms.SHRUTI SAXENA 71
Ms.SHRUTI SAXENA 72
Ms.SHRUTI SAXENA 73
Ms.SHRUTI SAXENA 74
Ms.SHRUTI SAXENA 75
Ms.SHRUTI SAXENA 76
Ms.SHRUTI SAXENA 77
Ms.SHRUTI SAXENA 78
Ms.SHRUTI SAXENA 79
Ms.SHRUTI SAXENA 80
The Internet of Things (IoT) device management enables users to track, monitor
and manage the devices to ensure these work properly and securely after
deployment.
Billions of sensors interact with people, homes, cities, farms, factories,
workplaces, vehicles, wearables and medical devices, and beyond.
The Internet of Things (IoT) is changing our lives from managing home
appliances to vehicles. Devices can now advise us about what to do, when to do
and where to go. Industrial applications of the IoT assist us in managing
processes, and predicting faults and disasters. The IoT platforms help set and
maintain parameters to refine and store data accordingly.
Ms.SHRUTI SAXENA 81
Ms.SHRUTI SAXENA 82
Data management :-is the process of taking the overall
available data and refining it down to important information.
Different devices from different applications send large volumes and
varieties of information. Managing all this IoT data means
developing and executing architectures, policies, practices and
procedures that can meet the full data lifecycle needs.
Ms.SHRUTI SAXENA 83
Data from IoT devices is used for analytical purposes. Information that
businesses collect and store but remains relatively stagnant, because it is
not used for analytical purposes, is called dark data. It includes customer
demographic information, purchase histories and satisfaction levels, or
general product data. To better understand customers, dark data is
invaluable to businesses, as it allows them to uncover additional insights
more efficiently.
Before the release of a product, IoT data management requires field tests.
Data from the field tests helps improve the design and create a higher-
quality product. Collecting field data post-launch helps in continuous
product improvement with software updates and by identifying
anomalies. This also provides important insights to support the
development process of new products.
Ms.SHRUTI SAXENA 84
The IoT data management
In edge computing, data is processed near the data source or at the edge of
the network. While in a typical cloud environment, data processing
happens in a centralised data storage location. By processing and using
some data locally, the IoT saves storage space for data, processes
information faster and meets security challenges.
Sensors produce a large amount of data for edge gateway devices so that
these can make decisions by analysing the data. These high-performance
systems not only need to collect data in real time but also to organise and
provide data to other systems.
Ms.SHRUTI SAXENA 85
Sensors and devices can connect indirectly through the cloud, where data is
centrally-managed, or send data directly to other devices to locally collect,
store and analyse the data, and then share selected findings or information
with the cloud. Edge devices for data management help secure the most
valuable data and reduce bandwidth cost. These also provide great
performance, ownership over data and lower maintenance cost.
Edge devices run a Web-based dashboard that end-users can access to monitor
the flow of data, so they can decide how various systems in demonstration and
devices are running, and get notified by alarms. A large amount of data can be
represented in the form of a graph for any desired range of time, and each
point on the graph represents a record that can be found by searching the
database, which stores a large quantity of data.
Ms.SHRUTI SAXENA 86
DATA COLLECTION AND ANALYSIS:-Data collection and analysis in the Internet
of Things (IoT) involves using sensors to monitor and track the performance of IoT
devices, and then analyzing the data to gain insights:
Data collection
Sensors collect and transmit data about the status of IoT devices and networks in real
time. This data can be stored and retrieved at any time.
Data analysis
Data analysis can involve using machine learning, specialized logic, or real-time analytics
to extract insights from the data. This can help optimize operations, improve customer
experiences, and more.
The choice of data collection and analysis method depends on the use case. For example,
some applications can tolerate delays, while others, like security applications, need to be
time-critica
Ms.SHRUTI SAXENA 87
BIG DATA:-big data represents large volumes of information and data
sets that are defined by three Vs characteristics, including volume, velocity,
and variety. Big data can come from many different sources like social media
posts, the Internet of Things, sensors, etc. Because the number of people using
modern technology is increasing, the data storage of big data is increasingly
fostered over time. Instead of wasting this data source, businesses can gain
huge benefits in terms of users’ insights and market trends when extracting
and analyzing data sets.
The value of big data lies in whether the business can successfully handle the
data visualization process, not the raw data itself. However, due to the
complexity and massive volume of both structured and unstructured data,
humans cannot process these valuable data in the usual way with traditional
methods for processing and analyzing information. Fortunately, big data
analytics can now turn into actionable insights thanks to computing
advancements such as artificial intelligence (AI) and machine learning (ML)
technologies.
Ms.SHRUTI SAXENA 88
A Semantic Sensor Network (SSN) is a widely used
standard for describing sensors and devices in the Internet of Things
(IoT). The SSN ontology is a Web Ontology Language (OWL2) ontology
that describes sensors and the observations they make.
The SSN ontology has been used in a number of projects to improve the
management of sensor data on the web. These projects include annotation,
integration, publishing, and search
Ms.SHRUTI SAXENA 89
Virtual sensors are software-based models of physical sensors that
can simulate their behaviour and generate sensor readings without
the need for actual physical hardware. They can be used as digital
twins to monitor or control a physical sensor, providing cost-
effective and scalable solutions for certain applications.
Ms.SHRUTI SAXENA 90
Virtual sensors can be used in IoT for data management in a number of ways,
including:
Flexibility
Virtual sensors can be redesigned as needed, while physical sensors are often only
repositioned mechanically.
Cost-effective
Virtual sensors can be cost-effective and scalable solutions for certain
applications.
Simulating data
Virtual sensors can be used to simulate data for testing purposes, especially when
physical sensors aren't available.
Ms.SHRUTI SAXENA 91
Ms.SHRUTI SAXENA 92
Ms.SHRUTI SAXENA 93
Ms.SHRUTI SAXENA 94
Ms.SHRUTI SAXENA 95
Ms.SHRUTI SAXENA 96
Ms.SHRUTI SAXENA 97
Ms.SHRUTI SAXENA 98
Ms.SHRUTI SAXENA 99
Ms.SHRUTI SAXENA 100
Ms.SHRUTI SAXENA 101
Ms.SHRUTI SAXENA 102
Ms.SHRUTI SAXENA 103
Ms.SHRUTI SAXENA 104
Ms.SHRUTI SAXENA 105
Ms.SHRUTI SAXENA 106
Everything as a Service (XaaS) :
Before only cloud computing technology was there and various cloud
service providers were providing various cloud services to the
customers. But now a new concept has emerged i.e Everything as a
Service (XaaS) means anything can now be a service with the help
of cloud computing and remote accessing. Where cloud computing
technologies provide different kinds of services over the web networks.