0% found this document useful (0 votes)
76 views

IOT Architecture and Protocols Unit-1

Uploaded by

Priyanshu Kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views

IOT Architecture and Protocols Unit-1

Uploaded by

Priyanshu Kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 122

UNIT-1

Ms.SHRUTI SAXENA 1
Definition
 IOT is a term that refers to the connection of objects to
each other and to human through the internet.
 It s a network of physical devices embedded with
sensors software and other technologies.

 Vision:-The purpose of IOT is connecting and


exchanging data with other devices and system over
the internet.
 Things:-These are the objects such as
Mobile,Computer,Washing Machine,TV,Watch etc.are
accessible or connected through the internet.
Ms.SHRUTI SAXENA 2
 For example just putting an Ethernet socket into a chair is not
sufficient. Your chair might collect information about how often
you sit on it and for how much time.
 Also not that the presence of things also means that it can
produce outputs into your world with “actuators” some of these
outputs could be triggered by data that has been collected and
processed on the internet so your chair might vibrate to tell you
that you have received an email.

 This can be shown with the help of a simple equation also:


IOT Conceptual framework:

 [Physical Object] + [Controllers, Sensors, Actuators] + [Internet]


=Internet of Things
 {Hardware} {Software} {Service} = Things

Ms.SHRUTI SAXENA 3
Goals of IOT
 To extend Internet connectivity from standard devices
such as Computers mobile phones and electronic
devices

 IOT makes everything smart.

 The term Internet of things was invented by Kevin


Ashton in 1999.
 IOT makes every object- addressable, accessible,
actionable.

Ms.SHRUTI SAXENA 4
IoT Evolution

Ms.SHRUTI SAXENA 5
IoT: People Connecting with Things

ECG sensor

Internet

Motion sensor

Motion sensor
Motion sensor

Ms.SHRUTI SAXENA 6
IoT: Things Connecting with Things

- Complex and heterogeneous


resources and networks

Ms.SHRUTI SAXENA 7
Iot sensors
 An IoT sensor, short for Internet of Things sensor, is a
mechanism embedded in a physical device to collect
data from its surrounding environment.
 These sensors transfer the gathered data to other
devices or systems over the internet. Various sensor
types, such as pressure, temperature, sound sensors,
etc.

Ms.SHRUTI SAXENA 8
Actuators
 An IoT device is made up of a Physical object (“thing”) +
Controller (“brain”) + Sensors + Actuators + Networks
(Internet).
 An actuator is a machine component or system that moves
or controls the mechanism of the system. Sensors in the
device sense the environment, then control signals are
generated for the actuators according to the actions needed
to perform.

 (Supporting device which help other devices to operate. the


device that makes something move or operate.)
Ms.SHRUTI SAXENA 9
IoT controller
 At the heart of any IoT system lies the critical component of an
IoT controller, which manages and controls the flow of data
and communication between devices in the network.

 An IoT controller is a device or software that enables


communication and coordination between different IoT
devices, ranging from sensors and smart thermostats to
industrial machinery and healthcare equipment.

 These controllers act as a bridge between the devices and the


cloud or other remote servers, providing a centralized point of
control for managing and optimizing the performance of
connected devices.

Ms.SHRUTI SAXENA 10
Ms.SHRUTI SAXENA 11
Characteristics of IoT

 Dynamic and self-adapting


 Self-configuring

 Interoperable communication protocols

 Unique identity

 Integrated into the information network

Ms.SHRUTI SAXENA 12
Characteristics of IoT
 Interconnectivity
 Heterogeneity
 Things related services
 Intelligence
 Enormity of scale: The word enormity
means something is of extreme scale,
greatness, or immensity

Ms.SHRUTI SAXENA 13
Benefits of IoT/Drawbacks of IoT
 Minimize human efforts  Security Flaws
 Saves time Complexity
 Efficient resource
Increasing unemployment
utilization
 Associated Costs
 Improving Quality of life
 Security Compatibility

 User friendly/easy to use Technology takes control of

 Cost reduction life


 Business opportunities  Power Supply Dependence

 Ability to access  Network Dependence


information from  High Skill requirements
anywhere at anytime on
any device Ms.SHRUTI SAXENA 14
IoT Examples
 Things are getting smarter day by day. Present day phones have 14 sensors and more some of
the examples put under IoT category or as follows:-

1. Wind turbines: A wind turbine can contain about 400 sensors. The sensors can deliver
information like the wind's speed, its direction, temperature, vibration, noise level etc. to wind
turbines. This data, nowadays is packaged and shipped into the cloud.
 2. Machines for farming: All equipment related to farming are fitted with sensors only.
 3. Clinical Analysers: Hematology analysers used in clinics are also based on IoT. For example
sysmex XE-5000 reports 31 whole blood parameters at a rate of 150 samples per hour.
 4. Alarm: The alarm makes you get up in time for you to catch the train. This is checked by the
clock with the train timings online.
 5. Medicine time: A blinking light might alert you about your medicine time.
 6. Smart cities: IoT has made remarkable progress for smart cities by providing smart buildings,
smart power, smart water, better air quality, noise control and monitoring, traffic congestion
control, smart streetlights, smart parking and smart communications.
 7. Safe home security system, water level monitoring, digital clock, street light control, motor
speed control, home automations are some of the areas where IoT has contributed a lot.
 8. Present day Artificial Intelligence(ML+DL) applications along with IoT has proved to be very
useful.[
 9. Researchers have found 5G as a driving force for IoT.

Ms.SHRUTI SAXENA 15
Applications of IoT

Ms.SHRUTI SAXENA 16
Building an architecture:

Ms.SHRUTI SAXENA 17
Ms.SHRUTI SAXENA 18
Ms.SHRUTI SAXENA 19
Ms.SHRUTI SAXENA 20
Ms.SHRUTI SAXENA 21
Ms.SHRUTI SAXENA 22
Main design principles and needed
capabilities
Basic design principles for IoT architecture design are:
 Open source:IoT open source architecture refers to the use of
open source frameworks and devices in the Internet of Things
(IoT):
 Open source frameworks
These frameworks provide access to the code of the platform,
which allows for modifications and more freedom in building
IoT applications.

 Open source devices


 These devices are designed to connect to the internet, and their
software or firmware coding is available for anyone to use,
modify, and distribute.
Benefits are:-Collabration Transparency and lower cost.
Ms.SHRUTI SAXENA 23
 Reuse of resources across application domains and
across wide range of applications.
 Support services that are open service oriented
capabilities
 Different abstraction levels which hide the underlying
complexities and heterogeneities
 Sensing and actuators taking different roles of
providing the services across different business
domains and value chains

Ms.SHRUTI SAXENA 24
 Design for ensuring the privacy,security and trusted
real world services.
 Scalability, performance and effectiveness
 Evolvability , heterogeneity and simplicity integration
 Simplicity of management
 Design of different service delivery models
 Life cycle support

Ms.SHRUTI SAXENA 25
NEEDED CAPABILITIES
 Five entities behind IoT are:
1-Device platform consists of device and
microcontrollers(at custom chips or circuit boards)
2-Software for device APIs and Interfacing
3-Connecting and Networking protocols
4-Server and Application program
5-Cloud platform for storage and computing

Ms.SHRUTI SAXENA 26
Application (Servics and Applications)L4

Service and Application Support Layer


(Generic and specific Support capabilities) L3

Network layer(Transport and Network capabilities) L2

Device Layer(Device and Gateway capabilities) L1

ITU –T Reference model with different capabilities

Ms.SHRUTI SAXENA 27
 IoT Capabilities are required to design device layer with Device
and Gateway capabilities. The following are the components:

1-Design a physical object with device hardware consisting or


micro controller,firmware including
sensors,actuators,radio frequency
identification(RFID)device and wireless sensor
node(WSN)node.
2-Design the communication module at the device:-Software
consisting or device APIs and device interface for
communication over the network and communication circuits.
3-Software for device actions on the message,information or
commands received followed by outputs for the actuators,such
as glowing LEDs streetlights.
4-Communication Gateway Internet connectivity capabilities
require design of LoRaWAN,IPv4,IPv6 and 6LowPAN
communiucation stack.

Ms.SHRUTI SAXENA 28
Transport and Network capabilities
 The Internet of Things (IoT) has many capabilities in transportation,
including:

 Fleet management
 IoT allows fleet managers to monitor driver activity and on-duty time, and
assign work more efficiently.

 Real-time tracking
 IoT enables companies to track the location of their vehicles and cargo in real
time. This can help with route management and responding to issues.

 Predictive analytics
 IoT can analyze traffic data to help transportation systems learn from patterns
and trends. This can help with route planning and minimizing delays.

 Supply chain visibility
 IoT can help logistics businesses provide real-time shipment tracking and
delivery estimates.

 .

Ms.SHRUTI SAXENA 29
 Cargo monitoring
 IoT can monitor the condition of cargo, such as
temperature, humidity, and vibrations. This can help
ensure the integrity of the cargo, especially for perishable
goods, electronics, or pharmaceuticals.

 Public transportation
 IoT can help decongest traffic and roads, and ensure that
there is efficient monitoring and compliance with parking
specifications.

 Intelligent transportation system
 IoT can help drivers find the best route based on real-time
conditions, alert drivers of potentially hazardous
situations, and guide drivers to empty parking spaces
Ms.SHRUTI SAXENA 30
Transport and Network capabilities
 Some network requirements for IoT applications include:
 Reliable internet connection: IoT applications need a
reliable internet connection to function properly.
 Low latency: Low latency is important for real-time IoT
applications where delays can impact critical operations.
 Scalability: IoT applications need to be scalable.
 Data security: IoT applications need to ensure data
security.
 Interoperability: IoT applications need to be interoperable.

Ms.SHRUTI SAXENA 31
Service and Application Support Layer
(Generic and specific Support capabilities
 In IOT generic support capabilities are common capabilities that can be
used by many IoT applications, while specific support capabilities are
capabilities that are tailored to the needs of specific applications:

 Generic support capabilities
 These capabilities are common and can be used by many IoT
applications, such as data storage and data processing. They can also be
used by specific support capabilities to build other specific support
capabilities.

 Specific support capabilities
 These capabilities are tailored to the needs of specific applications,
such as telematics/Telecommunication or e-health. They can be made
up of various detailed capability groupings that provide different
support functions to different IoT applications.

Ms.SHRUTI SAXENA 32
Main Design Principles of
IoT
We understand the design principles of IoT from
two perspectives:-

1. Physical Design of IoT

2. Logical Design of IoT

Ms.SHRUTI SAXENA 33
PHYSICAL DESIGN OF
IOT

protocols
Iot devices

Ms.SHRUTI SAXENA 34
IOT DEVICES OR THINGS:
 The "Things" in IoT usually refers to IoT devices which have
unique identities and can perform remote sensing and
actuating and have monitoring capabilities.
 IoT devices can:
 Exchange data with other connected devices and
applications (directly or indirectly), or
 Collect data from other devices and process the data locally,

or
 Send the data to centralized servers or cloud-based
application back-ends f or processing the data, or
 Perform some tasks locally and other tasks within the IoT

 infrastructure, based on temporal and space constraints

Ms.SHRUTI SAXENA 35
IOT DEVICES
 HOME APPLIANCE
 SMART PHONE
 WEARABLE AUTOMOBILE
 ENERGY SYSTEM
 RETAIL
 POINTER
 INDUSTRIAL MACHINE
 HEALTHCARE SYSTEM
 SURVELIANCE CAMERA
Ms.SHRUTI SAXENA 36
Generic Block Diagram of an IoT
Device (Architecture)

Ms.SHRUTI SAXENA 37
Generic Block Diagram of an IoT Device
(Architecture)

 An IoT de vice may consis t of


several interfaces for
c o nnec t io ns to other devices, b ot h
w i r e d and wireless.
 I/O interfaces for sensors
 I nterfac es for internet connectivity
 Memory and storage interfaces
 Audio/video interfaces

AUDIO VIDEO INTERFACE:-


HDMI-High Definition Multimedia
connection
(Used for high quality of audio and videos)
Connectivity:
3.5 MM Audio- Used for Headphones
RCA Video- Radio Corporation of America USB HOST-universal serial bus
(Used for composite videos ) RJ45-Registered Jack cable used for Ethernet Network
STORAGE INTERFACE:- I/O INTERFACE
SD - Secure Digital (memory card used to store UART- Universal Asynchronous Receiver & Transmitter ( simplest &
data of smart phones, video record, music players)
oldest form of D2D Digital Comm.)
MMC - Multimedia Card (memory card)
SPI - serial Peripheral Interface (used in short distance Comm.)
SDIO - Secure Digital Input output (used for input –
output devices) I2C - inter Integrated Circuit (used in video devices like TV, VCR, Monitor)
Logical Gates found in memory cards :- CAN - Controller Area network (n/w of independent controller)
NAND- NOT AND , NOR- NOT OR
USB Host
DDR- - Universal
Double Data Serial Bus (System used to
rate (Memory can send & receive RJ45-Registered Jack (cable used for ethernet network)
connect multiple USB Client) Ms.SHRUTI SAXENA
data signal in double rate means twice per clock cycle)
Graphics-Graphics Processing Unit. 38
Logical Design of IoT
The logical design of an IoT system refers to an abstract
representation of entities and processes without going into the
low-level specifies of implementation. It uses :-

1. Functional Blocks

2. Communication Models

3. Communication APIs to implement a system.

Ms.SHRUTI SAXENA 39
Architectural/Functional View
Device
These devices are used to provide sensing and
monitoring control functions that collect data from
the outer environment.

Communication
This block handles the communication between the
client and the cloud-based server and sends/receives
the data using protocols.

Services
This functional block provides some services like
monitoring and controlling a device and publishing
and deleting the data and restoring the system.

Management
This functional block provides various functions that
are used to manage an IoT system.
Security
This block is used to secure an IoT system using some
functions like authorization, data security, Fig:- IoT Functional model
authentication, 2-step verification, etc.
IoT system consists of many functional blocks that
Application provide the system capability for identification,
It is an interface that provides a control system that communication, sensing, management, security and
use by users to view the status and analyze of system.
Ms.SHRUTI SAXENA actuation. 40
IoT Communication Models

1. Request Response Model

2. Publish – Subscribe Model

3. Push – Pull Model

4. Exclusive pair Model

Ms.SHRUTI SAXENA 41
IoT Communication Models
There are several different types of models available in an IoT system that is used to communicate between the
system and server like the request-response model, publish-subscribe model, push-pull model, exclusive pair
model, etc.

 Request-Response Communication Model


 This model is a communication model in which a client sends
the request for data to the server and the server responds
according to the request. when a server receives a request it
fetches the data, retrieves the resources and prepares the
response, and then sends the data back to the client. The server
may be remote or local and can handle request of multiple
clients. It is a stateless communication model and each request
–response pair is independent of other.

 In simple terms, we can say that in the request-response model


server send the response of equivalent to the request of the
client. in this model, HTTP works as a request-response
protocol between a client and server.

 Example
 When we search a query on a browser then the browser
submits an HTTP request to the server and then the server
returns a response to the browser(client).

Ms.SHRUTI SAXENA 42
IoT Communication Models
Publish-Subscribe Communication
Model

In this communication model, we have a broker between


publisher and consumer. here publishers are the source
of data but they are not aware of consumers. they send
the data managed by the brokers and when a consumer
subscribes to a topic that is managed by the broker and
when the broker receives data from the publisher it sends
the data to all the subscribed consumers.

Example
On the website many times we subscribed to their
newsletters using our email address. these email
addresses are managed by some third-party services and
when a new article is published on the website it is
directly sent to the broker and then the broker sends
these new data or posts to all the subscribers.

Ms.SHRUTI SAXENA 43
IoT Communication Models
 Push-Pull Communication Model

 It is a communication model in which the data push by the

producers in a queue and the consumers pull the data from

the queues. here also producers are not aware of the

consumers. Queues act as a buffer and are useful when

there is a mismatch between the rate at which the

producers push data and the data rate at which the

consumer pull data.

 Example

 When we visit a website we saw a number of posts that are

published in a queue and according to our requirements,

we click on a post and start reading it.

Ms.SHRUTI SAXENA 44
IoT Communication Models
 Exclusive Pair Communication Model

 It is a bidirectional fully duplex communication model

that uses a persistent connection between the client and

server. Here first set up a connection between the client

and the server and remain open until the client sends a

close connection request to the server.

 This is a stateful connection model and services is aware

of all open connections.

 Client and server can send messages to each other after

connection setup.

Ms.SHRUTI SAXENA 45
IoT Communication APIs

 API stands for application programming


interfaces.
 It is a set of functions, protocols, routines and tools used for building
application software.
 These APIs like REST and Web Socket are used to communicate between the server and system
in IoT.

 REST-Based Communication APIs


 Representational state transfer (REST) API uses a set of architectural principles that used to
design web services and web APIs. these APIs focus on the systems' resources that how resource
states are transferred using the request-response communication model. this API
uses some architectural constraints.

 1. Client-Server
 Here the client is not aware of the storage of data because it is concerned about the server and
similarly the server should not be concerned about the user interface because it is a concern of
the client. and this separation is needed for independent development and updating of server
and client, no matter how the client is using the response of the server and no matter how the server is
using the request of the client.
Ms.SHRUTI SAXENA 46
 2. Stateless
 It means each request from the client to the server must contain all the
necessary information to understand by the server, because if the server can't
understand the request of the client then it can't fetch the request data in a
proper manner.
 3. Cacheable
 In response, if the cache constraints are given then a client can reuse that
response in a later request. it improves the efficiency and scalability of the
system without loading the extra data.
 A RESTful web APIs is implemented using HTTP and REST principles.
 WebSocket Based Communication API
 This type of API allows bi-directional full-duplex communication between
server and client using the exclusive pair communication model.
this API uses full-duplex communication so it does not require a new
connection setup every time when it requests new data. WebSocket API begins
with a connection setup between the server and client and if the WebSocket is
supported by the server then it responds back to the client with the successful
response after the setup of a connection server and the client can send data to
each other in full-duplex mode.
 this type of API reduces the traffic and latency of data and makes sure that each
time when we request new data it cannot terminate the request.

Ms.SHRUTI SAXENA 47
IoT Communication APIs

 REST Web Socket


1. Stateless. 1. State full
2. Request Response Model. 2. Full Duplex Model.
3. It is unidirectional. 3. It is bidirectional.
4. Each Request involves 3. Single TCP Connection.
 setting up a new TCP
 Connection.
 4. Header Overhead. 4. No Header Overhead.
 5. Not Suitable for Real Time 5. Suitable for RTA.
 Applications (RTA).
 6. It is slower in execution. 6. It transmits messages very fastly.
7. It is used only when it’s 7. used when an application
 required by the web application demands uninterrupted data
delivery
Ms.SHRUTI SAXENA 48
IoT Communication APIs

Ms.SHRUTI SAXENA 49
Ms.SHRUTI SAXENA 50
Ms.SHRUTI SAXENA 51
Ms.SHRUTI SAXENA 52
Ms.SHRUTI SAXENA 53
Ms.SHRUTI SAXENA 54
Ms.SHRUTI SAXENA 55
Design Standards considerations:

Ms.SHRUTI SAXENA 56
Design Standards

1. ITU-T

2. ETSI

3. OGC

Ms.SHRUTI SAXENA 57
Design Standards

Ms.SHRUTI SAXENA 58
Design Standards

Ms.SHRUTI SAXENA 59
Design Standards

Ms.SHRUTI SAXENA 60
M2M and IoT Technology:-
 Machine-to-Machine Communication
(M2M)
 Machine-to-Machine (M2M) communication is a form of data communication that
involves one or more entities that do not necessarily require human interaction or
intervention in the process of communication. M2M is also named as Machine Type
Communication (MTC) in 3GPP. It is different from the current communication
models in the ways that it involves: -
- new or different market scenarios
 - lower costs and effort
 - a potentially very large number of communicating terminals
 - little traffic per terminal, in general
 M2M communication could be carried over mobile networks (e.g. GSM-GPRS,
CDMA EVDO networks). In the M2M communication, the role of mobile network is
largely confined to serve as a transport network. With a potential market of probably
50 million connected devices, M2M offers tremendous opportunities as well as
unique challenges. These devices vary from highly-mobile vehicles communicating in
real-time, to immobile meter-reading appliances that send small amounts of data
periodically.
Ms.SHRUTI SAXENA 61
Ms.SHRUTI SAXENA 62
 Applications of M2M
The applications of M2M cover many areas and the areas in which M2M is
currently used are given below:
a.Security : Surveillances, Alarm systems, Access control, Car/driver
security
b.Tracking & Tracing : Fleet Management, Order Management,
Pay as you drive, Asset Tracking, Navigation, Traffic information, Road
tolling, Traffic optimization/steering
c.Payment : Point of sales, Vending machines, Gaming machines
d.Health : Monitoring vital signs, Supporting the aged or
handicapped, Web Access Telemedicine points, Remote diagnostics
e.Remote Maintenance/Control : Sensors, Lighting, Pumps,
Valves, Elevator control, Vending machine control, Vehicle diagnostics
f. Metering : Power, Gas, Water, Heating, Grid control, Industrial
metering
g.Manufacturing : Production chain monitoring and automation
h.Facility Management : Home / building / campus automation

Ms.SHRUTI SAXENA 63
IoT/M2M Systems Layers and design
standardization

Ms.SHRUTI SAXENA 64
Layers of OSI Model
 1. Physical Layer (Layer 1) :
 The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual physical connection between the
devices. The physical layer contains information in the form of bits. It is responsible for transmitting individual bits from one
node to the next. When receiving data, this layer will get the signal received and convert it into 0s and 1s and send them to the
Data Link layer, which will put the frame back together.
 2. Data Link Layer (DLL) (Layer 2) :
 The data link layer is responsible for the node-to-node delivery of the message. The main function of this layer is to make sure
data transfer is error-free from one node to another, over the physical layer. When a packet arrives in a network, it is the
responsibility of DLL to transmit it to the Host using its MAC address.
Data Link Layer is divided into two sub layers: (a) Logical Link Control (LLC) (b) Media Access Control (MAC)
 3. Network Layer (Layer 3) :
 The network layer works for the transmission of data from one host to the other located in different networks. It also takes care
of packet routing i.e. selection of the shortest path to transmit the packet, from the number of routes available. The sender &
receiver’s IP addresses are placed in the header by the network layer.
 4. Transport Layer (Layer 4) :
 The transport layer provides services to the application layer and takes services from the network layer. The data in the transport
layer is referred to as Segments. It is responsible for the End to End Delivery of the complete message. The transport layer also
provides the acknowledgementof the successful data transmission and re-transmits the data if an error is found.
 5. Session Layer (Layer 5) :
 This layer is responsible for the establishment of connection, maintenance of sessions, authentication, and also ensures
security.
 6. Presentation Layer (Layer 6):
 The presentation layer is also called the Translation layer. The data from the application layer is extracted here and
manipulated as per the required format to transmit over the network.
 7. Application Layer (Layer 7) :
 At the very top of the OSI Reference Model stack of layers, we find the Application layer which is implemented by the network
applications. These applications produce the data, which has to be transferred over the network. This layer also serves as a
window for the application services to access the network and for displaying the received information to the user.
 Example: Application – Browsers, Skype Messenger, etc.

Ms.SHRUTI SAXENA 65
IoT v/s M2M

Ms.SHRUTI SAXENA 66
M2M vs IoT

Ms.SHRUTI SAXENA 67
Comparison between IoT and M2M:

Ms.SHRUTI SAXENA 68
Ms.SHRUTI SAXENA 69
Ms.SHRUTI SAXENA 70
LOCAL AND WIDE AREA NETWORKING:-

Ms.SHRUTI SAXENA 71
Ms.SHRUTI SAXENA 72
Ms.SHRUTI SAXENA 73
Ms.SHRUTI SAXENA 74
Ms.SHRUTI SAXENA 75
Ms.SHRUTI SAXENA 76
Ms.SHRUTI SAXENA 77
Ms.SHRUTI SAXENA 78
Ms.SHRUTI SAXENA 79
Ms.SHRUTI SAXENA 80
The Internet of Things (IoT) device management enables users to track, monitor
and manage the devices to ensure these work properly and securely after
deployment.
Billions of sensors interact with people, homes, cities, farms, factories,
workplaces, vehicles, wearables and medical devices, and beyond.

The Internet of Things (IoT) is changing our lives from managing home
appliances to vehicles. Devices can now advise us about what to do, when to do
and where to go. Industrial applications of the IoT assist us in managing
processes, and predicting faults and disasters. The IoT platforms help set and
maintain parameters to refine and store data accordingly.

Ms.SHRUTI SAXENA 81
Ms.SHRUTI SAXENA 82
Data management :-is the process of taking the overall
available data and refining it down to important information.
Different devices from different applications send large volumes and
varieties of information. Managing all this IoT data means
developing and executing architectures, policies, practices and
procedures that can meet the full data lifecycle needs.

Things are controlled by smart devices to automate tasks, so we can


save our time. Intelligent things can collect, transmit and understand
information, but a tool will be required to aggregate data and draw out
inferences, trends and patterns.

Developers and manufacturers of embedded systems and devices need


to build systems that answer the demands of data management. They
need to design a data management framework compatible with all the
software and hardware that play a role in collecting, managing and
distributing data. The design needs to be efficient to accelerate time-
to-market of the end-product.

Ms.SHRUTI SAXENA 83
Data from IoT devices is used for analytical purposes. Information that
businesses collect and store but remains relatively stagnant, because it is
not used for analytical purposes, is called dark data. It includes customer
demographic information, purchase histories and satisfaction levels, or
general product data. To better understand customers, dark data is
invaluable to businesses, as it allows them to uncover additional insights
more efficiently.

Before the release of a product, IoT data management requires field tests.
Data from the field tests helps improve the design and create a higher-
quality product. Collecting field data post-launch helps in continuous
product improvement with software updates and by identifying
anomalies. This also provides important insights to support the
development process of new products.

Ms.SHRUTI SAXENA 84
The IoT data management
In edge computing, data is processed near the data source or at the edge of
the network. While in a typical cloud environment, data processing
happens in a centralised data storage location. By processing and using
some data locally, the IoT saves storage space for data, processes
information faster and meets security challenges.

Edge computing, data governance policies and metadata management help


firms deal with issues of scalability and agility, security and usability. This
further assist them decide whether to manage data on the edge or only after
sending it to the cloud.

Sensors produce a large amount of data for edge gateway devices so that
these can make decisions by analysing the data. These high-performance
systems not only need to collect data in real time but also to organise and
provide data to other systems.

Ms.SHRUTI SAXENA 85
Sensors and devices can connect indirectly through the cloud, where data is
centrally-managed, or send data directly to other devices to locally collect,
store and analyse the data, and then share selected findings or information
with the cloud. Edge devices for data management help secure the most
valuable data and reduce bandwidth cost. These also provide great
performance, ownership over data and lower maintenance cost.

Edge devices run a Web-based dashboard that end-users can access to monitor
the flow of data, so they can decide how various systems in demonstration and
devices are running, and get notified by alarms. A large amount of data can be
represented in the form of a graph for any desired range of time, and each
point on the graph represents a record that can be found by searching the
database, which stores a large quantity of data.

Ms.SHRUTI SAXENA 86
DATA COLLECTION AND ANALYSIS:-Data collection and analysis in the Internet
of Things (IoT) involves using sensors to monitor and track the performance of IoT
devices, and then analyzing the data to gain insights:

Data collection
Sensors collect and transmit data about the status of IoT devices and networks in real
time. This data can be stored and retrieved at any time.

Data analysis
Data analysis can involve using machine learning, specialized logic, or real-time analytics
to extract insights from the data. This can help optimize operations, improve customer
experiences, and more.

Data collection system considerations


A good IoT data collection system should be scalable, secure, interoperable, and
flexible. It should be able to handle large volumes of data, prevent unauthorized access,
and accept different data formats.

The choice of data collection and analysis method depends on the use case. For example,
some applications can tolerate delays, while others, like security applications, need to be
time-critica
Ms.SHRUTI SAXENA 87
BIG DATA:-big data represents large volumes of information and data
sets that are defined by three Vs characteristics, including volume, velocity,
and variety. Big data can come from many different sources like social media
posts, the Internet of Things, sensors, etc. Because the number of people using
modern technology is increasing, the data storage of big data is increasingly
fostered over time. Instead of wasting this data source, businesses can gain
huge benefits in terms of users’ insights and market trends when extracting
and analyzing data sets.

The value of big data lies in whether the business can successfully handle the
data visualization process, not the raw data itself. However, due to the
complexity and massive volume of both structured and unstructured data,
humans cannot process these valuable data in the usual way with traditional
methods for processing and analyzing information. Fortunately, big data
analytics can now turn into actionable insights thanks to computing
advancements such as artificial intelligence (AI) and machine learning (ML)
technologies.

Ms.SHRUTI SAXENA 88
A Semantic Sensor Network (SSN) is a widely used
standard for describing sensors and devices in the Internet of Things
(IoT). The SSN ontology is a Web Ontology Language (OWL2) ontology
that describes sensors and the observations they make.

The SSN ontology is used in a variety of applications,


including: Satellite imagery, Scientific monitoring, Industrial and
household infrastructure, Citizen observers, and The Web of Things
The SSN ontology was developed by the W3C Incubator Group on Semantic
Sensor Networks. It describes sensors from multiple perspectives, including
observation values and their metadata. The SSN ontology is published in a
modular architecture that allows for the use of just enough semantics for
different applications.

The SSN ontology has been used in a number of projects to improve the
management of sensor data on the web. These projects include annotation,
integration, publishing, and search

Ms.SHRUTI SAXENA 89
Virtual sensors are software-based models of physical sensors that
can simulate their behaviour and generate sensor readings without
the need for actual physical hardware. They can be used as digital
twins to monitor or control a physical sensor, providing cost-
effective and scalable solutions for certain applications.

Ms.SHRUTI SAXENA 90
Virtual sensors can be used in IoT for data management in a number of ways,
including:

Replacing physical sensors


Virtual sensors can replace physical sensors and provide more information based
on multiple sensor signals.

Reducing signal noise


Virtual sensors can reduce signal noise and drifts, which can make physical sensors
inaccurate over time.

Flexibility
Virtual sensors can be redesigned as needed, while physical sensors are often only
repositioned mechanically.

Cost-effective
Virtual sensors can be cost-effective and scalable solutions for certain
applications.

Simulating data
Virtual sensors can be used to simulate data for testing purposes, especially when
physical sensors aren't available.

Ms.SHRUTI SAXENA 91
Ms.SHRUTI SAXENA 92
Ms.SHRUTI SAXENA 93
Ms.SHRUTI SAXENA 94
Ms.SHRUTI SAXENA 95
Ms.SHRUTI SAXENA 96
Ms.SHRUTI SAXENA 97
Ms.SHRUTI SAXENA 98
Ms.SHRUTI SAXENA 99
Ms.SHRUTI SAXENA 100
Ms.SHRUTI SAXENA 101
Ms.SHRUTI SAXENA 102
Ms.SHRUTI SAXENA 103
Ms.SHRUTI SAXENA 104
Ms.SHRUTI SAXENA 105
Ms.SHRUTI SAXENA 106
Everything as a Service (XaaS) :
Before only cloud computing technology was there and various cloud
service providers were providing various cloud services to the
customers. But now a new concept has emerged i.e Everything as a
Service (XaaS) means anything can now be a service with the help
of cloud computing and remote accessing. Where cloud computing
technologies provide different kinds of services over the web networks.

In Everything as a Service, various tools and technologies, and services


are provided to users as a service. Before XaaS and cloud services,
companies have to buy licensed products and install them, had to all
securities on their site and provide infrastructure for business purposes.
With XaaS, business is simplified as they have to pay for what they
need. This Everything as a Service is also known as Anything as a
Service

Ms.SHRUTI SAXENA 107


Examples of XaaS :
As XaaS stands for “Everything as a service”, There are many
examples. There are many varieties of cloud computing
models like –
Software as a Service (SaaS)
Platform as a Service (PaaS)
Disaster Recovery as a Service (DRaaS)
Infrastructure as a service (IaaS)
Communication as a Service (CaaS)
Network as a Service (NaaS)
Database as a Service (DBaaS)
Desktop as a Service (DaaS) etc.

Ms.SHRUTI SAXENA 108


SaaS provides many software applications like
Google Apps, and
Microsoft Office 365.

Similarly, PaaS offers AWS, Heroku, Apache Stratos, and


other sources relating to application development and
testing.

IaaS helps to deploy and configure virtual machines and


manage these remotely. IaaS also provide services to Azure
and Google Computer Engine.

Ms.SHRUTI SAXENA 109


Everything as a Service Model Examples :
Hardware as a Service (HaaS) –
Managed Service Providers (MSP) provide and install
some hardware on the customer’s site on demand.
The customer uses the hardware according to service
level agreements. This model is very similar to IaaS as
computing resources present at MSP’s site are
provided to users substituted for physical hardware.

Communication as a Service (CaaS) –


This model comprises solutions for different
communication like IM, VoIP, and video
conferencing applications which are hosted in the
provider’s cloud. Such a method is cost-effective and
reduces time expenses.
software, authentication, encryption, etc.
Ms.SHRUTI SAXENA 110
 Desktop as a Service (DaaS) –
DaaS provider mainly manages storing, security, and
backing up user data for desktop apps. And a client can
also work on PCs using third-party servers.
 Security as a Service (SECaaS) –
In this method, the provider integrates security
services with the company’s infrastructure through the
internet which includes anti-virus

Ms.SHRUTI SAXENA 111


Healthcare as a Service (HaaS) –
The healthcare industry has opted for the model HaaS
service through electronic medical records (EMR). IoT
and other technologies have enhanced medical
services like online consultations, health monitoring
24/7, medical service at the doorstep e.g. lab sample
collection from home, etc.

Transport as a Service (TaaS) –


Nowadays, there are numerous apps that help in
mobility and transport in modern society. The model
is both convenient and ecological friendly e.g. Uber
taxi services is planning to test flying taxis and self-
driving planes in the future.

Ms.SHRUTI SAXENA 112


Benefits in XaaS :
Cost Saving –
When an organization uses XaaS then it helps in cost-cutting and simplifies IT
deployments.
Scalability –
XaaS can easily handle the growing amount of work by providing the required
resources/service.
Accessibility –
It helps in easy accessing and improving accessibility as long as the internet connection is
there.
Faster Implementation –
It provides faster implementation time to various activities of the organization.
Quick Modification –
It provides updates for modification as well as undergoes quick updating by providing
quality services.
Better Security –
It contains improved security controls and is configured to the exact requirements of the
business.
Boost innovation –
While XaaS is used it Streamlines the operations and frees up resources for innovation.
Flexibility –
XaaS provides flexibility by using cloud services and multiple advanced approaches.

Ms.SHRUTI SAXENA 113


Disadvantages in XaaS :
Internet Breakage –
Internet breaks sometimes for XaaS service providers where there can also
be issues in internet reliability, provisioning, and managing the
infrastructure resources.
Slowdown –
When too many clients are using the same resources at the same time, the
system can slow down.
Difficult in Troubleshoot –
XaaS can be a solution for IT staff in day-to-day operational headaches,
but if anywhere problem occurs it is harder to troubleshoot it as in XaaS
multiple services are included with various technologies and tools.
Change brings problems –
If a XaaS provider discontinues a service or alters it gives an impact on
XaaS users.

Ms.SHRUTI SAXENA 114


M2M AND IOT Analytics

M2M systems use point-to-point communications between machines,


sensors and hardware over cellular or wired networks, while IoT
systems rely on IP-based networks to send data collected from IoT-
connected devices to gateways, the cloud or middleware platforms.

The types of Internet of Things analytics are broken down by the


types of challenges they address and insights they produce. The
main four are descriptive analytics, diagnostic analytics,
prescriptive analytics, and predictive analytics.

Ms.SHRUTI SAXENA 115


Knowledge management is the process an enterprise uses to
gather, organize, share and analyze its knowledge in a way that's easily
accessible to employees. This knowledge can include technical resources,
frequently asked questions, training documents and other information.

Ms.SHRUTI SAXENA 116


Ms.SHRUTI SAXENA 117
Ms.SHRUTI SAXENA 118
Ms.SHRUTI SAXENA 119
Ms.SHRUTI SAXENA 120
Ms.SHRUTI SAXENA 121
Ms.SHRUTI SAXENA 122

You might also like