0% found this document useful (0 votes)
11 views17 pages

CP Unit-1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views17 pages

CP Unit-1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

An IoT architecture outline:

 We now have a good grasp of the objectives and principles needed for M2M
and IoT solutions, and we recognize some key capabilities required for these
systems.
 Despite this understanding, there is no universally accepted architecture or set
of standards for M2M systems. Various organizations have proposed protocols
and architectures, but no single system is widely acknowledged.
 In Europe, there are ongoing research efforts (such as the Internet of Things
European Research Cluster) working towards defining a reference architecture
for IoT. These efforts are diverse due to the wide range of applications and
deployment scenarios.
 Because of the variety of applications and scenarios, creating a single
architecture results in many optional and conditional requirements, specific to
different problems or applications.
 Despite these challenges, the key features needed for M2M and IoT solutions
can be conceptualized into a functional overview . This overview is not a strict
formal architecture but rather a conceptual one, showing the system capabilities
in a layered manner.
 Other common ways to describe an architecture include focusing on software
distribution or network topology. This document, however, discusses the
functional layers and capabilities for brevity, using IoT as a collective term for
both M2M and IoT.

Asset Layer:

1. The Asset Layer is the foundational layer in an IoT architecture.


2. It represents the core purpose of any IoT application.
3. The assets of interest are the real world objects and entities that are
subject to being monitored and controlled, as well as having digital
representations and identities.
4. Assets include real-world objects and entities like vehicles, machinery,
buildings, utility systems, homes, and people.
5. Assets can be inanimate or animate, and can also be virtual
representations of real-world parts (e.g., routes used by trucks in
logistics).
6. Assets are instrumented with embedded technologies that bridge the
digital realm with the physical world, and that provide the capabilities to
monitor and control the assets as well as providing identities to the assets.
7. These technologies enable monitoring and controlling assets, and provide
digital identities for them.

Resource Layer:

1. The Resource Layer provides the main functional capabilities of sensing,


actuation, and embedded identities.

2. Sensors and actuators are found in devices like smartphones, WSANs,


smart meters, or other sensor/actuator nodes.
3. These devices perform functions such as monitoring and controlling
assets.
4. Different types of gateways provide aggregation or related capabilities.
5. Asset identification is achieved through various tags.
6. Types of tags include RFID, bar codes, and QR codes.

Communication Layer:

 The Communication Layer connects resources (sensors and actuators) with


computing infrastructures for application support.

 It facilitates the exchange of data through various networks (LANs and


WANs), allowing resources to communicate with each other and with
external systems.

 Types of Networks:

 Local Area Networks (LANs): Cover smaller areas (e.g., homes,


offices).
o Examples include Wireless Personal Area Networks (WPANs),
Home Area Networks (HANs), and Neighborhood Area Networks
(NANs).
 Wide Area Networks (WANs): Cover larger areas (e.g., cities,
countries).
o Examples include wired options like fiber optics and DSL, and
wireless options like cellular networks and satellite.

 WANs can be public (available for general use) or private (dedicated for
specific business purposes).

 Communication Technologies:

 Wired LANs: Examples include Ethernet and Power Line


Communication (PLC).
 Wireless LANs: Examples include IEEE 802.11 (Wi-Fi), Bluetooth, and
ZigBee.
 Many legacy LAN protocols are not IP-based, but there is a trend towards
migrating to IP.

 Gateways: These devices facilitate communication between LANs and


WANs by handling protocol translation, allowing different standards to
interoperate (e.g., translating ZigBee to HTTP).

Service support Layer:

 The Service Support Layer in IoT applications provides support services that
handle common tasks, simplifying processes.

 These services are usually hosted in data centers or cloud environments,


managing devices and networks while hiding their complexities.

 Examples of support services include:

 Remote device management (software upgrades, diagnostics, recovery).


 Dynamic reconfiguration (setting event filters).

 The Service Support Layer in IoT includes communication functions,


sensor data management, RFID support, Location-Based Services (LBS),
directory services for device discovery, and core data storage and
processing capabilities.

 Examples of directory services include resolving RFID codes to URLs with


related information and repositories for monitoring real-world entities.

Data and Information Layer:


 The Resource, Communication, and Service Support layers involve
specific devices, networks, and servers, while the Data and Information
Layer focuses on capturing knowledge and providing advanced control
logic.
 This layer involves organizing data and information models and
knowledge representation.
 The Knowledge Management Framework (KMF) includes data, domain-
specific knowledge, and actionable service descriptions (like actuator
functions).
 The KMF integrates everything from basic sensor data to expert
knowledge into a unified structure.
 Important aspects of the KMF involve semantic annotation, Linked Data,
and creating different knowledge structures.
 Knowledge is dynamic, and techniques are used to capture insights and
learn from past experiences to make informed decisions based on current
and predicted outcomes.

Application Layer:

 The Application Layer consists of specific IoT applications.

 There are many different types of applications in IoT.

 Common examples include smart metering in Smart Grids, vehicle tracking,


building automation, and participatory sensing (PS).

Business Layer:

 The Business Layer focuses on supporting the main activities of businesses or


individuals using IoT applications.

 It connects IoT applications to business processes and systems like Customer


Management (CRM) and Resource Planning (ERP).

 This layer offers APIs for others to access data and information.

 It also allows users to access applications directly, such as city services for
residents in smart cities and data displays for workers.

 The Business Layer coordinates IoT applications to improve business


workflows and processes.
Let’s use a smart home system as an example to explain the layers:

1. Asset Layer: This layer includes physical devices like smart thermostats, smart lights, and
security cameras. These are the actual objects that are monitored and controlled in the smart
home.
2. Resource Layer: Here, the smart devices (like thermostats and lights) gather data and
execute tasks. For example, the smart thermostat collects temperature data and can adjust the
heating or cooling based on user preferences.
3. Communication Layer: This layer connects the smart devices to the internet and allows
them to communicate with each other and with external services. For instance, it ensures that
the thermostat can send data to a cloud service or receive commands from a smartphone app.
4. Service Support Layer: This layer provides services like remote management and
automation rules. For example, it might allow homeowners to set schedules for the thermostat
or receive alerts if a security camera detects motion.
5. Data and Information Layer: This layer organizes and processes the data collected from
devices. It might analyze temperature trends over time to suggest energy-saving adjustments
or store data on home security events for future reference.
6. Application Layer: This layer consists of user-facing applications, such as a smartphone app
that allows users to control their smart home devices, monitor energy usage, and receive
alerts.
7. Business Layer: Finally, this layer integrates the smart home system into broader business
processes, like customer support systems for troubleshooting or offering energy-saving tips. It
allows service providers to access data and provide additional services.

In addition to the functional layers, three functional groups cross the different
layers, namely Management, Security, and IoT Data and Services.

Management:

 Management oversees the operation and maintenance of devices,


communication networks, and IT infrastructure.

 It involves handling configuration data and monitoring the performance of


delivered services.

Security:

 Security involves protecting the system, its information, and services from
external threats and harm across all layers.

 Key security measures include communication security, trust and identity


management, authentication, and authorization.

IOT Data and Services:

 The Data and Services group processes data in a distributed manner at


various complexity levels.
 Basic processing like event filtering and data averaging occurs in
individual sensor nodes, while more advanced processing happens higher
up in the network.
 This group focuses on transforming data into knowledge through
different processing steps, from simple aggregation to data mining and
analytics.
 Technologies used include stream processing, machine learning, and
decision-making tools.
 The architecture outline does not cover the lifecycle of an IoT system,
which includes planning, design, deployment, and configuration before
operation.

IOT Standards:
The process of creating standards for M2M (Machine-to-Machine) and IoT (Internet of Things) is
complex because it involves many different industries and organizations. These standards help ensure
different devices and systems can work together smoothly. There are three key points to consider:

1. Various Industries and Organizations: Standards are developed by different industries and
organizations, including formal standards bodies and special interest groups. These standards
can be specific to certain fields like healthcare or transportation, and they aim to reduce
technology differences.
2. System and Technology Standards: Some standards cover entire systems (like smart grids),
while others focus on specific technologies (like communication protocols). It's challenging to
integrate different technologies into a single standard.
3. Collaboration and Regulation: Standards are created when researchers and industries
work together, often guided by rules from organizations like the European
Commission. These rules can shape which technologies are chosen. The goal is to
ensure that various technologies can smoothly integrate with one another.

Devices and gateways:


 Embedded processing is evolving towards higher capabilities and faster
speeds.
 Small-scale embedded processing is growing, with 8-, 16-, and 32-bit
microcontrollers available.
 Microcontrollers have on-chip RAM, flash memory, I/O capabilities, and
networking interfaces like IEEE 802.15.4.
 These devices are tiny, often just a few square millimeters, with very low
power consumption in the milli- to micro-Watt range.
 They can host a full TCP/IP stack, including a small web server.
 Devices can sense aspects of their environment and perform tasks (actuate)
based on that data.

A device can be characterized as having several properties, including:


• Microcontroller: 8-, 16-, or 32-bit working memory and storage.
• Power Source: Fixed, battery, energy harvesting, or hybrid.
• Sensors and Actuators: Onboard sensors and actuators, or circuitry that
allows them to be connected, sampled, conditioned, and controlled.
• Communication: Cellular, wireless, or wired for LAN and WAN
communication.
• Operating System (OS): Main-loop, event-based, real-time, or full featured
OS.
• Applications: Simple sensor sampling or more advanced applications.
• User Interface: Display, buttons, or other functions for user interaction.
• Device Management (DM): Provisioning(preparing and equipping a system or service
for use.), firmware(Firmware is specialized software programmed into a hardware device to
control its functions.), bootstrapping(Bootstrapping is the initial setup process for starting a
system or process.), and monitoring.
• Execution Environment (EE): Application lifecycle management and
Application Programming Interface (API).

 Some functions are often hosted on a gateway to save battery power by


handling heavy tasks like WAN connectivity and application logic.
 This reduces costs since these components are expensive.
 Using a gateway also reduces complexity by centralizing device
management and advanced applications, allowing devices to focus on
sensing and actuating.

Device Types:

Devices are categorized into two types:

 Basic Devices:
o Provide basic services such as sensor readings and actuation tasks.
o Limited support for user interaction.
o Support LAN communication via wired or wireless technology.
o Require a gateway to connect to a Wide Area Network (WAN).
 Advanced Devices:
o Host the application logic themselves.
o Have a built-in WAN connection.
o Feature device management capabilities.
o Include an execution environment for hosting multiple
applications.
o Gateway devices typically fall into this category, handling more
complex tasks and reducing the load on basic devices.
Deployment scenarios for devices:
Deployment scenarios for devices vary between basic and advanced categories:

Basic Deployment Scenarios:

 Home Alarms: Include motion detectors and smoke detectors, with a


central unit managing security and alarm functions, often using
proprietary radio protocols.
 Smart Meters: Measure electricity and gas consumption; data is
collected by a concentrator gateway and transmitted to an application
server via cellular connection, with extended range possible through
capillary network technologies.
 Building Automation Systems (BASs): Control devices like thermostats
and motion detectors locally and remotely.
 Standalone Smart Thermostats: Communicate with web services using
Wi-Fi.

Advanced Deployment Scenarios:

 Onboard Car Units: Enable remote monitoring and configuration via


cellular connection.
 Robots and Autonomous Vehicles: Operate autonomously or via remote
control using cellular networks.
 Remote Monitoring Cameras: Use 3G and LTE for monitoring.
 Oil Well Monitoring: Collect data from remote devices.
 Connected Printers: Can be upgraded and serviced remotely.

Basic Devices:
 Designed for single or multiple tasks (e.g., monitoring air pressure, humidity, and
temperature).
 Use low-cost microcontrollers with built-in memory, storage, and sensor ports.
 Prioritize low-power consumption, sometimes utilizing energy harvesting.
 Communicate via interfaces like SPI, I2C, or UART, with optional encryption.
 Lack WAN interfaces, requiring gateways for connectivity.
 Run simple operating systems with limited computational power.
 Constrained hardware and non-standard software can increase development costs.

Gateways:
 A gateway functions as a translator between different protocols
(e.g., IEEE 802.15.4 or IEEE 802.11 to Ethernet or cellular).
 Gateways typically perform translation at the physical and link layer, though
application layer gateways (ALGs) are also used, which can add complexity and
errors.
 Examples of ALGs include ZigBee gateways that translate ZigBee to SOAP
and IP, or CoAP to HTTP/REST.
 For certain LAN technologies (e.g., 802.11, Z-Wave), gateways assist in the
inclusion and exclusion of devices(selecting which devices to add or omit based on
specific criteria,) through activation modes.
 Basic gateways prioritize simplicity and low cost, while more advanced
gateways may handle tasks like data management and device management,
often using more powerful hardware with GNU/Linux.

Gateways have various applications, including:

Internet Connectivity: Connecting local networks to the Internet.


Data Routing: Directing data between different networks or segments.
Protocol Translation: Converting data formats between different network
protocols.
Security: Acting as firewalls to filter and protect network traffic.
IoT Integration: Connecting IoT devices to cloud services.
VPN Support: Establishing secure, encrypted connections between remote
networks.

Data Management:

Typical data management functions include performing sensor readings,


caching data, and filtering, concentrating, and aggregating data before sending it
to back-end servers.
Local applications:

 Gateways can run local applications like home alarms or ventilation control to keep things
running smoothly even if the internet goes down, reducing data costs and latency.
 An execution environment is needed to manage applications, handling tasks like
installation, updates, and removal.
 OSGi is a popular execution environment for embedded systems, using Java bundles to
manage applications securely and allow upgrades without downtime.
 Linux can also be used as an execution environment for these tasks.

Networking: A network is a number of computers linked together to allow


the sharing of resources. A server usually provides services like file storage and
email.

LOCAL AREA NETWORK (LAN):


 A local area network (LAN) is a computer network that interconnects computers
within a limited area such as a residence, school, laboratory, university campus or
office building.
 Ethernet and Wi-Fi are the two most common technologies in use for local area
networks.
 In a wireless LAN, users have unrestricted movement within the coverage area.
Wireless networks have become popular in residences and small businesses, because
of their ease of installation.
 Most wireless LANs use Wi-Fi as it is built into smartphones, tablet computers and
laptops.
Advantages of LAN:
 LANs are cost-effective to set up.
 Easy to control and manage since it's in a small area.
 Devices communicate at high speeds, typically 10 Mbps, 100 Mbps, or 1000 Mbps,
depending on the LAN type.
 File sharing is simple and efficient with a file server.
 Common resources like printers and internet can be easily shared among users.
Disadvantages of LANs:
 Long print queues can form when many terminals share one or two printers, causing
delays.
 Network security issues can arise; a virus on one computer can quickly spread across the
network.
 If the file server fails, shared files and network printers become inaccessible.

Wide area network:


 A wide area network (WAN) is a telecommunications network that extends over a large
geographical area for the primary purpose of computer networking.
 Many WANs are built for one particular organization and are private. Others, built by
Internet service providers, provide connections from an organization's LAN to the Internet.
 Many technologies are available for wide area network links. Examples include circuit-
switched telephone lines, radio wave transmission, and optical fiber. New developments in
technologies have successively increased transmission rates.

Advantages of a Wide Area Network (WAN):

 Covers Large Geographical Area: Connects offices in different cities or countries


using leased lines from ISPs.
 Centralized Data: Allows all branches to access and share data from the head office
server, facilitating backup and synchronization.
 Updated Files and Data: Enables real-time updates and file exchanges, ensuring all
staff have the latest versions.
 Sharing Software and Resources: Similar to LAN, allows sharing of software
applications and resources like hard drives and RAM.
 Global Business: Facilitates global business operations, such as e-commerce and
stock trading.
 High Bandwidth: Leased lines provide higher bandwidth than normal broadband,
enhancing productivity.
 Distribute Workload and Reduce Travel Costs: Enables distribution of work across
different locations and reduces travel costs through online monitoring and
communication.

Disadvantages of a Wide Area Network (WAN):

 Security Problems: Greater security risks compared to LAN due to the combination
of multiple technologies.
 Need for Firewalls and Antivirus Software: Essential to protect against hackers and
viruses; requires installation of multiple security solutions.
 High Setup Cost: Initial setup is expensive, involving the purchase of routers,
switches, and security software.
 Server Down and Disconnection Issues: Possible connectivity problems due to ISP
issues, electricity supply, or infrastructure; dedicated lines can help mitigate this.

Examples of Wide Area Network (WAN)

 Internet
 Most Big Banks
 Airline Companies
 Stock Brokerages
 Railway Reservations Counters
 Satellite Systems

Data Management:
Modern enterprises must be flexible and support decision-making at different levels. To do
this, they need to have critical information available quickly and in the right format.

 This information is essential for processes that use M2M data.


 It helps businesses fully utilize and benefit from M2M data.

Characteristics of M2M Data

 Big Data: Generates vast amounts of detailed data about device-involved processes.
 Heterogeneous Data: Produced by a variety of devices, differing in sampling rate
and quality.
 Real-World Data: Relates to real-world processes and depends on the environment.
 Real-Time Data: Generated and communicated in real-time, essential for business
value.
 Temporal Data: Measures the environment over time.
 Security and Privacy: Capturing detailed information can lead to privacy and security
risks.

Managing M2M data:

The data flow from a wireless sensor node to the backend system goes through several
processing stages. These stages modify the data for different applications or analyze it to gain
insights. Different points in the network process the data based on the application's needs.
Handling machine-to-machine (M2M) data involves multiple stages, but not all are needed in
every solution, and their sequence can vary depending on the system and data requirements.

Stages of M2M Data Management:

1. Data Generation: Devices or systems create data, either actively or passively,


based on their capabilities and needs. Not all data is sent; some may be processed and
discarded locally.
2. Data Acquisition: Data is collected from devices, following security and
protocol rules. It can be gathered continuously, at intervals, or based on specific
events. Filters may limit the data sent.
3. Data Validation: Ensures the data is accurate and meaningful, using rules and
logic to prevent errors and security issues. This often requires significant computing
power.
4. Data Storage: Relevant data is stored for future use, using advanced
technologies like distributed databases and cloud platforms to manage large volumes.
5. Data Processing: Data is enhanced for future use through operations like
filtering, summarizing, and predicting, improving its quality and usefulness.
6. Data Remanence: Ensures that old data can't be recovered by unauthorized
users, using methods like overwriting, encryption, or physically destroying storage
devices.
7. Data Analysis: Stored data is analyzed to extract valuable insights for decision-
making, using tools like business intelligence and statistical analysis.

Business processes in IoT:


 Business processes involve a series of activities within an enterprise leading to specific
results.
 They can be categorized as management, operational, and supporting processes, all aimed
at achieving mission objectives.
 Business Process Model and Notation (BPMN) graphically represents these processes to
improve efficiency and quality.
 Interaction with real-world processes is crucial for monitoring and control to optimize
actions and make critical decisions.
 There has been a shift from human-based data acquisition (e.g., keyboard) to automated
machine-based methods (e.g., RFID, WSNs).
 In the M2M era, connected devices actively participate in business processes, enhancing
integration and interaction.
 Current modeling tools often can't fully represent real-world details, so it's important to include
clear meanings (semantics) in M2M (Machine-to-Machine) modeling to make it more accurate and
effective.
 IoT Adoption Challenges: Integrating WSNs with business processes and backend
systems is difficult.
 makeSense Framework: Provides tools to generate WSN code from business process
specifications.
 Layered Approaches: Aid in developing and managing WSN applications that interact
with enterprise systems.
 M2M and IoT Benefits: Improve data accuracy, decision-making, and provide a
competitive advantage.

IoT integration with enterprise systems:

 IoT and M2M communication are creating a world where billions of devices communicate
and share information.
 This communication will mostly use Internet technologies.
 Advanced methods are being developed for complex interactions where devices and
systems work together.
 Interaction can happen at two levels:

 M2M Level: Machines communicate directly with each other.


 M2B Level: Machines communicate with business systems and applications.

 Devices can use short-range protocols like ZigBee and Bluetooth or long-range ones like
Wi-Fi.

 Devices can automatically connect and offer services like REST. Limited devices may
need gateways to communicate. M2M interactions and service-oriented approaches connect
devices through web services, and gateways integrate older systems.

 The cloud offers scalability, reduces communication costs, and handles tasks like data
transmission. Separating devices from data usage improves business processes.

Distributed business processes in IoT:

 Data Overload: Sending all data to backend systems is impractical due to communication
and processing limits.
 Minimized Communication: Focus on sending only relevant data to backend systems to
avoid overloading them.
 Distributed Processing: Use advanced networks and devices to distribute processing
tasks to the network and edge devices, improving efficiency.
 Local Processing: Devices with computing power can process and evaluate data locally
or in clusters, reducing reliance on central servers.
 Dynamic Integration: Business processes can dynamically use local resources and adjust
based on requirements and costs for optimal performance.

Everything as a service (XaaS): Everything as a Service (XaaS) is a


term that refers to the delivery of various types of services and
applications over the internet, rather than through local hardware or
on-premises infrastructure
 Cost Savings: Cloud infrastructure cuts costs by avoiding the need for physical hardware
and providing pay-as-you-go pricing. You benefit from reduced maintenance and scalable
resources.

 On-Demand Access: Cloud computing offers easy access to shared resources like
networks, servers, storage, and applications with minimal management.

 Essential Features:

 On-Demand Self-Service: Automatically adjust resources like server time and


storage without manual changes.
 Broad Network Access: Access cloud services from various devices like phones,
tablets, and laptops.
 Resource Pooling: Cloud providers share computing resources among many users,
dynamically adjusting based on demand.
 Rapid Elasticity: Scale resources up or down automatically as needed, appearing
unlimited.
 Measured Service: Track and measure resource usage to ensure transparency and
control.

 M2M and IoT Benefits:


1. Store large amounts of data from sensors and other devices.
2. Analyze data quickly and cost-effectively.
3. Share datasets to create valuable information chains over time.

Service Models:

Everything as a Service (XaaS):

 Definition: A broad term that encompasses the delivery of various types of services
over the internet. It means providing everything—hardware, software, and
infrastructure—through cloud services instead of traditional methods.
 Example: Cloud computing platforms that offer a wide range of services including
computing power, storage, and applications, all accessed and managed online.

Software as a Service (SaaS):

 Definition: A cloud computing model where software applications are delivered over
the internet. Users access and use these applications through a web browser without
needing to install them locally.
 Example: Google Workspace (formerly G Suite) – includes tools like Gmail, Google
Drive, and Google Docs, which users access via a web browser.

Platform as a Service (PaaS):

 Definition: A cloud computing model that provides a platform allowing customers to


develop, run, and manage applications without dealing with the underlying
infrastructure. It includes development tools, databases, and middleware.
 Example: Microsoft Azure App Service – a platform that provides tools for
developing, deploying, and managing web applications and services.

Infrastructure as a Service (IaaS):

 Definition: A cloud computing model where virtualized computing resources are


provided over the internet. Users can rent virtual machines, storage, and networking
components and manage them as needed.
 Example: Amazon Web Services (AWS) EC2 – provides scalable virtual servers and
storage resources, allowing users to run and manage applications in the cloud.

Deployment Models:

 Private Cloud: Cloud infrastructure for exclusive use by a single organization,


managed by the organization or a third party, and can exist on or off premises.
 Community Cloud: Cloud infrastructure for a specific community of consumers with
shared concerns, managed by one or more community organizations or a third party,
and can exist on or off premises.
 Public Cloud: Cloud infrastructure for open use by the general public, managed by a
business, academic, or government organization, and exists on the provider's
premises.
 Hybrid Cloud: Composition of two or more distinct cloud infrastructures (private,
community, or public) bound together by technology enabling data and application
portability.

M2M and IoT analytics:


 More Data: IoT will create huge amounts of data that can be used for various purposes
beyond its original use.
 Better Insights: Advanced analytics turn raw data into valuable insights, helping to
improve products, cut costs, and boost efficiency.
 Big Data: Technologies store and manage large amounts of detailed information.
 Open Data: Initiatives like Data.gov improve understanding and applications, such as
optimizing power grids and wastewater treatment.

You might also like