0% found this document useful (0 votes)
226 views92 pages

Chapter1 Iot Complete

Internet of Things concepts

Uploaded by

praveen kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
226 views92 pages

Chapter1 Iot Complete

Internet of Things concepts

Uploaded by

praveen kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 92

Internet Of Things

Chapter 1 :- Introduction To Internet Of Things

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 1


Internet Of Things
• The Internet of Things (IoT) is a concept
that refers to the connection of
everyday objects to the internet,
allowing them to send and receive data.
These objects, often referred to as
"smart" devices, are embedded with
sensors, actuators, and other
technologies that enable them to collect
and exchange data with other devices
and systems over the internet.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 2
Key components of the IoT
1. Sensors and Actuators: Sensors gather data from the environment, such as temperature,
humidity, or motion, while actuators perform actions based on commands received. These
components are essential for capturing and responding to changes in the physical world.
2. Connectivity: IoT devices require connectivity to transmit data to other devices or
centralized systems. This connectivity can be achieved through various means, including
Wi-Fi, Bluetooth, cellular networks, and Low-Power Wide-Area Networks (LPWANs).
3. Data Processing and Analytics: The data collected by IoT devices often needs to be
processed and analyzed to extract valuable insights. This can involve real-time processing at
the edge (on the device itself) or centralized processing in the cloud.
4. Cloud Infrastructure: Cloud computing plays a crucial role in IoT by providing storage,
computational resources, and services for managing and analyzing data. Cloud platforms
enable scalability, flexibility, and remote access to IoT applications and devices.
5. Security: Security is a paramount concern in IoT due to the potential risks associated with
connected devices, such as data breaches, privacy violations, and cyber-attacks. IoT security
measures include encryption, authentication, access control, and regular software updates
to mitigate these risks.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 3


Applications Of IoT
• Smart Homes: IoT devices in smart homes include smart thermostats, lighting systems, security
cameras, and voice assistants, allowing homeowners to remotely control and automate various
aspects of their homes.
• Industrial IoT (IIoT): In industrial settings, IoT is used for asset tracking, predictive maintenance,
process optimization, and remote monitoring of equipment and machinery to improve efficiency and
productivity.
• Healthcare: IoT applications in healthcare include remote patient monitoring, wearable health
trackers, smart medical devices, and telemedicine solutions, enabling personalized healthcare
delivery and improving patient outcomes.
• Smart Cities: IoT technologies are deployed in smart city initiatives for traffic management, waste
management, environmental monitoring, public safety, and infrastructure optimization to enhance
the quality of life for residents.
• Agriculture: IoT solutions in agriculture include precision farming, where sensors and actuators are
used to monitor soil conditions, crop health, and weather patterns, enabling farmers to optimize
irrigation, fertilization, and crop management practices.
• Retail: IoT is used in retail for inventory management, supply chain optimization, personalized
marketing, and enhancing the shopping experience through technologies like RFID tags, beacons, and
smart shelves.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 4


Advantages of IoT
1. Efficiency: IoT enables automation and optimization of processes, leading to increased efficiency in various
domains such as manufacturing, logistics, and energy management. For example, predictive maintenance in
industrial machinery can reduce downtime and optimize maintenance schedules, improving overall
efficiency.
2. Cost Savings: By monitoring and controlling devices remotely, IoT can lead to cost savings in areas such as
energy consumption, maintenance, and labor. For instance, smart energy management systems in buildings
can reduce energy wastage and lower utility bills.
3. Improved Decision Making: IoT generates vast amounts of data that can be analyzed to gain insights and
make informed decisions. This data-driven approach allows businesses and organizations to identify trends,
patterns, and opportunities for optimization or innovation.
4. Enhanced Customer Experience: In sectors like retail and hospitality, IoT technologies can personalize
customer experiences by offering tailored services and recommendations based on individual preferences
and behavior. For example, smart retail stores can provide personalized promotions to shoppers based on
their past purchases.
5. Remote Monitoring and Control: IoT enables remote monitoring and control of devices and systems from
anywhere with an internet connection. This capability is especially valuable in industries such as healthcare,
where remote patient monitoring allows healthcare providers to monitor patients' health status and
intervene when necessary.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 5


Conttt….
1. Safety and Security: IoT can improve safety and security in various contexts, including home security
systems, industrial facilities, and transportation. For example, IoT sensors can detect environmental
hazards or security breaches and trigger appropriate responses to mitigate risks.
2. Environmental Sustainability: IoT solutions contribute to environmental sustainability by enabling
better resource management and reducing waste. For instance, smart agriculture systems can
optimize water usage and minimize pesticide usage, leading to more sustainable farming practices.
3. Innovation and New Business Opportunities: IoT fosters innovation by enabling the development of
new products, services, and business models. Startups and established companies alike can explore
new revenue streams and market opportunities by leveraging IoT technologies.
4. Real-Time Insights and Action: IoT facilitates real-time monitoring and analytics, allowing
organizations to respond quickly to changing conditions or events. For example, in transportation
and logistics, real-time tracking of vehicles and shipments enables efficient route planning and
timely delivery of goods.
5. Connectivity and Interoperability: IoT promotes connectivity and interoperability between devices
and systems from different vendors, leading to integrated solutions and seamless user experiences.
Standards and protocols such as MQTT and CoAP facilitate communication and interoperability in IoT
ecosystems.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 6


Disadvantages of IoT
1. Security Concerns: IoT devices are often vulnerable to cybersecurity threats, including malware, hacking,
and data breaches. Weaknesses in device security, such as default passwords and lack of regular updates,
can be exploited by malicious actors to gain unauthorized access to sensitive data or control over devices.
2. Privacy Risks: The extensive collection of data by IoT devices raises concerns about user privacy. Personal
and sensitive information collected by these devices can be misused or compromised, leading to privacy
violations or identity theft. Additionally, the aggregation of data from multiple sources may enable the
profiling of individuals without their consent.
3. Interoperability Issues: The lack of standardized protocols and interoperability among IoT devices from
different manufacturers can hinder seamless communication and integration. Incompatibility between
devices may result in fragmentation within IoT ecosystems, making it challenging to create unified
solutions or leverage the full potential of interconnected devices.
4. Reliability and Stability: IoT devices rely heavily on network connectivity to function properly. Unreliable
or unstable internet connections can disrupt the operation of IoT systems, leading to downtime or
performance issues. Additionally, device malfunctions or software bugs may occur, affecting the reliability
and stability of IoT deployments.
5. Complexity and Technical Challenges: Implementing and managing IoT solutions can be complex and
technically challenging, requiring expertise in areas such as hardware design, software development,
networking, and data analytics. Small and medium-sized enterprises (SMEs) may face difficulties in
adopting IoT due to resource constraints and limited technical capabilities.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 7
Conttt….
1. Data Overload and Management: The proliferation of IoT devices generates vast amounts of data that need to be processed,
stored, and analyzed. Managing this data overload poses challenges in terms of storage capacity, data processing capabilities, and
the cost of infrastructure. Without proper data management strategies, organizations may struggle to derive actionable insights
from IoT-generated data.
2. Dependency on Cloud Services: Many IoT applications rely on cloud computing platforms for data storage, processing, and
analytics. Dependence on cloud services introduces potential risks related to service outages, data latency, and data sovereignty.
Organizations must consider backup and redundancy measures to mitigate the impact of cloud service disruptions on their IoT
deployments.
3. Ethical and Social Implications: The widespread adoption of IoT raises ethical and social concerns regarding surveillance,
autonomy, and the impact on human behavior. Questions arise regarding the appropriate use of IoT technology, the balance
between convenience and privacy, and the potential consequences for society as IoT becomes increasingly pervasive.
4. Energy Consumption: IoT devices often require continuous power sources to operate, leading to increased energy consumption
and environmental impact. Battery-powered devices may need frequent recharging or replacement, adding to maintenance costs
and electronic waste. Sustainable energy solutions and energy-efficient design practices can help mitigate these concerns.
5. Cost of Implementation and Maintenance: Deploying IoT solutions involves significant upfront costs for hardware, software,
infrastructure, and deployment services. Additionally, ongoing maintenance, updates, and support require continuous
investment, adding to the total cost of ownership. For organizations with limited budgets or uncertain ROI, the initial investment
in IoT may be prohibitive.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 8


Characterstickes of IoT
1. Interconnectivity: IoT devices are interconnected, allowing them to communicate and exchange data with
each other, as well as with other systems or platforms over the internet. This interconnectivity enables
seamless integration and interoperability between diverse devices and ecosystems.
2. Sensing and Monitoring: IoT devices are equipped with sensors that collect data from the physical
environment, such as temperature, humidity, motion, or location. These sensors enable real-time
monitoring and tracking of various parameters, providing valuable insights for decision-making and
automation.
3. Data Processing and Analytics: IoT generates vast amounts of data, which is processed, analyzed, and
transformed into actionable insights. Data analytics techniques, including machine learning and artificial
intelligence, are employed to extract patterns, trends, and correlations from IoT-generated data, enabling
predictive and prescriptive analytics.
4. Automation and Control: IoT enables automation and remote control of devices and systems, allowing for
efficient and autonomous operation. Through the use of actuators and controllers, IoT devices can
perform predefined actions or respond dynamically to changing conditions based on input from sensors
and data analytics.
5. Ubiquitous Connectivity: IoT leverages various communication technologies to ensure ubiquitous
connectivity, enabling devices to connect to the internet and communicate with each other from
anywhere at any time. Common connectivity protocols used in IoT include Wi-Fi, Bluetooth, Zigbee, RFID,
cellular networks, and Low-Power Wide-Area Networks (LPWANs).
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 9
Conttt…
1. Scalability: IoT solutions are designed to scale seamlessly to accommodate a large number of devices and
users. Whether deploying a few devices in a home or thousands of devices in an industrial setting, IoT
architectures are scalable to meet the growing demands of connected environments.
2. Security and Privacy: Security is a critical consideration in IoT to protect against cyber threats,
unauthorized access, and data breaches. IoT security measures include encryption, authentication, access
control, secure bootstrapping, and over-the-air updates to ensure the confidentiality, integrity, and
availability of data and devices. Additionally, privacy-preserving techniques such as anonymization and
differential privacy help safeguard user privacy and sensitive information.
3. Diversity of Applications: IoT finds applications across various industries and domains, including smart
homes, healthcare, agriculture, manufacturing, transportation, energy, and environmental monitoring. Its
versatility enables innovative solutions to address diverse challenges and opportunities in different
sectors.
4. Real-Time Responsiveness: IoT systems are capable of real-time responsiveness, allowing for timely
actions and interventions based on incoming data and events. This real-time capability is essential for
applications such as predictive maintenance, emergency response, and dynamic control systems.
5. Ecosystem Collaboration: IoT ecosystems often involve collaboration among multiple stakeholders,
including device manufacturers, software developers, service providers, and end-users. Interdisciplinary
collaboration and partnerships drive innovation and ecosystem growth, fostering the development of
new IoT solutions and standards.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 10


Applications of IoT
1. Smart Homes: IoT enables the creation of smart home environments where devices such as thermostats, lighting
systems, security cameras, door locks, and appliances are connected to the internet. Homeowners can remotely
monitor and control these devices using smartphones or voice commands, enhancing convenience, security, and
energy efficiency.
2. Industrial IoT (IIoT): In industrial settings, IoT is used for asset tracking, predictive maintenance, process optimization,
and remote monitoring of equipment and machinery. IIoT solutions improve efficiency, reduce downtime, and enable
data-driven decision-making in manufacturing, logistics, supply chain management, and utilities.
3. Healthcare: IoT applications in healthcare include remote patient monitoring, wearable health trackers, smart medical
devices, and telemedicine solutions. These technologies enable healthcare providers to monitor patients' health status
remotely, deliver personalized care, and improve treatment outcomes while reducing healthcare costs and hospital
visits.
4. Smart Cities: IoT technologies are deployed in smart city initiatives for traffic management, waste management,
environmental monitoring, public safety, and infrastructure optimization. Smart city solutions enhance urban living by
improving mobility, sustainability, safety, and quality of life for residents.
5. Agriculture: IoT solutions in agriculture, often referred to as precision agriculture, involve the use of sensors, drones,
and other IoT devices to monitor soil conditions, crop health, weather patterns, and irrigation systems. Precision
agriculture enables farmers to optimize resource usage, increase crop yields, and reduce environmental impact.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 11


Conttt…
1. Retail: IoT is used in retail for inventory management, supply chain optimization, personalized marketing,
and enhancing the shopping experience. RFID tags, beacons, and smart shelves enable retailers to track
inventory levels, analyze customer behavior, and deliver targeted promotions in real-time.
2. Energy Management: IoT technologies are deployed in energy management systems for monitoring and
controlling energy usage in buildings, factories, and utilities. Smart meters, sensors, and energy analytics
platforms help optimize energy consumption, reduce waste, and lower utility costs while promoting
sustainability.
3. Transportation and Logistics: IoT applications in transportation and logistics include vehicle tracking, fleet
management, predictive maintenance, and supply chain optimization. IoT-enabled solutions improve route
planning, vehicle efficiency, asset utilization, and delivery accuracy, leading to cost savings and operational
efficiency gains.
4. Environmental Monitoring: IoT devices are used for environmental monitoring applications such as air
quality monitoring, water quality monitoring, and wildlife tracking. Sensors deployed in natural ecosystems,
urban areas, and industrial sites collect data on environmental parameters, enabling proactive measures to
address pollution, climate change, and biodiversity loss.
5. Smart Buildings: IoT technologies are deployed in smart buildings to optimize energy usage, enhance
occupant comfort, and improve operational efficiency. Building automation systems, occupancy sensors, and
smart HVAC systems enable real-time monitoring and control of building infrastructure, leading to energy
savings and sustainability benefits.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 12


Working and Implementation of IoT
1. Sensors and Actuators: IoT devices are equipped with sensors to collect data from the physical
environment, such as temperature, humidity, motion, or location. These sensors detect changes or
events and convert them into digital signals. Actuators, on the other hand, are used to perform
actions based on commands received from the system or user. For example, actuators may control
the temperature of a thermostat or the movement of a robotic arm.
2. Connectivity: IoT devices require connectivity to transmit data to other devices or central systems.
Various communication technologies are used for IoT connectivity, including Wi-Fi, Bluetooth,
Zigbee, RFID, cellular networks, and Low-Power Wide-Area Networks (LPWANs). Connectivity
protocols ensure that devices can communicate effectively with each other and with cloud-based
platforms.
3. Data Processing and Analytics: The data collected by IoT devices is processed, analyzed, and
transformed into actionable insights. Data processing may occur on the device itself (edge
computing) or in centralized cloud-based platforms. Data analytics techniques, such as machine
learning and artificial intelligence, are used to extract patterns, trends, and correlations from IoT-
generated data, enabling predictive and prescriptive analytics.
4. Cloud Infrastructure: Many IoT applications rely on cloud computing platforms for data storage,
processing, and analytics. Cloud infrastructure provides scalability, flexibility, and accessibility for
managing IoT deployments and applications. Cloud platforms also offer services for device
management, security, and integration with other systems.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 13


Conttt..
1. Security and Privacy: Security is a critical consideration in IoT to protect against cyber threats, unauthorized
access, and data breaches. IoT security measures include encryption, authentication, access control, secure
bootstrapping, and over-the-air updates to ensure the confidentiality, integrity, and availability of data and
devices. Privacy-preserving techniques, such as anonymization and differential privacy, help safeguard user
privacy and sensitive information.
2. Application Development and Integration: IoT applications are developed and integrated with existing systems
and processes to deliver specific functionalities and services. Application development may involve custom
software development, use of IoT platforms and frameworks, and integration with third-party APIs and services.
User interfaces, dashboards, and mobile apps provide interfaces for users to interact with IoT devices and
access data and insights.
3. Deployment and Management: IoT deployments involve the installation, configuration, and maintenance of IoT
devices, networks, and applications. Devices are deployed in physical locations according to the specific
requirements of the application. Device management platforms facilitate provisioning, monitoring, firmware
updates, and troubleshooting of IoT devices throughout their lifecycle.
4. End-to-End Solutions: Successful implementation of IoT often requires collaboration among multiple
stakeholders, including device manufacturers, software developers, service providers, and end-users.
Interdisciplinary collaboration and partnerships drive innovation and ecosystem growth, fostering the
development of end-to-end IoT solutions that address specific use cases and industry needs.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 14


IoT Architecture And Levels
1. Perception Layer (Sensing):
1. The perception layer comprises IoT devices equipped with sensors and actuators to collect data from the physical environment and
interact with it.
2. Sensors detect changes or events in the environment (e.g., temperature, humidity, motion) and convert them into digital signals.
3. Actuators perform actions based on commands received from the system or user, such as controlling lights, valves, or motors.
2. Network Layer (Connectivity):
1. The network layer facilitates communication between IoT devices and connects them to other devices, systems, or cloud platforms.
2. Various communication technologies are used for IoT connectivity, including Wi-Fi, Bluetooth, Zigbee, RFID, cellular networks, and Low-
Power Wide-Area Networks (LPWANs).
3. Connectivity protocols ensure that devices can communicate effectively with each other and with central systems.
3. Middleware Layer (Data Processing and Management):
1. The middleware layer is responsible for data processing, management, and integration between devices and applications.
2. Data collected by IoT devices is processed, analyzed, and transformed into actionable insights.
3. Middleware components may include data processing engines, message brokers, data storage systems, and APIs for integration with other
systems.
4. Application Layer (Services and Applications):
1. The application layer provides services and applications that leverage IoT data to deliver specific functionalities and value-added services.
2. Applications may include real-time monitoring, predictive analytics, remote control, automation, and user interfaces.
3. User interfaces, dashboards, and mobile apps enable users to interact with IoT devices, access data, and control system parameters.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 15
Conttt….
1.Business Layer (Integration with Business Processes):
1. The business layer integrates IoT solutions with existing business processes, systems,
and workflows.
2. IoT data and insights are used to optimize operations, improve decision-making, and
create new business opportunities.
3. Integration with enterprise systems such as ERP (Enterprise Resource Planning),
CRM (Customer Relationship Management), and SCM (Supply Chain Management)
enhances organizational efficiency and agility.
2.Security and Privacy Layer:
1. Security is embedded throughout the IoT architecture to protect against cyber
threats, unauthorized access, and data breaches.
2. Security measures include encryption, authentication, access control, secure
bootstrapping, and over-the-air updates.
3. Privacy-preserving techniques, such as anonymization and differential privacy, help
safeguard user privacy and sensitive information.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 16


IoT Ecosystem
1. Devices and Sensors: IoT devices are the physical objects or "things" embedded with sensors, actuators, and connectivity capabilities.
These devices collect data from the environment and interact with it to perform specific functions or tasks. Examples include smart
sensors, wearables, industrial machines, connected vehicles, and smart home appliances.
2. Connectivity Technologies: IoT devices require connectivity to transmit data to other devices or central systems. Various communication
technologies are used for IoT connectivity, including Wi-Fi, Bluetooth, Zigbee, RFID, cellular networks, and Low-Power Wide-Area
Networks (LPWANs). These technologies ensure ubiquitous connectivity and interoperability within the IoT ecosystem.
3. Gateways and Edge Computing: Gateways are intermediary devices that bridge the gap between IoT devices and cloud-based platforms.
They aggregate, preprocess, and filter data locally before sending it to the cloud, reducing latency and bandwidth usage. Edge computing
refers to the processing of data at the edge of the network, closer to where it is generated, enabling real-time analytics and decision-
making.
4. Cloud Platforms and Services: Cloud computing platforms provide storage, processing, and analytics capabilities for managing IoT data
and applications. Cloud services offer scalable infrastructure, data management tools, and machine learning algorithms for developing
and deploying IoT solutions. These platforms enable remote monitoring, control, and management of IoT devices from anywhere with an
internet connection.
5. Data Analytics and Artificial Intelligence: Data analytics techniques, such as machine learning and artificial intelligence, are used to extract
insights from IoT-generated data. Predictive analytics models forecast future trends and events, while prescriptive analytics recommend
optimal actions based on data analysis. These analytics capabilities enable proactive decision-making and automation in IoT applications.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 17


Contt..
1. Security and Privacy Solutions: Security is a critical concern in the IoT ecosystem to protect against cyber threats,
unauthorized access, and data breaches. Security solutions include encryption, authentication, access control, secure
bootstrapping, and over-the-air updates. Privacy-preserving techniques ensure the confidentiality and integrity of IoT
data while safeguarding user privacy and sensitive information.
2. Standards and Protocols: Standards and protocols define the rules and specifications for communication,
interoperability, and security within the IoT ecosystem. Common standards include MQTT, CoAP, HTTP, Bluetooth Low
Energy (BLE), and LoRaWAN. These standards promote compatibility, reliability, and scalability in IoT deployments
across different industries and applications.
3. Application Development and Integration: IoT applications are developed and integrated with existing systems and
processes to deliver specific functionalities and services. Application development may involve custom software
development, use of IoT platforms and frameworks, and integration with third-party APIs and services. User interfaces,
dashboards, and mobile apps provide interfaces for users to interact with IoT devices and access data and insights.
4. Industry Verticals and Use Cases: The IoT ecosystem spans across various industry verticals, including smart homes,
healthcare, agriculture, manufacturing, transportation, energy, and environmental monitoring. Each industry has
specific use cases and applications for IoT technologies, addressing challenges and opportunities unique to their
domain.
5. Regulatory and Compliance Frameworks: Regulatory and compliance frameworks govern the use of IoT technologies to
ensure privacy, security, and ethical considerations are addressed. Regulations such as GDPR (General Data Protection
Regulation) and HIPAA (Health Insurance Portability and Accountability Act) impose requirements for data protection
and privacy in IoT deployments, influencing the design and implementation of IoT solutions.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 18
Value Chain
• The value chain is a framework introduced by Michael Porter to describe the activities involved in
creating value for a product or service within a single organization. It consists of primary activities
and support activities:
1. Primary Activities: These are the core activities involved in the creation, production, marketing,
and delivery of a product or service. They include:
1. Inbound Logistics: Procurement, transportation, and storage of raw materials.
2. Operations: Manufacturing, assembly, or service provision.
3. Outbound Logistics: Distribution, warehousing, and order fulfillment.
4. Marketing and Sales: Promotion, advertising, and sales activities.
5. Service: After-sales service, customer support, and warranty services.
2. Support Activities: These are the functions that support the primary activities and contribute to
the overall efficiency and effectiveness of the value chain. They include:
1. Procurement: Sourcing of inputs, negotiation with suppliers, and supply chain management.
2. Human Resource Management: Recruitment, training, and development of employees.
3. Technological Development: Research and development, technology acquisition, and innovation.
4. Infrastructure: Facilities, equipment, information systems, and organizational structure.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 19


Global Value Chain
• The global value chain (GVC) extends the concept of the value chain beyond the boundaries of a single organization
to encompass the entire network of activities involved in the production and distribution of goods and services
across multiple firms and countries. It emphasizes the fragmentation of production processes and the global
sourcing of inputs and components.
In a global value chain:
1. Upstream Activities: These involve the sourcing and production of raw materials, components, and intermediate
goods. Firms may source inputs from different countries to take advantage of cost efficiencies, access to specialized
expertise, or proximity to markets.
2. Midstream Activities: These include manufacturing, assembly, and processing activities carried out by different
firms across multiple locations. Production processes are often fragmented, with different stages of production
occurring in different countries based on factors such as labor costs, skills availability, and technological
capabilities.
3. Downstream Activities: These involve distribution, marketing, and sales activities aimed at reaching end
consumers. Firms may engage in market segmentation, branding, and customization to meet the diverse needs and
preferences of global consumers.
4. Supporting Activities: These encompass the infrastructure, logistics, and regulatory frameworks that facilitate the
smooth functioning of global value chains. Transportation networks, communication systems, trade agreements,
and intellectual property rights regimes play a crucial role in shaping the configuration and dynamics of global
value chains.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 20


Types of Networking areas
1.Local Area Network (LAN): Spans a small geographical area such as a single
building, office, or campus. Used for connecting devices within the same
physical location.
2.Wide Area Network (WAN): Covers a large geographical area, often
spanning multiple cities, countries, or continents. Connects LANs and other
networks over long distances.
3.Metropolitan Area Network (MAN): Covers a larger geographical area
than a LAN but smaller than a WAN, typically spanning a city or
metropolitan area.
4.Personal Area Network (PAN): Connects devices over a very short range,
typically within a person's immediate vicinity (e.g., within a few meters).
5.Campus Area Network (CAN): Interconnects multiple LANs within a
university campus, corporate campus, or similar large-scale environment.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 21


Contt…
1.Storage Area Network (SAN): Provides high-speed access to storage
devices such as disk arrays and tape libraries. Used for centralizing storage
resources and facilitating data sharing.
2.Virtual Private Network (VPN): Extends a private network across a public
network, such as the internet, enabling secure communication and data
exchange over long distances.
3.Intranet: A private network that uses internet protocols and technologies
to securely share information within an organization.
4.Extranet: Allows controlled access to selected resources from an external
network, typically used for collaboration between organizations or business
partners.
5.Internet: The global network of interconnected computers and networks
that use the Internet Protocol Suite (TCP/IP) to communicate.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 22


Contt…
1.Backbone Network: A high-speed network infrastructure that connects
multiple LANs and other networks within an organization or across
different locations.
2.Overlay Network: A virtual network built on top of an existing network
infrastructure, providing additional services or functionalities.
3.Ad-hoc Network: A decentralized type of wireless network where devices
communicate directly with each other without the need for a central
infrastructure.
4.Sensor Network: A network of interconnected sensors deployed in a
physical environment for monitoring and collecting data on various
parameters.
5.Mesh Network: A network topology where each node in the network
relays data for the network, providing multiple paths for data to travel.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 23


Contt….
1.Peer-to-Peer Network (P2P): A decentralized network architecture where participants
share resources and communicate directly with each other without a central server.
2.Cloud Network: A network infrastructure used to deliver cloud computing services over
the internet, providing scalable and on-demand access to computing resources.
3.Industrial Control System (ICS): A network used to monitor and control industrial
processes and equipment, often found in manufacturing plants, utilities, and critical
infrastructure.
4.Home Area Network (HAN): Connects devices within a home or residential environment,
typically used for home automation, entertainment, and communication.
5.Vehicle Area Network (VAN): Connects devices within vehicles, such as cars, trucks,
trains, and airplanes, enabling communication, navigation, and entertainment services.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 24


IoT Technologies used in IoT
• When referring to "technologies
used in IoT," it encompasses a
broad range of hardware and
software components,
protocols, standards, and
methodologies employed to
enable the Internet of Things
(IoT) ecosystem. These
technologies serve to connect,
manage, and process data
generated by IoT devices.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 25
Bluetooth:

• Enables short-range wireless communication between devices,


commonly used in personal area networks (PANs) for connecting
smartphones, wearables, and IoT devices.
• Frequency: 2.45 GHz
• Maximum data transfer rate: 2.1 Mb/ps
• Compatible hardware: Personal computers, Smartphones, Gaming
consoles, Audio devices
• Developed by: Bluetooth Special Interest Group Introduced: 7 May
1998

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 26


BLUETOOTH LOW ENERGY(BLE)/Bluetooth 4.0)
Bluetooth Low Energy (BLE) is a wireless communication technology designed for
low-power applications, particularly in IoT devices and wearables.
Data transmission rate/speed:-1Mbps

Advantages disadvantages
• Low power consumption • Limited range
• Extended battery life • Lower data transfer rates
• Wide compatibility with mobile compared to traditional Bluetooth
devices • Compatibility issues with some
• Simple and quick pairing process older devices
• Support for beacon technology • Increased latency for certain
applications
• Suitable for IoT and wearable
devices • Limited support for complex
applications

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 27


Wi-Fi (802.11)(Wireless Fidelity)
Provides high-speed wireless connectivity over short to medium distances, suitable
for indoor environments and high-bandwidth applications.
Data transfer rate 300Mb/ps

ADVANTAGES DISADVANTAGES
• Wireless connectivity • Limited range
• Convenience and Mobility • Interference
• Scalabitlity • Security concern
• Cost-effective • Bandwidth sharing
• Ease of installment • Reliability
• Versatility • Power consumption
• High data transfer rates • Complexity in deployment
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 28
Low Power WiFi
• The original WiFi standards are not suitable for IoT applocations due
to their highr power consumption
• Hence , IEEE 802.11 working group initiated 802.11ah task group to
develop a standard that supports low overhead , power friendly
communication suitable for sensors and remotes
• Low-power wireless technologies provide communication between
objects over long distances, but the data transfer rate between them
is relatively low (50 kbit/sec or less). Devices with this type of
communication consume less energy, use it more slowly, and can
work without recharging for a long time.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 29


LiFi(Light Fidelity)
• Li-Fi is a wireless communication
technology which utilizes light to transmit
data and position between devices. The
term was first introduced by Harald Haas
during a 2011 TEDGlobal talk in Edinburgh.
• LiFi is wireless communications that
provide military-grade security by default.
Light does not penetrate walls or leak
through material such as canvas or
curtains therefore can be contained in a
space eliminating the ability for man-in-
the-middle attacks outside a cone of
coverage or room. LiFi provides users with
the privacy and security that all modern
personal and professional networks
require.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 30


Zigbee(Alternative of Bluetooth)(IEEE 802.15.4)
Low-power, low-data-rate wireless communication protocol designed for battery
operated devices, low-cost, low-complexity IoT applications like home automation,
smart lighting, and sensor networks.
Communication area: 10-100meters
Advantages Disadvantages
• Low-power consumption • Limited data transfer rates
• Long battery life • Short range
• Mesh networking capability • Higher cost of implementation
• Scalability • Complexity in network setup
• Reliability • Limited compatibility with other
• Interference immunity wireless technologies

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 31


Z-Wave:
Similar to Zigbee, Z-Wave is a wireless communication protocol optimized for low-power, low-bandwidth IoT
devices in home automation and smart home applications .
Advantages Disadvantages
• Low-power consumption • Limited data transfer rates
• Long range • Higher cost of implementation
• Mesh networking capability • Limited compatibility with other
• Interference immunity wireless technologies
• Secure communication • Less widely adopted compared
to other standards like Zigbee or
• Easy installation and setup Wi-Fi

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 32


Cellular Networks:
• 2G, 3G, 4G LTE, 5G: Cellular networks provide wide-area coverage and
high-speed data transmission for IoT devices deployed in remote or
mobile environments, such as asset tracking, smart vehicles, and
industrial applications.
ADVANTAGES
• AWide coverage area
• High data transfer rates
• Relatively stable and reliable connection
• Supports mobility and roaming
• Secure communication
• Suitable for voice and data transmission
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 33
DISADVANTAGES OF CELLULER NETWORK
• Higher cost compared to other wireless technologies
• Limited availability in remote or rural areas
• Requires subscription plans and contracts
• Susceptible to network congestion
• Potential health concerns related to radio frequency
exposure

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 34


LPWAN (Low-Power Wide-Area Network):
• LoRaWAN (Long Range Wide Area Network): Utilizes the LoRa modulation technique to
enable long-range communication with low-power consumption, suitable for IoT
applications like smart agriculture, smart cities, and environmental monitoring.
➢Range :- 10-15km
➢Data Transmit speed :- 300bps to37.5kbps
➢Radio Frequency Band for India :- 867 Mhz
• Sigfox: Proprietary LPWAN technology that operates in the unlicensed ISM bands, providing
long-range, low-power connectivity for IoT devices with low data requirements.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 35


6LoWPAN (IPv6 over Low power Wireless
Personal Area Networks)
• It uses IPV6 Protocol . It’s a wireless sensor network
• Used in home –automation, agricultural and industrial Monitoring
➢It is used with IEEE 802.15.4 in the 2.4 GHz band,
➢Outdoor range: ~200 m (maximum)
➢Data rate: 200kbps (maximum)
➢Maximum number of nodes: ~100

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 36


THREAD
• A very new IP-based IPV6 networking protocol aimed
at the home automation environment is thread.
• Uses IPv6 for the internet protocol addressing and
each of the device is IP-addressable .
• It enable device to device and device to cloud
communication and reliably connects hundreds (or
thousands) of products and includes mandatory
security features
• Thread wireless connectivity has been developed
specifically to support IoT, As a result , it incorporates
many features that have not been available in
previous standards
• It is based on the broadly supported IEEE 802.15.4
radio standard , which is designed from the gournd
up for extremely low power consumption and low
latency

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 37


X-10
• X10 is one of the first home automation
technologies developed by Pico Electronics
of Glenrothes in Scotland in 1975.
• X10 is an open protocol for communication
between home automation devices that
mainly uses network wiring for signaling
and control, superimposing the signals on
the waveform of the sine wave. A further
radio-based X10 protocol has also been
defined.
• X10 works is by sending an X10 signal out
over your homes existing powerlines. The
X10 receivers (like switches, appliance
modules, etc) wait to hear their signal on
the power lines and then respond.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 38


RFID (Radio-Frequency Identification)
range approx. 1meter
1.Passive RFID: Tags are powered by the reader's radio
waves and do not require a battery. Used for applications
like asset tracking, inventory management, and access
control.
2.Active RFID: Tags have their own power source and can
transmit data over longer distances. Used in applications
where real-time tracking and monitoring are required,
such as supply chain management and logistics.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 39


NFC (Near Field Communication):

• Near-field communication is a set of communication protocols that enables


communication between two electronic devices
• NFC operates in a frequency range centered on 13.56 MHz and offers a data
transmission rate of up to 424 kbit/s within a distance of approximately 10
centimeters.
• NFC makes it easier to load multiple cards into a single phone for payments,
municipal transit, building access, opening car doors and other use cases.
• NFC supports interactive applications built on basic RFID capabilities such as
automatically pairing Bluetooth headphones and Wi-Fi connections.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 40


5G
• 5G refers to the fifth generation of cellular networking. It can provide
several GB/s data speeds with low latency. A 5G network will have
excellent dependability and support more users than the current
generation.
• Additionally, the user experience will be more consistent.
• 5G will provide a faster communication medium; you can expect
speeds up to a few gigabits per second. As a result, your devices can
coordinate and accomplish tasks faster.
• In addition, it will provide an ultra-low latency network; according to
Verizon, early 5G deployment showed a latency of 30 ms. That will
help use IoT devices to do delicate tasks such as surgery.
• Finally, because 5G has a high bandwidth, you can connect more
devices to it without experiencing quality loss.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 41


GSM (Global System for Mobile
Communications):
• GSM is a widely used cellular network technology that provides voice
and data services to mobile devices. It forms the backbone of
traditional mobile communication networks worldwide.
• Specifications:
➢Frequency Bands: GSM operates in various frequency bands, including the
850 MHz, 900 MHz, 1800 MHz, and 1900 MHz bands, depending on regional
standards.
➢Data Transfer Rates: GSM supports data transfer rates up to 14.4 kbps for
circuit-switched data (CSD) and up to 384 kbps for packet-switched data
(GPRS).
➢Coverage: GSM networks offer wide coverage areas, making them suitable for
long-distance communication in urban and rural areas.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 42


GPRS (General Packet Radio Service):
• GPRS is a packet-switched data service that extends the capabilities of GSM
networks by providing continuous, always-on data connectivity for mobile
devices. It enables faster data transfer rates and efficient use of network
resources.
• Specifications:
➢Data Transfer Rates: GPRS offers data transfer rates ranging from 56 kbps
to 114 kbps, depending on network conditions and device capabilities.
➢Packet-switched Technology: GPRS uses packet-switched technology to
transmit data in small, discrete packets, allowing for more efficient use of
network resources compared to circuit-switched connections.
➢Always-On Connectivity: GPRS provides always-on connectivity, allowing
devices to stay connected to the internet and receive data in real-time
without the need to establish a new connection for each data transfer

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 43


LTE-A (Long-Term Evolution Advanced):
• LTE-A is an advanced version of the LTE (Long-Term Evolution) cellular
network technology, designed to deliver higher data transfer rates, lower
latency, and improved spectral efficiency compared to earlier generations
of mobile networks.
• Specifications:
➢Data Transfer Rates: LTE-A offers peak data transfer rates of up to 1 Gbps for
downlink and 500 Mbps for uplink, depending on network conditions and device
capabilities.
➢Carrier Aggregation: LTE-A supports carrier aggregation, allowing multiple frequency
bands to be combined to increase bandwidth and data rates.
➢Advanced Antenna Technologies: LTE-A incorporates advanced antenna technologies
such as MIMO (Multiple Input Multiple Output) and beamforming to improve signal
quality, coverage, and capacity.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 44


WSN (Wireless Sensor Networks):
• WSNs are networks of spatially distributed autonomous sensors that communicate
wirelessly to monitor physical or environmental conditions, such as temperature,
humidity, pressure, and motion. They are widely used in IoT applications for real-time
monitoring and control.
• Specifications:
➢ Low Power Consumption: WSN nodes are designed for low power consumption to extend battery
life and enable long-term deployment in remote or inaccessible locations.
➢ Short Range: WSNs typically operate over short distances, ranging from a few meters to a few
kilometers, depending on the communication protocol and environmental conditions.
➢ Sensor Nodes: WSNs consist of sensor nodes equipped with sensing, processing, and
communication capabilities. These nodes collect data from the environment, process it locally, and
transmit it to a central gateway or base station for further analysis and decision-making.
➢ Mesh Topology: WSNs often employ a mesh topology, allowing nodes to communicate with each
other and relay data to extend coverage and improve network robustness.
➢ Application Areas: WSNs find applications in various fields, including environmental monitoring,
industrial automation, agriculture, healthcare, and smart cities, enabling real-time data collection,
analysis, and response.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 45


COMMUNICATION PROTOCOLS IN IOT
• In IoT, communication protocols refer to a set of rules and standards that
govern how devices communicate and exchange data within an IoT
ecosystem. These protocols define the format, structure, and encoding of
data packets, as well as the methods for transmitting, receiving, and
interpreting data between devices, networks, and applications.
Communication protocols play a crucial role in enabling interoperability,
compatibility, and seamless communication between heterogeneous IoT
devices, platforms, and systems. They ensure that devices from different
manufacturers can exchange data and interact with each other effectively,
regardless of their underlying hardware, software, or communication
technologies. Some common communication protocols used in IoT include
MQTT, CoAP, HTTP, AMQP, DDS, Zigbee, Bluetooth, Wi-Fi, LoRaWAN, and
NB-IoT, each serving specific requirements and use cases within the IoT
ecosystem.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 46


APPLICATION LAYER
PROTOCOLS
MQTT (Message Queuing Telemetry Transport)
CoAP (Constrained Application Protocol)
HTTP (Hypertext Transfer Protocol)
AMQP (Advanced Message Queuing Protocol)
DDS (Data Distribution Service)

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 47


MQTT (Message Queuing Telemetry
Transport):
• Specification: MQTT is a lightweight, publish-subscribe
messaging protocol designed for constrained devices and
low-bandwidth, high-latency, or unreliable networks. It
operates over TCP/IP and uses a "broker" for message
distribution.
• Features: Simple and efficient, support for Quality of Service
(QoS) levels, lightweight header overhead, topic-based
messaging, and bi-directional communication.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 48


CoAP (Constrained Application Protocol):
• Specification: CoAP is a specialized web transfer protocol for
constrained nodes and networks. It operates over UDP and
provides a request/response model similar to HTTP but with
lower overhead and better suitability for IoT devices.
• Features: Lightweight, RESTful architecture, support for
request/response and asynchronous notifications, built-in
support for resource discovery, and observation.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 49


HTTP (Hypertext Transfer Protocol):
• Specification: HTTP is the standard protocol used for
communication between web clients and servers. In IoT
applications, it is often used for device management,
firmware updates, and integration with web-based services.
• Features: Widely adopted and understood, support for
request/response model, stateless communication,
encryption via HTTPS, and compatibility with existing web
infrastructure.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 50


AMQP (Advanced Message Queuing
Protocol):
• Specification: AMQP is an open standard messaging protocol
designed for message-oriented middleware. It supports
reliable messaging, queuing, routing, and transaction
management in distributed systems.
• Features: Reliable message delivery, support for queuing,
publish-subscribe, and point-to-point communication
patterns, interoperability between different platforms and
programming languages.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 51


DDS (Data Distribution Service):
• Specification: DDS is a middleware protocol standard for
real-time data distribution and integration in distributed
systems. It provides a data-centric publish-subscribe model
optimized for high-performance, real-time applications.
• Features: High throughput and low latency, support for
data-centric communication, Quality of Service (QoS)
policies for reliability, scalability, and real-time constraints,
dynamic discovery of data producers and consumers.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 52


SUMMARY
• These protocols operate at the application layer
of the OSI model and provide the foundation for
communication and data exchange between IoT
devices, gateways, and cloud services. Each
protocol has its own set of specifications,
features, and use cases, allowing developers to
choose the most suitable protocol based on their
application requirements and constraints.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 53
XMPP (Extensible Messaging and Presence
Protocol):
• Specification: XMPP is an open-standard communication
protocol for real-time messaging, presence, and signaling.
Originally designed for instant messaging, it has been
extended to support IoT applications, providing a flexible and
extensible framework for device-to-device and device-to-
server communication.
• Features: Presence information, instant messaging, multi-
party chat, file transfer, extension via XMPP extensions
(XEPs) for IoT-specific functionalities such as sensor data
exchange, device control, and event notification.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 54
WebSocket:
• Specification: WebSocket is a communication protocol that
provides full-duplex, bidirectional communication between a
client and a server over a single, long-lived TCP connection. It
enables real-time, low-latency communication suitable for
interactive web applications, including IoT.
• Features: Full-duplex communication, low latency, minimal
overhead, supports binary and text data transmission, allows
for efficient message framing and multiplexing over a single
connection.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 55
TRANSPORT LAYER
PROTOCOLS
TCP (Transmission Control Protocol):
UDP (User Datagram Protocol):

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 56


TCP (Transmission Control Protocol):
• Specification: TCP is a connection-oriented protocol
that provides reliable, stream-based communication
between devices in IoT networks. It ensures data
integrity, in-order delivery, and congestion control.
• Features: Full-duplex communication, reliable data
delivery, error detection and correction, flow control,
congestion avoidance, support for connection
establishment and termination.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 57
UDP (User Datagram Protocol):
• Specification: UDP is a connectionless, lightweight
protocol that provides unreliable, datagram-based
communication between devices in IoT networks. It
offers low-latency, best-effort delivery without error
recovery.
• Features: Minimal overhead, low latency, no
connection establishment or termination overhead,
supports broadcast and multicast communication,
suitable for real-time applications.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 58
NETWORK LAYER
PROTOCOLS
IPv4 (Internet Protocol version 4)
IPv6 (Internet Protocol version 6)
6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks)

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 59


IPv4 (Internet Protocol version 4):
• I t is the main networking protocol
• There are two versions of IP (IPv4 and IPv6)
• It is limited to 32-bit address ,which only provide around 4.3 billion
addresses in total ,which is less than the current number in IoT
devices that are connected
• Allows data to be secured with encryption

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 60


IPv6 (Internet Protocol version 6):
• Specification: IPv6 is the latest version of the Internet
Protocol, designed to address the limitations of IPv4 and
accommodate the growing number of devices connected to
the internet. It provides a larger address space, improved
security, and better support for mobile and IoT devices.
• Features: 128-bit address space, hierarchical addressing,
stateless address autoconfiguration (SLAAC), neighbor
discovery, multicast support, extension headers for
additional functionality.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 61
6LoWPAN (IPv6 over Low-Power Wireless
Personal Area Networks)
• Specification: 6LoWPAN is a protocol adaptation layer
that enables the transmission of IPv6 packets over
low-power wireless networks, such as IEEE 802.15.4-
based networks commonly used in IoT applications.
• Features: Header compression, fragmentation and
reassembly of IPv6 packets to fit within the
constrained frame size of low-power wireless
networks, support for mesh networking, energy-
efficient operation.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 62
LINK LAYER PROTOCOLS
IEEE 802.3 Ethernet
IEEE 802.11 Wi-Fi
IEEE 802.16 WiMAX
LR-WPAN (Low-Rate Wireless Personal Area Network)

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 63


IEEE 802.3 Ethernet:
• Ethernet is one of the most widely used link layer protocols for local
area networks (LANs).
• It operates over various physical media such as twisted pair, fiber
optic, and coaxial cables.
• Ethernet uses CSMA/CD (Carrier Sense Multiple Access with Collision
Detection) for managing access to the shared communication
medium.
• Different variants of Ethernet include 10BASE-T, 100BASE-TX,
1000BASE-T (Gigabit Ethernet), 10GBASE-T, and more, each with
different data rates and physical characteristics.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 64
IEEE 802.11 Wi-Fi
• Wi-Fi is a wireless networking technology that allows devices to
connect to a local area network (LAN) wirelessly.
• It operates in the 2.4 GHz and 5 GHz frequency bands and uses
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) for
medium access control.
• Wi-Fi supports various standards such as 802.11a, 802.11b, 802.11g,
802.11n, 802.11ac, and 802.11ax (Wi-Fi 6), each offering different
data rates, range, and features.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 65


IEEE 802.16 WiMAX:
• WiMAX (Worldwide Interoperability for Microwave Access) is a
wireless broadband technology that provides high-speed internet
access over a wide area.
• It operates in licensed and unlicensed frequency bands, typically
between 2 GHz and 66 GHz.
• WiMAX supports both point-to-point and point-to-multipoint
topologies and can deliver broadband connectivity over long
distances, making it suitable for fixed wireless access and mobile
broadband applications.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 66


LR-WPAN (Low-Rate Wireless Personal Area
Network)
• LR-WPAN refers to low-power, low-data-rate wireless
communication technologies designed for short-range
communication in personal area networks.
• Examples of LR-WPAN protocols include Zigbee (based on
IEEE 802.15.4), Thread, and Bluetooth Low Energy (BLE).
• These protocols are optimized for low power consumption,
making them suitable for IoT devices, wireless sensors, and
other low-bandwidth applications.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 67


2G/3G/4G/5G – MOBILE COMMUNICATION
• There are different generations of mobile communication standards
including second generation (2g including GSM and CDMA )
• Third generation (3g including UTMS and CDMA2000)
• Fourth generation (4g- including LTE)
• IoTvdevices based on these standards can communicate over cellular
networks

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 68


COOMUNICATION MODELS

In IoT (Internet of Things), a communication model


refers to the pattern or structure of communication
between IoT devices, gateways, servers, and other
components within an IoT ecosystem. It defines how
data is exchanged, transmitted, and processed among
different entities in the IoT network. Communication
models play a crucial role in determining the efficiency,
scalability, reliability, and security of IoT deployments.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 69


REQUEST –RESPONSE MODEL
• Description: In the request-response model,
communication occurs between a client and a
server, where the client sends a request to the
server, and the server responds to the request.
This model is characterized by a synchronous,
one-to-one interaction pattern.
• Example: HTTP (Hypertext Transfer Protocol) is
a common example of a request-response
protocol used in IoT. A sensor device (client)
sends an HTTP request to a server to retrieve
sensor data, and the server responds with the
requested data.
• Working: The client initiates communication by
sending a request message to the server,
specifying the desired action or data. The server
processes the request and sends back a
response message containing the requested
information. This interaction is typically initiated
by the client, and the server acts as a responder.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 70


PUBLISH-SUBSCRIBE MODEL
• Description: In the publish-subscribe model,
communication is based on the concept of topics
or channels, where publishers (senders) publish
messages to specific topics, and subscribers
(receivers) subscribe to topics of interest to
receive messages. This model enables
asynchronous, many-to-many communication.
• Example: MQTT (Message Queuing Telemetry
Transport) is a popular publish-subscribe protocol
used in IoT. Sensors (publishers) publish sensor
data to specific topics, and applications or
services (subscribers) subscribe to topics to
receive real-time updates.
• Working: Publishers publish messages to specific
topics or channels, and subscribers receive
messages from topics they have subscribed to.
Messages are decoupled from senders and
receivers, allowing for flexible and scalable
communication. Publishers and subscribers do
not need to be aware of each other's presence or
existence.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 71
PUSH-PULL MODEL
• Description: The push-pull model combines
aspects of both the request-response and
publish-subscribe models. In this model, data
producers (pushers) push data to data
consumers (pullers), who pull data as needed.
This model supports both real-time streaming
and on-demand data retrieval.
• Example: Webhooks are an example of the push-
pull model in IoT. A data producer (e.g., a sensor)
pushes data to a predefined endpoint (URL), and
a data consumer (e.g., a server or application)
pulls the data from the endpoint when needed.
• Working: Data producers push data to
predefined endpoints or channels, and data
consumers pull data from these endpoints or
channels as needed. This model enables real-
time data streaming, where data is pushed to
consumers as soon as it becomes available, and
on-demand data retrieval, where consumers pull
data when required.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 72
EXCLUSIVE PAIR MODEL
• Description: In the exclusive pair communication
model, communication occurs between two
parties (a sender and a receiver) in an exclusive,
one-to-one manner. This model is characterized
by a direct, private interaction between the
sender and receiver.
• Example: Bluetooth communication between two
devices (e.g., a smartphone and a wearable
device) is an example of the exclusive pair
communication model. The two devices establish
a direct connection and exchange data exclusively
between them.
• Working: Two parties establish a direct
communication link, typically through pairing or
authentication mechanisms. Once the connection
is established, data is exchanged exclusively
between the sender and receiver without
involving other parties. This model ensures
privacy and security by limiting communication to
the exclusive
16-05-2024 pair of devices. GURPREET KAUR NIELIT CHANDIGARH 73
SENSORS
• Specifications: Sensors come in various types such as
temperature sensors, humidity sensors, motion sensors, light
sensors, pressure sensors, and many more. Each sensor type
has specific measurement ranges, accuracy levels, response
times, power consumption, and communication protocols.
• Properties: Sensors enable IoT devices to collect data from
the physical environment. They can be wired or wireless,
analog or digital, and they often have low power
consumption to prolong battery life in IoT devices.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 74
Cloud computing
• Specifications: Cloud computing provides on-demand access to a shared
pool of computing resources, including servers, storage, databases,
networking, and software applications. It offers scalability, elasticity, and
pay-as-you-go pricing models.
• Properties: Cloud computing enables IoT devices to offload data
processing, storage, and computation to remote servers in the cloud. It
facilitates real-time data analytics, machine learning, and centralized
management of IoT deployments.
• Cloud computing services:
➢IaaS -Infrastructure as a Service(Servers and storage)
➢PaaS -Platform as a Service(Development)
➢SaaS –Software as a Service (Application

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 75


BIG DATA ANALYTICS
• Specifications: Big data analytics involves processing and
analyzing large volumes of data (structured, semi-structured,
and unstructured) to extract insights, patterns, and trends. It
employs various techniques such as data mining, machine
learning, and statistical analysis.
• Properties: Big data analytics enables organizations to derive
actionable insights from IoT-generated data. It helps in
optimizing operations, improving decision-making,
predicting maintenance needs, and enhancing customer
experiences.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 76
COMMUNICATION PROTOCOL
• Specifications: Communication protocols enable IoT devices
to transmit data over networks. Examples include MQTT,
CoAP, HTTP, AMQP, WebSocket, Zigbee, LoRaWAN, NB-IoT,
Wi-Fi, Bluetooth, and Ethernet.
• Properties: Communication protocols vary in terms of range,
data rate, power consumption, latency, reliability, and
security features. The choice of protocol depends on factors
such as the specific IoT application, communication range,
power constraints, and interoperability requirements.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 77
EMBEDDED SYSTEM
• Specifications: Embedded systems are specialized computing
systems designed to perform specific functions within a
larger system or device. They typically consist of
microcontrollers or microprocessors, memory, input/output
interfaces, and firmware/software.
• Properties: Embedded systems in IoT devices enable control,
sensing, and communication functionalities. They often have
low power consumption, real-time processing capabilities,
and are optimized for specific tasks such as data acquisition,
sensor interfacing, and network communication.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 78
FOG COMPUTING
• Fog computing is an extension of cloud computing
that brings computational resources closer to the
edge of the network, closer to where data is
generated, collected, and consumed. It aims to
address the limitations of traditional cloud computing
by providing low-latency, real-time processing
capabilities and reducing the amount of data that
needs to be sent to the centralized cloud.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 79
HOW DOES IT WORKS
1.Edge Devices: IoT devices, sensors, and other edge devices generate vast
amounts of data. In a fog computing architecture, these devices have
limited processing power and storage capacity but are equipped with
connectivity to communicate with nearby fog nodes.
2.Fog Nodes: Fog nodes are intermediary computing devices deployed at the
edge of the network, closer to the data sources. These nodes can range
from routers, gateways, switches, to small servers and edge computing
devices. They perform processing tasks such as data filtering, aggregation,
pre-processing, and analysis.
3.Cloud Data Centers: While fog nodes handle real-time processing and
analytics, they can also communicate with centralized cloud data centers
when needed. The cloud serves as a repository for storing historical data,
performing complex analytics, training machine learning models, and
providing additional computational resources as required.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 80
PHYSICAL DESIGN OF IoT
The physical design of IoT (Internet of Things) devices involves several key considerations to
ensure functionality, reliability, and user-friendliness.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 81


LOGICAL DESIGN OF IoT
The logical design of IoT (Internet of Things) systems involves the architecture, protocols, data
processing, and communication mechanisms necessary to enable devices to collect, transmit,
analyze, and act upon data

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 82


FUNCTIONAL BLOCK OF IoT

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 83


TESSEL 1

• Tessel is an open-source hardware


and software platform for building
connected devices with JavaScript.
Tessel 1 is the first version of the
Tessel platform, featuring built-in
Wi-Fi and a variety of hardware
modules for sensor and actuator
interfacing. It offers a simple
programming model using Node.js
and npm packages, making it
accessible to web developers.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 84


ECLIPSE IoT
Eclipse IoT is an open-source community-driven initiative
focused on providing frameworks, tools, and runtime
environments for building IoT solutions. It includes projects
such as Eclipse Mosquitto (MQTT broker), Eclipse Paho (MQTT
client libraries), Eclipse Kura (IoT gateway framework), Eclipse
Kapua (IoT platform), and Eclipse SmartHome (home
automation framework).

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 85


ARDUINO
• Arduino is a popular open-source
electronics platform based on easy-
to-use hardware and software. It
includes microcontroller boards,
development environments, and a
vast ecosystem of libraries and add-
on modules. Arduino boards are
widely used for prototyping and
building IoT projects due to their
simplicity, versatility, and
affordability.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 86
PlatformIO
• PlatformIO is an open-source ecosystem for IoT
development that supports multiple platforms,
frameworks, and development boards. It provides a
unified development environment with support for
popular IDEs like Visual Studio Code, Atom, and
Eclipse. PlatformIO simplifies the process of managing
dependencies, libraries, and project configurations
across different hardware platforms.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 87
IBM Watson IoT Platform:
• IBM Watson IoT Platform is a cloud-based platform-as-
a-service (PaaS) offering for building and deploying IoT
solutions. It provides tools for device management, data
analytics, visualization, and integration with IBM
Watson AI services. The platform supports various
protocols and standards for device connectivity and
interoperability.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 88


Raspbian
• Raspbian is a Debian-based
operating system optimized
for Raspberry Pi single-board
computers. It includes a suite
of tools and libraries for IoT
development, making it easy
to get started with projects on
the Raspberry Pi platform.
Raspbian supports
programming languages like
Python, C/C++, and Node.js,
as well as popular IoT
frameworks and protocols.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 89
Kaa IoT Platform
• Kaa is an open-source IoT platform for building,
managing, and integrating connected devices
and applications. It offers features for device
management, data collection, rule-based
processing, and visualization. Kaa supports
multiple communication protocols and can be
deployed on-premises or in the cloud.
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 90
Home Assistant:
• Home Assistant is an open-source home automation
platform that runs on various hardware platforms,
including Raspberry Pi. It provides a user-friendly
interface for configuring and controlling smart home
devices, integrating with popular IoT protocols,
services, and platforms. Home Assistant supports
customization through plugins and automation scripts.

16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 91


THANK YOU
16-05-2024 GURPREET KAUR NIELIT CHANDIGARH 92

You might also like