0% found this document useful (0 votes)
85 views79 pages

Iiot Unit 3

This document outlines the course structure for 'Industrial IoT Applications' at RMK Group of Educational Institutions, detailing objectives, prerequisites, syllabus, and course outcomes. It emphasizes the importance of IoT and IIoT, covering topics such as sensor technology, cloud platforms, security, and real-time applications in industry. Additionally, it includes a lecture plan, assessment schedule, and project suggestions for students.

Uploaded by

pawanraju2k3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views79 pages

Iiot Unit 3

This document outlines the course structure for 'Industrial IoT Applications' at RMK Group of Educational Institutions, detailing objectives, prerequisites, syllabus, and course outcomes. It emphasizes the importance of IoT and IIoT, covering topics such as sensor technology, cloud platforms, security, and real-time applications in industry. Additionally, it includes a lecture plan, assessment schedule, and project suggestions for students.

Uploaded by

pawanraju2k3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 79

Please read this disclaimer before

proceeding:
This document is confidential and intended solely for the educational purpose
of RMK Group of Educational Institutions. If you have received this document
through email in error, please notify the system manager. This document
contains proprietary information and is intended only to the respective group
/ learning community as intended. If you are not the addressee you should
not disseminate, distribute or copy through e-mail. Please notify the sender
immediately by e-mail if you have received this document by mistake and
delete this document from your system. If you are not the intended recipient
you are notified that disclosing, copying, distributing or taking any action in
reliance on the contents of this information is strictly prohibited.
20EC004 Industrial IoT
Applications
Department: CSE, CSD & IT
Batch/Year: 2023 -2024/ IVYear

Created by: Dr. T Ramesh(CSE),


Dr.Jeno Jasmine J(CSE),

Date: 23.03.2023
CONTENTS

1 Course Objectives

2 Pre Requisites

3 Syllabus

4 Course outcomes

5 CO- PO/PSO Mapping

6 Lecture Plan

7 Lecture Notes

8 Assignments

9 Part A Q & A

10 Part B Questions

11 Activity based learning

12 Supportive online Certification courses

13 Real time Applications in day to day life and to Industry

14 Contents beyond the Syllabus

15 Assessment Schedule

16 Prescribed Text Books & Reference Books

17 Mini Project suggestions

5
1. Course Objectives

6
1. Course
Objectives

OBJECTIVES:

OUTCOMES: On successful completion of this course, the student will be able to

CO1: Describe IOT, IIOT


CO2: Understand various IoT Layers and their relative importance
CO3: Interpret the requirements of IIOT sensors and understand the role of
actuators.

CO4: Study various IoT platforms and Security


CO5: Realize the importance of Data Analytics in IoT
CO6: Design various applications using IIoT in manufacturing sector

7
2. Pre Requisites

8
3. PRE REQUISITES

Pre-requisite Chart

20IT909 Advanced Java- JEE

20IT501 Web Development Frameworks

9
3. Syllabus

10
3. Syllabus
20EC004:Industrial IoT Applications LTPC:3003
UNIT I INTRODUCTION
Introduction to IOT, What is IIOT? IOT Vs. IIOT, History of IIOT, Components of IIOT –
Sensors,Interface, Networks, People Process, Hype cycle, IOT Market, Trends; future Real life
examples,Key terms IOT Platform, Interfaces, API, clouds, Data Management Analytics, Mining
Manipulation;Role of IIOT in Manufacturing Processes, Use of IIOT in plant maintenance
practices, Sustainability through Business excellence tools Challenges, Benefits in implementing
IIOT

UNIT II ARCHITECTURE AND PROTOCOLS


Overview of IOT components; Various Architectures of IOT and IIOT, Advantages
&disadvantages,Industrial Internet - Reference Architecture; IIOT System components:
Sensors, Gateways, Routers,Modem, Cloud brokers, servers and its integration, WSN, WSN
network design for IOT; Need for protocols, Wi-Fi, Zigbee, Bacnet, IIOT protocols COAP, MQTT,
6LoWPAN, LWM2M, AMPQ.

UNIT III SENSORS AND INTERFACING


Introduction to sensors, Transducers, Classification, Roles of sensors in IIOT , Various types

of sensors ,Design of sensors, sensor architecture, special requirements for IIOT sensors, Role

of actuators, types of actuators. Hardwire the sensors with different protocols such as

HART, MODBUS-Serial,Parallel,Ethernet, BACNet , Current, M2M


UNIT IV CLOUD, SECURITY AND GOVERNANCE
IIOT cloud platforms: Overview of cots cloud platforms, predix, thingworks, azure,. Data
analytics, cloud services, Business models: Saas, Paas, Iaas; Introduction to web security,
Conventional web technology and relationship with IIOT, Vulnerabilities of IoT, IoT security
tomography and layered attacker model,Identity establishment, Access control, Message
integrity; Management aspects of cyber security

UNIT V IOT ANALYTICS AND APPLICATIONS


IOT Analytics : Role of Analytics in IOT, Data visualization Techniques, Statistical Methods; IOT
Applications : Smart Metering, e-Health Body Area Networks, City Automation, Automotive
Applications, Plant Automation, Real life examples of IIOT in Manufacturing Sector

11
4. Course outcomes

12
5. COURSE OUTCOME

At the end of the course, the student should be able to:

COURSE OUTCOMES HKL

CO1: Describe IOT, IIOT K2

CO2: Understand various IoT Layers and their relative importance K3

CO3: Understand various IoT Layers and their relative importance K3

CO4: Understand various IoT Layers and their relative importance K3

CO5: Realize the importance of Data Analytics in IoT K4

CO6: Realize the importance of Data Analytics in IoT K5

HKL = Highest Knowledge Level

7
13
5. CO- PO/PSO Mapping

14
5. CO- PO/PSO Mapping

PO PO PO PO PO PO PO PO PO PO1 PO1 PO1 POS POS POS


CO #
1 2 3 4 5 6 7 8 9 0 1 2 1 2 3
CO1 3 2 2 3 2 _ _ 3 2 3 _ 3 3 3 _
CO2 3 2 2 2 2 _ _ 3 2 2 _ 3 3 3 _
CO3 3 2 2 3 3 _ _ 3 2 2 _ 3 3 3 _
CO4 3 2 2 3 2 _ _ 3 2 2 _ 3 3 3 _
CO5 3 2 2 1 1 _ _ 3 2 2 _ 3 3 3 _
CO6 3 2 1 1 2 _ _ 2 2 2 _ 2 2 2 _
6. Lecture Plan

16
6. Lecture Plan

Duration Course Delivery Plan


S.
Planned Delivery
No From To Topics
Date Data

Introduction to
sensors,
1 Transducers,
Classification,
Roles of sensors
2 in IIOT
Various types of
sensors , Design
3 of sensors,
sensor
architecture,
4 special
requirements for
IIOT sensors,
Role of
actuators, types
5 of actuators.
Hardwire the
sensors with
6 different protocols
such as HART,
MODBUS-Serial,

7
Parallel, Ethernet,

8
BACNet , Current,
M2M
9

10

17
7. Lecture Notes

18
UNIT III
9. Lecture Notes

Introduction: Sensors

Transducer:
Converts a signal from one physical form to another physical form
Physical form: thermal, electric, mechanical, magnetic, chemical, and optical
Energy converter
Example:
Microphone : Converts sound to electrical signal
Speaker : Converts electrical signal to sound
Antenna : Converts electromagnetic energy into electricity and vice
versa
Strain gauge : Converts strain to electrical

Definition of Sensor:
The characteristic of any device or material to detect the presence of a
particular physical quantity

The output of sensor is signal, which is converted to human readable form.


Performs some function of input by sensing or feeling the physical changes in the
characteristic of a system in response to stimuli
Input: Physical parameter or stimuli
Example: Temperature, light, gas, pressure, and

sound Output: Response to stimuli


Sensor Characteristics
Static characteristics
After steady state condition, how the output of a sensor change in response to an
input change
Dynamic characteristics
The properties of the system’s transient response to an input.
Static characteristics
Accuracy
Represents the correctness of the output compared to a superior system
The different between the standard and the measured value

Range
• Gives the highest and the lowest value of the physical quantity within which the
sensor can actually sense
• Beyond this value there is no sensing or no kind of response.
Resolution
• Provides the smallest change in the input that a sensor is capable of sensing
• Resolution is an important specification towards selection of sensors.
• Higher the resolution better the precision
Errors
The difference between the standard value and the value produced by sensor
Sensitivity
• Sensitivity indicates ratio of incremental change in the response of the system
with respect to incremental change in input parameter.
• It can be found from slope of output characteristic curve of a sensor
Linearity
The deviation of sensor value curve from a particular straight line
Drift
The difference in the measurements of sensor from a specific reading when kept at
that value for a long period of time
Repeatability
The deviation between measurements in a sequence under same conditions
Dynamic characteristics
How well a sensor responds to changes in its input

Zero order system


• Output shows a response to the input signal with no delay
• Does not include energy-storing elements
• Example: Potentiometer measures linear and rotary displacements
First order system
• When the output approaches its final value gradually
• Consists of an energy storage and dissipation element
Second order system
• Complex output response
• The output response of sensor oscillates before steady state
Sensor Classification
Passive Sensor
• Cannot independently sense the input
• Example: Accelerometer, soil moisture, water-level, and temperature sensors
Active Sensor
• Independently sense the input
• Example: Radar, sounder, and laser altimeter sensors
Analog Sensor
• The response or output of the sensor is some continuous function of its input
parameter
• Example: Temperature sensor, LDR, analog pressure sensor, and Analog Hall
effect/Magnetic Sensor
• A LDR shows continuous variation in its resistance as a function of intensity of
light falling on it.
Digital Sensor
• Responses in binary nature
• Designs to overcome the disadvantages of analog sensors
• Along with the analog sensor it also comprises of extra electronics for bit
conversion
• Example: Passive infrared (PIR) sensor and digital temperature sensor (DS1620).
Scalar Sensor
• Detects the input parameter only based on its magnitude
• The response of the sensor is a function of magnitude of the input parameter
• Not affected by the direction of the input parameter
• Example: Temperature, gas, strain, color, and smoke sensors.
Vector Sensor
• The response of the sensor depends on the magnitude of the direction and
orientation of input parameter
• Example : Accelerometer, gyroscope, magnetic field, and motion detector sensors.
Actuator
• An actuator is part of the system that deals with the control action required
(mechanical action)
• Mechanical or electro-mechanical devices.
• A control signal is input to an actuator and an energy source is necessary for its
operation.
• Available in both micro and macro scales
• Example: Electric motor, solenoid, hard drive stepper motor

Classification of Actuators
Electric Linear Actuator
• Powered by electrical signal
• Mechanical device containing linear guides, motors, and drive mechanisms
• Converts electrical energy into linear displacement
• Used in automation applications including electrical bell, opening and closing
dampers, locking doors, and braking machine motions.

Electric Rotary Actuator


• Powered by electrical signal
• Converts electrical energy into rotational motion
• Applications including quarter-turn valves windows, and robotics
Fluid Power Linear Actuator
• Powered by hydraulic fluid, gas, or differential air pressure
• Mechanical devices have cylinder and piston mechanisms
• Produces linear displacement
• Primarily used in automation applications including clamping and welding
Fluid Power Rotary Actuator
• Powered by fluid, gas, or differential air pressure
• Consisting of gearing, and cylinder and piston mechanisms
• Converts hydraulic fluid, gas, or differential air pressure into rotational motion
• Primarily applications of this actuator are opening and closing dampers, doors,
and clamping.

Linear Chain Actuator


• Mechanical devices containing sprockets and sections of chain
• Provides linear motion by the free ends of the specially designed chains
• Primarily used in motion control applications
Manual Linear Actuator
• Provides linear displacement through the translation of manually rotated screws
or gears
• Consists of gearboxes, and hand operated knobs or wheels
• Primarily used for manipulating tools and workpieces
Manual Rotary Actuator
• Provides rotary output through the translation of manually rotated screws, levers, or
gears
• Consists of hand operated knobs, levers, handwheels, and gearboxes
• Primarily used for the operation of valves.

Sensor Network Architecture

Three layers:
1. Services layer
2. Data Layer
3. Physical Layer
• Services including routing protocol, data dissemination and data aggregation.
• Data layer models all the messages
• Physical layer consists of nodes that are sinks, children nodes, cluster heads and
parents.
• The sink nodes broadcast a query.
• Sensor nodes close to sensed object broadcast the sensed data to their neighboring sensor
nodes.
• Cluster heads receive this data from their children nodes and are responsible for
processing and aggregating it.
• Cluster heads then broadcast the response to the sink nodes through neighboring nodes.

Sensor Network Challenges:


• Low energy use
• AdHoc Network Discovery
• Network control and routing
• Collaborative information and processing
• Tasking and querying
Design of sensors:

Purpose and Functionality:


- Sensors are designed to detect and measure specific physical or environmental properties,
such as temperature, pressure, light, or chemical composition.
- They convert these physical changes into electrical signals for processing and analysis.
Sensing Element:
- Sensors consist of a sensing element, which is the core component responsible for
detecting the target parameter.
- The sensing element can vary depending on the type of sensor; for example, a
thermocouple for temperature sensing or a photodiode for light sensing.
, sensors include a transducer that converts the physical change into an electrical signal.
- Transducers can be mechanical, electromagnetic, or chemical in nature.
Sensitivity and Range:

Sensor design considers the desired sensitivity (ability to detect small changes) and the range
(the span of values it can measure).
- Calibration may be necessary to ensure accuracy within the specified range.

Selectivity and Specificity:


- Some sensors are designed to be selective, meaning they respond only to a specific property
(e.g., pH sensors for acidity).
- Specificity ensures minimal interference from other environmental factors.

Response Time:
- Sensors are designed with a specific response time, indicating how quickly they can detect
and report changes in the measured parameter.
- Faster response times are essential for certain applications, such as safety-critical systems.

Resolution:
- Resolution refers to the smallest detectable change in the parameter being measured.
- High-resolution sensors can discern subtle variations, while lower resolution sensors provide a
more generalized reading.

Output Signal:
- Sensor output signals can be analog (continuous voltage or current) or digital (discrete
values).
- Analog sensors often require additional analog-to-digital conversion for digital processing.

. Power Requirements:
- Sensor design considers power consumption, with some sensors optimized for low power to
prolong battery life or reduce energy costs.

User Interface:
- Some sensor designs include user-friendly interfaces like displays or apps for easy interaction
and data visualization.
HART COMMUNICATION PROTOCOL:

HART-HIGHWAY ADDRESSABLE REMOTE TRANSDUCER

• Global standard for sending and receiving digital information across


analog wires between smart field devices and control or monitoring
systems, like PLC and DCS systems.

• Field Devices: pressure, flow, temp. transmitters, valve positioners and


actuators.

• Digital networking facility to access any instrument, field device or


controller for configuration and diagnostics from any point of the network.

• Digital information utilizes the existing 4 mA to 20 mA network, making it


easy to deploy in new as well as existing systems. Acurately encode and
decode in harsh and noisy conditions.

• HART protocol extends existing 4-20 mA current loop with intelligent


measurement and control.

• It uses FSK(Frequency Shift Keying) technique to superimpose digital


signal on 4-20mA current signal.
Theory of Operation:

The basic principles behind the operation of HART instruments and networks:

• Communication Modes
• Frequency Shift Keying
• HART Networks
• HART Commands

Communication Modes:

1. Master- Slave Mode:

• During normal operation, each slave (field device) communication is initiated by


a master communication device (Controller).HART provides for up to two masters
-primary and secondary.
• The primary master is generally a distributed control system (DCS),
programmable logic controller (PLC), or a personal computer (PC)
.• The secondary master can be a handheld terminal or another PC.Slave devices
include transmiters, actuators, and controllers that respond to commands from
the primary or secondary master.
2. Burst Mode:
In burst mode, the master instructs the slave device to continuously broadcast a
standard HART reply message (e.g., the value of the process variable).
The master receives the message at the higher rate until it instructs the slave to
stop bursting. It is also called "Broadcast Mode".
• Used for fast updating of the value of a measured variable.

Frequency Shift Keying:

• It is based on the Bell 202 telephone communication standard and operates


using the frequency shift keying (FSK) principle.
• The digital signal is made up of two frequencies- 1,200 Hz and 2,200 Hz
representing bits 1 and 0, respectively.
• Sine wave of these two frequencies is superimposed on the direct current (de)
analog signal cables to provide simultaneous analog and digital communications.
• Masters are connected parallel to field devices, So devices can be easily
connected or disconnected and the current loop remains uninterrupted.
HART Networks:
1. Point-to-Point mode:

• Both analog and digital communications are supported.4-20 mA signal is used


to communicate one process variable.
• Additional process variables, configuration parameters, and other device data
are transferred digitally using the HART protocol.
• The 4-20 mA analog signal is not affected by the HART signal and can be used
for control in the normal way.
• The HART communication digital signal gives access to secondly variables and
other data that can be used for operations, commissioning, maintenance, and
diagnostic purposes.

2. Multidrop mode:

• In multidrop operation, the devices exchange their data and measured


values only via the HART protocol.
• The analog current signal serves just to energize the two-wire devices,
providing a direct current of 4 mA.
• Requires only a single pair of wires. Up to 15 field devices are connected
in parallel to a single wire pair and the host distinguishes the field devices
by their preset addresses which range from 1 to 15.
HART commands:

1. Universal:
Provides functions which are implemented in all field devices.
Examples:
Read model
Read serial number
Read range

2.Common Practice:
Provides functions common to many field devices but not all. If a device uses these
functions, these commands should be used to perform them.

Examples:

Read (up to 4) variables


Perform calibration check
Perform self-test

3.Device specific:
Provides functions which are more or less unique to a particular field device.
Examples:

Select OC/OF (temperature sensor)


Tune a control parameter (control device)
Write alarm set point (relay)

Advantages of HART:

1.Improved plant operations


2.Operational flexibility
3.Instrumentation investment protection
4.Digital communication
Why Globally Accepted?
• Preserves present control strategies by allowing traditional 4-20 mA signals to
co-exist with digital communication on existing two-wire loops.

• Is compatible with traditional analog devices Provides important information for


installation and maintenance, such as Tag-IDs, measured values, range and span
data, product information and diagnostics.

• Reduces operation costs, through improved management and utilization of smart


instrument networks.

MODBUS-SERIAL COMMUNICATION PROTOCOL:

Modbus is a request-response protocol implemented using a master-slave


relationship. In a master-slave relationship, communication always occurs in pairs
one device must initiate a request and then wait for a response and the initiating
device (the master) is responsible for initiating every interaction.

Typically, the master is a human machine interface (HMI) or Supervisory Control


and Data Acquisition (SCADA) system and the slave is a sensor, programmable
logic controller (PLC), or programmable automation controller (PAC). The content
of these requests and responses, and the network layers across which these
messages are sent, are defined by the different layers of the protocol.
Layers of the Modbus Protocol:

Modbus was a single protocol built on top of serial, so it could not be divided into
multiple layers. Over time, different application data units were introduced to either
change the packet format used over serial or to allow the use of TCP/IP and user
datagram protocol (UDP) networks. This led to a separation of the core protocol, which
defines the protocol data unit (PDU), and the network layer, which defines the
application data unit (ADU).

Protocol Data Unit:

• The PDU and the code that handles it comprise the core of the Modbus Application
Protocol Specification.
• This specification defines the format of the PDU, the various data concepts used by
the protocol, the use of function codes to access that data, and the specific
implementation and restrictions of each function code.
• The Modbus PDU format is defined as a function code followed by an associated set
of data.
• The size and contents of this data are defined by the function code, and the entire
PDU (function code and data) cannot exceed 253 bytes in size.
Accessing Data in Modbus and the Modbus Data Model:

Memory Master Slave


Data Type
Block Access Access

Coils Boolean Read/Write Read/Write

Discrete
Boolean Read-only Read/Write
Inputs

Holding Unsigned
Read/Write Read/Write
Registers Word

Input Unsigned
Read-only Read/Write
Registers Word

Table 1. Modbus Data Model Blocks


Data Model Addressing:

The specification defines each block as containing an address space of as many as


65,536 (216) elements. Within the definition of the PDU, Modbus defines the address of
each data element as ranging from 0 to 65,535

Data Addressing Ranges:

To simplify the discussion of memory block locations, a numbering scheme


was introduced, which added prefixes to the address of the data in
question.

For example, rather than referring to an item as holding register 14 at


address 13, a device manual would refer to a data item at address 4,014,
40,014, or 400,014. In each case, the first number specified is 4 to
represent holding registers, and the address is specified using the
remaining numbers. The difference between 4XXX, 4XXXX, and 4XXXXX
depends on the address space used by the device. If all 65,536 registers
are in use, 4XXXXX notation should be used, as it allows for a range from
400,001 to 465,536. If only a few registers are used, a common practice is
to use the range 4,001 through 4,999.

In this addressing scheme, each data type is assigned a prefix as shown in


Table 2.

Data Block Prefix

Coils 0

Discrete Inputs 1

Input Registers 3

Holding Registers 4

Table 2. Data Range Prefixes


Coils exist with a prefix of 0. This means that a reference of 4001 could refer to
either holding register one or coil 4001. For this reason, all new implementations are
recommended to use 6-digit addressing with leading zeros, and to note this in the
documentation. Thus, holding register one is referenced as 400,001 and coil 4001 is
referenced as 004,001.

Data Address Start Values:

The difference between memory addresses and reference numbers is further


complicated by the indexing selected by a given application. As mentioned
previously, holding register one is at address zero. Typically, reference numbers are
one-indexed, meaning that the start value of a given range is one. Thus, 400,001
translates literally to holding register 00001, which is at address 0. Some
implementations choose to start their ranges at zero, meaning that 400,000
translates to the holding register at address zero. Table 3 demonstrates this concept.

Number Number
Register
Address (1-indexing, (0-indexing,
Number
standard) alternative)

0 1 400001 400000

1 2 400002 400001

2 3 400003 400002

Table 3. Register Indexing Schemes

The Modbus PDU:


The PDU consists of a one-byte function code followed by up to 252 bytes of
function-specific data.
The function code is the first item to be validated. If the function code is not recognized by
the device receiving the request, it responds with an exception. Should the function code be
accepted, the slave device begins decomposing the data according to the function
definition.

Because the packet size is limited to 253 bytes, devices are constrained on the amount of
data that can be transferred. The most common function codes can transfer between 240
and 250 bytes of actual data from the slave data model, depending on the code.

Application Data Unit:

In addition to the functionality defined at the PDU core of the Modbus protocol, you can use
multiple network protocols. The most common protocols are serial and TCP/IP, but you can
use others like UDP as well. To transmit data necessary for Modbus across these layers,
Modbus includes a set of ADU variants that are tailored to each network protocol.

Common Features
Modbus requires certain features to provide reliable communication. The Unit ID or Address
is used in each ADU format to provide routing information to the application layer. Each
ADU comes with a full PDU, which includes the function code and associated data for a
given request

Standard Formats
The three standard ADU formats are TCP, remote terminal unit (RTU), and ASCII. RTU and
ASCII ADUs are traditionally used over a serial line, while TCP is used over modern TCP/IP
or UDP/IP networks.

TCP/IP
The TCP ADUs consists of the Modbus Application Protocol (MBAP) Header concatenated
with the Modbus PDU. The MBAP is a general-purpose header that depends on a reliable
networking layer. The format of this ADU, including the header, is shown in Figure 6.

The data fields of the header indicate its use. First, it includes a transaction identifier. This is
valuable on a network where multiple requests can be outstanding simultaneously. That is,
a master can send requests 1, 2, and 3. At some later point, a slave can respond in the
order 2, 1, 3, and the master can match the requests to the responses and parse data
accurately. This is useful for Ethernet networks.
The protocol identifier is normally zero, but you can use it to expand the behavior of
the protocol. The length field is used by the protocol to delineate the length of the
rest of the packet.

The Unit ID is typically unused for TCP/IP devices. However, Modbus is such a
common protocol that many gateways are developed, which convert the Modbus
protocol into another protocol. In the original intended use case, a Modbus TCP/IP
to serial gateway could be used to allow connection between new TCP/IP networks
and older serial networks. In such an environment, the Unit ID is used to determine
the address of the slave device that the PDU is actually intended for.

Finally, the ADU includes a PDU. The length of this PDU is still limited to 253 bytes
for the standard protocol.

RTU
The RTU ADU appears to be much simpler, as shown in Figure 7.

ASCII
The ASCII ADU is more complex than RTU as shown in Figure 8, but also avoids many of
the issues of the RTU packet. However, it has some of its own disadvantages.
Resolving the issue of determining packet size, the ASCII ADU has a well-defined and
unique start and end for each packet. That is, each packet begins with “:” and ends
with a carriage return (CR) and line feed (LF). In addition, serial APIs like NI-VISA and
the .NET Framework SerialPort Class can easily read data in a buffer until a specific
character—like CR/LF—is received. These features make it easy to process the stream
of data on the serial line efficiently in modern application code.

Network Layers:

Modbus can run on many network layers besides serial and TCP. A potential
implementation is UDP because it is suited to the Modbus communication style.
Modbus is a message-based protocol at its core, so UDP’s ability to send a
well-defined packet of information without any additional application-level information,
like a start character or length, makes Modbus extremely simple to implement.

ADU Modifications

Finally, an application could choose to modify an ADU, or use unutilized portions of an


existing ADU like TCP. For example, TCP defines a 16-bit length field, a 16-bit
protocol, and an 8-bit unit ID. Given that the largest Modbus PDU is 253 bytes, the
high byte of the length field is always zero. For Modbus/TCP, the protocol field and
unit ID are always zero. A simple extension of the protocol might send three packets
simultaneously by changing the protocol field to a non-zero number and using the two
unused bytes (unit ID and the high byte of the length field) to send the lengths of two
additional PDUs (see Figure 9).
The Protocol
• BACnet separates the two aspects of any communication
1.Transport 2. Message
• There is a variety of different standards transporting messages BACnet for messages. Can
use optimized forms of media type to reduce cost
• The message that is transported is the same regardless of the physical transport
mechanism.
• Internetworking
• Simply put, internetworking is required whenever we need to couple dissimilar LAN
technologies and control the traffic exchanged between them
1. Routers
• A router is required whenever we need to couple similar or dissimilar LAN
technologies and control the traffic exchanged between them.
• The router does not modify BACnet message it just forward it the from one LAN to the
other when ever it needs to
2. Gateways
• Are special types of internetworking devices that couple BACnet networks to
non-BACnet or proprietary networks .
• Like a router, the gateway is continuously listening to messages on two or more
LANs.
• The difference is that the gateway cannot simply repeat the BACnet message on the
non-BACnet LAN; “it needs to translate it”

Parallel Communication:

• Parallel communication is a method of sending several data signals simultaneously over a


transmission link at one time. It comprises of several wired channels in parallel.
• In parallel mode of transfer, there is a onetime transfer of data from source to destination.
This is possible using multiple channels for data transfer between transmitter and receiver.
• The basic difference between a parallel and a serial channel is its quantity of
various wires in the physical form that is used for transmission of data between
different devices.
• In contrast to serial transmission, Parallel data transfer uses more than one
wire (and that is excluding the ground wire).
• This mode of communication is expensive since it requires additional cables
and hardware. Nevertheless, it is considered to be a swift mode of transfer.
Printers, RAM, ISA, ATA, SCSI, PCI, Front side bus ,etc., use parallel data
transmission.
Parallel Communication Works:

In parallel communication, many bits (normally 8 bits or multiples of it) are


transferred at the same time on various parallel paths (wires) within the same cable
in synchronization with a single clock. The clock provides the timing for transmission
as a constant clocking signal through the parallel paths.

Parallel Communication – Data Flow through Parallel Paths

• As many bits are transferred over various parallel paths at the same time, the order
of received bit strings may be different or out of sync subject to various factors
such as source distance, location and available bandwidth.
• An example of this is distortion/skipping in internet calls (VOIP) and video
streaming.

Characteristics of Parallel Communication:

The development of high speed serial communication technologies, the


selection of parallel links against serial communication links was decided by following
characteristics:
High Speed Data transfer:
The data exchange speed of a parallel communication data link is equivalent to the
multiplication of the number of parallel paths and the number of bits processed at a unit
time. Therefore, the more is the parallel path, the higher is the achieved data transfer speed.

Limited Cable Length:

As the length of cable increases, so does the amount of metal wires. This increases the
chances of Cross-talk. Cross-talk means interference between the cable wires and it leads to
the unsuccessful exchange of readable data (garbage value).

Due to this effect, we cannot increase the length of cable beyond a certain safe limit. Owing
to this factor, the cable length supported by a parallel link is quite shorter than serial links.

Easy Installation:

Parallel data links are relatively easy to be installed as hardware, which in turn makes them a
reasonable choice. The configuration of a parallel port in a PC is quite easy as compared to
its counterpart ‘Serial links’.

It is because almost all serial links require its conversion into a parallel form using a Universal
asynchronous receiver transmitter to enable it to be connected with a data bus directly.

Use Parallel Communication:

Large Data needs to be transferred.


Data to be sent is time sensitive.
Data is required to be transferred quickly or in real time.

Serial Communication and Parallel Communication:

The differences between Serial and Parallel communication are as follows:

•No of paths for Data transfer: Serial link has only one path for data transfer
while Parallel one has multiple paths.
•Distance Coverage: Serial link supports communication to long distances while
Parallel data transmission supports limited distance transmission.
•Cross-talk: Chances of Cross-talk is less in Serial link compared to Parallel one due to only
one path available.
•Speed: Serial link is slow compared to Parallel one.
•Communication: Serial transmission is full duplex as data can be sent or received at either
ends. Parallel data is half duplex as the data can either be sent or received.
•Cost Factor: Serial links are cheaper than Parallel one owing to more paths in parallel
mode.
•Complexity: Serial links are simple and reliable while Parallel links are complex and
unreliable.
Ethernet Protocol:
The most popular and oldest LAN technology is Ethernet Protocol, so it is
more frequently used in LAN environments which is used in almost all networks like
offices, homes, public places, enterprises, and universities. Ethernet has gained huge
popularity because of its maximum rates over longer distances using optical media .

Ethernet Protocol Architecture:


In the OSI network model, Ethernet protocol operates at the first two layers
like the Physical & the Data Link layers but, Ethernet separates the Data Link layer
into two different layers called the Logical Link Control layer & the Medium Access
Control layer.
The physical layer in the network mainly focuses on the elements of
hardware like repeaters, cables & network interface cards (NIC). For instance, an
Ethernet network like 100BaseTX or 10BaseT indicates the cables type that can be
used, the length of cables, and the optimal topology.
• The two layers in the above ethernet protocol block diagram deal with the physical
network structure where the network devices can transmit data from one device to
another on a network.
• Certainly, the most popular set of protocols used for both the Physical & Data Link layers
is known as Ethernet. Ethernet is available in different forms where the current Ethernet
can be defined through the IEEE 802.3 standard.
• The Ethernet protocol’s actual transmission speed can be measured in Mbps (millions of
bits for each second), The speed versions of Ethernet are available in three different
types 10 Mbps, called Standard Ethernet; 100 Mbps called Fast Ethernet & 1,000 Mbps,
called as Gigabit Ethernet.

How Ethernet Protocol Works?

• Ethernet protocol mainly works in the first two layers in the OSI network model like
data-link & physical. Ethernet at the first layer uses signals, bitstreams that move on the
media, physical components that situate signals on media & different topologies.
• Ethernet protocol simply divides the Data Link layer functions into two separate sublayers
like the Logical Link Control sublayer & the Media Access Control sublayer.
• The functions of the Data Link layer in the OSI model are allocated to both the sublayers
like LLC & MAC. For Ethernet protocol, the IEEE 802.2 standard simply explains the
functions of the LLC sublayer & the 802.3 standard explains the functions of MAC & the
Physical layer.
• The Logical Link Control (LLC) handles the communication between the upper layers &
the lower layers. The LLC layer uses the data of network protocol like IPv4 packet & adds
control data to help in delivering the packet toward the destination node.
Ethernet Protocol Frame Structure:
• The structure of the Ethernet frame is defined within the IEEE 802.3
standard.
• The frame structure at the data link layer in the OSI model is almost the
same for all Ethernet speeds. The structure of the frame simply adds
headers & trailers in the region of the Layer 3 PDU (Protocol Data Unit) to
summarize the message.
• Ethernet header includes both Source & Destination MAC address, after
which the frame’s payload is present. The end field is Cyclical Redundancy
Checking, used to notice the error. The following diagram shows the
structure of the frame & fields.
Preamble:

The first pattern of the Ethernet Protocol frame is 7-Bytes of Preamble where
alternative 0’s and 1’s in this frame indicate the beginning of the frame & permit the
sender & receiver to set up bit-level synchronization. At first, a Preamble in the above
frame was introduced to permit for the few bits loss because of signal delays.

Start of Frame Delimiter:

The start of frame delimiter (SFD) is a 1-Byte field with 10101011 values that
indicates that upcoming bits are the beginning of the frame, which is the address of the
destination. The start of the frame delimiter is mainly designed to split the pattern of the
bit to the preamble & signal the beginning of the frame.

Destination Address:
The Destination Address Field is a 6-bytes field in the above Ethernet frame. The
address within the frame & the device MAC address is compared. If both the addresses are
matched, then the device simply allows the frame. This MAC address is a uni-cast,
multi-cast, or broadcast.

Source Address:
The source address is a 6-Byte field, including the source machine’s MAC address. Once
the address of source is an individual address or Unicast always, then LSB of an initial byte
will be always.

Length:
This field size is 2-byte long that specifies the entire Ethernet frame length. The length
value held by the 16-bit field ranges from 0 to 65534, however, the length cannot be
higher than 1500 due to some own Ethernet limitations.

Data Field
Data field is the location where actual data can be added and it is also called Payload.
Here, both the data & IP header will be inserted if IP is used over Ethernet. So, the highest
data available may be 1500 Bytes. If the data length is below the minimum length of 46
bytes, then padding zeros can be included to reach the minimum achievable length.

CRC Field
The CRC in the frame is the last pattern with 4 Bytes. This field includes 32-bits of data
hash code, which is produced over the Source Address, Destination Address, Length, and
Ethernet Protocol’s Data field. If the checksum is calculated through a destination that is
not similar to the sent checksum value, then received data can be corrupted.

Here, the frame size for IEEE 802.3 Ethernet standard changes from 64 bytes – 1518 bytes
with 46 to 1500 bytes of data length.
Extended Ethernet Frame:
In the above, the standard Ethernet frame is discussed in detail. Now let’s discuss
the extended Ethernet frame using which we can obtain Payload even higher than 1500
Bytes.

•DA or Destination MAC Address is 6 bytes.


•SA or Source MAC Address is 6 bytes.
•Type [0x8870 (Ethertype)] is 2 bytes.
•DSAP or 802.2 Destination Service Access Point is 1 byte.
•SSAP or 802.2 Source Service Access Point is 1 byte.
•Ctrl or 802.2 Control Field is 1 byte.
•Data or Protocol Data is above 46 bytes.
•FCS or Frame Checksum is 4 bytes.

Ethernet Protocol Analyzer:

• This protocol analyzer is a software tool mainly used for capturing & analyzing the traffic of
data within a network.
• These protocol analyzers are generally used by developers for capturing & analyzing the
data traffic from their applications. The number of functions mainly depends on the
complexity of the analyzer.

Advantages:
The advantages of Ethernet protocol include the following.
•Security, speed, efficiency, and reliability.
•The Gigabit Ethernet provides very fast speed like 1Gbps. Its speed mainly ranges from above
10 times as compared to Fast Ethernet.
•Less cost.
•It does not need any hubs or switches
•Simple maintenance
•It is very strong toward the noise.
•The data transfer doesn’t degrade.
•The quality of data transfer is good.

Disadvantages:
The disadvantages of Ethernet protocol include the following.

It provides a nondeterministic service.


It gives connectionless communication above the network.
The receiver is not able to transmit any information after getting the packets.
If there is any difficulty within Ethernet then it is very hard to troubleshoot which node or
cable in the network causing the problem.
The full-duplex communication doesn’t support by the 100Base-T4.
Current (Contemporary) IIOT Protocol:

Expertise in IoT communication protocols is essential to


understanding IoT systems. These protocols, wired or wireless, not only
act as a communication medium, but also provide value-added features to
IoT networks.

8 IoT communication protocols that have been widely deployed in numerous existing
and emerging IoT applications.

1.Bluetooth

Bluetooth-compatible IoT sensors are ideal for applications that require short range
connectivity and low power communication. Bluetooth protocol has an effective range
of 50 to 100 m and supports a data transfer rates up to 1 Mbps.
Recently, IoT developers have shown an inclination toward the low energy version of
Bluetooth, Bluetooth Low Energy (BLE), based on the Bluetooth Smart protocol. BLE
offers significantly reduced power compared to its predecessor but is not deemed fit
for large file transfers.

2. Zigbee

Zigbee, based on the IEEE 802.15.4 standard, has emerged as a one of the most
widely used communications protocols for embedded applications. Zigbee is used to
connect devices in the 10-100 m range and supports a data rate of up to 250 Kbps. As
a low-power, low data rate technology, Zigbee is well suited for two-way data transfer
between IoT sensors and IoT gateway devices, as well as ad hoc wireless mesh
networks.

Through its mesh topology, Zigbee devices can transmit data through intermediate
devices over a distance. For IoT applications that require low cost and low power
sensor networks in the consumer and industrial segments, Zigbee is an excellent
option.

3. 6LoWPAN:

6LoWPAN is a simple wireless mesh technology that makes individual nodes


IP-enabled. Its objective is to overcome technical and commercial barriers to
connecting all types of devices to the internet.

The 6LoWPan specification also defines encapsulation and header compression


mechanisms to exchange of IPv6 packets over IEEE 802.15.4 networks. 6LoWPan
integrates security components like Secure Mode and ACL keys, as well as optional
TLS. It is a viable option for small form factor devices that require low-power wireless
communications.
4.Wi-Fi:

Wi-Fi was intended to replace Ethernet and provide easy-to-use short-range wireless
connectivity and cross-vendor interoperability through the IEEE 802.11 family of
standards.
Wi-Fi is known for faster, larger volume communications, and can transmit over ranges
of 50 m using the 2.4 GHz and 5 GHz frequency bands. Its popularity continues to grow
thanks to the ubiquity of existing infrastructure.

5.Cellular:

IoT applications that require continuous connectivity over very long distances can be
designed based on cellular networks like GSM, LTE, EDGE, 3G, 4G and 5G. Cellular
networks can communicate with devices over distances of up to 35km.
Cellular technology is beneficial for IoT applications because of the following features:
• Cost-optimized, enhanced coverage for IoT applications through LTE networks like
Cat-0 and Cat-1.
• End-to-end security through TLS/DTLS security and on-air encryption of the LTE
networks.
• Minimal or zero regulatory regulations. With a cellular network, data can be exchanged
at up to 23 dBm.

6.ModBus:

Modbus protocol is a robust communication standard that is used widely in industrial


automation and SCADA systems to send signals from instrumentation, sensors and
actuators back to a main controller. Modbus has a broad range of communication
protocols that operate over a variety of physical links like RS-485.
Modbus is a serial communications protocol based on a master–slave model at its core.

7. PROFINET:

PROFINET is widely used in industrial automation solutions to connect systems in a


manufacturing environment. Based on the IEC 61158 and IEC 61784 standards,
PROFINET delivers data at regular time intervals (1 ms or less) without quality loss. It
also supports existing IT standards.

PROFINET is highly compatible with fieldbus technologies and can be easily integrated
with existing industrial systems. The PROFINET specification defines proxies (proxy
addresses) with specified data mapping systems to allow the protocol to communicate
with modern IoT protocols.

8. EtherCAT

EtherCAT is based on the CANopen protocol and Ethernet and specifically optimized for
industrial automation. It allows any standard PC to be used as an EtherCAT master and
communicate with EtherCAT slaves using any topology. Together, they can be used to
connect all devices on a factory floor at rates of up to 1,000 I/O points in 30
microseconds.
IoT and M2M
M2M

Machine to machine (M2M) refers to networking of Machines for the purpose of remote
monitoring and control and data exchange. The end-to-end architecture for M2M systems
comprising of M2M area networks, Communications Network and application domain.

An M2M area network comprises of machines which have embedded hardware module for
sensing actuation and communication. Various Communication protocols can be used for
M2M local area network such as Zigbee , Bluetooth , Modbus M –bus, wireless, power LINE
Communication ,6LoWPAN.

These Communications protocols provide connectivity between M2M nodes within and M2M
area network. The Communications Network provides connectivity to remote m2m area
network. communication network can use wired or wireless network. The M2M area network
use either proprietary or non IP based protocol.

The communication between the M2M nodes and the M2M Gateway ((Fig-1.18) is based on
the communication protocol. M2M Gateway protocol translation to enable IP connectivity for
M2M . M2M Gateway act as a proxy performing translation from / to native protocol to M2M
area network.

M2M data is gathered into point solution such as enterprise applications, service
management application for remote monitoring applications. M2M has various application
domain such as smart metering, Home Automation , industrial Automation, smart grid.

Machine-to-Machine

53
Machine-to-Machine(M2M) Gateway

Difference Between IoT And M2M

The difference between m2m and IoT are described as follows :

Communication protocols:

M2m and IoT can differ in how the communication between the machines are device
happens. M2M uses other proprietary or not IP based communication protocol for
communication with in the M2M area networks. Commonly uses M2m protocol include zigbee,
Bluetooth, ModBus, wireless M-Bus ,power line communication.

The focus of communication in M2M is usually on the protocols below the network layer.
Focus of communication in IoT is usually a protocol in network layer such as http web
sockets, MQTT, XMPP, DDS, AMQP.

54
Machines in M2M vs Things in IoT:

The " things " IoT refers to Physical objects that have unique identifier and can sense and
communicate with the external environment or their internal physical status. The unique
identifiers the things in IoT are the IP addresses. Things have software component for
accessing processing and storing sensor information on controlling actuator connector. IoT
system can include IoT devices of various types such as fire alarms , door alarms, lighting
control devices.

Fig Communication in IoT vs M2M


Hardware versus software emphasis:

while the emphasis of M2M is more on hardware with embedded modules, the emphasis
modules, the emphasis of IoT is more on software . IoT devices run specialist software
sensor Data Collection, data analysis and interfacing with cloud through IP based
communication.

Data collection and analysis:

M2M data is collected in point solutions and often in on premises storage infrastructure. In
contrast to M2M,the data in IoT is connected in the cloud. The analytical component
analysis the data and stores the result in the cloud database. Data and analysis results are
visualized with the cloud based applications. The centralized controller is aware of the
status of all the nodes and send Control Commands to the nodes.

Applications:

M2m data is collected in point solutions and can be accessed by on premises application
diagnosis applications, service management applications , and on-premises enterprise 55
application.
8. Assignments

Elaborate in detail about the technologies for connecting


smart objects and identify the communication criteria for IoT
applications.
9. Part A Q & A

3
11. Part A

Course
Q. K
Questions Outcom
No.: Level
es

What is a Transducer?

Converts a signal from one physical form to another


physical form

Physical form: thermal, electric, mechanical, magnetic,


chemical, and optical
1 Energy converter K2 CO3

Example:

Microphone : Converts sound to electrical signal

Speaker : Converts electrical signal to sound


Define Resolution

•Provides the smallest change in the input that a


sensor is capable of sensing
2 K2 CO3
• Resolution is an important specification
towards
selection of sensors.

• Higher the resolution better the precision


Define Sensitivity

•Sensitivity indicates ratio of incremental change in the


response of the system with respect to incremental
3 change in input parameter. K2 CO3

• It can be found from slope of output characteristic


curve of a sensor
What is Digital Sensor

• Responses in binary nature

•Designs to overcome the disadvantages of analog


sensors
4 K2 CO3
•Along with the analog sensor it also comprises of extra
electronics for bit conversion

•Example: Passive infrared (PIR) sensor and digital


temperature sensor (DS1620).
Course
Q. K
Questions Outcom
No.: Level
es
List out the sensor classification.

5 K2 CO1

Define Actuator.
• An actuator is part of the system that deals with the
control action required (mechanical action)
• Mechanical or electro-mechanical devices
6 K2 CO1
• A control signal is input to an actuator and an energy
source is necessary for its operation.
• Available in both micro and macro scales
• Example: Electric motor, solenoid, hard drive stepper
motor

List out the classification of Actuators.

7 K2 CO1
Course
Q. K
Questions Outcom
No.: Level
es

Sketch the sensor network Architecture

8 K3 CO3

What are the Features of Wireless HART?

• Exploits IEEE 802.15.4 accustomed DSSS coding


scheme.

•A Wireless HART node follows channel hopping every


time it sends a packet.
9 K1 CO3
•Modulation technique used is offset quadrature phase
shift keying (OQPSK).

•Transmission Power is around 10dBm (adjustable in


discrete steps).

• Maximum payload allowed is 127 bytes.

Define Fluid Power Rotary Actuator

• Powered by fluid, gas, or differential air pressure


• Consisting of gearing, and cylinder and piston
mechanisms

10 • Converts hydraulic fluid, gas, or differential air pressure K2 CO3


into rotational motion
• Primarily applications of this actuator are opening and
closing dampers, doors, and clamping.
Course
Q. K
Questions Outcom
No.: Level
es

List out the Sensor Network Challenges


• Low energy use
• AdHoc Network Discovery
11 • Network control and routing K2 CO3

• Collaborative information and processing


• Tasking and querying

What is Response Time?


- Sensors are designed with a specific response time,
indicating how quickly they can detect and report changes
in the measured parameter.
12 - Faster response times are essential for certain K1 CO3
applications, such as safety-critical systems.

Define Master- Slave Mode:

• During normal operation, each slave (field device)


communication is initiated by a master communication
device (Controller).HART provides for up to two masters
-primary and secondary.
13 • The primary master is generally a distributed control K2 CO3
system (DCS), programmable logic controller (PLC), or a
personal computer (PC)
.• The secondary master can be a handheld terminal or
another PC.Slave devices include transmiters, actuators,
and controllers that respond to commands from the
primary or secondary master.
Course
Q. K
Questions Outcom
No.: Level
es

List out the advantages of HART?

1.Improved plant operations


2.Operational flexibility
14 3.Instrumentation investment protection K2 CO1
4.Digital communication

What is Multidrop mode?

• In multidrop operation, the devices exchange their


data and measured values only via the HART
protocol.
• The analog current signal serves just to energize the
15 two-wire devices, providing a direct current of 4 mA. K2 CO1
• Requires only a single pair of wires. Up to 15 field
devices are connected in parallel to a single wire pair
and the host distinguishes the field devices by their
preset addresses which range from 1 to 15.

Define Burst Mode.

In burst mode, the master instructs the slave device to


continuously broadcast a standard HART reply message
(e.g., the value of the process variable).
The master receives the message at the higher rate until
it instructs the slave to stop bursting. It is also called
"Broadcast Mode".
16 • Used for fast updating of the value of a measured K2 CO1
variable.
Course
Q. K
Questions Outcom
No.: Level
es

Define Preamble.

The first pattern of the Ethernet Protocol frame is


7-Bytes of Preamble where alternative 0’s and 1’s in this
frame indicate the beginning of the frame & permit the
sender & receiver to set up bit-level synchronization. At
first, a Preamble in the above frame was introduced to
17 permit for the few bits loss because of signal delays. K2 CO3

What is routers?
• A router is required whenever we need to couple
similar or dissimilar LAN technologies and control the
traffic exchanged between them.
• The router does not modify BACnet message it just
18 forward it the from one LAN to the other when ever it K2 CO3
needs to access.

List out the advantages of ethernet Protocol


analyzer?

The advantages of Ethernet protocol include the following.


•Security, speed, efficiency, and reliability.
•The Gigabit Ethernet provides very fast speed like 1Gbps.
Its speed mainly ranges from above 10 times as
compared to Fast Ethernet.
19 K2 CO3
•Less cost.
•It does not need any hubs or switches
•Simple maintenance
•It is very strong toward the noise.
•The data transfer doesn’t degrade.
•The quality of data transfer is good.
Course
Q. K
Questions Outcom
No.: Level
es

List the uses of Parallel Communication?

Large Data needs to be transferred.


Data to be sent is time sensitive.
Data is required to be transferred quickly or in real time.

20 K2 CO3

Sketch the ethernet protocol frame structure.

21 K3 CO3

What is Point-to-Point mode?

• Both analog and digital communications are


supported.4-20 mA signal is used to communicate one
process variable.
• Additional process variables, configuration parameters,
22 and other device data are transferred digitally using the K1 CO3
HART protocol.
• The 4-20 mA analog signal is not affected by the HART
signal and can be used for control in the normal way.
• The HART communication digital signal gives access to
secondly variables and other data that can be used for
operations, commissioning, maintenance, and
diagnostic purposes.
10. Part B Questions

10
10. Part B Questions

1 Measure the extent of benefits that can be provided by IOT for K5 CO2 A
Home Automation, Health monitoring system, Smart
Transportation and Smart Shopping.

2 Develop a narration on IoT Access technologies that plays a K6 C02 A


major role in market. Give suitable examples explaining the
technologies.

3 Explain the meaning of the term “Integrating Cloud Computing K5 CO2 A


and IOT” with suitable examples.

4 Discuss and Design IOT Based Environment Monitoring using K3 CO2 A


Wireless Sensor Network.

5 To implement and Designing the Smart Agricultural System K4 C02 A


with LoRa-based WSNs using different IOT technologies and
Protocols.

6 To Design and Discuss Briefly about WSN based Monitoring of K3 CO2 S


Temperature and Humidity of Soil using Arduino

7 Discuss about Protocols in IIOT? Explain with its advantages K2 CO2


and disadvantages?

8 Explain and Discuss in details? about K2 CO2


Short Range communications and Long Range communications

9 How IoT Protocols and Standards Support K3 CO2 S


Secure Data Exchange in the IoT Ecosystem ?

10 Explain the following protocols in IIOT? K3 CO2 S

(i) WIFI (4)

(ii) Zigbee (4)

(iii) BACnet (5)


11 (i) Why are IoT protocols important? (6) K1 CO2 A

(ii) How many protocols are there in IoT? How to choose the
right IoT protocol (7)
11. Activity based learning

12
11. Activity based learning

Activity – Group discussion


Case study Automated Health care system
• Discuss architecture of Automated Health care system
• Discuss challenges to implement automated healthcare system
• Discuss advantages of automated health care system
12. Supportive online Certification courses

14
12. Supportive online Certification courses

1. Introduction To Internet of Thongs

https://onlinecourses.nptel.ac.in/noc23_cs83

2. Introduction to Industrial IoT for IT Professionals

https://www.udemy.com/course/introduction-to-industrial-iot-for-it-professionals/
13. Real time Applications in day to day life
and to Industry

16
13. Real time Applications in day to day life and to Industry

• Manage building automation data from multiple locations- all Star hotels
• IIoT can be used to monitor and control the heating, lighting, energy consumption, fire
protection, employee safety and many other systems for multiple buildings from a
central location. The real-time machine data can be transferred to a central cloud
application, using industrial communication networks.
14. Contents beyond the Syllabus

18
14. Contents beyond the Syllabus
What is edge computing?
•Edge computing is an emerging computing paradigm which refers to a
range of networks and devices at or near the user. Edge is about
processing data closer to where it’s being generated, enabling processing
at greater speeds and volumes, leading to greater action-led results in real
time.
•It offers some unique advantages over traditional models, where computing power
is centralized at an on-premise data center. Putting compute at the edge allows
companies to improve how they manage and use physical assets and create new
interactive, human experiences. Some examples of edge use cases include self-
driving cars, autonomous robots, smart equipment data and automated retail.
• Possible components of edge include:
•Edge devices: We already use devices that do edge computing every day—like
smart speakers, watches and phones – devices which are locally collecting and
processing data while touching the physical world. Internet of Things (IoT) devices,
point of sales (POS) systems, robots, vehicles and sensors can all be edge devices—
if they compute locally and talk to the cloud.
•Network edge: Edge computing doesn’t require a separate “edge network” to
exist (it could be located on individual edge devices or a router, for example). When
a separate network is involved, this is just another location in the continuum
between users and the cloud and this is where 5G can come into play. 5G brings
extremely powerful wireless connectivity to edge computing with low latency and
high cellular speed, which brings exciting opportunities like autonomous drones,
remote telesurgery, smart city projects and much more. The network edge can be
particularly useful in cases where it is too costly and complicated to put compute on
premises and yet high responsiveness is required (meaning the cloud is too distant).
•On-premises infrastructure: These are for managing local systems and
connecting to the network and could be servers, routers, containers, hubs or
bridges.
15. Assessment Schedule

20
15. Assessment Schedule

• FIRST INTERNAL ASSESSMENT TEST

SCHEDULED ON 24/09/23

• SECOND INTERNAL ASSESSMENT TEST

SCHEDULED ON 28/10/23
16. Prescribed Text Books &
Reference Books

22
Prescribed Text Books & Reference Books

TEXT BOOKS:
•1. Daniel Minoli, Building the Internet of Things with IPv6 and MIPv6: The Evolving World of
M2M Communications,First Edition, Wiley Publications, 2013

• 2. Dieter Uckelmann , Mark Harrison, Florian Michahelles, Architecting the Internet of


Things, Springer-Verlag Berlin Heidelberg 2011 Industry 4.0: The Industrial Internet of Things
REFERENCES:
•1. Hakima Chaouchi,The Internet of Things Connecting Objects to the Web Willy
Publications.
•2. Olivier Hersent, David Boswarthick, Omar Elloumi, The Internet of Things: Key
Applications and Protocols, Second Edition,Wiley Publications
•3. Internet of Things - From Research and Innovation to Market Deployment; by
OvidiuVermesan & Peter Friess; 2014, River Publishers Series
• 4. How Protocol Conversion Addresses IIoT Challenges:White Paper By RedLion.
• 5. Alasdair Gilchrist, Industry 4.0: The Industrial Internet of Things,First Edition,Kindle
Edition
17. Mini Project suggestions

24
17. Mini Project suggestions

Create a table for literature review with following


entrees
• Paper title, journal name , published year
• Methodology used ( Algoritham )
• Parameters considered
• Output
• Advantages
• Disadvantage
Thank you

Disclaimer:

This document is confidential and intended solely for the educational purpose of RMK
Group of Educational Institutions. If you have received this document through email in
error, please notify the system manager. This document contains proprietary
information and is intended only to the respective group / learning community as
intended. If you are not the addressee you should not disseminate, distribute or copy
through e-mail. Please notify the sender immediately by e-mail if you have received this
document by mistake and delete this document from your system. If you are not the
intended recipient you are notified that disclosing, copying, distributing or taking any
action in reliance on the contents of this information is strictly prohibited.

You might also like