0% found this document useful (0 votes)
10 views83 pages

Unit 1, Chap 1

This document provides an overview of the Internet of Things (IoT), including its definition, physical and logical design, enabling technologies, and various communication protocols. It discusses the characteristics, benefits, and challenges of IoT, as well as specific use cases and examples of IoT applications. Additionally, it covers different types of IoT protocols, both for network and data communication, and outlines the functional blocks and communication models within IoT systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views83 pages

Unit 1, Chap 1

This document provides an overview of the Internet of Things (IoT), including its definition, physical and logical design, enabling technologies, and various communication protocols. It discusses the characteristics, benefits, and challenges of IoT, as well as specific use cases and examples of IoT applications. Additionally, it covers different types of IoT protocols, both for network and data communication, and outlines the functional blocks and communication models within IoT systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 83

In this chapter, you will learn :

▪ Introduction and concepts


▪ Physical Design of IoT
▪ Logical Design of IoT
▪ IoT enabling Technologies
What is IOT
Some scenarios

• The alarm rings. As you open your


eyes blearily, you see that it’s five
minutes later than your usual
wake-up time. The clock has
checked the train times online,
and your train must be delayed,
so it lets you sleep in a little long
Some scenarios
Some scenarios
Some scenarios

In your kitchen, a blinking light


reminds you it’s time to take
your tablets. If you forget, the
medicine bottle cap goes online
and emails your doctor to let
her knower.
Some scenarios

Products like the cellular


communication enabled
Smart Belly trash use
real-time data collection
and alerts to let
municipal services know
when a bin needs to be
emptied.
IOT
• All the cases used the Internet to send, receive, or communicate
information.
• And in each case, the gadget that was connected to the Internet
wasn’t a computer, tablet, or mobile phone but an object, a
Thing.

Many of the use cases could be fulfilled, and often are, by


general-purpose computers
IOT
IOT
PHYSICAL OBJECT
+
CONTROLLER, SENSOR, ACTUATORS
+
INTERNET
=
INTERNET OF THINGS
IOT
IOT
IOT-Example
IOT-Example
Introduction and concepts

Definition: -
▪ The internet of things (IoT) is a computing concept that describes the idea of
everyday physical objects being connected to the internet and being able to
identify themselves to other devices.
OR
▪ A dynamic global network infrastructure with self-configuring capabilities based
on standard and interoperable communication protocols where physical and
virtual “things” have identities, physical attributes and virtual network and use
intelligent interfaces.
Introduction and concepts

▪ Characteristics of IOT
▪ Dynamic and Self-Adapting:- IoT devices and system may have the
capability to change dynamically depending upon the system and operating
conditions or sensed environment.
▪ For example, the surveillance cameras can change their modes based on day
or night.
▪ Self-configuring:- IoT devices have self-configuring capability which allows
large number of devices to work together to provide certain functionality, they
can change their networking and update the software automatically.
Introduction and concepts
▪ Interoperable Communication Protocol: - IoT devices can communicate
with number of interoperable (communicate with other devices without special
effort) communication protocols.
▪ Unique ID: - IoT devices have a unique identity differentiated with unique IP
address.
▪ Integrated into Information Network: - IoT devices are integrated into
the information network that allows them to communicate and exchange data
with other devices and system.
Introduction and concepts
IoT offers a number of benefits to organizations, enabling them to:
1. Monitor their overall business processes;
2. Improve the customer experience;
3. Save time and money;
4. Enhance employee productivity;
5. Integrate and adapt business models;
6. Make better business decisions; and
7. Generate more revenue
Introduction and concepts
TECHNICAL CHALLENGES
▪ How to provide power to all these items
▪ How they talk to each other
▪ How they communicate with us
▪ Power and networking challenges
▪ Provide the scale of addresses and lower power usage needed by
many sensors
▪ Choose the best position for user interface component
▪ Decide which alerts are needed and when should display them
Introduction and concepts
NON-TECHNICAL CHALLENGES

▪ Connected devices without human interaction and with human interaction.

▪ Connected devices in isolation and in real world

▪ Always consider device in the physical context one step larger


PHYSICAL DESIGN OF IoT
▪ Things in IoT
The word “Things” refers to IoT devices which have unique identities and can
perform remote sensing, actuating and monitoring capabilities. These devices
can exchange and communicate with each other.
The IoT devices consists of several interfaces for connection to other devices
both wired and wireless which includes
I/O interfaces for sensors
Interfaces for internet connectivity
Memory and storage
Audio and video interface
PHYSICAL DESIGN OF IoT
▪ Things in IoT
OSI Layer
OSI Open Systems Interconnection model
PHYSICAL DESIGN OF IoT (contd.)
PHYSICAL DESIGN OF IoT (contd.)
PHYSICAL DESIGN OF IoT (contd.)

▪ IoT Protocols
Link Layer
▪ This protocol determines how the data is physically sent over the network layer
(e.g. copper wire, coaxial cable or a radio wave).
▪ It determines how the packet are coded and signaled by the hardware device
over the medium to which the host is attached. Example:-
1.IEEE 802.3--Ethernet (wired connection)
2. 802.11 –Wi-Fi
3. 802.16—WiMax
4. 2G/3G/4G—LTE (Long term evolution)Mobile communication
PHYSICAL DESIGN OF IoT (contd.)
▪ IoT Protocols- Link layer
PHYSICAL DESIGN OF IoT (contd.)

▪ Network/Internet Layer
▪ The network layers are responsible for sending of IP datagram’s from the source
network to the destination network. It performs host addressing and packet
routing.
▪ The datagram’s consists of source and destination addresses where host identifies
using IP schemes as IPV4 and IPV6.
▪ IPV4:- It is used to identify the devices on a network using hierarchical addressing
scheme. It uses 32- bit address that allows total 2^32 or 4 billion devices
▪ IPV6:- It is the new version of internet protocol which uses 128-bits address that allows
2^128 or 3 X 10^38 address.
PHYSICAL DESIGN OF IoT (contd.)
▪ IoT Protocols- Network layer
PHYSICAL DESIGN OF IoT (contd.)

▪ Transport Layer
▪ The transport layer protocols provide end to end message transfer capability
independent of the underlying network. The function of the transport layer is
to provide functions such as error control, segmentation, flow control and
congestion control.
• TCP: - It is most widely used for data transmission in communication
network such as internet .it provides process to process communication
using port numbers. It uses port number for communication which keeps
Track of segments that are received and transmitted.
• UDP: - It is the simplest protocol that involves minimum amount of
communication mechanism. It is connectionless, unreliable transport
protocol. It does not provide guaranteed delivery of the message.
PHYSICAL DESIGN OF IoT (contd.)
PHYSICAL DESIGN OF IoT (contd.)
▪ Application Layer
▪ An application layer protocol defines how application processes (clients
and servers), running on different end systems, pass messages to each
other.
▪ In particular, an application layer protocol defines:
• The types of messages, e.g., request messages and response
messages.
• The syntax of the various message types, i.e., the fields in the message
and how the fields are delineated.
• The meaning of the information that the field is supposed to contain.
• Rules for determining when and how a process sends messages and
responds to messages.
Types of IoT Protocols

▪ IoT protocols and standards can be broadly classified into two separate
categories.
IoT Network Protocols
▪ IoT network protocols are used to connect devices over the network.
▪ These are the set of communication protocols typically used over the Internet.
▪ Using IoT network protocols, end-to-end data communication within the scope
of the network is allowed.
▪ Following are the various IoT Network protocols:
• HTTP
• LoRaWan (Long Range Wide Area Network)
• Bluetooth
• Zigbee
IoT Network Protocols
▪ HTTP (HyperText Transfer Protocol)
▪ HyperText Transfer Protocol is the best example of IoT network protocol.
▪ This protocol has formed the foundation of data communication over the web.
▪ It is the most common protocol that is used for IoT devices when there is a lot of
data to be published. However, the HTTP protocol is not preferred because of its
cost, battery-life, energy saving, and more constraints.
IoT Network Protocols
▪ LoRaWan (Long Range Wide Area
Network)
▪ It is a long-range low power protocol that
provides signal detection below the
noise level.
▪ LoRaWan connects battery operated
things wirelessly to the Internet in either
private or global networks. This
communication protocol is mainly used
by smart cities, where there are millions
of devices that function with less power
and memory.
IoT Network Protocols
▪ LoRaWan (Long Range Wide Area Network)
▪ Smart street lighting is the practical use case of LoRaWan IoT protocol. The street lights
can be connected to a LoRa gateway using this protocol. The gateway, in turn,
connects to the cloud application that controls the intensity of light bulbs
automatically based on the ambient lighting, which helps in reducing the power
consumption during day-times.
IoT Network Protocols (Contd)
▪ Bluetooth
▪ Bluetooth is one of the most widely used
protocols for short-range communication.
▪ It is a standard IoT protocol for wireless
data transmission.
▪ This communication protocol is secure
and perfect for short-range, low-power,
low-cost, and wireless transmission
between electronic devices. BLE
(Bluetooth Low Energy) is a low-energy
version of Bluetooth protocol that
reduces the power consumption and
plays an important role in connecting IoT
devices.
IoT Network Protocols (Contd)

▪ Bluetooth
▪ Bluetooth protocol is mostly used in smart
wearables, smartphones, and other mobile
devices, where small fragments of data can
be exchanged without high power and
memory. Offering ease of usage, Bluetooth
tops the list of IoT device connectivity
protocols.
IoT Network Protocols (Contd)
▪ ZigBee
▪ ZigBee is an IoT protocol that allows
smart objects to work together. It is
commonly used in home automation.
More famous for industrial settings,
▪ ZigBee is used with apps that support
low-rate data transfer between short
distances.
▪ Street lighting and electric meters in
urban areas, which provides low power
consumption, use the ZigBee
communication protocol. It is also used
with security systems and in smart
homes.
IoT Data Protocols
▪ IoT data protocols are used to connect low power IoT devices. These protocols provide
point-to-point communication with the hardware at the user side without any Internet
connection. Connectivity in IoT data protocols is through a wired or a cellular network.
Some of the IoT data protocols are:
▪ Message Queue Telemetry Transport (MQTT)
▪ Constrained Application Protocol (CoAP)
▪ Advanced Message Queuing Protocol (AMQP)
▪ Machine-to-Machine (M2M) Communication Protocol
▪ Extensible Messaging and Presence Protocol (XMPP)
IoT Data Protocols
▪ Message Queue Telemetry Transport (MQTT)
▪ One of the most preferred protocols for IoT
devices, MQTT collects data from various
electronic devices and supports remote
device monitoring. It is a subscribe/publish
protocol that runs over Transmission Control
Protocol (TCP), which means it supports
event-driven message exchange through
wireless networks.
▪ MQTT is mainly used in devices which are
economical and requires less power and
memory.
▪ For instance, fire detectors, car sensors,
smart watches, and apps for text-based
messaging.
IoT Data Protocols
▪ Message Queue Telemetry Transport (MQTT)
IoT Data Protocols

▪ Constrained Application Protocol (CoAP)


▪ CoAP is an internet-utility protocol for restricted gadgets. Using this protocol, the
client can send a request to the server and the server can send back the response
to the client in HTTP.
▪ For light-weight implementation, it makes use of UDP (User Datagram Protocol)
and reduces space usage. The protocol uses binary data format EXL (Efficient XML
Interchanges).
▪ CoAP protocol is used mainly in automation, mobiles, and microcontrollers. The
protocol sends a request to the application endpoints such as appliances at
homes and sends back the response of services and resources in the application.
IoT Data Protocols
▪ Constrained Application Protocol (CoAP)
IoT Data Protocols
IoT Data Protocols (Contd.)
▪ Advanced Message Queuing Protocol (AMQP)
▪ AMQP is a software layer protocol for message-oriented middleware environment that
provides routing and queuing.
▪ It is used for reliable point-to-point connection and supports the seamless and secure
exchange of data between the connected devices and the cloud.
▪ AMQP consists of three separate components namely Exchange, Message Queue, and
Binding. All these three components ensure a secure and successful exchange and storage
of messages. It also helps in establishing the relationship of one message with the other.
▪ AMQP protocol is mainly used in the banking industry. Whenever a message is sent by a
server, the protocol tracks the message until each message is delivered to the intended
users/destinations without failure.
IoT Data Protocols (Contd.)
▪ Advanced Message Queuing Protocol (AMQP)
IoT Data Protocols (Contd.)

▪ Machine-to-Machine (M2M) Communication Protocol


▪ It is an open industry protocol built to provide remote application
management of IoT devices.
▪ M2M communication protocols are cost-effective and use public networks. It
creates an environment where two machines communicate and exchange
data. This protocol supports the self-monitoring of machines and allows the
systems to adapt according to the changing environment.
▪ M2M communication protocols are used for smart homes, automated vehicle
authentication, vending machines, and ATM machines.
IoT Data Protocols (Contd.)

▪ Machine-to-Machine (M2M) Communication Protocol


IoT Data Protocols (Contd.)

▪ Extensible Messaging and Presence Protocol (XMPP)


▪ The XMPP is uniquely designed. It uses a push mechanism to exchange messages in
real-time.
▪ XMPP is flexible and can integrate with the changes seamlessly. Developed using open
XML (Extensible Markup Language), XMPP works as a presence indicator showing the
availability status of the servers or devices transmitting or receiving messages.
▪ Other than the instant messaging apps such as Google Talk and WhatsApp, XMPP is also
used in online gaming, news websites, and Voice over Internet Protocol (VoIP).
IoT Data Protocols (Contd.)

▪ Extensible Messaging and Presence Protocol (XMPP)


IoT Functional Blocks
IoT Functional Blocks
▪ The IoT system consists of different functional blocks which provide the system
capabilities. These blocks includes:
▪ Device: - This block deal with IoT device which provide sensing, monitoring and
control functions.
▪ Communication: - This block deals with IoT communication protocol.
▪ Services: - This block deals with various types of IoT services such as device
monitoring, device control services and device discovery.
▪ Management: - This block used to monitor the complete IoT system.
▪ Security:- It provides the security by providing the functions such as a
authentication, authorization and data security.
▪ Application:-IoT provides an user interfaces to monitor various IoT system where
user can view and analyze the processing data.
IoT Communication Models
▪ Request-Response
▪ In Request–Response communication model client sends request to the server
and the server responds to the request.
▪ When the server receives the request it decides how to respond, fetches the
data, retrieves resources, and prepares the response and sends to the client. R-R
is a communication model where request and response pair is independent of
each others.
IoT Communication Model (Contd.)
▪ Publish-Subscribe:
▪ This model involves publishers, brokers and consumers. Publishers are the
sources of data. Publishers send the data to the topic which are managed by the
broker. Publishers are not aware of the consumers.
▪ Consumers subscribe to the topics which are managed by the broker. When
broker receives the data from the Publisher, it sends to all the consumers.
IoT Communication Model (Contd.)
▪ Push-Pull :
▪ In this model the producers push the data in queues and the consumers pull
the data from the queues.
▪ Producers do not need to be aware of the consumers. Queues help in
decoupling the messaging between the producer and consumers. Queues also
act as buffer which helps in situation when there is mismatch between the
rate at which the producers push the data and consumers pull the data.
IoT Communication Model (Contd.)
▪ Exclusive Pair :
▪ Exclusive pair is a bi-directional, fully duplex communication model that uses a
persistent connection between the client and server, once the connection is
established it remains open until the client sends a request to closer the
connection.
▪ Client and server can send the message to each other after connection setup. In
this model server is aware of all the open connection.
IOT Communication API’s
▪ The application program (or programming) interface, or API, is arguably what
really ties together the connected “things” of the “internet of things.” IoT APIs
are the points of interaction between an IoT device and the internet and/or
other elements within the network.
▪ As API management company 'Axway' puts it, “APIs are tightly linked with IoT
because they allow you to securely expose connected devices to customers, go-
to-market channels and other applications in your IT infrastructure.”
▪ Generally we used Two APIs For IoT Communication. These IoT Communication
APIs are:
▪ REST-based Communication APIs
▪ WebSocket-based Communication APIs
REST-based Communication APIs
▪ Representational state transfer (REST) is a set of architectural principles by which you
can design Web services the Web APIs that focus on systems’s resources and how
resource states are addressed and transferred.
▪ REST APIs that follow the request response communication model, the rest
architectural constraint apply to the components, connector and data elements,
within a distributed hypermedia system.
▪ The rest architectural constraint are as follows:
1. Client-server –
▪ The principle behind the client-server constraint is the separation of concerns. for
example clients should not be concerned with the storage of data which is concern of
the server.
▪ Similarly the server should not be concerned about the user interface, which is
concern of the client. Separation allows client and server to be independently
developed and updated.
REST-based Communication APIs
2. Stateless –
▪ Each request from client to server must contain all the information
necessary to understand the request, and cannot take advantage of
any stored context on the server.
▪ The session state is kept entirely on the client.
3. Cache-able –
▪ Cache constraints requires that the data within a response to a
request be implicitly or explicitly levelled as cache-able or non cache-
able.
▪ If a response is cache-able, then a client cache is given the right to
reuse that response data for later, equivalent requests. caching can
partially or completely eliminate some instructions and improve
efficiency and scalability.
REST-based Communication APIs (Contd.)
4. Layered system –
• Layered system constraints, constrains the behavior of components such that each component
cannot see beyond the immediate layer with they are interacting.
• For example, the client cannot tell whether it is connected directly to the end server or two an
intermediary along the way.
• System scalability can be improved by allowing intermediaries to respond to requests instead of the
end server, without the client having to do anything different.
5.Uniform interface –
▪ Uniform interface constraints requires that the method of communication between client and
server must be uniform. Resources are identified in the requests (by URI in web based systems) and
are themselves is separate from the representations of the resources data returned to the client.
▪ When a client holds a representation of resources it has all the information required to update or
delete the resource (provided the client has required permissions). Each message includes enough
information to describe how to process the message.
6. Code on demand –
▪ Servers can provide executable code or scripts for clients to execute in their context.
▪ This constraint is the only one that is optional.
RESTful webservice
▪ A RESTful web service is a ” Web API ” implemented using HTTP and
REST principles. REST is most popular IoT Communication APIs .

Uniform Resource
Identifier (URI) GET PUT PATCH POST DELETE
Create a new entry in
the collection. The
new entry’s URI is
assigned
Replace th e
automatically and is
List the URIs and entire
usually returned by
perhaps other details collection with
the operation.
Collection, such of the collection’s another Not generally Delete the
as https://api.examp members. collection. used entire
le.com/resources/ collection.
Retrieve a Replace th e
representation of addressed
the addressed member of Not generally used.
member of the the collection, Treat the addressed
collection, expressed or if it does member as a
in an appropriate not exist, collection in its own
Update the Delete the
Internet media type. create it. right and create a
Element, such addressed addressed
as https://api.examp member of the new entry within it. member of the
le.com/resources/ite m5 collection. collection.
WebSocket-based Communication APIs
▪ Websocket APIs allow bi-directional, full duplex communication between clients and
servers.
WebSocket-based Communication APIs
▪ Websocket APIs allow bi-directional, full duplex communication between clients and
servers.
▪ Websocket APIs follow the exclusive pair communication model. Unlike request-
response model such as REST, the WebSocket APIs allow full duplex communication and
do not require new connection to be setup for each message to be sent.
▪ Websocket communication begins with a connection setup request sent by the client to
the server. The request (called websocket handshake) is sent over HTTP and the server
interprets it is an upgrade request.
▪ If the server supports websocket protocol, the server responds to the websocket
handshake response.
▪ After the connection setup client and server can send data/messages to each other in
full duplex mode. Websocket API reduce the network traffic and latency as there is no
overhead for connection setup and termination requests for each message. Websocket
suitable for IoT applications that have low latency or high throughput requirements. So
Web socket is most suitable IoT Communication APIs for IoT System
IoT Enabling Technologies
▪ IoT is enabled by several technologies which includes WSN, cloud
computing, big data analysis, embedded systems, web servers, mobile
internet etc. Some the technologies which play the key role in IoT are:
▪ WIRELESS SENSOR NETWORK
▪ CLOUD COMPUTING:
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
▪ Big Data Analytics
▪ Embedded systems
IoT Enabling Technologies (Contd.)
▪ WIRELESS SENSOR NETWORK:
▪ A Wireless Sensor Network (WSN) is a distributed
network with large number of sensors which are used
to monitor the environmental and physical
conditions.
▪ A WSN consists of end nodes, routers and
coordinator. End nodes have several sensors attached
to them where the data is passed to coordinator with
the help of routers. The coordinator also acts
gateway that connects WSN to internet.
▪ WSN are enabled by wireless communication protocol
such as 802.15.4.
▪ ZigBee is one of the most popular wireless
technologies.
IoT Enabling Technologies (Contd.)
▪ WIRELESS SENSOR NETWORK:
The some of the examples where WSN is used in
the IOT are:
▪ Weather monitoring system uses WSN which
collects data of temperature, humidity which
are aggregated and analyzed.
▪ Indoor air quality monitoring system use WSN.
▪ Soil Moisture Monitoring system
▪ Surveillance systems use WSN for collecting
data.
▪ Health monitoring system.
IoT Enabling Technologies (Contd.)
IoT Enabling Technologies (Contd.)
IoT Enabling Technologies (Contd.)
▪ CLOUD COMPUTING:
▪ Cloud computing is the use of various services, such as software development
platforms, servers, storage and software, over the internet, often referred to as the
"cloud." Generally the cloud computing based on three characteristics such as:
• The back-end of the application (especially hardware) is completely managed by a cloud vendor.
• A user only pays for services used (memory, processing time and bandwidth, etc.).
• Services are scalable.
▪ The Cloud computing provides ability to “pay on demand” and scale quickly as a
result of cloud computing vendors being able to pool resources that may be divided
among multiple clients.
▪ The cloud computing provides different services such as:
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS).
IoT Enabling Technologies (Contd.)
IoT Enabling Technologies (Contd.)
▪ Infrastructure as a Service (IaaS)
▪ Infrastructure as a service provides companies with computing resources including
servers, networking, storage, and data center space on a pay-per-use basis.
▪ The benefits of IaaS
• No need to invest in your own hardware
• Infrastructure scales on demand to support dynamic workloads
• Flexible, innovative services available on demand
IoT Enabling Technologies (Contd.)

▪ Platform as a Service (PaaS)


▪ Platform as a service provides a cloud-based environment with everything
required to support the complete lifecycle of building and delivering web-
based (cloud) applications — without the cost and complexity of buying and
managing the underlying hardware, software, provisioning, and hosting.
▪ The benefits of PaaS
• Develop applications and get to market faster
• Deploy new web applications to the cloud in minutes
• Reduce complexity with middleware as a service
IoT Enabling Technologies (Contd.)

▪ Software as a Service (SaaS)


▪ Software as a service — run on distant computers “in the cloud” that are owned and
operated by others and that connect to users’ computers via the internet and, usually, a
web browser.
▪ The benefits of SaaS
• You can sign up and rapidly start using innovative business apps
• Apps and data are accessible from any connected computer
• No data is lost if your computer breaks, as data is in the cloud
• The service is able to dynamically scale to usage needs
IoT Enabling Technologies (Contd.)
▪ Big Data Analytics:
▪ Big data analytics refers to the strategy of
analyzing large volumes of data, or big data.
This big data is gathered from a wide variety
of sources, including social networks, videos,
digital images, sensors, and sales transaction
records.
▪ The large data is difficult to store, manage,
process and analyze the data using traditional
databases and data processing tools. There
are several steps which involves in analyzing
big data are data cleansing, data managing,
data processing and visualization.
IoT Enabling Technologies (Contd.)
▪ Big Data Analytics:
▪ Some examples of big data generated by IoT are:
Sensors data generated by weather monitoring stations.
Data generated by IoT systems for location and tracking of vehicles
Sensors embedded in industry and energy system.
Health and fitness data generated by IoT system such as fitness bands.
IoT Enabling Technologies (Contd.)

▪ Embedded systems:
▪ Embedded system is a combination of
hardware and software system used to
perform special tasks.
▪ Embedded system includes
microcontroller or microprocessor,
memory (RAM, ROM), networking unit,
input/output units and storage.
▪ It collects the data, analyses and sends
the data to internet.
THANK YOU!

Patkar Varde College,


Piramal Nagar, Goregaon West,
Mumbai, Maharashtra 400062.

[email protected] www.sdbi.in

You might also like