IOT Mod1
IOT Mod1
• Sensors are everywhere. They’re in our homes and workplaces, our shopping centers
and hospitals. They’re embedded in smart phones and an integral part of the Internet
of Things (IoT).
• Broadly speaking, sensors are devices that detect and respond to changes in an
environment. Inputs can come from a variety of sources such as light, temperature,
motion and pressure.
• For Example, A microphone is a sensor that takes vibrational energy (sound waves),
and converts it to electrical energy in a useful way for other components in the system
to correlate back to the original sound.
Sensor is only sensitive to the measured property (e.g., a temperature sensor only senses the
ambient temperature of a room). It is insensitive to any other property besides what it is
designed to detect (e.g., a temperature sensor does not bother about light or pressure while
sensing the temperature). Finally, a sensor does not influence the measured property (e.g.,
measuring the temperature does not reduce or increase the temperature). Figure 1.1 shows the
simple outline of a sensing task. Here, a temperature sensor keeps on checking an environment
for changes. In the event of a fire, the temperature of the environment goes up. The temperature
sensor notices this change in the temperature of the room and promptly communicates this
information to a remote monitor via the processor.
Figure 1.1 The outline of a simple sensing operation
Types Sensors
• Temperature Sensors – agriculture field to monitor soil temperature
• Humidity Sensors- Humidity sensors are commonly found in heating, vents and air
conditioning (HVAC) systems in both industrial and residential domains.
• Pressure Sensors- A pressure sensor senses changes in gases and liquids.
- Pressure sensors are also useful in the manufacturing of water systems as it is easy to
detect fluctuations or drops in pressure.
• Proximity Sensors- These types of sensors often emit electromagnetic fields or
beams of radiation such as infrared.
- used in the parking lots of malls, stadiums to indicate parking availability.
• Level Sensors- used to detect the level of substances including liquids, powders and
granular materials.
• Accelerometers- Accelerometers detect an object’s acceleration i.e. the rate of
change of the object’s velocity with respect to time.
• Gyroscope- motion sensing for video games, and camera-shake
• Gas Sensors-detect changes in air quality, presence of toxic and hazardous gasses.
• Infrared Sensors- sensors sense characteristics in their surroundings by either
emitting or detecting infrared radiation.
- Infrared sensors are used in a variety of different IoT projects including healthcare as
they simplify the monitoring of blood flow and blood pressure. Televisions use infrared
sensors to interpret the signals sent from a remote control.
• Optical Sensors- vehicles use optical sensors to recognize signs, obstacles, and other
things that a driver would notice when driving or parking. Optical sensors play a big
role in the development of driverless cars.
The control system of an actuator can be a mechanical or electronic system, a software-based system (e.g.,
an autonomous car control system), a human, or any other input. Figure 1.3 shows the outline of a simple
actuation system.
A remote user sends commands to a processor. The processor instructs a motor controlled robotic arm to
perform the commanded tasks accordingly. The processor is primarily responsible for converting the human
commands into sequential machine-language commandsequences, which enables the robot to move. The
robotic arm finally moves the designated boxes, which was its assigned task.
Broadly, actuators can be divided into seven classes: 1) Hydraulic, 2) pneumatic, 3) electrical, 4)
thermal/magnetic, 5) mechanical, 6) soft, and 7) shape memory polymers.
1) Hydraulic actuators
A hydraulic actuator works on the principle of compression and decompression of fluids. These actuators
facilitate mechanical tasks such as lifting loads through the use of hydraulic power derived from fluids in
cylinders or fluid motors. The mechanical motion applied to a hydraulic actuator is converted to, linear,
rotary, or oscillatory motion. The almost incompressible property of liquids is used in hydraulic actuators
for exerting significant force. These hydraulic actuators are also considered as stiff systems. The actuator’s
limited acceleration restricts its usage.
2) Pneumatic actuators
A pneumatic actuator works on the principle of compression and decompression of gases. These actuators
use a vacuum or compressed air at high pressure and convert it into either linear or rotary motion. Pneumatic
rack and pinion actuators are commonly used for valve controls of water pipes. Pneumatic actuators are
considered as compliant systems. The actuators using pneumatic energy for their operation are typically
characterized by the quick response to starting and stopping signals. Small pressure changes can be used
for generating large forces through these actuators. Pneumatic brakes are an example of this type of actuator
which is so responsive that they can convert small pressure changes applied by drives to generate the
massive force required to stop or slow down a moving vehicle. Pneumatic actuators are responsible for
converting pressure into force. The power source in the pneumatic actuator does not need to be stored in
reserve for its operation.
3) Electric actuators
Typically, electric motors are used to power an electric actuator by generating mechanical torque. This
generated torque is translated into the motion of a motor’s shaft or for switching (as in relays). For example,
actuating equipment’s such as solenoid valves control the flow of water in pipes in response to electrical
signals. This class of actuators is considered one of the cheapest, cleanest and speedy actuator types
available.
5) Mechanical actuators
In mechanical actuation, the rotary motion of the actuator is converted into linear motion to execute some
movement. The use of gears, rails, pulleys, chains, and other devices are necessary for these actuators to
operate. These actuators can be easily used in conjunction with pneumatic, hydraulic, or electrical actuators.
6) Soft actuators
Soft actuators (e.g., polymer-based) consists of elastomeric polymers that are used as embedded fixtures in
flexible materials such as cloth, paper, fiber, particles, and others. The conversion of molecular level
microscopic changes into tangible macroscopic deformations is the primary working principle of this class
of actuators. These actuators have a high stake in modern-day robotics. They are designed to handle fragile
objects such as agricultural fruit harvesting, or performing precise operations like manipulating the internal
organs during robot-assisted surgeries.
(b). Point-to-point:
• Point-to-point connections are used to establish direct connections between two hosts.
• These networks were designed to work over duplex links.
• Day-to-day systems such as a remote control for an air conditioner or television are apoint to
point connection, where the connection has the whole channel dedicated to it
only.
Point-to-multipoint:
• In a point-to-multipoint connection, more than two hosts share the same link.
• Point-to-multipoint connections find popular use in wireless networks and IPtelephony.
• The channel is shared between the various hosts, either spatially or temporally.
Spatial sharing – FDMA Temporal sharing –
TDMA
Mesh topology:
• In a mesh topology, every host is connected to every other host using a dedicated link(in a point-
to-point manner).
• This implies that for n hosts in a mesh, there are a total of n(n-1)/2 dedicated fullduplex links
between the hosts.
• Even if a link is down or broken, the network is still fully functional as there remain
other pathways for the traffic to flow through.
• The second advantage is the security and privacy of the traffic as the data is only seenby the
intended recipients and not by all members of the network.
• The third advantage is the reduced data load on a single host, as every host in this network
takes care of its traffic load.
Bus topology:
• A bus topology follows the point-to-multipoint connection. A backbone cable or busserves as the
primary traffic pathway between the hosts.
• The hosts are connected to the main bus employing drop lines or taps. The mainadvantage of
this topology is the ease of installation.
• Restriction on the length of the bus and the number of hosts.
• Signal loss over the extended bus.
• The installation is very easy and cheap. However, the Main drawback of this topology is the
difficulty in fault localization within the network.
Ring topology:
a) The ISO-OSI model, also known as the OSI (Open Systems Interconnection) model, is a conceptual
framework used to understand and describe how different networking protocols and technologies
interact with each other to enable communication between devices in a network. It was developed by
the International Organization for Standardization (ISO) in the 1980s.
The OSI model is divided into seven layers, each representing a specific function or set of functions
in the networking process. Here's a brief overview of each layer:
1. Physical Layer: This layer deals with the physical connection between devices and the transmission of
raw data over a physical medium, such as cables or wireless signals.
2. Data Link Layer: The data link layer is responsible for the reliable transmission of data between
adjacent nodes on a network. It ensures error-free transmission over the physical layer.
3. Network Layer: This layer handles the routing of data packets across multiple networks. It determines
the optimal path for data to travel from the source to the destination based on network conditions and
addresses.
4. Transport Layer: The transport layer provides end-to-end communication between the source and
destination devices. It ensures that data is delivered reliably and in the correct order, managing issues
like flow control and error correction.
5. Session Layer: The session layer establishes, maintains, and terminates connections between
applications. It manages communication sessions, allowing data exchange between devices.
6. Presentation Layer: This layer is responsible for data translation, encryption, and compression. It
ensures that data sent by one application can be understood by another, regardless of differences in
data representation.
7. Application Layer: The application layer contains protocols and interfaces used by applications to
communicate over a network. It enables users to access network services and resources, such as web
browsing, email, and file transfer.
Each layer in the OSI model performs specific functions, and communication between layers is
standardized to facilitate interoperability between different networking technologies and protocols.
(b). The OSI (Open Systems Interconnection) model is a conceptual framework used to understand
and standardize the functions of a telecommunication or computing system. It consists of seven layers,
each responsible for a specific set of functions. Here are the highlights of each layer:
1. Physical Layer (Layer 1):
This is the lowest layer of the OSI model.
It deals with the physical transmission of data over the network medium.
Highlights include:
Transmission of raw binary data bits over physical media such as cables or wireless
signals.
Specifies characteristics like voltage levels, data rates, modulation schemes, and
physical connectors.
Examples of devices at this layer include network interface cards (NICs), hubs,
repeaters, and cables.
2. Data Link Layer (Layer 2):
Responsible for node-to-node communication and error detection/correction within a single
network segment.
Highlights include:
Framing: Dividing data into frames for transmission.
MAC addressing: Assigning unique addresses to network devices.
Error detection and correction: Ensuring data integrity.
Access control: Managing access to the network medium, e.g., through protocols like
Ethernet.
Examples of devices at this layer include switches and bridges.
3. Network Layer (Layer 3):
Handles routing and forwarding of data packets between different networks.
Highlights include:
Logical addressing: Assigning IP addresses to devices for identification.
Routing: Determining the best path for data transmission across interconnected
networks.
Packet switching: Dividing data into packets and forwarding them based on logical
addresses.
Examples of devices at this layer include routers and layer 3 switches.
4. Transport Layer (Layer 4):
Provides end-to-end communication between the sender and receiver, ensuring data delivery
and reliability.
Highlights include:
Segmentation and reassembly: Breaking data into smaller segments and reassembling
them at the destination.
Flow control: Managing the pace of data transmission to avoid overwhelming the
recipient.
Error detection and recovery: Ensuring data integrity through error detection and
retransmission.
Examples of protocols at this layer include TCP (Transmission Control Protocol) and
UDP (User Datagram Protocol).
5. Session Layer (Layer 5):
Establishes, manages, and terminates connections between applications.
Highlights include:
Session establishment, maintenance, and termination.
Synchronization: Ensuring coordination between sender and receiver.
Dialogue control: Managing the communication between applications.
Examples include APIs (Application Programming Interfaces) for remote procedure
calls (RPCs) and session management protocols.
6. Presentation Layer (Layer 6):
Responsible for data translation, encryption, and compression to ensure compatibility between
different systems.
Highlights include:
Data encryption and decryption.
Data compression and decompression.
Data format conversion (e.g., ASCII to EBCDIC).
Examples include SSL/TLS for encryption and MIME for email formatting.
7. Application Layer (Layer 7):
Provides interfaces for user applications and network services.
Highlights include:
Network services such as email, file transfer, and remote access.
User interfaces for accessing network resources.
Examples include HTTP for web browsing, FTP for file transfer, SMTP for email, and
DNS for domain name resolution.
Understanding the OSI model and its layers helps in troubleshooting network issues, designing network
protocols, and ensuring interoperability between different networking devices and software applications.
XMPP
XMPP The extensible messaging and presence protocol, or XMPP, which was initiallynamed as
Jabber, is designed for message-oriented middle wares based on the extensible markup language
(XML) .
Operational Principle
XMPP was developed for instant messaging, maintenance of contacts, and information about network
presence.
A unique XMPP address, which is also referred to as a Jabber ID (JID), is assigned to every user on
the network. The JID, similar to an email address, has a username and a
domain name ([email protected]). The domain name is mostly the IP address of theserver hosting
the XMPP service.
XMPP allows its users to login from multiple devices by means of specifying resources. The resource is
used to identify a user’s clients/devices (home, mobile, work, laptop, and others), which is generally
included in the JID by appending the JID with the resource name separatedby a slash.
REST
Representational state transfer or REST encompasses a set of constraints for the creation of web services,
mainly using a software architectural style [22]. The web services adhering to REST styles are referred to as
RESTful services; these services enable interoperability between various Internet- connected devices.
RESTful systems are stateless: the web services on the server do not retain client states. The use of
stateless protocols and standards makes RESTful systems quite fast, reliable, and scalable.
RESTful systems are guided by six general constraints
(i) Statelessness: The statelessness of the client–server communication prevents the storage of any contextual
information of the client on the server. Each client request has to be self-sufficient in informing its responders
about its services and session state
(ii)Uniform Interface: Each part or component of a RESTful system must evolve independently as
a result of the decoupling of architectures and its simplification.
Cache ability: The responses have to be implicitly, or in some cases, explicitly clear on whether they
(iii)
have to be cached or not. This helps the clients in retaining the most updated data in response to requests.
Caching also reduces the numberof client–server interactions, thereby improving the performance and
scalabilityof the system as a whole.
(iv) Client–server Architecture: The user–interface interactions should be separate from data storage
ones. This would result in enhanced portability of user interfaces across multiple platforms. The separation
also allows for the independent evolution of components, which would result in scalability over the
Internet across various organizational domains.
(v) Layered System: The client in RESTful services is oblivious to the nature of the server to which it is
connected: an end point server or an intermediary server. The use of intermediaries also helps in improving
the balancing of load and enhancing security measures and system scalability.
(vi) Code on Demand: This is an optional parameter. Here, the functionality of clients can be extended for
a short period by the server. For example, the transfer of executable codes from compiled components.
WebSocket
Websocket is an IETF (Internet Engineering Task Force)-standardized full-duplex communication
protocol. Websockets (WS), an OSI layer seven protocol, enables reliable and full-duplex
communication channels over a single TCP connection [23].Figure 8.24 shows the position of a
websocket layer in a stack. The WS relies on theOSI layer 4 TCP protocol for communication. Despite
being different from the HTTP protocol, WS is compatible with HTTP and can work over HTTP ports
80 and 443, enabling support for network mechanisms such as the HTTP proxy, which is usually present
during organizational Internet accesses through firewalls.
Operational Principle
A client initiates the WS connection process by sending a WS handshake request. In response, a WS
server responds with a WS handshake response. As the servers have to incorporate both HTTP
and WS connections on the same port, the handshakingis initiated by an HTTP request/response mechanism.
Upon establishment of a connection between the client and server, the WS communication separates as a
bi- directional protocol that is non-conformant with the HTTP protocol.
Discuss the implementation of WSN and explain how master node aggregates data
9 from multiple slave nodes.
1. **Devices or Sensors**: These are the physical endpoints in the M2M network that collect data or
perform actions. Devices can range from simple sensors that measure environmental parameters (such as
temperature or humidity) to complex machines equipped with embedded computing and communication
capabilities.
2. **Communication Modules**: Communication modules enable devices to connect to the network and
exchange data with other devices or a central server. These modules may include cellular, satellite, Wi-Fi,
Bluetooth, Zigbee, or other wireless communication technologies, depending on the requirements of the
application and the environment.
3. **Network Infrastructure**: The network infrastructure provides the underlying connectivity and
transport mechanisms for M2M communication. This infrastructure may include cellular networks, satellite
networks, local area networks (LANs), or wide area networks (WANs), depending on the scale and coverage
requirements of the M2M deployment.
4. **Middleware**: Middleware serves as an intermediary layer between the devices and the applications or
services that interact with them. It handles tasks such as data processing, protocol translation, security, and
device management, abstracting the complexity of the underlying network and devices from higher-level
applications.
5. **Data Storage and Processing Systems**: M2M applications often generate large volumes of data that
need to be stored, processed, and analyzed. Data storage and processing systems, such as databases, data
warehouses, and analytics platforms, are essential components of the M2M networking model. These
systems enable organizations to derive insights from the collected data and make informed decisions.
6. **Applications and Services**: Applications and services leverage the data collected from M2M devices
to deliver value to end-users or organizations. These may include monitoring and control applications,
predictive maintenance systems, asset tracking solutions, and other M2M-enabled services that automate
processes, optimize resource utilization, and improve operational efficiency.
7. **Security Mechanisms**: Security is a critical aspect of M2M networking to protect sensitive data,
ensure the integrity of communication, and prevent unauthorized access to devices and networks. Security
mechanisms such as encryption, authentication, access control, and secure protocols are essential
components of the M2M networking model.
Overall, the components of the M2M networking model work together to enable seamless communication,
data exchange, and interaction between interconnected devices, facilitating the automation of various
processes and unlocking new opportunities for innovation and efficiency across industries.
1. **Interoperability**: The platform should support interoperability between different types of devices,
sensors, and communication protocols to facilitate seamless integration and communication across
heterogeneous M2M networks.
2. **Scalability**: The platform should be able to scale effortlessly to accommodate a growing number of
connected devices and increasing data volumes without compromising performance or reliability.
3. **Reliability and Availability**: The platform should ensure high availability and reliability to guarantee
continuous operation and minimal downtime, even in challenging environments or under heavy loads.
4. **Low Latency**: Low latency is crucial for real-time M2M applications that require quick response
times, such as industrial automation, remote monitoring, and control systems.
5. **Security**: Robust security mechanisms should be integrated into the platform to protect sensitive data,
prevent unauthorized access, and safeguard against cyber threats, including encryption, authentication,
access control, and secure communication protocols.
6. **Remote Device Management**: The platform should provide comprehensive tools for remote device
management, configuration, monitoring, and troubleshooting, allowing administrators to manage connected
devices efficiently and proactively address issues.
7. **Data Processing and Analytics**: Built-in data processing and analytics capabilities enable the
platform to extract insights from M2M data in real-time, enabling predictive maintenance, performance
optimization, and data-driven decision-making.
8. **Integration with Legacy Systems**: The platform should support integration with existing IT
infrastructure and legacy systems, enabling seamless communication and data exchange between M2M
devices and enterprise applications.
a) What is Interoperability? Explain Important in Context of IoT ?
12 b)Explain Types of interoperability?