Unit 1 Notes.docx
Unit 1 Notes.docx
GOAL: The basic premise and goal of IoT is to “connect the unconnected.” This means that
objects that are not currently joined to a computer network, namely the Internet, will be
connected so that they can communicate and interact with people and other objects.
When objects and machines can be sensed and controlled remotely across a network, a
tighter integration between the physical world and computers is enabled.
This allows for improvements in the areas of efficiency, accuracy, automation, and the
enablement of advanced applications.
the evolution of the Internet can be categorized into four phases. Each of these phases
has had a profound impact on our society and our lives. These four phases are further
defined in Table below.
1.1.2 IOT AND DIGITIZATION
IoT and digitization are terms that are often used interchangeably. In most contexts, this
duality is fine, but there are key differences to be aware of.
At a high level, IoT focuses on connecting “things,” such as objects and machines, to a
computer network, such as the Internet. IoT is a well-understood term used across the
industry. On the other hand, digitization can mean different things to different people but
generally encompasses the connection of “things” with the data they generate and the
business insights that result.
Digitization, as defined in its simplest form, is the conversion of information into a digital
format. Digitization has been happening in one form or another for several decades. For
example, the whole photography industry has been digitized. Pretty much everyone has
digital cameras these days, either standalone devices or built into their mobile phones.
Almost no one buys film and takes it to a retailer to get it developed. The digitization of
photography has completely changed our experience when it comes to capturing images.
Dynamic & Self-Adapting: - IoT devices and systems may have the capability to dynamically adapt
with the changing contexts and take actions based on their conditions, user’s context, or sensed
environment. For example, consider a surveillance system consisting of several surveillance cameras.
The surveillance camera can adapt their modes based on whether it is day or night. Camera could
switch from lower resolution to higher resolution modes when any motion is detected and alert
nearby camera to do the same In this example, the surveillance system is adapting itself based on
the context and changing conditions.
Self-Configuring: - IoT devices have self-configuring capability, allowing a large number of devices to
work together to provide certain functionality. These devices have ability to configure themselves,
setup the networking and fetch latest software upgrades with minimal manual or user intervention.
Unique Identity: - Each IoT device has a unique identity and a unique identifier. IoT systems may
have intelligent interfaces which adapt based on the context, allow communicating with user and the
environmental contexts. IoT device interfaces allow users to query the devices, monitor their status
and control them remotely, in association with control, configuration and management
infrastructure.
Integrated into Information Network: - IoT devices are usually integrated into information network
which allows them to communicate and exchange data with other devices and systems. IoT devices
can be dynamically discovered in the network, by other devices and/or the network, and they have
capability to describe themselves to other devices or the user applications. For example, a weather
monitoring node can describe its monitoring capabilities to another connected node so that they can
communicate and exchange the data. Integration into the information network helps in marketing
IoT systems “smarter” due to the collective intelligence of the individual devices in collaboration
with the infrastructure.
Things refers to IoT Devices which have unique identities and can perform remote sensing, actuating
and monitoring capabilities. Things are the main part of IoT Application. IoT Devices can be various
type, Sensing Devices, Smart Watches, Smart Electronics appliances, Wearable Sensors,
Automobiles, and industrial machines. These devices generate data in some forms or the other
which when processed by data analytics systems leads to useful information to guide further actions
locally or remotely.
For example, Temperature data generated by a Temperature Sensor in Home or other place, when
processed can help in determining temperature and take action according to users. Above picture,
shows a generic block diagram of IoT device. It may consist of several interfaces for connections to
other devices. IoT Device has I/O interface for Sensors, Similarly for Internet connectivity, Storage
and Audio/Video. IoT Device collect data from on-board or attached Sensors and Sensed data
communicated either to other device or Cloud based sever. Today many cloud servers available for
especially IoT System. These Platform known as IoT Platform. These cloud especially design for IoT
purpose. So here we can analysis and processed data easily.
1.3.2 IoT Protocols
IoT protocols help to establish Communication between IoT Device (Node Device) and Cloud based
Server over the Internet. It helps to send commands to IoT Device and received data from an IoT
device over the Internet. An image is given below. By this image you can understand which protocols
used.
Link layer
Link layer protocols determine how data is physically sent over the network’s physical layer or
medium (Coaxial cable or other or radio wave). This Layer determines how the packets are coded
and signaled by the hardware device over the medium to which the host is attached (e.g. coaxial
cable).
802.3 – Ethernet : Ethernet is a set of technologies and protocols that are used primarily in LANs. It
was first standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the physical layer and the
medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks. Ethernet
is classified into two categories: classic Ethernet and switched Ethernet.
802.11 – Wi-Fi : IEEE 802.11 is part of the IEEE 802 set of LAN protocols, and specifies the set of
media access control (MAC) and physical layer (PHY) protocols for implementing wireless local area
network (WLAN) Wi-Fi computer communication in various frequencies, including but not limited to
2.4 GHz, 5 GHz, and 60 GHz frequency bands.
802.16 – Wi-Max: The standard for WiMAX technology is a standard for Wireless Metropolitan Area
Networks (WMANs) that has been developed by working group number 16 of IEEE 802, specializing
in point-to-multipoint broadband wireless access.
802.15.4 -LR-WPAN : A collection of standards for Low-rate wireless personal area network. The
IEEE’s 802.15.4 standard defines the MAC and PHY layer used by, but not limited to, networking
specifications such as Zigbee®, 6LoWPAN, Thread, WI SUN and MiWi™ protocols. The standards
provide low-cost and low-speed communication for power constrained devices.
Network Layer
Responsible for sending of IP datagrams from the source network to the destination network.
Network layer performs the host addressing and packet routing. We used IPv4 and IPv6 for Host
identification. IPv4 and IPv6 are hierarchical IP addressing schemes.
IPv4 : An Internet Protocol address (IP address) is a numerical label assigned to each device
connected to a computer network that uses the Internet Protocol for communication. An IP address
serves two main functions: host or network interface identification and location addressing. Internet
Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, because of the growth
of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128
bits for the IP address, was standardized in 1998. IPv6 deployment has been ongoing since the
mid-2000s.
IPv6 : Internet Protocol version 6 (IPv6) is successor of IPv4. IPv6 was developed by the Internet
Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion.
In December 1998, IPv6 became a Draft Standard for the IETF, 7who subsequently ratified it as an
Internet Standard on 14 July 2017. IPv6 uses a 128-bit address, theoretically allowing 2128, or
approximately 3.4×1038 addresses.
6LoWPAN : It is an acronym of IPv6 over Low-Power Wireless Personal Area Networks. 6LoWPAN is
the name of a concluded working group in the Internet area of the IETF. This protocol allows for the
smallest devices with limited processing ability to transmit information wirelessly using an internet
protocol. 6LoWPAN can communicate with 802.15.4 devices as well as other types of devices on an
IP network link like Wi-Fi.
Transport Layer
This layer provides functions such as error control, segmentation, flow control and congestion
control. So, this layer protocols provide end-to-end message transfer capability independent of the
underlying network.
TCP : TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a
network conversation through which application programs can exchange data. TCP works with the
Internet Protocol (IP), which defines how computers send packets of data to each other. Together,
TCP and IP are the basic rules defining the Internet. The Internet Engineering Task Force (IETF)
defines TCP in the Request for Comment (RFC) standards document number 793.
UDP: User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of Internet Protocol
suite, referred as UDP/IP suite. Unlike TCP, it is unreliable and connectionless protocol. So, there is no
need to establish connection prior to data transfer.
Application Layer
Application layer protocols define how the applications interface with the lower layer protocols to
send over the network.
WebSocket : The WebSocket Protocol enables two-way communication between a client running
untrusted code in a controlled environment to a remote host that has opted-in to communications
from that code. The security model used for this is the origin-based security model commonly used
by web browsers.
AMQP : The AMQP – IoT protocols consist of a hard and fast of components that route and save
messages within a broker carrier, with a set of policies for wiring the components together. The
AMQP protocol enables patron programs to talk to the dealer and engage with the AMQP model.
An IoT system comprises of a number of functional blocks that provide the system the capabilities
for identification, sensing, actuation, communication, and management functional blocks are:
Device: An IoT system comprises of devices that provide sensing, actuation, monitoring and control
functions.
Services: services for device monitoring, device control service, data publishing services and services
for device discovery.
Security: this block secures the IoT system and by providing functions such as authentication ,
authorization, message and content integrity, and data security.
Application: This is an interface that the users can use to control and monitor various aspects of the
IoT system. Application also allow users to view the system status and view or analyze the processed
data.
1.4.2 IoT Communication Models
Push-Pull Model Push-Pull is a communication model in which the data producers push the data to
queues and the consumers Pull the data from the Queues. Producers do not need to be aware of the
consumers. Queues help in decoupling the messaging between the Producers and Consumers.
Queues also act as a buffer which helps in situations when there is a mismatch between the rate at
which the producers push data and the rate rate at which the consumer pull data.
Exclusive Pair Model: - Exclusive Pair is a bidirectional, full duplex communication model that uses a
persistent connection between the client and server. Connection is set up and it remains open until
the client sends a request to close the connection. Client and server can send messages to each
other after connection setup. Exclusive pair is a stateful communication model and the server is
aware of all the open connections.
Generally, we used Two APIs For IoT Communication. These IoT Communication APIs are:
Representational state transfer (REST) is a set of architectural principles by which you can design
Web services and Web APIs that focus on systems resources and how resource states are addressed
and transferred. REST APIs that follow the request response communication model, the rest
architectural constraints apply to the components, connector, and data elements, within a
distributed hypermedia system. The rest architectural constraint are as follows:
Client-server – The principle behind the client-server constraint is the separation of concerns. For
example, clients should not be concerned with the storage of data which is the concern of the server.
Similarly, the server should not be concerned about the user interface, which is the concern of the
client. Separation allows client and server to be independently developed and updated.
Stateless – Each request from client to server must contain all the information necessary to
understand the request and cannot take advantage of any stored context on the server. The session
state is kept entirely on the client.
Cache-able – Cache constraints requires that the data within a response to a request be implicitly or
explicitly leveled as cache-able or non-cache-able. If a response is cache-able, then a client cache is
given the right to reuse that response data for later, equivalent requests. caching can partially or
completely eliminate some instructions and improve efficiency and scalability.
Layered system – layered system constraints, constrains the behavior of components such that each
component cannot see beyond the immediate layer with they are interacting. For example, the client
cannot tell whether it is connected directly to the end server or two an intermediary along the way.
System scalability can be improved by allowing intermediaries to respond to requests instead of the
end server, without the client having to do anything different.
Uniform interface – uniform interface constraints requires that the method of communication
between client and server must be uniform. Resources are identified in the requests (by URIs in
web-based systems) and are themselves separate from the representations of the resources data
returned to the client. When a client holds a representation of resources it has all the information
required to update or delete the resource (provided the client has required permissions). Each
message includes enough information to describe how to process the message.
Code on demand – Servers can provide executable code or scripts for clients to execute in their
context. this constraint is the only one that is optional.
A RESTful web service is a ” Web API ” implemented using HTTP and REST principles. REST is most
popular IoT Communication APIs.
WebSocket APIs allow bi-directional, full duplex communication between clients and servers.
WebSocket APIs follow the exclusive pair communication model. Unlike request-response model
such as REST, the WebSocket APIs allow full duplex communication and do not require new
connection to be setup for each message to be sent. WebSocket communication begins with a
connection setup request sent by the client to the server. The request (called web socket handshake)
is sent over HTTP and the server interprets it is an upgrade request. If the server supports websocket
protocol, the server responds to the websocket handshake response. After the connection setup
client and server can send data/mesages to each other in full duplex mode. Websocket API reduce
the network traffic and latency as there is no overhead for connection setup and termination
requests for each message. Websocket suitable for IoT applications that have low latency or high
throughput requirements. So, Web socket is most suitable IoT Communication APIs for IoT System.
1.5 Domain Specific IoTs
An Intelligent Intrusion Detection System Based on UPnP Technology for Smart Living [ISDA,
2008] -> implement an intrusion detection system that uses image processing to recognize
the intrusion and extract the intrusion subject and generate Universal-Plug-and-Play
(UPnP-based) instant messaging for alerts.
● Paper:
Smart Lighting solutions for Smart Cities [International Conference on Advance Information
Networking and Applications Workshop, 2013]-> described the need for smart lighting
system in smart cities, smart lighting features and how to develop interoperable smart
lighting solutions.
Cities Surveillance
● Surveillance of infrastructure, public transport and events in cities is required to ensure
safety and security.
● City wide surveillance infrastructure comprising of large number of distributed and Internet
connected video surveillance cameras can be created.
● The video feeds from surveillance cameras can be aggregated in cloud-based scalable storage
solutions.
● Cloud-based video analytics applications can be developed to search for patterns of specific
events from the video feeds.
Energy Prognostics
● IoT based prognostic real-time health management systems can predict performance of
machines of energy systems by analyzing the extent of deviation of a system from its normal
operating profiles.
● In the system such as power grids, real time information is collected using specialized
electrical sensors called Phasor Measurement Units (PMU)
● Analyzing massive amounts of maintenance data collected from sensors in energy systems
and equipment can provide predictions for impending failures.
● OpenPDC is a set of applications for processing of streaming time-series data collected from
Phasor Measurements Units (PMUs) in real-time.
Indoor air quality monitoring using wireless sensor network [International Conference on
Sensing Technology, 2012] -> provided a wireless solution for indoor air quality monitoring
that measures the environmental parameters like temperature, humidity, gaseous pollutants,
aerosol and particulate matter to determine the indoor air quality.
Fitness Monitoring
● Wearable IoT devices allow to continuous monitoring of physiological parameters such as
blood pressure, heart rate, body temperature, etc than can help in continuous health and
fitness monitoring.
● It can analyze the collected health-care data to determine any health conditions or
anomalies.
● The wearable devices may can be in various form such as:
● Belts
● Wrist-bands
● Papers:
Toward ubiquitous mobility solutions for body sensor network health care [IEEE
Communications Magazine, 2012]-> Proposed an ubiquitous mobility approach for body
sensor network in health-care