0% found this document useful (0 votes)
19 views16 pages

Seminar Project

The document is a seminar report on the Internet of Things (IoT) presented by students at Jimma Institute of Technology. It covers the definition, development, architecture, protocols, advantages, and application areas of IoT, highlighting its transformative impact on various industries and everyday life. The report emphasizes the interconnectedness of devices and the importance of data processing and user interaction in IoT systems.

Uploaded by

birukmoges32
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views16 pages

Seminar Project

The document is a seminar report on the Internet of Things (IoT) presented by students at Jimma Institute of Technology. It covers the definition, development, architecture, protocols, advantages, and application areas of IoT, highlighting its transformative impact on various industries and everyday life. The report emphasizes the interconnectedness of devices and the importance of data processing and user interaction in IoT systems.

Uploaded by

birukmoges32
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Jimma Institute of Technology

Jimma University
School Computing and Informatics
Department of Information Technology
Seminar on Current Trends in Information Technology
Title: Internet of things
Submitted by :
Name ID
1 Biruk Moges Ru 0063/12
2 segni sileshi Ru 1340/12
Table of Contents

1.INTRODUCTION.................................................................................................................................... 1

2. Overview .................................................................................................................................................. 2

The IoT Development ........................................................................................................................... 3

The contributors of IoT: ........................................................................................................................ 3

2.2 Techniques of the Technologies ....................................................................................................... 5

2.2.1 The Architecture of IoT ............................................................................................................... 6

2.3 IoT Protocols ..................................................................................................................................... 7

2.4 Advantages and Disadvantages of IoT .......................................................................................... 10

2.5 Application Areas for IoT .............................................................................................................. 12

3 Conclusion .............................................................................................................................................. 13

4 References ............................................................................................................................................... 14
1.INTRODUCTION

World Wide Web (1990‟s) and Mobile Internet (the 2000‟s) had consequential corroborated the
way how people communicate. However, with an evolution in technology, the cataclysm of
Internet has stepped into a new phase “Internet of Things-The next generation technology‟.
Internet of things (IoT) provides a communication platform supporting person to person (P2P),
Machine to Machine (M2M) and Person to Machine (P2M) interactions. Thus, IoT reckons to
“Accumulate and Ubiquitous”.
The Internet of Things, or IoT, has rapidly emerged as one of the key technological trends of the
21st century. It is an ecosystem of connected devices that can take a wide range of forms, from
consumer wearables and connected vehicles to industrial automation systems and smart city
infrastructure. At its core, the IoT is about enabling devices to communicate with each other, to
collect and share data, and to automate processes in ways that were never possible before.
along with other emerging technologies such as AI the IoT is part of the fourth industrial
revolution.
From soil moisture sensors being used to optimize farmer’s yields to thermostats and thermometers
the Internet of Things (IoT) is transforming the way we live and works.
Billions of networked ‘smart’ physical objects around the world on city streets in homes and
hospitals are constantly collecting and sharing data across the internet giving them a level of digital
intelligence and autonomy.
In this report, we will explore how the technology works , the challenges and opportunities
presented by the Internet of Things, and examine how it is transforming industries, businesses, and
everyday life.

1
2. Overview

What is IoT
IoT stands for Internet of Things. It refers to the interconnectedness of physical devices, such as
appliances and vehicles, that are embedded with software, sensors, and connectivity which
enables these objects to connect and exchange data. This technology allows for the collection
and sharing of data from a vast network of devices, creating opportunities for more efficient and
automated systems.
Internet of Things (IoT) is the networking of physical objects that contain electronics embedded
within their architecture in order to communicate and sense interactions amongst each other or
with respect to the external environment. In the upcoming years, IoT-based technology will offer
advanced levels of services and practically change the way people lead their daily lives.
Advancements in medicine, power, gene therapies, agriculture, smart cities, and smart homes
are just a very few of the categorical examples where IoT is strongly established.
The concept of combining computers, sensors, and networks to monitor and control devices has
existed for decades. The recent confluence of several technology market trends, however, is
bringing the Internet of Things closer to widespread reality. These include Ubiquitous,
Connectivity, Widespread Adoption of IP-based networking, Computing, Economics
Miniaturization, Advances in Data Analytics and the Rise of Cloud Computing.
IoT sensors enable things (real/physical) to anticipate, sight, perceive and conduct jobs as living
things do. For example, a wristband with embedded sensors monitor your sleeping and waking
time and set an alarm accordingly, this wristband can then convey a message to the bath tub to
start warming water and can even communicate to the coffee maker to prepare coffee. Thus, IoT
cannot only sense things but it can also control and actuate things.
Things can be uniquely identified by assigning Identification through IPv6 addressing. Current
IPv4 have the capability to address only 4.3 billion devices whereas IPv6 has an address space
ranging from 2 to 128th power devices that count to trillions of devices. With Unique
identification, things can be easily located, recognized and controlled via the internet. IoT is
considered essential in performing everyday activities. It can connect, Monitor heterogeneous
things around us, locate things present around the globe, automatically manage and control things.

2
The IoT Development

IoT development involves integrating hardware and software components to create a product that
can collect and transfer data. This can involve using sensors to monitor various values and sending
that data to a central hub, where it can be analyzed and acted upon.
The development process for IoT devices can vary depending on the specific use case and
requirements of the product. Generally, it involves the following steps:
1. Conceptualization: This involves identifying the need for an IoT device or system, and
coming up with ideas for how it can be used to improve efficiency, safety, or convenience.
2. Design: Once the concept is finalized, the next step is to design the system, including
selecting hardware components, designing the software architecture, and deciding how the
system will collect, store, and process data.
3. Prototyping: A prototype is created to test the system and verify that it works as intended.
This can involve using breadboards and other prototyping tools to develop and test
hardware components, and writing code to test the software.
4. Manufacturing: Once the prototype is working as intended, the next step is to manufacture
the device or system at scale.
5. Deployment and maintenance: After manufacturing, the device or system is deployed and
maintained to ensure that it continues to function correctly and securely.
Throughout the development process, it's important to consider security, privacy, and
interoperability, as well as the needs of end-users.

The contributors of IoT:

The Internet of Things (IoT) is a concept that has been around for a relatively short period of time.
It involves machines communicating information over the internet, and has the potential to
revolutionize the way we live and work. In this essay, we will explore the history of IoT and the
key contributors to its development. The concept of IoT can be traced back to the early 1980s,
when a group of researchers at Carnegie Mellon University developed the first internet-connected
vending machine.

3
However, it wasn't until the late 1990s that the term "Internet of Things" was first coined by Kevin
Ashton, a British technology pioneer.

Ashton envisioned a world where everyday objects could be connected to the internet, allowing
them to communicate with each other and with humans. Over the years, many companies and
individuals have contributed to the development of IoT. One of the key players in this field is IBM,
which has been working on IoT technologies since the early 2000s.

IBM's work has focused on developing software and hardware solutions that enable devices to
communicate with each other and with the cloud. Another important contributor to IoT is Google,
which has been working on a number of IoT-related projects in recent years. One of the most
notable of these is the Google Nest, a smart home device that allows users to control their home's
temperature, lighting, and security systems from their smartphone.

Other notable contributors to IoT include Intel, Cisco, and Microsoft, all of which have developed
technologies and platforms that enable devices to communicate with each other and with the cloud.

Software developers are also major contributors to IoT. They create the applications that run on
IoT devices and the platforms that enable the integration and analysis of the data that these devices
generate. These applications help users to better understand and utilize the data generated by IoT
devices.
Finally, government and academic organizations are also playing an important role in the
development of IoT. These organizations conduct research and promote policies that enable the
widespread adoption of IoT technologies. They are also responsible for developing the standards
and regulations that govern the safe and effective use of IoT devices.
In conclusion, the development of IoT has been made possible by contributions from a wide range
of individuals and organizations. These contributors have brought together different technologies
and expertise to create an interconnected world that is changing the way we live and work.

4
2.2 Techniques of the Technologies

A complete IoT system integrates four distinct components: sensors/devices, connectivity, data
processing, and a user interface. Below I will briefly explain each component and what it does.
Sensors/Devices: First, sensors or devices collect data from their environment. This could be as
simple as a temperature reading or as complex as a full video feed.
I use “sensors/devices,” because multiple sensors can be bundled together or sensors can be part
of a device that does more than just sense things. For example, your phone is a device that has
multiple sensors (camera, accelerometer, GPS, ETC), but your phone is not just a sensor.
However, whether it’s a standalone sensor or a full device, in this first step data is being collected
from the environment by something.
Connectivity: Next that data is sent to the cloud (what’s the cloud?)but it needs a way to get there!
The sensors/devices can be connected to the cloud through a variety of methods including: cellular,
satellite, Wi-Fi, Bluetooth, low-power wide-area networks (LPWAN), or connecting directly to
the internet via ethernet.
Each option has tradeoffs between power consumption, range and bandwidth (here’s a simple
explanation). Choosing which connectivity option is best comes down to the specific IoT
application, but they all accomplish the same task: getting data to the cloud.
Data Processing
Once the data gets to the cloud, software performs some kind of processing on it.
This could be very simple, such as checking that the temperature reading is within an acceptable
range. Or it could also be very complex, such as using computer vision on video to identify objects
(such as intruders in your house).
But what happens when the temperature is too high or if there is an intruder in your house? That’s
where the user comes in.
User Interface
Next, the information is made useful to the end-user in some way. This could be via an alert to the
user (email, text, notification, ETC). For example, a text alert when the temperature is too high in
the company’s cold storage.

5
Also, a user might have an interface that allows them to proactively check in on the system. For
example, a user might want to check the video feeds in their house via a phone app or a web
browser.
However, it’s not always a one-way street. Depending on the IoT application, the user may also
be able to perform an action and affect the system. For example, the user might remotely adjust
the temperature in the cold storage via an app on their phone.
And some actions are performed automatically. Rather than waiting for you to adjust the
temperature, the system could do it automatically via predefined rules. And rather than just call
you to alert you of an intruder, the IoT system could also automatically notify relevant authorities.
As IoT continues to evolve, we can expect to see even more exciting technologies emerge that will
further enhance its capabilities and transform the way we interact with the world around us.

2.2.1 The Architecture of IoT

IoT system architecture refers to the design and structure of the various components and layers
that make up an IoT system. the architecture of IoT depends upon its functionality and
implementation in different sectors. Still, there is a basic process flow based on which IoT is
built. This includes the devices, sensors, actuators, network infrastructure, protocols, data
processing and communication technologies, cloud platforms, and user interfaces. The architecture
can be divided into four main stages: (1) Devices, (2) Internet gateways, (3) Data processing, and
(4) Applications.
1.The sensing / Device layer: this layer is the first layer of the IoT architecture and is responsible
for collecting data from different sources. This layer includes sensors and actuators that are placed
in the environment to gather information about temperature, humidity, light, sound, and other
physical parameters. These devices are connected to the network layer through wired or wireless
communication protocol.
2.Network Layer /Internet gateway layer: The network layer of an IoT architecture is
responsible for providing communication and connectivity between devices in the IoT system. It
includes protocols and technologies that enable devices to connect and communicate with each
other and with the wider internet. Examples of network technologies that are commonly used in
IoT include Wi-fi, Bluetooth, Zigbee, and cellular networks such as 4G and 5G. Additionally, the

6
network layer may include gateways and routers that act as intermediaries between devices and
the wider internet, and may also include security features such as encryption and authentication to
protect against unauthorized access.
3.Data processing Layer: The data processing layer of IoT architecture refers to the software and
hardware components that are responsible for collecting, analyzing, and interpreting data from IoT
devices. This layer is responsible for receiving raw data from the devices, processing it, and
making it available for further analysis or action. The data processing layer includes a variety of
technologies and tools, such as data management systems, analytics platforms, and machine
learning algorithms. These tools are used to extract meaningful insights from the data and make
decisions based on that data. Example of a technology used in the data processing layer is a data
lake, which is a centralized repository for storing raw data from IoT devices.
4.Application Layer: The application layer of IoT architecture is the topmost layer that interacts
directly with the end-user. It is responsible for providing user-friendly interfaces and
functionalities that enable users to access and control IoT devices. This layer includes various
software and applications such as mobile apps, web portals, and other user interfaces that are
designed to interact with the underlying IoT infrastructure. It also includes middleware services
that allow different IoT devices and systems to communicate and share data seamlessly. The
application layer also includes analytics and processing capabilities that allow data to be analyzed
and transformed into meaningful insights.

2.3 IoT Protocols


Before we dive into common IoT protocols, let's define the term "protocol". Protocols are a set of
rules for transmitting data between electronic devices according to a preset agreement regarding
information structure and how each side will send and receive data. Correspondingly, IoT
protocols are standards that enable the exchange and transmission of data between the Internet and
devices at the edge.
IoT protocols can be divided into two categories: IoT network protocols and IoT data protocols.
Data protocols mainly focus on information exchange, while network protocols provide methods
of connecting IoT edge devices with other edge devices or the Internet. Each category contains a
number of protocols that each have their own unique features.
IoT Network Protocols Wi-Fi, LTE CAT 1, NB-IoT, Bluetooth, ZigBee

7
IoT Data Protocols: AMQP, MQTT, HTTP, CoAP, DDS, LwM2M
IoT Network Protocols:

Wi-Fi: Wi-Fi is a ubiquitous protocol that can be found almost anywhere—industrial plants,
homes, commercial buildings, and even your neighborhood restaurants. This widely favored
technology is able to transmit large volumes of data over reasonable distances. However, many
low-power or battery-powered IoT devices are unlikely to use Wi-Fi due to its high power
consumption rate.
LTE CAT 1: is a communication standard specifically designed for servicing IoT applications.
Compared with other standards, it scales down bandwidth and communication demand to save
power and cost for large-scale and long-range IoT systems. Though LTE CAT 1 performs
inferiorly to 3G networks, experts predict that it will replace 3G as major U.S. carriers sunset 3G
in 2022.
Bluetooth: focuses on point-to-point, short-range communication of a relatively small amount of
data. In the IoT space, Bluetooth is commonly used to connect small, battery-powered sensors to
IoT gateways or to facilitate communication with a smartphone, e Bike, or other smart device.
ZigBee: Ratified in the early 2000s, ZigBee stands out as a low-cost, low-power, and reliable
wireless network technology. The standard is adaptable and supports multiple network topologies,
including mesh networks, point-to-multipoint, and point-to-point. ZigBee is most commonly used
in home or building automation settings.
IoT Data Protocols:

AMQP: Known for its reliability and interoperability, Advanced Message Queuing Protocol is an
open messaging standard. This protocol utilizes queues of data, enabling connected systems to
communicate asynchronously and better handle issues like traffic spikes and poor network
conditions. Additional AMQP features include durable and persistent queues, federation and high-
availability queues, clustering, and flexible routing. However, AMQP is known to be a verbose
protocol in some circumstances. Comparison: Compared with MQTT (discussed next), AMQP is
more reliable and secure.
MQTT: Message Queue Telemetry Transport is a lightweight pub/sub messaging protocol
suitable for connecting small, low-power devices. This data protocol was designed specifically for

8
IoT communication and requires minimal memory and processing power. On the wire, MQTT's
bidirectional pub/sub architecture makes the protocol flexible and scalable for a wide variety of
use cases and IoT system architectures.
Additionally, the MQTT protocol is designed with reliability and scalability in mind—security is
provided via Transport Layer Security, and persistent sessions allow the protocol to adapt to poor
network conditions and reduce connection time overhead.
Comparison: Compared with MQTT (discussed next), AMQP is more reliable and secure.
HTTP: You might recognize this acronym as appearing at the beginning of every website address
you type, as Hypertext Transfer Protocol is the foundation of data communication for the World
Wide Web. However, within the context of IoT applications, HTTP has many drawbacks. For
instance, this protocol establishes a synchronous connection between two devices in order to
transfer data—which presents a number of challenges for IoT deployments because devices and
endpoints may not be online at the same time and connections may be unreliable due to network
conditions. Ultimately, while HTTP is a great choice for transferring website data, it is generally
not a good choice for an IoT application.
CoAP: Constrained Application Protocol is used with constrained nodes and networks. This
protocol is suited for IoT applications as it reduces the size of network packages, thereby
decreasing network bandwidth overload. Other benefits of CoAP include improving the IoT life
cycle, saving battery power and storage space, and reducing the amount of data required to operate.

DDS: Released in 2004, Data Distribution Service is a middleware architecture for real-time
systems that focus on data communication between the nodes of a publication- or subscription-
based messaging architecture.
DDS is mainly used under circumstances that require real-time data exchange—for example,
autonomous vehicles, power generation, and robotics.
CoAP: Constrained Application Protocol is used with constrained nodes and networks. This
protocol is suited for IoT applications as it reduces the size of network packages, thereby
decreasing network bandwidth overload. Other benefits of CoAP include improving the IoT life
cycle, saving battery power and storage space, and reducing the amount of data required to operate.

9
2.4 Advantages and Disadvantages of IoT

The Internet of Things (IoT) has become an increasingly popular topic in recent years, with many
businesses and individuals adopting IoT devices in their daily lives. However, as with any
technology, there are both advantages and disadvantages to using IoT.

Advantages:
Automation and Control: Due to physical objects getting connected and controlled digitally and
centrally with wireless infrastructure, there is a large amount of automation and control in the
workings. Without human intervention, the machines are able to communicate with each other
leading to faster and timely output.
Information: It is obvious that having more information helps making better decisions. Whether
it is mundane decisions as needing to know what to buy at the grocery store or if your company
has enough widgets and supplies, knowledge is power and more knowledge is better.
Monitor: The second most obvious advantage of IoT is monitoring. Knowing the exact quantity
of supplies or the air quality in your home, can further provide more information that could not
have previously been collected easily. For instance, knowing that you are low on milk or printer
ink could save you another trip to the store in the near future. Furthermore, monitoring the
expiration of products can and will improve safety.
Time: As hinted in the previous examples, the amount of time saved because of IoT could be quite
large. And in today’s modern life, we all could use more time.
Money: The biggest advantage of IoT is saving money. If the price of the tagging and monitoring
equipment is less than the amount of money saved, then the Internet of Things will be very widely
adopted. IoT fundamentally proves to be very helpful to people in their daily routines by making
the appliances communicate to each other in an effective manner thereby saving and conserving
energy and cost. Allowing the data to be communicated and shared between devices and then
translating it into our required way, it makes our systems efficient.
Better Quality of Life: All the applications of this technology culminate in increased comfort,
convenience, and better management, thereby improving the quality of life.

10
Disadvantages:
Compatibility: Currently, there is no international standard of compatibility for the tagging and
monitoring equipment. As devices from different manufacturers will be interconnected, the issue
of compatibility in tagging and monitoring crops up. Although this disadvantage may drop off if
all the manufacturers agree to a common standard, even after that, technical issues will persist.
Complexity: As with all complex systems, there are more opportunities of failure. With the
Internet of Things, failures could sky rocket.
The IoT is a diverse and complex network. Any failure or bugs in the software or hardware will
have serious consequences. Even power failure can cause a lot of inconvenience.
Privacy/Security: With all of this IoT data being transmitted, the risk of losing privacy increases.
For instance, how well encrypted will the data be kept and transmitted with? Do you want your
neighbors or employers to know what medications that you are taking or your financial situation?
Safety: Imagine if a notorious hacker changes your prescription. As all the household appliances,
industrial machinery, public sector services like water supply and transport, and many other
devices all are connected to the Internet, a lot of information is available on it. This information is
prone to attack by hackers. It would be very disastrous if private and confidential information is
accessed by unauthorized intruders.
Technology Takes Control of Life: Our lives will be increasingly controlled by technology, and
will be dependent on it. The younger generation is already addicted to technology for every little
thing. We have to decide how much of our daily lives are we willing to mechanize and be
controlled by technology.
As a conclusion IoT has brought significant changes to the world, contributing to many
advancements. However, it is crucial to consider the advantages and disadvantages of IoT when
implementing it. As with any technology, it has its advantages and challenges.

11
2.5 Application Areas for IoT

Industrial Automation: By using this technology, we can automate manufacturing processes


remotely. It can also prove useful in optimizing the production processes. We can manage the
inventory and the supply chain. We can also diagnose if the machines require repair and
maintenance.
Health Monitoring: We can use this technology to identify health problems. The patterns of heart
rate, pulse, digestive system, and blood pressure can be monitored and diagnosed for anomalies.
The information can be sent to the doctor for analysis. IoT can be used in healthcare to monitor
patients remotely, track medication adherence, and improve patient outcomes. Wearable devices,
such as fitness trackers and smartwatches, can also be used to monitor vital signs and detect health
issues early on. The hospital can also be contacted in times of emergencies.
Smart Environment: A very important application of IoT is detecting pollution and natural
calamities. We can monitor the emissions from factories and vehicles to minimize air pollution.
We can track the release of harmful chemicals and waste in rivers and the sea, thereby arresting
water pollution. We can also keep tabs on the quality of water being supplied for drinking. We can
send warnings of earthquakes and tsunamis by detecting tremors. We can keep the water level of
rivers and dams under surveillance to be alert in case of floods. The detection of forest fire is also
possible with this technology.
Smart homes: smart homes and buildings are yet another common application area of IoT. IoT
devices can be used to control lighting, heating, and air conditioning systems, as well as provide
security and surveillance. Smart homes and buildings can also use IoT sensors to monitor energy
and water usage, identify areas for improvement in efficiency, and automatically adjust settings
based on occupancy and usage patterns.
Agriculture: IoT can be used in agriculture to monitor soil moisture, track weather patterns, and
optimize crop yields. Connected sensors can provide farmers with real-time data, allowing them
to make informed decisions about irrigation and fertilization. This can help farmers make more
informed decisions about when to plant, water, and harvest crops, as well as reduce irrigation and
fertilizer usage.

12
3 Conclusion

The Internet of Things (IoT) is a rapidly growing industry that has the potential to revolutionize
the way we live and work. As we have seen in this report, IoT devices are becoming more prevalent
and are being used in a wide range of applications, from smart homes to industrial automation.

One of the biggest challenges facing the IoT industry is security. As more devices are connected
to the internet, the risk of cyber attacks increases. It is essential that organizations take steps to
secure their IoT devices and networks to protect against these threats.

Another challenge is the management of the immense volumes of data generated by IoT devices.
Organizations must have the infrastructure in place to store, process, and analyze this data to derive
insights and make informed decisions.

Despite these challenges, the IoT industry is poised for significant growth in the coming years.
New standards and platforms will emerge, and open-source solutions will become more prevalent.
This will lead to a new wave of productivity growth and innovation.

In conclusion, the IoT industry has the potential to transform the way we live and work. However,
it is essential that organizations take steps to address the security and data management challenges
associated with IoT. With the right infrastructure and solutions in place, the IoT industry will
continue to grow and thrive, bringing new opportunities and benefits to individuals and
organizations alike.

13
4 References

1 I. J. Computer Network and Information Security, 2017, 4, 57-70


Published Online April 2017 in MECS (http://www.mecs-press.org/)

2 International Journal of Computer Applications (0975 – 8887) Volume 128 – No.1, October 2015
Internet of Things (IoT): Definitions, Challenges and
Recent Research Directions (https://www.researchgate.net/publication/320532203)_

3 The Internet of Things (IoT): An Overview (https://crsreports.congress.gov | IF11239 · VERSION 4 · UPDATED)

4 UKEssays. (November 2018). Technical Report on Internet of Things. Retrieved from


https://www.ukessays.com/essays/information-technology/technical-report-internet-6958.php?vref=1

5 Internet of things (IoT)by admin | Sep 8, 2021 | blog, Australia (https://www.iot.com.au/internet-of-things-iot/)

14

You might also like