Architecture of Internet of Things
Architecture of Internet of Things
Internet of Things (IoT) technology has a wide range of applications and the use of the Internet of
Things is growing so faster. It is the networking of physical objects that contain electronics
embedded within their architecture to communicate and sense interactions amongst each other or
to the external environment.
Architecture of IoT
The architecture of IoT is divided into 4 different layers i.e. Sensing Layer, Network Layer, Data
processing Layer, and Application Layer.
Sensing Layer: The sensing layer is the first layer of the Internet of Things architecture and
is responsible for collecting data from different sources. This layer
includes sensors and actuators that are placed in the environment to gather information
about temperature, humidity, light, sound, and other physical parameters. Wired or wireless
communication protocols connect these devices to the network layer.
Network Layer: The network layer of an IoT architecture is responsible for providing
communication and connectivity between devices in the IoT system. It includes protocols
and technologies that enable devices to connect and communicate with each other and with
the wider internet. Examples of network technologies that are commonly used in IoT
include WiFi, Bluetooth, Zigbee, and cellular networks such as 4G and 5G technology.
Additionally, the network layer may include gateways and routers that act as intermediaries
between devices and the wider internet, and may also include security features such as
encryption and authentication to protect against unauthorized access.
Data processing Layer: The data processing layer of IoT architecture refers to the software
and hardware components that are responsible for collecting, analyzing, and interpreting
data from IoT devices. This layer is responsible for receiving raw data from the devices,
processing it, and making it available for further analysis or action. The data processing
layer includes a variety of technologies and tools, such as data management systems,
analytics platforms, and machine learning algorithms. These tools are used to extract
meaningful insights from the data and make decisions based on that data. Example of a
technology used in the data processing layer is a data lake, which is a centralized repository
for storing raw data from IoT devices.
Application Layer: The application layer of IoT architecture is the topmost layer that interacts
directly with the end-user. It is responsible for providing user-friendly interfaces and
functionalities that enable users to access and control IoT devices. This layer includes
various software and applications such as mobile apps, web portals, and other user
interfaces that are designed to interact with the underlying IoT infrastructure. It also includes
middleware services that allow different IoT devices and systems to communicate and share
data seamlessly. The application layer also includes analytics and processing capabilities
that allow data to be analyzed and transformed into meaningful insights. This can include
machine learning algorithms, data visualization tools, and other advanced analytics
capabilities.
Architecture of IoT
Advantages of IoT
Execute multiple tasks at a time like a computer.
Easiest internet connectivity
Works on GUI (Graphical User Interface) mode because of HDMI port.
Best suited for server-based applications i.e., can be connected via SSH–Secure Shell-to
access the Rpi command line remotely and file sharing via FTP–File Transfer Protocol.
More reliable for software applications.
Disadvantages of IoT
Security concerns and potential for hacking or data breaches.
Privacy issues related to the collection and use of personal data.
Dependence on technology and potential for system failures.
Limited standardization and interoperability among devices.
Complexity and increased maintenance requirements.
High initial investment costs.
Limited battery life on some devices.
Concerns about job displacement due to automation.
Limited regulation and legal framework for IoT, which can lead to confusion and uncertainty.
Modern Applications of IoT
Smart Grids and energy saving
Smart cities
Smart homes/Home automation
Healthcare
Earthquake detection
Radiation detection/hazardous gas detection
Smartphone detection
Water flow monitoring
Traffic monitoring
Smart door lock protection system
Robots and Drones
Healthcare and Hospitals, Telemedicine applications
Biochip Transponders (For animals in farms)
Heart monitoring implants (Example Pacemaker, ECG real time tracking
Open API support Supports Open API integrations. There is no support for Open APIs
Smart wearables, Big Data and Cloud, Sensors, Data and Information,
Examples
etc. etc.
Basis of IoT M2M
IOT HARDWARE
Transducer :
A transducer converts a signal from one physical structure to another.
It converts one type of energy into another type.
It might be used as actuator in various systems.
Sensors characteristics :
1. Static
2. Dynamic
1. Static characteristics :
It is about how the output of a sensor changes in response to an input change after steady state condition.
Accuracy: Accuracy is the capability of measuring instruments to give a result close to the true
value of the measured quantity. It measures errors. It is measured by absolute and relative errors.
Express the correctness of the output compared to a higher prior system. Absolute error =
Measured value – True value
Relative error = Measured value/True value
Range: Gives the highest and the lowest value of the physical quantity within which the sensor can
actually sense. Beyond these values, there is no sense or no kind of response.
e.g. RTD for measurement of temperature has a range of -200`c to 800`c.
Resolution: Resolution is an important specification for selection of sensors. The higher the
resolution, better the precision. When the accretion is zero to, it is called the threshold.
Provide the smallest changes in the input that a sensor is able to sense.
Precision: It is the capacity of a measuring instrument to give the same reading when repetitively
measuring the same quantity under the same prescribed conditions.
It implies agreement between successive readings, NOT closeness to the true value.
It is related to the variance of a set of measurements.
It is a necessary but not sufficient condition for accuracy.
Sensitivity: Sensitivity indicates the ratio of incremental change in the response of the system with
respect to incremental change in input parameters. It can be found from the slope of the output
characteristics curve of a sensor. It is the smallest amount of difference in quantity that will change
the instrument’s reading.
Linearity: The deviation of the sensor value curve from a particularly straight line. Linearity is
determined by the calibration curve. The static calibration curve plots the output amplitude versus
the input amplitude under static conditions.
A curve’s slope resemblance to a straight line describes linearity.
Drift: The difference in the measurement of the sensor from a specific reading when kept at that
value for a long period of time.
Repeatability: The deviation between measurements in a sequence under the same conditions.
The measurements have to be made under a short enough time duration so as not to allow
significant long-term drift.
Dynamic Characteristics :
Properties of the systems
Zero-order system: The output shows a response to the input signal with no delay. It does not
include energy-storing elements.
Ex. potentiometer measure, linear and rotary displacements.
First-order system: When the output approaches its final value gradually.
Consists of an energy storage and dissipation element.
Second-order system: Complex output response. The output response of the sensor oscillates
before steady state.
Sensor Classification :
Passive & Active
Analog & digital
Scalar & vector
1. Passive Sensor –
Can not independently sense the input. Ex- Accelerometer, soil moisture, water level and
temperature sensors.
2. Active Sensor –
Independently sense the input. Example- Radar, sounder and laser altimeter sensors.
3. Analog Sensor –
The response or output of the sensor is some continuous function of its input parameter. Ex-
Temperature sensor, LDR, analog pressure sensor and analog hall effect.
4. Digital sensor –
Response in binary nature. Design to overcome the disadvantages of analog sensors. Along with
the analog sensor, it also comprises extra electronics for bit conversion. Example – Passive infrared
(PIR) sensor and digital temperature sensor(DS1620).
5. Scalar sensor –
Detects the input parameter only based on its magnitude. The answer for the sensor is a function of
magnitude of some input parameter. Not affected by the direction of input parameters.
Example – temperature, gas, strain, color and smoke sensor.
6. Vector sensor –
The response of the sensor depends on the magnitude of the direction and orientation of input
parameter. Example – Accelerometer, gyroscope, magnetic field and motion detector sensors.
Types of sensors –
Electrical sensor :
Electrical proximity sensors may be contact or non contact.
Simple contact sensors operate by making the sensor and the component complete an electrical circuit.
Non- contact electrical proximity sensors rely on the electrical principles of either induction for detecting
metals or capacitance for detecting non metals as well.
Light sensor:
Light sensor is also known as photo sensors and one of the important sensor.
Light dependent resistor or LDR is a simple light sensor available today.
The property of LDR is that its resistance is inversely proportional to the intensity of the ambient light i.e
when the intensity of light increases, it’s resistance decreases and vise versa.
Touch sensor:
Detection of something like a touch of finger or a stylus is known as touch sensor.
It’s name suggests that detection of something.
They are classified into two types:
1. Resistive type
2. Capacitive type
Today almost all modern touch sensors are of capacitive types.
Because they are more accurate and have better signal to noise ratio.
Range sensing:
Range sensing concerns detecting how near or far a component is from the sensing position, although they
can also be used as proximity sensors.
Distance or range sensors use non-contact analog techniques. Short range sensing, between a few
millimetres and a few hundred millimetres is carried out using electrical capacitance, inductance and
magnetic technique.
Longer range sensing is carried out using transmitted energy waves of various types eg radio waves,
sound waves and lasers.
Mechanical sensor:
Any suitable mechanical / electrical switch may be adopted but because a certain amount of force is
required to operate a mechanical switch it is common to use micro-switches.
Pneumatic sensor:
These proximity sensors operate by breaking or disturbing an air flow.
The pneumatic proximity sensor is an example of a contact type sensor. These cannot be used where light
components may be blown away.
Optical sensor:
In there simplest form, optical proximity sensors operate by breaking a light beam which falls onto a light
sensitive device such as a photocell. These are examples of non contact sensors. Care must be exercised
with the lighting environment of these sensors for example optical sensors can be blinded by flashes from
arc welding processes, airborne dust and smoke clouds may impede light transmission etc.
Speed Sensor:
Sensor used for detecting the speed of any object or vehicle which is in motion is known as speed sensor
.For example – Wind Speed Sensors, Speedometer ,UDAR ,Ground Speed Radar .
Temperature Sensor:
Devices which monitors and tracks the temperature and gives temperature’s measurement as an electrical
signal are termed as temperature sensors .These electrical signals will be in the form of voltage and is
directly proportional to the temperature measurement .
PIR Sensor:
PIR stands for passive infrared sensor and it is an electronic sensor that is used for the tracking and
measurement of infrared (IR) light radiating from objects in its field of view and is also known as
Pyroelectric sensor .It is mainly used for detecting human motion and movement detection .
Ultrasonic Sensor:
The principle of ultrasonic sensor is similar to the working principle of SONAR or RADAR in which the
interpretation of echoes from radio or sound waves to evaluate the attributes of a target by generating the
high frequency sound waves .
Actuators in IoT
An IoT device is made up of a Physical object (“thing”) + Controller (“brain”) + Sensors + Actuators +
Networks (Internet). An actuator is a machine component or system that moves or controls the mechanism
of the system. Sensors in the device sense the environment, then control signals are generated for the
actuators according to the actions needed to perform.
A servo motor is an example of an actuator. They are linear or rotatory actuators, can move to a given
specified angular or linear position. We can use servo motors for IoT applications and make the motor
rotate to 90 degrees, 180 degrees, etc., as per our need.
The following diagram shows what actuators do, the controller directs the actuator based on the sensor
data to do the work.
Working of IoT devices and use of Actuators
The control system acts upon an environment through the actuator. It requires a source of energy and a
control signal. When it receives a control signal, it converts the source of energy to a mechanical operation.
On this basis, on which form of energy it uses, it has different types given below.
Types of Actuators :
1. Hydraulic Actuators –
A hydraulic actuator uses hydraulic power to perform a mechanical operation. They are actuated by a
cylinder or fluid motor. The mechanical motion is converted to rotary, linear, or oscillatory motion, according
to the need of the IoT device. Ex- construction equipment uses hydraulic actuators because hydraulic
actuators can generate a large amount of force.
Advantages :
Hydraulic actuators can produce a large magnitude of force and high speed.
Used in welding, clamping, etc.
Used for lowering or raising the vehicles in car transport carriers.
Disadvantages :
Hydraulic fluid leaks can cause efficiency loss and issues of cleaning.
It is expensive.
It requires noise reduction equipment, heat exchangers, and high maintenance systems.
2. Pneumatic Actuators –
A pneumatic actuator uses energy formed by vacuum or compressed air at high pressure to convert into
either linear or rotary motion. Example- Used in robotics, use sensors that work like human fingers by using
compressed air.
Advantages :
They are a low-cost option and are used at extreme temperatures where using air is a safer option
than chemicals.
They need low maintenance, are durable, and have a long operational life.
It is very quick in starting and stopping the motion.
Disadvantages :
Loss of pressure can make it less efficient.
The air compressor should be running continuously.
Air can be polluted, and it needs maintenance.
3. Electrical Actuators –
An electric actuator uses electrical energy, is usually actuated by a motor that converts electrical energy
into mechanical torque. An example of an electric actuator is a solenoid based electric bell.
Advantages :
Network Devices
Network Topology
The Network Topology is the layout arrangement of the different devices in a network. Some types of
network topologies are:
Bus Topology: In bus topology all devices are connected to a single central cable called a bus.
Data is sent along this cable and all devices share the same connection. Simple and cheap to set
up but if the main cable fails the whole network goes down.
Star Topology: In star topology all devices are connected to a central node called hub or switch.
The hub controls the flow of data between devices. If one device fails the rest of the network is
unaffected. But, if the central hub fails the whole network stops working.
Ring Topology: In ring topology devices are connected in a circular loop with each device
connected to two others. Data travels in one direction (or sometimes both) passing through each
device until it reaches its destination. A failure in one device can affect the whole network.
Mesh Topology: In mesh topology every device is connected to every other device in the network.
It provides multiple paths for data so if one path fails another can take over.
Tree Topology: Tree topology is the combination of star and bus topology. Tree topology is good for
organizing large networks and allows for easy expansion.
Hybrid Topology: Hybrid topology is the combination of two or more different topologies (like star
and mesh). It is flexible and can be customized based on the network’s specific needs.
Network Topology
OSI Model
OSI stands for Open Systems Interconnection. It is a reference model that specifies standards for
communications protocols and also the functionalities of each layer. The OSI has been developed by the
International Organization For Standardization and it is 7 layer architecture. Each layer of OSI has different
functions and each layer has to follow different protocols. The 7 layers are as follows:
Physical Layer
Data link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Network Protocols
A protocol is a set of rules or algorithms which define the way how two entities can communicate across the
network and there exists a different protocol defined at each layer of the OSI model. A few such protocols
are TCP, IP, UDP, ARP, DHCP, FTP, and so on.
Transmission Control Protocol/Internet Protocol (TCP/IP): TCP/IP is the foundational protocol
suite of the internet, enabling reliable communication. TCP Ensures data is delivered reliably and in
order and IP routes data packets to their destination based on IP addresses.
Hypertext Transfer Protocol (HTTP) and HTTPS: HTTP and HTTPS protocols used for
transmitting web pages. In HTTP communication is unsecured and in HTTPS secured
communication using SSL/TLS encryption.
Simple Mail Transfer Protocol (SMTP): SMTP protocol used to send email. SMTP protocol works
with other protocols like POP3 and IMAP for email retrieval.
File Transfer Protocol (FTP): FTP protocol used for transferring files between computers. Includes
commands for uploading, downloading, and managing files on a remote server.
Dynamic Host Configuration Protocol (DHCP): DHCP protocol automatically assigns IP
addresses to devices on a network. Reduces manual configuration and IP address conflicts.
Domain Name System (DNS): DNS Translates human-friendly domain names into IP addresses.
Ensures seamless navigation on the internet.
List of Ports
Socket: The unique combination of IP address and Port number together is termed a Socket.
Other Related Concepts
DNS Server: DNS stands for Domain Name System. DNS is basically a server that translates web
addresses or URLs (ex: www.google.com) into their corresponding IP addresses. We don’t have to
remember all the IP addresses of each and every website. The command ‘nslookup’ gives you the IP
address of the domain you are looking for. This also provides information on our DNS Server. \
Domain IP Address
ARP: ARP stands for Address Resolution Protocol. It is used to convert an IP address to its
corresponding physical address(i.e., MAC Address). ARP is used by the Data Link Layer to identify the
MAC address of the Receiver’s machine.
RARP: RARP stands for Reverse Address Resolution Protocol. As the name suggests, it provides the IP
address of the device given a physical address as input. But RARP has become obsolete since the time
DHCP has come into the picture.
The Domain Name System (DNS) is a critical component of computer networking. It converts easily
recognizable domain names, such as www.example.com, into numerical IP addresses that computers use
to identify each other on the network.
How DNS Works?
DNS works efficiently, translating user-friendly domain names into IP addresses, allowing seamless
navigation on the internet. Below step by step working of DNS:
User Input: When a user enters a domain name in a browser, the system needs to find its IP
address.
DNS Query: The user’s device sends a DNS query to the DNS resolver.
Resolver Request: The DNS resolver checks its cache for the IP address. If not found, it forwards
the request to the root DNS server.
Root DNS Server: The root DNS server provides the address of the TLD (Top-Level Domain)
server for the specific domain extension (e.g., .com).
TLD DNS Server: The TLD server directs the resolver to the authoritative DNS server for the actual
domain.
Authoritative DNS Server: The authoritative DNS server knows the IP address for the domain and
provides it to the resolver.
Response to User: The resolver stores the IP address in its cache and sends it to the user’s
device.
Access Website: With the IP address, the user’s device can access the desired website.
Network Security
Ensuring the security of a network is crucial to protect data and resources from unauthorized access and
attacks. Key aspects of network security include:
Firewalls: Devices or software that monitor and control incoming and outgoing network traffic based
on security rules.
Encryption: The process of encoding data to prevent unauthorized access. Commonly used
in VPNs, HTTPS, and secure email.
Intrusion Detection Systems (IDS): Tools that monitor network traffic for suspicious activity and
potential threats.
Access Control: Mechanisms that restrict access to network resources based on user identity and
role.
Regular Updates and Patching: Keeping software and hardware up to date to protect against
vulnerabilities.
Why Use Computer Networks?
Computer network play a important role in modern life. Here are some key benefits of computer networks:
Fast and Easy Communication: Networks enable all types of digital communication, like emails,
messaging, file sharing, video calls, and streaming.
More Storage Space: Suppose if we don’t have a cloud storage then we have to store data in
physical files that will consume a physical space so computer network provide a storage for storing
data.
Easier Sharing of Information: Networks make it simpler for users and teams to share resources
and information. Teams can collaborate more easily, and users get faster response from network
devices.
Better Security: Well designed networks are more reliable and give businesses more options for
keeping data safe. They come with built-in security features like encryption and access controls to
protect sensitive information from cyber threats.
IoT devices are any devices that can store data by connecting to the cloud.
IoT devices need a special set of cybersecurity guidelines because of how they differ from
conventional mobile devices. They lack the benefit of built-in security guidelines seen in
mobile operating systems like iOS and Android.
A lot of information is stored in the cloud, if an attacker manages to get access to the user's
account, it might be exploited for identity theft or privacy invasion.
Although there isn't a single solution for IoT security, cybersecurity experts have made it their
mission to inform manufacturers and developers about secure coding practices and how to
strengthen cloud activity defences.
Importance of IoT Security
Cyberattacks are a continual concern because of the unusual way that IoT devices are
manufactured and the enormous volume of data they process.
IoT security is necessary, as evidenced by some high-profile cases in which a common IoT device
was an advantage to breach and attack the wider network.
Strong IoT security is desperately needed, as seen by the regular threat of vulnerabilities, data
breaches, and other dangers related to the use of IoT devices.
IoT security, which encompasses a broad variety of tactics, strategies, protocols, and activities
aimed at reducing the growing IoT vulnerabilities of contemporary firms, is essential for
corporations.
Benefits of IoT Security
Educational institutions store data of sensitive nature about all their students and employees, besides data
from lucrative research, all being a doomed target. These threats include:
Data breaches: Personal data exposure of students, employees, financial data, and academic
records.
Property theft: theft of research data, patents, and academic publications.
Ransomware: This disrupts all the campus operations, including online learning and all the
administrative systems.
Insider threats: Insider threats of the category of students, faculty, or staff are in line with sensitive
information risks.
Which IoT Devices are Most Vulnerable to Security Breaches?
Some IoT devices are more vulnerable than others due to factors like processing power, connectivity, and
the sensitivity of data they handle.
Some of the most vulnerable IoT devices asr follows:
Home IoT Devices
Smart cameras: This device mostly comes with weak default passwords and less good encryption.
It can also be easily hacked and used for spying purposes.
Smart speakers: Even though they are voice-controlled per se, they can turn out to be a potential
target for eavesdropping and data theft.
Smart TVs: Web-connected; can be vulnerable to malware, data breaches, and adware.
Wearable Devices
Smartwatches and fitness trackers: Even though these devices are majorly used to collect the
least amount of personal data, this kind of sensitive information might be discovered upon
infringement.
Medical devices—pacemakers and insulin pumps—which, when hacked, may lead to fatal
results.
Industrial IoT Devices
ICS (Industrial Control Systems): These are utilized in the control of critical infrastructure, such as
power plants and factories, and may become targets for cyber-attacks that can cause physical
damage or disruptions.
Connected vehicles: Connectivity in vehicles has increased with years; therefore, so have the
chances of car hacking, which could result in remotecar control or data theft.
Other Vulnerable Devices
Home Routers: As the gateway to your entire home network, a weak router can give way to the
compromise of all devices connected to it.
Smart thermostats: It looks harmless, but they could have actually been part of a botnet or even
used as spies over your home.
Which Industries Need IoT Security?
IoT Security thus has a huge role in various industries because most of them are getting interconnected.
Some of the sectors that really need strong IoT Security:
Healthcare: Even medical devices, like pacemakers, insulin pumps, and remote patient monitoring
systems, are susceptible to cyber-attacks that may result in the loss of lives.
Manufacturing: Cyber attacks paralyze ICS/OT environments of critical infrastructure and bring
with them enormous financial losses and safety hazards.
Energy and Utilities: This sector represents critical infrastructure that is accompanied by a high
utilization of IoT devices, powering power grids and water treatment plants, among others, making
them very attractive targets for cyber-attacks that may have catastrophic consequences.
Transportation: Autonomous vehicles, smart traffic systems, and connected cars use vast volumes
of data, making them quite vulnerable to hacking and subsequent data breaches.
Financial Services: IoT-related devices used in banking, payments, and financial transactions
process sensitive financial data and hence require robust security measures against fraud and data
theft.
Retail: Point-of-sale systems, inventory management data, and customer data are all at risk if IoT
devices are compromised.
Government: IoT security is necessary for critical infrastructure, national security, and citizen data.
Agriculture: Cyber-attacks on smart farms and IoT-enabled equipment can affect food production
and its supply chain.
Building Automation: Security is required for smart buildings with IoT-enabled systems against
unauthorized access and data breaches.
How to protect IoT systems and devices?
Here are the steps to secure IoT Devices
DNS filtering: Using the Domain Name System to restrict harmful websites is known as DNS
filtering. When DNS filtering is added to a network including IoT devices, it stops such devices from
connecting to domains that are not authorized.
Encryption: Without encryption, data transfers between IoT devices are susceptible to on-path and
external attackers while travelling over the network. Consider encryption as a means of protecting a
letter's contents during transit via the postal service, similar to an envelope.
Device authentication: Internet of Things (IoT) devices are connected to servers, other networked
devices, and one other. All connected devices must undergo authentication to prevent unwanted
inputs or requests from third parties.
Security of credentials: If at all feasible, IoT device admin credentials must be updated. It is
recommended to avoid sharing login credentials between various apps and devices, instead every
device should have its password. In doing so, credential-based attacks are less likely.
Tools to Secure IoT Devices
ForeScout Platform: This protects and ensures on a network the consent of all managed and
unmanaged devices, including IT, IoT, and OT devices, using zero trust principles.
Microsoft Defender for IoT: Microsoft Defender for IoT helps enterprises manage, discover, and
protect their IoT and OT devices. Extra features include network and device threat monitoring
around the clock, identifying every asset and device.
Asimily: Asimily is a complete IoT security platform that focuses on medical and laboratory
equipment.
AWS IoT Device Defender: AWS IoT Device Defender is Amazon's Internet of Things security
management service. AWS IoT Device Defender allows administrators to authorize security
measures such as authentication and permission.
CHAPTER 2
IoT Hardware Devices
Building blocks of IoT Hardware
1. “Things”: Things in IoT are any devices that are capable of connecting to the internet. They can transmit,
retrieve and store huge amounts of data that they collect from the surrounding. They include home
appliances such as geysers, microwaves, thermostats and refrigerators
2. Data Acquisition module: As the term suggests, this module is responsible for acquiring data from the
physical surroundings or environment. These could include changes in the temperature, movement,
humidity and pressure.
3. Data processing module: This module includes computers that process the data acquired from the
previous module. They analyze the data, store data for future references and other purposes.
4. Communication module: This is the final building block and this module is responsible for
communication with third party vendors. This could include device to device, device to server or device to
user.
IoT Hardware Devices
1. Sensors
A sensor is an IoT device that senses physical changes in the environment and sends the data for
manipulation via a network. Clouds store the data for future references. Sensors monitor data and collect
information constantly.
2. Microcontrollers
A microcontroller is a small computer that is capable of performing operations. It sits on a semiconductor
integrated circuit chip. Microcontollers usually operate on a single function and hence differ from regular
computers. They perform a variety of tasks in a relatively simpler manner. We will learn further about
microcontrollers in a while.
3. Wearable devices
Wearable devices are a benchmark revolution of the IoT industry. These are Iot devices that humans can
wear on their bodies to regulate and perform a variety of tasks. These wearables are capable of tracking
glucose levels, monitor heart attack risks, coagulation and asthma monitoring, daily step and calorie
consumption tracking.
4. Basic devices
Traditional computers such as desktops, tablets and cellphones are still an integral part of any IoT
ecosystem. Desktops offer users with simple access to a lot of information and cell phones allow remote
access to Iot devices using APIs.
5. Datasheets
Datasheets give the details about the functionality of any hardware components. It is important to study
the datasheet of any hardware before making a purchase to make sure you are buying the right product.
Datasheets offer you detailed information on the parameters of the hardware, its physical size, different
voltage and electrical parameters, maximum current usage and the number of input/output pins.
Datasheets are highly useful as they give you all the information you need before buying complicated
hardware components.
6. Integrated circuits
Integrated circuits are chips. They are microcontrollers. You can buy empty chips in the market and
download any kind of design into the chip. They are made using Silicon and it is packaged into shapes of
rectangles. These chips contain complicated logic circuits, gates, registers, switches, I/O terminals and flip
flops.
Integrated circuits do a variety of functions, they can perform arithmetic and logical calculations. They act
as processors too. They contain binary coded information which is programmed to perform a set of
tasks.
Standard chips are available in the market that perform a fixed set of operations. You can also construct
chips to perform your desired set of functions and these are known as custom made chips.
Types of IoT hardware
It is easier to develop an IoT application these days due to the ease in the availability of boards, Integrated
circuits, prototype kits and platforms. These hardware components are low cost and reliable, they offer
flexibility and the choice to design custom sensors with specific applications. At the same time you can also
specify the networking area, data management and other functionalities you want your IoT application to
have.
The two most common System on a chip(SoS) Integrated Circuits these days are Micro Controllers
and Single-board computers. SoCs place microprocessors, storage, networking and data processing on
a single unit in the chip and thus they are largely in use in the market to manufacture IoT devices. There is
a wide range of hardware components to choose from and based on your requirements you can pick the
one that matches your proptype perfectly.
a. Microcontrollers
Microcontrollers are a type of SoC that provides data processing and storage units. They contain a
processor for processing , ROMs and ROMS for storage.
IoT hardware is tightly constrained. There is a lot to fit in a tiny amount of space unlike a desktop or a
laptop. When you start building an IoT system, you must pick a microcontroller that fits your desired
purpose. You might have to look at its datasheet to understand the properties and specifications.
Microcontrollers are the centre of the IoT system. They have properties such as Datapath Bandwidth.
Datapath Bandwidth specifies the number of bits in the registers. The more bits the more accurate the
results are.
Microcontrollers connect to all the components of the system and thus they must have
adequate input/output pins. Microcontrollers must have performance depending on what system you are
developing. IoT systems are real time applications which require timers. Digital to Analog converters
and Low-power modes.
Microcontrollers use a communication protocol to communicate with one another. The most common ones
used are UART, I2C, SPI etc. The protocols are helpful when you are building bigger systems that require
constant communication with other devices.
We mainly use microcontrollers for low power requirement, simple tasks.
The common and popular microcontrollers available are Arduino Uno, Particle Electron and Espressif
Systems ESP8266-01.
b. Single-Board Computer(SBC)
SBCs are single board computers that contain all the processing and computing properties of a computer
on a single board. SBCs have memory units to store code and data, input and output units and
microprocessors for computing. It also includes an in-built RAM. Cellphones, video game consoles,
appliances use SBCs.
They are a preferred choice in Iot industrial applications as they improve the functionality of a regular
computer, they are easily available and reduce the cost of transportation. SBCs deliver high performance
and are extremely reliable Iot hardware devices.
Based on the kind of project you are making, you choose a SBC that fits into all your needs for that specific
project. SBCs are ready made and available in the market at cheap prices as compared to desktops and
computers.
The types of SBCs commonly available in the market are Raspberry Pis, Beagleboard and Qualcomm
DragonBoard 410c.
IoT Data Communication Protocols
Below you'll find a brief breakdown of the some of the different IoT data protocols, namely:
Message Queue Telemetry Transport (MQTT)
HyperText Transfer Protocol (HTTP)
Constrained Application Protocol (CoAP)
sensors/temperature/assemblyLineInit
Afterward, the MQTT clients, which can be of several types and quantities, will subscribe to the same topic
in order to read the temperature data. An example of an MQTT architecture can be seen in Figure 1.
Figure 1. MQTT's publish/subscribe architecture. Image used courtesy of MQTT
In addition, MQTT defines three levels of quality of service, depending upon the reliability, from lowest to
highest:
Level 0: there is no guarantee of the message delivery.
Level 1: the delivery is guaranteed, but it is possible to receive duplicate messages.
Level 2: the delivery is guaranteed and there will be no duplicates.
This protocol has been the origin of data communication for the World Wide Web (WWW), so logically it is
being used in the IoT world. However, it is not optimized for it because of the following:
The HTTP is made for two systems communicating to each other at a time, not more, so it is time
and energy-consuming to connect several sensors to get information.
The HTTP is unidirectional, made for one system (client) to be sending one message to another one
(server). This makes it quite hard to escalate an IoT solution.
Power consumption: HTTP relies on Transmission Control Protocol (TCP), which requires a lot of
computing resources, so it is not suitable for battery-powered applications.
Similar to MQTT, DDS follows a publish-subscribe methodology, with the main difference being that there
are no brokers. It means that all publishers (i.e., temperature sensors) and subscribers (i.e., mobile
phones) are all connected to the same network. This network is known as Global Data Space (GDS) and it
interconnects each node with all the other ones to avoid bottlenecks. An example of the DDS GDS can be
seen in Figure 2.
Figure 2. A DDS Global Data Space. Image used courtesy of the DDS Foundation
Furthermore, any node can leave or join the network, since they are dynamically discovered.
WebSocket
Linked to the HTTP protocol, the WebSocket technology establishes a TCP connection between a browser
and a server, and then both of them exchange information until the connection is closed. Figure 3 shows a
high-level comparison between HTTP and WebSocket.
Although this protocol can be seen as an improvement of the HTTP connection, the WebSocket is still very
overloaded and heavy for IoT applications.
It is based on Extensible Markup Language (XML) and in the past, it was known as Jabber. It is an open-
source, decentralized, secure protocol to exchange XML messages.
A characteristic factor of XMPP is its addressing method and how nodes are identified. It uses a Jabber ID
with the format [email protected], which allows two nodes to interchange information regardless of
the distance between them.
Synchronous Communication
The pattern of communication known as “synchronous communication” occurs when services
exchange requests and answers, typically waiting for a response before proceeding. This means
that when a microservice sends a request to another microservice, it will stop and wait for a
response before continuing with its function.
Example of Synchronous Communication:
HTTP Request-Response: One microservice can submit an HTTP request to another
microservice and wait for a response by using HTTP protocols such as REST or SOAP.
RPC (Remote Procedure Call): Services can use RPC frameworks like gRPC to make remote
procedure calls and wait for the response before continuing.
Synchronous Messaging: Some message brokers support synchronous messaging patterns,
where a service sends a message and waits for a response from another service.
Asynchronous Communication
Asynchronous communication refers to a communication pattern where services
exchange messages or data without waiting for an immediate response. This allows
services to operate independently and asynchronously, enabling decoupling and
scalability in distributed systems.
Differences between Synchronous and Asynchronous Communication
Waiting for Services wait for responses before Services do not wait for responses and
Response proceeding continue immediately
Can be less scalable, as services may More scalable, as services can handle
Scalability block while waiting multiple requests concurrently
Suitable for real-time interactions and Suitable for decoupling services and
Use Cases request-response patterns handling high loads
MQTT
MQTT (Message Queuing Telemetry Transport) is an OASIS standard messaging protocol for the
Internet of Things (IoT). It is designed with an extremely lightweight publish/subscribe messaging model,
making it ideal for connecting IoT devices with a small code footprint and minimal network bandwidth and
exchanging data in real-time between connected devices and cloud services.
MQTT can not only be used as a gateway to access communication on the device side, but also as a
Device-Cloud Communication Protocol. Most gateway protocols such as ZigBee and LoRa can be
converted into MQTT Protocol to connect to the Cloud.
Lightweight and Reliable: MQTT messages are compact, enabling stable transmission on
severely constrained hardware devices and networks with low bandwidth and high latency.
Publish/Subscribe Model: Based on the publish/subscribe model, its advantage lies in decoupling
publishers and subscribers - they don't need to establish a direct connection or be online
simultaneously.
Designed for IoT: Provides comprehensive IoT application features such as keep alive
mechanism, will message, QoS, topic, and security management.
More Complete Ecosystem: It covers client and SDK platforms in all languages, and has mature
Broker server software, supporting a vast number of topics, millions of device connections, and rich
enterprise integration capabilities.
MQTT is a messaging protocol that uses a publish-subscribe model, which is different from the traditional
client-server model. It separates the message sender (publisher) from the receiver (subscriber), making it
an efficient way to send and receive messages in a distributed network. Multiple publishers can send
messages to a subscriber, and multiple subscribers can receive messages from a publisher simultaneously.
MQTT today is widely used in the IoT, Industrial IoT (IIoT), Internet of Vehicles (IoV), and Connected Cars,
as well as in a wide variety of industries such as automotive, manufacturing, telecommunications,
transportation & logistics, and oil & gas, etc.
MQTT is the standard communication protocol of the IoT platform of top Cloud providers such as AWS IoT
Core, Azure IoT Hub, and Alibaba Cloud IoT platform. It is also the preferred protocol for gateways and
Cloud in various industries.
Learn more about MQTT protocol: MQTT Guide 2024.
6. CoAP
CoAP is an HTTP-like Protocol in the IoT world, used on resource-constrained IoT devices. Its detailed
specification is defined in RFC 7252.
IoT devices have limited resources like CPU, RAM, Flash, and network bandwidth. Direct data exchange
using TCP and HTTP is unrealistic. CoAP protocol emerged to solve this problem and enable these devices
to connect to the network smoothly.
CoAP incorporates HTTP design ideas and develops practical functions specific to resource-limited
devices.
Based on the message model.
Its transport layer is based on UDP Protocol and supports restricted devices.
Uses request/response model similar to HTTP and binary format which is more compact than the
text format of HTTP.
Supports two-way communication.
Lightweight and low power consumption.
Supports reliable transmission, data re-transmission, and block transmission to ensure reliable
arrival of data.
Supports IP multicast.
Supports observation mode.
Supports asynchronous communication.
Compared with MQTT, CoAP is lighter with lower overhead, and it is more suitable for certain device and
network environments.
Introduction of ZigBee
ZigBee is a Personal Area Network task group with low rate task group 4. It is a technology of home
networking. ZigBee is a technological standard created for controlling and sensing the network. As we know
that ZigBee is the Personal Area Network of task group 4 so it is based on IEEE 802.15.4 and is created by
Zigbee Alliance.
ZigBee is an open, global, packet-based protocol designed to provide an easy-to-use architecture for
secure, reliable, low power wireless networks. Flow or process control equipment can be place anywhere
and still communicate with the rest of the system. It can also be moved, since the network doesn’t care
about the physical location of a sensor, pump or valve.
IEEE802.15.4 developed the PHY and MAC layer whereas, the ZigBee takes care of upper higher layers.
ZigBee is a standard that addresses the need for very low-cost implementation of Low power devices with
Low data rates for short-range wireless communications.
IEEE 802.15.4 supports star and peer-to-peer topologies. The ZigBee specification supports star and two
kinds of peer-to-peer topologies, mesh and cluster tree. ZigBee-compliant devices are sometimes specified
as supporting point-to-point and point-to-multipoint topologies
Types of ZigBee Devices:
Zigbee Coordinator Device: It communicates with routers. This device is used for connecting the
devices.
Zigbee Router: It is used for passing the data between devices.
Zigbee End Device: It is the device that is going to be controlled.
General Characteristics of Zigbee
Standard:
Low Power Consumption
Low Data Rate (20- 250
kbps)
Short-Range (75-100 meters)
Network Join Time (~ 30
msec)
Support Small and Large
Networks (up to 65000
devices (Theory); 240
devices (Practically))
Low Cost of Products and Cheap Implementation (Open Source Protocol)
Extremely low-duty cycle.
3 frequency bands with 27 channels.
Features of Zigbee:
1. Stochastic addressing: A device is assigned a random address and announced. Mechanism for
address conflict resolution. Parents node don’t need to maintain assigned address table.
2. Link Management: Each node maintains quality of links to neighbors. Link quality is used as link cost in
routing.
3. Frequency Agility: Nodes experience interference report to channel manager, which then selects
another channel
4. Asymmetric Link: Each node has different transmit power and sensitivity. Paths may be asymmetric.
5. Power Management: Routers and Coordinators use main power. End Devices use batteries.
Advantages of Zigbee:
1. Designed for low power consumption.
2. Provides network security and application support services operating on the top of IEEE.
3. Zigbee makes possible completely networks homes where all devices are able to communicate and
be
4. Use in smart home
5. Easy implementation
6. Adequate security features.
7. Low cost: Zigbee chips and modules are relatively inexpensive, which makes it a cost-effective
solution for IoT applications.
8. Mesh networking: Zigbee uses a mesh network topology, which allows for devices to communicate
with each other without the need for a central hub or router. This makes it ideal for use in smart
home applications where devices need to communicate with each other and with a central control
hub.
9. Reliability: Zigbee protocol is designed to be highly reliable, with robust mechanisms in place to
ensure that data is delivered reliably even in adverse conditions.
Disadvantages of Zigbee :
1. Limited range: Zigbee has a relatively short range compared to other wireless communications
protocols, which can make it less suitable for certain types of applications or for use in large
buildings.
2. Limited data rate: Zigbee is designed for low-data-rate applications, which can make it less
suitable for applications that require high-speed data transfer.
3. Interoperability: Zigbee is not as widely adopted as other IoT protocols, which can make it difficult
to find devices that are compatible with each other.
4. Security: Zigbee’s security features are not as robust as other IoT protocols, making it more
vulnerable to hacking and other security threats.
Architecture of Zigbee:
Zigbee architecture is a combination of 6 layers.
1. Application Layer
2. Application Interface Layer
3. Security Layer
4. Network Layer
5. Medium Access Control Layer
6. Physical Layer
Physical layer: The lowest two layers i.e the physical and the MAC (Medium Access Control) Layer
are defined by the IEEE 802.15.4 specifications. The Physical layer is closest to the hardware and
directly controls and communicates with the Zigbee radio. The physical layer translates the data
packets in the over-the-air bits for transmission and vice-versa during the reception.
Medium Access Control layer (MAC layer): The layer is responsible for the interface between the
physical and network layer. The MAC layer is also responsible for providing PAN ID and also
network discovery through beacon requests.
Network layer: This layer acts as an interface between the MAC layer and the application layer. It is
responsible for mesh networking.
Application layer: The application layer in the Zigbee stack is the highest protocol layer and it
consists of the application support sub-layer and Zigbee device object. It contains manufacturer-
defined applications.
Zigbee Applications:
1. Home Automation
2. Medical Data Collection
3. Industrial Control Systems
4. meter reading system
5. light control system
6. Commercial
7. Government Markets Worldwide
Features of TCP
TCP keeps track of the segments being transmitted or received by assigning numbers to every
single one of them.
Flow control limits the rate at which a sender transfers data. This is done to ensure reliable delivery.
TCP implements an error control mechanism for reliable data transfer.
TCP takes into account the level of congestion in the network.
Applications of TCP
World Wide Web (WWW) : When you browse websites, TCP ensures reliable data transfer
between your browser and web servers.
Email : TCP is used for sending and receiving emails. Protocols like SMTP (Simple Mail Transfer
Protocol) handle email delivery across servers.
File Transfer Protocol (FTP) : FTP relies on TCP to transfer large files securely. Whether you’re
uploading or downloading files, TCP ensures data integrity.
Secure Shell (SSH) : SSH sessions, commonly used for remote administration, rely on TCP for
encrypted communication between client and server.
Streaming Media : Services like Netflix, YouTube, and Spotify use TCP to stream videos and
music. It ensures smooth playback by managing data segments and retransmissions.
Advantages of TCP
It is reliable for maintaining a connection between Sender and Receiver.
It is responsible for sending data in a particular sequence.
Its operations are not dependent on Operating System .
It allows and supports many routing protocols.
It can reduce the speed of data based on the speed of the receiver.
Disadvantages of TCP
It is slower than UDP and it takes more bandwidth.
Slower upon starting of transfer of a file.
Not suitable for LAN and PAN Networks.
It does not have a multicast or broadcast category.
It does not load the whole page if a single data of the page is missing.
What is User Datagram Protocol (UDP)?
User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of the Internet Protocol suite,
referred to as the UDP/IP suite. Unlike TCP, it is an unreliable and connectionless protocol. So, there is no
need to establish a connection before data transfer. The UDP helps to establish low-latency and loss-
tolerating connections establish over the network. The UDP enables process-to-process communication.
Features of UDP
Used for simple request-response communication when the size of data is less and hence there is
lesser concern about flow and error control.
It is a suitable protocol for multicasting as UDP supports packet switching .
UDP is used for some routing update protocols like RIP(Routing Information Protocol) .
Normally used for real-time applications which can not tolerate uneven delays between sections of a
received message.
Application of UDP
Real-Time Multimedia Streaming : UDP is ideal for streaming audio and video content. Its low-
latency nature ensures smooth playback, even if occasional data loss occurs.
Online Gaming : Many online games rely on UDP for fast communication between players.
DNS (Domain Name System) Queries : When your device looks up domain names (like converting
“www.example.com” to an IP address), UDP handles these requests efficiently .
Network Monitoring : Tools that monitor network performance often use UDP for lightweight, rapid
data exchange.
Multicasting : UDP supports packet switching, making it suitable for multicasting scenarios where
data needs to be sent to multiple recipients simultaneously.
Routing Update Protocols : Some routing protocols, like RIP (Routing Information Protocol), utilize
UDP for exchanging routing information among routers.
Advantages of UDP
It does not require any connection for sending or receiving data.
Broadcast and Multicast are available in UDP.
UDP can operate on a large range of networks.
UDP has live and real-time data.
UDP can deliver data if all the components of the data are not complete.
Disadvantages of UDP
We can not have any way to acknowledge the successful transfer of data.
UDP cannot have the mechanism to track the sequence of data.
UDP is connectionless, and due to this, it is unreliable to transfer data.
In case of a Collision, UDP packets are dropped by Routers in comparison to TCP.
UDP can drop packets in case of detection of errors.
Which Protocol is Better: TCP or UDP?
The answer to this question is difficult because it totally depends on what work we are doing and what type
of data is being delivered. UDP is better in the case of online gaming as it allows us to work lag-free. TCP is
better if we are transferring data like photos, videos, etc. because it ensures that data must be correct has
to be sent. In general, both TCP and UDP are useful in the context of the work assigned by us. Both have
advantages upon the works we are performing, that’s why it is difficult to say, which one is better.
Difference Between TCP and UDP
Where TCP is Used?
Sending Emails
Transferring Files
Web Browsing
Where UDP is Used?
Gaming
Video Streaming
Online Video Chats
Differences between TCP and UDP
TCP has a (20-60) bytes variable length UDP has an 8 bytes fixed-length
Header Length
header. header.
Handshaking Uses handshakes such as SYN, ACK, SYN- It’s a connectionless protocol i.e.
Techniques ACK No handshake
Example: Suppose there are two houses, H1 and H2, and a letter has to be sent from H1 to H2. But there
is a river in between those two houses. Now how can we send the letter?
Solution 1: Make a bridge over the river and then it can be delivered.
Solution 2: Get it delivered by a pigeon.
Consider the first solution as TCP . A connection has to be made (bridge) to get the data (letter)
delivered. The data is reliable because it will directly reach another end without loss of data or error.
The second solution is UDP . No connection is required for sending the data. The process is fast as
compared to TCP, where we need to set up a connection(bridge). But the data is not reliable: we
don’t know whether the pigeon will go in the right direction, will drop the letter on the way, or some
issue is encountered mid-travel.
What is Bluetooth?
Bluetooth is used for short-range wireless voice and data communication. It is a Wireless Personal Area
Network (WPAN) technology and is used for data communications over smaller distances. This generation
changed into being invented via Ericson in 1994. It operates within the unlicensed, business, scientific, and
clinical (ISM) bands from 2.4 GHz to 2.485 GHz.
Bluetooth stages up to 10 meters. Depending upon the version, it presents information up to at least 1
Mbps or 3 Mbps. The spreading method that it uses is FHSS (Frequency-hopping unfold spectrum). A
Bluetooth network is called a piconet and a group of interconnected piconets is called a scatter net.
Bluetooth
Bluetooth is a wireless technology that lets devices like phones, tablets, and headphones connect to each
other and share information without needing cables. Bluetooth simply follows the principle of transmitting
and receiving data using radio waves. It can be paired with the other device which has also Bluetooth but it
should be within the estimated communication range to connect. When two devices start to share data,
they form a network called piconet which can further accommodate more than five devices.
Key Features of Bluetooth
The transmission capacity of Bluetooth is 720 kbps.
Bluetooth is a wireless technology.
Bluetooth is a Low-cost and short-distance radio communications standard.
Bluetooth is robust and flexible.
The basic architecture unit of Bluetooth is a piconet.
Architecture of Bluetooth
Scatternet
It is formed by using various piconets. A slave that is present in one piconet can act as master or we can
say primary in another piconet. This kind of node can receive a message from a master in one piconet and
deliver the message to its slave in the other piconet where it is acting as a master. This type of node is
referred to as a bridge node. A station cannot be mastered in two piconets.
Raspberry Pi
Raspberry Pi is a small single-board computer (SBC). It is a credit card-sized computer that can be plugged
into a monitor. It acts as a minicomputer by connecting the keyboard, mouse, and display. Raspberry Pi has
an ARM processor and 512MB of RAM. The architecture of Raspberry Pi is discussed in this article.
The following diagram shows the architecture of Raspberry Pi:
Control unit of the Arduino is from the The control unit of Raspberry Pi is from the
2.
At mega family. ARM family.
Arduino boards have a simple hardware While Raspberry Pi boards have a complex
5.
and software structure. architecture of hardware and software.
7. It uses very little RAM, 2 kB. While Raspberry Pi requires more RAM, 1 GB.
11. It consumes about 200 MW of power. While it consumes about 700 MW of power.
13. It does not have internet support. It has inbuilt Ethernet port and WiFi support.
14. It has higher current drive strength. It has lower current drive strength.
Some of the applications of Arduino are Some of the applications of Raspberry Pi are
15. traffic light countdown timer , Weighing Stop motion cameras , Robot Controllers ,
machines , etc. Game Servers.
S
No. Arduino Raspberry Pi
17. Two tiny cores Arduino with 32 MHz Single core and 700 MHz