Iot Notes
Iot Notes
ON
INTERNET OF THINGS
CONTENTS
Internet of Things
UNIT-1
Introduction to Internet of Things
Internet of things (IoT)
The Internet of things (IoT) is the inter-networking of physical devices, vehicles (also
referred to as “connected devices” and “smart devices”), buildings, and other items embedded
with electronics, software, sensors, actuators, and network connectivity which enable these
objects to collect and exchange data.
Characteristics:
Things-related services: The IoT is capable of providing thing-related services within the
constraints of things, such as privacy protection and semantic consistency between physical
things and their associated virtual things
Connectivity: Things in I.O.T. should be connected to the infrastructure, without connection
nothing makes sense.
Intelligence: Extraction of knowledge from the generated data is important, sensor generate
data and this data and this data should be interpreted properly.
Scalability: The no. of things getting connected to the I.O.T. infrastructure is increased day
by day. Hence, an IOT setup shall be able to handle the massive expansion.
Unique Identity: Each IOT device has an I.P. address. This identity is helpful in tracking the
equipment and at times to query its status.
Dynamic and Self-Adapting: The IOT device must dynamically adopt itself to the
changing context. Assume a camera meant for surveillance, it may have to work in different
conditions and at different light situations (morning, afternoon, night).
Heterogeneity: The devices in the IoT are heterogeneous as based on different hardware
platforms and networks. They can interact with other devices different networks.
Safety: Having got all the things connected with the Internet possess a major threat, as our
personal data is also there and it can be tampered with, if proper safety measures are not
taken.
Application areas of IoT:
Smart Home: The smart home is one of the most popular applications of IoT. The cost of
owning a house is the biggest expense in a homeowner‟s life. Smart homes are promised to
save the time, money and energy.
Smart cities: The smart city is another powerful application of IoT. It includes smart
surveillance, environment monitoring, automated transformation, urban security, smart traffic
management, water distribution, smart healthcare etc.
Wearables: Wearables are devices that have sensors and software installed which can collect
data about the user which can be later used to get the insights about the user. They must be
energy efficient and small sized.
1
Connected cars: A connected car is able to optimize its own operation, maintenance as well
as passenger‟s comfort using sensors and internet connectivity.
Smart retail: Retailers can enhance the in-store experience of the customers using IoT. The
shopkeeper can also know which items are frequently bought together using IoT devices.
Smart healthcare: People can wear the IoT devices which will collect data about user's
health. This will help users to analyze themselves and follow tailor-made techniques to
combat illness. The doctor also doesn't have to visit the patients in order to treat them.
IoT Categories
IOT can be classified into two categories:
1. Consumer IoT(CIOT): The Consumer IoT refers to the billions of physical personal
devices, such as smartphones, wearables, fashion items and the growing number of smart
home appliances, that are now connected to the internet, collecting and sharing data.
A Consumer IoT network typically entails few consumer devices, each of which has a
limited lifetime of several years.
The common connectivity used in this kind of solutions are Bluetooth, WiFi, and ZigBee.
These technologies offer short-range communication, suitable for applications deployed in
limited spaces such as houses, or small offices.
2. industrial internet of things (IIoT): It refers to interconnected sensors, instruments, and
other devices networked together with computers' industrial applications, including
manufacturing and energy management. This connectivity allows for data collection,
exchange, and analysis, potentially facilitating improvements in productivity and efficiency
as well as another economic ben.
BASELINE TECHNOLOGIES
There are various baseline technologies that are very closely related to IOT, They include:
Machine-to-Machine (M2M), Cyber-Physical Systems (CPS), Web Of Things (WOT)
a) Machine-to-Machine (M2M):
Machine-to-Machine (M2M) refers to networking of machines (or devices) for the
purpose of remote monitoring and control and data exchange.
An M2M area network comprises of machines (or M2M nodes) which have
embedded network modules for sensing, actuation and communicating various
communication protocols can be used for M2M LAN such as ZigBee, Bluetooth, M-
bus, Wireless M-Bus etc., These protocols provide connectivity between M2M nodes
within an M2M area network.
The communication network provides connectivity to remote M2M area networks.
The communication network provides connectivity to remote M2M area network.
The communication network can use either wired or wireless network (IP based).
While the M2M are networks use either proprietary or non-IP based communication
protocols, the communication network uses IP-based network. Since non-IP based
2
protocols are used within M2M area network, the M2M nodes within one network
cannot communicate with nodes in an external network.
To enable the communication between remote M2M are network, M2M gateways
are used
b) Cyber-Physical systems:
Cyber-Physical Systems (CPS) are integrations of computation, networking, and physical
processes. Embedded computers and networks monitor and control the physical processes,
with feedback loops where physical processes affect computations and vice versa.
In cyber-physical systems, physical and software components are deeply intertwined, able to
operate on different spatial and temporal scales, exhibit multiple and distinct behavioural
modalities, and interact with each other in ways that change with context.
c) Web of Things: web of things is a term used to describe approaches, software architectural
style of programming patterns that allow real world objects to be part of WWW. The major
portion of the WoT specification is the Thing Description. Thing is an abstract representation
of a physical or virtual entity. A Thing Description includes the metadata and interfaces of a
Thing in a standardized way, with the aim to make the Thing able to communicate with other
Things in a heterogeneous world.
SENSOR
Sensor is a device used for the conversion of physical events or characteristics into the
electrical signals. This is a hardware device that takes the input from environment and gives
to the system by converting it.
For example, a thermometer takes the temperature as physical characteristic and then
converts it into electrical signals for the system.
Characteristics of Sensors
1. Range: It is the minimum and maximum value of physical variable that the sensor can
sense or measure. For example, a Resistance Temperature Detector (RTD) for the
measurement of temperature has a range of -200 to 800oC.
2. Span: It is the difference between the maximum and minimum values of input. In above
example, the span of RTD is 800 – (-200) = 1000oC.
3. Accuracy: The error in measurement is specified in terms of accuracy. It is defined as the
difference between measured value and true value. It is defined in terms of % of full scale or
% of reading.
4. Precision: It is defined as the closeness among a set of values. It is different from
accuracy.
3
5. Linearity: Linearity is the maximum deviation between the measured values of a sensor
from ideal curve.
6. Hysteresis: It is the difference in output when input is varied in two ways- increasing and
decreasing.
7. Resolution: It is the minimum change in input that can be sensed by the sensor.
8. Reproducibility: It is defined as the ability of sensor to produce the same output when
same input is applied.
9. Repeatability: It is defined as the ability of sensor to produce the same output every time
when the same input is applied and all the physical and measurement conditions kept the
same including the operator, instrument, ambient conditions etc.
10. Response Time: It is generally expressed as the time at which the output reaches a
certain percentage (for instance, 95%) of its final value, in response to a step change of the
input.
Classification of sensors:
Sensors based on the power requirement sensor is classified into two types: Active Sensors,
Passive Sensors.
Active Sensors: Does not need any external energy source but directly generates an electric
signal in response to the external.
Example: Thermocouple, Photodiode, Piezoelectric sensor.
Passive Sensors: The sensors require external power called excitation signal. Sensors modify
the excitation signal to provide output.
Example: Strain gauge.
Sensors based on output sensor is classified into two types: Analog Sensors, Digital Sensors.
Analog Sensors
Analog Sensors produces a continuous output signal or voltage which is generally
proportional to the quantity being measured.
Physical quantities such as Temperature, speed, Pressure, Displacement, Strain etc.
are all analog quantities as they tend to be continuous in nature.
For example, the temperature of a liquid can be measured using a thermometer or
thermocouple (e.g. in geysers) which continuously responds to temperature changes
as the liquid is heated up or cooled down.
Digital Sensors
Digital Sensors produce discrete output voltages that are a digital representation of the
quantity being measured.
Digital sensors produce a binary output signal in the form of a logic "1" or a logic "0"
, ("ON" or "OFF).
4
Digital signal only produces discrete (non-continuous) values, which may be output as
a signal "bit" (serial transmission), or by combing the bits to produce a signal "byte"
output (parallel transmission).
Based on type of data measured sensor is classified into two types: Scalar Sensors and
Vector Sensors.
Scalar Sensors
Scalar Sensors produce output signal or voltage which generally proportional to the
magnitude of the quantity being measured.
Physical quantities such as temperature, color, pressure, strain, etc. are all scalar
quantities as only their magnitude is sufficient to convey an information.
For example, the temperature of a room can be measured using thermometer or
thermocouple, which responds to temperature changes irrespective of the orientation
of the sensor or its direction.
Vector Sensors
Vector Sensors produce output signal or voltage which generally proportional to the
magnitude, direction, as well as the orientation of the quantity being measured.
Physical quantities such as sound, image, velocity, acceleration, orientation, etc. are
all vector quantities, as only their magnitude is not sufficient to convey the complete
information.
For example, the acceleration of a body can be measured using an accelerometer,
which gives the components of acceleration of the body with respect to the x,y,z
coordinate axes.
ACTUATOR
Actuator is a device that converts the electrical signals into the physical events or
characteristics. It takes the input from the system and gives output to the environment. For
example, motors and heaters are some of the commonly used actuators.
Types of Actuators
1. Hydraulic Actuators: Hydraulic actuators operate by the use of a fluid-filled cylinder
with a piston suspended at the centre. Commonly, hydraulic actuators produce linear
movements, and a spring is attached to one end as a part of the return motion. These actuators
are widely seen in exercise equipment such as steppers or car transport carriers.
2. Pneumatic Actuators: Pneumatic actuators are one of the most reliable options for
machine motion. They use pressurized gases to create mechanical movement. Many
companies prefer pneumatic-powered actuators because they can make very precise motions,
especially when starting and stopping a machine. Examples of equipment that uses pneumatic
actuators include: Bus brakes, Exercise machines, Vane motors, Pressure sensors
3. Electric Actuators: Electrical actuators, as you may have guessed, require electricity to
work. Well-known examples include electric cars, manufacturing machinery, and robotics
5
equipment. Similar to pneumatic actuators, they also create precise motion as the flow of
electrical power is constant.
4. Thermal and Magnetic Actuators: Thermal and magnetic actuators usually consist of
shape memory alloys that can be heated to produce movement. The motion of thermal or
magnetic actuators often comes from the Joule effect, but it can also occur when a coil is
placed in a static magnetic field. The magnetic field causes constant motion called the
Laplace-Lorentz force. Most thermal and magnetic actuators can produce a wide and
powerful range of motion while remaining lightweight.
5. Mechanical Actuators: Some actuators are mostly mechanical, such as pulleys or rack and
pinion systems. Another mechanical force is applied, such as pulling or pushing, and the
actuator will leverage that single movement to produce the desired results. For instance,
turning a single gear on a set of rack and pinions can mobilize an object from point A to point
B. The tugging movement applied on the pulley can bring the other side upwards or towards
the desired location.
6. Soft Actuators: Soft actuators (e.g., polymer based) are designed to handle fragile objects
like fruit harvesting in agriculture or manipulating the internal organs in biomedicine.
They typically address challenging tasks in robotics. Soft actuators produce flexible motion
due to the integration of microscopic changes at the molecular level into a macroscopic
deformation of the actuator materials.
IOT COMPONENTS
Four fundamental components of IoT system, which tells us how IoT works.
i. Sensors/Devices
First, sensors or devices help in collecting very minute data from the surrounding
environment. All of this collected data can have various degrees of complexities ranging from
a simple temperature monitoring sensor or a complex full video feed.
A device can have multiple sensors that can bundle together to do more than just sense
things. For example, our phone is a device that has multiple sensors such as GPS,
accelerometer, camera but our phone does not simply sense things.
ii. Connectivity
Next, that collected data is sent to a cloud infrastructure but it needs a medium for transport.
The sensors can be connected to the cloud through various mediums of communication and
transports such as cellular networks, satellite networks, Wi-Fi, Bluetooth, wide-area networks
(WAN), low power wide area network and many more.
6
iii. Data Processing
Once the data is collected and it gets to the cloud, the software performs processing on the
acquired data.
This can range from something very simple, such as checking that the temperature reading on
devices such as AC or heaters is within an acceptable range. It can sometimes also be very
complex, such as identifying objects (such as intruders in your house) using computer vision
on video.
iv. User Interface
Next, the information made available to the end-user in some way. This can achieve by
triggering alarms on their phones or notifying through texts or emails.
Also, a user sometimes might also have an interface through which they can actively check in
on their IOT system. For example, a user has a camera installed in his house, he might want
to check the video recordings and all the feeds through a web server.
Service Oriented Architecture of IoT
SOA can also use to support IoT as a main contributing technology in devices or
heterogeneous systems.
7
1. Sensing Layer: IoT can be defined as a worldwide interconnected network, where things
or devises are controlled remotely. Interconnected things or devices are become easier, as
more and more things are furnished with sensors and RFID technologies.
2. Networking Layer: Networking Layer is responsible to connect all device or things
together so that they can able to share the information with each other over the Internet.
Moreover, network layer also collects data and information from the present IT infrastructure
for example ICT systems, power grids, business systems, healthcare systems, and
transportation systems.
3. Service Layer: This layer depends upon the technology used on the middleware layer
which is responsible for functionalities incorporate between applications and services in IoT.
This middleware technology also provides a cost-effective and efficient platform for IoT and
this platform including software and hardware components which can be reused when
needed.
8
4. Interface Layer: The core responsibility of the interface layer has also simplified the
interconnection and management of things. Interface specific profile can be defined as the
subset of services that support interaction with the application used in a network
Challenges for IoT
1. Security: Security is the most significant challenge for the IoT. Increasing the number of
connected devices increases the opportunity to exploit security vulnerabilities, as do poorly
designed devices, which can expose user data to theft by leaving data streams inadequately
protected and in some cases people‟s health and safety can be put at risk.
2. Privacy: The IoT creates unique challenges to privacy, many that go beyond the data
privacy issues that currently exist. Much of this stems from integrating devices into our
environments without us consciously using them. This is becoming more prevalent in
consumer devices, such as tracking devices for phones and cars as well as smart televisions.
3. Scalability: Billions of internet-enabled devices get connected in a huge network, large
volumes of data are needed to be processed. The system that stores, analyses the data from
these IoT devices needs to be scalable.
4. Interoperability: Technological standards in most areas are still fragmented. These
technologies need to be converged. Which would help us in establishing a common
framework and the standard for the IoT devices. As the standardization process is still
lacking, interoperability of IoT with legacy devices should be considered critical. This lack of
interoperability is preventing us to move towards the vision of truly connected everyday
interoperable smart objects.
5. Bandwidth: Connectivity is a bigger challenge to the IoT than you might expect. As the
size of the IoT market grows exponentially, some experts are concerned that bandwidth-
intensive IoT applications such as video streaming will soon struggle for space on the IoT‟s
current server-client model.
6. Standards: Lack of standards and documented best practices have a greater impact than
just limiting the potential of IoT devices. Without standards to guide manufacturers,
developers sometimes design products that operate in disruptive ways on the Internet without
much regard to their impact. If poorly designed and configured, such devices can have
negative consequences for the networking resources they connect to and the broader Internet.
7. Regulation: The lack of strong IoT regulations is a big part of why the IoT remains a
severe security risk, and the problem is likely to get worse as the potential attack surface
expands to include ever more crucial devices. When medical devices, cars and children‟s toys
are all connected to the Internet, it‟s not hard to imagine many potential disaster scenarios
unfolding in the absence of sufficient regulation
9
UNIT-2
IOT Networking
Connectivity Terminologies
IoT Node: These are machines, things or computers Connected to other nodes inside a LAN
via the IoT LAN, May be sometimes connected to the internet through a WAN directly
IoT LAN: It is Local, Short range Comm, May or may not connect to Internet, Building or
Organization wide
IoT WAN: Connection of various network segments, Organizationally and geographically
wide, Connects to the internet
IoT Gateway: A router connecting the IoT LAN to a WAN to the Internet, can implement
several LAN and WAN, Forwards packets between LAN and WAN on the IP layer
IoT Proxy: Performs active application layer functions between IoT nodes and other entities
Gateway Prefix Allotment:
One of the strategies of address conservation in IoT is to use local addresses which
exist uniquely within the domain of the gateway. These are represented by the circles
in this slide.
The network connected to the internet has routers with their set of addresses and
ranges.
These routers have multiple gateways connected to them which can forward packets
from the nodes, to the Internet, only via these routers. These routers assign prefixes to
gateways under them, so that the gateways can be identified with them.
Impact of Mobility on Addressing
The network prefix changes from 1 to 2 due to movement, making the IoT LAN safe
from changes due to movements.
IoT gateway WAN address changes without change in LAN address. This is achieved
using ULA.
The gateways assigned with prefixes, which are attached to a remote anchor point by
using various protocols such as Mobile IPv6, and are immune to changes of network
prefixes.
This is achieved using LU. The address of the nodes within the gateways remains
unchanged as the gateways provide them with locally unique address and the change
in gateway‟s network prefix doesn‟t affect them.
Sometimes, there is a need for the nodes to communicate directly to the internet. This
is achieved by tunnelling, where the nodes communicate to a remote anchor point
instead of channelling their packets through the router which is achieved by using
tunnelling protocols such as IKEv2:internet key exchange version 2
10
Multihoming
Multihoming is the practice of connecting a host or a computer network to more than one
network. This can be done in order to increase reliability or performance or to reduce cost.
There are several different ways to perform multihoming.
Host multihoming
A single host may be connected to multiple networks. For example, a mobile phone might be
simultaneously connected to a WiFi network and a 3G network, and a desktop computer
might be connected to both a home network and a VPN. A multihomed host usually is
assigned multiple addresses, one per connected network.
Classical multihoming
In classical multihoming a network is connected to multiple providers, and uses its own range
of addresses (typically from a Provider Independent (PI) range). The network's edge routers
communicate with the providers using a dynamic routing protocol, typically BGP, which
announces the network's address range to all providers. If one of the links fails, the dynamic
routing protocol recognizes the failure within seconds or minutes, and reconfigures its routing
tables to use the remaining links, transparently to the hosts.
Multihoming with multiple addresses
In this approach, the network is connected to multiple providers, and assigned multiple
address ranges, one for each provider. Hosts are assigned multiple addresses, one for each
provider.
11
Features IoT Stack Web Stack
It is used in non-constrained
Function or It is used in constrained network having low power, network having no limits on
application low bandwidth and low memory requirements. power/BW/memory.
Size of data to
be transported tens of bytes hundreds or thousands of bytes
It uses UDP which is faster due to smaller header size It uses TCP which is connection
compare to TCP. It is lighter protocol compare to oriented and slower compare to
Transport layer TCP. UDP.
It uses DTLS (Datagram Transport Layer Security) It uses TLS/SSL protocols for the
Security layer protocol for security. same.
Version:
This field indicates the version number of the IP packet so that the revised version can be
distinguished from the previous version. The current IP version is 4.
Internet Header Length (IIHL):
It specifies the length of the IP header in unit 32 bits. In case of no option present in the IP
header, IHL will have a value of 5. So, if the value of IHL is more than 5 then the length of
the option field can be easily calculated.
Type of Service: This field specifies the priority of the packets based on delay, throughput,
reliability and cost requirements. Three bits are assigned for priority level and four bits for
specific requirements (delay, throughput, reliability and cost).
Total Length:
This field specifies the number of bytes of the IP packet including header and data. As 16 bits
are assigned to this field, the maximum length of the packet is 65635 bytes.
Identification:
The identification field is used to identify which packet a particular fragment belongs to so
that fragments for different packets don‟t get mixed up.
Flags:
The flag field has three bits:
1. Unused bit
2. Don‟t fragment (DF) bit
3. More fragment (MF) bit
Fragment Offset:
The fragment offset field identifies the location of the fragment in a packet. The value
measures the offset in a unit of 8 bytes, between the beginning of the packet to be fragmented
and the beginning of the fragment.
Time to live (TTL):
This field is used to indicate the amount of time in seconds a packet is allowed to remain in
the network.
Protocol:
This field specifies the protocol that is to receive the IP data at the destination host.
Header Checksum:
This field verifies the integrity of the header of the IP packet. The integrity of the data part is
left to the upper layer protocols. The checksum is generated by the source and it is sent along
with the frame header to the next router.
Source IP address & Destination IP address:
These two fields contain the IP addresses of the source and destination hosts respectively.
Options:
Options fields are rarely used to include special features such as security level, the route to be
taken and time stamp at each router. It is used in RSVP.
Padding:
This field is used to make the header a multiple of 32-bit words.
IPv6
Internet Protocol version 6 (IPv6) is also known as Internet Protocol next
generation (IPng). It also accommodates more feature to meet the global requirement of
growing Internet.
To allocate a sufficient number of network address, IPv6 allows 128 bits of IP address
separated into 8 sections of 2 bytes each. Unlike IPv4 where the address is represented as
dotted-decimal notation, IPv6 uses hexadecimal numbers and colon (“:”) is used as a
delimiter between the sections.
Example: IPv6 address may be like this:
FA20:B120: 6230:0000:0000: CE12:0006: ABDF
Version: This field is 4 bits long and it defines the version of the IP packet. The value of it
for IPv6 is 6 and IPv4 its value is 4. During the transition period from IPv4 to IPv6, the
routers will be able to distinguish the two versions of the IP packets.
Traffic Class: This field is 20 bits long and it is used to distinguish between the different
requirements for real-time delivery services.
Flow Label: This field is 20 bits long and it is used to allow the source and destination nodes
to set up a pseudo connection with particular properties and requirements. It is designed to
provide special handling of a particular flow of data.
Payload Length: It is of 2 bytes length and signifies the number of bytes that follow the 40
bytes base header. It is the length of the IP datagram excluding the base header.
Next Header: This field is of 1 bye length and it defines one of the extension headers that
follow the base header. The extension headers also contain this field to indicate the next
header. if this is the last IP header then Next header field tells which of the transport
protocols (TCP or UDP) the packet is to be passed.
Hop Limit: This field contains 1 byte and it signifies the maximum number of hops a packet
can travel. The time to live field in the IPv4 header did the same task, except that in IPv4 it
was counted in time and in IPv6 it is counted in terms of the number of routers.
Source Address: It is 16 bytes long and contains the IP address of the source machine to the
network interface.
Destination Address: It is 16 bytes long and usually contains the IP address of the ultimate
destination machine to the network interface. In case of specific routing, it may contain the IP
address of the next router.
Extension Header: Some of the fields Ipv4 that are missing in IPv6 is necessary in some of
the cases. To handle this problem, IPv6 has introduced the concept of the extension header.
There are be one or more of the six possible extension headers. These headers appear directly
after the base header.
MQTT
It is a publish‐subscribe‐based lightweight messaging protocol for use in conjunction
with the TCP/IP protocol.
Adafruit launched a free MQTT cloud service for IoT experimenters called Adafruit
IO.
SMQTT
Secure MQTT is an extension of MQTT which uses encryption based on lightweight
attribute-based encryption.
The main advantage of using such encryption is the broadcast encryption feature, in
which one message is encrypted and delivered to multiple other nodes, which is quite
common in IoT applications.
In general, the algorithm consists of four main stages: setup, encryption, publish and
decryption.
CoAP
CoAP – Constrained Application Protocol.
Web transfer protocol for use with constrained nodes and networks.
Designed for Machine to Machine (M2M) applications such as smart energy and
building automation and Based on Request‐Response model between end‐points
Client‐Server interaction is asynchronous over a datagram-oriented transport protocol
such as UDP
The Constrained Application Protocol (CoAP) is a session layer protocol designed by
IETF Constrained RESTful Environment (CoRE) working group to provide
lightweight RESTful (HTTP) interface.
Representational State Transfer (REST) is the standard interface between HTTP client
and servers.
Lightweight applications such as those in IoT, could result in significant overhead and
power consumption by REST.
CoAP is designed to enable low‐power sensors to use RESTful services while
meeting their power constraints
Built over UDP, instead of TCP (which is commonly used with HTTP) and has a light
mechanism to provide reliability.
AMQP
Advanced Message Queuing Protocol.
Open standard for passing business messages between applications or organizations.
Connects between systems and business processes.
It is a binary application layer protocol.
Basic unit of data is a frame.
Components
Exchange:
Part of Broker.
Receives messages and routes them to Queues.
Queue:
Separate queues for separate business processes.
Consumers receive messages from queues.
Bindings:
Rules for distributing messages (who can access what message, destination of the
message)
AMQP Features
Targeted QoS (Selectively offering QoS to links).
Persistence (Message delivery guarantees).
Delivery of messages to multiple consumers.
Possibility of ensuring multiple consumption.
Possibility of preventing multiple consumption.
High speed protocol.
Applications
Monitoring and global update sharing.
Connecting different systems and processes to talk to each other.
Allowing servers to respond to immediate requests quickly and delegate time
consuming tasks for later processing.
ZigBee
Features of ZigBee
Most widely deployed enhancement of
IEEE 802.15.4.
The coordinator forms the root of the ZigBee network tree and might act as a
bridge between networks.
There is a single ZigBee Coordinator in each network, which originally
initiates the network.
It stores information about the network under it and outside it.
It acts as a Trust Centre & repository for security keys.
2. ZigBee Router (ZR): Capable of running applications, as well as relaying
information between nodes connected to it.
3. ZigBee End Device (ZED):
It contains just enough functionality to talk to the parent node, and it cannot
relay data from other devices.
This allows the node to be asleep a significant amount of the time thereby
enhancing battery life.
Applications
1. Inventory management 2. Asset tracking 3. Personnel tracking 4. Controlling
access to restricted areas 5. ID badging 6. Supply chain management 7. Counterfeit
prevention (e.g. in the pharmaceutical industry)
HART & Wireless HART
WirelessHART is the latest release of Highway Addressable Remote Transducer
(HART) Protocol.
HART standard was developed for networked smart field devices.
The wireless protocol makes the implementation of HART cheaper and easier.
HART encompasses the greatest number of field devices incorporated in any field
network.
Wireless HART enables device placements more accessible and cheaper– such as
the top of a reaction tank, inside a pipe, or at widely separated warehouses.
Main difference between wired and unwired versions is in the physical, data link
and network layers. Wired HART lacks a network layer.
HART Physic al Layer
Derived from IEEE 802.15.4 protocol.
It operates only in the 2.4 GHz ISM band.
Employs and exploits 15 channels of the band to increase reliability.
HART Data Link Layer
Collision free and deterministic communication achieved by means of super‐frames
and TDMA. Super‐frames consist of grouped 10ms wide timeslots.
Super‐frames control the timing of transmission to ensure collision free and reliable
communication.
This layer incorporates channel hopping and channel blacklisting to increase
reliability and security. Channel blacklisting identifies channels consistently affected
by interference and removes them from use.
HART Network & Transport Layers
Cooperatively handle various types of traffic, routing, session creation, and security.
Wireless HART relies on Mesh networking for its communication, and each device is
primed to forward packets from every other device. Each device is armed with an
updated network graph (i.e., updated topology) to handle routing.
NFC is designed for use by devices within close proximity to each other.
All NFC types are similar but communicate in slightly different ways.
NFC Types
Passive devices contain information which is readable by other devices, however it
cannot read information itself.
NFC Applications
Smartphone based payments.
Parcel tracking.
Information tags in posters and advertisements.
Computer game synchronized toys.
Low‐power home automation systems.
Bluetooth
Bluetooth wireless technology is a short-range communications technology.
Intended for replacing cables connecting portable units
Maintains high levels of security.
Bluetooth technology is based on Ad‐hoc technology also known as Ad‐hoc Piconets
Features
Bluetooth technology operates in the unlicensed industrial, scientific and medical
(ISM) band at 2.4 to 2.485 GHZ.
Uses spread spectrum hopping, full‐duplex signal at a nominal rate of 1600 hops/sec.
Bluetooth supports 1Mbps data rate for version 1.2 and 3Mbps data rate for Version
2.0 combined with Error Data Rate.
Bluetooth operating range depends on the device:
o Class 3 radios have a range of up to 1 meter or 3 feet
o Class 2 radios are most commonly found in mobile devices have a range of 10
meters or 30 feet
o Class 1 radios are used primarily in industrial use cases have a range of 100 meters
or 300 feet.
Connection Establishment
Inquiry: Inquiry run by one Bluetooth device to try to discover other devices near it.
Paging: Process of forming a connection between two Bluetooth devices.
Connection: A device either actively participates in the network or enters a low‐
power sleep mode
Piconets:
Bluetooth enabled electronic devices connect and communicate wirelessly through
short range networks known as Piconets.
Bluetooth devices exist in small ad‐hoc configurations with the ability to act either
as master or slave. Provisions are in place, which allow for a master and a slave
to switch their roles.
The simplest configuration is a point-to-point configuration with one master and
one slave.
Devices in adjacent Piconets provide a bridge to support inner‐Piconet
connections, allowing assemblies of linked Piconets to form a physically
extensible communication infrastructure known as Scatternet.
Applications
Audio players
Home automation
Smartphones
Toys
Hands free headphones
Sensor networks
Z Wave
Zwave is a protocol for communication among devices used for home automation.
It uses RF for signalling and control.
Operating frequency is 908.42 MHz in the US & 868.42 MHz in Europe.
Mesh network topology is the main mode of operation, and can support 232 nodes in
a network.
ISA 100.11A
ISA is acronym International Society of Automation.
Designed mainly for large scale industrial complexes and plants.
More than 1 billion devices use ISA 100.11A
ISA 100.11A is designed to support native and tunnelled application layers.
Various transport services, including „reliable,‟ „best effort,‟ „real‐time‟ are offered.
Network and transport layers are based on TCP or UDP / IPv6.
Data link layer supports mesh routing and Frequency hopping.
Physical and MAC layers are based on IEEE 802.15.4
Topologies allowed are:
• Star/tree
• Mesh
Permitted networks include:
• Radio link
• ISA over Ethernet
• Field buses
UNIT-4
Wireless Sensor Networks
Adjusts the duty cycles of sensor nodes using weak estimation learning
automata.
Applications of WSNs:
1. Mines
Fire Monitoring and Alarm System for Underground Coal Mines Bord‐and‐Pillar
Panel Using Wireless Sensor Networks.
WSN‐based simulation model for building a fire monitoring and alarm (FMA)
system for Bord & Pillar coal mine.
The fire monitoring system has been designed specifically for Bord & Pillar
based mines.
It is not only capable of providing real‐time monitoring and alarm in case of a
fire, but also capable of providing the exact fire location and spreading
direction by continuously gathering, analysing, and storing real time
information.
2. Healthcare
Wireless Body Area Networks
Wireless body area networks (WBANs) have recently gained popularity due to
their ability in providing innovative, cost‐effective, and user‐friendly solution
for continuous monitoring of vital physiological parameters of patients.
Monitoring chronic and serious diseases such as cardiovascular diseases and
diabetes.
Could be deployed in elderly persons for monitoring their daily activities.
3. Internet of Things (IOT)
4. Surveillance and Monitoring for security, threat detection
5. Environmental temperature, humidity, and air pressure
6. Noise Level of the surrounding
7. Landslide Detection
Wireless Multimedia Sensor Networks (WMSNs)
Incorporation of low-cost camera (typically CMOS) to wireless sensor nodes
Camera sensor (CS) nodes: capture multimedia (video, audio, and the scalar) data,
expensive and resource hungry, directional sensing range
Scalar sensor (SS) nodes: sense scalar data (temperature, light, vibration, and so on),
omni‐ directional sensing range, and low cost
WMSNs consist of a smaller number of CS nodes and large number of SS nodes
WMSNs Application
In security surveillance, wild‐habitat monitoring, environmental monitoring, SS nodes
cannot provide precise information
Registered devices create a database of objects from which managers, users and
services can easily access information.
Manages device profiles, such as location, device type, address, and description.
Provides authentication and authorization key management functionalities.
Monitors the status of devices and M2M area networks, and controls them based on
their status.
M2M User Platform
Manages M2M service user profiles and provides functionalities such as,
User registration
Modification
Charging
Inquiry.
Interoperates with the Device‐platform, and manages user access restrictions to
devices, object networks, or services.
Service providers and device managers have administrative privileges on their devices
or networks.
Administrators can manage the devices through device monitoring and control.
M2M Application Platform
Provides integrated services based on device collected data‐ sets.
Heterogeneous data merging from various devices used for creating new services.
Collects control processing log data for the management of the devices by working
with the Device‐platform.
Heterogeneity
Different wireless communication protocols such as ZigBee (IEEE 802.15.4),
Bluetooth (IEEE 802.15.1), GPRS, 6LowPAN, and Wi-Fi (IEEE 802.11)
Different wired communication protocols like Ethernet (IEEE 802.3) and
Higher Layer LAN Protocols (IEEE 802.1)
Different programming languages used in computing systems and websites
such as JavaScript, JAVA, C, C++, Visual Basic, PHP, and Python
Different hardware platforms such as Crossbow, NI, etc.
Different operating systems
As an example, for sensor node: TinyOS, SOS, Mantis OS, RETOS, and
mostly vendor specific OS.
As an example, for personal computer: Windows, Mac, Unix, and Ubuntu.
Different databases: DB2, MySQL, Oracle, PostgreSQL, SQLite, SQL Server,
and Sybase.
Different data representations.
Different control models.
Syntactic or semantic interpretations.
Types of Interoperability
User Interoperability: Interoperability problem between a user and a device
The following problems need to be solved
Device identification and categorization for discovery
Syntactic interoperability for device interaction.
Semantic interoperability for device interaction.
Device identification and categorization for discovery: There are different solutions for
generating unique address like Electronic Product Codes (EPC), Universal Product Code
(UPC), Uniform Resource Identifier (URI), IP Addresses (IPv6).
Syntactic Interoperability for Device Interaction:
The interoperability between devices and device user in term of message formats
The message format from a device to a user is understandable for the user‟s
computer.
On the other hand, the message format from the user to the device is executable by
the device.
Semantic Interoperability for Device Interaction:
The interoperability between devices and device user in term of message‟s
meaning.
The device can understand the meaning of user‟s instruction that is sent from the
user to the device.
Similarly, the user can understand the meaning of device‟s response sent from the
device.
Voltage Regulator
The function of the voltage regulator is to control the voltage given to the Arduino
board and stabilize theDC voltages used by the processor and other elements.
Crystal Oscillator
The crystal oscillator helps Arduino in dealing with time issues. How does Arduino
calculate time? The answer is, by using the crystal oscillator. The number printed on top
of the Arduino crystal is 16.000H9H. Ittells us that the frequency is 16,000,000 Hertz or
16 MHz.
Arduino Reset
You can reset your Arduino board, i.e., start your program from the beginning. You can
reset the UNO boardin two ways. First, by using the reset button (17) on the board.
Second, you can connect an external reset button to the Arduino pin labelled RESET (5).
Analog pins
The Arduino UNO board has six analog input pins A0 through A5. These pins can read
the signal from an analog sensor like the humidity sensor or temperature sensor and
convert it into a digital value that can beread by the microprocessor.
Main microcontroller
Each Arduino board has its own microcontroller (11). You can assume it as the brain of
your board. The main IC (integrated circuit) on the Arduino is slightly different from
board to board. The microcontrollers areusually of the ATMEL Company. You must
know what IC your board has before loading up a new programfrom the Arduino IDE.
This information is available on the top of the IC. For more details about the IC
construction and functions, you can refer to the data sheet.
ICSP pin
Mostly, ICSP (12) is an AVR, a tiny programming header for the Arduino consisting of
MOSI, MISO, SCK,RESET, VCC, and GND. It is often referred to as an SPI (Serial
Peripheral Interface), which could be
considered as an "expansion" of the output. Actually, you are slaving the output device to
the master of the SPI bus.
TX and RX LEDs
On your board, you will find two labels: TX (transmit) and RX (receive). They appear in
two places on the Arduino UNO board. First, at the digital pins 0 and 1, to indicate the
pins responsible for serial communication. Second, the TX and RX led (13). The TX led
flashes with different speed while sending the serial data. The speed of flashing depends
on the baud rate used by the board. RX flashes during the receiving process.
Digital I/O
The Arduino UNO board has 14 digital I/O pins (15) (of which 6 provide PWM (Pulse
Width Modulation) output. These pins can be configured to work as input digital pins to
read logic values (0 or 1) or as digital output pins to drive different modules like LEDs,
relays, etc. The pins labeled “~” can be used to generate PWM.
AREF
AREF stands for Analog Reference. It is sometimes, used to set an external reference
voltage (between 0 and 5 Volts) as the upper limit for the analog input pins.
Arduino IDE
After learning about the main parts of the Arduino UNO board, we are ready to learn
how to set up theArduino IDE. Once we learn this, we will be ready to upload our
program on the Arduino board.
In this section, we will learn in easy steps, how to set up the Arduino IDE on our
computer and preparethe board to receive the program via USB cable.
Step 1 − First you must have your Arduino board (you can choose your favorite
board) and a USB cable. In case you use Arduino UNO, Arduino Duemilanove,
Nano, Arduino Mega 2560, or Diecimila,you will need a standard USB cable (A
plug to B plug), the kind you would connect to a USB printeras shown in the
following image.
In case you use Arduino Nano, you will need an A to Mini-B cable
instead as shown in the following image.
You can get different versions of Arduino IDE from the Download page on the
Arduino Official website.You must select your software, which is compatible with
your operating system (Windows, IOS, or Linux). After your file download is
complete, unzip the file.
The Arduino Uno, Mega, Duemilanove and Arduino Nano automatically draw
power from either, the USB connection to the computer or an external power supply.
If you are using an Arduino Diecimila, you have to make sure that the board is
configured to draw power from the USB connection. The power source is selected
with a jumper, a small piece of plastic that fits onto two of the three pins between
the USB and power jacks. Check that it is on the two pins closest to the USB port.
Connect the Arduino board to your computer using the USB cable. The green power
LED (labeled PWR) should glow.
After your Arduino IDE software is downloaded, you need to unzip the
folder. Inside the folder, you can find the application icon with an infinity
label (application.exe). Double-click the icon to start the IDE.
Step 5 − Open your first project.
Here, we are selecting just one of the examples with the name Blink. It
turns the LED on and off with some time delay. You can select any other
example from the list.
To avoid any error while uploading your program to the board, you must
select the correct Arduino board name, which matches with the board
connected to your computer.
Go to Tools → Board and select your board.
Here, we have selected Arduino Uno board according to our tutorial, but
you must select the name matching the board that you are using.
Select the serial device of the Arduino board. Go to Tools → Serial Port
menu. This is likely to be COM3 or higher (COM1 and COM2 are usually
reserved for hardware serial ports). To find out, you can disconnect your
Arduino board and re-open the menu, the entry that disappears should be
of the Arduino board. Reconnect the board and select that serial port.
Before explaining how we can upload our program to the board, we must
demonstrate the function ofeach symbol appearing in the Arduino IDE
toolbar.
A − Used to check if there is any compilation error. B − Used to upload a program to the
Arduino board. C − Shortcut used to create a new sketch.
D − Used to directly open one of the example sketch.
E − Used to save your sketch.
F − Serial monitor used to receive serial data from the board and send the serial data to the
board.
Now, simply click the "Upload" button in the environment. Wait a few seconds; you will see
the RX and TX LEDs on the board, flashing. If the upload is successful, the message "Done
uploading" will appear in the status bar.
UNIT-7
Programming with Raspberry Pi
Introduction
Raspberry Pi is a low cost, credit-card sized computer that plugs into a computer
monitor TV and uses a standard keyboard and mouse.
It is a little device that enables people of all ages to explore computing.
Programs are written in languages like Scratch and Python.
It is capable of doing everything we expect from a desktop computer. We can browse
the Internet, play high-definition video, to make spreadsheets, word-processing and
playing games.
There are several generations of Raspberry Pi like Raspberry Pi 3 model B, Raspberry
Pi 2 model B, Raspberry Pi zero.
Architecture
GPIO pins in pins in Raspberry Pi are the general-purpose Input-Output pins. These pins are
to Communicate WITH OTHER circuit such as such as extension boards, custom circuits and
much more.
For getting an output, we can turn a GPIO pin HIGH or LOW.
These pins are a physical interface between the Pi and the outside world. At the
simplest level, we can think of them as switches that you can turn on or off (input) or that the
Pi can turn on or off (output). Seventeen of the 26 pins are GPIO pins. Others are power or
ground pins. Each pin can turn on or off, or go HIGH or LOW in computing terms. When the
pin is HIGH it outputs 3.3 volts (3v3) and when the pin is LOW, it is off.
We can program the pins to interact in amazing ways with the real world. Inputs don't
have to come from a physical switch. It could be input from a sensor or a signal from another
computer or device. The output can also do anything, from turning on an LED to sending
Signal or data to another device. If the Raspberry Pi is on a network, we can control devices
that are attached to it from anywhere and those devices can send data back. Connectivity and
control of physical devices over the Internet is a powerful and exciting thing and the
Raspberry Pi is ideal for this.
Case Studies
we will discuss about 2 example projects using Raspberry Pi. "The first one is is an LED and
the second one is taking a picture using PiCam. The codes for both the examples are written
in Python.
Blinking LED:
Following are the requirements for this experiment.
Raspberry pi
LED
100-ohm resistor
Bread board
Jumper cables
We need to install GPIO Library
Installing GPIO library:
Open terminal
Enter the command “sudo apt-get install python-dev” to install python development
Enter the command “sudo apt-get install python-rpi.gpio” to install GPIO library.
Connection:
Connect the negative terminal of the LED to the ground pin of Pi
Connect the positive terminal of the LED to the output pin of Pi
Capture Image using Raspberry Pi
Requirement:
Raspberry Pi
Raspberry Pi Camera
Raspberry Pi Camera:
Raspberry Pi specific camera module
Dedicated CSI slot in Pi for connection
The cable slot is placed between Ethernet port and HDMI port
Connection: Boot the Pi once the camera is connected to Pi
Configuring Pi for Camera
In the terminal run the command “sudo raspi-config” and press enter.
Navigate to “Interfacing Options” option and press enter.
Navigate to “Camera” option.
Enable the camera.
Reboot Raspberry pi.
Capture Image
Open terminal and enter the command-
raspistill -o image.jpg
This will store the image as „image.jpg‟
PiCam can also be processed using Python camera module python-picamera
sudo apt-get install python-picamera
Python Code:
Import picamera
camera = picamera.PiCamera() camera.capture('image.jpg')
Relay
This is a mechanical or electromechanical switch. There are 3 output terminals from left to
right.
NO (normal open):
Common
NC (normal close)
Connection
1. Sensor interface with Raspberry Pi
Result:
The fan is switched on whenever the temperature is above the threshold value set in the code.
UINT-8
SOFTWARE DEFINED NETWORKING
Limitations in Current Network
Vendor-specific architecture of switches limits dynamic configuration according to
application-specific requirements.
Switches are required to configure according to the installed operating system (OS).
Centralized control is not feasible in traditional network.
The exploding volumes of data traffic, complex network architecture, and growing
demands to improve network performance obsoletes the traditional approach to
network management.
Software-Defined Networking (SDN)
Software-Defined Networking (SDN) is an approach to networking that uses software-
based controllers or application programming interfaces (APIs) to communicate with
underlying hardware infrastructure and direct traffic on a network.
Origin of SDN
2006: At Stanford university, a team proposes a clean-slate security architecture
(SANE) to control security policies in a centralized manner instead of doing it at
edges.
2008: The idea of software-defined network is originated from OpenFlow project
(ACM SIGCOMM 2008).
2009: Stanford publishes OpenFlow V1.0.0 specs.
June 2009: Nicira network is founded.
March 2011: Open Networking Foundation is formed.
Oct 2011: First Open Networking Summit. Many Industries (Juniper, Cisco announced
to incorporate.
SDN Architecture
• In traditional networks, the control and data plane are embedded together as a single
unit.
• The control plane is responsible for maintaining the routing table of a switch which
determines the best path to send the network packets and the data plane is responsible
for forwarding the packets based on the instructions given by the control plane.
• Whereas in SDN, the control plane and data plane are separate entities, where the
control plane acts as a central controller for many data planes.
• The data plane consists of network elements, which expose their capabilities to the
control plane via southbound interface.
• The SDN applications are in the application plane and communicate their network
requirements toward the control plane via northbound interface.
• The control plane sits in the middle to translate the applications' requirements and
exerts low-level control over the network elements, Provide network information to
the applications.
Data-plane
• Data sources and sinks
• Traffic forwarding/processing engine which May have the ability to handle some
types of protocol, e.g., ARP
• Provide interfaces communicating to the control plane for Programmatic control of
all functions offered by the network element, Capability advertisement, Event
notification.
Control-plane
• It is placed at Logically centralized.
• Its Core functionalities are Topology and network state information, Device
discovery, Path computation, Security mechanism, Coordination among different
controllers Interfaces to the application plane.
Application-plane
• Applications specify the resources and behaviours required from the network, with the
context of business and policy agreement.
• It may need to orchestra the objectives, (Cloudify, Unify)
• Programming languages help developing applications.
Rule Placement
The SDN controller places rules in three phases upon receiving a new flow at a switch:
(a) In the first phase, the controller determines optimal forwarding path to route the flow from
source to destination;
(b) In the second phase, the controller selects optimal switch in the selected path for exact-
match rule placement in order to get per-flow statistics;
(c) Finally, flow-rule is redistributed among the switches to accommodate new flows in the
network upon detecting rule congestion at a switch
Controller Placement
• In a distributed SDN controller architecture, multiple controllers are deployed to
minimize communication latency between the switch and the control plane.
• The controllers are strategically placed to optimize network performance.
• Controllers define flow-rule according to the application specific requirements.
• The controllers must be able to handle all incoming requests from switches.
• Rule should be placed without incurring much delay.
• Typically, a controller can handle 200 requests in a second (through a single thread).
• The controllers are logically connected to the switches in one hop distance and
physically, they are connected to the switches in multi-hop distance.
• If we have a very small number of controllers for a large network, the network might
be congested with control packets (i.e., PACKET-IN messages).
Security in SDN
• Software-defined network security involves virtualizing security functions from the
traditional hardware they tend to operate on. They enforce virtual network functions,
with data and monitoring accessible through one intuitive interface.
• The latest generation of software-defined security applications make use of
automation to better detect anomalies in network traffic and improve the enforcement
of security policies. This makes it easier to detect suspicious activity more quickly
and respond more efficiently to prevent intrusions and minimize damage in the event
of a breach.
• There is Enhanced security using SDN.
• The Security is implemented using Firewall, Proxy, HTTP, Intrusion detection system
(IDS)
(Example of potential data plane ambiguity to implement the policy chain Firewall-IDS-
Proxy in the example topology.)
In the above example:
1. When an HTTP request comes, it is first forwarded to Firewall 1(FW1).
2. From the firewall 1, it is sent to Instrusion Detection System1(IDS1)
3. From IDS1, it is sent to Proxy1.
4. Finally, it is sent from Proxy1 to outside network.
Integrating SDN in IoT
The SDN-IoT integration brings several significant benefits for IoT traffic:
These benefits result in IoT networks with integrated SDN capabilities becoming more agile,
scalable and based on demand.
04. Software Defined Network is open interface. Traditional network is closed interface.
In Software Defined Network data plane and In traditional network data plane and control
05. control plane are decoupled by software. plane are mounted on same plane.
It can prioritize and block specific network It leads all packets in the same way no
07. packets. prioritization support.
It is difficult to program again and to replace
08. It is easy to program as per need. existing program as per use.
09. Cost of Software Defined Network is low. Cost of Traditional Network is high.
Its maintenance cost is lower than traditional Traditional network maintenance cost is higher
12. network. than SDN.
UINT-9
SMART HOMES
• A smart home refers to a convenient home setup where appliances and devices can be
automatically controlled remotely from anywhere with an internet connection using a
mobile or other networked device.
• Devices in a smart home are interconnected through the internet, allowing the user to
control functions such as security access to the home, temperature, lighting, and a
home theater remotely.
Smart Home Implementation:
Setting up of a smart home requires the fundamental technology including protocols and all the
hardware and software. Besides, you need smart devices that can be connected to the internet
on the home network. For example, cameras, motion sensors, LED lights, devices with built-
in web servers, etc. These are readily available online or at electronics improvement stores.
Before buying such products, one has to make sure that all devices use the same technology. If
two devices use different technologies, say one uses X10 while other uses Z-Wave, then it
requires a bridging device as well as a lot of technical expertise. It is usually recommended that
one should seek professional help while designing a smart home. Technicians with CEA-Comp
TIA Certification are considered to be more proficient in installing and troubleshooting the
home networking equipment.
The cost of home automation depends on how smart the home is. The users can either keep it
basic with jut intelligent lighting or add high-tech security systems. One has to decide where
to place the nodes to have an effective routing range and plan the as it may require renovation
or rebuilding of certain portions of the house.
• Home Area Network (HAN) is a network in a user‟s home where all the laptops,
computers, smartphones, and other smart appliances and digital devices are connected
into a network.
• This facilitates communication among the digital devices within a home which are
connected to the Home network.
• Home Area Network may be wired or wireless. Mostly wireless network is used for
HAN.
• Example –
Think about a home where computers, printers, game systems and tablets, smartphones,
other smart appliances are connected to each other through wired or wireless over a
network is an example of Home Area Network.
Infrastructure of HAN:
• A modem is used which is provided by an ISP to expose Ethernet to WAN. In homes
they come in DSL modem or cable modem.
• A router is used to manage connection between Home Area Network (HAN)
and Wide Area Network (WAN).
• A wireless access point is used for connecting wireless digital devices to the network.
• Smart Devices/ Digital Devices are used to connect to the Home Area Network.
Smart Home benefits
1. Managing all of your home devices from one place.
2. Flexibility for new devices and appliances.
3. Maximizing home security.
4. Remote control of home functions.
5. Increased energy efficiency.
6. Improved appliance functionality. when entertaining guests.
7. Home management insights.
8. Customize as Per our Convenience.
9. Higher quality of life.
10. Notifications in case of trouble.
11. Cost savings in the long run.
12. Smart homes may be suitable for disabled and old persons.
A smart city is an urban system which uses information & communication technology
(ict) to make infrastructure more interactive, accessible and efficient.
Need for Smart Cities arose due to
o Rapidly growing urban population.
o Fast depleting natural resources.
o Changes in environment and climate.
Characteristics of Smart Cities
It has been suggested that a smart city (also community, business cluster, urban
agglomeration or region) uses information technologies to:
1. Make more efficient use of physical infrastructure (roads, built environment and other
physical assets) through artificial intelligence and data analytics in order to support a
strong and healthy economic, social, cultural development.
2. Engage effectively with local governance officials by use of open
innovation processes and e-participation, improving the collective intelligence of the
city's institutions through e-governance, with emphasis placed on citizen participation
and co-design.
3. Learn, adapt and innovate and thereby respond more effectively and promptly to
changing circumstances by improving the intelligence of the city.
Smart city Frameworks
The creation, integration, and adoption of smart city capabilities require a unique set of
frameworks to realize the focus areas of opportunity and innovation central to smart city
projects. The frameworks can be divided into 5 main dimensions which include numerous
related categories of smart city development
1. Technology framework
A smart city relies heavily on the deployment of technology. Different combinations of
technological infrastructure interact to form the array of smart city technologies with varying
levels of interaction between human and technological systems.
Intelligent: Cognitive technologies, such as artificial intelligence and machine learning, can
be trained on the data generated by connected city devices to identify patterns. The efficacy
and impact of particular policy decisions can be quantified by cognitive systems studying the
continuous interactions of humans with their urban surroundings.
Ubiquitous: A ubiquitous city provides access to public services through any connected
device. U-city is an extension of the digital city concept because of the facility in terms of
accessibility to every infrastructure.
Wired: The physical components of IT systems are crucial to early-stage smart city
development. Wired infrastructure is required to support the IoT and wireless technologies
central to more interconnected living. A wired city environment provides general access to
continually updated digital and physical infrastructure. The latest in
telecommunications, robotics, IoT, and various connected technologies can then be deployed
to support human capital and productivity.
Hybrid: A hybrid city is the combination of a physical conurbation and a virtual city related
to the physical space. This relationship can be one of virtual design or the presence of a
critical mass of virtual community participants in a physical urban space. Hybrid spaces can
serve to actualize future-state projects for smart city services and integration.
Information city: The multiplicity of interactive devices in a smart city generates a large
quantity of data. How that information is interpreted and stored is critical to Smart city
growth and security.
2. Human framework
Smart city initiatives have measurable positive impacts on the quality of life of its citizens
and visitors. The human framework of a smart city – its economy, knowledge networks, and
human support systems is an important indicator of its success.
Creativity: Arts and culture initiatives are common focus areas in smart city planning.
Innovation is associated with intellectual curiosity and creativeness, and various projects have
demonstrated that knowledge workers participate in a diverse mix of cultural and artistic
activities.
Learning: Since mobility is a key area of Smart city development, building a capable
workforce through education initiatives is necessary. A city's learning capacity includes its
education system, including available workforce training and support, and its cultural
development and exchange.
Humanity: Numerous Smart city programs focus on soft infrastructure development, like
increasing access to voluntary organizations and designated safe zones. This focus on social
and relational capital means diversity, inclusion, and ubiquitous access to public services is
worked in to city planning.
Conflicts Same sensor type reports different data for the same location.
Alignment
Arises when sensor data frames are converted to a singular frame prior to transmission
Trivial features Processing of trivial data features may bring down the accuracy of the whole system
Now that we're aware of the things working in the background, you must know how smart
parking system works:
Input: Sensors, cameras and parking meters collect and transfer the information about the
vehicle and the surroundings to the parking operators.
Processing: Once, the information about the parking slot and consumer's vehicle is received,
the central server securely stores this information and informs the stakeholders about the
granting of the slot.
Output: The underlying software or application processes the data received from the
aforementioned devices and reserves a parking spot for the consumer. If the consumer has
previously booked the parking space, the software guides the driver to the same.
4. Mining:
To prevent accidents inside the mines ‐ RFID, Wi‐Fi and other wireless technologies
are used, which
provides early warning of any disaster
monitors air‐quality
detects the presence of poisonous gases inside the mines
oxygen level inside the mines.
5. Firefighting:
Sensor networks, RFID tags are used to perform
automatic diagnosis
early warning of disaster
emergency rescue
provides real‐time monitoring Hence, improves public security.
Benefits of IIoT
By harnessing IoT and advanced analytics technologies, manufacturers can:
Increase productivity and uptime.
Improve process efficiencies.
Accelerate innovation.
Reduce asset downtime.
Enhance operational efficiency.
Create end-to-end operational visibility.
Improve product quality.
Reduce operating costs.
Optimize production scheduling.
Improve overall equipment effectiveness (OEE).
Challenges of IIoT
The primary challenges in IloT include identification of objects or amount things,
manage huge of data, integrate existing infrastructures into new IloT infrastructure
and data enabling storage.
There are several safety challenges which include worker health and satety, regulatory
compliance, environmental protection and optimized operations.
Other important concerns related with IloT are information security and data privacy
protection. The devices or things can be tracked, monitored and connected. So there
are chances of attack on the personal and private data.
Though lloT provides new opportunities, new factors may cause hindrance in the path
to success such as lack of vision and leadership, lack of understanding of values
among management employees, costly sensors and inadequate infrastructure.
Difference between IIOT and IOT:
IIOT IOT
It deals with large scale networks. It deals with small scale networks.
It handles data ranging from medium to high. It handles very high volume of data.
It requires robust security to protect the data. It requires identity and privacy.
7. https://nptel.ac.in
8. https://en.wikipedia.org
9. https://www.w3schools.com