EEE Internet of Things
EEE Internet of Things
I POLYTECHNIC College
LECTURE NOTES
ON
INTERNET OF THINGS
Compiled by
Mrs.J.J.Godjess Oasis
Lecturer, Department of Electrical and Electronics
Engineering, V.M.C.S.I Polytechnic College Viricode,
Marthandam
CONTENTS
Internet of Things
Unit -1
Introduction to
Internet of
Internet of things (IoT)
Things
The Internet of things (IoT) is the inter-networking of physical devices, vehicles (also
referred to as “connected devices” and “smart devices”), buildings, and other items embedded
with electronics, software, sensors, actuators, and network connectivity which enable these
objects to collect and exchange data.
Characteristics:
Things-related services: The IoT is capable of providing thing-related services within the
constraints of things, such as privacy protection and semantic consistency between physical
things and their associated virtual things
Connectivity: Things in I.O.T. should be connected to the infrastructure, without connection
nothing makes sense.
Intelligence: Extraction of knowledge from the generated data is important, sensor generate
data and this data and this data should be interpreted properly.
Scalability: The no. of things getting connected to the I.O.T. infrastructure is increased day
by day. Hence, an IOT setup shall be able to handle the massive expansion.
Unique Identity: Each IOT device has an I.P. address. This identity is helpful in tracking the
equipment and at times to query its status.
Dynamic and Self-Adapting: The IOT device must dynamically adopt itself to the
changing context. Assume a camera meant for surveillance, it may have to work in different
conditions and at different light situations (morning, afternoon, night).
Heterogeneity: The devices in the IoT are heterogeneous as based on different hardware
platforms and networks. They can interact with other devices different networks.
Safety: Having got all the things connected with the Internet possess a major threat, as our
personal data is also there and it can be tampered with, if proper safety measures are not
taken.
Application areas of IoT:
Smart Home: The smart home is one of the most popular applications of IoT. The cost of
owning a house is the biggest expense in a homeowner’s life. Smart homes are promised to
save the time, money and energy.
Smart cities: The smart city is another powerful application of IoT. It includes smart
surveillance, environment monitoring, automated transformation, urban security, smart traffic
management, water distribution, smart healthcare etc.
Wearables: Wearables are devices that have sensors and software installed which can collect
data about the user which can be later used to get the insights about the user. They must
energy efficient and small sized.
Connected cars: A connected car is able to optimize its own operation, maintenance as
well as passenger’s comfort using sensors and internet connectivity.
Smart retail: Retailers can enhance the in-store experience of the customers using IoT. The
shopkeeper can also know which items are frequently bought together using IoT devices.
Smart healthcare: People can wear the IoT devices which will collect data about user's
health. This will help users to analyze themselves and follow tailor-made techniques to
combat illness. The doctor also doesn't have to visit the patients in order to treat them.
IoT Categories
IOT can be classified into two categories:
1. Consumer IoT(CIOT): The Consumer IoT refers to the billions of physical personal
devices, such as smartphones, wearables, fashion items and the growing number of smart
home appliances, that are now connected to the internet, collecting and sharing data.
A Consumer IoT network typically entails few consumer devices, each of which has a
limited lifetime of several years.
The common connectivity used in this kind of solutions are Bluetooth, WiFi, and ZigBee.
These technologies offer short-range communication, suitable for applications deployed in
limited spaces such as houses, or small offices.
2. industrial internet of things (IIoT): It refers to interconnected sensors, instruments, and
other devices networked together with computers' industrial applications, including
manufacturing and energy management. This connectivity allows for data collection,
exchange, and analysis, potentially facilitating improvements in productivity and efficiency
as well as another economic ben.
BASELINE TECHNOLOGIES
There are various baseline technologies that are very closely related to IOT, They include:
Machine-to-Machine (M2M), Cyber-Physical Systems (CPS), Web Of Things (WOT)
a) Machine-to-Machine (M2M):
● Machine-to-Machine (M2M) refers to networking of machines (or devices) for
the purpose of remote monitoring and control and data exchange.
● An M2M area network comprises of machines (or M2M nodes) which have
embedded network modules for sensing, actuation and communicating various
communication protocols can be used for M2M LAN such as ZigBee, Bluetooth, M-
bus, Wireless M-Bus etc., These protocols provide connectivity between M2M
nodes within an M2M area network.
● The communication network provides connectivity to remote M2M area networks.
The communication network provides connectivity to remote M2M area network.
● The communication network can use either wired or wireless network (IP based).
While the M2M are networks use either proprietary or non-IP based communication
protocols, the communication network uses IP-based network. Since non-IP based
protocols are used within M2M area network, the M2M nodes within one network
cannot communicate with nodes in an external network.
● To enable the communication between remote M2M are network, M2M gateways
are used
b) Cyber-Physical systems:
Cyber-Physical Systems (CPS) are integrations of computation, networking, and physical
processes. Embedded computers and networks monitor and control the physical processes,
with feedback loops where physical processes affect computations and vice versa.
In cyber-physical systems, physical and software components are deeply intertwined, able to
operate on different spatial and temporal scales, exhibit multiple and distinct behavioural
modalities, and interact with each other in ways that change with context.
c) Web of Things: web of things is a term used to describe approaches, software
architectural style of programming patterns that allow real world objects to be part of WWW.
The major portion of the WoT specification is the Thing Description. Thing is an abstract
representation of a physical or virtual entity. A Thing Description includes the metadata and
interfaces of a Thing in a standardized way, with the aim to make the Thing able to
communicate with other Things in a heterogeneous world.
SENSOR
Sensor is a device used for the conversion of physical events or characteristics into the
electrical signals. This is a hardware device that takes the input from environment and gives
to the system by converting it.
For example, a thermometer takes the temperature as physical characteristic and then
converts it into electrical signals for the system.
Characteristics of Sensors
1. Range: It is the minimum and maximum value of physical variable that the sensor
can sense or measure. For example, a Resistance Temperature Detector (RTD) for the
measurement of temperature has a range of -200 to 800oC.
2. Span: It is the difference between the maximum and minimum values of input. In
above example, the span of RTD is 800 – (-200) = 1000oC.
3. Accuracy: The error in measurement is specified in terms of accuracy. It is defined as the
difference between measured value and true value. It is defined in terms of % of full scale
or
% of reading.
4. Precision: It is defined as the closeness among a set of values. It is different
from accuracy.
5.Linearity: Linearity is the maximum deviation between the measured values of a
sensor from ideal curve.
6.Hysteresis: It is the difference in output when input is varied in two ways- increasing and
decreasing.
7. Resolution: It is the minimum change in input that can be sensed by the sensor.
8. Reproducibility: It is defined as the ability of sensor to produce the same output
when same input is applied.
9. Repeatability: It is defined as the ability of sensor to produce the same output every time
when the same input is applied and all the physical and measurement conditions kept the
same including the operator, instrument, ambient conditions etc.
10. Response Time: It is generally expressed as the time at which the output reaches a
certain percentage (for instance, 95%) of its final value, in response to a step change of the
input.
Classification of sensors:
Sensors based on the power requirement sensor is classified into two types: Active Sensors,
Passive Sensors.
Active Sensors: Does not need any external energy source but directly generates an electric
signal in response to the external.
Example: Thermocouple, Photodiode, Piezoelectric sensor.
Passive Sensors: The sensors require external power called excitation signal. Sensors modify
the excitation signal to provide output.
Example: Strain gauge.
Sensors based on output sensor is classified into two types: Analog Sensors, Digital Sensors.
Analog Sensors
● Analog Sensors produces a continuous output signal or voltage which is
generally proportional to the quantity being measured.
● Physical quantities such as Temperature, speed, Pressure, Displacement, Strain
etc. are all analog quantities as they tend to be continuous in nature.
● For example, the temperature of a liquid can be measured using a thermometer or
thermocouple (e.g. in geysers) which continuously responds to temperature
changes as the liquid is heated up or cooled down.
Digital Sensors
● Digital Sensors produce discrete output voltages that are a digital representation of the
quantity being measured.
● Digital sensors produce a binary output signal in the form of a logic "1" or a logic "0"
, ("ON" or "OFF).
● Digital signal only produces discrete (non-continuous) values, which may be output as
a signal "bit" (serial transmission), or by combing the bits to produce a signal "byte"
output (parallel transmission).
Based on type of data measured sensor is classified into two types: Scalar Sensors and
Vector Sensors.
Scalar Sensors
● Scalar Sensors produce output signal or voltage which generally proportional to the
magnitude of the quantity being measured.
● Physical quantities such as temperature, color, pressure, strain, etc. are all
scalar quantities as only their magnitude is sufficient to convey an information.
● For example, the temperature of a room can be measured using thermometer or
thermocouple, which responds to temperature changes irrespective of the
orientation of the sensor or its direction.
Vector Sensors
● Vector Sensors produce output signal or voltage which generally proportional to the
magnitude, direction, as well as the orientation of the quantity being measured.
● Physical quantities such as sound, image, velocity, acceleration, orientation, etc. are
all vector quantities, as only their magnitude is not sufficient to convey the complete
information.
● For example, the acceleration of a body can be measured using an accelerometer,
which gives the components of acceleration of the body with respect to the x,y,z
coordinate axes.
ACTUATOR
Actuator is a device that converts the electrical signals into the physical events or
characteristics. It takes the input from the system and gives output to the environment. For
example, motors and heaters are some of the commonly used actuators.
Types of Actuators
1. Hydraulic Actuators: Hydraulic actuators operate by the use of a fluid-filled cylinder
with a piston suspended at the centre. Commonly, hydraulic actuators produce linear
movements, and a spring is attached to one end as a part of the return motion. These actuators
are widely seen in exercise equipment such as steppers or car transport carriers.
2. Pneumatic Actuators: Pneumatic actuators are one of the most reliable options for
machine motion. They use pressurized gases to create mechanical movement. Many
companies prefer pneumatic-powered actuators because they can make very precise motions,
especially when starting and stopping a machine. Examples of equipment that uses pneumatic
actuators include: Bus brakes, Exercise machines, Vane motors, Pressure sensors
3.Electric Actuators: Electrical actuators, as you may have guessed, require electricity
to work. Well-known examples include electric cars, manufacturing machinery, and
robotics
equipment. Similar to pneumatic actuators, they also create precise motion as the flow of
electrical power is constant.
4.Thermal and Magnetic Actuators: Thermal and magnetic actuators usually consist
of shape memory alloys that can be heated to produce movement. The motion of thermal
or magnetic actuators often comes from the Joule effect, but it can also occur when a coil
is placed in a static magnetic field. The magnetic field causes constant motion called the
Laplace-Lorentz force. Most thermal and magnetic actuators can produce a wide and
powerful range of motion while remaining lightweight.
5.Mechanical Actuators: Some actuators are mostly mechanical, such as pulleys or rack and
pinion systems. Another mechanical force is applied, such as pulling or pushing, and the
actuator will leverage that single movement to produce the desired results. For instance,
turning a single gear on a set of rack and pinions can mobilize an object from point A to point
B. The tugging movement applied on the pulley can bring the other side upwards or towards
the desired location.
6. Soft Actuators: Soft actuators (e.g., polymer based) are designed to handle fragile
objects like fruit harvesting in agriculture or manipulating the internal organs in
biomedicine.
They typically address challenging tasks in robotics. Soft actuators produce flexible motion
due to the integration of microscopic changes at the molecular level into a macroscopic
deformation of the actuator materials.
IOT COMPONENTS
Four fundamental components of IoT system, which tells us how IoT works.
i. Sensors/Devices
First, sensors or devices help in collecting very minute data from the surrounding
environment. All of this collected data can have various degrees of complexities ranging from
a simple temperature monitoring sensor or a complex full video feed.
A device can have multiple sensors that can bundle together to do more than just sense
things. For example, our phone is a device that has multiple sensors such as GPS,
accelerometer, camera but our phone does not simply sense things.
ii. Connectivity
Next, that collected data is sent to a cloud infrastructure but it needs a medium for transport.
The sensors can be connected to the cloud through various mediums of communication and
transports such as cellular networks, satellite networks, Wi-Fi, Bluetooth, wide-area networks
(WAN), low power wide area network and many more.
iii. Data Processing
Once the data is collected and it gets to the cloud, the software performs processing on the
acquired data.
This can range from something very simple, such as checking that the temperature reading on
devices such as AC or heaters is within an acceptable range. It can sometimes also be very
complex, such as identifying objects (such as intruders in your house) using computer vision
on video.
iv. User Interface
Next, the information made available to the end-user in some way. This can achieve by
triggering alarms on their phones or notifying through texts or emails.
Also, a user sometimes might also have an interface through which they can actively check
in on their IOT system. For example, a user has a camera installed in his house, he might
want to check the video recordings and all the feeds through a web server.
Service Oriented Architecture of IoT
SOA can also use to support IoT as a main contributing technology in devices or
heterogeneous systems.
1. Sensing Layer: IoT can be defined as a worldwide interconnected network, where
things or devises are controlled remotely. Interconnected things or devices are become
easier, as more and more things are furnished with sensors and RFID technologies.
2. Networking Layer: Networking Layer is responsible to connect all device or things
together so that they can able to share the information with each other over the Internet.
Moreover, network layer also collects data and information from the present IT infrastructure
for example ICT systems, power grids, business systems, healthcare systems, and
transportation systems.
3. Service Layer: This layer depends upon the technology used on the middleware layer
which is responsible for functionalities incorporate between applications and services in IoT.
This middleware technology also provides a cost-effective and efficient platform for IoT and
this platform including software and hardware components which can be reused when
needed.
4. Interface Layer: The core responsibility of the interface layer has also simplified the
interconnection and management of things. Interface specific profile can be defined as
the subset of services that support interaction with the application used in a network
Challenges for IoT
1. Security: Security is the most significant challenge for the IoT. Increasing the number
of connected devices increases the opportunity to exploit security vulnerabilities, as do
poorly designed devices, which can expose user data to theft by leaving data streams
inadequately protected and in some cases people’s health and safety can be put at risk.
2. Privacy: The IoT creates unique challenges to privacy, many that go beyond the data
privacy issues that currently exist. Much of this stems from integrating devices into our
environments without us consciously using them. This is becoming more prevalent in
consumer devices, such as tracking devices for phones and cars as well as smart
televisions.
3. Scalability: Billions of internet-enabled devices get connected in a huge network, large
volumes of data are needed to be processed. The system that stores, analyses the data
from these IoT devices needs to be scalable.
4. Interoperability: Technological standards in most areas are still fragmented. These
technologies need to be converged. Which would help us in establishing a common
framework and the standard for the IoT devices. As the standardization process is still
lacking, interoperability of IoT with legacy devices should be considered critical. This lack of
interoperability is preventing us to move towards the vision of truly connected everyday
interoperable smart objects.
5. Bandwidth: Connectivity is a bigger challenge to the IoT than you might expect. As the
size of the IoT market grows exponentially, some experts are concerned that bandwidth-
intensive IoT applications such as video streaming will soon struggle for space on the
IoT’s current server-client model.
6. Standards: Lack of standards and documented best practices have a greater impact than
just limiting the potential of IoT devices. Without standards to guide manufacturers,
developers sometimes design products that operate in disruptive ways on the Internet
without much regard to their impact. If poorly designed and configured, such devices can
have negative consequences for the networking resources they connect to and the broader
Internet.
7. Regulation: The lack of strong IoT regulations is a big part of why the IoT remains a
severe security risk, and the problem is likely to get worse as the potential attack surface
expands to include ever more crucial devices. When medical devices, cars and children’s toys
are all connected to the Internet, it’s not hard to imagine many potential disaster scenarios
unfolding in the absence of sufficient regulation
U
N
I
Connectivity Terminologies T
-2
I
O
T
N
et
w
o
r
ki
n
g
IoT Node: These are machines, things or computers Connected to other nodes inside a LAN
via the IoT LAN, May be sometimes connected to the internet through a WAN directly
IoT LAN: It is Local, Short range Comm, May or may not connect to Internet, Building or
Organization wide
IoT WAN: Connection of various network segments, Organizationally and geographically
wide, Connects to the internet
IoT Gateway: A router connecting the IoT LAN to a WAN to the Internet, can implement
several LAN and WAN, Forwards packets between LAN and WAN on the IP layer
IoT Proxy: Performs active application layer functions between IoT nodes and other entities
Gateway Prefix Allotment:
● One of the strategies of address conservation in IoT is to use local addresses which
exist uniquely within the domain of the gateway. These are represented by the circles
in this slide.
● The network connected to the internet has routers with their set of addresses and
ranges.
● These routers have multiple gateways connected to them which can forward packets
from the nodes, to the Internet, only via these routers. These routers assign prefixes
to gateways under them, so that the gateways can be identified with them.
Impact of Mobility on Addressing
● The network prefix changes from 1 to 2 due to movement, making the IoT LAN safe
from changes due to movements.
● IoT gateway WAN address changes without change in LAN address. This is
achieved using ULA.
● The gateways assigned with prefixes, which are attached to a remote anchor point
by using various protocols such as Mobile IPv6, and are immune to changes of
network prefixes.
● This is achieved using LU. The address of the nodes within the gateways remains
unchanged as the gateways provide them with locally unique address and the change
in gateway’s network prefix doesn’t affect them.
● Sometimes, there is a need for the nodes to communicate directly to the internet. This
is achieved by tunnelling, where the nodes communicate to a remote anchor point
instead of channelling their packets through the router which is achieved by using
tunnelling protocols such as IKEv2:internet key exchange version 2
Multihoming
Multihoming is the practice of connecting a host or a computer network to more than one
network. This can be done in order to increase reliability or performance or to reduce cost.
There are several different ways to perform multihoming.
Host multihoming
A single host may be connected to multiple networks. For example, a mobile phone might be
simultaneously connected to a WiFi network and a 3G network, and a desktop computer
might be connected to both a home network and a VPN. A multihomed host usually is
assigned multiple addresses, one per connected network.
Classical multihoming
In classical multihoming a network is connected to multiple providers, and uses its own range
of addresses (typically from a Provider Independent (PI) range). The network's edge routers
communicate with the providers using a dynamic routing protocol, typically BGP, which
announces the network's address range to all providers. If one of the links fails, the dynamic
routing protocol recognizes the failure within seconds or minutes, and reconfigures its routing
tables to use the remaining links, transparently to the hosts.
Multihoming with multiple addresses
In this approach, the network is connected to multiple providers, and assigned multiple
address ranges, one for each provider. Hosts are assigned multiple addresses, one for
each provider.
It is used in non-
Function It is used in constrained network having low constrained network
or power, low bandwidth and low memory having no limits on
applicati requirements. power/BW/memory.
on
Size of data
to be tens of bytes hundreds or thousands of bytes
transported
It uses CBOR (Concise Binary Object
Representation) format as IoT is used for tiny
messages. CBOR is based on JSON though CBOR It uses HTML, XML and
Data format uses binary encoding while JSON uses text JSON formats.
encoding.
Applicati It uses HTTP protocol
on Layer It uses CoAP protocol at application layer. at application layer.
It uses UDP which is faster due to smaller header It uses TCP which is
size compare to TCP. It is lighter protocol compare connection oriented and
Transport to TCP. slower compare to UDP.
layer
Characteristics of IPv4
● IPv4 could be a 32-Bit IP Address.
● IPv4 could be a numeric address, and its bits are separated by a dot.
● The number of header fields is twelve and the length of the header field is twenty.
● It has Unicast, broadcast, and multicast style of addresses.
● IPv4 supports VLSM (Virtual Length Subnet Mask).
● IPv4 uses the Post Address Resolution Protocol to map to the MAC address.
● RIP may be a routing protocol supported by the routed daemon.
● Networks ought to be designed either manually or with DHCP.
● Packet fragmentation permits from routers and causing host.
Version:
This field indicates the version number of the IP packet so that the revised version can be
distinguished from the previous version. The current IP version is 4.
Internet Header Length (IIHL):
It specifies the length of the IP header in unit 32 bits. In case of no option present in the IP
header, IHL will have a value of 5. So, if the value of IHL is more than 5 then the length of
the option field can be easily calculated.
Type of Service: This field specifies the priority of the packets based on delay, throughput,
reliability and cost requirements. Three bits are assigned for priority level and four bits for
specific requirements (delay, throughput, reliability and cost).
Total Length:
This field specifies the number of bytes of the IP packet including header and data. As 16 bits
are assigned to this field, the maximum length of the packet is 65635 bytes.
Identification:
The identification field is used to identify which packet a particular fragment belongs to so
that fragments for different packets don’t get mixed up.
Flags:
The flag field has three bits:
1. Unused bit
2. Don’t fragment (DF) bit
3. More fragment (MF) bit
Fragment Offset:
The fragment offset field identifies the location of the fragment in a packet. The value
measures the offset in a unit of 8 bytes, between the beginning of the packet to be fragmented
and the beginning of the fragment.
Time to live (TTL):
This field is used to indicate the amount of time in seconds a packet is allowed to remain in
the network.
Protocol:
This field specifies the protocol that is to receive the IP data at the destination host.
Header Checksum:
This field verifies the integrity of the header of the IP packet. The integrity of the data part is
left to the upper layer protocols. The checksum is generated by the source and it is sent along
with the frame header to the next router.
Source IP address & Destination IP address:
These two fields contain the IP addresses of the source and destination hosts respectively.
Options:
Options fields are rarely used to include special features such as security level, the route to
be taken and time stamp at each router. It is used in RSVP.
Padding:
This field is used to make the header a multiple of 32-bit words.
IPv6
Internet Protocol version 6 (IPv6) is also known as Internet Protocol next
generation (IPng). It also accommodates more feature to meet the global requirement of
growing Internet.
To allocate a sufficient number of network address, IPv6 allows 128 bits of IP address
separated into 8 sections of 2 bytes each. Unlike IPv4 where the address is represented
as dotted-decimal notation, IPv6 uses hexadecimal numbers and colon (“:”) is used as a
delimiter between the sections.
Example: IPv6 address may be like this:
FA20:B120: 6230:0000:0000: CE12:0006: ABDF
Version: This field is 4 bits long and it defines the version of the IP packet. The value of
it for IPv6 is 6 and IPv4 its value is 4. During the transition period from IPv4 to IPv6, the
routers will be able to distinguish the two versions of the IP packets.
Traffic Class: This field is 20 bits long and it is used to distinguish between the different
requirements for real-time delivery services.
Flow Label: This field is 20 bits long and it is used to allow the source and destination nodes
to set up a pseudo connection with particular properties and requirements. It is designed to
provide special handling of a particular flow of data.
Payload Length: It is of 2 bytes length and signifies the number of bytes that follow the 40
bytes base header. It is the length of the IP datagram excluding the base header.
Next Header: This field is of 1 bye length and it defines one of the extension headers that
follow the base header. The extension headers also contain this field to indicate the next
header. if this is the last IP header then Next header field tells which of the transport
protocols (TCP or UDP) the packet is to be passed.
Hop Limit: This field contains 1 byte and it signifies the maximum number of hops a packet
can travel. The time to live field in the IPv4 header did the same task, except that in IPv4 it
was counted in time and in IPv6 it is counted in terms of the number of routers.
Source Address: It is 16 bytes long and contains the IP address of the source machine to the
network interface.
Destination Address: It is 16 bytes long and usually contains the IP address of the ultimate
destination machine to the network interface. In case of specific routing, it may contain the IP
address of the next router.
Extension Header: Some of the fields Ipv4 that are missing in IPv6 is necessary in some of
the cases. To handle this problem, IPv6 has introduced the concept of the extension header.
There are be one or more of the six possible extension headers. These headers appear directly
after the base header.
MQTT
● It is a publish‐subscribe‐based lightweight messaging protocol for use in conjunction
with the TCP/IP protocol.
● Designed to provide connectivity (mostly embedded) between applications
and middle‐wares on one side and networks and communications on the other
side.
● A message broker controls the publish‐subscribe messaging pattern.
● A topic to which a client is subscribed is updated in the form of messages and
distributed by the message broker.
● Designed for: Remote connections, Limited bandwidth, Small‐code footprint.
MQTT Components
• Publishers: Lightweight sensors
• Subscribers: Applications interested in sensor data
• Brokers: Connect publishers and subscribers and Classify sensor data into topics
Communication:
AMQP
● Advanced Message Queuing Protocol.
● Open standard for passing business messages between applications or organizations.
● Connects between systems and business processes.
● It is a binary application layer protocol.
● Basic unit of data is a frame.
Co
mponents
Exchange:
● Part of Broker.
● Receives messages and routes them to Queues.
Queue:
● Separate queues for separate business processes.
● Consumers receive messages from queues.
Bindings:
Rules for distributing messages (who can access what message, destination of the
message)
AMQP Features
● Targeted QoS (Selectively offering QoS to links).
● Persistence (Message delivery guarantees).
● Delivery of messages to multiple consumers.
● Possibility of ensuring multiple consumption.
● Possibility of preventing multiple consumption.
● High speed protocol.
Applications
● Monitoring and global update sharing.
● Connecting different systems and processes to talk to each other.
● Allowing servers to respond to immediate requests quickly and delegate time
consuming tasks for later processing.
● Distributing a message to multiple recipients for consumption.
● Enabling offline clients to fetch data at a later time.
● Introducing fully asynchronous functionality for systems.
● Increasing reliability and uptime of application deployments.
UNIT-3
Connectivity Technologies
• Communication Protocols: The following communication protocols have immediate
importance to consumer and industrial IoTs:
• IEEE 802.15.4
• Zigbee
• 6LoWPAN
• Wireless HART
• Z‐Wave
• ISA 100
• Bluetooth
• NFC
• RFID
IEEE 802.15.4
Features of IEEE 802.15.4:
● Well‐known standard for low data‐rate WPAN.
● Developed for low‐data‐rate monitoring and control applications and extended‐life
low‐power‐consumption uses.
● This standard uses only the first two layers (PHY, MAC) plus the logical link control
(LLC) and service specific convergence sub‐layer (SSCS) additions to communicate
with all upper layers.
● Uses direct sequence spread spectrum (DSSS) modulation.
● Highly tolerant of noise and interference and offers link reliability improvement
mechanisms.
● Low‐speed versions use Binary Phase Shift Keying (BPSK).
● High data‐rate versions use offset‐quadrature phase‐shift keying (O‐QPSK).
● Uses carrier sense multiple access with collision avoidance (CSMA‐CA) for
channel access.
● Multiplexing allows multiple users or nodes interference‐free access to the same
channel at different times.
● Networking topologies defined are ‐‐ Star, and Mesh.
IEEE 802.15.4 supports two types of network node:
1. Full Function Device (FFD)
• Can talk to all types of devices.
• Supports full protocol.
2. Reduced Function Device (RFD)
ZigBee
Features of ZigBee
● Most widely deployed enhancement of
IEEE 802.15.4.
● The ZigBee protocol is defined by layer
3 and above. It works with the 802.15.4
layers 1 and 2.
● The standard uses layers 3 and 4 to
define additional communication
enhancements.
● These enhancements include
authentication with valid nodes,
encryption for security, and a data routing and forwarding capability that enables
mesh networking.
● The most popular use of ZigBee is wireless sensor networks using the mesh topology.
ZigBee has two important components:
• ZigBee Device Object (ZDO): ZDO responsible for Device management,
Security, Policies.
• Application Support Sub‐layer (APS): APS responsible for Interfacing and
control services, bridge between network and other layers
ZigBee Types
1. ZigBee Coordinator (ZC):
▪ The coordinator forms the root of the ZigBee network tree and might act as a
bridge between networks.
▪ There is a single ZigBee Coordinator in each network, which originally
initiates the network.
▪ It stores information about the network under it and outside it.
▪ It acts as a Trust Centre & repository for security keys.
2. ZigBee Router (ZR): Capable of running applications, as well as relaying
information between nodes connected to it.
3. ZigBee End Device (ZED):
● It contains just enough functionality to talk to the parent node, and it cannot
relay data from other devices.
● This allows the node to be asleep a significant amount of the time
thereby enhancing battery life.
● Memory requirements and cost of ZEDs are quite low, as compared to ZR or
ZC.
Applications:
● Building automation
● Remote control (RF4CE or RF for consumer electronics)
● Smart energy for home energy monitoring
● Health care for medical and fitness monitoring
● Home automation for control of smart homes
● Light Link for control of LED lighting
● Telecom services.
6LoWPAN
● Low‐power Wireless Personal Area Networks over IPv6.
● Allows for the smallest devices with limited processing ability to transmit
information wirelessly using an Internet protocol.
● Allows low‐power devices to connect to the Internet.
● Created by the Internet Engineering Task Force (IETF) ‐ RFC 5933 and RFC 4919.
Features of 6LoWPANs
● Allows IEEE 802.15.4 radios to carry 128‐bit addresses of Internet Protocol version
6 (IPv6).
● Header compression and address translation techniques allow the IEEE
802.15.4 radios to access the Internet.
● IPv6 packets compressed and reformatted to fit the IEEE 802.15.4 packet format.
● Uses include IoT, Smart grid, and M2M applications.
Addressing in 6LoWPAN
• 64‐bit addresses: globally unique.
• 16-bit addresses: PAN specific; assigned by PAN coordinator
6LoWPAN Routing
● Mesh routing within the PAN space.
● Routing between IPv6 and the PAN domain
● Routing protocols in use:
▪ LOADng
▪ RPL
LOADng Routing
Basic operations of LOADng include:
▪ Generation of Route Requests (RREQs) by a LOADng Router (originator) for
discovering a route to a destination,
▪ Forwarding of such RREQs until they reach the destination LOADng Router,
▪ Generation of Route Replies (RREPs) upon receipt of an RREQ by the
indicated destination, and unicast hop‐by‐hop forwarding of these RREPs
towards the originator.
▪ If a route is detected to be broken, a Route Error (RERR) message is returned
to the originator of that data packet to inform the originator about the route
breakage.
RPL Routing
● Distance Vector IPv6 routing protocol for lossy and low power networks.
● Maintains routing topology using low-rate beaconing.
● Beaconing rate increases on detecting inconsistencies (e.g. node/link in a route is
down).
● Routing information included in the datagram itself.
● Proactive: Maintaining routing topology.
● Reactive: Resolving routing inconsistencies.
RFID
● RFID is an acronym for “radio‐frequency identification”.
● Data digitally encoded in RFID tags, which can be read by a reader.
● Somewhat similar to barcodes.
● Data read from tags are stored in a database by the reader.
● As compared to traditional barcodes and QR codes, RFID tag data can be read outside
the line‐of‐sight.
RFID Features
● RFID tag consists of an integrated circuit and an antenna.
● The tag is covered by a protective material which also acts as a shield against various
environmental effects.
● Tags may be passive or active.
● Passive RFID tags are the most widely used.
● Passive tags have to be powered by a reader inductively before they can transmit
information, whereas active tags have their own power supply.
Working Principle
● Derived from Automatic Identification and Data Capture (AIDC) technology.
● AIDC performs object identification, object data collection and mapping of the
collected data to computer systems with little or no human intervention.
● AIDC uses wired communication.
● RFID uses radio waves to perform AIDC functions.
● The main components of an RFID system include an RFID tag or smart label, an
RFID reader, and an antenna.
Applications
1. Inventory management 2. Asset tracking 3. Personnel tracking 4. Controlling
access to restricted areas 5. ID badging 6. Supply chain management 7. Counterfeit
prevention (e.g. in the pharmaceutical industry)
HART & Wireless HART
● WirelessHART is the latest release of Highway Addressable Remote Transducer
(HART) Protocol.
● HART standard was developed for networked smart field devices.
● The wireless protocol makes the implementation of HART cheaper and easier.
● HART encompasses the greatest number of field devices incorporated in any field
network.
● Wireless HART enables device placements more accessible and cheaper– such as
the top of a reaction tank, inside a pipe, or at widely separated warehouses.
● Main difference between wired and unwired versions is in the physical, data link
and network layers. Wired HART lacks a network layer.
HART Physic al Layer
● Derived from IEEE 802.15.4 protocol.
● It operates only in the 2.4 GHz ISM band.
● Employs and exploits 15 channels of the band to increase reliability.
HART Data Link Layer
● Collision free and deterministic communication achieved by means of super‐frames
and TDMA. Super‐frames consist of grouped 10ms wide timeslots.
● Super‐frames control the timing of transmission to ensure collision free and reliable
communication.
● This layer incorporates channel hopping and channel blacklisting to increase
reliability and security. Channel blacklisting identifies channels consistently
affected by interference and removes them from use.
HART Network & Transport Layers
● Cooperatively handle various types of traffic, routing, session creation, and security.
● Wireless HART relies on Mesh networking for its communication, and each device is
primed to forward packets from every other device. Each device is armed with an
updated network graph (i.e., updated topology) to handle routing.
● Network layer (HART)=Network + Transport + Session layers (OSI).
HART Application Layer
● Handles communication between gateways and devices via a series of command and
response messages.
● Responsible for extracting commands from a message,
o executing it and generating responses.
● This layer is seamless and does not differentiate between wireless and wired versions
of HART.
NFC
● Near field communication, or NFC for short, is an offshoot of radio‐frequency
identification (RFID).
● NFC is designed for use by devices within close proximity to each other.
● All NFC types are similar but communicate in slightly different ways.
NFC Types
● Passive devices contain information which is readable by other devices, however it
cannot read information itself.
● NFC tags found in supermarket products are examples of passive NFC.
● Active devices are able to collect as well as transmit information.
● Smartphones are a good example of active devices.
Working Principle
● Works on the principle of magnetic induction.
● A reader emits a small electric current which creates a magnetic field that in turn
bridges the physical space between the devices.
● The generated field is received by a similar coil in the client device where it is turned
back into electrical impulses to communicate data such as identification number status
information or any other information.
● ‘Passive’ NFC tags use the energy from the reader to encode their response while
‘active’ or ‘peer‐to‐peer’ tags have their own power source.
NFC Applications
● Smartphone based payments.
● Parcel tracking.
● Information tags in posters and advertisements.
● Computer game synchronized toys.
● Low‐power home automation systems.
Bluetooth
● Bluetooth wireless technology is a short-range communications technology.
● Intended for replacing cables connecting portable units
● Maintains high levels of security.
● Bluetooth technology is based on Ad‐hoc technology also known as Ad‐hoc Piconets
Features
● Bluetooth technology operates in the unlicensed industrial, scientific and medical
(ISM) band at 2.4 to 2.485 GHZ.
● Uses spread spectrum hopping, full‐duplex signal at a nominal rate of 1600 hops/sec.
● Bluetooth supports 1Mbps data rate for version 1.2 and 3Mbps data rate for Version
2.0 combined with Error Data Rate.
● Bluetooth operating range depends on the device:
o Class 3 radios have a range of up to 1 meter or 3 feet
o Class 2 radios are most commonly found in mobile devices have a range of 10
meters or 30 feet
o Class 1 radios are used primarily in industrial use cases have a range of 100 meters
or 300 feet.
Connection Establishment
● Inquiry: Inquiry run by one Bluetooth device to try to discover other devices near it.
● Paging: Process of forming a connection between two Bluetooth devices.
● Connection: A device either actively participates in the network or enters a low‐
power sleep mode
Piconets:
Applications
● Audio players
● Home automation
● Smartphones
● Toys
● Hands free headphones
● Sensor networks
Z Wave
● Zwave is a protocol for communication among devices used for home automation.
● It uses RF for signalling and control.
● Operating frequency is 908.42 MHz in the US & 868.42 MHz in Europe.
● Mesh network topology is the main mode of operation, and can support 232 nodes in
a network.
● Zwave utilizes GFSK modulation and Manchester channel encoding.
● A central network controller device sets‐up and manages a Zwave network.
● Each logical Zwave network has 1 Home (Network) ID and multiple node IDs for the
devices in it.
● Nodes with different Home IDs cannot communicate with each other.
● Network ID length=4 Bytes, Node ID length=1 Byte.
ISA 100.11A
● ISA is acronym International Society of Automation.
● Designed mainly for large scale industrial complexes and plants.
● More than 1 billion devices use ISA 100.11A
● ISA 100.11A is designed to support native and tunnelled application layers.
● Various transport services, including ‘reliable,’ ‘best effort,’ ‘real‐time’ are offered.
● Network and transport layers are based on TCP or UDP / IPv6.
● Data link layer supports mesh routing and Frequency hopping.
● Physical and MAC layers are based on IEEE 802.15.4
● Topologies allowed are:
• Star/tree
• Mesh
● Permitted networks include:
• Radio link
• ISA over Ethernet
• Field buses
UNIT-4
Wireless Sensor Networks
Voltage Regulator
The function of the voltage regulator is to control the voltage given to the
Arduino board and stabilize theDC voltages used by the processor and other
elements.
Crystal Oscillator
The crystal oscillator helps Arduino in dealing with time issues. How does Arduino
calculate time? The answer is, by using the crystal oscillator. The number printed on
top of the Arduino crystal is 16.000H9H. Ittells us that the frequency is 16,000,000
Hertz or 16 MHz.
Arduino Reset
You can reset your Arduino board, i.e., start your program from the beginning. You
can reset the UNO boardin two ways. First, by using the reset button (17) on the
board. Second, you can connect an external reset button to the Arduino pin labelled
RESET (5).
Analog pins
The Arduino UNO board has six analog input pins A0 through A5. These pins can
read the signal from an analog sensor like the humidity sensor or temperature sensor
and convert it into a digital value that can beread by the microprocessor.
Main microcontroller
Each Arduino board has its own microcontroller (11). You can assume it as the brain
of your board. The main IC (integrated circuit) on the Arduino is slightly different
from board to board. The microcontrollers areusually of the ATMEL Company. You
must know what IC your board has before loading up a new programfrom the
Arduino IDE. This information is available on the top of the IC. For more details
about the IC
construction and functions, you can refer to the data sheet.
ICSP pin
Mostly, ICSP (12) is an AVR, a tiny programming header for the Arduino consisting
of MOSI, MISO, SCK,RESET, VCC, and GND. It is often referred to as an SPI
(Serial Peripheral Interface), which could be
considered as an "expansion" of the output. Actually, you are slaving the output device
to the master of the SPI bus.
TX and RX LEDs
On your board, you will find two labels: TX (transmit) and RX (receive). They appear
in two places on the Arduino UNO board. First, at the digital pins 0 and 1, to indicate
the pins responsible for serial communication. Second, the TX and RX led (13). The
TX led flashes with different speed while sending the serial data. The speed of
flashing depends
on the baud rate used by the board. RX flashes during the receiving process.
Digital I/O
The Arduino UNO board has 14 digital I/O pins (15) (of which 6 provide PWM
(Pulse Width Modulation) output. These pins can be configured to work as input
digital pins to read logic values (0 or 1) or as digital output pins to drive different
modules like LEDs, relays, etc. The pins labeled “~” can be used to generate PWM.
AREF
AREF stands for Analog Reference. It is sometimes, used to set an external
reference voltage (between 0 and 5 Volts) as the upper limit for the analog input
pins.
Arduino IDE
After learning about the main parts of the Arduino UNO board, we are ready to
learn how to set up theArduino IDE. Once we learn this, we will be ready to
upload our program on the Arduino board.
In this section, we will learn in easy steps, how to set up the Arduino IDE on our
computer and preparethe board to receive the program via USB cable.
Step 1 − First you must have your Arduino board (you can choose your favorite
board) and a USB cable. In case you use Arduino UNO, Arduino Duemilanove,
Nano, Arduino Mega 2560, or Diecimila,you will need a standard USB cable (A
plug to B plug), the kind you would connect to a USB printeras shown in the
following image.
In case you use Arduino Nano, you will need an A to Mini-B cable
instead as shown in the following image.
You can get different versions of Arduino IDE from the Download page on the
Arduino Official website.You must select your software, which is compatible with
your operating system (Windows, IOS, or Linux). After your file download is
complete, unzip the file.
The Arduino Uno, Mega, Duemilanove and Arduino Nano automatically draw
power from either, the USB connection to the computer or an external power
supply. If you are using an Arduino Diecimila, you have to make sure that the
board is configured to draw power from the USB connection. The power source is
selected with a jumper, a small piece of plastic that fits onto two of the three pins
between the USB and power jacks. Check that it is on the two pins closest to the
USB port.
Connect the Arduino board to your computer using the USB cable. The green
power LED (labeled PWR) should glow.
After your Arduino IDE software is downloaded, you need to unzip the
folder. Inside the folder, you can find the application icon with an
infinity label (application.exe). Double-click the icon to start the IDE.
Step 5 − Open your first project.
existing project
example. To create
a new project,
select File → New.
Here, we are selecting just one of the examples with the name Blink. It
turns the LED on and off with some time delay. You can select any
other example from the list.
To avoid any error while uploading your program to the board, you
must select the correct Arduino board name, which matches with the
board connected to your computer.
Go to Tools → Board and select your board.
GPIO pins in pins in Raspberry Pi are the general-purpose Input-Output pins. These pins are
to Communicate WITH OTHER circuit such as such as extension boards, custom circuits and
much more.
For getting an output, we can turn a GPIO pin HIGH or LOW.
These pins are a physical interface between the Pi and the outside world. At the
simplest level, we can think of them as switches that you can turn on or off (input) or that the
Pi can turn on or off (output). Seventeen of the 26 pins are GPIO pins. Others are power or
ground pins. Each pin can turn on or off, or go HIGH or LOW in computing terms. When the
pin is HIGH it outputs 3.3 volts (3v3) and when the pin is LOW, it is off.
We can program the pins to interact in amazing ways with the real world. Inputs don't
have to come from a physical switch. It could be input from a sensor or a signal from another
computer or device. The output can also do anything, from turning on an LED to sending
Signal or data to another device. If the Raspberry Pi is on a network, we can control devices
that are attached to it from anywhere and those devices can send data back. Connectivity and
control of physical devices over the Internet is a powerful and exciting thing and the
Raspberry Pi is ideal for this.
Case Studies
we will discuss about 2 example projects using Raspberry Pi. "The first one is is an LED and
the second one is taking a picture using PiCam. The codes for both the examples are written
in Python.
Blinking LED:
Following are the requirements for this experiment.
Raspberry pi
LED
100-ohm resistor
Bread board
Jumper cables
We need to install GPIO Library
Installing GPIO library:
▪ Open terminal
▪ Enter the command “sudo apt-get install python-dev” to install python development
▪ Enter the command “sudo apt-get install python-rpi.gpio” to install GPIO library.
Connection:
▪ Connect the negative terminal of the LED to the ground pin of Pi
▪ Connect the positive terminal of the LED to the output pin of Pi
Capture Image using
Raspberry Pi Requirement:
▪ Raspberry Pi
▪ Raspberry Pi Camera
Raspberry Pi Camera:
▪ Raspberry Pi specific camera module
▪ Dedicated CSI slot in Pi for connection
▪ The cable slot is placed between Ethernet port and HDMI port
Connection: Boot the Pi once the camera is connected to Pi
Configuring Pi for Camera
In the terminal run the command “sudo raspi-config” and press enter.
Navigate to “Interfacing Options” option and press enter.
Navigate to “Camera” option.
Enable the camera.
Reboot Raspberry pi.
Capture Image
▪ Open terminal and enter the command-
raspistill -o image.jpg
▪ This will store the image as ‘image.jpg’
PiCam can also be processed using Python camera module python-picamera
sudo apt-get install python-picamera
Python Code:
Import picamera
camera = picamera.PiCamera() camera.capture('image.jpg')
Result:
The fan is switched on whenever the temperature is above the threshold value set in the code.
UINT-8
SOFTWARE DEFINED NETWORKING
Limitations in Current Network
● Vendor-specific architecture of switches limits dynamic configuration according to
application-specific requirements.
● Switches are required to configure according to the installed operating system (OS).
● Centralized control is not feasible in traditional network.
● The exploding volumes of data traffic, complex network architecture, and growing
demands to improve network performance obsoletes the traditional approach to
network management.
Software-Defined Networking (SDN)
Software-Defined Networking (SDN) is an approach to networking that uses software-
based controllers or application programming interfaces (APIs) to communicate with
underlying hardware infrastructure and direct traffic on a network.
Origin of SDN
● 2006: At Stanford university, a team proposes a clean-slate security architecture
(SANE) to control security policies in a centralized manner instead of doing it at
edges.
● 2008: The idea of software-defined network is originated from OpenFlow
project (ACM SIGCOMM 2008).
● 2009: Stanford publishes OpenFlow V1.0.0 specs.
● June 2009: Nicira network is founded.
● March 2011: Open Networking Foundation is formed.
● Oct 2011: First Open Networking Summit. Many Industries (Juniper, Cisco announced
to incorporate.
SDN Architecture
• In traditional networks, the control and data plane are embedded together as a single
unit.
• The control plane is responsible for maintaining the routing table of a switch which
determines the best path to send the network packets and the data plane is responsible
for forwarding the packets based on the instructions given by the control plane.
• Whereas in SDN, the control plane and data plane are separate entities, where
the control plane acts as a central controller for many data planes.
• The data plane consists of network elements, which expose their capabilities to the
control plane via southbound interface.
• The SDN applications are in the application plane and communicate their
network requirements toward the control plane via northbound interface.
• The control plane sits in the middle to translate the applications' requirements and
exerts low-level control over the network elements, Provide network information to
the applications.
Data-plane
• Data sources and sinks
• Traffic forwarding/processing engine which May have the ability to handle some
types of protocol, e.g., ARP
• Provide interfaces communicating to the control plane for Programmatic control of
all functions offered by the network element, Capability advertisement, Event
notification.
Control-plane
• It is placed at Logically centralized.
• Its Core functionalities are Topology and network state information, Device
discovery, Path computation, Security mechanism, Coordination among
different controllers Interfaces to the application plane.
Application-plane
• Applications specify the resources and behaviours required from the network, with the
context of business and policy agreement.
• It may need to orchestra the objectives, (Cloudify, Unify)
• Programming languages help developing applications.
Rule Placement
The SDN controller places rules in three phases upon receiving a new flow at a switch:
(a) In the first phase, the controller determines optimal forwarding path to route the flow
from source to destination;
(b) In the second phase, the controller selects optimal switch in the selected path for exact-
match rule placement in order to get per-flow statistics;
(c) Finally, flow-rule is redistributed among the switches to accommodate new flows in
the network upon detecting rule congestion at a switch
Controller Placement
• In a distributed SDN controller architecture, multiple controllers are deployed
to minimize communication latency between the switch and the control plane.
• The controllers are strategically placed to optimize network performance.
• Controllers define flow-rule according to the application specific requirements.
• The controllers must be able to handle all incoming requests from switches.
• Rule should be placed without incurring much delay.
• Typically, a controller can handle 200 requests in a second (through a single thread).
• The controllers are logically connected to the switches in one hop distance and
physically, they are connected to the switches in multi-hop distance.
• If we have a very small number of controllers for a large network, the network might
be congested with control packets (i.e., PACKET-IN messages).
Security in SDN
• Software-defined network security involves virtualizing security functions from the
traditional hardware they tend to operate on. They enforce virtual network functions,
with data and monitoring accessible through one intuitive interface.
• The latest generation of software-defined security applications make use of
automation to better detect anomalies in network traffic and improve the
enforcement of security policies. This makes it easier to detect suspicious activity
more quickly and respond more efficiently to prevent intrusions and minimize
damage in the event of a breach.
• There is Enhanced security using SDN.
• The Security is implemented using Firewall, Proxy, HTTP, Intrusion detection system
(IDS)
(Example of potential data plane ambiguity to implement the policy chain Firewall-IDS-
Proxy in the example topology.)
In the above example:
1. When an HTTP request comes, it is first forwarded to Firewall 1(FW1).
2. From the firewall 1, it is sent to Instrusion Detection System1(IDS1)
3. From IDS1, it is sent to Proxy1.
4. Finally, it is sent from Proxy1 to outside network.
Integrating SDN in IoT
The SDN-IoT integration brings several significant benefits for IoT traffic:
These benefits result in IoT networks with integrated SDN capabilities becoming more agile,
scalable and based on demand.
In Software Defined Network data plane In traditional network data plane and
05. and control plane are decoupled by control plane are mounted on same plane.
software.
It can prioritize and block specific It leads all packets in the same way
07. network packets. no prioritization support.
It is difficult to program again and to
08. It is easy to program as per need. replace existing program as per use.
09. Cost of Software Defined Network is low. Cost of Traditional Network is high.
• A smart home refers to a convenient home setup where appliances and devices can
be automatically controlled remotely from anywhere with an internet connection
using a mobile or other networked device.
• Devices in a smart home are interconnected through the internet, allowing the user to
control functions such as security access to the home, temperature, lighting, and a
home theater remotely.
Smart Home Implementation:
Setting up of a smart home requires the fundamental technology including protocols and all
the hardware and software. Besides, you need smart devices that can be connected to the
internet on the home network. For example, cameras, motion sensors, LED lights, devices
with built- in web servers, etc. These are readily available online or at electronics
improvement stores.
Before buying such products, one has to make sure that all devices use the same technology.
If two devices use different technologies, say one uses X10 while other uses Z-Wave, then it
requires a bridging device as well as a lot of technical expertise. It is usually recommended
that one should seek professional help while designing a smart home. Technicians with CEA-
Comp TIA Certification are considered to be more proficient in installing and troubleshooting
the home networking equipment.
The cost of home automation depends on how smart the home is. The users can either keep it
basic with jut intelligent lighting or add high-tech security systems. One has to decide where
to place the nodes to have an effective routing range and plan the as it may require renovation
or rebuilding of certain portions of the house.
• Home Area Network (HAN) is a network in a user’s home where all the laptops,
computers, smartphones, and other smart appliances and digital devices are connected
into a network.
• This facilitates communication among the digital devices within a home which are
connected to the Home network.
• Home Area Network may be wired or wireless. Mostly wireless network is used for
HAN.
• Example –
Think about a home where computers, printers, game systems and tablets,
smartphones, other smart appliances are connected to each other through wired or
wireless over a network is an example of Home Area Network.
Infrastructure of HAN:
• A modem is used which is provided by an ISP to expose Ethernet to WAN. In
homes they come in DSL modem or cable modem.
• A router is used to manage connection between Home Area Network
(HAN) and Wide Area Network (WAN).
• A wireless access point is used for connecting wireless digital devices to the network.
• Smart Devices/ Digital Devices are used to connect to the Home Area Network.
Smart Home benefits
1. Managing all of your home devices from one place.
2. Flexibility for new devices and appliances.
3. Maximizing home security.
4. Remote control of home functions.
5. Increased energy efficiency.
6. Improved appliance functionality. when entertaining guests.
7. Home management insights.
8. Customize as Per our Convenience.
9. Higher quality of life.
10. Notifications in case of trouble.
11. Cost savings in the long run.
12. Smart homes may be suitable for disabled and old persons.
● A smart city is an urban system which uses information & communication technology
(ict) to make infrastructure more interactive, accessible and efficient.
● Need for Smart Cities arose due to
o Rapidly growing urban population.
o Fast depleting natural resources.
o Changes in environment and climate.
Characteristics of Smart Cities
It has been suggested that a smart city (also community, business cluster, urban
agglomeration or region) uses information technologies to:
1. Make more efficient use of physical infrastructure (roads, built environment and other
physical assets) through artificial intelligence and data analytics in order to support a
strong and healthy economic, social, cultural development.
2. Engage effectively with local governance officials by use of open
innovation processes and e-participation, improving the collective intelligence of the
city's institutions through e-governance, with emphasis placed on citizen participation
and co-design.
3. Learn, adapt and innovate and thereby respond more effectively and promptly to
changing circumstances by improving the intelligence of the city.
Smart city Frameworks
The creation, integration, and adoption of smart city capabilities require a unique set of
frameworks to realize the focus areas of opportunity and innovation central to smart city
projects. The frameworks can be divided into 5 main dimensions which include numerous
related categories of smart city development
1. Technology framework
A smart city relies heavily on the deployment of technology. Different combinations of
technological infrastructure interact to form the array of smart city technologies with varying
levels of interaction between human and technological systems.
Intelligent: Cognitive technologies, such as artificial intelligence and machine learning, can
be trained on the data generated by connected city devices to identify patterns. The efficacy
and impact of particular policy decisions can be quantified by cognitive systems studying the
continuous interactions of humans with their urban surroundings.
Ubiquitous: A ubiquitous city provides access to public services through any connected
device. U-city is an extension of the digital city concept because of the facility in terms of
accessibility to every infrastructure.
Wired: The physical components of IT systems are crucial to early-stage smart city
development. Wired infrastructure is required to support the IoT and wireless technologies
central to more interconnected living. A wired city environment provides general access to
continually updated digital and physical infrastructure. The latest in
telecommunications, robotics, IoT, and various connected technologies can then be deployed
to support human capital and productivity.
Hybrid: A hybrid city is the combination of a physical conurbation and a virtual city related
to the physical space. This relationship can be one of virtual design or the presence of a
critical mass of virtual community participants in a physical urban space. Hybrid spaces can
serve to actualize future-state projects for smart city services and integration.
Creativity: Arts and culture initiatives are common focus areas in smart city planning.
Innovation is associated with intellectual curiosity and creativeness, and various projects have
demonstrated that knowledge workers participate in a diverse mix of cultural and artistic
activities.
Learning: Since mobility is a key area of Smart city development, building a capable
workforce through education initiatives is necessary. A city's learning capacity includes its
education system, including available workforce training and support, and its cultural
development and exchange.
Humanity: Numerous Smart city programs focus on soft infrastructure development, like
increasing access to voluntary organizations and designated safe zones. This focus on social
and relational capital means diversity, inclusion, and ubiquitous access to public services is
worked in to city planning.
Conflicts Same sensor type reports different data for the same location.
Alignment
Arises when sensor data frames are converted to a
singular frame prior to transmission
Trivial features Processing of trivial data features may bring down the accuracy of the whole system
Now that we're aware of the things working in the background, you must know how smart
parking system works:
Input: Sensors, cameras and parking meters collect and transfer the information about the
vehicle and the surroundings to the parking operators.
Processing: Once, the information about the parking slot and consumer's vehicle is received,
the central server securely stores this information and informs the stakeholders about the
granting of the slot.
Output: The underlying software or application processes the data received from the
aforementioned devices and reserves a parking spot for the consumer. If the consumer has
previously booked the parking space, the software guides the driver to the same.
4. Mining:
To prevent accidents inside the mines ‐ RFID, Wi‐Fi and other wireless technologies
are used, which
● provides early warning of any disaster
● monitors air‐quality
● detects the presence of poisonous gases inside the mines
● oxygen level inside the mines.
5. Firefighting:
Sensor networks, RFID tags are used to perform
● automatic diagnosis
● early warning of disaster
● emergency rescue
● provides real‐time monitoring Hence, improves public security.
Benefits of IIoT
By harnessing IoT and advanced analytics technologies, manufacturers can:
Increase productivity and uptime.
Improve process efficiencies.
Accelerate innovation.
Reduce asset downtime.
Enhance operational efficiency.
Create end-to-end operational visibility.
Improve product quality.
Reduce operating costs.
Optimize production scheduling.
Improve overall equipment effectiveness (OEE).
Challenges of IIoT
The primary challenges in IloT include identification of objects or amount things,
manage huge of data, integrate existing infrastructures into new IloT
infrastructure and data enabling storage.
There are several safety challenges which include worker health and satety,
regulatory compliance, environmental protection and optimized operations.
Other important concerns related with IloT are information security and data privacy
protection. The devices or things can be tracked, monitored and connected. So there
are chances of attack on the personal and private data.
Though lloT provides new opportunities, new factors may cause hindrance in the path
to success such as lack of vision and leadership, lack of understanding of values
among management employees, costly sensors and inadequate infrastructure.
Difference between IIOT and IOT:
II I
OT O
T
It deals with large scale networks. It deals with small scale networks.
It handles data ranging from medium to high. It handles very high volume of data.
It requires robust security to protect the data. It requires identity and privacy.
7. https://nptel.ac.in
8. https://en.wikipedia.org
9. https://www.w3schools.com