0% found this document useful (0 votes)
106 views62 pages

Ch-1 Fundamentals of IoT

Very help full doc

Uploaded by

Patil Mangesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
106 views62 pages

Ch-1 Fundamentals of IoT

Very help full doc

Uploaded by

Patil Mangesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 62

CS-603-MJ :Internet of Things

M.Sc. Computer Science-II (From 2024-25, NEP) Semester-III

Dr. Jagdish Sangvikar


PG Co-ordinator
Department of Computer Science
VPASC College, Baramati
Savitribai Phule Pune University
M.Sc. Computer Science-II (From 2024-25) Sem-III
CS-603-MJ :Internet of Things
Objectives and Course Outcomes
Unit No. 1 Fundamentals of IOT

1.1 Concepts and Definitions of The Internet of Things (IoT),History of IoT

1.2 Characteristics, Conceptual Framework, Architectural view, technology


behind IoT, source of the IoT (Zetta), IoT Examples.

1.3 Design Principles for Connected Devices: IoT/M2M systems layers and design
standardization, Physical vs. logical design, communication technologies, data
enrichment and consolidation, ease of designing and afford ability.

1.4 Major components of IoT devices (sensors or Gateway, cloud, Analytics, User
Interface).
1.1 Concepts and Definitions of The Internet of Things (IoT), History of IoT

The Internet of Things (IoT) is a network of physical objects that are connected to the
internet and can exchange data with other devices and systems.

These objects can include anything with a sensor and a unique identifier, such as
household objects, industrial tools, smart thermostats, and fitness trackers.

The Internet of Things (IoT) describes the network of physical objects—“things”—


that are embedded with sensors, software, and other technologies for the purpose of
connecting and exchanging data with other devices and systems over the internet.

With IoT, data is transferable over a network without requiring human-to-human or


human-to-computer interactions.
A thing in the internet of things can be a person with a heart monitor implant,

A farm animal with a biochip transponder,

An automobile that has built-in sensors to alert the driver when tire pressure is low,
or any other natural or man-made object that can be assigned an Internet Protocol
address and can transfer data over a network.
An IoT system collects data from sensors installed in IoT devices and transfers that
data through an IoT gateway so it can be analyzed by an application or back-end
system.
The following four elements are incorporated into an IoT ecosystem for it to
function:
Sensors or devices
An IoT ecosystem consists of web-enabled smart devices that use embedded systems,
such as processors, sensors and communication hardware to collect, send and act on
data acquired from their environments.

Connectivity
IoT devices can communicate with one another through a network over the internet.
These devices share sensor data by connecting to an IoT gateway, which acts as a
central hub where IoT devices can send data. Before the data is shared, it can also be
sent to an edge device where it is analyzed locally.
Data analysis
Only the relevant data is used to identify patterns, offer recommendations and
identify potential issues before they escalate. Analyzing data locally reduces the
volume of data sent to the cloud, which minimizes bandwidth consumption.

IoT can also use artificial intelligence and machine learning to make data collection
processes easier and more dynamic.

Graphical user interface


A graphical user interface (UI) is typically used to manage IoT devices. For example,
a website or a mobile app can be used as an UI to manage, control and register smart
devices.
Why is IoT important?

IoT helps people live and work smarter. Consumers, for example, can use IoT-embedded
devices -- such as cars, smartwatches or thermostats -- to improve their lives.

For example, when a person arrives home, their car could communicate with the garage
to open the door; their thermostat could adjust to a preset temperature; and their
lighting could be set to a lower intensity and color.

In addition to offering smart devices to automate homes, IoT is essential to business. It


provides organizations with a real-time look into how their systems work, delivering
insights into everything from the performance of machines to supply chain and logistics
operations.
IoT enables machines to complete tedious tasks without human intervention.
Companies can automate processes, reduce labor costs, cut down on waste and improve
service delivery. IoT helps make it less expensive to manufacture and deliver goods and
offers transparency into customer transactions.

IoT continues to advance as more businesses realize the potential of connected devices
to keep them competitive.
History of IoT
•1999- The term "Internet of Things" was used by Kevin Ashton during his work at
P&G which became widely accepted

•2004 - The term was mentioned in famous publications like the Guardian, Boston
Globe, and Scientific American

•2005-UN's International Telecommunications Union (ITU) published its first report


on this topic.

•2008- The Internet of Things was born

•2011- Gartner, the market research company, include "The Internet of Things"
technology in their research
1.2 Characteristics of IoT

1. Connectivity
2. Intelligence and Identity
3. Scalability
4. Dynamic and Self-Adapting (Complexity)
5. Architecture
6. Safety
7. Self Configuring
8. Interoperability
https://www.geeksforgeeks.org/characteristics-of-internet-of-things/
https://www.tutorialspoint.com/what-are-the-characteristics-of-internet-of-things-iot
Conceptual Framework of IoT

From the book INTERNET OF THINGS by Raj Kamal


Conceptual Framework of IoT

The Internet of Things (IoT) is a concept that involves connecting a wide range of
devices and objects to the internet, allowing them to communicate, collect, and
exchange data.
Here’s a breakdown of the conceptual framework of IoT:

1. Devices and Sensors 6. Application Layer


2. Connectivity 7. Security and Privacy
3. Data Processing 8. Standards and Protocols
4. Data Storage 9. Scalability and Integration
5. Data Analysis 10. Regulatory and Ethical Conditions
1. Devices and Sensors
Sensors: Collect data from the physical world (e.g., temperature, humidity,
motion).

Actuators: Perform actions based on received data (e.g., adjust a


thermostat, turn on a light).

2. Connectivity
Networks: Various communication protocols and networks (e.g., Wi-Fi,
Bluetooth, Zigbee, LoRaWAN) facilitate data transmission between devices
and to centralized systems.

Gateways: Act as intermediaries that translate data from local networks to


cloud services or broader networks.
3. Data Processing
Edge Computing: Involves processing data closer to the source (at the edge of
the network) to reduce latency and bandwidth use.

Cloud Computing: Centralized processing of data in the cloud for more


extensive analysis,

4. Data Storage
Local Storage: Temporary storage on devices or local servers.

Cloud Storage: Long-term storage solutions that allow for scalability and access
from anywhere.
5. Data Analysis
Big Data Analytics: Techniques for analyzing large datasets to derive insights.

Machine Learning/AI: Algorithms that learn from data to predict patterns and
automate decisions.

6. Application Layer
User Interfaces: Dashboards, mobile apps, and web applications through which
users interact with IoT systems.

Services and Applications: Specific use cases like smart homes, healthcare
monitoring, industrial automation, etc.
7. Security and Privacy
Data Encryption: Protecting data in transit and at rest to ensure privacy and
integrity.

Authentication and Authorization: Ensuring that only authorized users and


devices can access and control IoT systems.
Network Security: Safeguarding communication channels and networks from
cyber threats.

8. Standards and Protocols


Communication Protocols: MQTT, CoAP, HTTP/HTTPS, etc., for efficient and
reliable communication.

Interoperability Standards: Ensuring devices from different manufacturers can


work together (e.g., IEEE 802.15.4, OCF).
9. Scalability and Integration
Scalability: The ability to handle growing amounts of data and more devices.

Integration: Connecting IoT systems with other IT systems, business processes,


and data sources.

10. Regulatory and Ethical Considerations


Compliance: Adhering to regulations and standards (e.g., GDPR, CCPA)
regarding data protection and privacy.

Ethical Implications: Addressing concerns about data misuse, surveillance, and


the impact on human behavior.
Architecture of IoT
The architecture of IoT is divided into 4 different layers i.e. Sensing Layer, Network
Layer, Data processing Layer, and Application Layer.
Sensing Layer: The sensing layer is the first layer of the Internet of Things architecture
and is responsible for collecting data from different sources. This layer includes sensors
and actuators that are placed in the environment to gather information about
temperature, humidity, light, sound, and other physical parameters. Wired or wireless
communication protocols connect these devices to the network layer.

Network Layer: The network layer of an IoT architecture is responsible for providing
communication and connectivity between devices in the IoT system. It includes
protocols and technologies that enable devices to connect and communicate with each
other and with the wider internet. Examples of network technologies that are
commonly used in IoT include WiFi, Bluetooth, Zigbee, and cellular networks such as 4G
and 5G technology. Additionally, the network layer may include gateways and routers
Data processing Layer: The data processing layer of IoT architecture refers to the
software and hardware components that are responsible for collecting, analyzing, and
interpreting data from IoT devices. This layer is responsible for receiving raw data from
the devices, processing it, and making it available for further analysis or action. The data
processing layer includes a variety of technologies and tools, such as data management
systems, analytics platforms, and machine learning algorithms.

Application Layer: The application layer of IoT architecture is the topmost layer that
interacts directly with the end-user. It is responsible for providing user-friendly
interfaces and functionalities that enable users to access and control IoT devices. This
layer includes various software and applications such as mobile apps, web portals, and
other user interfaces that are designed to interact with the underlying IoT
infrastructure.
Technology behind IoT

The most popular IoT wireless connectivity technologies and the breakdown of RF range
for each solution are:

 Short-range IoT solutions


 Mid-range IoT solutions
 Long Range IoT Solutions
Short-range solutions
Bluetooth
 Well-established short-range connectivity technology based on Wireless Personal
Area Network (WPAN) technology.
 Can connect wireless headphones or geolocation sensors, smartphones.
 Cost-effective and low power consumption.
 Was invented by Ericson in 1994 and can range upto 10 meters.
 A Bluetooth network is called a Piconet and a collection of interconnected Piconets is
called Scatternet.
RFiD : RFID (Radio-Frequency Identification) is a technology used to automatically
identify and track objects using radio waves. It involves the use of RFID tags, which are
small electronic devices that consist of a microchip and an antenna. Here’s a breakdown
of RFID technology:
How RFID Works:
1. RFID Tag:
Microchip: Contains data such as a unique
identifier or other relevant information.
Antenna: Allows the tag to receive and
transmit radio signals.

2. RFID Reader:
Sends out a radio signal to communicate
with RFID tags.
Receives data from the tag and processes
it.
3. Communication:
Passive Tags: Do not have a battery. They are powered by the radio waves from the
reader. When they receive a signal from the reader, they transmit their stored
information.
Active Tags: Have their own power source (battery) and can transmit signals to the
reader without needing external power.
Semi-Passive Tags: Have a battery to power the chip but rely on the reader’s signal
to communicate.

4. Data Transmission:
The reader sends a signal to the RFID tag, which then reflects or modulates that
signal to send data back to the reader.
Applications of RFID:

•Inventory Management: Tracking products and assets in warehouses and retail stores.
•Access Control: Managing entry to secured areas, such as buildings or rooms.
•Supply Chain Management: Monitoring the movement of goods through various stages
of production and distribution.
•Transportation and Logistics: Managing cargo and tracking vehicles.
•Personal Identification: Used in passports, ID cards, and contactless payment cards.
Advantages of RFID:

•Non-Contact Identification: RFID tags can be read without direct contact or line-of-
sight, which speeds up processes and reduces physical handling.
•Automatic Data Capture: Enables automatic and accurate data collection.
•Durability: RFID tags can be designed to withstand harsh conditions and
environments.

Disadvantages of RFID:
•Cost: RFID systems can be more expensive than other identification methods, especially
for high-frequency or active tags.

•Privacy Concerns: There are concerns about the potential for unauthorized tracking
and data access.
Medium range IoT solutions

Wi-Fi
Wi-Fi is a wireless communication technology that allows devices to connect to a
network using radio waves. It's a key technology for the Internet of Things (IoT), offering
several advantages and some challenges.
1. How Wi-Fi Works:

•Wi-Fi Networks:
• Access Point (AP): A device that connects to the wired internet and broadcasts a
wireless signal to which other devices can connect.
• Client Devices: Devices like smartphones, laptops, and IoT devices that connect to
the Wi-Fi network.

•Frequency Bands:
• 2.4 GHz: Provides wider coverage and better penetration through walls but can be
more crowded and subject to interference.
• 5 GHz: Offers faster speeds and less interference but has a shorter range and lower
penetration through obstacles.

•Data Transmission:
• Wi-Fi transmits data using radio waves, and devices communicate with each other
by sending and receiving these signals. IEEE 802.11 standard defines the
communication protocols with wifi enabled devices.
Advantages ,Challenges and Applications of Wi-Fi for IoT:

t a g e s
n
Adva andwidth
i g h b bi li ty
H v ai la n g
i d e a a t i o e n s i n
W I n te gr n a l lic Applications of WiFi
a s e of d d i t io
E
e d o fa Smart Homes
No ne Industrial IoT
Healthcare
e n g es p t i on Retail
l
Chal r Consum rference
e e
Pow and Int stion
a n g e on ge
R rk C n s
w o c e r
Net ity Con
e c u r
S
Thread
Thread is a low-power, wireless mesh networking protocol designed specifically for
connecting IoT devices in a secure and reliable manner. It was developed by the Thread
Group, a consortium of companies aiming to improve IoT connectivity.

Designed specifically for smart home products, Thread employs IPv6 connectivity to
enable connected devices to communicate between one another, access services in the
cloud, or interact with the user via Thread mobile applications.

Zigbee
 This popular wireless mesh networking standard finds its most frequent applications
in traffic management systems, household electronics, and machine industry. Built on
top of the IEEE 802.15.4 standard, Zigbee supports low data exchange rates, low
power operation, security, and reliability.
Long range IoT solutions
NB-IoT

NB-IoT (Narrowband Internet of Things) is a wireless communication technology


specifically designed for the Internet of Things (IoT) applications that require long-
range, low-power connectivity.
It is a cellular-based technology that falls under the umbrella of Low Power Wide Area
(LPWA) networks, which are optimized for IoT use cases where devices need to
communicate over long distances with minimal power consumption.

LTE-Cat M1 (LTE : Long Term Evolution)

LTE Cat M1 is a low-power wide-area network (LPWAN) connectivity standard for


connecting IoT and M2M devices with medium data rate requirements. It supports
longer battery life cycles and provides greater coverage than cellular technologies such
as 2G, 3G or LTE Cat 1.
SIGFOX

Sigfox is a wireless communication technology designed specifically for the Internet of


Things (IoT).
It focuses on providing low-power, wide-area connectivity for IoT devices.
Sigfox operates on a global network infrastructure that supports low-bandwidth, long-
range communication with minimal energy consumption.

LoRaWAN

 Lorawan is a low-power, long-range WAN protocol optimized for low power


consumption and supporting large networks with millions of devices.
 For wide area network (WAN) applications, LoRaWAN is designed to provide low-
power WAN capabilities to support low-cost, mobile and secure two-way
communication in the Internet of Things, M2M, smart city and industrial
applications.
Source of the IoT (Zetta):
Zetta is an open source platform for IoT on which we can build APIs for device
interaction. The platform is built on Node.js.

It combines REST APIs, web sockets to make data-intensive and real time applications.

Zetta platform and its characteristics


 Zetta is an open source platform, so anyone can use it free of cost. It is based on
Node.js.
 It can run on the cloud or PC or even modest development boards.
 It has easy interface and necessary programming to control sensors, actuators and
controllers.

 It allows developers to assemble smartphone apps, device apps and cloud apps.
 It is developed for data intensive and real-time applications.
 It turns any machine into API.
IoT Examples
1.3 Design Principles for Connected Devices:

IoT/M2M systems layers and design standardization


M2M architecture in IoT defines the structural framework that governs how these
devices communicate, exchange information, and collaborate seamlessly. This
architecture lays the groundwork for building robust scalable and efficient systems,
shaping the future of interconnected devices and smart technologies.

M2M refers to the communication between devices without human intervention. M2M
(Machine to Machine) architecture facilitates the transfer of information between
components and allow for operation of different devices without any difficulty. The
communication may be through wire or wireless
The M2M architecture divides IoT functions into three major domains:
1) Application layer, 2) Services layer, 3) Network layer

Applications layer: The oneM2M architecture gives major attention to connectivity


between devices and their applications. This domain includes the application-layer
protocols and attempts to standardize northbound API definitions for interaction with
business intelligence (BI) systems.

Common Services Layer: It provides a horizontal framework across vertical industry


applications, encompassing the physical network, management protocols, and
hardware necessary for IoT applications.

Network Services Layer: This layer is the communication domain for IoT devices and
endpoints, incorporating different networking standards like IEEE for efficient
communication.
The functional M2M IoT architecture includes components that communicate with each other through
reference points, ensuring seamless connectivity with the infrastructure domain. Overall, M2M IoT
arecture provides a structured approach to enable machine to machine communication.
Physical vs Logical Design:
Physical Design of IoT
The Physical design of IoT deals with the individual devices connected to the IoT
network and the protocols used to create a functional IoT environment.
Each IoT device can perform tasks of remote sensing, actuating, monitoring, etc due to
the IoT network they are connected to. These can also transmit information and share
files through different types of wireless or wired connections. They can generate data,
which is used to perform analysis and perform operations for improving the system.

Now let us understand the IoT node devices and the IoT protocols.

Node Devices
Node devices are used to build a connection, process data, and provide interfaces, and
storage, in an IoT system. They generate data that can be analyzed by the IoT system and
program to perform operations and improve the system.

Now let’s understand which devices are used for which function in an IoT system.
Connectivity: Devices like USB hosts and ETHERNET provides connectivity between the
devices and the server.

Processor: Processors like CPU and other units process the data. This is used to improve
the decision quality of an IoT system.

Audio/Video Interfaces: System interfaces like HDMI and RCA devices record audio and
videos.

Input/Output interface: Devices like UART, SPI, CAN, etc give input and output signals to
sensors and actuators.

Storage Interfaces: IoT devices like SD, MMC, and SDIO generate data. Storage interfaces
store those data.

Controlling of activity: Devices like DDR and GPU control the activity of an IoT system.
IoT Protocols

IoT communication protocols establish between a node device and a server over the
internet by sending commands to an IoT device and receiving data from an IoT device.
Both the server and client-side use different types of protocols. By network layers, they
are managed. Some of the network layers are the application, transport, network, and
link layers. It works as a building block for logical and physical design of IoT.

Some of the protocols are

Application Layer protocol- Protocols in this layer define how the data is sent over
the network. With the lower layer protocols, the application interface sends these data.
Examples include HTTP, WebSocket, XMPP, MQTT, DDS, and AMQP protocols.

HTTP (HyperText Transfer Protocol)- This protocol for transmitting media


documents in an application layer by communicating between web browsers and
servers.
WebSocket- it enables two-way communication between a client and a host and is
mostly web browsers use it.

Transport Layer- it controls the flow of data segments. It also handles error control and
provides end-to-end message transfer capability.

TCP (Transmission Control Protocol)- It establishes and maintains a network that can
exchange data using the internet protocol.

Some of the layers are

Network Layer- it is used to send datagrams from the source network to the destination
network. Some examples are IPv4 and IPv6.

Link Layer- it is used to send data over the network’s physical layer and determines
how the packets are coded and signaled by the devices.
Ethernet- It is a set of protocols used in LANs that defines the physical layer and the
medium access control for LANs.

WiFi- It is a set of LAN protocols. It specifies the set of media access controls and also
the physical layer protocols that are used for implementing wireless LANs.
Logical Design of IoT

This is the actual design of the IoT system. It illustrates the assembling and
configuration of the components i.e. computers, sensors, and actuators.
The logical design of IoT is composed of:
1. IoT functional blocks
2. IoT communications models
3. IoT communication APIs

1. IoT functional blocks


The functional blocks of IoT systems provide sensing, identification, actuation,
management, and communication capabilities to the IoT ecosystem. The devices of the
functional blocks handle the communication between the server and the host. This
enables monitoring of control functions, managing the data transfer, securing the IoT
system using authentication, and providing an interface for controlling and monitoring
various functions. It is the most crucial part of the logical and physical designs of IoT.
The Functional blocks of IoT are:

Device - Devices provide sensing, actuation, monitoring, and control functions to the IoT
ecosystem.
Communication - Manages communication for the IoT system.
Services - Services perform the functions of device monitoring, device control, data
publishing, and device discovery.
Management - gives functions to govern the IoT system.
Security - provides security to the IoT system. It performs authentication, authorization,
message and content integrity, and data security functions.

Application - An interface where the users can control and monitor various aspects of
the IoT system. It allows the users to view the system status and analyze the processed
data.
2. IoT Communication Models

The communication models of IoT are used for communicating between the system and
the server. The types of IoT communication models are

Request-Response Model - In this communication model, the client sends requests to


the server and the server responds to their requests. After receiving a request, the
server decides how to respond by fetching the data, retrieving resource representation,
preparing the response, and then sending the response to the client. The request-
response protocol between a client and a server is HTTP.

Publisher-Subscriber Model - This model is made up of three entities: Publishers,


Brokers, and Consumers.
Publishers- it is the source of data that sends the data to the topic.
Consumers- they subscribe to the topics.
Brokers- they accept data from publishers and send it to the consumers.
3. IoT communication API

There are two types of communication APIs –

REST-based communication APIs - REST stands for Representational State Transfer. It


is a set of architectural protocols by which you can design web services and web APIs.

Web Socket-Based Communication APIs - Web Socket API is the bi-directional, full-
duplex communication model between clients and servers.
communication technologies
Importance of Communication Technologies: These technologies enable devices to
exchange information efficiently, forming the backbone of IoT systems.

Types of Communication Technologies:


Wireless Technologies
Wired Technologies
Network Protocols
Wireless Communication Technologies

•Wi-Fi:
• Characteristics: High bandwidth, suitable for high-data applications.
• Applications: Smart home devices, surveillance systems.

•Bluetooth:
• Characteristics: Low energy consumption, short-range communication.
• Applications: Wearable devices, personal area networks.

•Zigbee:
• Characteristics: Low power consumption, mesh networking capability.
• Applications: Home automation, industrial control.

•LoRa (Long Range):


• Characteristics: Long-range, low power, wide area communication.
• Applications: Smart agriculture, smart cities.
Wired Communication Technologies

•Ethernet:
• Characteristics: High-speed data transfer, reliable, but less flexible than wireless.
• Applications: Industrial IoT, smart grids.

Types of Ethernet
 Fast Ethernet: 802.3 Standard with 100mbps, CAT5 cable, spans up to 100
meters.
 Gigabit Ethernet/ GigE: 802.3z, speed up to 1Gbps, spans up to 500 meters.
 10Gigabit Ethernet: IEEE 802.3ae, speed up to 10Gbps, spans up to 10000 meters.

•Power Line Communication (PLC):


• Characteristics: Utilizes existing power lines for communication.
• Applications: Smart metering, home automation.
Network Protocols

•MQTT (Message Queuing Telemetry Transport):


• Characteristics: Lightweight, efficient for low-bandwidth, high-latency networks.
• Applications: Real-time messaging in IoT systems.

•CoAP (Constrained Application Protocol):


• Characteristics: Designed for constrained devices and networks.
• Applications: Sensor networks, low-power IoT devices.

•HTTP/HTTPS:
• Characteristics: Standard web protocol, used for web-based applications.
• Applications: Cloud services, web-based IoT applications.
Data enrichment and Consolidation
Data enrichment is the process of enhancing the existing data by adding more
information to make it more accurate, valuable and insightful. It involves adding
context, integrating external data, applying algorithms, and attaching metadata.
e.g Combining the temperature sensor data with weather reports to provide context
for the readings.

Types of Data Enrichment


•Contextual Enrichment: Adding contextual information such as time, location, or
environmental conditions to raw data. For example, Enhancing temperature sensor
data with information on weather conditions and time of day.
•External Data Integration: Incorporating data from external sources like databases,
APIs, or other systems. For example, Merging IoT data with demographic or market data
to create more comprehensive insights.
•Semantic Enrichment: Adding meaning and relationships to data using ontologies and
vocabularies. For example, Mapping sensor readings to predefined standards or
classifications to enable better interoperability.
Data consolidation is the process of combining data from multiple sources, cleaning
and verifying it by removing errors, and storing it in a single location, such as a data
warehouse or database.

Techniques for Data Consolidation

•Data Aggregation: Summarizes and combines data from multiple sources into a single
view. e.g Aggregating sensor readings from various devices to create a comprehensive
environmental report.

•Data Fusion: Integrates different types of data (e.g., combining temperature and
humidity readings). For example Merging data from temperature, humidity, and air
quality sensors to assess overall environmental conditions.

•Data Integration: Unifies data from different IoT systems and platforms. e.g
Integrating data from smart home devices, energy meters, and security systems into a
centralized management platform.
Difference between Data enrichment and Consolidation
EASE OF DESIGNING AND AFFORDABILITY

Ease of designing

Design for connected devices for IoT applications, services and business processes
considers the ease in designing the devices’ physical, data-link, adaption and gateway
layer.

It means availability of SDKs (software development kits), prototype development


boards with smart sensors, actuators, controllers and IoT devices which are low in cost
and hardware which embeds and are preferably open source software components
and protocols.

The device hardware should embed minimum components.


Use ready solutions for ease in designing local devices personal area network.
Ensure secure connectivity with the internet.
Affordability

RFID or card - The card has an embedded microcontroller, memory, OS, NFC
peripheral interfaces, access point-based device activation, RF module and transceiver
at low cost.

Mote - A wireless sensor uses, for example, a mobile terminal (Mote) which is a low
cost device with an open-source OS (tiny OS) and software components. Usages of
Motes provide ease and affordance in a WSN network.

ZigBee IP or BT LE 4.2 - Devices of smart homes and cities use ZigBee IP or BT LE 4.2
(dual mode or single mode) due to their affordability, ease of designing, usage and low
cost
1.4 Major Components of IoT Devices

There are five major components of IoT.


 Devices or Sensors
 Gateway
 Cloud
 Analytics
 User Interface

Devices or Sensors
These are fitted with sensors and actuators. Sensors collect data from the environment
and give to gateway where as actuators performs the action (as directed after
processing of data).

Gateway
The sensors give data to Gateway and here some kind of pre-processing of data is even
done. It also acts as a level of security for the network and for the transmitted data.
Cloud
The data after being collected is uploaded to cloud. Cloud in simple terms is basically a
set of servers connected to internet 24*7.

Analytics
The data after being received in the cloud processing is done . Various algorithms are
applied here for proper analysis of data (techniques like Machine Learning etc are even
applied).

User Interface
User end application where user can monitor or control the data.
Thank you

You might also like