0% found this document useful (0 votes)
11 views61 pages

CIOT Unit - 2

The document outlines the concepts of the Internet of Things (IoT), including its application areas, building blocks, and characteristics. It discusses various standardization efforts by international organizations such as IETF, ITU-T, and ETSI, focusing on modified OSI models for IoT/M2M systems and their architectural layers. Additionally, it covers communication technologies and protocols essential for IoT, including NFC, RFID, Bluetooth, ZigBee, and Wi-Fi.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views61 pages

CIOT Unit - 2

The document outlines the concepts of the Internet of Things (IoT), including its application areas, building blocks, and characteristics. It discusses various standardization efforts by international organizations such as IETF, ITU-T, and ETSI, focusing on modified OSI models for IoT/M2M systems and their architectural layers. Additionally, it covers communication technologies and protocols essential for IoT, including NFC, RFID, Bluetooth, ZigBee, and Wi-Fi.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 61

Concepts of Internet of Things

Course Objectives:
From the course the student will learn
The application areas of IOT
The revolution of Internet in Mobile Devices,
Cloud & Sensor Networks
Building blocks of Internet of Things and
characteristics
Text Books:
1. Internet of Things: Architecture, Design Principles
And Applications, Rajkamal, McGraw Hill Higher
Education
2. Internet of Things, A.Bahgya and V.Madisetti,
Univesity Press, 2015

Reference Books:
1. Designing the Internet of Things, Adrian McEwen
and Hakim Cassimally, Wiley
2. Getting Started with the Internet of Things,
CunoPfister , Oreilly
UNIT–II
Business Models for Business Processes in the Internet of Things,
IoT/M2M systems LAYERS AND designs standardizations,
Modified OSI Stack for the IoT/M2M Systems ,ETSI M2M
domains and High-level capabilities, Communication
Technologies, Data Enrichment and Consolidation and Device
Management Gateway Ease of designing and affordability
UNIT–II
2.0. IoT/M2M SYSTEMS, LAYERS AND DESIGNS
STANDARDISATION

A number of international organisations have taken action for


IoT design standardisation.
Following are the examples:
Internet Engineering Task Force (IETF), an international body
initiated actions for addressing and working on the
recommendations for the engineering specifications for the
Internet of Things. IETF suggests the specifications for the
layers, and the engineering aspects for the IoT communication,
networks and applications (6 Layers)
 International Telecommunication Union for Telecommunication
(ITU-T) suggested a reference model for IoT domain, network and
transport capabilities for the IoT services and the applications at
the application and application-support layers (4 Layers)
 European Telecommunication Standards Institute (ETSI) initiated
the development of a set of standards for the network, and devices
and gateway domains for the communication (2 Layers)
 Open Geospatial Consortium (OGC), an International Industry
Consortium, has also suggested open standards for sensors’
discovery, capabilities, quality and other aspects with support to
geographical information web support
2.1 Modified OSI Model for the IoT/M2M Systems
Gather + Enrich + Stream + (Manage + Acquire + Organise
+Analyse) = IoT Applications and Services

Seven-layer generalised OSI model (on left) and IETF six layer
modified OSI model for IoT/ M2M (in the middle
A classical seven-layer OSI model (on the left) and the
modifications in that model proposed by IETF (in the middle).
Data communicates from device end to application end. Each
layer processes the received data and creates a new data stack
which transfers it to the next layer. The processing takes place
at the in-between layers, i.e. between the bottom functional-
layer to the top layer. Device end also receives data from an
application/service after processing at the in-between layers.
New applications and services are present at the application layer
6. A modification to this is that the application-support layer 5
uses protocols, such as CoAP. IoT applications and services
commonly use them for network communication. The CoAP
protocol at the layer is used for the request/response interactions
between the client and server at the network. Similarly, the
application-support layer may include processes for data
managing, acquiring, organising and analysing which are mostly
used by applications and services.

Modifications are also at the data-link layer 2 (L2) and physical


layer 1 (L1). The new layers are data-adaptation (new L2) and
physical cum data-link (new L1). The data adaptation layer
includes a gateway. The gateway enables communication
between the devices network and the web.
Q) What are the architectural layers in a modified OSI model
for Internet of smart streetlights application.
Consider a model for Internet of streetlights. Following are the layers for
data interchange in the modified OSI model:
● L1: It consists of smart sensing and data-link circuits with each
streetlight transferring the sensed data to L2.
● L2: It consists of a group-controller which receives data of each group
through Bluetooth or ZigBee, aggregates and compacts the data for
communication to the Internet, and controls the group streetlights as per
the program commands from a central station.
● L3: It communicates a network stream on the Internet to the next layer.
● L4: The transport layer does device identity management, identity
registry and data routing to the next layer
● L5: The application-support layer does data managing, acquiring,
organising and analysing, and functionalities of standard protocols such as
CoAP, UDP and IP.
● L6: The application layer enables remote programming and issue of
central station directions to switch on-off and commands of services to the
controllers along with monitoring each group of streetlights in the whole
city.
2.2 ITU-T(International Telecommunication Union for
Telecommunication) Reference Model

ITU-T reference model RM1, its correspondence with six layers


of modified OSI and a comparison with seven levels suggested
in CISCO IoT reference model RM2
RM1 considers four layers, which are:
Lowest layer, L1, is the device layer and has device and
gateway capabilities.
Next layer, L2, has transport and network capabilities.
Next layer, L3, is the services and application-support layer.
The support layer has two types of capabilities—generic and
specific service or application-support capabilities.
Top layer, L4, is for applications and services.
ITU-T recommends four layers, each with different capabilities. A
comparison of ITU-T
RM1 with the six-layer OSI model can be made as follows:
● RM1 device layer capabilities are similar to data-adaptation and
physical cum datalink layers.
● RM1 network layer capabilities are similar to transport and network
layers.
● RM1 upper two layer capabilities are similar to top two layers.
A comparison with the CISCO IoT reference model (RM2) can be
made as follows:
● RM1 L4 capabilities are similar to RM2 collaborations and processes,
and application top two levels.
● RM1 L3 capabilities are similar to RM2 three middle-level functions
of data abstraction, accumulation, analysis and transformation.
● RM1 L2 layer capabilities are similar to RM2 functions at
connectivity level.
● RM1 L1 device layer capabilities are similar to RM2 functions at
physical devices level
Q) What are the architectural layers in ITU-T reference model
for Internet of RFIDs application?
Consider a model for Internet of RFIDs. Following are the
capabilities of the layers and data interchange in the ITU-T
reference model.
Layer 1: Device and gateway capabilities are present in the RFID
physical device cum RFID reader which acquires the ID data, and
communicates the enriched data according to a wireless protocol
to an access point (AP).
Layer 2: Transport and network capabilities are present at access
network consisting of APs and Internet connectivity to servers.
Layer 3: Services and application-support layer capabilities at
server are RFID device’s registry, ID management, RFIDs data
routing to server or data centre, data analysis for the time-series
device presence and device tracked positions.
Layer 4: Services and applications of RFIDs are tracking,
inventory control of goods and business processes; for example,
supply-chain management.
2.3. ETSI (European Telecommunication Standards Institute) M2M
Domains and High-level Capabilities

ETSI M2M domain architecture and its high-level capabilities, and its
correspondences with six layers of modified OSI and four layers of ITU-T
reference model
Figure shows ETSI M2M domains and architecture, and the high-
level capabilities of each domain. It also shows that the
architecture correspondences with the six-layer modified OSI
model as well as the four layers of the ITU-T reference model.
The ETSI network domain has six capabilities and functions:
1. M2M applications
2. M2M service capabilities
3. M2M management functions
4. Network management functions
5. CoRE network (for example, 3G and IP networks, network
control functions, interconnections among networks)
6. Access network (for example, LPWAN (low power wide area
network), WLAN (Wi-Fi) and WiMax networks
The ETSI device and gateway domain has the following functional
units:
● Gateway between M2M area network, and CoRE and access
network, possessing 2M service capabilities and applications
● M2M area network (for example, Bluetooth, ZigBee NFC, PAN,
LAN)
● M2M devices
What are domains and their service capabilities in ETSI high-
level architecture for applications and services in Internet of
ATM machines?
ETSI high-level architecture for applications and services in Internet
of ATM machines has two domains:
● Device and gateway domain: Device refer to cards and ATMs,
while ATM service capabilities and ATM applications are present at
the ATM gateway. The gateway has system for acquiring the card as
well as banking data. Data interchange between an ATM machine and
the bank server takes place through the gateway. The domain has cash
dispensing and surveillance systems. All the ATM systems network
through an access network. The gateway communicates the data after
enriching and transcoding according to the network protocol between
an AP and data for the machine. A domain subsystem monitors cash
dispensing and other services.
● Applications and network domain: Application and network domain
has two functional units—ATM management functions and network
management functions. It has banking applications and service
capabilities for the ATMs. It communicates with the bank CoRE
network which connects all the access networks of ATM gateways.
COMMUNICATION TECHNOLOGIES
 Physical cum data-link layer in the model consists of a local area
network/personal area network. A local network of IoT or M2M
device deploys one of the two types of technologies—wireless or
wired communication technologies.
 Figure shows connected devices (1st to ith) connectivity using
different technologies for communication of data from and to
devices to the local network connectivity to a gateway
 Figure shows number of devices present in an IoT or M2M
devices network. The connectivity between the devices (left-hand
side) is by using RF, Bluetooth Smart Energy, ZigBee IP, ZigBee
NAN (neighbourhood area network), NFC or 6 LoWPAN or
Tens of bytes
communicate at an
instance between the
device and local devices
network. Following
subsections describe the
technologies and standards
recommended for the
communication

Connected devices 1st to ith connected to the local network and


gateway using the WPAN or LPWAN network protocols
Wireless Communication Technology
 Near-Field Communication
 Radio Frequency Identification (RFID)
 Bluetooth BR/EDR and Bluetooth Low Energy
 ZigBee IP/ZigBee SE 2.0
 Wi-Fi
 GPRS/GSM Cellular Networks-Mobile Internet
 Wireless USB
Wired Communication Technology
 UART/USART Serial Communication
 Serial Peripheral Interface
 I2C Bus
 Wired USB
 Ethernet
1. NFC (Near Field Communication) wireless communication
technology
 Range of functioning is 10 cm-20 cm Data exchange between
devices
 The device can also communicate with Bluetooth and Wi-Fi
devices in order to extend the distance from 10 cm to 30 m or
higher
 Examples: proximity card reader/RFID/ IoT/ M2M/Mobile
device, mobile payment wallet, Car electronic key, house or
office entry key, Biometric passport reader. Transmit and
receive data at same instant
 Can generate RF fields for the nearby passive device such as
passive RFID
 Check the RF field and detect collision of transmitted signal
 Check collision when the received signal does not match with
the transmitted signal
 NFC device can receive and pass the data to a Bluetooth
connection or standardized LAN or Wi-Fi using the information
handover functions
 Data transfer rates 106 kbps, 212 kbps, 424 kbps and 848 kbps
 Setup time 0.1s
NFC Devices Communication 3 Modes
 P2P (point to point) mode Both devices use the active
devices in which RF fields alternately generate when
communicating,
 Card-emulation mode
Communication without interruption for the read and write as
required in a smart card and smart card reader
(iii) Reader mode Device using NFC reads passive RFID device.
The RF field is generated by active NFC de-vice. This enables
passive device to communicate.
2. RFID
 Radio Frequency Identification (RFID) is an automatic
identification method.
 RFIDs use the Internet.
 RFID usage is, therefore, in remote storage and retrieval of data
is done at the RFID tags.
 An RFID device functions as a tag or label, which may be
placed on an object.
 The object can then be tracked for the movements.
 The object may be a parcel, person, bird or an animal.
 IoT applications of RFID are in business processes, such as
parcels tracking and inventory control, sales logins and supply-
3. Bluetooth BR/EDR and Bluetooth
 Bluetooth
Low Energydevices follow IEEE 802.15.1 standard protocol for
L1 (physical cum data-link layer).
 Bluetooth BR (Basic Rate 1)
 Bluetooth EDR (Enhanced Data Rate 2 Mbps and 3 Mbps)
 Bluetooth Low Energy (BT LE 1Mbps) two types of modes for
the devices in the lateBluetooth v4.2. BT LE (Bluetooth Smart)
two types of modes for the devices in the latest version
 BT LE range is 150 mts at 10 mW power output, data transfer
rate is 1 Mbps and set-up time < 6s
 Its features are:
 Auto-synchronisation between mobile and other devices when
both use BT.
 BT network uses features of self-discovery, self-configuration
and self-healing.
 Support to NFC pairing for low latency in pairing the BT
devices.
How does the Bluetooth layer provide confidentiality and
authorisation
A standard algorithm AES (Advanced Encryption Algorithm)
based on symmetric 128-bit block data encryption and CCM
mode (Counter with CBC-MAC) provides the confidentiality
and authorisation. CBC stands for cryptographic block cipher
with a block length of 128 bits. CCM is a method which
provisions for the authenticated encryption algorithm for
confidentiality and authentication
4. ZigBee IP/ZigBee SE 2.0
 ZigBee Protocols for WPAN devices network
 ZigBee IP: an enhancement for the IPv6 connectivity
 ZigBee IP RFD (reduced function device) (functions for the
‘sleepy’/ battery-operated device)
 Sleepy means one that wakes up infrequently, sends data then
goes back to sleep ZigBee NAN (Neighbourhood Area Network)
 A version for Smart Grid
 ZigBee SE 2.0 energy management and energy efficiency
capabilities using the IP network
 Range is 10 to 200 m data transfer rate 250 kbps, low power
operation,
 ISM band frequencies direct sequence spread spectrum 16-
channel radio
The features of ZigBee IP are:
 Self configuring
 Self healing
 Dynamic pairing mesh network
 Support for both multicast and unicast options
 Provides link level security using AES-CCM-128 ( 2.4 GHz
ISM band frequency hopping spread spectrum (FHSS in BT
BR/EDR)
 Direct sequence spread spectrum (DSSS in LE) 40-channel
radio (2400 – 2483.5 MHz)
5. WiFi
 WiFi an interface technology based on IEEE 802.11 protocol
 Wireless Local Area Networks (WLANs)
 Three main applications and connectivity through home access
Point, public hotspots, enterprises, universities and offices.
 Wi-Fi enables Internet Connectivity of distributed WLAN
networks
WiFi Features
 Generally the 2.4 GHz IEEE 802.11b adapter or 5 GHz
(802.11a or 802.11g) or 802.11n or other 802.11 series
protocols,
 Interfaces use 2.4 GHz or 5 GHz antenna.
 offers mobility and roaming
 have easy installation simplicity and flexibilitEasy installation
simplicity and flexibility,
 Coverage range 30 m to 125 m,
 Limited coverage version 802.11a which coexists with b and g,
 Other versions 802.11b, 802.11g for high data rates up to 54
Mbps, and 802.11n
 Interoperability with wireless as well as wired infrastructure
 Ensures compatibility and enables easier access and hide
complexity when enabling the wireless access to data, media
and streams, applications and services
6. GSM, GPRS, UMTS/ LTE and WiMax
 Mobile phones provisions for the USB wired port, BT and Wi-
Fi devices
 Wireless Internet connectivity using GSM, GPRS, UMTS/
LTE and WiMax services of Mobile service provider and Wi-
Fi using PCMCIA card
7. Wireless USB
 Wireless extension of USB 2.0 and it operate at UWB (ultra
wide band) 5.1 GHZ to 10.6 GHz frequencies. It is for short-
range personal area network (high speed 480 Mbps 3 meter or
110 Mbps 10 meter channel).

Wireless USB Features


A host wire adapter (HWA) and a device wire adapter (DWA)
wireless USB solution
Supports the dual-role devices (DRDs). A device can be a USB
device as well as limited capability host.
Wired Communication Technology

Serial and Parallel Communication


Serial means one bit after another in successive time intervals
over a wire
Parallel all bits in a word at the same times communicate at
different wires
Use of a Bus for communication
Bus: a common set of signals connected to number of devices
Each device is assigned distinct address and Source device
specifies a destination address
But at a given instance, only one pair of devices communicate
over the bus
Two modes: Asynchronous and Synchronous communication
Asynchronous means all bytes in a data frame may transmit
with variable time-interval spacing or phase difference
Synchronous means all bytes in a frame transmit with equal
time interval spacing or phase difference
Wired Communication Technologies
(i) Serial asynchronous communication, for example, UART
interface
(ii) Synchronous serial-communication devices, for example,
SPI interface, and
(iii) Parallel input, output and input-output ports in devices.
Wired communication Examples
 UART/USART Serial Communication
 Serial Peripheral Interface
 I2C Bus
 Wired USB
 Ethernet
1. UART (Universal Asynchronous Receiver and Transmitter)
Serial asynchronous communication (transmission) of 8 bits
serially
A start bit at start of transmission of a byte on serial TxD
(Transmitter Data) output line
An additional bit appends between stop bit and last bit of the
byte
USART (Universal Synchronous/ Asynchronous Receiver and
Transmitter)
Two modes: Synchronous/Asynchronous
Mode 1: Synchronous means all bytes in a frame transmit with
equal time interval spacing and a set of sync code bits between
successive bytes;
Mode 2: Asynchronous mode as UART
2. SPI (Serial Peripheral Interface) Bus
ICs mutually network through four set of signals
SCLK, MISO, MOSI, and SS (slave select) on four wires
Master input slave output (MISO) and master output slave input
(MOSI) for synchronous serial bits I/Os at the master and slave

 Master input slave output (MISO) and master output slave
input (MOSI) are synchronous serial bits I/Os at the master
and slave
 IOs as per synchronizing clock signal of the master at SCLK

3. I2C (Inter-Integrated Circuit) Bus


ICs mutually network through a common synchronous serial
bus
Four potential modes of operation (master transmit, Master
receive, slave transmit and slave receive) Three I2C bus
standards: Industrial 100 kbps I2C, 100 kbps SM I2C, and 400
kbps I2C
 I2C Bus has two lines that carry the signals— one for the
clock and one bi-directional data
4. Wired USB
 Universal Serial Bus (USB) is for fast serial transmission and
reception between the hosts, the embedded system and
distributed serial devices;
 for example, like connecting a keyboard, printer or scanner.
USB is a bus between the host system and a number of
interconnected peripheral devices.
 Maximum 127 devices can connect with a host. USB
standard provides a fast (up to 12 Mbps) as well as a low-
speed (up to 1.5 Mbps) serial transmission and reception
 Both the host and device can function in a system.
 USB three standards are USB 1.1 (1.5 and 12 Mbps), 2.0
(mini size connector) 480 Mbps, 3.0 (micro size connector)
5 Gbps and 3.1 (super speed 10 Gbps).
Features of a USB are:
 USB data format and transfer serial signals are Non Return to
Zero (NRZI) and the clock is encoded by inserting
synchronous code (SYNC) field before each packet.
 The receiver synchronises bit recovery clock continuously.
 The data transfer is of four types—controlled data transfer,
bulk data transfer, interrupt driven data transfer and
isosynchronous transfer.
 USB is a polled bus. Polling mode functions as: A host
controller regularly polls the presence of a device as
scheduled by the software.
 It sends a token packet.
 The token consists of fields for type, direction, USB device
address and device end-point number. T
 The device does handshaking through a handshake packet,
indicating successful or unsuccessful transmission.
 A CRC field in a data packet permits error detection.
 A USB supports three types of pipes—Stream with no USB-
defined protocol is used when the connection is already
established and the data flow starts.
 Default control is for providing access.
 Message is for control functions of the device.
 The host configures each pipe with the data bandwidth to
be used, transfer service type and buffer sizes.
5. Ethernet Bus
Uses wired bus topology
Transmission speeds: 10 Mbps, 100 Mbps (Unshielded and
Shielded wires)
1 Gbps (high-quality coaxial cable)
4 Gbps (in twisted pair wiring mode)
0 Gbps (fiber-optic cable)
Uses 48-bit MAC addresses assigned distinctly to each device or
computer on the LAN.
Address Resolution Protocol (ARP) resolves 32 bit IP addresses
at Internet Application into the 48 bit destination host media
address when receiving data from Internet protocol.
DATA ENRICHMENT, DATA CONSOLIDATION AND
DEVICE MANAGEMENT AT GATEWAY
Adaptation layer 2
Includes a Gateway between adaptation layer and network layer
Gateway enables communication between devices network and
web server/cloud.
A gateway at a data-adaptation layer has several functions. These
are
data privacy
data security
data enrichment
data consolidation
transformation and device management
IoT or M2M gateway consisting of data enrichment and consolidation, device management
and communication frameworks at the adaptation layer
 Gateway consists of the data enrichment, consolidation and
IoT communication frameworks.
 The gateway includes two functions viz.
 Data management and consolidation
 Connected device management.
a) Data Management and Consolidation Gateway

Gateway includes the provisions for one or more of the following


functions:
● Transcoding
● Privacy, security
● Integration
● Compaction and fusion
Transcoding
 Transcoding means data adaptation, conversion and change
of protocol, format or code using software.
 The gateway renders the web response and messages in
formats and representations required and acceptable at an IoT
device.
 The IoT device requests are adapted, converted and changed
into required formats acceptable at the server by the
transcoding software.
 For example, use of transcoding enables the message request
characters to be in ASCII format at the device and in
Unicode at the server.
 A transcoding proxy can execute itself on the client system or
the application server.
 A transcoding proxy has conversion, computational and
analysing capabilities, while a gateway has conversion and
computational capabilities only.
Privacy
 Data such as patient medical data, data for supplying goods
in a company from and to different locations, and changes
in inventories, may need privacy and protection from
conscious or unconscious transfer to untrustworthy
destinations using the Internet.
 Privacy is an aspect of data management and must be
remembered while designing an application.
 The design should ensure privacy by ensuring that the data
at the receiving end is considered anonymous from an
individual or company.
Following are the components of the privacy model:
● Devices and applications identity-management
● Authentication
● Authorisation
● Trust
● Reputation
Secure Data Access
 Access to data needs to be secure.
 The design ensures the authentication of a request for data
and authorisation for accessing a response or service.
 It may also include auditing of requests and accesses of the
responses for accountability in future.
 End-to-end security is another aspect while implies using a
security protocol at each layer, physical, logical link and
transport layers during communication at both ends in a
network.
Data Gathering and Enrichment

 IoT/M2M applications involve actions such as data-


gathering (acquisition), validation, storage, processing,
reminiscence (retention) and analysis.
 Data gathering refers to data acquisition from the
devices/devices network.
 Four modes of gathering data are:
1. Polling refers to the data sought from a device by
addressing the device
Example: waste container filling information in a waste
management system.
2. Event-based gathering refers to the data sought from the
device on an event;
Example: when the device reaches near an access point or a card
reaches near the card reader or an initial data exchange for the
setup of peer-to-peer or master-slave connection of BT device
using NFC
3. Scheduled interval refers to the data sought from a device at
select intervals
Example: Data for ambient light condition in Internet of
streetlights
4. Continuous monitoring refers to the data sought from a
device continuously;
Example: Data for traffic presence in a particular street ambient
light condition in Internet of streetlights Data enrichment
refers to adding value, security and usability of the data.
Energy Dissipation in Data Dissemination

Data Enrichment means


Adding value
Security and
Usability of the data
Data Dissemination: Prior Actions
i.Aggregation of joining together present and previously
received data.
ii.Compaction making information short without changing
the meaning or context
iii.Fusion means formatting the information received in parts
through various data frames and several types of data (or data
from several sources)

Energy Dissipation due to Data Dissipation


Higher the data rate, the greater will be the energy consumed
Higher is the radio frequency used, the greater will be the
energy consumed
Energy efficient computations by using concepts of data
aggregation, compaction and fusion
b) Device-management Gateway
Device Management (DM) means provisioning for the device
ID or address which is distinct from other resources, device
activating, configuring (managing device parameters and
settings), registering, deregistering, attaching and detaching
Gateway functions for device management are:
Does forwarding function when the DM server and device can
interact without reformatting or structuring
Does protocol conversion when the device and DM server use
distinct protocols
Does proxy function in case an intermediate pre-fetch is required
in a lossy environment or network environment needs
EASE OF DESIGNING AND AFFORDABILITY
Ease of Designing
 Design for connected devices for IoT Applications, Services and
business processes
 Designer considers the ease in designing the devices physical, data
link, adaption layers and gateway
 Means availability of sensors, actuators, controllers and IoT devices
 Low in cost and hardware
 Use preferably open source software component Device hardware
should embed minimum of components
 Use ready solutions for ease in designing local devices personal
area network
 Ensure the secure connectivity with the Internets and protocols
Affordability of IoT devices
For example, RFID or card
The card: An embedded microcontroller, memory, OS, NFC
peripheral interfaces, access point based device activation, RF
module and transceiver and all that at low cost
For example, Wireless sensors use Mote (mobile terminal)
Mote: Low cost devices with open source OS (tiny OS) and
software components
Provides ease and affordance in the WSN networks
Devices of smart homes and cities
Use ZigBee IP or BT LE 4.2 (dual mode or single mode) or WiFi
Due to their affordability,
Ease of designing, usage and low cost
Thank you

You might also like