IoT ppt-1
IoT ppt-1
{
(IoT)
Outline
1. Vision 12. IoT Examples
2. Definition of IoT 13. Components of IoT
3. IoT Evolution 14. Applications of IoT
4. C h a ra c t e ri s t i c s of IoT 15. Design Principles for Connected
5. Benefits/Drawbacks of IoT Devices
6. Conceptual Framework of IoT 16. IoT/M2M Systems Layers
7. Design Principles of IoT 17. Design Standardization
For example just putting an Ethernet socket into a chair is not sufficient. Your chair
might collect information about how often you sit on it and for how much time.
Also not that the presence of things also means that it can produce outputs into your
world with “actuators” some of these outputs could be triggered by data that has
been collected and processed on the internet so your chair might vibrate to tell you
that you have received an email.
ECG sensor
Internet
Motion sensor
Motion sensor
Motion sensor
IoT: Things Connecting with Things
Unique identity
Interconnectivity
Heterogeneity
Intelligence
Enormity of scale
Benefits of IoT/Drawbacks of IoT
Efficient resource utilization Security Flaws
Saves time
Associated Costs
Human efforts & errors
Security
Power Supply Dependence
User friendly/easy to use
Network Dependence
Cost reduction High Skill requirements
Business opportunities
Conceptual
Framework
CONNECTIVITY LAYER: This layer includes all physical
devices involved in the framework and the interconnection among
them. This layer also involves assigning of low range networking
devices like sensors, actuators, RFID tags etc and resource
management checks the availability of physical resources of all the
devices and networks involved in the underlying infrastructure. Also
called as Sensing layer.
(directly or indirectly), or
Collect data from other devices and process the data locally,
or
Send the data to centralized servers or cloud-based
application back-ends for processing the data, or
Perform some tasks locally and other tasks within the IoT
1. Functional Blocks
2. Communication Models
Communication
This block handles the communication between the
client and the cloud-based server and
sends/receives the data using protocols.
Services
This functional block provides some services like
monitoring and controlling a device and publishing
and deleting the data and restoring the system.
Management
This functional block provides various functions that
are used to manage an IoT system.
Security
This block is used to secure an IoT system using
some functions like authorization, data security, Fig:- IoT Functional model
authentication, 2-step verification, etc.
IoT system consists of many functional blocks that
Application provide the system capability for identification,
It is an interface that provides a control system that communication, sensing, management, security and
use by users to view the status and analyze of
system.
actuation.
IoT Communication Models
Example
When we search a query on a browser then the browser
submits an HTTP request to the server and then the server
returns a response to the browser(client).
IoT Communication Models
Publish-Subscribe Communication
Model
Example
On the website many times we subscribed to their
newsletters using our email address. these email
addresses are managed by some third-party services
and when a new article is published on the website it is
directly sent to the broker and then the broker sends
these new data or posts to all the subscribers.
IoT Communication Models
Push-Pull Communication Model
It is a communication model in which the data push by the
from the queues. here also producers are not aware of the
Example
connection setup.
IoT Communication APIs
API stands for application programming interfaces.
It is a set of functions, protocols, routines and tools used for building application software.
These APIs like REST and Web Socket are used to communicate between the server and system in IoT.
REST-Based Communication APIs
Representational state transfer (REST) API uses a set of architectural principles that used to design web services and web APIs. these APIs
focus on the systems' resources that how resource states are transferred using the request-response communication model .
this API uses some architectural constraints.
1. Client-Server
Here the client is not aware of the storage of data because it is concerned about the server and similarly the server should not be concerned
about the user interface because it is a concern of the client. and this separation is needed for independent development and updating of
server and client, no matter how the client is using the response of the server and no matter how the server is using the request of the client.
2. Stateless
It means each request from the client to the server must contain all the necessary information to understand by the server, because if the
server can't understand the request of the client then it can't fetch the request data in a proper manner.
3. Cacheable
In response, if the cache constraints are given then a client can reuse that response in a later request. it improves the efficiency and scalability
of the system without loading the extra data.
A RESTful web APIs is implemented using HTTP and REST principles.
2. Cloud Computing : It provides us the means by which we can access applications as utilities over the internet. Cloud means something
which is present in remote locations. With Cloud computing, users can access any resources from anywhere like databases, web servers, storage, any
device, and any software over the internet.
Characteristics – Broad network access, On demand self-services, Rapid scalability, Measured service, Pay-per-use
3. Big Data Analytics : It refers to the method of studying massive volumes of data or big data. Collection of data whose volume, velocity
or variety is simply too massive and tough to store, control, process and examine the data using traditional databases.
Big data is gathered from a variety of sources including social network videos, digital images, sensors and sales transaction records.
Several steps involved in analyzing big data – Data cleaning, Munging, Processing, Visualization.
Examples – Bank transactions, Data generated by IoT systems for location and tracking of vehicles, E-commerce and in Big-Basket, Health and fitness
data generated by IoT system such as a fitness bands.
4. Communications Protocols : They are the backbone of IoT systems and enable network connectivity and linking to applications.
Communication protocols allow devices to exchange data over the network. Multiple protocols often describe different aspects of a single
communication. A group of protocols designed to work together is known as a protocol suite; when implemented in software they are a protocol stack.
They are used in Data encoding, Addressing schemes.
5. Embedded Computing : It is a combination of hardware and software used to perform special tasks.It includes microcontroller and
microprocessor memory, networking units (Ethernet Wi-Fi adapters), input output units (display keyword etc. ) and storage devices (flash memory). It
collects the data and sends it to the internet. Embedded systems used in
Examples – Digital camera, DVD player, music player, Industrial robots, Wireless Routers etc.
6. User Interfaces: It is always desirable to have the best GUI for all devices. Same rule applies to IoT devices also. The end user should
be provided with either a mobile application or with a web application for this.
Sources of IoT
Applications of M2M
The applications of M2M cover many areas and the areas in which M2M is currently used are given below:
a. Security : Surveillances, Alarm systems, Access control, Car/driver security
b. Tracking & Tracing : Fleet Management, Order Management, Pay as you drive, Asset Tracking, Navigation, Traffic information, Road
tolling, Traffic optimization/steering
c. Payment : Point of sales, Vending machines, Gaming machines
d. Health : Monitoring vital signs, Supporting the aged or handicapped, Web Access Telemedicine points, Remote diagnostics
e. Remote Maintenance/Control : Sensors, Lighting, Pumps, Valves, Elevator control, Vending machine control, Vehicle diagnostics
f. Metering : Power, Gas, Water, Heating, Grid control, Industrial metering
g. Manufacturing : Production chain monitoring and automation
h. Facility Management : Home / building / campus automation
IoT v/s M2M
IoT Examples
Things are getting smarter day by day. Present day phones have 14 sensors and more some of the
examples put under IoT category or as follows:-
1. Wind turbines: A wind turbine can contain about 400 sensors. The sensors can deliver information like
the wind's speed, its direction, temperature, vibration, noise level etc. to wind turbines. This data,
nowadays is packaged and shipped into the cloud.
2. Machines for farming: All equipment related to farming are fitted with sensors only.
3. Clinical Analysers: Hematology analysers used in clinics are also based on IoT. For example sysmex
XE-5000 reports 31 whole blood parameters at a rate of 150 samples per hour.
4. Alarm: The alarm makes you get up in time for you to catch the train. This is checked by the clock with
the train timings online.
5. Medicine time: A blinking light might alert you about your medicine time.
6. Smart cities: IoT has made remarkable progress for smart cities by providing smart buildings, smart
power, smart water, better air quality, noise control and monitoring, traffic congestion control, smart
streetlights, smart parking and smart communications.
7. Safe home security system, water level monitoring, digital clock, street light control, motor speed
control, home automations are some of the areas where IoT has contributed a lot.
8. Present day Artificial Intelligence(ML+DL) applications along with IoT has proved to be very useful.[
9. Researchers have found 5G as a driving force for IoT.
Components of IoT
Components of IoT
1. Things or Devices :
The key physical items being tracked are Things or Devices. Smart sensors are connected to things/devices which further continues to collect data
from the device and send it to the next layer, which is the portal or also called as the gateway Small smart sensors for a variety of applications are now
possible because of new advancements in microelectronics. Some commonly used sensors are:
Temperature sensors and thermostats, Pressure sensors, Humidity / Moisture level, Light intensity detectors, Moisture sensors, Proximity detection,
RFID tags
2. Network Interconnection :
Over the past few years, the IoT has seen massive growth in devices controlled by the internet and connected to it. Although IoT devices have a wide
variety of uses, there are some common things among them also along with the differences between them. IoT is enabled by a variety of technologies.
The network used to communicate with other devices in an IoT deployment is critical to the field, a position that numerous wireless or wired
technologies can fill.
3. Cloud :
Cloud storage is used to store the data which has been collected from different devices or things. Cloud computing is simply a set of connected servers
that operate continuously(24*7) over the Internet. IoT devices, applications, and users generate massive amounts of data, which must be managed
efficiently. Data collection, processing, management, and archiving are among the responsibilities of IoT clouds. The data can be accessed remotely by
industries and services, allowing them to take critical decisions at any time. In the simplest terms, an IoT cloud is a network of servers optimized to
handle data at high speeds for a large number of different devices, manage traffic, and analyze data with great accuracy. An IoT cloud would not be
complete without a distributed management database system.
4. Analytics :
After receiving the data in the cloud, that data is processed. Data is analyzed here with the help of various algorithms like machine learning and all.
Analytics is the conversion of analog information via connected sensors and devices into actionable insights that can be processed, interpreted, and
analyzed in depth. Analysis of raw data or information for further processing is a prerequisite for the monitoring and enhancement of the Internet of
things (IoT).Among the most significant benefits of a well-designed IoT system is real-time smart analysis, which enables designers to spot anomalies
in gathering information and respond quickly to avoid an undesirable situation. If information is collected correctly and at the right moment, network
operators can plan for the next steps.
5. User Interface :
User interface also termed as UI is nothing but a user-facing program that allows the user to monitor and manipulate data.
The user interface (UI) is the visible, tangible portion of the IoT device that people can interact with. Developers must provide a well-designed user
interface that requires the least amount of effort from users and promotes additional interactions.
Applications of IoT
Design Principles for Connected
Devices
IoT/M2M Systems Layers
Layers of OSI Model
1. Physical Layer (Layer 1) :
The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual physical connection between the
devices. The physical layer contains information in the form of bits. It is responsible for transmitting individual bits from one node
to the next. When receiving data, this layer will get the signal received and convert it into 0s and 1s and send them to the Data
Link layer, which will put the frame back together.
2. Data Link Layer (DLL) (Layer 2) :
The data link layer is responsible for the node-to-node delivery of the message. The main function of this layer is to make sure
data transfer is error-free from one node to another, over the physical layer. When a packet arrives in a network, it is the
responsibility of DLL to transmit it to the Host using its MAC address.
Data Link Layer is divided into two sub layers: (a) Logical Link Control (LLC) (b) Media Access Control (MAC)
3. Network Layer (Layer 3) :
The network layer works for the transmission of data from one host to the other located in different networks. It also takes care of
packet routing i.e. selection of the shortest path to transmit the packet, from the number of routes available. The sender &
receiver’s IP addresses are placed in the header by the network layer.
4. Transport Layer (Layer 4) :
The transport layer provides services to the application layer and takes services from the network layer. The data in the transport
layer is referred to as Segments. It is responsible for the End to End Delivery of the complete message. The transport layer also
provides the acknowledgement of the successful data transmission and re-transmits the data if an error is found.
5. Session Layer (Layer 5) :
This layer is responsible for the establishment of connection, maintenance of sessions, authentication, and also ensures security.
6. Presentation Layer (Layer 6):
The presentation layer is also called the Translation layer. The data from the application layer is extracted here and manipulated
as per the required format to transmit over the network.
7. Application Layer (Layer 7) :
At the very top of the OSI Reference Model stack of layers, we find the Application layer which is implemented by the network
applications. These applications produce the data, which has to be transferred over the network. This layer also serves as a
window for the application services to access the network and for displaying the received information to the user.
Example: Application – Browsers, Skype Messenger, etc.
Design Standardization
Design Standards
1. ITU-T
2. ETSI
3. OGC
Design Standards
Design Standards
Design Standards
Communication Technology
Communication Technology
Communication Technology
Data Enrichment
Data enrichment is defined as merging third-party data from an external
authoritative source with an existing database of first-party customer
data. Brands do this to enhance the data they already possess so they can
make more informed decisions. All customer data, no matter the source,
begins in its raw form. An excellent example of data enrichment would be
to enrich internal sales data with third party advertisement data to get
a better understanding of advertising effective ness. It consists of:-
1. Adding value
2. Security
3. Usability of the data
Data Enrichment
Data Consolidation
Data consolidation is the corralling (gather together and confine),
combining, and storing of varied data in a single place. It lets
users manipulate different types of data from one point of access
and helps turn raw data into insights that drive better, faster
decision-making. The term sometimes is used interchangeably
with data integration. Merges data from many systems into a
Data Warehouse.
Data consolidation enables businesses to streamline their data
resources, discover patterns, and look for insights in multiple
types of data.
Data Consolidation
Ease of Designing
Design for connected devices for IoT Applications, Services
and business processes.
Designer considers the ease in designing the devices
physical, data link, adaption layers and gateway.
Means availability of sensors, actuators, controllers and IoT
devices
Low in cost and hardware
Use preferably open source software components and
protocols
Device hardware should embed minimum of components
Use ready solutions for ease in designing local devices
personal area network
Ensure the secure connectivity with the Internet
Affordability of IoT devices
For example, RFID or card.
The card: An embedded microcontroller, memory, OS, NFC peripheral
interfaces, access point based device activation, RF module and
transceiver and all that at low cost
For example, Wireless sensors use Mote (mobile terminal)
Mote: Low cost devices with open source OS (tiny OS) and software
components
Provides ease and affordance in the WSN networks
Link Layer
802.3 – Ethernet
802.11 – WiFi
802.16 – WiMax
802.15.4 – LR-WPAN
2G/3G/4G
Network/Internet Layer
IPv4
IPv6
6LoWPAN
IoT Protocols
Transport Layer
TCP -Transmission Control Protocol
UDP- User Datagram Protocol
Application Layer
HTTP- Hypertext Transfer Protocol
CoAP-Constrained Application
Protocol
Web Socket
MQTT-Message Queuing Telemetry
Transport
XMPP- Messaging and
Presence
ExtensibleProtocol
DDS- Data Distribution Service
AMQP-Advanced Message
Queuing Protocol
IoT Protocols
Link Layer Protocol:- Determine how data is physically sent over the
N/Ws physical layer or medium (coaxial cable). This layer determines how
the packets are coded and signaled by the hardware device over the
medium to which the host is attached.
1. 802.3 Ethernet:- is a set of technologies and protocols that are used
primarily in LANs. It defines the physical and medium access control sub
layer of the data link layer for wired Ethernet networks.
2. 802.11 Wi Fi:- it is a set of MAC and physical layer protocols for
implementing wireless local area network.