Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

Unit-1

Internet of Things (IoT)

Introduction : Connecting everyday things embedded with electronics, software, and sensors
to internet enabling to collect and exchange data without human interaction called as the Internet
of Things (IoT).

The term "Things" in the Internet of Things refers to anything and everything in day to day life
which is accessed or connected through the internet.

What are the Components of IoT?


IoT has mainly two components, IoT hardware, and IoT software. The hardware component
consists of devices, such as sensors, servers, a gateway or an edge, and microcontrollers. On the
other hand, the software component comprises the software and applications associated with the
web or mobile.

The software component works towards data collection and analysis, device integration,
application of data into the device, and process extension. The various components of hardware
and software further break down as follows −
 Sensors − sensors are the soul of the Internet of Things. These are the hardware
components that sense data by interacting with the environment. Some examples of
sensors are thermostats, microphones, etc.
 Actuators − Actuators are also hardware components meant to transform energy into
motion. An electric motor is an example of an actuator in IoT.
 Gateway − A gateway is a software component meant to connect the various components
of IoT devices to interact and share information.
 Data Analysis is another essential software component for handling and analyzing data.
The sensors' data may need to be more understandable and interpretable. Hence, data
analytics transforms incoming data into an easily processable format.
 Artificial Intelligence − IoT devices also leverage the perks of Artificial intelligence to
understand the system well. It allows the developers to control the various aspects of IoT
devices and make the best out of them.
 Cloud computing − Cloud computing allows us to handle the data collected by sensors
in an advanced way. It stores a large amount of incoming data on the cloud, an online
data hub, to process it more conveniently.
 Interface − Finally comes the user interface. It is the medium through which the users
can access and control the working of IoT devices.

Advantages of IoT

1. Monitoring

IoT allows remote mornintinotring of devices and personal assets. The owner could be in any
part of the world and by the means of his/her smartphone they can check up and monitor their
assets without spending revenue on manual labour. Further IOT helps in understanding the
internal details of your devices. It notifies the user when the product is damaged or out of stock.
IoT keeps life going without much interference from the user.

2. Accessibility

IoT allows users to access real-time information about their devices from any part of the world.
Users can connect to the application and gather information about their personal devices. For
example a person switches on the AC when they are close to home so the room can be cool
before they enter.

3. Automation and control

The physical objects are connected to each other with wireless forms of technology and hence
automation plays a huge role in the internet of things. It allows the working of these devices
without human intervention. These devices communicate with each other to send and receive
information at all times.
4. Human effort minimization

Iot devices these days perform various tasks with much ease as compared to human beings. They
reduce the dependency on manual labour.

5. Time management

The Iot application in various industries lead to quicker constriction of organisations and various
other domain applications. So it is clear to say that IoT reduces the time factor.

6. Security

IOt devices with string security steam are almost impossible to hack into. These devices have
tighter secret protocols that alert the user instantly in case of any destructive attempt to physical
devices.

7. Resource utilisation efficiency

IOt helps us better understand the functionality of devices that allows us to make better use of
the available resources.

8. Reduction in the usage of technical equipment

Since technical devices can easily connect to a smart system such as a computer or a smartphone
this reduces the usage of large technical equipment.

9. Traffic systems

The internet of things has changed the way cities monitor traffic which led to reduced
confessions and traffic accidents

10. Healthcare industry

The internet of things has successfully assisted doctors in many complicated medical surgeries
that take hours to complete. This has significantly changed the demographics of the medical and
pharma industry.

11. Smart homes

IoT allows users to control their homes with smart options. They can access almost any
appliance in their home remotely with the help of their smartphones.
12. Information

Information and details about personal appliances and assets is easily available. Problems, eros
and bugs are easily detected and fixed before the situation goes out of control.

13. Tracking

Iot enables users to track their assets, traffic and transportation systems, inventory, delivery,
security footage, customer orders and more with the help of cost effective tracking devices that
deliver real-time information.

14. Data collection

IoT creates a highly reliable and factual data collection with the help of access to real time
information about the surroundings. This allows organisations to better understand and serve
their customers.

15. cost efficiency

One of the reasons why Iot is highly spreading across the world is because of its cost effective
solutions that not only save the budget but also provide active solutions. Iot mainly helps make
people’s lives easier by offering solutions to compact problems.

Disadvantages of IoT

1. Data breach

The physical objects in Iot connect to the internet to transmit and receive information. So the
user data is now available on the internet and hackers can hack this private and sensitive
information. Data breach occurs when outsiders can access the user data without the awareness
of the user. This data can be used to manipulate the user.

2. Dependence

The internet of things largely depends on internet connectivity. Without a stable internet
connection the IoT devices fail to work and the tasks are incomplete.

3. Complexity

IoT seems to be completing complicated tasks yet a huge set of complicated tasks run behind
these devices in order to complete the task. Many times the user is not aware of the internal
mechanism and hence even during a minor inconvenience the user has to contact customer
support. In case the software makes a wrong calculation the entire operation of the object fails.
Hence, It is complicated due to the large amount of code and the machine communication
between various devices. If one machine fails to work the entire network suffers the loss.
4. Security and privacy concerns

Iot systems are connected to a number of devices and communicate within a network. This
means that there is little to no privacy between devices on the network.

5. Increase in unemployment

IoT robots replace manual forces in various industries to a large extent. This causes the
unemployment of factory labourers and sometimes leads to lesser wages for more skilled
labourers.

6. Corruption of the entire system

Any bug in one of the devices leads to corruption in the entire system.

7. Lack of international standards

There is no set international Iot standards to match compatibility. This leads to problems in
communication between manufacturers of different domains.

8. Reduced mental and physical activity

An overuse of the internet and the IoT makes people lazy and lethargic. Since IoT makes lives
easier it also leads to severe health issues since there is less physical movement. This may also
cause an increase in stress levels in the human body in one way or another.

9. Data Overload:

While data collection is a key advantage, the volume of data created by IoT devices can be
overwhelming. Processing and making sense of this massive influx of information pose
challenges regarding storage, bandwidth, and analytical capabilities.

10. Complexity in Implementation:

Implementing IoT solutions can be complex, requiring integration across diverse devices,
platforms, and protocols. This complexity can lead to interoperability challenges, making it
difficult for devices from different manufacturers to work seamlessly together.

IOT applications-Potential applications of the IoT are numerous and diverse, permeating into
practically all areas of every-day life of individuals, enterprises, and society as a whole. The IoT
application covers smart environments/spaces in domains such as: Transportation, Building,
City, Lifestyle, Retail, Agriculture, Factory, Supply chain, Emergency, Healthcare, User
interaction, Culture and tourism, Environment and Energy. Below are some of the IoT
applications.

 IOsL (Internet of smart living)-Remote Control Appliances: Switching on and off


remotely appliances to avoid accidents and save energy, Weather: Displays outdoor weather
conditions such as humidity, temperature, pressure, wind speed and rain levels with ability to
transmit data over long distances, “mart Home Appliances: Refrigerators with LCD screen
telling what’s inside, food that’s about to expire, ingredients you need to buy and with all the
information available on a Smartphone app. Washing machines allowing you to monitor the
laundry remotely, and. Kitchen ranges with interface to a Smartphone app allowing remotely
adjustable temperature control and monitoring the oven’s self-cleaning feature, Safety
Monitoring: cameras, and home alarm systems making people feel safe in their daily life at
home, Intrusion Detection Systems: Detection of window and door openings and violations to
prevent intruders, Energy and Water Use: Energy and water supply consumption monitoring to
obtain advice on how to save cost and resources.

 IOsC ( Internet of smart cities)-Structural Health: Monitoring of vibrations and


material conditions in buildings, bridges and historical monuments, Lightning: intelligent and
weather adaptive lighting in street lights, Safety: Digital video monitoring, fire control
management, public announcement systems, Transportation: Smart Roads and Intelligent High-
ways with warning messages and diversions according to climate conditions and unexpected
events like accidents or traffic jams, Smart Parking: Real-time monitoring of parking spaces
availability in the city making residents able to identify and reserve the closest available spaces,
Waste Management: Detection of rubbish levels in containers to optimize the trash collection
routes. Garbage cans and recycle bins with RFID tags allow the sanitation staff to see when
garbage has been put out.

 IOsE (Internet of smart environment)-Air Pollution monitoring: Control of CO2


emissions of factories, pollution emitted by cars and toxic gases generated in farms, Forest Fire
Detection: Monitoring of combustion gases and preemptive fire conditions to define alert zones,
Weather monitoring: weather conditions monitoring such as humidity, temperature, pressure,
wind speed and rain, Earthquake Early Detection, Water Quality: Study of water suitability in
rivers and the sea for eligibility in drinkable use, River Floods: Monitoring of water level
variations in rivers, dams and reservoirs during rainy days, Protecting wildlife: Tracking collars
utilizing GPS/GSM modules to locate and track wild animals and communicate their
coordinates via SMS.

 IOsI (Internet of smart industry)-Explosive and Hazardous Gases: Detection of gas


levels and leakages in industrial environments, surroundings of chemical factories and inside
mines, Monitoring of toxic gas and oxygen levels inside chemical plants to ensure workers and
goods safety, Monitoring of water, oil and gas levels in storage tanks and Cisterns, Maintenance
and repair: Early predictions on equipment malfunctions and service maintenance can be
automatically scheduled ahead of an actual part failure by installing sensors inside equipment to
monitor and send reports.

 IOsH (Internet of smart health)-Patients Surveillance: Monitoring of conditions of


patients inside hospitals and in old people’s home, Medical Fridges: Control of conditions
inside freezers storing vaccines, medicines and organic elements, Fall Detection: Assistance for
elderly or disabled people living independent, Dental: Bluetooth connected toothbrush with
Smartphone app analyzes the brushing uses and gives information on the brushing habits on the
Smartphone for private information or for showing statistics to the dentist, Physical Activity
Monitoring: Wireless sensors placed across the mattress sensing small motions, like breathing
and heart rate and large motions caused by tossing and turning during sleep, providing data
available through an app on the Smartphone.

 IOsE (internet of smart energy)-Smart Grid: Energy consumption monitoring and


management, Wind Turbines/ Power house: Monitoring and analyzing the flow of energy from
wind turbines & power house, and two-way communication with consumers’ smart meters to
analyze consumption

4 Stage IoT architecture.


4 Stage IoT architecture

So, from the above image it is clear that there is 4 layers are present that can be divided as follows: Sensing Layer,
Network Layer, Data processing Layer, and Application Layer.

1. Sensing Layer –
The sensing layer is the first layer of the IoT architecture and is responsible for collecting data from
different sources. This layer includes sensors and actuators that are placed in the environment to gather
information about temperature, humidity, light, sound, and other physical parameters. These devices are
connected to the network layer through wired or wireless communication protocols.
2. Network Layer –
The network layer of an IoT architecture is responsible for providing communication and connectivity
between devices in the IoT system. It includes protocols and technologies that enable devices to connect
and communicate with each other and with the wider internet. Examples of network technologies that are
commonly used in IoT include WiFi, Bluetooth, Zigbee, and cellular networks such as 4G and 5G.
Additionally, the network layer may include gateways and routers that act as intermediaries between
devices and the wider internet, and may also include security features such as encryption and authentication
to protect against unauthorized access.
3. Data processing Layer –
The data processing layer of IoT architecture refers to the software and hardware components that are
responsible for collecting, analyzing, and interpreting data from IoT devices. This layer is responsible for
receiving raw data from the devices, processing it, and making it available for further analysis or action.The
data processing layer includes a variety of technologies and tools, such as data management systems,
analytics platforms, and machine learning algorithms. These tools are used to extract meaningful insights
from the data and make decisions based on that data.Example of a technology used in the data processing
layer is a data lake, which is a centralized repository for storing raw data from IoT devices.
4. Application Layer –
The application layer of IoT architecture is the topmost layer that interacts directly with the end-user. It is
responsible for providing user-friendly interfaces and functionalities that enable users to access and control
IoT devices.This layer includes various software and applications such as mobile apps, web portals, and
other user interfaces that are designed to interact with the underlying IoT infrastructure. It also includes
middleware services that allow different IoT devices and systems to communicate and share data
seamlessly.The application layer also includes analytics and processing capabilities that allow data to be
analyzed and transformed into meaningful insights. This can include machine learning algorithms, data
visualization tools, and other advanced analytics capabilities.
Lecture 2
IOT architectural view

IoT architecture consists of different layers of technologies supporting IoT. It serves to


illustrate how various technologies relate to each other and to communicate the scalability,
modularity and configuration of IoT deployments in different scenarios. The functionality of
each layer is described below:

 Smart device / sensor layer: The lowest layer is made up of smart objects integrated with
sensors. The sensors enable the interconnection of the physical and digital worlds allowing real-
time information to be collected and processed. There are various types of sensors for different
purposes. The sensors have the capacity to take measurements such as temperature, air quality,
speed, humidity, pressure, flow, movement and electricity etc. In some cases, they may also
have a degree of memory, enabling them to record a certain number of measurements. A sensor
can measure the physical property and convert it into signal that can be understood by an
instrument. Sensors are grouped according to their unique purpose such as environmental
sensors, body sensors, home appliance sensors and vehicle telemetric sensors, etc

 Gateways and Networks-Massive volume of data will be produced by these tiny sensors
and this requires a robust and high performance wired or wireless network infrastructure as a
transport medium. Current networks, often tied with very different protocols, have been used to
support machine-to-machine (M2M) networks and their applications. With demand needed to
serve a wider range of IoT services and applications such as high speed transactional services,
context- aware applications, etc, multiple networks with various technologies and access
protocols are needed to work with each other in a heterogeneous configuration. These networks
can be in the form of a private, public or hybrid models and are built to support the
communication requirements for latency, bandwidth or security. Various gateways
(microcontroller, microprocessor) & gateway networks (WI-FI, GSM, GPRS).

 Management Service Layer-The management service renders the processing of


information possible through analytics, security controls, process modeling and management of
devices. One of the important features of the management service layer is the business and
process rule engines. IoT brings connection and interaction of objects and systems together
providing information in the form of events or contextual data such as temperature of goods,

 Application Layer-The IoT application covers “smart” environments/spaces in domains


such as: Transportation, Building, City, Lifestyle, Retail, Agriculture, Factory, Supply chain,
Emergency, Healthcare, User interaction, Culture and tourism, Environment and Energy.
IOT conceptual view-
 The main tasks of this framework are to analyze and determine the smart activities of these
intelligent devices through maintaining a dynamic interconnection among those devices. The
proposed framework will help to standardize IoT infrastructure so that it can receive e-services
based on context information leaving the current infrastructure unchanged. The active
collaboration of these heterogeneous devices and protocols can lead to future ambient computing
where the maximum utilization of cloud computing will be ensured.

 This model is capable of logical division of physical devices placement, creation


of virtual links among different domains, networks and collaborate among multiple
application without any central coordination system. IaaS can afford standard
functionalities to accommodate and provides access to cloud infrastructure. The service
is generally offered by modern data centers maintained by giant companies and
organization. It is categorized as virtualization of resources which permits a user to
install and run application over virtualization layer and allows the system to be
distributed, configurable and scalable.

 Total infrastructure system can be categorized into 4 layers to receive context supported e-
services out of raw data from the Internet of Things. These 4 layers establish a generic
framework that does not alter the current network infrastructure but create an interfacing among
services and entities through network virtualization.

1. Connectivity Layer-
This layer includes all the physical devices involved in the framework and the interconnection
among them. Future internet largely depends on the unification of these common objects found
everywhere near us and these should be distinctly identifiable and controllable.
This layer also involves assigning of low range networking devices like sensors, actuators,
RFID tags etc and resource management checks the availability of physical resources of all the
devices and networks involved in the underlying infrastructure. These devices contain very
limited resources and resource management ensures the maximum utilization with little
overhead. It also allows sharing and distribution of information among multiple networks or
single network divided into multiple domains.
2. Access Layer-
 Context Data will be reached to internet via IoT Gateway as captured by short range devices
in form of raw data. Access layer comprises topology definition, network initiation, creation of
domains etc. This layer also includes connection setup, intra-inter domain communication,
scheduling, packet transmissions between flow-sensors and IoT gateway. The simulation was run
later in this paper for different scenario based on this layer. Feature management contains a
feature filter which accepts only acceptable context data and redundant data are rejected. Large
number of sensor maintains lots of features but only a small subset of features is useful generate
a context data.

 Feature filter helps to reduce irrelevant data transmission, increases the data transfer rate of
useful data and reduce energy and CPU consumption too. Number of features can be different
based on the application requirements and context data types.

3. Abstraction Layer-
 One of the most important characteristics of OpenFlow is to add virtual layers with the
preset layers, leaving the established infrastructure unchanged. A virtual link can be created
among different networks and a common platform can be developed for various communication
systems. The system is fully a centralized system from physical layer viewpoint but a
distribution of service (flow visor could be utilized) could be maintained. One central system
can monitor, control all sorts of traffics. It can help to achieve better band-width, reliability,
robust routing, etc. which will lead to a better Quality of Services (QoS).

 In a multi-hopping scenario packets are transferred via some adjacent nodes. So, nodes near
to access points bears too much load in comparison to distant nodes in a downstream scenario
and inactivity of these important nodes may cause the network to be collapsed. Virtual presence
of sensor nodes can solve the problem where we can create a virtual link between two sensor
networks through access point negotiation. So, we can design a three a three layer platform,
where common platform and virtualization layer are newly added with established
infrastructure. Sensors need not to be worried about reach-ability or their placement even in
harsh areas. Packet could be sent to any nodes even if it is sited on different networks.

4. Service Layer-
 Storage management bears the idea about all sorts of unfamiliar and/or important
technologies and information which can turn the system scalable and efficient. It is not only
responsible for storing data but also to provide security along with it. It also allows accessing
data effectively; integrating data to enhance service intelligence, analysis based on the services
required and most importantly increases the storage efficiency. Storage and management layer
involves data storage & system supervision, software services and business management &
operations. Though they are included in one layer, the business support system resides slightly
above of cloud computing service whereas Open-Flow is placed below of it as presented to
include virtualizations and monitor management.

 Service management combines the required services with organizational solutions and thus
new generation user service becomes simplified. These forthcoming services are necessitated
to be cointerrelated and combined in order to meet the demand socio- economic factors such as
environment analysis, safety measurement, climate management, agriculture modernization etc.

-----------------------------------------------------------------------------------------------------------------

IOT Functional View


-The Internet of Things concept refers to uniquely identifiable things with their virtual
representations in an Internet-like structure and IoT solutions comprising a number of
components such as

(1) Module for interaction with local IoT devices. This module is responsible for acquisition
of observations and their forwarding to remote servers for analysis and permanent storage.
(2) Module for local analysis and processing of observations acquired by IoT devices.
(3) Module for interaction with remote IoT devices, directly over the Internet. This module is
responsible for acquisition of observations and their forwarding to remote servers for analysis
and permanent storage.
(4) Module for application specific data analysis and processing. This module is running on an
application server serving all clients. It is taking requests from mobile and web clients and
relevant IoT observations as input, executes appropriate data processing algorithms and
generates output in terms of knowledge that is later presented to users.
(5) User interface (web or mobile): visual representation of measurements in a given context
(for example on a map) and interaction with the user, i.e. definition of user queries. The
Designs are shown below:

Physical Design of IOT-The Internet of Things will become part of the fabric of everyday life.
It will become part of our overall infrastructure just like water, electricity, telephone, TV and
most recently the Internet. Whereas the current Internet typically connects full-scale computers,
the Internet of Things (as part of the Future Internet) will connect everyday objects with a strong
integration into the physical world.

1. Plug and Play Integration


 If we look at IoT-related technology available today, there is a huge heterogeneity. It is
typically deployed for very specific purposes and the configure requires significant technical
knowledge and may be cumbersome. To achieve a true Internet of Things we need to move
away from such small- scale, vertical application silos, towards a horizontal infrastructure on
which a variety of applications can run simultaneously. This is only possible if connecting a
thing to the Internet of Things becomes as simple as plugging it in and switching it on. Such
plug and play functionality requires an infrastructure that supports it, starting from the
networking level and going beyond it to the application level. This is closely related to the
aspects discussed in the section on autonomy.
 On the networking level, the plug & play functionality has to enable the communication,
features like the ones provided by IPv6 are in the directions to help in this process. Suitable
infrastructure components have then to be discovered to enable the integration into the Internet
of Things. This includes announcing the functionalities provided, such as what can be sensed or
what can be actuated.

2. Infrastructure Functionality-The infrastructure needs to support applications in finding


the things required. An application may run anywhere, including on the things themselves.
Finding things is not limited to the start-up time of an application. Automatic adaptation is
needed whenever relevant new things become available, things become unavailable or the
status of things changes. The infrastructure has to support the monitoring of such changes and
the adaptation that is required as a result of the changes.
3. Semantic Modeling of Things-To reach the full potential of the Internet of Things,
semantic information regarding the things, the information they can provide or the actuations
they can perform need to be available. It is not sufficient to know that there is a temperature
sensor or an electric motor, but it is important to know which temperature the sensor measures:
the indoor temperature of a room or the temperature of the fridge, and that the electric motor
can open or close the blinds or move something to a different location. As it may not be
possible to provide such semantic information by simply switching on the thing, the
infrastructure should make adding it easy for users. Also, it may be possible to derive semantic
information, given some basic information and additional knowledge, e.g. deriving
information about a room, based on the information that a certain sensor is located in the
room. This should be enabled by the infrastructure.
4. Physical Location and Position-As the Internet of Things is strongly rooted in the physical
world, the notion of physical location and position are very important, especially for
finding things, but also for deriving knowledge. Therefore, the infrastructure has to support
finding things according to location (e.g. geo-location based discovery). Taking mobility into
account, localization technologies will play an important role for the Internet of Things and
may become embedded into the infrastructure of the Internet of Things.
5. Security and Privacy-In addition, an infrastructure needs to provide support for security
and privacy functions including identification, confidentiality, integrity, non-repudiation
authentication and authorization. Here the heterogeneity and the need for interoperability
among different ICT systems deployed in the infrastructure and the resource limitations of IoT
devices (e.g., Nano sensors) have to be taken into account.
Lecture-3

Physical Design of IoT


IoT Protocols

3 layer IoT architecture :

3 layer iot architecture

A three-layer architecture is the common and generally known structure. It was first used in the initial phases of
this IoT study. It indicates three levels: perception, network, and application.

1. Perception Layer :

This perception layer is the IoT architecture’s physical layer. In these sensors and embedded systems are used
mainly. These collect large amounts of data based on the requirements. This also includes edge devices,
sensors, and actuators that communicate with the surroundings. It detects certain spatial parameters or detects
other intelligent things /objects in the surroundings.

2. Network Layer :

The data obtained by these devices must be distributed and stored. This is the responsibility of the network
layer. It binds these intelligent objects to other intelligent/ smart objects. It is also in charge of data transfer.
The network layer is in-charge of linking smart objects, network devices, and servers. It is also used to
distribute and analyze sensor data.

3. Application Layer :

The user communicates with this application layer. It is in-charge of providing the customer with software
resources. Example: in smart home application, where users press a button in the app to switch on a coffee
machine, for example. The application layer is in-charge of providing the customer with application-specific
resources. It specifies different uses for the IoT, such as smart houses, smart cities, and smart health.

4 Stage IoT architecture.

4 Stage IoT architecture

So, from the above image it is clear that there is 4 layers are present that can be divided as follows: Sensing
Layer, Network Layer, Data processing Layer, and Application Layer.

These are explained as following below.

1. Sensing Layer –
The sensing layer is the first layer of the IoT architecture and is responsible for collecting data from
different sources. This layer includes sensors and actuators that are placed in the environment to gather
information about temperature, humidity, light, sound, and other physical parameters. These devices are
connected to the network layer through wired or wireless communication protocols.
2. Network Layer –
The network layer of an IoT architecture is responsible for providing communication and connectivity
between devices in the IoT system. It includes protocols and technologies that enable devices to connect
and communicate with each other and with the wider internet. Examples of network technologies that
are commonly used in IoT include WiFi, Bluetooth, Zigbee, and cellular networks such as 4G and 5G.
Additionally, the network layer may include gateways and routers that act as intermediaries between
devices and the wider internet, and may also include security features such as encryption and
authentication to protect against unauthorized access.
3. Data processing Layer –
The data processing layer of IoT architecture refers to the software and hardware components that are
responsible for collecting, analyzing, and interpreting data from IoT devices. This layer is responsible
for receiving raw data from the devices, processing it, and making it available for further analysis or
action.The data processing layer includes a variety of technologies and tools, such as data management
systems, analytics platforms, and machine learning algorithms. These tools are used to extract
meaningful insights from the data and make decisions based on that data.Example of a technology used
in the data processing layer is a data lake, which is a centralized repository for storing raw data from IoT
devices.
4. Application Layer –
The application layer of IoT architecture is the topmost layer that interacts directly with the end-user. It
is responsible for providing user-friendly interfaces and functionalities that enable users to access and
control IoT devices.This layer includes various software and applications such as mobile apps, web
portals, and other user interfaces that are designed to interact with the underlying IoT infrastructure. It
also includes middleware services that allow different IoT devices and systems to communicate and
share data seamlessly.The application layer also includes analytics and processing capabilities that allow
data to be analyzed and transformed into meaningful insights. This can include machine learning
algorithms, data visualization tools, and other advanced analytics capabilities.

5 Layer Architecture of IoT :


When project work is done with various cutting edge technologies and broad application area, 5 layer
architecture is considered as best. 5 Layer model can be considered as an extension to the basic architecture of
IoT because it has two additional layers to the basic model.

5 Layer Architecture of Internet of Things

 Perception Layer :
This is the first layer of IoT architecture. In the perception layer, number of sensors and actuators are
used to gather useful information like temperature, moisture content, intruder detection, sounds, etc. The
main function of this layer is to get information from surroundings and to pass data to another layer so
that some actions can be done based on that information.
 Network Layer :
As the name suggests, it is the connecting layer between perception and middleware layer. It gets data
from perception layer and passes data to middleware layer using networking technologies like 3G, 4G,
UTMS, WiFI, infrared, etc. This is also called communication layer because it is responsible for
communication between perception and middleware layer. All the transfer of data done securely keeping
the obtained data confidential.
 Middleware Layer :
Middleware Layer has some advanced features like storage, computation, processing, action taking
capabilities. It stores all data-set and based on the device address and name it gives appropriate data to
that device. It can also take decisions based on calculations done on data-set obtained from sensors.
 Application Layer :
The application layer manages all application process based on information obtained from middleware
layer. This application involves sending emails, activating alarm, security system, turn on or off a
device, smartwatch, smart agriculture, etc.
 Business Layer :
The success of any device does not depend only on technologies used in it but also how it is being
delivered to its consumers. Business layer does these tasks for the device. It involves making flowcharts,
graphs, analysis of results, and how device can be improved, etc.

IOT protocols
IoT protcols help to establish Communication between IoT Device (Node Device) and Cloud based Server over
the Internet. It help to sent commands to IoT Device and received data from an IoT device over the Internet. An
image is given below. By this image you can understand which protocols used.
Link Layer

Link layer protocols determine how data is physically sent over the network’s physical layer or medium (Coxial
calbe or other or radio wave). This Layer determines how the packets are coded and signaled by the hardware
device over the medium to which the host is attached (eg. coxial cable).

Here we explain some Link Layer Protocols:

802.3 – Ethernet : Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first
standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the physical layer and the medium access
control (MAC) sub-layer of the data link layer for wired Ethernet networks. Ethernet is classified into two
categories: classic Ethernet and switched Ethernet.

802.11 – WiFi : IEEE 802.11 is part of the IEEE 802 set of LAN protocols, and specifies the set of media
access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network
(WLAN) Wi-Fi computer communication in various frequencies, including but not limited to 2.4 GHz, 5 GHz,
and 60 GHz frequency bands.

802.16 – Wi-Max : The standard for WiMAX technology is a standard for Wireless Metropolitan Area
Networks (WMANs) that has been developed by working group number 16 of IEEE 802, specializing in point-
to-multipoint broadband wireless access.

802.15.4 -LR-WPAN : A collection of standards for Low-rate wireless personal area network. The IEEE’s
802.15.4 standard defines the MAC and PHY layer used by, but not limited to, networking specifications such
as Zigbee®, 6LoWPAN, Thread, WiSUN and MiWi™ protocols. The standards provide low-cost and low-speed
communication for power constrained devices.

2G/3G/4G- Mobile Communication : These are different types of telecommunication generations. IoT devices
are based on these standards can communicate over the celluer networks.

Network Layer

Responsible for sending of IP datagrams from the source network to the destination network. Network layer
performs the host addressing and packet routing. We used IPv4 and IPv6 for Host identification. IPv4 and IPv6
are hierarchical IP addrssing schemes.

IPv4 :

An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication. An IP address serves two main functions:
host or network interface identification and location addressing. Internet Protocol version 4 (IPv4) defines an IP
address as a 32-bit number. However, because of the growth of the Internet and the depletion of available IPv4
addresses, a new version of IP (IPv6), using 128 bits for the IP address, was standardized in 1998. IPv6
deployment has been ongoing since the mid-2000s.

IPv6 : Internet Protocol version 6 (IPv6) is successor of IPv4. IPv6 was developed by the Internet
Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. In
December 1998, IPv6 became a Draft Standard for the IETF, who subsequently ratified it as an Internet
Standard on 14 July 2017. IPv6 uses a 128-bit address, theoretically allowing 2128, or approximately 3.4×1038
addresses. Source – wikipedia

6LoWPAN : It is an acronym of IPv6 over Low-Power Wireless Personal Area Networks. 6LoWPAN is the
name of a concluded working group in the Internet area of the IETF. This protocol allows for the smallest
devices with limited processing ability to transmit information wirelessly using an internet protocol. 6LoWPAN
can communicate with 802.15.4 devices as well as other types of devices on an IP network link like WiFi.

Transport Layer

This layer provides functions such as error control, segmentation, flow control and congestion control. So this
layer protocols provide end-to-end message transfer capability independent of the underlying network.

TCP : TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a network
conversation through which application programs can exchange data. TCP works with the Internet Protocol
(IP), which defines how computers send packets of data to each other. Together, TCP and IP are the basic rules
defining the Internet. The Internet Engineering Task Force (IETF) defines TCP in the Request for Comment
(RFC) standards document number 793.

UDP : User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of Internet Protocol suite,
referred as UDP/IP suite. Unlike TCP, it is unreliable and connectionless protocol. So, there is no need to
establish connection prior to data transfer.

Application Layer

MQTT (Message Queue Telemetry Transport)


MQTT (Message Queue Telemetry Transport) is a messaging protocol which was introduced by IBM in
1999. It was initially built for monitoring sensor node and faraway tracking in IoT. Its suits are small, cheap,
low-memory and low-power devices. MQTT provides embedded connectivity between applications and
middleware in one side and another side it connects networks and communicators.

MQTT protocol is based on publish/subscribe architecture. The publish/subscribe architecture consists of three
major components: publishers, subscribers, and a broker. According to IoT point of view, publishers are
lightweight sensor devices that send their data to connected broker and goes back to sleep whenever possible.
Subscribers are applications, which are interested in a certain topic or sensory data, so they are connected to
brokers to be informed whenever new data are received. The broker receives the sensory data and filters them in
different topics and sends them to subscribers according to interest in the topics.
SMQTT (Secure Message Queue Telemetry Transport)
SMQTT (Secure Message Queue Telemetry Transport) is an extension of MQTT protocol which uses
encryption based on lightweight attribute encryption. The main advantage of this encryption is that it has a
broadcast encryption feature. In this features, one message is encrypted and delivered to multiple other nodes.
The process of message transfer and receiving consists of four major stages:

1. Setup: In this phase, the publishers and subscribers register themselves to the broker and get a secret
master key.
2. Encryption: When the data is published to broker, it is encrypted by broker.
3. Publish: The broker publishes the encrypted message to the subscribers.
4. Decryption: Finally the received message is decrypted by subscribers with the same master key.

SMQTT is proposed only to enhance MQTT security feature.

CoAP
CoAP (Constrained Application Protocol) is a session layer protocol that provides the RESTful (HTTP)
interface between HTTP client and server. It is designed by IETF Constrained RESTful Environment (CoRE)
working group. It is designed to use devices on the same constrained network between devices and general
nodes on the Internet. CoAP enables low-power sensors to use RESTful services while meeting their low power
constraints. This protocol is specially built for IoT systems primarily based on HTTP protocols.

This network is used within the limited network or in a constrained environment. The whole architecture of
CoAP consists of CoAP client, CoAP server, REST CoAP proxy, and REST internet.
The data is sent from CoAP clients (such as smartphones, RFID sensors, etc.) to the CoAP server and the same
message is routed to REST CoAP proxy. The REST CoAP proxy interacts outside the CoAP environment and
uploads the data over REST internet.

DDS
DDS (Data Distribution Service) is a middleware (sometimes called machine-to-machine (M2M))
communication protocol. It is implemented by the Object Management Group (OMG) standard for the real-time
system with high speed and high-performance, scalable, dependable, and interoperable data exchange. This
communication protocol is based on a publish-subscribe pattern for sending and receiving data, events, and
commands among the nodes.

The DDS protocol has two main layers:

 Data-Centric Publish-Subscribe (DCPS): This layer delivers the information to subscribers.


 Data-Local Reconstruction Layer (DLRL): This layer provides an interface to DCPS functionalities,
permitting the sharing of distributed data amongst IoT enabled objects.

Extensible Messaging and Presence Protocol (XMPP):

It’s an open communication protocol for instant messaging (IM), presence information, and real-time
applications that’s part of the Jabber technologies and XMPP.org family.

XMPP enables the exchange of XML-based messages between clients and servers in a decentralized manner.
This means that, unlike other messaging protocols, XMPP doesn't rely on a central server to facilitate
communication. Instead, it follows a federated model where users or organizations can operate their own XMPP
server and communicate with users server-side.

What are the advantages of using XMPP?


There are several advantages of using XMPP (Extensible Messaging and Presence Protocol) for app developers.
 Open Standard: XMPP is an open and widely adopted standard for real-time communication. It is
governed by the Internet Engineering Task Force (IETF), ensuring developers have access to a well-
documented and reliable protocol. This open standard allows for interoperability between different
implementations and vendor-neutral development.
 Real-time Communication: XMPP is designed for real-time communication, making it ideal for apps
that require chat, presence information, and real-time notifications. It supports various communication
types, including text, voice, video, and file transfer, enabling developers to create feature-rich
applications.
 Scalability: XMPP is a highly scalable protocol that can handle many concurrent connections and
messages. It uses a distributed architecture with decentralized servers, allowing for easy scaling by
adding more servers to handle increased traffic. This scalability is particularly important for applications
that need to support a growing user base or handle spikes in usage.
 Flexibility and Extensibility: XMPP is an extensible protocol that allows developers to add custom
features and functionality to their applications. It supports a wide range of extensions, known as XMPP
Extensions (XEPs), which provide additional capabilities such as file sharing, group chat, and multi-user
conferencing. This flexibility enables developers to tailor XMPP to meet the specific needs of their
applications.
 Security: XMPP provides several security features to protect communication's confidentiality, integrity,
and authenticity. It supports end-to-end encryption using Transport Layer Security (TLS) or Secure
Sockets Layer (SSL), ensuring that messages are encrypted and can only be accessed by the intended
recipients.
 Federation: XMPP supports federation, which means that users on different XMPP servers can still
communicate with each other. This is achieved through server-to-server communication, where XMPP
servers exchange messages and presence information. Federation allows for a decentralized and
distributed network of users, making it easier to connect with users on different domains or services.
 Community and Ecosystem: XMPP has a large and active community of developers and users who
contribute to developing and improving the protocol. This community provides support, resources, and
various third-party libraries and tools to facilitate XMPP development. The extensive ecosystem around
XMPP makes it easier for developers to build applications and integrate XMPP into their existing
systems.

You might also like