Professional Documents
Culture Documents
Iot Unit1
Iot Unit1
Introduction : Connecting everyday things embedded with electronics, software, and sensors
to internet enabling to collect and exchange data without human interaction called as the Internet
of Things (IoT).
The term "Things" in the Internet of Things refers to anything and everything in day to day life
which is accessed or connected through the internet.
The software component works towards data collection and analysis, device integration,
application of data into the device, and process extension. The various components of hardware
and software further break down as follows −
Sensors − sensors are the soul of the Internet of Things. These are the hardware
components that sense data by interacting with the environment. Some examples of
sensors are thermostats, microphones, etc.
Actuators − Actuators are also hardware components meant to transform energy into
motion. An electric motor is an example of an actuator in IoT.
Gateway − A gateway is a software component meant to connect the various components
of IoT devices to interact and share information.
Data Analysis is another essential software component for handling and analyzing data.
The sensors' data may need to be more understandable and interpretable. Hence, data
analytics transforms incoming data into an easily processable format.
Artificial Intelligence − IoT devices also leverage the perks of Artificial intelligence to
understand the system well. It allows the developers to control the various aspects of IoT
devices and make the best out of them.
Cloud computing − Cloud computing allows us to handle the data collected by sensors
in an advanced way. It stores a large amount of incoming data on the cloud, an online
data hub, to process it more conveniently.
Interface − Finally comes the user interface. It is the medium through which the users
can access and control the working of IoT devices.
Advantages of IoT
1. Monitoring
IoT allows remote mornintinotring of devices and personal assets. The owner could be in any
part of the world and by the means of his/her smartphone they can check up and monitor their
assets without spending revenue on manual labour. Further IOT helps in understanding the
internal details of your devices. It notifies the user when the product is damaged or out of stock.
IoT keeps life going without much interference from the user.
2. Accessibility
IoT allows users to access real-time information about their devices from any part of the world.
Users can connect to the application and gather information about their personal devices. For
example a person switches on the AC when they are close to home so the room can be cool
before they enter.
The physical objects are connected to each other with wireless forms of technology and hence
automation plays a huge role in the internet of things. It allows the working of these devices
without human intervention. These devices communicate with each other to send and receive
information at all times.
4. Human effort minimization
Iot devices these days perform various tasks with much ease as compared to human beings. They
reduce the dependency on manual labour.
5. Time management
The Iot application in various industries lead to quicker constriction of organisations and various
other domain applications. So it is clear to say that IoT reduces the time factor.
6. Security
IOt devices with string security steam are almost impossible to hack into. These devices have
tighter secret protocols that alert the user instantly in case of any destructive attempt to physical
devices.
IOt helps us better understand the functionality of devices that allows us to make better use of
the available resources.
Since technical devices can easily connect to a smart system such as a computer or a smartphone
this reduces the usage of large technical equipment.
9. Traffic systems
The internet of things has changed the way cities monitor traffic which led to reduced
confessions and traffic accidents
The internet of things has successfully assisted doctors in many complicated medical surgeries
that take hours to complete. This has significantly changed the demographics of the medical and
pharma industry.
IoT allows users to control their homes with smart options. They can access almost any
appliance in their home remotely with the help of their smartphones.
12. Information
Information and details about personal appliances and assets is easily available. Problems, eros
and bugs are easily detected and fixed before the situation goes out of control.
13. Tracking
Iot enables users to track their assets, traffic and transportation systems, inventory, delivery,
security footage, customer orders and more with the help of cost effective tracking devices that
deliver real-time information.
IoT creates a highly reliable and factual data collection with the help of access to real time
information about the surroundings. This allows organisations to better understand and serve
their customers.
One of the reasons why Iot is highly spreading across the world is because of its cost effective
solutions that not only save the budget but also provide active solutions. Iot mainly helps make
people’s lives easier by offering solutions to compact problems.
Disadvantages of IoT
1. Data breach
The physical objects in Iot connect to the internet to transmit and receive information. So the
user data is now available on the internet and hackers can hack this private and sensitive
information. Data breach occurs when outsiders can access the user data without the awareness
of the user. This data can be used to manipulate the user.
2. Dependence
The internet of things largely depends on internet connectivity. Without a stable internet
connection the IoT devices fail to work and the tasks are incomplete.
3. Complexity
IoT seems to be completing complicated tasks yet a huge set of complicated tasks run behind
these devices in order to complete the task. Many times the user is not aware of the internal
mechanism and hence even during a minor inconvenience the user has to contact customer
support. In case the software makes a wrong calculation the entire operation of the object fails.
Hence, It is complicated due to the large amount of code and the machine communication
between various devices. If one machine fails to work the entire network suffers the loss.
4. Security and privacy concerns
Iot systems are connected to a number of devices and communicate within a network. This
means that there is little to no privacy between devices on the network.
5. Increase in unemployment
IoT robots replace manual forces in various industries to a large extent. This causes the
unemployment of factory labourers and sometimes leads to lesser wages for more skilled
labourers.
Any bug in one of the devices leads to corruption in the entire system.
There is no set international Iot standards to match compatibility. This leads to problems in
communication between manufacturers of different domains.
An overuse of the internet and the IoT makes people lazy and lethargic. Since IoT makes lives
easier it also leads to severe health issues since there is less physical movement. This may also
cause an increase in stress levels in the human body in one way or another.
9. Data Overload:
While data collection is a key advantage, the volume of data created by IoT devices can be
overwhelming. Processing and making sense of this massive influx of information pose
challenges regarding storage, bandwidth, and analytical capabilities.
Implementing IoT solutions can be complex, requiring integration across diverse devices,
platforms, and protocols. This complexity can lead to interoperability challenges, making it
difficult for devices from different manufacturers to work seamlessly together.
IOT applications-Potential applications of the IoT are numerous and diverse, permeating into
practically all areas of every-day life of individuals, enterprises, and society as a whole. The IoT
application covers smart environments/spaces in domains such as: Transportation, Building,
City, Lifestyle, Retail, Agriculture, Factory, Supply chain, Emergency, Healthcare, User
interaction, Culture and tourism, Environment and Energy. Below are some of the IoT
applications.
So, from the above image it is clear that there is 4 layers are present that can be divided as follows: Sensing Layer,
Network Layer, Data processing Layer, and Application Layer.
1. Sensing Layer –
The sensing layer is the first layer of the IoT architecture and is responsible for collecting data from
different sources. This layer includes sensors and actuators that are placed in the environment to gather
information about temperature, humidity, light, sound, and other physical parameters. These devices are
connected to the network layer through wired or wireless communication protocols.
2. Network Layer –
The network layer of an IoT architecture is responsible for providing communication and connectivity
between devices in the IoT system. It includes protocols and technologies that enable devices to connect
and communicate with each other and with the wider internet. Examples of network technologies that are
commonly used in IoT include WiFi, Bluetooth, Zigbee, and cellular networks such as 4G and 5G.
Additionally, the network layer may include gateways and routers that act as intermediaries between
devices and the wider internet, and may also include security features such as encryption and authentication
to protect against unauthorized access.
3. Data processing Layer –
The data processing layer of IoT architecture refers to the software and hardware components that are
responsible for collecting, analyzing, and interpreting data from IoT devices. This layer is responsible for
receiving raw data from the devices, processing it, and making it available for further analysis or action.The
data processing layer includes a variety of technologies and tools, such as data management systems,
analytics platforms, and machine learning algorithms. These tools are used to extract meaningful insights
from the data and make decisions based on that data.Example of a technology used in the data processing
layer is a data lake, which is a centralized repository for storing raw data from IoT devices.
4. Application Layer –
The application layer of IoT architecture is the topmost layer that interacts directly with the end-user. It is
responsible for providing user-friendly interfaces and functionalities that enable users to access and control
IoT devices.This layer includes various software and applications such as mobile apps, web portals, and
other user interfaces that are designed to interact with the underlying IoT infrastructure. It also includes
middleware services that allow different IoT devices and systems to communicate and share data
seamlessly.The application layer also includes analytics and processing capabilities that allow data to be
analyzed and transformed into meaningful insights. This can include machine learning algorithms, data
visualization tools, and other advanced analytics capabilities.
Lecture 2
IOT architectural view
Smart device / sensor layer: The lowest layer is made up of smart objects integrated with
sensors. The sensors enable the interconnection of the physical and digital worlds allowing real-
time information to be collected and processed. There are various types of sensors for different
purposes. The sensors have the capacity to take measurements such as temperature, air quality,
speed, humidity, pressure, flow, movement and electricity etc. In some cases, they may also
have a degree of memory, enabling them to record a certain number of measurements. A sensor
can measure the physical property and convert it into signal that can be understood by an
instrument. Sensors are grouped according to their unique purpose such as environmental
sensors, body sensors, home appliance sensors and vehicle telemetric sensors, etc
Gateways and Networks-Massive volume of data will be produced by these tiny sensors
and this requires a robust and high performance wired or wireless network infrastructure as a
transport medium. Current networks, often tied with very different protocols, have been used to
support machine-to-machine (M2M) networks and their applications. With demand needed to
serve a wider range of IoT services and applications such as high speed transactional services,
context- aware applications, etc, multiple networks with various technologies and access
protocols are needed to work with each other in a heterogeneous configuration. These networks
can be in the form of a private, public or hybrid models and are built to support the
communication requirements for latency, bandwidth or security. Various gateways
(microcontroller, microprocessor) & gateway networks (WI-FI, GSM, GPRS).
Total infrastructure system can be categorized into 4 layers to receive context supported e-
services out of raw data from the Internet of Things. These 4 layers establish a generic
framework that does not alter the current network infrastructure but create an interfacing among
services and entities through network virtualization.
1. Connectivity Layer-
This layer includes all the physical devices involved in the framework and the interconnection
among them. Future internet largely depends on the unification of these common objects found
everywhere near us and these should be distinctly identifiable and controllable.
This layer also involves assigning of low range networking devices like sensors, actuators,
RFID tags etc and resource management checks the availability of physical resources of all the
devices and networks involved in the underlying infrastructure. These devices contain very
limited resources and resource management ensures the maximum utilization with little
overhead. It also allows sharing and distribution of information among multiple networks or
single network divided into multiple domains.
2. Access Layer-
Context Data will be reached to internet via IoT Gateway as captured by short range devices
in form of raw data. Access layer comprises topology definition, network initiation, creation of
domains etc. This layer also includes connection setup, intra-inter domain communication,
scheduling, packet transmissions between flow-sensors and IoT gateway. The simulation was run
later in this paper for different scenario based on this layer. Feature management contains a
feature filter which accepts only acceptable context data and redundant data are rejected. Large
number of sensor maintains lots of features but only a small subset of features is useful generate
a context data.
Feature filter helps to reduce irrelevant data transmission, increases the data transfer rate of
useful data and reduce energy and CPU consumption too. Number of features can be different
based on the application requirements and context data types.
3. Abstraction Layer-
One of the most important characteristics of OpenFlow is to add virtual layers with the
preset layers, leaving the established infrastructure unchanged. A virtual link can be created
among different networks and a common platform can be developed for various communication
systems. The system is fully a centralized system from physical layer viewpoint but a
distribution of service (flow visor could be utilized) could be maintained. One central system
can monitor, control all sorts of traffics. It can help to achieve better band-width, reliability,
robust routing, etc. which will lead to a better Quality of Services (QoS).
In a multi-hopping scenario packets are transferred via some adjacent nodes. So, nodes near
to access points bears too much load in comparison to distant nodes in a downstream scenario
and inactivity of these important nodes may cause the network to be collapsed. Virtual presence
of sensor nodes can solve the problem where we can create a virtual link between two sensor
networks through access point negotiation. So, we can design a three a three layer platform,
where common platform and virtualization layer are newly added with established
infrastructure. Sensors need not to be worried about reach-ability or their placement even in
harsh areas. Packet could be sent to any nodes even if it is sited on different networks.
4. Service Layer-
Storage management bears the idea about all sorts of unfamiliar and/or important
technologies and information which can turn the system scalable and efficient. It is not only
responsible for storing data but also to provide security along with it. It also allows accessing
data effectively; integrating data to enhance service intelligence, analysis based on the services
required and most importantly increases the storage efficiency. Storage and management layer
involves data storage & system supervision, software services and business management &
operations. Though they are included in one layer, the business support system resides slightly
above of cloud computing service whereas Open-Flow is placed below of it as presented to
include virtualizations and monitor management.
Service management combines the required services with organizational solutions and thus
new generation user service becomes simplified. These forthcoming services are necessitated
to be cointerrelated and combined in order to meet the demand socio- economic factors such as
environment analysis, safety measurement, climate management, agriculture modernization etc.
-----------------------------------------------------------------------------------------------------------------
(1) Module for interaction with local IoT devices. This module is responsible for acquisition
of observations and their forwarding to remote servers for analysis and permanent storage.
(2) Module for local analysis and processing of observations acquired by IoT devices.
(3) Module for interaction with remote IoT devices, directly over the Internet. This module is
responsible for acquisition of observations and their forwarding to remote servers for analysis
and permanent storage.
(4) Module for application specific data analysis and processing. This module is running on an
application server serving all clients. It is taking requests from mobile and web clients and
relevant IoT observations as input, executes appropriate data processing algorithms and
generates output in terms of knowledge that is later presented to users.
(5) User interface (web or mobile): visual representation of measurements in a given context
(for example on a map) and interaction with the user, i.e. definition of user queries. The
Designs are shown below:
Physical Design of IOT-The Internet of Things will become part of the fabric of everyday life.
It will become part of our overall infrastructure just like water, electricity, telephone, TV and
most recently the Internet. Whereas the current Internet typically connects full-scale computers,
the Internet of Things (as part of the Future Internet) will connect everyday objects with a strong
integration into the physical world.
A three-layer architecture is the common and generally known structure. It was first used in the initial phases of
this IoT study. It indicates three levels: perception, network, and application.
1. Perception Layer :
This perception layer is the IoT architecture’s physical layer. In these sensors and embedded systems are used
mainly. These collect large amounts of data based on the requirements. This also includes edge devices,
sensors, and actuators that communicate with the surroundings. It detects certain spatial parameters or detects
other intelligent things /objects in the surroundings.
2. Network Layer :
The data obtained by these devices must be distributed and stored. This is the responsibility of the network
layer. It binds these intelligent objects to other intelligent/ smart objects. It is also in charge of data transfer.
The network layer is in-charge of linking smart objects, network devices, and servers. It is also used to
distribute and analyze sensor data.
3. Application Layer :
The user communicates with this application layer. It is in-charge of providing the customer with software
resources. Example: in smart home application, where users press a button in the app to switch on a coffee
machine, for example. The application layer is in-charge of providing the customer with application-specific
resources. It specifies different uses for the IoT, such as smart houses, smart cities, and smart health.
So, from the above image it is clear that there is 4 layers are present that can be divided as follows: Sensing
Layer, Network Layer, Data processing Layer, and Application Layer.
1. Sensing Layer –
The sensing layer is the first layer of the IoT architecture and is responsible for collecting data from
different sources. This layer includes sensors and actuators that are placed in the environment to gather
information about temperature, humidity, light, sound, and other physical parameters. These devices are
connected to the network layer through wired or wireless communication protocols.
2. Network Layer –
The network layer of an IoT architecture is responsible for providing communication and connectivity
between devices in the IoT system. It includes protocols and technologies that enable devices to connect
and communicate with each other and with the wider internet. Examples of network technologies that
are commonly used in IoT include WiFi, Bluetooth, Zigbee, and cellular networks such as 4G and 5G.
Additionally, the network layer may include gateways and routers that act as intermediaries between
devices and the wider internet, and may also include security features such as encryption and
authentication to protect against unauthorized access.
3. Data processing Layer –
The data processing layer of IoT architecture refers to the software and hardware components that are
responsible for collecting, analyzing, and interpreting data from IoT devices. This layer is responsible
for receiving raw data from the devices, processing it, and making it available for further analysis or
action.The data processing layer includes a variety of technologies and tools, such as data management
systems, analytics platforms, and machine learning algorithms. These tools are used to extract
meaningful insights from the data and make decisions based on that data.Example of a technology used
in the data processing layer is a data lake, which is a centralized repository for storing raw data from IoT
devices.
4. Application Layer –
The application layer of IoT architecture is the topmost layer that interacts directly with the end-user. It
is responsible for providing user-friendly interfaces and functionalities that enable users to access and
control IoT devices.This layer includes various software and applications such as mobile apps, web
portals, and other user interfaces that are designed to interact with the underlying IoT infrastructure. It
also includes middleware services that allow different IoT devices and systems to communicate and
share data seamlessly.The application layer also includes analytics and processing capabilities that allow
data to be analyzed and transformed into meaningful insights. This can include machine learning
algorithms, data visualization tools, and other advanced analytics capabilities.
Perception Layer :
This is the first layer of IoT architecture. In the perception layer, number of sensors and actuators are
used to gather useful information like temperature, moisture content, intruder detection, sounds, etc. The
main function of this layer is to get information from surroundings and to pass data to another layer so
that some actions can be done based on that information.
Network Layer :
As the name suggests, it is the connecting layer between perception and middleware layer. It gets data
from perception layer and passes data to middleware layer using networking technologies like 3G, 4G,
UTMS, WiFI, infrared, etc. This is also called communication layer because it is responsible for
communication between perception and middleware layer. All the transfer of data done securely keeping
the obtained data confidential.
Middleware Layer :
Middleware Layer has some advanced features like storage, computation, processing, action taking
capabilities. It stores all data-set and based on the device address and name it gives appropriate data to
that device. It can also take decisions based on calculations done on data-set obtained from sensors.
Application Layer :
The application layer manages all application process based on information obtained from middleware
layer. This application involves sending emails, activating alarm, security system, turn on or off a
device, smartwatch, smart agriculture, etc.
Business Layer :
The success of any device does not depend only on technologies used in it but also how it is being
delivered to its consumers. Business layer does these tasks for the device. It involves making flowcharts,
graphs, analysis of results, and how device can be improved, etc.
IOT protocols
IoT protcols help to establish Communication between IoT Device (Node Device) and Cloud based Server over
the Internet. It help to sent commands to IoT Device and received data from an IoT device over the Internet. An
image is given below. By this image you can understand which protocols used.
Link Layer
Link layer protocols determine how data is physically sent over the network’s physical layer or medium (Coxial
calbe or other or radio wave). This Layer determines how the packets are coded and signaled by the hardware
device over the medium to which the host is attached (eg. coxial cable).
802.3 – Ethernet : Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first
standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the physical layer and the medium access
control (MAC) sub-layer of the data link layer for wired Ethernet networks. Ethernet is classified into two
categories: classic Ethernet and switched Ethernet.
802.11 – WiFi : IEEE 802.11 is part of the IEEE 802 set of LAN protocols, and specifies the set of media
access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network
(WLAN) Wi-Fi computer communication in various frequencies, including but not limited to 2.4 GHz, 5 GHz,
and 60 GHz frequency bands.
802.16 – Wi-Max : The standard for WiMAX technology is a standard for Wireless Metropolitan Area
Networks (WMANs) that has been developed by working group number 16 of IEEE 802, specializing in point-
to-multipoint broadband wireless access.
802.15.4 -LR-WPAN : A collection of standards for Low-rate wireless personal area network. The IEEE’s
802.15.4 standard defines the MAC and PHY layer used by, but not limited to, networking specifications such
as Zigbee®, 6LoWPAN, Thread, WiSUN and MiWi™ protocols. The standards provide low-cost and low-speed
communication for power constrained devices.
2G/3G/4G- Mobile Communication : These are different types of telecommunication generations. IoT devices
are based on these standards can communicate over the celluer networks.
Network Layer
Responsible for sending of IP datagrams from the source network to the destination network. Network layer
performs the host addressing and packet routing. We used IPv4 and IPv6 for Host identification. IPv4 and IPv6
are hierarchical IP addrssing schemes.
IPv4 :
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication. An IP address serves two main functions:
host or network interface identification and location addressing. Internet Protocol version 4 (IPv4) defines an IP
address as a 32-bit number. However, because of the growth of the Internet and the depletion of available IPv4
addresses, a new version of IP (IPv6), using 128 bits for the IP address, was standardized in 1998. IPv6
deployment has been ongoing since the mid-2000s.
IPv6 : Internet Protocol version 6 (IPv6) is successor of IPv4. IPv6 was developed by the Internet
Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. In
December 1998, IPv6 became a Draft Standard for the IETF, who subsequently ratified it as an Internet
Standard on 14 July 2017. IPv6 uses a 128-bit address, theoretically allowing 2128, or approximately 3.4×1038
addresses. Source – wikipedia
6LoWPAN : It is an acronym of IPv6 over Low-Power Wireless Personal Area Networks. 6LoWPAN is the
name of a concluded working group in the Internet area of the IETF. This protocol allows for the smallest
devices with limited processing ability to transmit information wirelessly using an internet protocol. 6LoWPAN
can communicate with 802.15.4 devices as well as other types of devices on an IP network link like WiFi.
Transport Layer
This layer provides functions such as error control, segmentation, flow control and congestion control. So this
layer protocols provide end-to-end message transfer capability independent of the underlying network.
TCP : TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a network
conversation through which application programs can exchange data. TCP works with the Internet Protocol
(IP), which defines how computers send packets of data to each other. Together, TCP and IP are the basic rules
defining the Internet. The Internet Engineering Task Force (IETF) defines TCP in the Request for Comment
(RFC) standards document number 793.
UDP : User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of Internet Protocol suite,
referred as UDP/IP suite. Unlike TCP, it is unreliable and connectionless protocol. So, there is no need to
establish connection prior to data transfer.
Application Layer
MQTT protocol is based on publish/subscribe architecture. The publish/subscribe architecture consists of three
major components: publishers, subscribers, and a broker. According to IoT point of view, publishers are
lightweight sensor devices that send their data to connected broker and goes back to sleep whenever possible.
Subscribers are applications, which are interested in a certain topic or sensory data, so they are connected to
brokers to be informed whenever new data are received. The broker receives the sensory data and filters them in
different topics and sends them to subscribers according to interest in the topics.
SMQTT (Secure Message Queue Telemetry Transport)
SMQTT (Secure Message Queue Telemetry Transport) is an extension of MQTT protocol which uses
encryption based on lightweight attribute encryption. The main advantage of this encryption is that it has a
broadcast encryption feature. In this features, one message is encrypted and delivered to multiple other nodes.
The process of message transfer and receiving consists of four major stages:
1. Setup: In this phase, the publishers and subscribers register themselves to the broker and get a secret
master key.
2. Encryption: When the data is published to broker, it is encrypted by broker.
3. Publish: The broker publishes the encrypted message to the subscribers.
4. Decryption: Finally the received message is decrypted by subscribers with the same master key.
CoAP
CoAP (Constrained Application Protocol) is a session layer protocol that provides the RESTful (HTTP)
interface between HTTP client and server. It is designed by IETF Constrained RESTful Environment (CoRE)
working group. It is designed to use devices on the same constrained network between devices and general
nodes on the Internet. CoAP enables low-power sensors to use RESTful services while meeting their low power
constraints. This protocol is specially built for IoT systems primarily based on HTTP protocols.
This network is used within the limited network or in a constrained environment. The whole architecture of
CoAP consists of CoAP client, CoAP server, REST CoAP proxy, and REST internet.
The data is sent from CoAP clients (such as smartphones, RFID sensors, etc.) to the CoAP server and the same
message is routed to REST CoAP proxy. The REST CoAP proxy interacts outside the CoAP environment and
uploads the data over REST internet.
DDS
DDS (Data Distribution Service) is a middleware (sometimes called machine-to-machine (M2M))
communication protocol. It is implemented by the Object Management Group (OMG) standard for the real-time
system with high speed and high-performance, scalable, dependable, and interoperable data exchange. This
communication protocol is based on a publish-subscribe pattern for sending and receiving data, events, and
commands among the nodes.
It’s an open communication protocol for instant messaging (IM), presence information, and real-time
applications that’s part of the Jabber technologies and XMPP.org family.
XMPP enables the exchange of XML-based messages between clients and servers in a decentralized manner.
This means that, unlike other messaging protocols, XMPP doesn't rely on a central server to facilitate
communication. Instead, it follows a federated model where users or organizations can operate their own XMPP
server and communicate with users server-side.