Professional Documents
Culture Documents
The Internet of Things John Davies Full Chapter
The Internet of Things John Davies Full Chapter
Edited by
John Davies
British Telecommunications plc, Ipswich, UK
Carolina Fortuna
Jožef Stefan Institute, Ljubljana, Slovenia
This edition first published 2020
© 2020 John Wiley & Sons Ltd
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise,
except as permitted by law. Advice on how to obtain permission to reuse material from this title is available
at http://www.wiley.com/go/permissions.
The right of John Davies and Carolina Fortuna to be identified as the authors of the editorial material in
this work has been asserted in accordance with law.
Registered Offices
John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA
John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK
Editorial Office
The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK
For details of our global editorial offices, customer services, and more information about Wiley products
visit us at www.wiley.com.
Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that
appears in standard print versions of this book may not be available in other formats.
Printed and bound by CPI Group (UK) Ltd, Croydon, CR0 4YY
10 9 8 7 6 5 4 3 2 1
v
Contents
1 Introduction 1
John Davies and Carolina Fortuna
1.1 Stakeholders in IoT Ecosystems 3
1.2 Human and IoT Sensing, Reasoning, and Actuation: An Analogy 4
1.3 Replicability and Re-use in IoT 5
1.4 Overview 6
References 7
3 Edge Computing 21
Mohammad Hossein Zoualfaghari, Simon Beddus, and Salman Taherizadeh
3.1 Introduction 21
3.2 Edge Computing Fundamentals 22
vi Contents
12 Healthcare 159
Duarte Gonçalves-Ferreira, Joana Ferreira, Bruno Oliveira, Ricardo Cruz-Correia,
and Pedro Pereira Rodrigues
12.1 Internet of Things in Healthcare Settings 159
12.1.1 Monitoring Patient Status in Hospitals 160
12.1.2 IoT from Healthcare to Everyday Life 160
12.1.3 Systems Interoperability 161
12.2 BigEHR: A Federated Repository for a Holistic Lifelong Health Record 163
12.2.1 Why a Federated Design? 164
12.2.2 System Architecture 164
12.3 Gathering IoT Health-Related Data 165
12.3.1 From Inside the Hospitals 166
12.3.2 Feeding Data from Outside Sources 166
12.4 Extracting Meaningful Information from IoT Data 167
12.4.1 Privacy Concerns 167
12.4.2 Distributed Reasoning 167
12.5 Outlook 168
Acknowledgments 169
References 169
15 Conclusion 207
John Davies and Carolina Fortuna
15.1 Origins and Evolution 207
15.2 Why Now? 207
15.2.1 Falling Costs and Miniaturization 208
15.2.2 Societal Challenges and Resource Efficiency 208
15.2.3 Information Sharing Comes of Age 208
15.2.4 Managing Complexity 208
15.2.5 Technological Readiness 208
15.3 Maximizing the Value of Data 209
15.4 Commercial Opportunities 209
15.5 A Glimpse of the Future 210
References 212
Index 213
xi
Professor John Davies is Chief Researcher in BT’s Research & Innovation Department,
where he leads a team focused on Internet of Things technologies. He has a strong track
record of researching and innovating and his current research interests include the appli-
cation of Internet of Things and semantic technologies to smart cities, smart transport,
business intelligence, and information integration. He currently leads BT’s contribution
to the UK flagship Manchester-based CityVerve IoT smart city programme as well as the
H2020 NRG-5 Smart Energy project and he co-wrote the Hypercat IoT standard. John has
authored several technical books and written over 90 scientific publications. He is the inven-
tor of several patents. He is a Fellow of the British Computer Society and a Chartered
Engineer. John is a visiting professor at a number of UK universities and holds a PhD in
Artificial Intelligence from the University of Essex, UK.
Carolina Fortuna is a Senior Research Fellow at the Jožef Stefan Institute. She received
her BSc in 2006 from the Technical University of Cluj-Napoca, Romania, her PhD in
2013 in Slovenia, was a postdoctoral research associate at Ghent University 2014–2015
in Belgium, and a visiting researcher at Stanford University, USA, in 2017. Her research
is interdisciplinary focusing on semantic technologies with applications in modeling of
communication and sensor systems and on combining semantic technologies, statistical
learning and networks for analyzing large datasets. She has participated in multiple
collaborative research projects, taking leadership roles in several. She has co-authored over
50 peer-reviewed publications and gained industry insight by working with Bloomberg LP
(New York) and Siemens PSE (Romania).
xiii
List of Contributors
Nicolas Seydoux
Departments of SARA and MELODI
LAAS-CNRS, CNRS, INSA, IRIT
University of Toulouse
Toulouse
France
xvii
Foreword
The Internet of Things (IoT) is the next phase in the evolution of the Internet and will trans-
form our business and personal lives in many areas. IoT refers to the increasing trend for
many types of objects including vehicles, environmental sensors, traffic sensors, clothing,
and all kinds of consumer goods to be connected to the Internet and to have the ability to
sense, communicate, network, and produce new information. The information generated
by IoT devices is already exploited in a wide range of early applications: there are existing
uses in the field of transport, smart cities, retail, logistics, home automation, and industrial
control among others.
The IoT will generate massive volumes of data that flow to the computers for analysis,
resulting in the collection of much richer information and insights in real time and used by
automated systems to respond intelligently with appropriate actions.
The IoT has been a recurrent theme among commentators since the term was coined in
the late 1990s. It involves a radical new view of networked ICT and the relationship between
information systems and the physical world. The vision of IoT is that any physical object
can be given the ability to measure and respond to its environment and to communicate
with other objects or with computer systems anywhere in the world. This is now becoming
technologically feasible and commercially viable.
Recently, a number of technological and socioeconomic drivers for the IoT have emerged,
leading to expectations of very rapid growth over the next 5–10 years.
A key factor is the falling cost of essential components that will turn things into connected
devices. Gartner claims components such as Wi-Fi radios, GPS chips, or microcontrollers
will fall toward less than €1 each in the near term when purchased in volume.
Another driver is the fact that the efficient use of natural resources is becoming increas-
ingly important – with a new emphasis on costs and security of supply, as well as con-
cerns about sustainability. Governments and organizations are motivated to improve the
efficiency of their operations and are looking to technological solutions. Urbanization con-
tinues to increase globally, and cities are an efficient way to structure societies where natural
resources are constrained. The IoT has a central role to play in making more efficient and
effective use of finite resources. For example, traffic congestion is now estimated to cost the
UK economy more than £300 billion between 2013 and 2030. IoT applications providing
intelligent management and improved communication with road users have the potential
to reduce congestion – and hence pollution – significantly.
xviii Foreword
From a technological point of view, achieving the scale and connectivity envisaged for
the IoT depends on the ability to deploy and operate connected sensors, controllers, and
actuators cheaply and easily. Network access has rapidly improved, with a range of wired
and wireless access technologies now providing a wide coverage. In addition to cellular and
Wi-Fi networks, low power radio technologies well-suited to machine-to-machine commu-
nication patterns are becoming available. In addition, 5G networks with a much enhanced
bandwidth and latency characteristics will be deployed in the near future. Flexible comput-
ing infrastructures such as Cloud are now well established and offer the ability to deploy
applications on demand in any region of the world.
Worldwide, there are today approximately 1.5 billion PCs and more than 1 billion mobile
phones connected to the Internet. The IoT will greatly expand the number of connected
devices by facilitating a wide range of uniquely identifiable new devices to be connected.
An often-quoted estimate is that there will be 25 billion objects connected by 2020. These
new networked devices can use the Internet to publish data about their status and to receive
data from other devices and human users.
In short, the time is right for IoT.
IoT applications have a characteristic structure with three major layers: (i) collecting data
from or delivering messages to devices, (ii) enrichment of data to generate information
in context, and (iii) applications that process information and initiate appropriate actions.
These are primary activities in the IoT value chain with common requirements (e.g. secure
distribution, digital storage, and computational processing) that can be generically sup-
ported. This volume covers all the major technologies required to support this value chain,
including connectivity, security, data privacy and trust, and a range of AI and related tech-
niques for extracting valuable and actionable insight from the IoT data.
By reading the book, readers new to this area, albeit having some basic ICT background,
will become well acquainted with the concepts, components, technologies, and application
areas related to and enabled by IoT. Readers already having some acquaintance with IoT
will deepen their insight into IoT technologies as well as novel application areas.
Acknowledgments
The editors wish to thank Dr. Andrew Reeves for proofreading a number of chapters, Paul
Deans for valuable input on graphical design, and Maruša Mazej for reworking the figures
and thereby improving the appearance and accessibility of the book.
Chapters 11 and 13 are partly based on work done on the NRG5 project, which received
funding from the European Union’s Horizon 2020 research and innovation programme
under grant agreement No. 762013.
1
Introduction
John Davies 1 and Carolina Fortuna 2
1
British Telecommunications plc, Ipswich, UK
2
Jožef Stefan Institute, Ljubljana, Slovenia
The physical world is becoming ever more closely connected to information systems as sen-
sors and actuators are incorporated into a wide variety of physical objects – from highways
to pacemakers to cattle to running shoes to factories – and then connected to the Internet
via a range of wired and wireless networks. This is the Internet of Things (IoT) and it is
already generating massive volumes of data. The result is that much richer information can
be collected (in real time) and used by automated systems to provide actionable insight and
to respond to changing contexts with appropriate intelligent actions. IoT has rapidly moved
from the conceptual phase to widespread use in real-world applications in recent years.
The IoT will deliver significant innovation in many different areas, including future
cities, transport, health and social care, manufacturing, and agriculture. Sensors can now
be deployed at low cost to instrument the world to a far greater extent than has been
possible before. There is increasing recognition of the potential value in opening up data
resources so that they can be exploited more fully.
At the highest level, many of the IoT applications being considered appear similar –
involving the collection of information from a range of sensors and other sources, interpret-
ing this in a specific context, and then making better decisions that improve a behaviour or
a process. For instance, smart watches or other types of wearable sensing devices are able to
drive improvements in our behaviour toward a healthier daily routine. Merchandise track-
ing sensors can lead to a better understanding of supply chains and deliver optimization of
costs and minimization of carbon footprints. IoT has a unique potential for automating and
improving man-made systems and behaviours by enabling unprecedented understanding
and insight. For example, IoT data enabled a recent comprehensive global study across
111 countries on the impact of physical activity variation and the built environment on
health [1].
The IoT has been a recurrent theme among commentators since the term was coined
in the late 1990s. The concept has evolved from early work on Radio Frequency Identifier
(RFID) technology which represented a hardware related break-through that aimed to con-
nect everyday objects to a network. This perhaps constituted the first wave of the IoT, which
then developed beyond the initial hardware world innovation, and focused increasingly
The Internet of Things: From Data to Insight, First Edition. Edited by John Davies and Carolina Fortuna.
© 2020 John Wiley & Sons Ltd. Published 2020 by John Wiley & Sons Ltd.
2 1 Introduction
RFID LORA
Trace
on developing new types of sensors and sensing materials, as well as on developing new
communication technologies and protocols. As a result, a wide variety of new commu-
nication technologies emerged in the early years of the twenty-first century which were
able to support the ubiquitous deployment of a wide variety of sensors. We refer to this as
the second wave of IoT. In the last decade, the focus of IoT has shifted to data collection,
1.1 Stakeholders in IoT Ecosystems 3
processing and security aspects and this period is termed the third wave of IoT. This book
focuses primarily on this most recent wave and covers all key aspects including data man-
agement, processing, and analytics as well as security, privacy and trust as depicted in
Figure 1.1. Real-world examples are given that show the application of IoT technologies
in a number of different sectors.
Application developers produce applications that process the available data within a
specific context to produce actionable insight for end users. Application developers should
be able to discover what data and platform resources are available to them, what the key
features and costs of each resource are, and assess which ones meet the needs of the appli-
cations that they want to build. This includes both the information content of the resources
and practical considerations for the resources, such as dependability (accuracy, availability,
etc.), conditions of use, or commercial considerations.
End users participate in the ecosystem by using the information and applications that
are made available to them by other stakeholders. The end users can be private persons or
institutional decision makers. As the ultimate beneficiaries of the functionality provided by
the other stakeholders, it is important that their experience is positive and the ecosystem
delivers real value for them. An IoT ecosystem will not be sustainable without the trust of
its end users.
For individual end users, participation in the ecosystem is generally via an application.
Often this application will make use of information that is generated through their use
of the application, for example the user’s location is often used as a data source by appli-
cations on mobile phones. The situation where the individual is an information provider
needs to be addressed with care, particularly where personally identifiable or potentially
sensitive information may be involved. Open engagement with end users that ensures they
are properly informed and understand that they are included in the ecosystem is essential.
Figure 1.2 Human versus IoT: the sense, process, and actuate analogy.
The sensed data can then be processed locally on the devices (“edge processing” in the ter-
minology of IoT) or sent via wireless or wired technology to data platforms (processing and
storage engines, such as the Information Exchange depicted in Figure 1.1). This model is
similar to how stimuli from sensory organs are sent via the nerves to the brain. These pro-
cessing and storage engines then process the received information and generate actionable
insight or other types of knowledge. In more advanced applications, systems can also initi-
ate an action such as adjusting a setting in a heating system, sending a tweet, or actuating
hardware controlling an industrial process.
One key distinction between the IoT and the way in which humans process and react
to sense data is that, while in the case of the humans the sensors and processors are
co-located, in the case of IoT the system is typically distributed as shown in Figure 1.2. This
analogy has inspired researchers and enthusiasts for decades, but, in spite of some reports
in the media, relevant sensorics, robotics, and AI technologies are still far from achieving
human capabilities.
communications networks (including the Internet), the case for common services is very
strong. Cloud computing and storage are also becoming widely accepted, although there
are still many situations where private infrastructure is preferred. The potential for an IoT
ecosystem to stimulate and enable innovation is clear, but all participants need to have con-
fidence in the value proposition and be convinced that it meets their needs. If this is not the
case then a sustainable ecosystem will not be possible. Areas of concern for participants
will include security and trust, respect for personal and commercial rights, dependability,
performance, the ability to comply with legal and regulatory obligations, and cost. Pre-
dictability, simplicity, and flexibility are additional important characteristics.
1.4 Overview
In this book, we address the entire vertical technology stack of IoT, with special emphasis
on the data aggregation, processing, management, analysis, and exploitation aspects.
Importantly, we also discuss recent developments in distributed trust, security, and pri-
vacy options. Currently we are at a critical point in the development of IoT. While there is a
clear need for sensor-based, data-driven decision making with the potential for significant
commercial and societal benefits, there are also increasing data misuse concerns that mali-
cious users could abuse, with such a system causing unintended actions and destabilizing
normal operation.
This book is comprised of two main parts. Firstly, it brings together a description of the
full technology stack of IoT with, as mentioned, a focus on the data-driven aspects. These
include data modeling, processing, and security. There is also discussion on the critical
related aspects of connectivity, privacy, and trust. The second part of the book explains how
this technology is being applied in practice and the benefits that it is delivering by providing
a number of chapters describing specific applications across a number of industry sectors.
The first part of the book can be seen as comprising three subparts. The first subpart,
formed of Chapters 2 and 3, introduces data collection (connectivity) and computational
infrastructure. The second subpart, comprised of Chapters 4 to 8 discusses the various
aspects of data processing. Finally, Chapters 9 to 11 discuss security, trust, and privacy chal-
lenges as related to IoT.
More specifically, Chapter 2 analyzes connectivity options for the IoT, with particular
focus on dedicated low-power wide-area network and cellular technologies. Enabling
low-power communications is perhaps the most important challenge for IoT devices,
which are often battery-operated. Chapter 3 introduces emerging edge computing archi-
tectures and technologies. Topics include data computation close to the network edge as
well as the challenge of the efficient management of large numbers of devices through
their lifecycle.
Chapter 4 discusses IoT data platforms and the need for data interoperability, so that data
coming from various IoT systems can be more easily integrated for developing informed
decision-making systems and thereby maximizing the value of IoT data. Chapter 5 focuses
on architectures and emerging technologies that enable the processing of streaming data.
IoT deployments in several application areas, especially for fault detection in critical
systems, should produce real-time insights for alerting and decision making, meaning
References 7
that specialized data stream processing systems are often required. Chapter 6 describes
the important role of computer vision in IoT, particularly in drone-operated scenarios
using relatively lightweight computation. Chapter 7 introduces structured knowledge
representation and reasoning technologies for IoT. This chapter can be seen as showing the
suitability of symbolic AI applied to IoT. Chapter 8 then overviews the role of humans in
crowdsourcing IoT data collection as well as data annotation and labeling for AI algorithms.
Chapter 9 discusses security challenges in an IoT world and provides general guidelines
for preventing undesired events. Chapter 10 considers distributed ledger technology, also
known as blockchain, as a possible trust enabler in an IoT ecosystem. Chapter 11 reviews
data privacy standards, regulations, and technologies that are relevant for particular types
of IoT-generated data such as in the healthcare domain.
The second part of the book comprises three chapters focused on the application of
IoT technologies in selected application areas: healthcare, energy, and air quality and
road transportation. Chapter 12 shows the important role of IoT data representation,
interoperability, and privacy in integrated digital infrastructures for hospitals. Chapter 13
shows the application of IoT technology and the need for trust and for real-time processing
systems in emerging smart grid energy systems. Finally, Chapter 14 discusses the role of
IoT in optimizing road transportation for improved air quality.
We conclude by discussing the future outlook for IoT and related technologies.
References
1 Althoff, T., Sosič, R., Hicks, J.L. et al. (2017). Large-scale physical activity data reveal
worldwide activity inequality. Nature 547 (7663): 336.
2 Krizhevsky, A., Sutskever, I., and Hinton, G.E. (2012). Image net classification with deep
convolutional neural networks. Advances in Neural Information Processing Systems.
9
2.1 Introduction
In this chapter, we discuss the set of network access technologies used for the Internet
of Things (IoT). We describe the scope of “things” that can be connected and the wide range
of requirements placed on the networks to support the many different types of device. We
describe how existing networking technologies can support some of these devices and con-
nectivity requirements, and then look in detail at some of the new network technologies
and capabilities that are being developed specifically to support IoT.
The connectivity of IoT devices is achieved through the access network – that part of the
network which is concerned with moving data to and from a sensor or edge device into
a backhaul network, often via a gateway. The number and complexity of devices that can
be connected is enormous, covering a range of potential use cases and scenarios, and to
understand the range of requirements for access networks, there is a need to understand
the scope of the term “Thing.” Due to the wide range of devices and sensors that can be
used in IoT solutions, it is not possible to connect all potential devices using a single net-
working technology. Instead, a range of technology and networking options are available
to meet particular requirements – there is no single “best” solution for all scenarios. In order
to understand the technical choices in any particular environment, it is useful to under-
stand the key determining factors. We will examine the key requirements that determine
the choice of network, briefly look at how a range of existing network capabilities can meet
a large proportion of these needs, but then explore in more detail some of the newer net-
working technologies that are being developed specifically to support the uses that cases
demand from the IoT.
Traditional networks tend to fall into two main classes: voice and data. Voice services
require low latency and data rates, whereas data-based communications can have a range
of requirements on latency and data rates. IoT networks are inherently data networks, but
their requirements vary from traditional multimedia communications for which current
data networks have been principally designed. Furthermore, the scale of IoT in terms of the
number of connected devices is significantly greater than that for human-operated devices
The Internet of Things: From Data to Insight, First Edition. Edited by John Davies and Carolina Fortuna.
© 2020 John Wiley & Sons Ltd. Published 2020 by John Wiley & Sons Ltd.
10 2 Connecting Devices: Access Networks
(such as phones) for which traditional networks were originally designed. When designing
or selecting an appropriate connectivity technology for IoT, the key considerations are:
• Data rate. How much data needs to be transmitted and how often? Data rate requirements
can range from real-time video streaming from high-definition cameras, through to smart
parking sensors, which may only transmit 10 times a day or less, with each message only
being a small number of bits.
• Power availability. In the video scenario above, the camera requires a continuous power
feed, both for its own operation but also to support the network connection, whereas
a smart parking sensor that has been buried in the road surface would have to run off
a battery for several years. Although these are two examples at opposite ends of the
power requirements spectrum, they demonstrate that access to power is crucial for high-
throughput devices, whereas devices that are required to run off batteries for several years
will have lower bandwidth and throughput capabilities, and thus require different net-
working technology to support this.
• Range. Use cases vary from short distance, such as homes, offices, cars, and factories,
through to long ranges for wider area city networks, deep in-building penetration, or
rural use cases such as agriculture.
• Cost. Low-cost modules and networks are required for several use cases in order to sup-
port the business models to make deployment and operation of devices and sensors com-
mercially viable, so becomes a key factor in real-world deployments.
Starting from the new type of data delivery infrastructure required by IoT and these four
key considerations, we analyze well-established and traditional connectivity technologies
as well as emerging IoT-specific technologies. We discuss and illustrate the design trade-offs
with a focus on the emerging technologies dedicated to IoT requirements.
Several existing network capabilities, covering both fixed and wireless technologies, support
a number of the requirements for IoT networks. Short-range, energy-efficient, and typically
a high data rate can be delivered through (wireless) personal area networks (WPAN), which
include technologies such as Bluetooth and ZigBee. A mid-range high data rate can be deliv-
ered via a (wireless) local area network (WLAN), which typically means Wi-Fi, or by using
Ethernet over a fixed network. Long-range, energy-efficient, and low data rates can be deliv-
ered by new low-power wide area networks (LP-WANs), while long range flexible data rates
can be delivered through cellular networks, as depicted in Figure 2.1.
year LPWAN 1 KB
month 1 MB
W(PAN)
W(LAN)
100 MB
day CELLULAR
Range
1m 1 km 10 km
Figure 2.1 Range, battery life, and data rate for network technologies.
In both cases, once the data reaches a router/hub, then the data is transferred to a back-
haul network.
Mesh networks, some of them proprietary using closed protocols, can also be used for
IoT applications, but because each node must continuously scan for incoming messages
and then re-transmit to the next node, they are power hungry and can only be used where
there is power available for each node. Some smart street lighting solutions use mesh net-
works, as there is power available at each lamp post, and lamp posts are reasonably close
together.
Cellular (2G/3G/4G) networks [6] standardized by the 3GPP [7] provide mid- to long-
range capabilities. Initially they have been designed for voice communications, subse-
quently enabled for data communications, while the next generation (5G) of cellular
networks are enabling very diverse application requirements, including those for IoT.
Satellite communications [8] are increasingly being used to connect remote devices, such
as monitoring in the polar regions or in other remote areas such as oceans, and are widely
used for location services via GPS. Being rather expensive and battery consuming, such
networks are typically used for critical or very special applications.
Wired networks are also used for IoT. For instance, a CCTV camera can be considered
to be an IoT device, in that data could be sent to a central platform and then accessed by
applications and analytics software. Other examples where sensors are connected by fixed
wires are in the retail environment, where sensors may track movements of people through
a store and to measure dwell times.
However, there are two areas where the network requirements cannot be delivered by
existing technologies and have led to the creation of new technologies, specifically designed
for the IoT, and the rest of this chapter will focus on these. The first of these is designed to
support devices that support long-range, low data rate, low-power devices, while the second
area is for very low latency/high-throughput scenarios, such as autonomous vehicles inter-
acting with the environment, or for human/machine interaction, such as remote surgery.
12 2 Connecting Devices: Access Networks
car park with perhaps 500 spaces, missing the arrival or departure of one or two cars a day
does not invalidate the overall service. If the quality of service is a key requirement for a
particular use case, then using a licensed spectrum is the preferred option.
In terms of power usage, there are several options to conserve battery life. Powering the
radio transmitter to send data is the main energy drain, so one way to conserve power is to
use an asynchronous protocol, in which the end device does not need to constantly interact
with the network so can spend longer periods asleep with the radio powered down. Long
range (LoRa) [12, 13] is a technology that uses this approach. Another key factor is the trans-
mit current used to power the radio. Cellular modulation [6, 15] needs a linear transmitter
for the modulation, and these require significantly more power than non-linear modulation
systems, such as LoRa.
The next criterion is the approach taken to maximize range, given the constraints on
power output and choice of spectrum. In general, this is achieved by lowering the data rate.
Link budget is a function of the propagation loss and receiver sensitivity, and LPWAN tech-
nologies generally have higher receiver sensitivities of around −130 dBm compared with the
−90 to −110 dBm for existing cellular technologies. Since decibels are a logarithmic scale,
this difference equates to being able to detect a signal ∼ 10 000 times weaker. To achieve high
receiver sensitivity, you need a slow modulation rate, as Information Theory [16] states that
the energy per bit is the main factor in the probability of a message being received. If you
slow the modulation rate by half, at the same output power you are essentially putting twice
as much energy into each symbol, thus doubling the receiver sensitivity (increase of 3 dB).
It is for this reason that LPWANs have very low data rates compared to normal cellular
systems, since receiver sensitivity is a critical factor to obtain a long range.
There are also differences in the use of the actual spectrum, such as using an ultra-narrow
band or spread spectrum. Ultra-narrow Band (UNB) [17] systems transmit the signal in a
small amount of spectrum, usually less than 1 kHz, and are particularly suited for small
amounts of data. The link budget increases with the Power Spectral Density (PSD), and in
a UNB system the PSD is increased due to the transmit power only using a small amount
of spectrum. There is a challenge with UNB systems if the end device is moving fast, as the
Doppler Effect can induce frequency variations that are relatively large compared to the
signal bandwidth, which makes detection and demodulation of the signal more difficult.
Weightless and Sigfox are examples of UNB systems.
Spread spectrum [18, 19] is a technique in which the signal is transmitted on a bandwidth
that is much bigger than the original frequency, typically using ∼125 kHz of spectrum. The
primary reasons for this are to decrease interference and increase security. The original
signal is only detectable when all the signals across all the bandwidths have been processed,
which both increases security and leads to processing gain. Processing gain is defined as the
ratio of the bandwidth used to send the signal to the original signal bandwidth frequency. In
some LPWAN systems it is possible to have signal to noise ratios that are negative, meaning
that the signal is below the noise floor, but the processing gain at the receiver means that
the signal can be detected if you are explicitly looking for it. LoRa is an example of a system
that uses a chirp [20] spread spectrum.
The amount of spectrum used also affects noise. Noise is randomly spread throughout
any spectrum used, which gives an advantage to UNB systems as the noise is effectively
lower than it is for wider band technologies and these UNB systems operate on positive
14 2 Connecting Devices: Access Networks
signal to noise ratios. However, the higher noise floor associated with spread spectrum sys-
tems that use larger amounts of spectrum are offset by the processing gain and can work
with negative signal to noise ratios. Spread spectrum systems are less efficient in terms of
the use of spectrum as they need more bandwidth to transmit the signal, which may cause
issues when the goal is to maximize the amount of data sent in any given spectrum. Sys-
tems using licensed spectrum, where the cost of the spectrum may run into hundreds or
thousands of million pounds, are optimized for spectrum utilization, which has cost and
power implications on the end device. By comparison, some LPWAN systems using unli-
censed spectrum have optimized the end device for lowest cost and longer battery life, at
the expense of spectrum utilization.
There are several LPWAN networking technologies; some of the key ones are discussed
in the following subsections.
protocols such as LoRa. However, NB-IoT does have advantages over LoRa for use cases
where low latency or higher data throughput are key requirements.
• LTE-M (also called LTE-M1 or CAT-M1). This is essentially the second generation of LTE
chips built for IoT applications (after Cat-0) and has higher throughput and lower battery
life than NB-IoT, but the chipset is likely to cost more. The maximum system bandwidth
is 1.4 MHz (as opposed to Cat-0’s 20 MHz) and has specific use cases for LPWAN appli-
cations where there is a need for higher bandwidth and/or the ability to support voice
calls. An example of this may be in a lift, where there is a requirement to move from a
data link for the alarm and then a requirement to support a voice call. LT-M is compatible
with existing LTE networks, meaning rollout is mainly software upgrades, so relatively
cheap (Figure 2.3).
1 http://www.3gpp.org/release-15.
2.4 Cellular Technologies 17
• Enhanced Mobile Broadband (eMBB). Provision of higher data rates to mobile devices to
support uses such as ultra-high definition video, virtual reality, interactive gaming.
• Ultra-reliable Low-Latency Communications (URLLC). This is for mission critical use
cases where quality of service and low latency are essential, such as industrial automa-
tion, remote surgery, traffic safety and control, and autonomous vehicles.
• Massive Machine Type Communications (mMTC). This is to support the huge numbers
of devices that will be connected in the future, including smart homes and buildings,
smart agriculture, and asset tracking.
Comparative Price
CELLULAR
high
M2M
NB - loT
LPWAN
low
Quality of service
low high
Figure 2.4 Price and quality of service for various network technologies.
18 2 Connecting Devices: Access Networks
the operator to meet a range of different network requirements using the same physical
infrastructure quickly and easily via software re-configuration.
Figure 2.3 shows the relative cost and quality of service associated with the different tech-
nologies discussed above that are used for long-range connectivity. The most cost-effective
solution, with the lowest quality of service, is generally provided by LPWAN technologies,
such as LoRaWAN, Sigfox, and Weightless. NB-IoT is also referred to under the LPWAN
banner, but drawn out separately here as the use of a licensed spectrum enables a higher
quality of service to be provided, albeit potentially at a higher price. The highest quality of
service comes from traditional cellular technologies, but again this is at the expense of price
(and power requirements) (Figure 2.4).
2.5 Conclusion
The emergence of the IoT and the consequent requirement to connect large numbers of
digital devices with a range of characteristics has led to a number of IoT access network
technologies being developed.
In this chapter, we have described the current and emerging access network options for
the transmission of IoT data. Each option has different characteristics with respect to cost,
quality, reliability, power, range, and the volume of data for which it is designed. The selec-
tion of a particular access network solution for a given scenario should be based on a careful
analysis that considers the trade-offs between quality of service and price.
References
1 Zigbee Alliance. https://www.zigbee.org. (Accessed 17 April 2019).
2 IEEE 802.15.4-2015. IEEE standard for low-rate wireless networks. https://standards.ieee
.org/standard/802_15_4-2015.html.
3 Bluetooth Special Interest Group. https://www.bluetooth.com.
4 Wi-Fi. https://www.wi-fi.org.
5 IEEE IEEE 802.11TM Wireless Local Area Networks. http://www.ieee802.org/11.
6 Sauter, M. (2010). From GSM to LTE: An Introduction to Mobile Networks and Mobile
Broadband. Wiley.
7 3GPP. http://www.3gpp.org/about-3gpp.
8 Maini, A.K. and Agrawal, V. (2011). Satellite Technology: Principles and Applications.
Wiley.
9 https://www.theiet.org/sectors/information-communications/topics/ubiquitous-
computing/articles/lpwan.cfm.
10 Farrell, S. (2017). Lpwan overview. Internet Engineering Task Force, Internet-Draft
draft-ietf-lpwan-overview-01.
11 http://www.ingenu.com.
12 Vejlgaard, B. et al. (2017). Coverage and capacity analysis of Sigfox, LoRa, GPRS, and
NB-IoT. 2017 IEEE 85th Vehicular Technology Conference (VTC Spring). IEEE.
13 https://www.sigfox.com/en/sigfox-iot-technology-overview.
References 19
14 https://lora-alliance.org/about-lorawan.
15 http://www.weightless.org.
16 Das, S.K. (2013). Mobile Handset Design. Wiley.
17 Shannon, C.E. (1984). A Mathematical Theory of Communication. Bell System Technical
Journal, July and October.
18 Deslandes, V., Thomas, N. et al. (2015). Ultra narrow band technique for low power
wide area communications. 2015 IEEE Global Communications Conference (GLOBE-
COM). IEEE. https://ieeexplore.ieee.org/document/7417420.
19 Dixon, R.C. (1994). Spread Spectrum Systems: With Commercial Applications, vol. 994.
New York: Wiley.
20 https://www.semtech.com/lora.
21 https://www.techopedia.com/definition/9509/spread-spectrum.
22 https://www.gsma.com.
21
Edge Computing
Mohammad Hossein Zoualfaghari 1 , Simon Beddus 1 , and Salman Taherizadeh 2
1 British Telecommunications plc, Ipswich, UK
2
Jožef Stefan Institute, Ljubljana, Slovenia
3.1 Introduction
Today, hyper-scale cloud computing [1] from the likes of Amazon, Google, and Azure offers
a very cost-effective solution for storage, processing, and analysis of Internet of Things (IoT)
data. The economics of cloud provision relies on a limited number of huge datacenters that
are normally located many hundreds of miles away from IoT devices. This model of opera-
tions works well for many applications such as web browsing and email, which are tolerant
of network packet loss, latency, and jitter typical of cloud computing.
For those applications that need predictable network reliability, security, and low-latency
data processing, the edge computing model [2] offers an answer. Edge computing pro-
vides data processing geographically close to assets such as sensors, actuators, IoT objects,
and humans. Colocation reduces distances, latency, and in many cases solution complexity
that results in a better outcome for customers and end-users. Edge video analytics pro-
cessing can eliminate the need to stream video data to cloud-based service, thus reducing
the network load.
Since edge resources are typically in a private network, customers may also choose edge
computing due to factors such as having added control of data privacy and the reliability
of mission critical applications. Another benefit of edge computing is that local processing
can significantly reduce wide area network (WAN) traffic, which can be a major factor when
WAN connectivity is costly or sparse.
Conventionally, edge computing is used for hosting business-critical industrial, retail,
and IoT applications. Increasingly with the advent of network security function virtualiza-
tion, edge computing can be used for hosting virtual network functions (VNFs) and secu-
rity features. In addition, the unique position of edge computing also allows the operation
of other features such as IoT security and VNFs. In this role, the edge device or devices can
be viewed as a miniaturized private cloud.
Practically, edge computing devices can be located in the customer’s premises or at the
edge of the communication service provider’s (CSP) network adjacent to the access
network. Customer premises-based devices will normally be dedicated to the customer
whereas within the CSP domain the infrastructure will be shared by a number of customers.
The Internet of Things: From Data to Insight, First Edition. Edited by John Davies and Carolina Fortuna.
© 2020 John Wiley & Sons Ltd. Published 2020 by John Wiley & Sons Ltd.
22 3 Edge Computing
Commonly, edge computing devices are based on an X86 architecture in the form
of industrialized power controls (PCs) and blade systems. Smaller advanced RISC machine
(ARM)-based devices occupy the lower end of the performance spectrum, and the popular
Raspberry Pi [3], BeagleBoard [4], and pcDuino3 Nano [5] are such examples.
Centralized loT
Platform
loT Devices Customer Edge Device Mobile Edge Compute loT Cloud
to their sensors, local area network (LAN), and IoT objects. Characteristics of this
approach are a very low latency (sub 10 ms), dedicated devices typically running
applications for a single tenant, and moderate compute workloads. Benefits of this
approach are that data can remain on the premises, and hence the customer has more
control over the security of an end-to-end service. C-PEC strategy is the most improved
computing model that is able to support IoT scenarios more satisfactorily compared
to the existing cloud computing paradigm. This is because employing this strategy is
aimed at analyzing time-sensitive data closer to the location where sensor data are
generated, and thus, in some scenarios, reducing network traffic communications
as well. Although this edge strategy is primarily focused on customer premises, it
could be applied to smart vehicles or smartphones. For instance, a smartphone when
adjacent to sensors can act as a processor of local IoT data.
(ii) The Communication Service Provider Premises Edge Compute (CSP-PEC) strategy
relates to the computing resources such as MEC [2] servers being installed in the CSP’s
domain, and in the case of 5G adjacent to eNodeB and the Radio Access Network
(RAN). This strategy could be viewed as a low latency cloud service enabling latency
intolerant applications that are located reasonably close to sensors. Characteristics of
this approach are low latency (sub 20 ms), devices that run applications for multiple
tenants, and compute workloads are high. Benefits of the MEC style systems is that
they represent large compute installations and as such can offer cloud size scaling to
customers as necessary. Resources employed within CSP premises may require more
processing, storage, and communication capacity than resources at customer premises
level at the edge.
In some cases, these two strategies are complementary. There will be some organizations
that need a higher level of control over data privacy and integrity of applications offered
by C-PEC solution. At the same time, there will be instances when cloud scale processing
will be more critical, particularly in the context of variable workloads. Moreover, a particu-
larly strong use case for MEC is the automotive sector, whereby cars can communicate with
one another over 5G RAN and coordinate actions via MEC-based applications. The authors
anticipate that in the future the approaches will co-exist, and the role of MEC will be funda-
mental in enabling C-PEC solutions to migrate compute loads during times of high demand.
There are conditions where compute loads need to be off-loaded from a customer
edge device to an MEC server when the customer edge device is overloaded and it has a
Another random document with
no related content on Scribd:
expenses, including legal fees. YOU AGREE THAT YOU HAVE NO
REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF
WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE
PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE
FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.