0% found this document useful (0 votes)
359 views

IoT Module 1

The document discusses the physical and logical design of Internet of Things (IoT) systems. It defines IoT as a network of physical devices equipped with sensors, actuators and communication capabilities that allow the devices to connect, collect and exchange data. The key components of an IoT device or "thing" include a controller, sensors to collect data, actuators to trigger actions, a communication module to connect to other devices and systems, and a power management module. Together these components allow IoT devices to monitor and interact with the physical world and form intelligent networks.

Uploaded by

Chinmay Behera
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
359 views

IoT Module 1

The document discusses the physical and logical design of Internet of Things (IoT) systems. It defines IoT as a network of physical devices equipped with sensors, actuators and communication capabilities that allow the devices to connect, collect and exchange data. The key components of an IoT device or "thing" include a controller, sensors to collect data, actuators to trigger actions, a communication module to connect to other devices and systems, and a power management module. Together these components allow IoT devices to monitor and interact with the physical world and form intelligent networks.

Uploaded by

Chinmay Behera
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

Subject: Internet of Things

Topic: Physical and Logical Design of IoT Module-1


The Internet of Things (IoT) is a term coined to describe the growing network of devices that connect
to the Internet to collect, process and exchange data; providing convenience, comfort and efficiency to
the end-user. It is creating a significant amount of excitement, substantially altering the way we interact
with physical devices around us across various sectors, such as manufacturing, the connected home,
transportation, medical and agriculture. IoT is fuelling innovation in nearly every part of our lives.

What is IoT? A network of connected devices!

The Internet of Things (IoT) is the network of physical devices such as vehicles, buildings and different
objects of everyday life equipped with microcontrollers, transceivers for digital communication, and
suitable protocol stacks that will make them able to collect and exchange data with one another and
with the users, becoming an integral part of the Internet. This network provides greater direct integration
of the physical world into computer-based systems, resulting in increased efficiency, accuracy and
financial benefit. The IoT is expected to improve the intelligence of cities, promote the interaction
between humans and the environment, and enhance reliability, resilience and efficiency, while reducing
costs and resource consumption. Home automation plays a major role, but the IoT also provides
opportunities for a wide range of industries, including manufacturing, building automation, automotive,
transportation, healthcare, agriculture and more.

Definition of IoT

The Internet of Things (IoT) is the network of physical objects that contain embedded technology to
communicate and sense or interact with the internal states or with the external environment in which
they are operating.
Gartner Research

A dynamic global network infrastructure with self-configuring capabilities based on standard and
interoperable communication protocols where physical and virtual "things" have identities, physical
attributes, and virtual personalities and use intelligent interfaces, and are seamlessly integrated into the
information network, often communicate data associated with users and their environments.

Characteristics of IoT

 Dynamic & Self-Adapting: IOT devices and systems may have the capability to dynamically
adapt with the changing contexts and take actions based on their sensed environment.
 In a surveillance system comprising of a number of surveillance cameras; the
surveillance cameras can adapt their modes (to normal or infra-red night modes) based
on whether it is day or night. Cameras could switch from lower resolution to higher

Prepared by: Swagat Kumar Jena


resolution modes when any motion is detected and alert nearby cameras to do the
same. In this example, the surveillance system is adapting itself based on the context
and changing (e.g., dynamic) conditions.
 Self-Configuring: IoT devices may have self-configuring capability, allowing a large number
of devices to work together to provide certain functionality (such as weather monitoring). These
devices have the ability configure themselves (in association with the IoT infrastructure), setup
the networking with minimal user intervention.

 Interoperable Communication Protocols: IoT devices may need to work with a wide range
of other devices made with different technologies, sold by different vendors, and produced by
different companies.

 Unique Identity: Each IoT device must have a unique identity in order to uniquely identify it
from other devices in the existing network. This can be accomplished using IP address
(IPv4/IPv6) or Personal Area Network (PAN) ID.

 Stability. Even though technology will advance, our customers demand products that work
reliably, for a long time, and in a manner with which they are comfortable. Over the last 50
years’ automotive technology has drastically improved, but the driving experience, how we
drive, has remained almost constant.

 Scalability. We already seen that in IoT system, billion and trillions of nodes/physical objects
are going to be attached, so scalability of existing IoT infrastructure is very much important. In
order to be effective and profitable, we need to develop systems that can scale.

 Security: Because embedded systems are deployed in life-critical situations, and because the
quality of service affects our profits, we must protect the system from a determined adversary.

 Integrated into Information Network: IoT devices are usually integrated into the information
network that allows them to communicate and exchange data with other devices and systems.
IoT devices can be dynamically discovered in the network, by other devices and/or the network,
and have the capability to describe themselves (and their characteristics) to other devices or
user applications. For example, a weather monitoring node can describe its monitoring
capabilities to another connected node so that they can communicate and exchange data.
Integration into the information network helps in making IoT systems "smarter" due to the
collective intelligence of the individual devices in collaboration with the infrastructure. Thus, the
data from a large number of connected weather monitoring IoT nodes can be aggregated and
analyzed to predict the weather.

Prepared by: Swagat Kumar Jena


Physical Design of IoT
Things in IoT

The "Things" in IoT usually refers to IoT devices which have unique identities and can perform remote
sensing, actuating and monitoring capabilities. (A thing is an embedded system with inputs and outputs
performing a dedicated function.)

A Thing/Sensor Node/Smart Object generally composed of the following components:

1. Controller/Processing Unit
2. Sensor
3. Actuator
4. Communication Module
5. Power management Module

Figure 1. A generic view of a Sensor Node


(The microcontroller along with the sensors, power and a radio is called a sensor node)

1. Controller/Processing Unit:
A controller/processing unit consist of a CPU associated with a small storage unit including on-chip
Random Access Memory (RAM) and flash memory (ROM) and I/O interface. The processing unit is
responsible for performing tasks, processing data, and controlling the functionality of other components
of the IoT node. A simple controller model is shown in fig.2.

 CPU: Actual execution of task (program) is performed by CPU.


 ROM: This memory is used to store the controller program of the node permanently.
 RAM: This memory is used to store the dynamic inputs e.g., in this case the sensor input.
 I/O Interface: This is used to interface the input/output devices to the controller unit.

Prepared by: Swagat Kumar Jena


Figure 2. A simplest Controller/Processing module

Figure 3. Interfacing of Sensor, Actuator and Communication Module with a Controller Unit

Figure 4. Processing inside Controller/Processing module

Prepared by: Swagat Kumar Jena


2. Sensors:
Sensor are the electronic elements that convert physical quantity/measurement into electrical signals.
The output of the sensor is used as input to the controller unit. Sensors are broadly classified into two
categories based on their output type:

 Analog Sensor: 
o Analog Sensors produce a continuous output signal or voltage which is generally
proportional to the quantity being measured.
o Physical quantities such as Temperature, Speed, Pressure, Displacement, Strain etc.
are all analog quantities as they tend to be continuous in nature.

 Digital Sensor:
o Digital Sensors produce discrete digital output signals or voltages that are a digital
representation of the quantity being measured. Digital sensors produce a binary output
signal in the form of a logic "1" or a logic "0", ("ON" or "OFF").
o Digital signal only produces discrete (non-continuous) values, which may be output as
a single "bit" (serial transmission), or by combining the bits to produce a single "byte"
output (parallel transmission).

Some commonly used sensors:

 Temperature Sensor
 Humidity Sensor
 Compass Sensor
 Light Sensor
 Sound Sensor
 Pressure Sensor
 Camera Sensor and so on.

Different types of sensor are shown in fig 5.

Figure 5. Different types of sensors

Prepared by: Swagat Kumar Jena


3. Actuator:
A device that convert electrical signal to physical output i.e., it provides a mechanical response to
the environment. Ex of actuators are LEDs, LCD, Speaker, Relays and so on.

Figure 6. Interaction of S(sensors) and A(actuators) with a controller

4. Communication Module:
A IoT node connects with other nodes or to a network through the communication module. This
module is used to provide wired or wireless communication facility to the controller. For ex-
Ethernet, Wi-Fi, Bluetooth Low energy (BLE), ZigBee etc.

5. Power management Module:


This module is used to supply power to all components of the sensor node e.g., Sensor, Actuator,
Processor, and Communication module. For ex: Solar panel or lithium battery.

Embedded System

 An Embedded System is a system which is composed of hardware and software embedded to


perform some specific tasks.
 Any device that includes a Computer but is not itself a General-Purpose Computer is an
Embedded device.
 In contrast to general purpose computers or personal computers (PCs) which can perform
various types of tasks, embedded systems are designed to perform a specific set of tasks.
 Typically, an embedded system includes the following components:
o Microprocessor or Microcontroller,
o Memory (RAM, ROM, cache),

Prepared by: Swagat Kumar Jena


o Networking units (Ethernet, WiFi adapters),
o Input/output units (display, keyboard, etc.)
o Storage (such as flash memory).
 Some embedded systems have specialized processors such as digital signal processors
(DSPs), graphics processors and application specific processors.
 Some embedded systems run embedded operating systems such as real-time operating
systems (RTOS).
 Examples of Embedded systems: Digital watches, digital cameras, point of sale terminals,
vending machines, appliances (such as washing machines), etc.

Note:

An IoT node/ smart object is also an Embedded system which is designed to perform a specific task.

Internet and TCP/IP (Transmission Control Protocol/Internet Protocol)

Internet:
The network formed by the co-operative interconnection of a large number of computer
networks. Hence it is also called as Network of networks.
All devices over the internet communicates to each other using a standard protocol called as TCP/IP or
the Transmission Control Protocol/Internet Protocol.

Transmission Control Protocol/Internet Protocol (TCP/IP):

 Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to


interconnect network devices on the internet. TCP/IP can also be used as a communications
protocol in a private network (an intranet or an extranet).
 Hence the IoT devices must understand TCP/IP packet formats in order to communicate among
themselves over internet.
 TCP/IP specifies how data is exchanged over the internet by providing end-to-end
communications that identify how it should be broken into packets, addressed, transmitted,
routed and received at the destination.
 TCP/IP is designed to make networks reliable, with the ability to recover automatically from the
failure of any device on the network.
 TCP/IP uses the client/server model of communication in which a user or machine (a client) is
provided a service (like sending a webpage) by another computer (a server) in the network.

* A protocol is a set of programs that governs some rules and conventions for communication between
network devices in a network.

Prepared by: Swagat Kumar Jena


TCP/IP Protocol Layers

TCP/IP functionality is divided into four layers, each of which include specific protocols. The layer are
as follows from bottom to top. The layers are depicted in figure 7.

1. Data Link/Physical Layer


2. Network Layer
3. Transport Layer
4. Application Layer

Figure 7. Simplified TCP/IP 4-layer model

1. Link Layer / Physical Layer

The layer consists of protocols that operate only on a link -the network component that interconnects
nodes or hosts in the network. Some of the Link layer protocols are Ethernet, WiFi, WiMax, LR-WPAN,
cellular standards which are discussed as follows:

A. 802.3 – Ethernet
IEEE 802.3 is a collection of wired Ethernet standards for the link layer. For example,
 802.3 is the standard for 10BASE5 Ethernet that uses coaxial cable.
 802.3.i is the standard for 10BASE-T Ethernet over copper twisted-pair connection
 802.3.j is the standard for 10BASE-F Ethernet over fiber optic connection
 802.3ae is the standard for 10 Gbit/s Ethernet over fiber, and so on.
These standards provide data rates from 10 Mb/s to 40 Gb/s and higher.

Prepared by: Swagat Kumar Jena


B. 802.11 – WiFi
IEEE 802.11 is a collection of wireless local area network (W LAN) communication standards, including
extensive description of the link layer. For example,
 802.11a operates in the 5 GHz band
 802.11b and 802.11g operate in the 2.4 GHz band
 802.11n operates in the 2.4/5 GHz bands
 802. 11ac operates in the 5 GHz band
 802.11ad operates in the 60 GHz band.
These standards provide data rates from I Mb/s to up to 6.75 Gb/s.

C. 802.16 – WiMax
IEEE 802.16 is a collection of wireless broadband standards, including extensive descriptions for the
link layer (also called WiMax). WiMax standards provide data rates from 1.5 Mb/s to I Gb/s. The recent
update (802.16m) provides data rates of 100 Mbit/s for mobile stations and 1 Gbit/s for fixed stations.

D. 802.15.4- (LR-WPAN)
IEEE 802.15.4 is a collection of standards wireless personal area networks These standards form the
basis of specifications for high level communication protocols such as ZigBee. LR-WPAN standards
provide data rates from 40 Kb/s 250 Kb/s. These standards provide low-cost and low-speed
communication for power constrained devices.

E. 2G/ 3G/ 4G - Mobile Communication


There are different generations of mobile communication standards including second generation (2G
including GSM and CDMA), third generation (3G - including UMTS and CDMA200()) and fourth
generation (4G including LTE). Data rates for these standards range from 9.6 Kb/s (for 2G) to upto 100
Mb/s (for 4G).

2. Network Layer / Internet Layer

The network layers are responsible for sending of IP datagrams from the source network to the
destination network. This layer performs the host addressing and packet routing. Host identification is
done using hierarchical IP addressing schemes such as IPv4 or IPv6.

A. IPv4
Internet Protocol version 4 (IPv4) is widely used in internet to identify the devices on a network. IPv4
uses a 32-bit address scheme that allows total of 232 or 4,294,967,296 addresses. As more and more
devices will be connected to the Internet, these addresses will get exhausted in next few years. So IPv4
has been succeeded by IPv6 in its range.

B. IPv6
Internet Protocol version 6 (IPv6) is the newest version of Internet protocol and successor to IPv4. IPv6
uses 128-bit address scheme that allows total of 2128 or 3.4 x 1038 addresses.

Prepared by: Swagat Kumar Jena


Figure 8. IPv4 vs IPv6

C. 6LoWPAN
6LoWPAN (IPv6 over Low Power Wireless Personal Area Networks) brings IP protocol to the low-power
devices which have limited processing capability. 6LoWPAN operates in the 2.4 GHz frequency range
and provides data transfer rates of 250 Kb/s. 6LoWPAN works with the 802.15.4 link layer protocol and
defines compression mechanisms for IPv6 datagrams over IEEE 802.15.4-based networks.

3. Transport Layer

The transport layer is responsible for maintaining end-to-end communications across the network. TCP
handles communications between hosts. The transport layer provides functions such as error control,
segmentation, flow control and congestion control. There are two protocols used in transport layer are
as follows:
A. Transmission Control Protocol (TCP)
B. User Datagram Protocol (UDP)

A. TCP
Transmission Control Protocol (TCP) is the most widely used transport layer protocol, that is used by
web browsers (along with HTTP, HTTPS application layer protocols), email programs (SMTP
application layer protocol) and file transfer (FTP).
 TCP is a connection oriented and stateful protocol.
 TCP ensures reliable transmission of packets.
 TCP also provides error detection capability so that duplicate packets can be discarded and
lost packets are retransmitted.
 The flow control capability of TCP ensures that rate at which the sender sends the data is not
too high for the receiver to process.
 The congestion control capability is also provided by TCP

Prepared by: Swagat Kumar Jena


B. UDP
Unlike TCP, which requires carrying out an initial setup procedure, UDP is a connectionless protocol.
UDP is useful for time-sensitive applications that have very small data units to exchange and do not
want the overhead of connection setup.
 UDP is a transaction oriented and stateless protocol.
 UDP does not provide guaranteed delivery, ordering of messages and duplicate elimination.
 Higher levels of protocols can ensure reliable delivery or ensuring connections created are
reliable.

4. Application Layer

The application layer basically provides an Interface point for user applications. Some of the protocols
used in application layer protocols in the context of IoT are as follows:
A. Hypertext Transfer Protocol (HTTP)
B. Constrained Application Protocol (CoAP)
C. WebSocket
D. Message Queue Telemetry Transport (MQTT)
E. Extensible Messaging and Presence Protocol (XMPP)
F. Data Distribution Service (DDS)
G. Advanced Message Queuing Protocol (AMQP)

A. HTTP
Hypertext Transfer Protocol (HTTP) is the application layer protocol that forms the foundation of the
World Wide Web (WWW).
 HTTP protocol follows a request-response model where a client sends requests to a server
using the HTTP commands.
 HTTP is a stateless protocol and each HTTP request is independent of the other requests.
 An HTTP client can be a browser or an application running on the client (e.g., an application
running on an 10T device, a mobile application or other software).
 HTTP protocol uses Universal Resource Identifiers (URIs) to identify HTTP resources.

B. CoAP
Constrained Application Protocol (CoAP) is an application layer protocol for machine-to-machine (M2M)
applications.
 Used for constrained environments with constrained devices and constrained networks.
 Like HTTP, CoAP is a web transfer protocol and uses a request-response model.
 It runs on top of UDP instead of TCP.

Prepared by: Swagat Kumar Jena


C. WebSocket
WebSocket protocol allows full-duplex communication over a single socket connection for sending
messages between client and server.
 WebSocket is based on TCP and allows streams of messages to be sent back and forth
between the client and server while keeping the TCP connection open.
 The client can be a browser, a mobile application or an IoT device.

D. MQTT
Message Queue Telemetry Transport (MQTT) is a light-weight messaging protocol based on the
publish-subscribe model. MQTT uses a client-server architecture and it work as follows:
 The central communication point is the MQTT broker, which is in charge of dispatching all
messages between the senders and the rightful receivers.
 Each Publisher that publishes a message to the broker, includes a topic into the message.
 Each client that wants to receive messages has to subscribes to a certain topic and the broker
delivers all messages with the matching topic to the subscriber.
 Therefore, the subscriber and publisher don’t need to know each other IP address.
 This architecture enables highly scalable solutions without dependencies between the data
producers and the data consumers.
 MQTT is well suited for constrained environments where the devices have limited processing
and memory resources and the network bandwidth is low.
Real-world Applications: Facebook Messenger, Amazon Web Services, Microsoft Azure IoT and many
more.

Figure 9. MQTT Example

Prepared by: Swagat Kumar Jena


E. XMPP
Extensible Messaging and Presence Protocol (XMPP) is a protocol for real-time communication and
streaming XML data between network entities.
 XMPP allows sending small chunks of XML data from one network to another in near real-time.
 XMPP is a decentralized protocol and uses a client-server architecture.
 XMPP support messaging, presence, data syndication, gaming, multi-party chat and
voice/video calls.

F. DDS
Data Distribution Service (DDS) is a data-centric middleware standard for device-to-device or machine-
to-machine communication.
 DDS uses a publish-subscribe mode.
 Publishers (e.g. devices that generate data) create topics to which subscribers (e.g., devices
that want to consume data) can subscribe.
 DDS provides quality-of-service (QoS) control and configurable reliability.

G. AMQP

 Advanced Message Queuing Protocol (AMQP) is an open application layer protocol for
business messaging.
 It supports both point-to-point and publisher/subscriber models, routing and queuing.
 AMQP brokers receive messages from publishers and route them over connections to
consumers.
 Publishers publish the messages to exchanges which then distribute message copies to
queues.

Logical Design of IOT


Logical design of an IoT system refers to an abstract representation of the entities and processes
without going into the low-level specifics of the implementation.

IoT Functional Blocks


An IoT system comprises of a number of functional blocks that provide the system the capabilities for
identification, sensing, actuation, communication, and management as shown Figure 9. These
functional blocks are described as follows:
a) Device: An IoT system comprises of devices that provide sensing, actuation, monitoring and
control functions.
b) Communication: The communication block handles the communication for the IoT system.
c) Services: An IoT system uses various types of IoT services such as services for device
monitoring, device control services, data publishing services and services for device discovery.
d) Management: Management functional block provides various functions to govern the IoT
system.

Prepared by: Swagat Kumar Jena


e) Security: Security functional block secures the IoT System and by providing functions such as
authentication, authorization, message and content integrity, and data security.
f) Application: IoT applications provide an interface that the users can use to control and monitor
various aspects of the IoT system.

Figure 9 Functional blocks of IoT

IoT Communication Protocols

There are 4 communication protocol models are available for Internet of Things. These are as follows:
A. Request-Response Model
B. Publish-Subscriber Model
C. Push-Pull Model
D. Exclusive Pair Model

A. Request-Response Model
• Request-Response is a communication model in which the client sends requests to the server
and the server responds to the requests.
• When the server receives a request, it decides how to respond, fetches the data, retrieves
resource representations, prepares the response, and then sends the response to the client.
• Request-Response model is a stateless communication model and each request-response pair
is independent of others. Figure 10.1 shows the client-server interactions in the request-
response model.

Prepared by: Swagat Kumar Jena


Figure 10.1 Client-Server interactions in the Request-Response Model.

B. Publish-Subscribe Model
• Publish-Subscribe is a communication model that involves publishers, brokers and
subscribers/consumers.
• Publishers are the source of data. Publishers send the data to the topics which are managed
by the broker. Publishers are not aware of the subscribers.
• Subscribers subscribe to the topics which are managed by the broker.
• When the broker receives data for a topic from the publisher, it sends the data to all the
subscribed consumers.
• Message Queue Telemetry Transport (MQTT) follow Publish-Subscribe model (refer MQTT
protocol mentions layer protocol section). Figure 10.2 shows the publisher-broker-subscribers
interactions in the publish-subscribe model.

Figure 10.2 Publisher-broker-consumer interactions in the Publish-Subscribe Model

Prepared by: Swagat Kumar Jena


C. Push-Pull Model
• Push-Pull is a communication model in which the data producers push the data to queues and
the consumers pull the data from the queues. Producers do not need to be aware of the
consumers.
• Queues help in decoupling the messaging between the producers and consumers.
• Queues also act as a buffer which helps in situations when there is a mismatch between the
rate at which the producers push data and the rate at which the consumers pull data.
Figure 10.3 shows the publisher-queue-consumer interactions in the push-pull model.

Figure 10.3 Publisher-queue-consumer interactions in the Push-Pull model.

D. Exclusive Pair Model


• Exclusive Pair is a bi-directional, fully duplex communication model that uses a persistent
connection between the client and server.
• Once the connection is setup it remains open until the client sends a request to close the
connection.
• Client and server can send messages to each other after connection setup. Figure 10.4 shows
the client-server interactions in the exclusive pair model.

Request to setup Connection

Response accepting the request

Message from Client to Server
Server Client
Message from Server to Client

Connection close request

Connection close response

Figure 10.4 Client-server interactions in the Exclusive Pair Model.

Prepared by: Swagat Kumar Jena


IoT Enabling Technologies

IoT is enabled by several technologies including wireless sensor networks, cloud computing, big data
analytics, embedded systems and so on.

A. Wireless Sensor Networks

A Wireless Sensor Network (WSN) comprises of distributed devices with sensors which are used to
monitor the environmental and physical conditions. A WSN consist of a number of end-nodes and
routers and a coordinator.
 End nodes have several sensors attached to them.
 Routers are responsible for routing the data packets from end-nodes to the coordinator.
 The coordinator collects the data from all the nodes. Coordinator also acts as a gateway that
connects the WSN to the Internet.
Some examples of WSNs used in IoT systems are as follows:
 Weather monitoring systems use WSNs in which the nodes collect temperature, humidity and
other data, which is aggregated and analyzed.
 Indoor air quality monitoring systems use WSNs to collect data on the indoor air quality and
concentration of various gases.
 Soil moisture monitoring systems use WSNs to monitor soil moisture at various locations.

WSNs are enabled by wireless communication protocols such as IEEE 802.15.4. WSNs are self-
organizing networks. Since WSNs have large number of nodes, manual configuration for each node is
not possible. The self-organizing capability of WSN makes the network robust. In the event of failure of
some nodes or addition of new nodes to the network, the network can reconfigure itself.

B. Cloud Computing

cloud computing is the delivery of computing services—servers, storage, databases, networking,


software, analytics and more—over the Internet (“the cloud”). Companies offering these computing
services are called cloud providers and typically charge for cloud computing services based on usage,
similar to how you are billed for water or electricity at home.

Types of cloud services: IaaS, PaaS, SaaS

Most cloud computing services fall into three broad categories:


1. Infrastructure as a service (IaaS)
2. Platform as a service (PaaS)
3. Software as a service (Saas).

Prepared by: Swagat Kumar Jena


1. Infrastructure-as-a-service (IaaS)

The most basic category of cloud computing services. With IaaS, we can rent IT infrastructure such as
servers and virtual machines (VMs), storage, networks, operating systems from a cloud provider on a
pay-as-you-go basis. Hence  Infrastructure as a service (IaaS) is an instant computing infrastructure,
provisioned and managed over the Internet. Quickly scale up and down with demand and pay only for
what you use.

2. Platform as a service (PaaS)

Platform-as-a-service (PaaS) refers to cloud computing services that supply an on-demand


environment for developing, testing, delivering and managing software applications. PaaS is designed
to make it easier for developers to quickly create web or mobile apps, without worrying about setting up
or managing the underlying infrastructure of servers, storage, network and databases needed for
development.

3. Software as a service (SaaS)

Software-as-a-service (SaaS) is a method for delivering software applications over the Internet, on
demand and typically on a subscription basis. With SaaS, cloud providers host and manage the
software application and underlying infrastructure and handle any maintenance, like software upgrades
and security patching. Users connect to the application over the Internet, usually with a web browser
on their phone, tablet or PC.

C. Big Data Analytics

Big data is defined as collections of data sets whose volume is so large that it is difficult to process 

them using traditional database and software techniques.  Big data analytics involves several steps


starting from data cleansing, data munging (or wrangling), data processing and visualization.

Some examples of big data generated by IoT systems are described as follows:  
 Sensor data generated by IoT systems such as weather monitoring stations.
 Health and fitness data generated by IOT devices such as wearable fitness bands.
 Data generated by IOT systems for location and tracking of vehicles and so on.

Characteristics of Big Data:


 Volume: Though there is no fixed threshold for the volume of data to be considered as big data,
however, typically, the term big data is used for massive scale data that is difficult to store,
manage and process using traditional databases and data processing architectures.
 Velocity: Velocity is another important characteristic of big data and the primary reason for
exponential growth of data. Velocity of data refers to how fast the data is generated and how
frequently it varies.

Prepared by: Swagat Kumar Jena


 Variety: Variety refers to the forms of the data. Big data comes in different forms such as
structured or unstructured data, including text data, image, audio, video and sensor data.

D. Embedded System

 An Embedded System is a system which is composed of hardware and software embedded to


perform some specific tasks.
 Any device that includes a Computer but is not itself a General-Purpose Computer is an
Embedded device.
 In contrast to general purpose computers or personal computers (PCs) which can perform
various types of tasks, embedded systems are designed to perform a specific set of tasks.
 Typically, an embedded system includes the following components:
o Microprocessor or Microcontroller,
o Memory (RAM, ROM, cache),
o Networking units (Ethernet, WiFi adapters),
o Input/output units (display, keyboard, etc.)
o Storage (such as flash memory).
 Some embedded systems have specialized processors such as digital signal processors
(DSPs), graphics processors and application specific processors.
 Some embedded systems run embedded operating systems such as real-time operating
systems (RTOS).
 Examples of Embedded systems: Digital watches, digital cameras, point of sale terminals,
vending machines, appliances (such as washing machines), etc.

Note:

An IoT node/ smart object is also an Embedded system which is designed to perform a specific task.

IoT Communication APIs:

1. REST-based Communication APIs

Representational State Transfer (REST) is a set of architectural principles by which you can design
web services and web APIs that focus on a system’s resources and how resource states are addressed
and transferred. REST APIs follow the request-response communication model. The REST
architectural constraints apply to the components, connectors, and data elements, within a distributed
hypermedia system. Figure 11 shows the communication with REST APIs.

Prepared by: Swagat Kumar Jena


Figure 11. Communication with REST APIs

2. WebSocket based Communication APIs

WebSocket APIs allow bidirectional, full duplex communication between clients and servers.
WebSocket APIs follow the exclusive pair communication model.

Figure 12 Communication in WebScocket API

Prepared by: Swagat Kumar Jena


IoT Levels & Deployment Templates

An IoT system comprises of the following components:


Device: An IoT device allows identification, remote sensing, actuating and remote monitoring
capabilities.

1. Resource: Resources are software components on the IoT device for accessing, processing, and
storing sensor information, or controlling actuators connected to the device. Resources also include
the software components that enable network access for the device.

2. Controller Service: Controller service is a native service that runs on the device and interacts with
the web services. Controller service sends data from the device to the web service and receives
commands from the application (via web services) for controlling the device.

3. Database: Database can be either local or in the cloud and stores the data generated by the IoT
device.

4. Web Service: Web services serve as a link between the IoT device, application, database and
analysis components. Web service can be either implemented using HTTP and REST principles
(REST service) or using WebSocket protocol (WebSocket service).

5. Analysis Component: The Analysis Component is responsible for analyzing the IoT data and
generate results in a form which are easy for the user to understand.

6. Application: IoT applications provide an interface that the users can use to control and monitor
various aspects of the IoT system. Applications also allow users to view the system status and view
the processed data.

IoT Levels-1
A level-1 IoT system has a single node/device that performs sensing and/or actuation, stores data,
performs analysis and hosts the application. Level-1 IoT systems are suitable for modeling low cost and
low-complexity solutions where the data involved is not big and the analysis requirements are not
computationally intensive.

Prepared by: Swagat Kumar Jena


Figure IoT level-1

IoT Level-2
A level-2 IoT system has a single node that performs sensing and/or actuation and local analysis. Data
is stored in the cloud and application is usually cloud based. Level-2 IoT systems are suitable for
solutions where the data involved is big, however, the primary analysis requirement is not
computationally intensive

Figure 14 IoT level-2

Prepared by: Swagat Kumar Jena


IoT Level-3
A level-3 IoT system has a single node. Data is stored and analyzed in the cloud and application is
cloud based. Level-3 IoT systems are suitable for solutions where the data involved is big and the
analysis requirements are computationally intensive.

Figure 15 IoT level-3


IoT Level-4
A level-4 IoT system has multiple nodes that perform local analysis. Data is stored in the cloud and
application is cloud-based. Level-4 contains local and cloud based observer nodes which can subscribe
to and receive information collected in the cloud from IoT devices. Level-4 IoT systems are suitable for
solutions where multiple nodes are required, the data involved is big and the analysis requirements are
computationally intensive.

Figure 16 IoT level-4

Prepared by: Swagat Kumar Jena


IoT Level-5
A level-5 IoT system has multiple end nodes and one coordinator node. The end nodes that perform
sensing and/or actuation. Coordinator node collects data from the end nodes and sends to the cloud.
Data is stored and analyzed in the cloud and application is cloud-based. Level-5 IoT systems are
suitable for solutions based on wireless sensor networks, in which the data involved is big and the
analysis requirements are computationally intensive.

Figure 17 IoT level-5


Some related protocol and terms with IoT level-5 deployment

(a) ZigBee Nodes


The ZigBee Protocol defines three types of nodes: Coordinators, Routers and End Device,
with a requirement of one Coordinator per network.
 Coordinators - Exactly one coordinator in each network and it is the device that
establishes the network originally.
 Routers - act as intermediate nodes, relaying data from other devices.
 End Devices can be low-power / battery-powered devices. They can talk to either the
coordinator or a router and cannot relay data from other devices.

Prepared by: Swagat Kumar Jena


Figure 17.1 ZigBee Network

Comparison between various wireless technology for IoT

The lower data rate of the ZigBee devices allows for better sensitivity and range, but of course offers
less throughput. The primary advantage of ZigBee lies in its ability to offer low power and extended
battery life.

(b) IoT Gateway

 IoT system needs some way to connect sensors/devices to the cloud so that data can be sent
back-and-forth between them (Figure17.2).
 IoT gateways can be essential in making this connection possible.
 Gateways act as communication bridges between IoT sensors/devices network and
the cloud server.
 These are hardware device or a virtual software code which acts as a communication
bridge between IoT Sensor Network and Cloud Server.

Prepared by: Swagat Kumar Jena


• Many sensors/devices will “talk” to a gateway and the gateway will then take all that
information and “talk” to the cloud.

Figure17.2 IoT Gateway connecting local Non-IP Nodes to Internet

Figure17.3 IoT Gateway used in home automation connecting local Non-IP Nodes to Internet
(IoT-architecture-with-Gateway)

Prepared by: Swagat Kumar Jena


Figure 17.4 IoT Gateway features (*LU: Locally Unique)

IoT Level-6
A level-6 IoT system has multiple independent end nodes that perform sensing and/or actuation and
send data to the cloud. Data is stored in the cloud and application is cloud-based.
The analytics component analyzes the data and stores the results in the cloud database. The results
are visualized with the cloud-based application. The centralized controller is aware of the status of all
the end nodes and sends control commands to the nodes.

Figure 18 IoT Level-6

Prepared by: Swagat Kumar Jena


Applications of IoT:

Out of many applications some of the potential uses of IoT are mentioned below:
 SMART HEALTHCARE
 Devices connect to hospitals, doctors and relatives to alert them of medical emergencies
and take preventive measures.

 SMART VEHICLES
 Vehicles self-diagnose themselves and alert owners about system failures.

 SMART CITIES
 City-wide infrastructure communicating amongst themselves for unified and synchronized
operations and information dissemination.

 SMART DUST
 Computers smaller than a grain of sand can be sprayed or injected almost anywhere to
measure chemicals in the soil or to diagnose problems in the human body.

 Business/Manufacturing
 Real-time analytics of supply chains and equipment, robotic machinery.

 Healthcare
 Portable health monitoring, electronic recordkeeping, pharmaceutical safeguards.

 Retail
 Inventory tracking, smartphone purchasing, anonymous analytics of consumer choices.

 Security
 Biometric and facial recognition locks, remote sensors.

Some other Modern Day IoT Applications:

 Forest Fire Detection  Noise Urban Maps


 Air Pollution  Smartphone Detection
 Snow Level Monitoring  Traffic Congestion
 Landslide and Avalanche Prevention  Smart Lighting
 Earthquake Early Detection  Waste Management
 Water Leakages  Smart Roads
 Radiation Levels  River Floods
 Explosive and Hazardous Gases  Smart Grid
 Supply Chain Control  Tank level
 NFC Payment  Water Flow
 Intelligent Shopping Applications  Silos Stock Calculation
 Smart Product Management  Perimeter Access Control
 Smart Parking  Liquid Presence
 Structural health  And many more…

Prepared by: Swagat Kumar Jena


Important Long Questions for Module-1

1. What is IoT and explain different characteristics of an IoT system?


2. What is IoT? Briefly explain the Things in IoT with generic block diagram of an IoT
device.
3. Explain the Link Layer Protocols for physical design of IoT.
4. Explain the Application Layer Protocols for physical design of IoT.
5. Briefly explain the IoT communication models for logical design of IoT.
6. Explain the functional blocks of an IoT system.
7. What is an Embedded system and how it is related to IoT?

Important Short Questions for Module-1


1. What is Sensor? Give an example.
2. What is Actuator? Give an example.
3. Why do IoT systems have to be self-adapting?
4. What is MQTT?
5. What is 6LoWPAN?
6. What is an Embedded system?
7. What is the use of Broker in Publish-Subscriber model?

Prepared by: Swagat Kumar Jena

You might also like