Unit - 1 Notes Iot
Unit - 1 Notes Iot
INTRODUCTION TO IOT
what is IoT
he Internet of Things (IoT) refers to a network of physical objects—devices, vehicles, appliances, and
other items—embedded with sensors, software, and other technologies that enable them to collect
and exchange data over the internet. These objects can be anything from household items like
refrigerators and thermostats to industrial machines and wearable devices.
It encompasses a vast network of physical objects or "things" equipped with sensors, software, and
other technologies that enable them to collect and exchange data with other devices and systems
over the internet.
Internet of things (IoT) describes devices with sensors, processing ability, software and other
technologies that connect and exchange data with other devices and systems over the Internet or
other communication networks.
Characteristics of IoT
1. Connectivity
Data Collection: Sensors embedded in IoT devices collect real-time data from their
environment, such as temperature, motion, light, humidity, and more.
Action Execution: Actuators, another type of embedded component, allow IoT
devices to perform actions based on the data received, such as opening a valve,
adjusting the temperature, or turning on a light.
Edge Computing: Some IoT devices process data locally (on the edge) to reduce
latency and bandwidth usage. This is particularly useful in time-sensitive applications,
such as autonomous vehicles or industrial automation.
Cloud Computing: Data from IoT devices can be sent to cloud-based platforms for
storage, processing, and analysis. Cloud computing allows for advanced data
analytics, machine learning, and large-scale data aggregation.
5. Scalability
Expansion Capability: IoT systems are designed to be scalable, meaning they can
easily expand to include more devices as needed. This is essential for applications like
smart cities, where thousands of sensors and devices need to be managed
simultaneously.
6. Real-Time Operations
Immediate Response: IoT systems often operate in real-time, meaning they collect,
process, and act on data immediately.
8. Security
Data Protection: Given the large amount of sensitive data transmitted by IoT devices,
security is a critical characteristic. IoT systems must implement robust encryption,
authentication, and secure communication protocols to protect data from cyber
threats.
Privacy: IoT devices must ensure the privacy of users by controlling access to data
and adhering to regulatory requirements regarding data storage and usage.
9. Energy Efficiency
Environmental Adaptation: IoT devices are often context-aware, meaning they can
adapt their behavior based on the environment or situational data they collect.
11. Mobility
Support for Mobile Devices: Many IoT devices are mobile, such as wearable devices
or vehicles, and must maintain connectivity and functionality while on the move.
12. Integration with Other Technologies
AI and Big Data: IoT systems are often integrated with artificial intelligence (AI)
and BDA.
Blockchain: For secure and transparent transactions, some IoT systems integrate with
blockchain technology, particularly in areas like supply chain management or digital
identity verification.
SCOPE OF IoT
1. Consumer Applications
2. Industrial Applications (Industrial IoT or IIoT)
3. Healthcare
4. Smart Cities
5. Environmental Monitoring
6. Retail
7. Transportation and Logistics
8. Energy Sector
9. Building Management
10. Future Scope
adv of iot.webp
DESIGN OF IOT
1. PHYSICAL DESIGN OF IOT
2. LOGICAL DESIGN OF IOT
Purpose: Sensors are used to collect data from the environment. They detect physical or
environmental changes and convert them into signals that can be measured and analyzed.
Types:
o Temperature Sensors
o Proximity Sensors
o Pressure Sensors
o Light Sensors
o Motion Sensors
b. Actuators
Purpose: Actuators are responsible for taking action based on data from sensors. They
convert electrical signals into physical actions.
Types:
o Motors: Used to create motion, such as opening a valve or rotating a shaft.
o Solenoids: Generate linear motion, often used in locks or latches.
o Relays: Electrically operated switches that control circuits.
Purpose: These components process data collected by sensors and control the operation of
actuators. They execute the software that governs the device's behavior.
2. Communication Modules
a. Wireless Communication Modules
Wi-Fi Modules
Bluetooth Modules
Zigbee Modules
LoRaWAN Modules
Cellular Modules (3G/4G/5G)
Ethernet Modules
RS232/RS485 ModuleS
3. Power Supply
a. Battery Power
Design Considerations
Energy Harvesting
b. Wired Power
Design Considerations
Function: This layer is responsible for sensing and data acquisition. It includes all the IoT
devices, sensors, and actuators that interact directly with the physical environment.
Components:
o Sensors (temperature, humidity, light, etc.)
o Actuators (motors, relays, etc.)
o Embedded software running on devices
b. Network Layer
Function: This layer handles the communication between IoT devices and other parts of the
system. It ensures that data collected from devices is transmitted to the processing layer or
cloud infrastructure.
Components:
o Communication protocols (e.g., MQTT, HTTP, CoAP)
o Network devices (gateways, routers, etc.)
c. Edge/Processing Layer
Function: The edge or processing layer is responsible for intermediate data processing closer
to the data source, often to reduce latency and bandwidth usage.
Components:
o Edge devices (microcontrollers, edge servers)
o Processing algorithms (filtering, aggregation, basic analytics)
Function: This layer manages the flow, processing, and storage of data. It acts as a bridge
between the raw data collected by the devices and the applications that use this data.
Components:
o Databases (SQL, NoSQL)
o Message brokers (e.g., Apache Kafka, RabbitMQ)
o Data processing frameworks (e.g., Apache Spark, Flink)
e. Application Layer
Function: The application layer includes the software applications that provide services to
the end users. It is where the processed data is presented, analyzed, and acted upon.
Components:
o User interfaces (mobile apps, web dashboards)
o Business logic
o APIs for integration with other systems
Function: Security spans across all layers of the IoT system, ensuring data integrity, privacy,
and protection against unauthorized access.
Components:
o Encryption mechanisms
o Authentication and authorization protocols
o Security policies and governance
b. Data Transmission
c. Data Processing
d. Data Storage
Application
Management
Services
The services functional block offers a set of capabilities, including device monitoring
and control, data publication and deletion, as well as system restoration. These
services enhance the functionality and utility of the IoT system.
Communication
Security
Device
Devices within the IoT framework are responsible for sensing and monitoring
functions, gathering data from the surrounding environment. These devices enable the
collection of relevant information required for system operations.
Publish−Subscribe Model
The broker serves as a central entity that manages various topics to which consumers
can subscribe. Typically implemented as a server, the broker maintains the published
messages from the publishers. Consumers, usually represented by IoT applications
through which users interact, consume the data published by the publishers.
Consumers can subscribe to one or more topics managed by the broker.
Push−Pull Model
In the push−pull model, there exist three primary entities: the publisher, the consumer,
and the queues. Publishers assume the responsibility of pushing messages to the
queues. The data they generate is then stored in one or multiple queues.
One notable distinction between the push−pull model and the publish−subscribe
model is the presence of message ordering. In the push−pull model, consumers are
tasked with pulling messages directly from the queues and subsequently consuming
them. Typically, a consumer in this context refers to an IoT application that facilitates
user interactions.
The Exclusive Pair Model operates based on two primary entities: the client and the
server. These entities establish a full duplex connection to facilitate the exchange of
data.
Client-server
Here the client is not aware of the storage of data because it is concerned about the server
and similarly the server should not be concerned about the user interface because it is a
concern of the client and this separation is needed for independent development and
updating of server and client. No matter how the client is using the response of the server
and no matter how the server is using the request of the client.
Stateless
It means each request from the client to the server must contain all the necessary
information to understand by the server. Because if the server can't understand the request
of the client then it can't fetch the request data in a proper manner.
Cacheable
In response, if the cache constraints are given then a client can reuse that response in a
later request. It improves the efficiency and scalability of the system without loading the extra
data. A RESTful web APIs is implemented using HTTP and REST principles.
2. Cloud Computing -
It provides us the means by which we can access applications as utilities over the internet.
Cloud means something which is present in remote locations. With Cloud computing, users
can access any resources from anywhere like databases, webservers, storage, any device,
and any software over the internet.
Characteristics –
● Broad network access
● On demand self-services
● Rapid scalability
● Measured service
● Pay-per-use
● Provides different services, such as –
IaaS (Infrastructure as a service)-
Infrastructure as a service provides online services such as physical machines, virtual
machines, servers, networking, storage and data center space on a pay per use basis. Major
IaaS providers are Google Compute Engine, Amazon Web Services and Microsoft Azure etc.
Ex : Web Hosting, Virtual Machine etc.
.
PaaS (Platform as a service)-
Provides a cloud-based environment with a very thing required to support the complete life
cycle of building and delivering West web based (cloud) applications – without the cost and
complexity of buying and managing underlying hardware, software provisioning and hosting.
Computing platforms such as hardware, operating systems and libraries etc. Basically, it
provides a platform to develop applications.
Ex : App Cloud, Google app engine,
It refers to the method of studying massive volumes of data or big data. Collection of data
whose volume, velocity or variety is simply too massive and tough to store, control, process
and examine the data using traditional databases. Big data is gathered from a variety of
sources including social network videos, digital images, sensors and sales transaction records.
4. Communications Protocols -
They are the backbone of IoT systems and enable network connectivity and linking to
applications. Communication protocols allow devices to exchange data over the network.
Multiple protocols often describe different aspects of a single communication. A group of
protocols designed to work together is known as a protocol suite; when implemented in
software they are a protocol stack.
5. Embedded Systems -
It is a combination of hardware and software used to perform special tasks. It includes
microcontroller and microprocessor memory, networking units (Ethernet Wi-Fi adapters),
input output units (display keyword etc. ) and storage devices (flash memory). It collects the
data and sends it to the internet. Embedded systems used in
Examples –
● Digital camera
● DVD player, music player
● Industrial robots
● Wireless Routers etc
Resources: These are software components on IoT devices for accessing and processing.
storing software components or controlling actuators connected to the device. Resources also
include software components that enable network access.
Controller Service: It is a service that runs on the device and interacts with web services.
The controller service sends data from the device to the web service and receives commands
from the application via web services for controlling the device.
Web Service: It provides a link between IoT devices, applications, databases, and analysis
components.
Analysis Component: It performs an analysis of the data generated by the lol device and
generates results in a form which are easy for the user to understand.
Application: It provides a system for the user to view the system status and view product
data. It also allows users to control and monitor various aspects of the IoT system.
IoT Levels
IoT level 1 -
IoT systems have a single device that performs sensing or actuation, stores a. analyses it
and hosts the application, IoT system-level-l is the best example for modeling low complexity
and low-cost solution where the analysis requirement is hok comprehensive and data
involved is not big.
Example: We can understand with the help of an eg. let's look at the IoT device that monitors
the lights in a house. The lights are controlled through switches. The database has
maintained the status of each light and also REST services deployed locally allow retrieving
and updating the state of each light and trigger the switches accordingly. For controlling the
lights and applications, the application has an interface. The device is connected to the
internet and hence the application can be accessed remotely as well.
IoT level 2 -
A node performs sensing/actuation and local analysis. Data is stored in the cloud. this level is
facilitated where the data involved is big and primary analysis is not comprehensive
Example: Cloud-based application is used for monitoring and controlling the IoT system A
single node monitors the soil moisture in the field Which is sent to the database on the cloud
using REST APIS. The controller service continuously monitors moisture levels.
IoT level 3 -
At this level, the application is cloud-based. A single node monitors the environment and
stores data in the cloud. This is suitable where data is comprehensive and analysis 1
computationally intensive.
Example: A node is monitoring a package using devices like an accelerometer and gyroscope.
These devices track vibration levels. controller service sends sensor data to the cloud in the
rear time using WebSocket APL. Data is stored in the cloud and visualized using a cloud
based application. The analysis component triggers an alert if vibration levels cross a
threshold.
IoT level 4 -
At this level, Multiple nodes collect information and store it in the cloud. Local and rent
server nodes are used to grant and receive information collected in the cloud from various
devices. Observer nodes can process information and use it for applications but not perform
control functions, This level is the best solution where data involvement is big, requirement
analysis is comprehensive and multiple nodes are required.
Example: Analysis is done on the cloud and the entire IoT system has monitored the cloud
using an application. Noise monitoring of an area requires various nodes to function
independently of each other. Each has its own controller service. Data is stored in a cloud
database.
IoT level 5 -
In this level Nodes present locally are of two types end odes and coordinator nodes End
nodes collect data and perform sensing or actuation or both. Coordinator nodes collect data
from end nodes and send it to the cloud. Data is stored and analyzed in the cloud. This level
is best for WSN, where the data involved is big and the requirement analysis is
comprehensive.
Example: A monitoring system has various components: end nodes collect various data from
the environment and send it to the coordinator node. The coordinator node acts as a gateway
and allows the data to be transferred to cloud storage using REST API. The controller service
on the coordinator node sends data to the cloud.
IoT Level-6 -
At this level, the application is also cloud-based and data is stored in the cloud-like of levels.
Multiple independent end nodes perform sensing and actuation and send d to the cloud. The
analytics components analyze the data and store the results in the cloud database. The results
are visualized with a cloud-based application. The centralized controller is aware of the status
of all the end nodes and sends control commands to the nodes.
Example: Weather monitoring consists of sensors that monitor different aspects of the
system. The end nodes send data to cloud storage. Analysis of components, applications, and
storage areas in the cloud. The centralized controller controls all nodes and provides inputs.