IOT_Unit_2
IOT_Unit_2
Internet of Things : IOT is known as the Internet of Things where things are said to be the
communicating devices that can interact with each other using a communication media. Usually
every day some new devices are being integrated which uses IoT devices for its function. These
devices use various sensors and actuators for sending and receiving data over the internet. It is an
ecosystem where the devices share data through a communication media known as the internet or
Iot is an ecosystem of connected physical object that are accessible through internet. Iot means
anything which can be connected to internet and can be controlled or monitored using internet from
smart devices or PC.
M2M is also named as Machine Type Communication (MTC) in 3GPP ( 3rd Generation Partnership
Project).
M2M is communication could carried over mobile networks, for ex- GSM-GPRS, CDMA EVDO
Networks .
In M2M communication, the role of mobile networks is largely confined to server as a transport
networks.
Smart wearables, Big Data and Cloud, Sensors, Data and Information,
Examples
etc. etc.
A Use Case Diagram is a vital tool in system design, it provides a visual representation of how users
interact with a system. It serves as a blueprint for understanding the functional requirements of a
system from a user’s perspective, aiding in the communication between stakeholders and guiding the
development process.
A use case diagram is used to represent the dynamic behavior of a system. It encapsulates the
system's functionality by incorporating use cases, actors, and their relationships. It models the tasks,
services, and functions required by a system/subsystem of an application. It depicts the high-level
functionality of a system and also tells how the user handles a system.
The main purpose of a use case diagram is to portray the dynamic aspect of a system. It accumulates
the system's requirement, which includes both internal as well as external influences. It invokes
persons, use cases, and several things that invoke the actors and elements accountable for the
implementation of use case diagrams. It represents how an entity from the external environment can
interact with a part of the system.
Following are the purposes of a use case diagram given below:
3. It recognizes the internal as well as external factors that influence the system.
A use case diagram depicting the Online Shopping website is given below.
Here the Web Customer actor makes use of any online shopping website to purchase online. The
top-level uses are as follows; View Items, Make Purchase, Checkout, Client Register. The View
Items use case is utilized by the customer who searches and view products. The Client Register use
case allows the customer to register itself with the website for availing gift vouchers, coupons, or
getting a private sale invitation. It is to be noted that the Checkout is an included use case, which is
part of Making Purchase, and it is not available by itself.
The View Items is further extended by several use cases such as; Search Items, Browse Items, View
Recommended Items, Add to Shopping Cart, Add to Wish list. All of these extended use cases provide
some functions to customers, which allows them to search for an item. The View Items is further
extended by several use cases such as; Search Items, Browse Items, View Recommended Items, Add
to Shopping Cart, Add to Wish list. All of these extended use cases provide some functions to
customers, which allows them to search for an item.
1. Connectivity
3. Scalability
5. Architecture
6. Safety
7. Self Configuring
8. Interoperability
The IoT value chain explains the building blocks of IoT, how value is created, who they players are,
and how they interact with each other to deliver value.
Looking at the IoT value chain as a pyramid, at the base is all the connected devices: phones, fitness
bands, connected cars, smart homes, and other devices on the consumer side; in industry, you have
things like building sensors, smart cities, and connected factories, for example.
Stepping up a level from the base brings in the network and connectivity—how devices are
connected and communicate. It’s also where service providers collect device and network data and
upload it to the cloud.
Finally, at the top of the value chain, are applications and services that are closest to the eventual
end users—enterprises and consumers.
M2M refers to the communication between devices without human intervention. M2M (Machine-to-
Machine) architecture facilitates the transfer of information between components and allows for the
operation of different devices without any difficulty. That's the essence of it, delivering such devices
the ability to communicate with each other, whether it's through wires or wireless transmissions, to
be able to share and take action without having many human interventions. It has established a
protocol of using a specific language so various devices, ranging from a robot to a printer, to an HVAC
system, can exchange data safely and quickly.
IoT M2M
Communication
HTTP, FTP, and Telnet Traditional protocol
protocol
Examples Smart cities, Big data, etc. Sensors, data, information, etc.
Building an architecture
Architecture refers to the description of the main conceptual elements, the actual elements of a
target system, how they relate to each other, and principles for the design of the architecture. The
applied architecture is then the blueprint used to develop the actual system solution.
From a reference
architecture to a system solution.
• IoT Security: IoT introduces a wide range of new security risks and challenges to the IoT
devices themselves, their platforms and operating systems, their communications, and even
the systems to which they're connected.
• IoT Analytics: IoT business models will exploit the information collected by "things" in many
ways — for example, to understand customer behavior, to deliver services, to improve
products, and to identify and intercept business moments.
• IoT Device (Thing) Management: Long-lived nontrivial "things" will require management and
monitoring. This includes device monitoring, firmware and software updates, diagnostics,
crash analysis and reporting, physical management, and security management.
• Low-Power, Short-Range IoT Networks: Selecting a wireless network for an IoT device
involves balancing many conflicting requirements, such as range, battery life, bandwidth,
density, endpoint cost and operational cost.
• IoT Processors: The processors and architectures used by IoT devices define many of their
capabilities, such as whether they are capable of strong security and encryption, power
consumption, whether they are sophisticated enough to support an operating system,
updatable firmware, and embedded device management agents.
• IoT Operating Systems: Traditional operating systems (OSs) such as Windows and iOS were
not designed for IoT applications. They consume too much power, need fast processors, and
in some cases, lack features such as guaranteed real-time response.
• Event Stream Processing: Some IoT applications will generate extremely high data rates that
must be analyzed in real time. Systems creating tens of thousands of events per second are
common, and millions of events per second can occur in some telecom and telemetry
situations.
• IoT Platforms: (1) low-level device control and operations such as communications, device
monitoring and management, security, and firmware updates
• IoT Standards and Ecosystems: Although ecosystems and standards aren't precisely
technologies, most eventually materialize as application programming interfaces (APIs).
Reference Architecture: