0% found this document useful (0 votes)
4 views

Unit 2Notes

Uploaded by

pranavkarwa2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Unit 2Notes

Uploaded by

pranavkarwa2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 77

EAC3016

IOT FUNDAMENT
ARCHITECTURE AND ITSALS OF SENSORSAND
PROTOCOLS| IoT
IS3104 | 4 Credits|

UNIT -2
Fundamentals of IoT
SUNIL KUMAR
[email protected]
Aassistant Professor
School of Computing & Intelligent Systems – IoT & IS
Manipal University, Dehmi Kalan, Jaipur Rajasthan
Syllabus
IoT protocols: Protocol Standardization for IoT, M2M and
WSN Protocols, SCADA and RFID Protocols.
M2M Ecosystem
• The machine-to-machine (M2M) paradigm, as the
name suggests, implies a system of
communication between two or more
machines/devices without human intervention.
• Some basic examples of M2M communication in
our daily lives include(like ATM, power line
monitoring system and vending machines.
• A centralized air conditioning system in a building
is a good example of this paradigm. If the
requirements of a particular room in that building
dictate that the room must be kept at a constant
temperature of 20 C, the sensors continuously
sense the environment (temperature of the room)
and direct the actuators controlling the cold air
inlet to keep the room at the desired temperature.
What is IoT and M2M
• M2M refers to networking of machines (or devices) Purpose of
remote monitoring and control and data exchange
• Provide Remote access- IoT and M2M provide access to information
without human intervention.
• M2M- M2M provides direct communication between individual machines
or devices. It designed to communicate between device(Machines) for a
specific purpose.
• IoT – IoT is broader concept for internet communication between devices.
It involves a wide range of devices, sensors, actuators, and applications
that communicate with the internet.
• M2M uses non-IP-Based proprietary networks and IoT uses broad
networks protocol based on IP.
IoT and M2M

• M2M area network comprises of machines which have embedded hardware


modules for sensing, actuation and communication .
• Various communication protocols such as Zigbee, Bluetooth, ModBus, M-Bus,
Wireless M-Bus, 6LoWPAN, IEEE 802.15.4,etc. can be used
Architecture of M2M
What is M2M Gateway

• M2M gateway acts as an intermediatory between various devices and system in


a machine-to-machine setup
• It provides the following functionalities:
oConnectivity between machines.
oData exchange between machines.
oCompatibilities between different networks.

• What is the purpose or necessity of an M2M gateway


• Within the network node communicate with each other
• To communicate with remote M2M area network, M2M gateway is required.
M2M Gateway

• Since non-IP based protocols are used, M2M nodes within one network can’t
communicate with nodes in an external network.
• To enable communication between remote M2M area networks, m2M gateways
are used
M2M Gateway
Difference Between IoT & M2M
Communication in IoT Vs M2M
IoT and M2M
• Basics of IoT and M2M
▪ IoT and M2M are Networking of machines or devices. Purpose of remote monitoring ,
control and data exchange
▪ IoT and M2M Differs in underlying technologies, system architectures, and types of
application
▪ M2M- M2M provides direct communication between individual machines or devices. It
designed to communicate between device(Machines) for a specific purpose.
• Scope of IoT and M2M
▪ M2M deals with direct communication and Data exchange. M2M Involves a closed network
or a dedicated communication channel.
▪ IoT deals with connecting and networking various devices, objects, and systems through the
internet.
IoT and M2M
• Communication Protocols of IoT and M2M
▪ Types of communication between the machines or devices.
▪ M2M uses non-IP-Based proprietary networks and IoT uses broad networks protocol based
on IP.
• Hardware vs Software Emphasis of IoT and M2M
▪ M2M is more on hardware whereas IoT is more on software.
• Data Collection & Analysis of IoT and M2M
▪ M2M data is collected in point solutions and often in on-premises storage infrastructure.
▪ In contrast to M2M, the data in IoT is collected in the cloud ( can be public, private, or
hybrid cloud).
• Machines in M2M vs Things in IoT
▪ “Things” in IoT. ( Here, Devices are used for a variety of solutions with the use of many
algorithms on the cloud)
Applications of M2M

The applications of M2M cover many areas and the areas in which M2M is currently
used are
1. Security : Surveillances, Alarm systems, Access control, Car/driver security
2. Tracking & Tracing : Fleet Management, Order Management, Pay as you drive, Asset
Tracking, Navigation, Traffic information, Road tolling, Traffic optimization/steering
3. Payment : Point of sales, Vending machines, Gaming machines
4. Health : Monitoring vital signs, Supporting the aged or handicapped, Web Access
Telemedicine points, Remote diagnostics
5. Remote Maintenance/Control : Sensors, Lighting, Pumps, Valves, Elevator control,
Vending machine control, Vehicle diagnostics
6. Metering : Power, Gas, Water, Heating, Grid control, Industrial metering
7. Manufacturing : Production chain monitoring and automation
8. Facility Management : Home / building / campus automation
Key features of M2M
Some of the key features of M2M communication system are:
1. Low Mobility : M2M Devices do not move, move infrequently, or move only
within a certain region
2. Time Controlled : Send or receive data only at certain pre-defined periods
3. Time Tolerant : Data transfer can be delayed
4. Packet Switched : Network operator to provide packet switched service with or
without an MSISDN
5. Online small Data Transmissions: MTC Devices frequently send or receive small
amounts of data.
6. Monitoring: Not intend to prevent theft or vandalism but provide functionality to detect
the events
7. Low Power Consumption : To improve the ability of the system to efficiently service M2M
applications
8. Location Specific Trigger : Intending to trigger M2M device in a particular area e.g. wake
up the device.
Important Question

• Q.1 List the top three requirements for “Things” in IoT? What is
the purpose behind these requirements?
• Q.2 What are the major differences between TCP and UDP
Protocols? List advantages of Both.
• Q3. Describe communication model.
M2M and WSN Protocols
• Most M2M applications are developed today in a highly customized
fashion
• High-level M2M architecture from M2M Standardization Task Force
(MSTF) does include fixed & other non cellular wireless networks
• Means it’s generic, holistic IoT architecture even though it is M2M
architecture
• M2M and IoT sometimes are used interchangeably in the United States
M2M and WSN Protocols
• Other M2M standards activities include:
• Data transport protocol standards - M2MXML, JavaScript Object Notation
(JSON), BiTXML, WMMP, MDMP
• Extend OMA DM to support M2M devices protocol management
objects
• M2M device management, standardize M2M gateway
• M2M security and fraud detection
• Network API’s M2M service capabilities
• Remote management of device behind gateway/firewall
• Open REST-based API for M2M applications
SCADA

• SCADA Stand for “Supervisory Control And Data Acquisition"


• One of the IoT pillars to represent the whole industrial
automation arena
• IEEE created standard specification called Std C37.1 , for SCADA &
automation systems in 2007
• In recent years, network-based industrial automation has
greatly evolved
SCADA

• It’s basically a software or it is a computer graphics install in


computer to control any process.
• SCADA is an industrial computer- based control system employed
to gather and analyze the real-time data to keep track, monitor
and control industrial equipment's in different types of
industries.
• SCADA systems, providing centralized monitoring and control of
plant's field sites.
SCADA Systems

The HMI communicates with


central programming
the PLC and sends Data and shows the bidirectional data
environment where control
Control commands to the flow between the HMI and the
logic, data acquisition, and
equipment or receives data to PLCs. Data collected from the
commands are defined for the
display in real-time. field, flows into the HMI, while
system
control signals are sent from
the HMI to the PLC to control
the equipment.

PLCs are industrial computers


that manage the automation of
various processes. They interact
directly with the field equipment.
Each PLC receives inputs from
sensors and other field devices,
processes this data, and sends
control signals to the
The equipment interacts with the corresponding equipment
PLC via hardwired connections,
where real-time data is exchanged.
The equipment’s operation can be
influenced based on control signals
received from the PLC.
SCADA

• The entire system operates in a loop:


1. SCADA Programming is used to define how the system
operates.
2. The HMI acts as the user interface where data from equipment
is visualized, and commands can be sent.
3. Data and control signals are passed between the HMI and the
PLCs.
4. The PLCs interface with the actual equipment to carry out
automation tasks like controlling robots or monitoring sensors.
SCADA Systems
Explanation
SCADA Master: The SCADA Master system is the central control unit in the utility or control centre. It
collects and processes data from substations and other field devices. It provides operators with a
user interface to monitor and control the entire system.

Engineering Workstation: This workstation is likely used by engineers to configure, monitor, and
maintain the SCADA system. It connects to the substation LAN and may have specialized tools to
interact with the substation devices.

DMS & EMS (Distribution Management System & Energy Management System): DMS and EMS are
external systems connected via the **Utility WAN (Wide Area Network). They provide higher-level
control functions such as load management, system optimization, and energy forecasting.

Utility WAN (Wide Area Network): This network connects the substation to remote utility control
centres. It enables communication between substations and central control systems, such as
DMS/EMS or SCADA Master.
Substation Router: The Substation Router facilitates communication between the substation's internal LAN and external
networks, including the utility WAN. It connects to other elements like the SCADA Master, Engineering Workstation, and
possibly external systems via the dedicated channel or the WAN.

Firewall: A Firewall is an optional security device that monitors and controls the incoming and outgoing network traffic
based on predefined security rules. It helps protect the substation network from external cyber threats.

Local HMI (Human-Machine Interface): The Local HMI provides operators within the substation a visual interface to interact
with the equipment. It allows for local control and monitoring, independent of the remote SCADA Master.

Substation LAN (Local Area Network): The Substation LAN connects various Intelligent Electronic Devices (IEDs), Remote
Terminal Units (RTUs), and other systems within the substation. This local network is responsible for communication
between all internal devices.

IRIG-B Timing Wire / IRIG-B Time Generator: The IRIG-B Timing Wire is used for time synchronization within the substation.
The **IRIG-B Time Generator** provides the necessary time signals, which help synchronize data and event records across
the substation.

Database Server: This server stores all the real-time and historical data collected from various substation devices,
including alarms, event logs, and measured values.
Remote Terminal Unit (RTU): RTUs collect data from sensors (instrument transformers, switchgear,
etc.) in the substation. They send this data to the SCADA Master system and receive commands for
control actions.

Relay IED (Intelligent Electronic Device): Relay IEDs perform protection, control, and monitoring
functions. They monitor electrical parameters and can trip circuit breakers in case of faults or
abnormal conditions. The **Process Bus** connects these devices for high-speed communication.

IEDs (Intelligent Electronic Devices): IEDs are advanced microprocessor-based devices that control
and monitor various electrical equipment like circuit breakers, transformers, and other sensors.
They communicate over the substation LAN and execute automation functions.

Instrument Transformer, Switchgear, and Other Sensors: These components are the physical
devices installed in the substation to measure electrical parameters (voltage, current) and to
control circuit breakers or other switchgear.

Dedicated Channel: This is a communication link dedicated to the connection between the
substation and the SCADA Master, ensuring secure and reliable data exchange.
SCADA Systems
SCADA Systems
SCADA Systems

Process Overview:
▪ Input sensing devices detect physical
conditions (like temperature, pressure,
or user inputs).
▪ The input module passes this data to the
CPU, where it is processed based on the
pre-programmed logic.
▪ The CPU then sends commands to the
output module, which activates or
deactivates the output devices to
control the machinery or process.
▪ Optical Isolation to protect the PLC
system from electrical faults or surges in
the output devices
Introduction of WSN

• A wireless sensor network (WSN) is a wireless network consisting of spatially


distributed autonomous devices using sensors to cooperatively monitor
physical or environmental conditions, such as temperature, sound,
vibration, pressure, motion or pollutants, at different locations.
• A collection of sensing devices that can communicate wirelessly.

• Even though wireless sensors has limited resources in memory, computation power,
bandwidth, and energy.
• With small physical size. It Can be embedded in the physical environment.
• Self-organizing multi-hop ad-doc networks
Introduction of WSN
Key Components of a WSN:
1.Sensor Nodes: Small, low-power devices equipped with sensors for data collection.
2.Gateway Node: Collects data from sensor nodes and transmits it to an end system.
3.Base Station: A central system (often a computer) where the data is processed and
visualized.
4.Wireless Communication: Ensures data transmission between sensor nodes and the
gateway using protocols like ZigBee, Bluetooth, or Wi-Fi.

Characteristics of WSNs:
•Self-Organizing: Nodes can form a network automatically and adapt to changes like node
failures.
•Low Power: Sensor nodes are designed to operate on minimal power to extend battery life.
•Scalability: WSNs can scale from a few to hundreds or thousands of sensor nodes
depending on the application.
Wireless Sensor Network
Wireless Sensor Network
1. Sensor Nodes:

▪ These are small, low-power devices capable of sensing environmental parameters (like temperature, pressure,
or motion) and transmitting data wirelessly.
▪ They form a network where they communicate with each other, passing information towards a gateway.

2. Gateway Sensor Node :

▪ The gateway node serves as the main connection point that aggregates data from the sensor nodes.
▪ It is responsible for forwarding the collected data to the computer (or another system) for further processing.

3. Communication Arrows:

▪ These black arrows indicate the direction of data flow, showing how information is passed from one sensor
node to the next until it reaches the gateway node.
4. Computer (End User):

▪ The data collected by the sensor nodes and forwarded by the gateway is ultimately processed or visualized on a
computer system, where a user can monitor the sensor data in real-time.
WSN: Environmental Monitoring

Application: Forest Fire Detection In this application, a WSN is deployed across a forest area to
monitor temperature, humidity, and smoke levels in real-time. The network consists of multiple
sensor nodes placed in different parts of the forest, each equipped with temperature and smoke
detectors.

Working of the WSN in this Scenario:


1.Data Collection: The sensor nodes measure temperature and smoke levels at regular intervals.
2.Data Transmission: Each node wirelessly transmits its data to nearby nodes, forming a multi-hop
communication system where data is forwarded toward a central gateway node.
3.Gateway to Base Station: The gateway collects data from all sensor nodes and sends it to a central
base station (a computer or cloud server).
4.Processing & Alerts: The base station processes the collected data. If the system detects high
temperatures or smoke levels that suggest a fire risk, it triggers an alert, notifying forest management
authorities in real time.
WSN: Environmental Monitoring

Advantages of WSNs in this Application:


•Real-Time Monitoring: Continuous environmental monitoring allows for early detection of
forest fires, potentially saving resources and lives.
•Wide Area Coverage: WSNs can cover large, remote areas where wired communication is
impractical.
•Low Cost: WSN deployment is typically more cost-effective compared to traditional
monitoring systems due to the wireless nature of communication.

Examples of WSN Applications:


1.Smart Agriculture: Sensor nodes monitor soil moisture, temperature, and humidity to optimize
irrigation and improve crop yield.
2.Smart Cities: WSNs are used for real-time traffic monitoring, air quality control, and energy-
efficient lighting systems.
3.Health Monitoring: Wearable sensor networks monitor physiological parameters like heart rate,
blood pressure, and blood glucose in real-time, alerting medical staff if anomalies are detected.
Disadvantages

▪ Lower speed compared to wired network.


▪ Less secure because hacker's laptop can act as Access Point. If you
connected to their laptop, they'll read all your information (username,
password.. etc).
▪ More complex to configure than wired network.
▪ Gets distracted by various elements like Blue-tooth .
▪ Still Costly at large.
▪ It does not make sensing quantities in buildings easier.
▪ It does not reduce costs for installation of sensors.
▪ It does not allow us to do more than can be done with a wired system
Design Challenges

• Heterogeneity
– The devices deployed may be of various types and need
to collaborate with each other.
• Distributed Processing
– The algorithms need to be centralized as the processing
is carried out on different nodes.
• Low Bandwidth Communication
– The data should be transferred efficiently between
sensors

37
Continued..

• Large Scale Coordination


– The sensors need to coordinate with each other to
produce required results.
• Utilization of Sensors
– The sensors should be utilized in a ways that produce the
maximum performance and use less energy.
• Real Time Computation
– The computation should be done quickly as new data is
always being generated.

38
Operational Challenges of Wireless Sensor Networks
• Energy Efficiency
• Limited storage and computation
• Low bandwidth and high error rates
• Errors are common
– Wireless communication
– Noisy measurements
– Node failure are expected
• Scalability to a large number of sensor nodes
• Survivability in harsh environments
• Experiments are time- and space-intensive

39
Introduction

RFID stands for Radio-Frequency


Identification. It's a technology that uses
radio waves to wirelessly identify and track
objects or individuals. RFID systems consist
of two main components: RFID tags (or
transponders) and RFID readers (or
interrogators).
▪ More connected devices than humans !!
▪ There will be more than 50 billion smart
objects by 2020
Source: CISCO

40
How RFID works?

1.RFID Tags: RFID tags are small electronic devices that consist of a microchip and an
antenna. The microchip contains information or data about the object to which the tag is
attached. The antenna allows the tag to communicate with RFID readers using radio
waves.
2.RFID Readers: RFID readers are devices that emit radio waves and can
communicate with RFID tags within their range. When an RFID reader sends out radio
waves, RFID tags within the reader's range receive the waves and respond by
transmitting their stored data back to the reader.
3.RFID Communication: When an RFID tag receives radio waves from an RFID
reader, it uses the energy from those waves to power its microchip. The tag's microchip
then processes the information stored on it and sends that information back to the reader
via the antenna. This communication is typically very quick and occurs in a matter of
milliseconds.
How RFID works?

RFID (passive) system structure


Types of RFID:

•Passive RFID: Passive RFID tags do not have their own power
source. They rely on the energy from the RFID reader's radio waves to
power their microchips and transmit data.
•Active RFID: Active RFID tags have their own power source (usually
a battery) and can transmit data over longer distances compared to
passive tags.
•Semi-Passive RFID: Semi-passive tags have their own power source
for certain functions (like transmitting data), but they still rely on the
reader's energy for other operations.
Applications of RFID:
RFID technology is used in various industries and applications, including:
1. Supply Chain Management: Tracking goods and shipments throughout the
supply chain.
2. Inventory Management: Keeping track of items in retail stores, warehouses, and
libraries.
3. Access Control: Providing access to secure areas or buildings.
4. Asset Tracking: Monitoring and managing valuable assets, such as equipment and
vehicles.
5. Payment Systems: Enabling contactless payments with RFID-enabled cards or
devices.
6. Animal Tracking: Monitoring and managing livestock or wildlife populations.
7. Healthcare: Tracking patient records, medical equipment, and pharmaceuticals.
Global Radio frequency identification (RFID)
technology market, by application, 2014 - 2025
(USD Billion)
The global RFID technology market is estimated to reach USD 40.5 billion by 2025

Source: https://www.grandviewresearch.com/industry-analysis/radio-frequency-identification-rfid-technology-market
45
Types of RFID

46
Radio frequency identification

▪ Tiny micro device


▪ Chip + antenna + optional capabilities (memory, sensors,
▪ Unique identification serial number (32 – 64 – 96 – 128 ,…) Bits

47
Making ordinary objects ‘Smart’

Passive
read/write tags
affixed to caps
of containers

48
RFID Tags

Chipless Energy Range


▪ Passive ▪short
▪ Semi Passive ▪Proximity
▪ Active ▪Vicinity
Read / Write ▪Longue range
▪ Memory Access basis

49
RFID Tags

50
RFID Reader

51
RFID Basics
▪RFID Base station
▪Tags
▪Middleware

▪Passive communication is assured thanks to


Load modulation technique (impedance modulation,
Backscattering )

52
RFID Generic Architecture Solution

53
How does it looks ?

Printed Electronic, Telecommunications, antenna,


wireless energy transfer, on ship design, security , plastic
technologies, RTLS, instrumentation, Big Data, cloud,
Machine learning …

Visibility !!

54
Physics Behind

D: Maximum dimension
Distance from the
of the radiating structure
reader antenna
Near Filed communication Far field communication
860 MHz
125 KHz- 150 KHz 13.56 MHz 433 MHz 960 MHz 2.4 GHz 5.8 GHz

10 KHz 100 KHz 1 MHz 10 MHz 100 MHz 1 GHz 10 GHz

55
Generic RFID Tag Architecture

Energy harvester EEPROM


Power on Reset
Computational
Clock recovery capabilities
Modulator
EEPROM
Antenna Demodulator Access control

56
RFID Classes

▪Class 0 : Read only


▪Class I : WRITE ONCE READ ONLY (WORM)
▪Class II : READ WRITE
▪Class III: Read write with on board sensor
▪Class IV: Read write with integrated transmitter

57
RFID enables city digital transformation
▪ Retail
▪ Healthcare
▪ Administration
▪ Environment
▪ Security
▪ Industry
▪ Defense
▪ Etc

58
RFID Applications : Just imagine !!

59
NFC
▪ Near field communication
▪ Mobile phone, is an enabler of new
smart services
▪ Mobile operator ecosystem

60
Towards a better customer experience
Smart Payments
Tolls, Tickets, vending
Goods, services, …

Enhanced user experience


Service notification
NFC connection Handover
Customer analytics

Smart Authorization
Access to transport, buildings
Rental or sharing
Fleet management
VIP retail experience 61
Live stock traceability
▪ Livestock management.
▪ Optimizing productivity.
▪ Helping ensure food safety and quality.

62
Food security
▪ Identify and trace food & drink information along the supply chain.
▪ Time, food care requirements, and processing conditions
▪ Smart packaging
▪ Cold chain monitoring
▪ Warehouse monitoring
▪ Detect contaminated food

63
Pharmaceutical security & Healthcare
• Anti counterfeit drugs
• Blood bag tracking & monitoring
• Medical surgical instrument
• Equipment and staff location

64
Supply Chain Monitoring

Reliable product life cycle


tracking (status, inventory,…)
Sensing
S ATELLITE
ELLULAR

Container On Board
Reader/ Unit (OBU) Sensors
On BoardCommun
Unit (OBU) *
17364 Tags
10891 Tag

Fingerprint Reader 17363 Intrusion


17365 Tags Sensor
nsportation Worker ID Card (TWIC) 17363 Tag
with Fingerprint Biometric
ISO/IEC 14443 Chassis Tag
TC 204 Standard

65
warehouse management
Shipment & receiving verification
Tracking where it counts; the point of Entry and Exit
Track and Trace Accuracy with Dock Door RFID

66
RFID & Industry 4.0
▪ Product life cycle monitoring
▪ Manufacturing
▪ Supply Chain
▪ Pre- and Post-Sale

67
Retail
• EAS (Electronic Article Surveillance)
• Inventory management
• Information system visibility
• Increase work efficiency
• Boost sales

68
Sports
• Timing measurement
• Real time player performance monitoring
• People tracking
• Event security & management

69
Sports

▪ The tag does not need to be in line of sight with


the receiver to be read (compare to a barcode and its optical
scanner)
▪ RFID tags can store a lot of information, and follow
instructions
Has the ability to pinpoint location

70
Section 4

RFID adoption challenges

71
Raising awareness
▪ Trainings
▪ Seminars
▪ Events
▪ Workshops - Demo

72
change management acceptance
▪ Awareness
▪ Understanding
▪ Adoption
▪ Commitment

73
National Working Groups strategy !
▪ Public / Private collaboration

▪ Case studies

▪ National test demo center

74
Capacity Building
▪ RFID technologies could not be used on a plug & play basis

75
Support startup ecosystem (innovation,….)
▪ Entrepreneurship

76
Return on investment and monetization

77

You might also like