Unit 2Notes
Unit 2Notes
IOT FUNDAMENT
ARCHITECTURE AND ITSALS OF SENSORSAND
PROTOCOLS| IoT
IS3104 | 4 Credits|
UNIT -2
Fundamentals of IoT
SUNIL KUMAR
[email protected]
Aassistant Professor
School of Computing & Intelligent Systems – IoT & IS
Manipal University, Dehmi Kalan, Jaipur Rajasthan
Syllabus
IoT protocols: Protocol Standardization for IoT, M2M and
WSN Protocols, SCADA and RFID Protocols.
M2M Ecosystem
• The machine-to-machine (M2M) paradigm, as the
name suggests, implies a system of
communication between two or more
machines/devices without human intervention.
• Some basic examples of M2M communication in
our daily lives include(like ATM, power line
monitoring system and vending machines.
• A centralized air conditioning system in a building
is a good example of this paradigm. If the
requirements of a particular room in that building
dictate that the room must be kept at a constant
temperature of 20 C, the sensors continuously
sense the environment (temperature of the room)
and direct the actuators controlling the cold air
inlet to keep the room at the desired temperature.
What is IoT and M2M
• M2M refers to networking of machines (or devices) Purpose of
remote monitoring and control and data exchange
• Provide Remote access- IoT and M2M provide access to information
without human intervention.
• M2M- M2M provides direct communication between individual machines
or devices. It designed to communicate between device(Machines) for a
specific purpose.
• IoT – IoT is broader concept for internet communication between devices.
It involves a wide range of devices, sensors, actuators, and applications
that communicate with the internet.
• M2M uses non-IP-Based proprietary networks and IoT uses broad
networks protocol based on IP.
IoT and M2M
• Since non-IP based protocols are used, M2M nodes within one network can’t
communicate with nodes in an external network.
• To enable communication between remote M2M area networks, m2M gateways
are used
M2M Gateway
Difference Between IoT & M2M
Communication in IoT Vs M2M
IoT and M2M
• Basics of IoT and M2M
▪ IoT and M2M are Networking of machines or devices. Purpose of remote monitoring ,
control and data exchange
▪ IoT and M2M Differs in underlying technologies, system architectures, and types of
application
▪ M2M- M2M provides direct communication between individual machines or devices. It
designed to communicate between device(Machines) for a specific purpose.
• Scope of IoT and M2M
▪ M2M deals with direct communication and Data exchange. M2M Involves a closed network
or a dedicated communication channel.
▪ IoT deals with connecting and networking various devices, objects, and systems through the
internet.
IoT and M2M
• Communication Protocols of IoT and M2M
▪ Types of communication between the machines or devices.
▪ M2M uses non-IP-Based proprietary networks and IoT uses broad networks protocol based
on IP.
• Hardware vs Software Emphasis of IoT and M2M
▪ M2M is more on hardware whereas IoT is more on software.
• Data Collection & Analysis of IoT and M2M
▪ M2M data is collected in point solutions and often in on-premises storage infrastructure.
▪ In contrast to M2M, the data in IoT is collected in the cloud ( can be public, private, or
hybrid cloud).
• Machines in M2M vs Things in IoT
▪ “Things” in IoT. ( Here, Devices are used for a variety of solutions with the use of many
algorithms on the cloud)
Applications of M2M
The applications of M2M cover many areas and the areas in which M2M is currently
used are
1. Security : Surveillances, Alarm systems, Access control, Car/driver security
2. Tracking & Tracing : Fleet Management, Order Management, Pay as you drive, Asset
Tracking, Navigation, Traffic information, Road tolling, Traffic optimization/steering
3. Payment : Point of sales, Vending machines, Gaming machines
4. Health : Monitoring vital signs, Supporting the aged or handicapped, Web Access
Telemedicine points, Remote diagnostics
5. Remote Maintenance/Control : Sensors, Lighting, Pumps, Valves, Elevator control,
Vending machine control, Vehicle diagnostics
6. Metering : Power, Gas, Water, Heating, Grid control, Industrial metering
7. Manufacturing : Production chain monitoring and automation
8. Facility Management : Home / building / campus automation
Key features of M2M
Some of the key features of M2M communication system are:
1. Low Mobility : M2M Devices do not move, move infrequently, or move only
within a certain region
2. Time Controlled : Send or receive data only at certain pre-defined periods
3. Time Tolerant : Data transfer can be delayed
4. Packet Switched : Network operator to provide packet switched service with or
without an MSISDN
5. Online small Data Transmissions: MTC Devices frequently send or receive small
amounts of data.
6. Monitoring: Not intend to prevent theft or vandalism but provide functionality to detect
the events
7. Low Power Consumption : To improve the ability of the system to efficiently service M2M
applications
8. Location Specific Trigger : Intending to trigger M2M device in a particular area e.g. wake
up the device.
Important Question
• Q.1 List the top three requirements for “Things” in IoT? What is
the purpose behind these requirements?
• Q.2 What are the major differences between TCP and UDP
Protocols? List advantages of Both.
• Q3. Describe communication model.
M2M and WSN Protocols
• Most M2M applications are developed today in a highly customized
fashion
• High-level M2M architecture from M2M Standardization Task Force
(MSTF) does include fixed & other non cellular wireless networks
• Means it’s generic, holistic IoT architecture even though it is M2M
architecture
• M2M and IoT sometimes are used interchangeably in the United States
M2M and WSN Protocols
• Other M2M standards activities include:
• Data transport protocol standards - M2MXML, JavaScript Object Notation
(JSON), BiTXML, WMMP, MDMP
• Extend OMA DM to support M2M devices protocol management
objects
• M2M device management, standardize M2M gateway
• M2M security and fraud detection
• Network API’s M2M service capabilities
• Remote management of device behind gateway/firewall
• Open REST-based API for M2M applications
SCADA
Engineering Workstation: This workstation is likely used by engineers to configure, monitor, and
maintain the SCADA system. It connects to the substation LAN and may have specialized tools to
interact with the substation devices.
DMS & EMS (Distribution Management System & Energy Management System): DMS and EMS are
external systems connected via the **Utility WAN (Wide Area Network). They provide higher-level
control functions such as load management, system optimization, and energy forecasting.
Utility WAN (Wide Area Network): This network connects the substation to remote utility control
centres. It enables communication between substations and central control systems, such as
DMS/EMS or SCADA Master.
Substation Router: The Substation Router facilitates communication between the substation's internal LAN and external
networks, including the utility WAN. It connects to other elements like the SCADA Master, Engineering Workstation, and
possibly external systems via the dedicated channel or the WAN.
Firewall: A Firewall is an optional security device that monitors and controls the incoming and outgoing network traffic
based on predefined security rules. It helps protect the substation network from external cyber threats.
Local HMI (Human-Machine Interface): The Local HMI provides operators within the substation a visual interface to interact
with the equipment. It allows for local control and monitoring, independent of the remote SCADA Master.
Substation LAN (Local Area Network): The Substation LAN connects various Intelligent Electronic Devices (IEDs), Remote
Terminal Units (RTUs), and other systems within the substation. This local network is responsible for communication
between all internal devices.
IRIG-B Timing Wire / IRIG-B Time Generator: The IRIG-B Timing Wire is used for time synchronization within the substation.
The **IRIG-B Time Generator** provides the necessary time signals, which help synchronize data and event records across
the substation.
Database Server: This server stores all the real-time and historical data collected from various substation devices,
including alarms, event logs, and measured values.
Remote Terminal Unit (RTU): RTUs collect data from sensors (instrument transformers, switchgear,
etc.) in the substation. They send this data to the SCADA Master system and receive commands for
control actions.
Relay IED (Intelligent Electronic Device): Relay IEDs perform protection, control, and monitoring
functions. They monitor electrical parameters and can trip circuit breakers in case of faults or
abnormal conditions. The **Process Bus** connects these devices for high-speed communication.
IEDs (Intelligent Electronic Devices): IEDs are advanced microprocessor-based devices that control
and monitor various electrical equipment like circuit breakers, transformers, and other sensors.
They communicate over the substation LAN and execute automation functions.
Instrument Transformer, Switchgear, and Other Sensors: These components are the physical
devices installed in the substation to measure electrical parameters (voltage, current) and to
control circuit breakers or other switchgear.
Dedicated Channel: This is a communication link dedicated to the connection between the
substation and the SCADA Master, ensuring secure and reliable data exchange.
SCADA Systems
SCADA Systems
SCADA Systems
Process Overview:
▪ Input sensing devices detect physical
conditions (like temperature, pressure,
or user inputs).
▪ The input module passes this data to the
CPU, where it is processed based on the
pre-programmed logic.
▪ The CPU then sends commands to the
output module, which activates or
deactivates the output devices to
control the machinery or process.
▪ Optical Isolation to protect the PLC
system from electrical faults or surges in
the output devices
Introduction of WSN
• Even though wireless sensors has limited resources in memory, computation power,
bandwidth, and energy.
• With small physical size. It Can be embedded in the physical environment.
• Self-organizing multi-hop ad-doc networks
Introduction of WSN
Key Components of a WSN:
1.Sensor Nodes: Small, low-power devices equipped with sensors for data collection.
2.Gateway Node: Collects data from sensor nodes and transmits it to an end system.
3.Base Station: A central system (often a computer) where the data is processed and
visualized.
4.Wireless Communication: Ensures data transmission between sensor nodes and the
gateway using protocols like ZigBee, Bluetooth, or Wi-Fi.
Characteristics of WSNs:
•Self-Organizing: Nodes can form a network automatically and adapt to changes like node
failures.
•Low Power: Sensor nodes are designed to operate on minimal power to extend battery life.
•Scalability: WSNs can scale from a few to hundreds or thousands of sensor nodes
depending on the application.
Wireless Sensor Network
Wireless Sensor Network
1. Sensor Nodes:
▪ These are small, low-power devices capable of sensing environmental parameters (like temperature, pressure,
or motion) and transmitting data wirelessly.
▪ They form a network where they communicate with each other, passing information towards a gateway.
▪ The gateway node serves as the main connection point that aggregates data from the sensor nodes.
▪ It is responsible for forwarding the collected data to the computer (or another system) for further processing.
3. Communication Arrows:
▪ These black arrows indicate the direction of data flow, showing how information is passed from one sensor
node to the next until it reaches the gateway node.
4. Computer (End User):
▪ The data collected by the sensor nodes and forwarded by the gateway is ultimately processed or visualized on a
computer system, where a user can monitor the sensor data in real-time.
WSN: Environmental Monitoring
Application: Forest Fire Detection In this application, a WSN is deployed across a forest area to
monitor temperature, humidity, and smoke levels in real-time. The network consists of multiple
sensor nodes placed in different parts of the forest, each equipped with temperature and smoke
detectors.
• Heterogeneity
– The devices deployed may be of various types and need
to collaborate with each other.
• Distributed Processing
– The algorithms need to be centralized as the processing
is carried out on different nodes.
• Low Bandwidth Communication
– The data should be transferred efficiently between
sensors
37
Continued..
38
Operational Challenges of Wireless Sensor Networks
• Energy Efficiency
• Limited storage and computation
• Low bandwidth and high error rates
• Errors are common
– Wireless communication
– Noisy measurements
– Node failure are expected
• Scalability to a large number of sensor nodes
• Survivability in harsh environments
• Experiments are time- and space-intensive
39
Introduction
40
How RFID works?
1.RFID Tags: RFID tags are small electronic devices that consist of a microchip and an
antenna. The microchip contains information or data about the object to which the tag is
attached. The antenna allows the tag to communicate with RFID readers using radio
waves.
2.RFID Readers: RFID readers are devices that emit radio waves and can
communicate with RFID tags within their range. When an RFID reader sends out radio
waves, RFID tags within the reader's range receive the waves and respond by
transmitting their stored data back to the reader.
3.RFID Communication: When an RFID tag receives radio waves from an RFID
reader, it uses the energy from those waves to power its microchip. The tag's microchip
then processes the information stored on it and sends that information back to the reader
via the antenna. This communication is typically very quick and occurs in a matter of
milliseconds.
How RFID works?
•Passive RFID: Passive RFID tags do not have their own power
source. They rely on the energy from the RFID reader's radio waves to
power their microchips and transmit data.
•Active RFID: Active RFID tags have their own power source (usually
a battery) and can transmit data over longer distances compared to
passive tags.
•Semi-Passive RFID: Semi-passive tags have their own power source
for certain functions (like transmitting data), but they still rely on the
reader's energy for other operations.
Applications of RFID:
RFID technology is used in various industries and applications, including:
1. Supply Chain Management: Tracking goods and shipments throughout the
supply chain.
2. Inventory Management: Keeping track of items in retail stores, warehouses, and
libraries.
3. Access Control: Providing access to secure areas or buildings.
4. Asset Tracking: Monitoring and managing valuable assets, such as equipment and
vehicles.
5. Payment Systems: Enabling contactless payments with RFID-enabled cards or
devices.
6. Animal Tracking: Monitoring and managing livestock or wildlife populations.
7. Healthcare: Tracking patient records, medical equipment, and pharmaceuticals.
Global Radio frequency identification (RFID)
technology market, by application, 2014 - 2025
(USD Billion)
The global RFID technology market is estimated to reach USD 40.5 billion by 2025
Source: https://www.grandviewresearch.com/industry-analysis/radio-frequency-identification-rfid-technology-market
45
Types of RFID
46
Radio frequency identification
47
Making ordinary objects ‘Smart’
Passive
read/write tags
affixed to caps
of containers
48
RFID Tags
49
RFID Tags
50
RFID Reader
51
RFID Basics
▪RFID Base station
▪Tags
▪Middleware
52
RFID Generic Architecture Solution
53
How does it looks ?
Visibility !!
54
Physics Behind
D: Maximum dimension
Distance from the
of the radiating structure
reader antenna
Near Filed communication Far field communication
860 MHz
125 KHz- 150 KHz 13.56 MHz 433 MHz 960 MHz 2.4 GHz 5.8 GHz
55
Generic RFID Tag Architecture
56
RFID Classes
57
RFID enables city digital transformation
▪ Retail
▪ Healthcare
▪ Administration
▪ Environment
▪ Security
▪ Industry
▪ Defense
▪ Etc
58
RFID Applications : Just imagine !!
59
NFC
▪ Near field communication
▪ Mobile phone, is an enabler of new
smart services
▪ Mobile operator ecosystem
60
Towards a better customer experience
Smart Payments
Tolls, Tickets, vending
Goods, services, …
Smart Authorization
Access to transport, buildings
Rental or sharing
Fleet management
VIP retail experience 61
Live stock traceability
▪ Livestock management.
▪ Optimizing productivity.
▪ Helping ensure food safety and quality.
62
Food security
▪ Identify and trace food & drink information along the supply chain.
▪ Time, food care requirements, and processing conditions
▪ Smart packaging
▪ Cold chain monitoring
▪ Warehouse monitoring
▪ Detect contaminated food
63
Pharmaceutical security & Healthcare
• Anti counterfeit drugs
• Blood bag tracking & monitoring
• Medical surgical instrument
• Equipment and staff location
64
Supply Chain Monitoring
Container On Board
Reader/ Unit (OBU) Sensors
On BoardCommun
Unit (OBU) *
17364 Tags
10891 Tag
65
warehouse management
Shipment & receiving verification
Tracking where it counts; the point of Entry and Exit
Track and Trace Accuracy with Dock Door RFID
66
RFID & Industry 4.0
▪ Product life cycle monitoring
▪ Manufacturing
▪ Supply Chain
▪ Pre- and Post-Sale
67
Retail
• EAS (Electronic Article Surveillance)
• Inventory management
• Information system visibility
• Increase work efficiency
• Boost sales
68
Sports
• Timing measurement
• Real time player performance monitoring
• People tracking
• Event security & management
69
Sports
70
Section 4
71
Raising awareness
▪ Trainings
▪ Seminars
▪ Events
▪ Workshops - Demo
72
change management acceptance
▪ Awareness
▪ Understanding
▪ Adoption
▪ Commitment
73
National Working Groups strategy !
▪ Public / Private collaboration
▪ Case studies
74
Capacity Building
▪ RFID technologies could not be used on a plug & play basis
75
Support startup ecosystem (innovation,….)
▪ Entrepreneurship
76
Return on investment and monetization
77