0% found this document useful (0 votes)
3 views

unit-2 iot

Iot unit 2
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

unit-2 iot

Iot unit 2
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

Unit-2

IoT Data Communication and Architecture


• This introduction outlines the structured protocols involved in sending data from IoT (Internet of
Things) or M2M (Machine-to-Machine) devices to applications or services. The process resembles
mailing a letter, where data passes through various layers—akin to the OSI model's Application,
Presentation, Session, Transport, Network, Data-link, and Physical layers—before reaching its
destination. Each layer performs specific actions related to data privacy, security, and adaptation.

Data Stack:
What it is: Think of a data stack as a collection of information that’s packaged together for sending.
What happens: When a sensor (like a temperature sensor) collects data, it goes through different
layers (like steps in a recipe). Each layer adds important details, such as who sent the data and where
it should go. This helps ensure the data reaches the correct application.

Layers and Levels:


What they are: Layers are like steps in a staircase, each with a specific job. Levels refer to how
deep or high you go—starting from basic data gathering to more complex tasks.
What happens: Data moves from the lowest level (like collecting temperature readings) through
several layers that handle tasks like formatting the data, ensuring security, and finally delivering it to
an application that uses the information (like a weather app).
IoT Data Communication and Architecture
Domains:
What they are: Think of a domain as a specific area of expertise or function.
What happens: Each domain (like communication networks or applications)
focuses on a particular aspect. For example, the communication domain deals with
how devices talk to each other, while the application domain focuses on how data is
used (like displaying information to users).
Gateway:
What it is: A gateway is like a translator or bridge between two different systems.
What happens: When a device sends data using one set of rules (protocols), the
gateway can convert it into a format that the receiving system understands. For
example, if a smart thermostat sends data using a certain protocol, the gateway
converts that data so a cloud server can read it.
IoT Data Communication and Architecture
Header and Packet:
What they are: A packet is a bundle of data, and the header is like an envelope
label that contains important information.
What happens: When data is sent, it’s packaged into a packet. The header includes
details like the sender's address (where the data comes from), the destination
address (where it should go), and other info. This ensures that the data can be routed
correctly through networks.

Protocols:
What they are: Protocols are rules that define how data should be formatted and
sent.
What happens: Different types of data require different protocols. For example,
one protocol might be used for sending text data, while another is for sending video.
These rules ensure that devices can communicate effectively, regardless of their
type.
IoT/M2M Systems, Layers, and Design Standardization
• Several international organizations are working to create standards for IoT (Internet of Things) and
M2M (Machine-to-Machine) systems. These standards help ensure that different devices and
applications can communicate effectively and securely. Here are some key organizations and their
contributions:
Internet Engineering Task Force (IETF):
What it is: An international group that develops and promotes standards for the internet.
What they do: IETF creates recommendations for the engineering specifications necessary for IoT.
This includes defining the different layers of communication, network protocols, and application
standards to ensure seamless data exchange across devices.

International Telecommunication Union (ITU-T):


What it is: A specialized agency of the United Nations that focuses on issues related to
information and communication technologies.
What they do: ITU-T has proposed a reference model for IoT that outlines the necessary
capabilities for network and transport layers. This helps guide the development of IoT services
and applications, ensuring they meet certain standards for efficiency and reliability.
IoT/M2M Systems, Layers, and Design Standardization
European Telecommunication Standards Institute (ETSI):
What it is: An independent, not-for-profit organization that develops globally applicable
standards for information and communication technologies.
What they do: ETSI has created standards specifically for the communication between
machines (M2M). They focus on the architecture needed for applications and service
capabilities, ensuring that devices and gateways can communicate effectively within IoT
ecosystems.
Open Geospatial Consortium (OGC):
What it is: An international consortium that develops open standards for geospatial and
location-based services.
What they do: OGC has established standards for discovering and managing sensors,
including their capabilities and quality. This is particularly useful in applications that rely on
geographic information, ensuring that data from various sensors can be integrated and
utilized effectively.
Importance of Standardization
Interoperability: Standards ensure that devices from different manufacturers
can work together, which is crucial in a diverse IoT ecosystem.
Security: Established protocols help create secure communication channels,
protecting data as it moves between devices and applications.
Efficiency: Standardization streamlines processes, reducing complexity and
improving the performance of IoT systems.
Scalability: With common standards, it's easier to add new devices and
applications to existing IoT networks without compatibility issues.

By following these standardization efforts, developers and organizations can create more
reliable, secure, and efficient IoT solutions that can be easily integrated and scaled in various
applications.
Overview of OSI Protocols and IETF Modifications for
IoT/M2M

• The Open Systems Interconnection (OSI) model is a framework for understanding


how different network protocols interact. Developed by the ISO and ITU-T, it
consists of seven layers, each serving a specific function in the communication
process.
The Seven Layers of the OSI Model:
1.Physical Layer: This is the lowest layer, dealing with the physical connection
between devices. It involves hardware elements like cables, switches, and wireless
signals.
2.Data-Link Layer: This layer ensures that data transferred between devices on the
same network is error-free and properly formatted. It manages how data packets are
framed and addressed.
3.Network Layer: Responsible for routing data from the source to the destination
across multiple networks. It determines the best path for data to travel.
Overview of OSI Protocols and IETF Modifications
for IoT/M2M
4.Transport Layer: This layer ensures that data is transferred reliably between
devices, managing error checking and flow control.

5.Session Layer: Manages sessions (persistent connections) between


applications, handling the opening, closing, and management of these
connections.

6.Presentation Layer: Prepares data for the application layer by translating


data formats, encryption, and compression.

7.Application Layer: This is the topmost layer where end-user applications


interact with the network, such as web browsers or email clients.
Overview of OSI Protocols and IETF Modifications for
IoT/M2M
Modifications Proposed by IETF for
IoT/M2M
The Internet Engineering Task Force (IETF) suggests adaptations to the OSI model to better fit the needs of
IoT and M2M communications. Here’s how these modifications work:
1.New Layer Structure:
• IETF proposes a six-layer model instead of the traditional seven layers to simplify the architecture for IoT
applications.
• Layer 1 (Physical cum Data-Link): This combines both physical and data-link functions, integrating them
into one layer.
• Layer 2 (Data-Adaptation): This layer includes a gateway that facilitates communication between IoT
devices and the internet, adapting the data formats as necessary.
2.Application Support:
• The Application Layer (Layer 6) includes new IoT applications and services.
• The Application Support Layer (Layer 5) may use protocols like CoAP (Constrained Application Protocol) for
communication between devices and servers. This layer focuses on managing, acquiring, organizing, and
analyzing data for applications.
3.Data Processing:
• Each layer processes incoming data, creating a new data stack that is passed to the next layer. This ensures that
data is formatted and managed properly as it moves from devices to applications.
Example: IoT Model for Streetlights
• To illustrate how this modified model works, consider the example of an IoT system for
streetlights:
Physical Layer: The streetlights have hardware that connects them to the network, such as
wireless transceivers.
Data-Adaptation Layer: A gateway facilitates communication between streetlights and the
internet, adapting data for transmission.
Application Layer: The streetlight control application interacts with the data from the
streetlights, adjusting settings based on real-time information (like turning lights on or off based
on ambient light).
ITU-T Reference Model
• The ITU-T Reference Model (RM1) outlines a structured approach to understanding IoT
(Internet of Things) and M2M (Machine-to-Machine) communications. It consists of four
layers, each with specific capabilities, and is compared to both the modified OSI model and
the CISCO IoT Reference Model (RM2).
• The Four Layers of ITU-T RM1
1.Layer 1 (Device Layer):
1. Description: This is the lowest layer, encompassing all devices and gateways involved in
the IoT system.
2. Capabilities: It includes device management, data collection, and communication
capabilities necessary for connecting to networks.
2.Layer 2 (Transport and Network Layer):
1. Description: This layer is responsible for data transmission and routing.
2. Capabilities: It handles the transport of data between devices and the internet, ensuring
that data is delivered reliably and efficiently.
ITU-T Reference Model
3.Layer 3 (Services and Application-Support Layer):
1. Description: This layer provides support for applications and services.
2. Capabilities: It includes two types of capabilities:
1.Generic Service Capabilities: Common functions that can be used by various
applications.
2.Specific Application-Support Capabilities: Tailored functions that support particular
applications or services.
4.Layer 4 (Applications and Services Layer):
3. Description: This is the top layer, where end-user applications interact with the IoT
system.
4. Capabilities: It encompasses all applications and services that utilize data from the lower
layers, such as analytics, monitoring, and control functions.
ITU-T Reference Model
ETSI M2M Domains and High-Level Capabilities
• The ETSI (European Telecommunications Standards Institute) has created a framework
to help machines communicate with each other, called M2M (Machine-to-Machine)
communication. This framework is divided into two main domains: the Network Domain
and the Device and Gateway Domain. Here’s a simple breakdown:
1. Network Domain
This area deals with how data travels over networks. It has several key functions:
• M2M Applications: Software that helps machines talk to each other, like apps for monitoring and control.
• Service Capabilities: Features that support these applications, making sure they work well.
• Management Functions: Tools for keeping track of all devices and ensuring they are functioning correctly.
• Network Management: Overseeing the network to make sure everything runs smoothly.
• CoRE Network: Different types of networks, like mobile or internet-based networks, that connect devices.
• Access Network: The networks (like Wi-Fi or Low Power Wide Area Networks) that allow devices to connect
and communicate.
ETSI M2M Domains and High-Level Capabilities
ETSI M2M Domains and High-Level Capabilities
2. Device and Gateway Domain
This area focuses on the actual devices and the gateways that connect them to the internet:
• Gateway: A device that links local networks (like those in a building) to the internet.
• M2M Area Network: Specific types of networks for devices to connect, like Bluetooth or ZigBee.
• M2M Devices: The machines or sensors that gather and send data.

Example: ATMs to Bank Servers


To make it clearer, think about how an ATM communicates with a bank server:
• Network Domain:
• M2M Applications: Software that helps the ATM monitor cash levels and handle transactions.
• Management Functions: Ensures all ATMs are working and connected properly.
• Device and Gateway Domain:
• Gateway: Connects the ATM to the bank's network, allowing secure communication.
• M2M Devices: The ATM itself, equipped to communicate with the bank.

ETSI’s framework helps organize how machines talk to each other by defining clear areas of function. This
structure is important for making sure different devices can work together smoothly and effectively.
Communication Technologies in IoT/M2M
In IoT (Internet of Things) and M2M (Machine-to-Machine) systems, devices communicate using either
wireless or wired technologies. This communication happens at the physical cum data-link layer, which
is crucial for connecting devices within a local area network (LAN) or personal area network (PAN).
Here’s a simple overview of the common communication technologies used:
1. Wireless Technologies
• These technologies enable devices to communicate without physical cables:
• Bluetooth (Low Energy): Ideal for short-range connections, commonly used in wearables and smart
home devices.
• ZigBee: A low-power protocol for creating mesh networks, useful for smart lighting and home
automation.
• NFC (Near Field Communication): Used for very short-range communication, like mobile payments
and access control.
• RF (Radio Frequency): General term for wireless communication that can cover various distances and
applications.
• LPWAN (Low Power Wide Area Network): Suitable for long-range communication with low power
consumption, often used in smart cities and agriculture.
• 6LoWPAN: A network protocol that allows IPv6 packets to be sent over low-power wireless networks.
Communication Technologies in IoT/M2M
Communication Technologies in IoT/M2M
2. Wired Technologies
• These technologies require physical connections between devices:
• I2C (Inter-Integrated Circuit): A communication protocol used for connecting low-speed devices like sensors
and microcontrollers on a circuit board.
• SPI (Serial Peripheral Interface): Another protocol used for short-distance communication between devices,
providing faster data rates than I2C.
• UART (Universal Asynchronous Receiver-Transmitter): A hardware communication protocol that allows
serial communication between devices.
• Example of Device Connectivity
In a local IoT network, you might have multiple devices (like sensors, actuators, and controllers) connected using
these technologies. For instance, devices could communicate tens of bytes of data back and forth using Bluetooth,
ZigBee, or RF technologies to send data to a central gateway, which then connects to the internet or another
network.
Summary
In summary, IoT and M2M systems utilize various wireless and wired communication technologies to connect
devices within local networks. These technologies are crucial for enabling devices to communicate effectively and
efficiently, supporting a wide range of applications in smart homes, cities, and industries.
Wireless Communication Technologies
• Wireless communication technologies are essential for enabling devices in IoT (Internet of Things) and M2M
(Machine-to-Machine) systems to connect and communicate without physical cables. Here’s a simplified overview of
some key wireless communication technologies:
1. Radio Frequency Identification (RFID)
• What It Is: RFID uses radio waves to automatically identify and track objects. An RFID system consists of tags
(small devices with data) attached to objects and readers that detect the tags.
• How It Works: The reader sends out a radio signal that activates the tag, which then transmits its stored information
back to the reader.
• Applications: Commonly used in inventory management, supply chain tracking, and access control (e.g., keycards).
2. Bluetooth
• What It Is: Bluetooth is a short-range wireless technology for connecting devices, typically within a range of up to
150 meters.
• Types:
• Bluetooth BR/EDR: Offers data rates up to 3 Mbps, suitable for devices like headphones and speakers.
• Bluetooth Low Energy (BLE): Designed for low-power applications, it operates at 1 Mbps and is commonly
used in fitness trackers and smart home devices.
• Features:
• Supports automatic device discovery and pairing.
• Can connect multiple devices simultaneously.
• Recent versions (like Bluetooth 5) enhance range and data capacity.
Wireless Communication Technologies
3. ZigBee
• What It Is: ZigBee is a low-power wireless protocol designed for short-range communication, ideal for applications requiring low
data rates and long battery life.
• How It Works: ZigBee devices form a mesh network, allowing data to be passed between devices even if they aren’t directly
connected.
• Applications: Often used in home automation, smart lighting, and industrial control systems.
4. Wi-Fi
• What It Is: Wi-Fi enables wireless local area networks (WLANs) using the IEEE 802.11 protocol.
• Range and Speed: Can connect devices over distances up to several hundred meters, offering high data transfer rates.
• Applications: Widely used in homes, businesses, and public spaces for connecting computers, smartphones, and IoT devices.
5. Near-Field Communication (NFC)
• What It Is: NFC is a short-range wireless technology (typically up to 20 cm) used for data exchange between devices.
• How It Works: Devices must be in close proximity to communicate, making it secure for transactions.
• Applications: Commonly used in mobile payments, access control, and ticketing systems.
6. RF Transceivers and Modules
• What They Are: RF transceivers are devices that can both transmit and receive radio signals. They are fundamental components in
many wireless communication systems.
• Applications: Used in various IoT applications, including home automation, security systems, and healthcare monitoring.
Wired Communication Technologies
Wired communication technologies are essential for reliable and high-speed data
transmission between devices. Here’s a breakdown of the key wired communication
technologies and protocols:
1. UART (Universal Asynchronous Receiver-Transmitter)
• What It Is: A hardware communication protocol used for serial data transmission.
• How It Works:
• Transmits data one byte at a time.
• Uses a start bit to signal the beginning of a byte and stop bits to indicate the end.
• Operates asynchronously, meaning there is no shared clock signal between sender and receiver.
• Applications: Commonly used in microcontrollers and embedded systems for debugging and data
exchange.
2. USART (Universal Synchronous/Asynchronous Receiver-Transmitter)
• What It Is: Similar to UART but can operate in both synchronous and asynchronous modes.
• Features:
• Synchronous mode uses a clock signal for precise timing, ensuring all bytes are transmitted with equal
time intervals.
• Asynchronous mode allows for variable time intervals between bytes, which is less strict but simpler.
Wired Communication Technologies
3. SPI (Serial Peripheral Interface)
• What It Is: A synchronous serial communication protocol used for short-distance communication, primarily in
embedded systems.
• How It Works:
• Consists of a master device that controls the communication with one or more slave devices.
• Uses four signals:
• SCLK (Serial Clock): Provided by the master.
• MOSI (Master Out Slave In): Data line for sending data to the slave.
• MISO (Master In Slave Out): Data line for receiving data from the slave.
• SS (Slave Select): Indicates which slave device is being communicated with.
• Applications: Frequently used for connecting sensors, memory devices, and displays.

4. I2C (Inter-Integrated Circuit)


• What It Is: A multi-master serial communication protocol used to connect multiple integrated circuits.
• How It Works:
• Uses two wires: one for the clock (SCL) and one for data (SDA).
• Supports multiple master and slave devices on the same bus, enabling efficient communication.
• Modes of Operation:
• Master transmit, master receive, slave transmit, and slave receive.
• Applications: Commonly used in sensors, EEPROMs, and other peripheral devices in embedded systems.
Wired Communication Technologies
5. USB (Universal Serial Bus)
• What It Is: A standard for connecting peripherals to a computer, allowing for data transfer and power supply.
• Versions:
• USB 1.1: Up to 12 Mbps.
• USB 2.0: Up to 480 Mbps.
• USB 3.0 and 3.1: Up to 5 Gbps and 10 Gbps, respectively.
• Features:
• Supports up to 127 devices connected to a single host.
• Uses a polling mechanism for data transfer, where the host regularly checks connected devices.
• Offers different types of data transfer: control, bulk, interrupt, and isochronous.
• Applications: Widely used for keyboards, mice, storage devices, and other peripherals.

6. Ethernet
• What It Is: A networking technology used for local area networks (LANs).
• Standards: Based on IEEE 802.2 and includes various speeds (10 Mbps, 100 Mbps, 1 Gbps, and up to 10 Gbps).
• How It Works:
• Uses MAC (Media Access Control) addressing for identifying devices on the network.
• Frames data into packets that include addresses and error-checking information.
• Utilizes CSMA/CD (Carrier Sense Multiple Access with Collision Detection) for managing data collisions in half-
duplex systems.
• Applications: Commonly used in home and office networking, connecting computers, printers, and other devices.
Data Enrichment, Data Consolidation, and Device
Management at the Gateway
Overview of Gateway Functions
• A gateway at the data adaptation layer plays a crucial role in the Internet of Things
(IoT) and Machine-to-Machine (M2M) communication by performing several
functions, including:
• Data Privacy
• Data Security
• Data Enrichment
• Data Consolidation
• Data Transformation
• Device Management
These functions are integral to the effective communication and operation of IoT
devices, ensuring data integrity, usability, and secure interactions between devices and
networks.
Data Enrichment, Data Consolidation, and Device
Management at the Gateway
Data Management and Consolidation Gateway
The gateway's data management and consolidation functions encompass several key processes:
1. Transcoding
• Transcoding involves the adaptation and conversion of data formats, protocols, or codes to ensure compatibility
between devices and servers. This is critical for maintaining effective communication across diverse systems. For
example:
• Character Encoding: Data sent from a device may use ASCII, while the server may require Unicode.
• Database Formats: A device might use an XML database, whereas a server could utilize Oracle or DB2.
• Transcoding may also include filtering and compression, optimizing the data flow and ensuring that information is
transmitted in the most efficient manner.
2. Privacy
• Data privacy is paramount, especially when handling sensitive information like medical records or business
transactions. Key components of a privacy model include:
• Identity Management: Ensuring that devices and applications maintain distinct identities.
• Authentication and Authorization: Verifying users and granting appropriate access levels to data.
• Trust and Reputation: Establishing confidence in data sources to prevent misuse.
Encryption is a critical aspect of maintaining privacy during data transfer, ensuring that only authorized entities can
access the data.
Data Enrichment, Data Consolidation, and Device
Management at the Gateway
3. Data Gathering and Enrichment
• Data gathering from devices can occur in several ways:
• Polling: Actively requesting data from a device.
• Event-Based Gathering: Triggering data requests based on specific events (e.g., proximity detection).
• Scheduled Interval: Collecting data at predetermined times (e.g., monitoring environmental
conditions).
• Continuous Monitoring: Ongoing collection of data for real-time analysis.

Data enrichment adds value to the raw data through processes like aggregation, compaction, and
fusion:
• Aggregation: Combining current and past data while eliminating redundancy.
• Compaction: Condensing information without losing meaning, such as sending only incremental
changes.
• Fusion: Integrating data from various sources into a cohesive format for analysis.
Data Enrichment, Data Consolidation, and
Device Management at the Gateway
Energy Efficiency in Data Dissemination
• In environments like Wireless Personal Area Networks (WPANs) and Wireless Sensor
Networks (WSNs), energy consumption is a critical consideration due to limited battery
life. Strategies for energy-efficient data dissemination include:
• Reducing Data Rates: Lowering the frequency of data transmission can conserve energy.
• Optimizing Gathering Intervals: Longer intervals reduce the need for constant
communication.
• Employing Data Processing Techniques: Utilizing aggregation, compaction, and fusion
minimizes the amount of data transmitted, thus reducing energy usage.
Data Enrichment, Data Consolidation, and
Device Management at the Gateway
Device Management Gateway
• Device Management (DM) encompasses the provisioning and management of device identities,
activation, configuration, and maintenance. Key functions include:
• Device Provisioning: Assigning unique identifiers to devices.
• Configuration Management: Adjusting device parameters and settings.
• Subscription Management: Handling requests for device services.
Device management protocols, such as the Open Mobile Alliance Device Management (OMA-DM),
facilitate these functions by allowing DM servers to interact with devices through a gateway, providing
a seamless management interface.
Conclusion
• The gateway serves as a crucial intermediary in the IoT architecture, ensuring that devices
can communicate effectively while maintaining data integrity and security. By managing
data enrichment, consolidation, and device management, gateways enable a robust
framework for IoT applications, facilitating efficient data exchange and operational
management across diverse environments.
Ease of Designing and Affordability in IoT Device
Development
• When designing connected devices for IoT applications, ease of design and affordability
are crucial considerations. These factors influence not only the development process but
also the scalability and adoption of IoT solutions. A successful design approach balances
technical complexity with cost-effectiveness, enabling widespread deployment of smart
devices.
Key Factors in Design
1. Availability of Development Tools
• Software Development Kits (SDKs): The presence of comprehensive SDKs simplifies the development process, providing pre-built
libraries and tools for rapid application development.
• Prototype Development Boards: Affordable boards with integrated smart sensors, actuators, and controllers facilitate
experimentation and quick iteration. Examples include Arduino and Raspberry Pi, which offer extensive community support and
resources.
2. Open Source Components
• Hardware and Software: Utilizing open-source hardware and software components allows developers to access and modify existing
solutions without incurring significant costs. This fosters innovation and reduces the learning curve.
• Standard Protocols: Implementing widely accepted communication protocols (like MQTT, CoAP, or ZigBee) ensures compatibility
and ease of integration across devices.
Ease of Designing and Affordability in IoT Device
Development
3. Minimal Component Design
• Component Efficiency: Devices should be designed with a minimal number of components to reduce
complexity and cost. For instance, combining multiple functions into a single chip can lower
manufacturing costs and simplify the design process.
• Ready-Made Solutions: Using off-the-shelf components and modules accelerates development and
minimizes the need for custom solutions.
4. Ease of Use in Consumer Devices
• User-Friendly Interfaces: Devices should be intuitive and easy to use, minimizing the need for complex
manuals or technical knowledge. For example, RFID cards with embedded microcontrollers and simple
activation processes enhance user experience.
• Smart Home Integration: Technologies like ZigBee or Bluetooth Low Energy (BLE) are favored for
smart home and city applications due to their low cost and ease of integration.
Ease of Designing and Affordability in IoT Device
Development
Addressing Design Complexity
• While striving for simplicity, certain designs can introduce complexity:
• Complex Functionalities: For example, an umbrella designed to send SMS notifications requires
programming and user instructions, which can complicate the user experience.
• Data Security: Ensuring secure data transfer through encryption adds layers of complexity but is essential
for maintaining trust and privacy in IoT applications.
Conclusion
• The ease of designing connected devices for IoT applications hinges on the availability of affordable tools,
open-source solutions, and streamlined designs that prioritize user experience. While some complexities
are unavoidable, especially regarding functionality and security, the overall aim should be to simplify the
development process and reduce costs, enabling broader access and adoption of IoT technologies. By
focusing on these principles, developers can create effective and efficient connected devices that meet the
demands of modern applications.

You might also like