You are on page 1of 17

DEPARTMENT OF ECE/M.

TECH (DCN)
SUBJECT: INTERNET OF THINGS (20ECS333) SEM: M.TECH III

MODULE-1

CONTENTS:

 What is IoT?
 Genesis, Digitization, Impact.
 Connected Roadways, Buildings, Challenges.
 IoT Network Architecture and Design.
 Drivers Behind new network architectures.
 Comparing IoT Architectures.
 M2M Architecture.
 IoT World Forum Standard.
 IoT Reference Model.
 Simplified IoT Architecture.
1. Define IoT system. Explain the different applications of IoT.

IoT is essentially a platform where embedded devices are connected to the internet, so they can

collect and exchange data with each other. It enables devices to interact, collaborate and, learn

from each other’s experiences just like humans do.

 The basic premise and goal of IoT is to “connect the unconnected.” This means that objects that

are not currently joined to a computer network, namely the Internet, will be connected so that

they can communicate and interact with people and other objects.

 IoT is a technology transition in which devices will allow us to sense and control the physical

world by making objects smarter and connecting them through an intelligent network.

Applications:

Wearables:

Wearable technology is a hallmark of IoT applications and probably is one of the earliest industries to
have deployed the IoT at its service. We happen to see Fit Bits, heart rate monitors and smart watches
everywhere these days.

One of the lesser-known Wearables includes the Guardian glucose monitoring device. The device is
developed to aid people suffering from diabetes. It detects glucose levels in the body, using a tiny
electrode called glucose sensor placed under the skin and relays the information via Radio Frequency to a
monitoring device.
Smart Home Applications: The IoT based system for home automation can easily and
efficiently control appliances over the Internet and support home safety with autonomous
operation.

Smart Cities: The IoT offers new opportunities for cities to use data to manage traffic,
cut pollution, make better use of infrastructure and keep citizens safe.

Agriculture (Smart Farming): In IoT based smart farming, a system is built for
monitoring the crop field with the help of sensors (Temperature, Soil Moisture,
Humidity, Light etc.) and automating the irrigation system.
2. Genesis of IoT: This section highlights IoT’s place in the evolution and development of the

Internet.

 The age of IoT is often said to have started between the years 2008 and 2009. During this time

period, the number of devices connected to the Internet eclipsed the world’s population. With

more “things” connected to the Internet than people in the world, a new age was upon us, and the

Internet of Things was born.

 The person credited with the creation of the term “Internet of Things” is Kevin Ashton. While

working for Procter & Gamble in 1999, Kevin used this phrase to explain a new idea related to

linking the company’s supply chain to the Internet.

 Kevin has subsequently explained that IoT now involves the addition of senses to computers. He

was quoted as saying: “In the twentieth century, computers were brains without senses—they

only knew what we told them.”

 Figure 1 shows the evolution of the Internet can be categorized into four phases. Each of these

phases has had a profound impact on our society and our lives.
 The first phase, Connectivity, began in the mid-1990s. Though it may be hard to remember, or

even imagine if you are younger, the world was not always connected as it is today.

 The second phase of the Internet evolution, called the Networked Economy. With the Networked

Economy, e-commerce and digitally connected supply chains became the rage, and this caused

one of the major disruptions of the past 100 years.

 The third phase, Immersive Experiences, is characterized by the emergence of social media,

collaboration, and widespread mobility on a variety of devices. Connectivity is now pervasive,

using multiple platforms from mobile phones to tablets to laptops and desktop computers.

 The latest phase is the Internet of Things. Despite all the talk and media coverage of IoT, in many

ways we are just at the beginning of this phase. Machines and objects in this phase connect with

other machines and objects, along with humans. Business and society have already started down

this path and are experiencing huge increases in data and knowledge.
3. With a neat diagram explain the layered architectural view of IoT .

An IoT has multiple levels. These levels are also known as tiers. A model enables

conceptualization of a frame work. A reference model can be used to depict building

blocks, successive interactions and integration. An example is CISCO’s presentation of a

reference model comprising seven levels.

The architecture serves as a reference in applications of IoT in services and business


processes. A set of sensors which are smart, capture the data, perform necessary data
element analysis. A set of sensor circuit is connected to a gateway processing separate
data capturing. The communication management subsystem consists of protocol handlers,
message routers, and message cache.

4. Briefly explain a) Technology behind IoT & b) Basic components of IoT.

The following entities provide a diverse technology-environment which are involved in

IoT.

 Hardware (Arduino Raspberry Pi, Intel Galileo, Intel Edison, ARM mBed, Bosch
XDK110, Beagle Bone Black and Wireless SoC)
 Integrated Development Environment (IDE) for developing device software, firmware
and APIs
 Protocols [RPL, CoAP, RESTful HTTP, MQTT, XMPP (Extensible Messaging and
Presence Protocol)]
 Communication (Powerline Ethernet, RFID, NFC, 6LowPAN, UWB, ZigBee, Bluetooth,
WiFi, WiMax, 2G/3G/4G)
 Network backbone (IPv4, IPv6, UDP and 6LowPAN)
 Software (RIOT OS, Contiki OS, Thingsquare Mist firmware, Eclipse IoT)
 Internetwork Cloud Platforms/Data Centre (Sense, ThingWorx, Nimbits, Xively,
openHAB, AWS IoT, IBM BlueMix, CISCO IoT, IOx and Fog, EvryThng, Azure, TCS
CUP)
 Machine learning algorithms and software. An example of machine-learning software is
GROK from Numenta Inc. that uses machine intelligence to analyse the streaming data
from clouds and uncover anomalies, has the ability to learn continuously from data and
ability to drive action from the output of GROK’s data models and perform high level of
automation for analysing streaming data.

Major components of IoT devices are.

 Physical Object: With embedded software into a hardware.

 Hardware: Consisting of a microcontroller, sensors, control unit, actuators and


communication module.

 Communication Module: Software consisting of devices and device interface for


communication over the network and ports.

 Software: For actions on messages, information and commands which the


devices receive and then output to the actuators.

5. SOURCES OF IoT
Examples of hardware sources for IoT prototype development are Arduino Yún,
Microduino, Beagle Board and RasWIK. Hardware prototype needs an IDE for developing
device
Software, firmware and APIs.
Popular IoT Development Boards
Arduino Yún
Arduino Yún board uses microcontroller ATmega32u4 that supports Arduino and includes Wi-
Fi, Ethernet, USB port, micro-SD card slot and three reset buttons. The board also combines with
Atheros AR9331 that runs Linux. Categorise the resources which enable the development of IoT
prototype and product 20 Internet of Things: Architecture and Design Principles
Microduino
Microduino is a small board compatible with Arduino that can be stacked with the other boards.
All the hardware designs are open source.
Intel Galileo
Intel Galileo is a line of Arduino-certified development boards. Galileo is based on Intelx86
architecture. It is open-source hardware that features the Intel SOC X1000 Quark based Soc.
Galileo is pin-compatible with Arduino. It has 20 digital I/O (12 GPIOs fully native), 12-bit
PWM for more precise control, six analog inputs and supports power over Ethernet (PoE).
Intel Edison
Intel Edison19 is a compute module. It enables creation of prototypes and fast development of
prototyping projects and rapidly produces IoT and wearable computing devices. It enables
seamless device internetworking and device-to-cloud communication. It includes foundational
tools. The tools collect, store and process data in the cloud, and process rules on the data stream.
It generates triggers and alerts based on advanced analytics.

Beagle Board
Beagle Bone based board has very low power requirement. It is a card-like computer which can
run Android and Linux. Both the hardware designs and the software for the IoT devices are open
source.
Raspberry Pi Wireless Inventors Kit (RasWIK)
RasWIK enables Raspberry Pi Wi-Fi connected devices. It includes documentation for 29
different projects or you can come up with one of your own. There is a fee for the devices but all
of the included code is open source, and you can use it to build commercial products as well.

6. With a neat diagram explain M2M architecture.


Machine-to-Machine refers to the process of communication of a physical object or device at
machine with others of the same type. Each machine in an M2M system embeds a smart device.
The device senses the data or status of the machine and performs the computation and
communication functions. A device communication via wired or wireless systems.

M2M architecture consists of three domains.

 M2M device domain: It consist of three entities physical devices, communication interface and
gateway.

 M2M network domain: It consist of M2M server, device identity management, and data
analytics and data device management.

 M2M application domain: It consists of applications for services, monitoring, analysis and
controlling of device networks.
7. EXAMPLES OF IOT:
Examples of IoT usages are wearable devices such as watches, fitness trackers, sleep
monitors and heart monitors etc. Fitbit (for example, Fitbit Alta fitness tracker), Garmin
and other companies manufacture many such devices. Microsoft (Microsoft band might
soon be discontinued), Xiaomi and other manufacturers make tracking bands. A fitness
tracker
Wearable band has the following functions:
● Track steps, distance, calories burned and active minutes
● See stats and time with a bright OLED tap display
● automatically track how long and how well you sleep and set a silent, vibrating alarm
● Personalize with interchangeable metal, leather and classic bands
● Get calls, texts and calendar notifications at a glance when the phone is in a defined
range.
Clothing and accessories nowadays incorporate computer and advanced electronic
Technologies. The design of watches, rings and bands often includes practical functions
and features.
 Wearable Smart Watch: Samsung Galaxy, Apple and many more-Ability to make a
phone call, Wi-Fi and Bluetooth, GPS enabled, track walks, measure heart rate, make
payment using payment wallet, enable chat with family, navigate for long car trips, and
control Apple TV.
 Smart Home: Sensors and actuators manage a smart home with an Internet Connection.
 Home Security: Access control and security alerts.
 Lighting control.
 Home healthcare.
 Fire detection and leak detection.
 Energy efficiency.
 Solar panel monitoring and control.
 Temperature monitoring.
 Refrigerator network.
 Automated meter reading.

SMART CITIES:
 IoT concepts extends to Internet of Everything (IoE) for developing smart cities. A four
layer architectural frame work developed at CISCO for a city.
 Layer1: Consists of sensors, sensor networks and devices network in parking spaces,
hospitals, streets, vehicles, banks, water supply, roads, bridges and railroads.
 Layer2: capture data at distributed computing points, where data is processed, stored and
analysed.
 Layer3: It is meant for central collection services, connected data centres, cloud and
enterprise servers for data analytics applications.
 Layer4: It consists of new innovative applications such as waste containers monitoring,
power loss monitoring, bike sharing management, smart parking.

8. MODIFIED OSI MODEL FOR THE IOT/M2M SYSTEM:


 The modified OSI layered model is as shown in figure. Data communicates from device
end to application end.
 Each layer processes the received data and creates a new data stack which transfers it to
the next layer.
 The processing takes place at the in-between layers, i.e. between the bottom functional-
layer to the top layer.
 Device end also receives data from an application/service after processing at the in-
between layers.
 New applications and services are present at the application layer 6. A modification to
this is that the application-support layer 5 uses protocols, such as CoAP.
 IoT applications and services commonly use them for network communication. The
CoAP protocol at the layer is used for the request/response interactions between the client
and server at the network.

9. Data Enrichment:
 Data enrichment is a general term that refers to processes used to enhance, refine
or otherwise improve raw data.
 This idea and other similar concepts contribute to making data a valuable asset for
almost any modern business or enterprise.

10. ITU-T REFERNCE MODEL:


 This model corresponds to the modified layers of the OSI model.
 Layer 1: Device Layer-Device and gateway capabilities.
 Layer 2: Transport and network capabilities.
 Layer 3: Services and application support layer.
 Layer 4: It is for applications and services.
11. DATA CONSOLIDATION & DEVICE MANAGEMENT:

 A gateway at the data adaptation layer has several functions.


 These are data privacy, data security, data enrichment, data consolidation, transformation
and device management.
 Data management and consolidation gateway includes the following functions:
 Transcoding, privacy, security, Integration, compaction and fusion.
 Transcoding: It means conversion and change of protocol, format or code using
software.
 IoT device requests and adapted, converted and changed into required formats acceptable
at the server by the transcoding software.
 Ex. Conversion from ASCII to Unicode at the server.
 Privacy: the data such as medical records, logistics, and inventories of a company may
need privacy and protection.
 The following are the components of the privacy model.
 Devices and applications identity management.
 Authentication.
 Authorization
 Trust.
 Reputation.
 Secure data access: access to data needs to be secured. The design needs to ensure the
authentication of a request from a service or application.
 Gathering: data gathering is to acquire the data from devices or device networks.
 Four modes of acquisition are polling, event based, scheduled interval, continuous
monitoring.

12. Web Communication protocols:


 A communication gateway enables the web connectivity. The key terms used in
communication are.
 Application or APP.
 Application program interface.
 Web services.
 Object.
 Object model.
 Class.
 Client.
 Server.

 REST-representation state transfer: It is an architectural style for developing web


services.
 CoAP-Constrained application protocol: It is a specialized web transfer protocol for
used with constrained nodes and networks.

13. Message Communication Protocols:


CoAP-SMS:
 An Universal resource identifier used to send specified telephone number.
 CoAP msg consists of 160 characters in 7-bits/8bits.
 CoAP works with subscriber identity module for SMS in cellular networks.
 Does not support multi casting.
CoAP-MQ: It is message queue protocol.

 CoAP provides resource-subscription, from publishers.

 The device objects communicate using the CoAP client and server protocol.

MQTT (Message Queuing Telemetry Transport):

 It is a light weight messaging protocol that was developed by IBM.

 Constrained environment protocol.

 Header of fixed length header and two bytes only.

 MQTT TCP/IP connectivity.

 XMPP (Extensible messaging and presence protocol:

 A set of open technologies for instant messaging, presence, multiparty chat, voice and
video call.

****************

You might also like