You are on page 1of 152

INTERNET OF THINGS

UNIT 1
INTRODUCTION
■ Internet Of Things is fully networked and connected
devices sending analytics data back to cloud or data
center.
■ The definition of Internet of things :
■ The network in which every object or thing is provided
unique identifier and data is transferred through a
network without any verbal communication.
INTRODUCTION
■ The Internet of Things (IoT) is a system of interrelated computing devices,
mechanical and digital machines, objects, animals or people that are provided with
unique identifiers and the ability to transfer data over a network without requiring
human-to- human or human-to-computer interaction
■ The Internet of Things is actually a pretty simple concept. It means taking all
the physical places and things in the world and connecting them to the
internet
■ To be smart, a thing doesn’t need to have super storage or a supercomputer inside
of it.
■ All a thing has to do is connect to super storage or to a super computer.
■ In the Internet of Things, all the things that are being connected to the internet can
be put into three categories:
– Things that collect information and then send it
– Things that receive information and then act on it
– Things that do both
INTRODUCTION
■ The term Internet of Things was first coined by Kevin Ashton in 1999 in the context
of supply chain management.

■ Although the definition of ‘Things‘ has changed as technology evolved, the main
goal of making computer sense information without the aid of human intervention
remains the same.

■ IoT technologies allow things, or devices that are not computers, to act smartly
and make collaborative decisions that are beneficial to certain applications.

■ They allow things to hear, see, think or act by allowing them to communicate and
coordinate with others in order to make decisions that can be as critical as saving
lives or buildings
INTRODUCTION
■ In today’s emerging world of Internet, each and every thing is
supposed to be in connected mode with the help of billions of smart
devices.

■ By connecting all the devices used in our day to day life, make our
life trouble less.

■ We are incorporated in a world where we are used to have smart


phones, smart cars, smart gadgets, smart homes and smart cities.

■ As the future internet will grow, it collaborates a huge number of


objects which use standard protocols and architecture to provide
services to end user.
INTRODUCTION

■ It is envisioned to provide new interactions between physical


world and Information and Communication Technology domain.

■ This resulting networking paradigm is called Internet of Things.

■ IoT provides unprecedented opportunities to users, manufacturers


and service providers in a wide variety of sectors which are
mentioned below.
INTRODUCTION

■ Scope of IoT is not just limited to just connecting things to the internet, but it
allows these things to communicate and exchange data, process them as well
as control them while executing applications.
■ A dynamic global network infrastructure with self- configuring capabilities based
on standard and interoperable communication protocols, where physical and
virtual “things” have identities, physical attributes, and use intelligent interfaces,
and are seamlessly integrated into information network that communicate data
with users and environments.
Characteristics of IoT

■ Dynamic Global network & Self-Adapting : Adapt the changes


changing contexts
■ Self Configuring : Eg. Fetching latest s/w updates without
manual intervention.
■ Interoperable Communication Protocols :
Communicate through various protocols
■ Unique Identity : Such as Unique IP Address or a URI
■ Integrated into Information Network : This allows to communicate
and exchange data with other devices to perform certain analysis.
PROPERTIES OF
AUTONOMIC IOT SYSTEMS
■ Self-adaptation
■ In the very dynamic context of the IoT, from the physical to the application
layer, self-adaptation is an essential property that allows the communicating
nodes, as well as services using them, to react in a timely manner to the
continuously changing context in accordance with, for instance, business
policies or performance objectives that are defined by humans.
■ IoT systems should be able to reason autonomously and give self-adapting
decisions. Cognitive radios at physical and link layers, self-organising
network protocols, automatic service discovery and (re-)bindings at the
application layer are important enablers for the self-adapting IoT.
■ Self-organization
■ In IoT systems — and especially in WS&ANs — it is very common to have nodes
that join and leave the network spontaneously.
■ The network should therefore be able to re-organize itself against this
evolving topology. Self organizing, energy efficient routing protocols have a
considerable importance in the IoT applications in order to provide seamless
data exchange throughout the highly heterogeneous networks.
■ Due to the large number of nodes, it is preferable to consider solutions
without a central control point like for instance clustering approaches.
■ When working on self-organization, it is also very crucial to consider the energy
consumption of nodes and to come up with solutions that maximize the IoT
system lifespan and the communication efficiency within that system.
■ Self-optimisation
■ Optimal usage of the constrained resources (such as memory,
bandwidth, processor, and most importantly, power) of IoT devices is
necessary for sustainable and long-living IoT deployments.
■ Given some high-level optimization goals in terms of performance, energy
consumption or quality of service, the system itself should perform
necessary actions to attain its objectives.
■ Self-configuration
■ IoT systems are potentially made of thousands of nodes and devices such as
sensors and actuators. Configuration of the system is therefore very complex
and difficult to handle by hand.
■ The IoT system should provide remote configuration facilities so that self-
management applications automatically configure necessary parameters based
on the needs of the applications and users.
■ It consists of configuring for instance device and network parameters,
installing/uninstalling/upgrading software, or tuning performance
parameters.
■ Self-protection
■ Due to its wireless and ubiquitous nature, IoT will be vulnerable to
numerous malicious attacks.
■ As IoT is closely related to the physical world, the attacks will for instance aim
at controlling the physical environments or obtaining private data.
■ The IoT should autonomously tune itself to different levels of security and
privacy, while not affecting the quality of service and quality of experience.
■ Self-healing
■ The objective of this property is to detect and diagnose problems as they
occur and to immediately attempt to fix them in an autonomous way.
■ IoT systems should monitor continuously the state of its different nodes and
detect whenever they behave differently than expected.
■ It can then perform actions to fix the problems encountered. Encounters
could include re-configuration parameters or installing a software update.
■ Self-description
■ Things and resources (sensors and actuators) should be able to describe
their characteristics and capabilities in an expressive manner in order to
allow other communicating objects to interact with them.
■ Adequate device and service description formats and languages should
be defined, possibly at the semantic level.
■ The existing languages should be re-adapted in order to find a trade-off
between the expressiveness, the conformity and the size of the descriptions.
■ Self-description is a fundamental property for implementing plug and
play resources and devices.
■ Self-discovery
■ Together with the self-description, the self-discovery feature plays an essential
role for successful IoT deployments. IoT devices/services should be
dynamically discovered and used by the others in a seamless and
transparent way.
■ Only powerful and expressive device and service discovery protocols
(together with description protocols) would allow an IoT system to be fully
dynamic (topology-wise).
■ Self-matchmaking
■ To fully unlock the IoT potential, virtual objects will have to:
• Be reusable outside the context for which they were originally deployed
and
• Be reliable in the service they provide.
■ On the one hand, IoT services will be able to exploit enriched availability of
underlying objects. They will also have to cope with their unreliable nature and
be able to find suitable “equivalent object” alternatives in case of failure,
unreachability etc.
■ Such envisaged dynamic service-enhancement environments will require
self- matchmaking features (between services and objects and vice versa)
that will prevent users of IoT future services from having to (re-)configure
objects themselves.
■ Self-energy-supplying
■ And finally, self-energy-supplying is a tremendously important (and very
IoT specific) feature to realize and deploy sustainable IoT solutions.
■ Energy harvesting techniques (solar, thermal, vibration, etc.) should be
preferred as a main power supply, rather than batteries that need to be
replaced regularly, and that have a negative effect on the environment.
INTRODUCTION

■ Refers to IoT devices which have unique identities that can perform
sensing, actuating and monitoring capabilities.

■ IoT devices can exchange data with other connected devices or collect
data from other devices and process the data either locally or send the
data to centralized servers or cloud – based application back-ends for
processing the data.
IoT: Past, Present & Future
● Past
● The common examples of early internet of things
devices can be mobiles, desktops, and laptops.
● The internet of things has slowly been making inroads
into many everyday regular devices since.
● Devices like a fridge, soda vending machines, and
many other daily use devices were regularly being
encompassed by the internet of things.
IoT: Past, Present & Future
● Present
● These devices have created new market segments and
businesses that have forayed early into these new
segments have reaped significant financial gains.
● Many businesses are looking at the untapped markets
to leverage the internet of things and be the industry
leaders in those segments.
IoT: Past, Present & Future
● Future
● By 2025, it is estimated that there will be more than
21 billion IoT devices.
● The internet of things will help companies in providing
better services to their customers, increasing sales and
helping in the overall growth of the company.
● The internet of things will eventually transform into the
internet of everything as eventually, every ‘thing’
imaginable will be connected to the internet.
● In the post-digital age, it is already becoming
apparent that data will drive the digital journey and
IoT telemetry data will be a significant enabler.
IOT Domains
■ Following are some of the major domains of IoT:
○ Wearables
○ Smart Home Applications
○ Health Care
○ Smart Cities
○ Agriculture
○ Industrial Automation
○ Logistics
IOT Domains
■ Wearables:
■ Wearables adoption is growing at a faster pace.
■ We have several wearable products such as fitness tracking brands, GPS
tracking belts, smart clothing etc.
■ These devices are continuously evolving to offer more compact and energy
efficient offerings with time.
■ For an instance, Health and fitness-oriented wearables offer biometric
measurements such as heart rate, perspiration levels, and oxygen levels in
the bloodstream.
■ According to Forbes, it is estimated that 411 million wearables will be sold in
2020.
■ This consumer-oriented side of the IoT technology will certainly impart an
exceptional value to our lives.
IOT Domains
■ Smart Home Applications
■ Smart Home is the advanced IoT driven facility ruling across the globe. IoT
powers the smart home by adding new features and capabilities to smart
devices.
■ Consumers are fascinated by seeing the potential of the smart home for their
convenience, safety and time saving.
■ According to a Statista report, the global smart home market is predicted to
reach 53 billion U.S. dollars by 2022.
■ The boundaries between industry leaders are blurring as the investment in
smart home technology is growing.
■ The increased need for connected assets, security systems, room control,
energy management, and light control have led to the widespread adoption of
Smart Homes and IoT technologies.
IOT Domains
■ Health Care
■ IoT applications can turn reactive medical-based systems into proactive
wellness-based systems.
■ The resources that current medical research uses, lack critical real-world
information.
■ It mostly uses leftover data, controlled environments, and volunteers for
medical examination. IoT opens ways to a sea of valuable data through
analysis, real-time field data, and testing.
■ The Internet of Things also improves the current devices in power, precision,
and availability. IoT focuses on creating systems rather than just equipment.
IOT APPLICATION DOMAIN
SMART CITY
■ Smart Parking: Monitoring of parking spaces availability in the city.
■ Structural health: Monitoring of vibrations and material conditions in
buildings, bridges and historical monuments.
■ Noise Urban Maps: Sound monitoring in bar areas and centric zones in real
time.
■ Traffic Congestion: Monitoring of vehicles and pedestrian levels to
optimize driving and walking routes.
■ Smart Lightning: Intelligent and weather adaptive lighting in street lights.
■ Waste Management: Detection of rubbish levels in containers to optimize
the trash collection routes.
■ Intelligent Transportation Systems: Smart Roads and Intelligent
Highways with warning messages and diversions according to climate
conditions and unexpected events like accidents or traffic jams.
ENVIRONMENT

■ Forest Fire Detection: Monitoring of combustion gases and preemptive


fire conditions to define alert zones.
■ Air Pollution: Control of CO2 emissions of factories, pollution emitted by cars
and toxic gases generated in farms.
■ Landslide and Avalanche Prevention: Monitoring of soil moisture,
vibrations and earth density to detect dangerous patterns in land conditions.
■ Earthquake Early Detection: Distributed control in specific places of tremors.
WATER

■ Water Quality: Study of water suitability in rivers and the sea for fauna
and eligibility for drinkable use.
■ Water Leakages: Detection of liquid presence outside tanks and
pressure variations along pipes.
■ River Floods: Monitoring of water level variations in rivers, dams and
reservoirs.
ENERGY SMART GRID, SMART
METERING
■ Smart Grid: Energy consumption monitoring and management.
■ Tank level: Monitoring of water, oil and gas levels in storage tanks and
cisterns.
■ Photovoltaic Installations: Monitoring and optimization of performance in
solar energy plants.
■ Water Flow: Measurement of water pressure in water transportation systems.
■ Stock Calculation: Measurement of emptiness level and weight of the goods.
SECURITY & EMERGENCIES
■ Perimeter Access Control: Access control to restricted areas and detection
of people in non-authorized areas.
■ Liquid Presence: Liquid detection in data centres, warehouses and
sensitive building grounds to prevent break downs and corrosion.
■ Radiation Levels: Distributed measurement of radiation levels in nuclear
power stations surroundings to generate leakage alerts.
■ Explosive and Hazardous Gases: Detection of gas levels and leakages
in industrial environments, surroundings of chemical factories and inside
mines.
RETAIL

■ SUPPLY CHAIN CONTROL: MONITORING OF STORAGE CONDITIONS ALONG THE


SUPPLY CHAIN AND PRODUCT TRACKING FOR TRACEABILITY PURPOSES.
■ NFC PAYMENT: PAYMENT PROCESSING BASED IN LOCATION OR ACTIVITY DURATION
FOR PUBLIC TRANSPORT, GYMS, THEME PARKS, ETC.
■ INTELLIGENT SHOPPINGAPPLICATIONS: GETTING ADVICE AT THE POINT OF SALE
ACCORDING TO CUSTOMER HABITS, PREFERENCES, PRESENCE OF ALLERGIC COMPONENTS
FOR THEM OR EXPIRING DATES.
■ SMART PRODUCT MANAGEMENT: CONTROL OF ROTATION OF PRODUCTS IN
SHELVES AND WAREHOUSES TO AUTOMATE RESTOCKING PROCESSES.
LOGISTICS
■ Quality of Shipment Conditions: Monitoring of vibrations, strokes,
container openings or cold chain maintenance for insurance purposes.
■ Item Location: Search of individual items in big surfaces like warehouses
or harbors.
■ Storage Incompatibility Detection: Warning emission on containers
storing inflammable goods closed to others containing explosive material.
■ Fleet Tracking: Control of routes followed for delicate goods like medical
drugs, jewels or dangerous merchandises
INDUSTRIAL CONTROL
■ M2M Applications: Machine auto-diagnosis and assets control.
■ Indoor Air Quality: Monitoring of toxic gas and oxygen levels inside
chemical plants to ensure workers and goods safety.
■ Temperature Monitoring: Control of temperature inside industrial and
medical fridges with sensitive merchandise.
■ Ozone Presence: Monitoring of ozone levels during the drying meat process
in food factories.
■ Indoor Location: Asset indoor location by using active (ZigBee, UWB)
and passive tags (RFID/NFC).
■ Vehicle Auto-diagnosis: Information collection from CAN Bus to send real
time alarms to emergencies or provide advice to drivers.
AGRICULTURE
■ WINE QUALITY ENHANCING: MONITORING SOIL MOISTURE AND TRUNK
DIAMETER IN VINEYARDS TO CONTROL THE AMOUNT OF SUGAR IN GRAPES AND
GRAPEVINE HEALTH.
■ GREEN HOUSES: CONTROL MICRO-CLIMATE CONDITIONS TO MAXIMIZE THE
PRODUCTION OF FRUITS AND VEGETABLES AND ITS QUALITY.
■ GOLF COURSES: SELECTIVE IRRIGATION IN DRY ZONES TO REDUCE THE WATER
RESOURCES REQUIRED IN THE GREEN.
■ METEOROLOGICAL STATION NETWORK: STUDY OF WEATHER CONDITIONS IN
FIELDS TO FORECAST ICE FORMATION, RAIN, DROUGHT, SNOW OR WIND CHANGES.
■ COMPOST: CONTROL OF HUMIDITY AND TEMPERATURE LEVELS IN ALFALFA, HAY, STRAW, ETC.
TO PREVENT FUNGUS AND OTHER MICROBIAL CONTAMINANTS.
ANIMAL FARMING
■ Offspring Care: Control of growing conditions of the offspring in animal farms
to ensure its survival and health.
■ Animal Tracking: Location and identification of animals grazing in open
pastures or location in big stables.
■ Toxic Gas Levels: Study of ventilation and air quality in farms and detection
of harmful gases from excrements.
DOMESTIC & HOME AUTOMATION
■ Energy and Water Use: Energy and water supply consumption monitoring
to obtain advice on how to save cost and resources.
■ Remote Control Appliances: Switching on and off remotely appliances to
avoid accidents and save energy.
■ Intrusion Detection Systems: Detection of window and door openings
and violations to prevent intruders.
■ Art and Goods Preservation: Monitoring of conditions inside museums and
art warehouses.
E-HEALTH

■ Fall Detection: Assistance for elderly or disabled people living independent.


■ Medical Fridges: Control of conditions inside freezers storing
vaccines, medicines and organic elements.
■ Sportsmen Care: Vital signs monitoring in high performance centers and
fields.
■ Patients Surveillance: Monitoring of conditions of patients inside hospitals
and in old people’s home.
■ Ultraviolet Radiation: Measurement of UV sun rays to warn people not to
be exposed in certain hours.
IOT COMPONENTS
■ There are three IoT components which enable
seamless communication:
■ a) Hardware - made up of sensors, actuators and
embedded communication hardware
■ b) Middleware - on demand storage and computing tools for
data analytics
■ c) Presentation - novel easy to understand visualization and
interpretation tools which can be widely accessed on
different platforms and which can be designed for different
applications.
IOT CONNECTIVITY
■ An IoT device may consist of several interfaces for
connections to other devices, both wired and
wireless.
■ I/O interfaces for sensors
■ Interfaces for internet connectivity
■ Memory and storage interfaces
■ Audio/video interfaces
IOT
PROTOCOL
■ Link Layer
– 802.3 – ■ Transport Layer
Ethernet – TCP
– 802.11 – WiFi – UDP
– 802.16 – ■ Application Layer
WiMax
– 802.15.4 – LR- – HTTP
WPAN – CoAP
– 2G/3G/4G – WebSocket
– MQTT
■ Network/Internet – XMPP
Layer
– IPv4 – DDS
– IPv6 – AMQP
– 6LoWPAN
What Is IoT Architecture?
● IoT architecture consists of the devices, network structure, and cloud technology that allows IoT
devices to communicate with each other.
● A basic IoT architecture consists of three layers:
○ Perception (the sensors, gadgets, and other devices)
○ Network (the connectivity between devices)
○ Application (the layer the user interacts with)
● These layers support IoT devices through data collection and processing.
● This architecture goes beyond the OSI model to include the transformation of data into usable
information.
● These insights allow businesses to take immediate action through the use of automation, machine
learning, and artificial intelligence.
● IoT architecture makes this all possible by ensuring data gets where it needs to and is processed
correctly.
● Without proper IoT architecture, networks would become unreliable, defeating the entire
purpose of investing in IoT in the first place.
5 - Layer IoT Architecture?
● Perception
● The perception layer represents the physical IoT devices themselves. This can include health
monitors, lighting systems, autonomous vehicles, robotics, and security systems. Each IoT device
collects data that requires processing.
● Transport
● The transport layer is responsible for sending collected data to the cloud or edge device for
processing. The transport layer relies on internet gateways to move data from the physical
perception layer into the processing phase.
● Administrators typically rely on cellular and Wi-Fi networks to move data through the transport
layer.
● There are a few different technologies system admins can use during this stage:
○ Cellular 4G LTE / 5G
○ Wi-Fi
○ Bluetooth
○ Low-Power Wide-Area Networks
5 - Layer IoT Architecture?
● Processing
● Once the data reaches the cloud or edge device the server can transform this data into
information. Modern IoT architectures leverage machine learning and artificial intelligence that
create value by analyzing this data.
○ For example, if an IoT sensor is recording a high fluctuation in temperature, artificial
intelligence can alert to this anomaly by monitoring the current temperature compared to its
baseline.
● Application
● Processing typically occurs without human intervention, but humans still need to tell the server
what to do when certain rules are met or thresholds are broken.
● The application layer is where administrators manage IoT device orchestration, create rule sets,
and set service-level agreements for their IoT architecture.
5 - Layer IoT Architecture?
● Business
● Finally, we arrive at the business layer, where information is transformed into business intelligence
that drives decision-making.
● The business layer typically relies on reports and live dashboards for business intelligence.
Information collected from the application layer can be enriched further at this level through
other integrations.
● For example, business intelligence analysts can correlate cost savings based on electricity
consumption before and after smart lighting sensors were installed.
HOW IOT WORKS?
● Internet of Things is not the result of a single novel technology; instead, several
complementary technical developments provide capabilities that taken together
help to bridge the gap between the virtual and physical world.
● These capabilities include:
○ Communication and cooperation Addressability
○ Identification Sensing Actuation
○ Embedded information processing Localization
○ User interfaces
STRUCTURE OF IOT
● The IoT can be viewed as a gigantic network consisting of networks of devices
and computers connected through a series of intermediate technologies where
numerous technologies like RFIDs, wireless connections may act as enablers of
this connectivity.

● Tagging Things : Real-time item traceability and addressability by RFIDs.


Feeling Things : Sensors act as primary devices to collect data from the
environment.
● Shrinking Things : Miniaturization and Nanotechnology has provoked the
ability of smaller things to interact and connect within the “things” or “smart
devices.”
● Thinking Things : Embedded intelligence in devices through sensors has
formed the network connection to the Internet. It can make the “things” realizing
the intelligent control.
RFID SENSOR Smart Nano
Tech Tech

To identify To collect and To enhance To make the


and track process the the power of smaller and
the data data to detect the network by smaller things
of things the changes devolving have the
in the processing ability to
physical capabilities to connect and
status of different part of interact.
things the network.
KNOWLEDGE
MANAGEMENT
Sensors
● What is Sensor?
● A sensor is a device that measure, detects and responds to some type of input
from the physical environment.
● The input could be heat, light, motion, pressure, moisture or any one of a
great number of other environmental phenomena.
● The output is generally a signal that is converted to human-readable display
at the sensor location or transmitted electronically over a network for reading
or further processing.
Sensors
● Different kind of sensors in IoT
○ Temperature Sensor
○ Proximity Sensor
○ Pressure Sensor
○ Water Quality Sensor
○ Chemical/Smoke & Gas Sensor
○ Level Sensor
○ IR Sensor
○ Ultrasonic Sensor
Sensors
● Temperature Sensor
● A Temperature Sensor is a device which is used to
measure heat or temperature on the operating
machine part.
● Temperature sensing is performed by gadget
called Thermocouple.
● A thermocouple is a temperature-measuring
device consisting of two dissimilar conductors that
contact each other at one or more points.
● It produces a voltage when the temperature of
one of the points differs from the reference
temperature at other parts of the circuit.
Sensors
● Proximity Sensor
● proximity sensor is using to detect the motion and
very common to use in retail shop.
○ through this device retailer will use customer’s
proximity to any product and same time they
can sent the coupons and deals to the
customer’s mobile or on email.
● Now a days proximity sensor are used to check
the availability or free spaces like parking space,
sitting spaces in sports stadium, mall and airports.
● Pressure Sensor
Sensors
● A pressure sensor is a gadget equipped with a
pressure-sensitive element that’s used to measure the
pressure of a liquid or a gas against a diaphragm
made of silicon, stainless steel, etc., and converts the
measured value into an electrical signal as an
output.
● It’s also use to measure the water flow through pipes
or tank and notify the concern person when
something need to be fixed.
● Now a days pressure sensor is used in aircraft and
vehicles to determine the altitude and force,
continuously.
Sensors
● Water Quality Sensor
● Water quality sensor are mainly used to measure a
dozen of the most relevant water quality
parameters, Wasp-mote Smart Water is the first
water quality-sensing platform to feature
autonomous nodes that connect to the Cloud for
real-time water control.
● It’s used to measure quality of sea water, river water
and etc.
Sensors
● Chemical/Smoke and Gas Sensor
● smoke and gas detector is a gadget that sense gas,
smoke and typically it’s an indicator of fire.
● Now a days all security devices using this sensor to
passing signal to fire alarm to control panel.
● Household smoke detector is also known as smoke
alarm, most of the device manufacturer using
audible or visual alarm system in security devices
that detect automatically.
Sensors
● Level Sensor
● It’s used to detect the level of liquids and other fluids
and fluidized solids, including granular materials,
slurries and powders that exhibit an upper free
surface.
● Level sensors is also using for water waste
management and recycling purpose, like it’s using to
measure water tank levels, petrol fuel gauging, high
or low level alarm, liquid assets inventory and
irrigation control.
Sensors
● IR Sensor
● This smart gadget is used to detect the infrared
lights.
● Infrared sensor visualize the heat leaks in houses,
identify environmental chemicals in the environment,
and helping doctor to measure patient blood flow.
● It can be integrated with wearable electronics.
● A very simple example, all the remotes having IR
sensor, it’s using to pass the command to respective
devices, like TV remote, fan remote, vehicle key
remote all having infrared sensor.
Sensors
● Ultrasonic Sensor
● An Ultrasonic sensor is used to measure the distance
between the two object by using sound waves.
● It’s measure distance by sending sound wave at a
specific frequency and listen that sound wave house
to measure distance.
● There are two kind of an ultrasonic sensor is, “active
ultrasonic sensor” and “passive ultrasonic sensors”.
● An active ultrasonic sensors generates the high
frequency sound wave to receive back the ultrasonic
sensor for evaluating the echo.
● But, passive ultrasonic sensors are just used for
detecting ultrasonic noise which is present under
specific conditions.
Acutators
● An actuator is a machine component that is used for moving and controlling a system
or mechanism.
● To perform its operation, An actuator needs a control signal and a power source.
● They are widely used in valves, gates, conveyors, automatic control systems, etc.
● In very simple terms, an actuator is a device that makes something move or operate.
Every one of us takes advantage of at least one actuator every day.

● Example1: Grocery Store Door


● When we go to the grocery store, the door opens
automatically for us. An actuator makes the door open.
Actuators
● Example2: Car Seat
● We can move the car seat forward or backward before we
drive away in our car. An actuator makes the seat move.
● They are available in a variety of sizes. Commercial actuators basically perform
any of the two functions listed below:
○ Operating a device like piping valves or
○ Applying a force or torque for lifting, turning or forming.
● Types of Actuators
● Depending on the motion that actuators provide to the valves, two types of actuator
mechanisms are available:
○ Rotary Actuators, and
○ Linear Actuators:
Actuators
● Linear Actuator
● An actuator can move something in a straight line,
also referred to as linear.

● Rotary Actuator
● Also, An actuator can make something move in a
circular motion, also referred to as rotary.
Actuators

❖ Upon receiving a control signal is received, the actuator responds by converting the
energy into mechanical motion.
❖ The control system can be simple (a fixed mechanical or electronic system),
software‐based (e.g. a printer driver, robot control system), a human, or any other
input.
❖ Types of Acutators
Hydraulic
Pneumatic
Thermal/ Magnetic
Electrical
Mechanical
IoT Connectivity Technologies

● The Internet of Things (IoT) starts


with connectivity, but since IoT is a
widely diverse and multifaceted
realm, you certainly cannot find a
one-size-fits-all communication
solution.
● Each solution has its strengths and
weaknesses in various network
criteria and is therefore best-suited
for different IoT use cases.
IoT Connectivity Technologies

● LPWANs
● Low Power Wide Area Networks (LPWANs) are the new phenomenon in IoT.
● By providing long-range communication on small, inexpensive batteries that last for
years, this family of technologies is purpose-built to support large-scale IoT networks
sprawling over vast industrial and commercial campuses.
● LPWANs can literally connect all types of IoT sensors – facilitating numerous
applications from asset tracking, environmental monitoring and facility management to
occupancy detection and consumables monitoring.
● Nevertheless, LPWANs can only send small blocks of data at a low rate, and
therefore are better suited for use cases that don’t require high bandwidth and are
not time-sensitive.
IoT Connectivity Technologies
● Cellular (3G/4G/5G)
● Well-established in the consumer mobile market, cellular networks offer reliable
broadband communication supporting various voice calls and video streaming
applications.
● On the downside, they impose very high operational costs and power requirements.
● While cellular networks are not viable for the majority of IoT applications powered
by battery-operated sensor networks, they fit well in specific use cases such as
connected cars or fleet management in transportation and logistics.
● 5G is also expected to enable real-time video surveillance for public safety, real-time
mobile delivery of medical data sets for connected health, and several time-sensitive
industrial automation applications in the future.
IoT Connectivity Technologies
● Zigbee and Other Mesh Protocols
● Zigbee is a short-range, low-power, wireless standard (IEEE 802.15.4), commonly
deployed in mesh topology to extend coverage by relaying sensor data over multiple
sensor nodes.
● Compared to LPWAN, Zigbee provides higher data rates, but at the same time, much
less power-efficiency due to mesh configuration.
● Because of their physical short-range (< 100m), Zigbee and similar mesh protocols
(e.g. Z-Wave, Thread etc.) are best-suited for medium-range IoT applications with an
even distribution of nodes in close proximity.
● Typically, Zigbee is a perfect complement to Wi-Fi for various home automation use
cases like smart lighting, HVAC controls, security and energy management, etc. –
leveraging home sensor networks.
IoT Connectivity Technologies
● Bluetooth and BLE
● Defined in the category of Wireless Personal Area Networks, Bluetooth is a
short-range communication technology well-positioned in the consumer marketplace.
● Optimized for power consumption, Bluetooth Low-Energy was later introduced to
address small-scale Consumer IoT applications.
● BLE-enabled devices are mostly used in conjunction with electronic devices, typically
smartphones that serve as a hub for transferring data to the cloud.
● Nowadays, BLE is widely integrated into fitness and medical wearables (e.g.
smartwatches, glucose meters, pulse oximeters, etc.) as well as Smart Home devices
(e.g. door locks) – whereby data is conveniently communicated to and visualized on
smartphones.
IoT Connectivity Technologies
● Wi-Fi
● There is virtually no need to explain Wi-Fi, given its critical role in providing
high-throughput data transfer for both enterprise and home environments.
● However, in the IoT space, its major limitations in coverage, scalability and power
consumption make the technology much less prevalent.
● Imposing high energy requirements, Wi-Fi is often not a feasible solution for large
networks of battery-operated IoT sensors, especially in industrial IoT and smart
building scenarios.
● Instead, it more pertains to connecting devices that can be conveniently connected to
a power outlet like smart home gadgets and appliances, digital signages or security
cameras.
6LoWPAN
❖ Low‐power Wireless Personal Area Networks over IPv6.
❖ Allows for the smallest devices with limited processing ability to transmit information wirelessly
using an Internet protocol.
❖ Allows low‐power devices to connect to the Internet.
❖ Created by the Internet Engineering Task Force (IETF) ‐ RFC 5933 and RFC 4919.
❖ Features
❖ Allows IEEE 802.15.4 radios to carry 128 ‐bit addresses of Internet Protocol version 6 (IPv6).
❖ Header compression and address translation techniques allow the IEEE 802.15.4 radios to
access the Internet.
❖ IPv6 packets compressed and re-formatted to fit the IEEE 802.15.4 packet format.
❖ Uses include IoT, Smart grid, and M2M applications.
IoT Connectivity Technologies
● RFID
● Radio Frequency Identification (RFID) uses radio waves to transmit small amounts of
data from an RFID tag to a reader within a very short distance.
● Till now, the technology has facilitated a major revolution in retail and logistics.
● By attaching an RFID tag to all sorts of products and equipment, businesses can track
their inventory and assets in real-time – allowing for better stock and production
planning as well as optimized supply chain management.
● Alongside increasing IoT adoption, RFID continues to be entrenched in the retail sector,
enabling new IoT applications like smart shelves, self-checkout, and smart mirrors.
● Conclusion:
● Choosing the best wireless technology for your IoT use case means accurately
weighing criteria in terms of range, bandwidth, QoS, security, power consumption, and
network management.
6LoWPAN
❖ 6LoWPAN Routing
❖ Mesh routing within the PAN space.
❖ Routing between IPv6 and the PAN domain
❖ Routing protocols in use:
LOADng
RPL
WSN - Introduction
❖ Sensor nodes are capable of collaborating with one another and measuring the
condition of their surrounding environments
❖ Example: Light, temperature, sound, vibration
❖ Consists of a large number of sensor nodes, densely deployed over an area.
❖ The sensed measurements are then transformed into digital signals and processed to
reveal some properties of the phenomena around sensors.
❖ Due to the fact that the sensor nodes in WSNs have short radio transmission range,
intermediate nodes act as relay nodes to transmit data towards the server node
using a multi‐hop path.
❖ Multifunctional
The number of sensor nodes used depends on the application type.
❖ Short transmission ranges
❖ OS (e.g., TinyOS).
❖ Limited Battery Power
Basic Components of WSN
Limitation of WSN Nodes
❖ Small size, typically less than a cubic cm.
❖ Must consume extremely low power
❖ Operate in an unattended manner in a highly dense area.
❖ Should have low production cost and be dispensable
❖ Be autonomous
❖ Be adaptive to the environment
Applications

❖ Temperature measurement
❖ Humidity level
❖ Lighting condition
❖ Air pressure
❖ Soil moisture
❖ Noise level
❖ Vibration
Challenges
❖ Scalability
Providing acceptable levels of service in the presence of large number of
nodes.
Typically, throughput decreases at a rate of , N = number of nodes.
❖ Quality of service
Offering guarantees in terms of bandwidth, delay, jitter, packet loss
probability.
Limited bandwidth, unpredictable changes in RF channel characteristics.
❖ Energy efficiency
Nodes have limited battery power
Nodes need to cooperate with other nodes for relaying their information.
❖ Security
Open medium.
Nodes prone to malicious attacks, infiltration, eavesdropping, interference.
Wireless ad-hoc and sensor network

❖ Nodes communicate with other nodes with the help of intermediate nodes.
❖ The intermediate nodes act as relays.
❖ Wireless nodes are energy‐constrained.
❖ Nodes may or may not cooperate.
Sensor Network/Web
Wireless ad-hoc - Security Challenges

● Open, shared radio medium by the nodes, which dynamically change positions.
● No centralized network management or certification authority.
● Existence of malicious nodes.
● Nodes prone to attacks, infiltration, eavesdropping, interference.
● Nodes can be captured, compromised, false routing information can be sent – paralyzing the whole
network.
● The cooperating node or the node being cooperated might be victimized.
Node Behavior in WSN
Node Behavior in WSN

● Normal nodes work perfectly in ideal environmental conditions


● Failed nodes are simply those that are unable to perform an operation; this could be
because of power failure and environmental events.
● Badly failed nodes exhibit features of failed nodes but they can also send false routing
messages which are a threat to the integrity of the network.
● Selfish nodes are typified by their unwillingness to cooperate, as the protocol requires
whenever there is a personal cost involved. Packet dropping is the main attack by selfish
nodes.
● Malicious nodes aim to deliberately disrupt the correct operation of the routing protocol,
denying network service if possible.
Dynamic Misbehavior

● Detection of such temporary misbehavior in order to preserve normal functioning of the network –
coinage and discovery of dumb behavior
● In the presence of adverse environmental conditions (high temperature, rainfall, and fog) the
communication range shrinks
● A sensor node can sense its surroundings but is unable to transmit the sensed data
● With the resumption of favorable environmental conditions, dumb nodes work normally
● Dumb behavior is temporal in nature (as it is dependent on the effects of environmental conditions)
Detection and Connectivity Re-establishment

● The presence of dumb nodes impedes the overall network performance


● Detection, and, subsequently, the re‐establishment of network connectivity is crucial
● The sensed information can only be utilized if the connectivity between each dumb node with other
nodes in the network could be re‐established
● Before restoration of network connectivity, it is essential to detect the dumb nodes in the network
WSN Coverage

● Coverage – area‐of‐interest is covered satisfactorily


● Connectivity – all the nodes are connected in the network, so that sensed data can reach to sink
node
● Sensor Coverage studies how to deploy or activate sensors to cover the monitoring area
○ Sensor placement
○ Density control
● Two modes
○ Static sensors
○ Mobile sensors
WSN Coverage
WSN Nodes Coverage
● Determine how well the sensing field is monitored or tracked by sensors
● To determine, with respect to application‐specific performance criteria,
○ in case of static sensors, where to deploy and/or activate them
○ in case of (a subset of) the sensors are mobile, how to plan the trajectory of the mobile
sensors.
● These two cases are collectively termed as the coverage problem in wireless sensor networks.
● The purpose of deploying a WSN is to collect relevant data for processing or reporting
● Two types of reporting
○ event driven, e.g. forest fire monitoring
○ on demand, e.g. inventory control system
● Objective is to use a minimum number of sensors and maximize the network lifetime
IoT State of the Art Architecture

❖ IoT Components
Device (The Thing)
Local Network
Internet
Backend Services
Applications
Functional Components of IoT
❖ Component for interaction and communication with other IoT devices
❖ Component for processing and analysis of operations
❖ Component for Internet interaction
❖ Components for handling Web services of applications
❖ Component to integrate application services
❖ User interface to access IoT
IoT Implementation
IoT Interdependencies
IoT Service Oriented Architecture
IoT Gateways
IoT Categories

❖ Industrial IoT
IoT device connects to an IP network and the global Internet.
Communication between the nodes done using regular as well as industry
specific technologies.

❖ Consumer IoT
IoT device communicates within the locally networked devices.
Local communication is done mainly via Bluetooth, Zigbee or WiFi.
Generally limited to local communication by a Gateway
IoT and Associated Technologies
Technical differences from Web

● Communication between the IoT


device(s) and the outside world
dictates the network
architecture.
● Choice of communication
technology dictates the IoT
device hardware requirements
and costs.
● Due to the presence of
numerous applications of IoT
enabled devices, a single
networking paradigm not
sufficient to address all the
needs of the consumer or the
IoT device.
IoT Levels & Deployment Templates
❖ An IoT system comprises of the following components:
Device: An IoT device allows identification, remote sensing, actuating and remote
monitoring capabilities. You learned about various examples of IoT devices in
section
Resource: Resources are software components on the IoT device for accessing,
processing, and storing sensor information, or controlling actuators connected to the
device. Resources also include the software components that enable network access
for the device.
Controller Service: Controller service is a native service that runs on the device and
interacts with the web services. Controller service sends data from the device to the
web service and receives commands from the application (via web services) for
controlling the device.
IoT Levels & Deployment Templates
➢ Database: Database can be either local or in the cloud and stores the
data generated by the IoT device.
➢ Web Service: Web services serve as a link between the IoT device,
application, database and analysis components. Web service can be
either implemented using HTTP and REST principles (REST service) or using
WebSocket protocol (WebSocket service).
➢ Analysis Component: The Analysis Component is responsible for
analyzing the IoT data and generate results in a form which are easy for
the user to understand.
➢ Application: IoT applications provide an interface that the users can use
to control and monitor various aspects of the IoT system. Applications also
allow users to view the system status and view the processed data.
IoT Level-1
❖ A level-1 IoT system has a single
node/device that performs sensing
and/or actuation, stores data, performs
analysis and hosts the application
❖ Level-1 IoT systems are suitable for
modeling low- cost and low-complexity
solutions where the data involved is not
big and the analysis requirements are
not computationally intensive.
IoT Level-1
❖ Example: Consider an IOT device that monitors the
lights in a house. The lights are controlled through
switches.
❖ Status of each light is maintained in a local
database.
❖ REST services deployed locally allow retrieving
and updating state of each light in the database
and triggers the switches accordingly.
❖ Application has a user interface for controlling the
lights or applications locally. Device is connected to
the internet and hence the application can be
accessed remotely as well.
IoT Level-2
❖ A level-2 IoT system has a single node that
performs sensing and/or actuation and
local analysis.
❖ Data is stored in the cloud and application
is usually cloud- based.
❖ Level-2 IoT systems are suitable for
solutions where the data involved is big,
however, the primary analysis requirement
is not computationally intensive and can
be done locally itself.
IoT Level-2
❖ Example: A single node monitors the soil
moisture in the field.
❖ This is sent to the database on cloud using
REST APIs.
❖ Controller service continuously monitors
moisture levels.
❖ Cloud based application is used for
monitoring and controlling the IOT system.
IoT Level-3
❖ A level-3 IoT system has a single node.
Data is stored and analyzed in the cloud
and application is cloud- based.
❖ Level-3 IoT systems are suitable for
solutions where the data involved is big
and the analysis requirements are
computationally intensive.
IoT Level-3
❖ Example: A node is monitoring a package
using devices like accelerometer and
gyroscope.
❖ These devices track vibration levels. Controller
service sends sends sensor data to cloud in
real time using WebSocket API.
❖ Data is stored in cloud and visualised using
cloud-based application.
❖ Analysis component triggers alert if vibration
levels cross a threshold.
IoT Level-4
❖ A level-4 IoT system has multiple nodes that
perform local analysis. Data is stored in the cloud
and application is cloud-based.
❖ Level-4 contains local and cloud- based observer
nodes which can subscribe to and receive
information collected in the cloud from IoT
devices.
❖ Level-4 IoT systems are suitable for solutions
where multiple nodes are required, the data
involved is big and the analysis requirements are
computationally intensive.
IoT Level-4
❖ Example: Noise monitoring of a area requires
various nodes functioning independent of each
other.
❖ Each has its own controller service. Data is stored
in cloud database.
❖ Analysis is done on the cloud and the entire IOT
system is monitored on the cloud using an
application.
IoT Level-5
❖ A level-5 IoT system has multiple end nodes
and one coordinator node.
❖ The end nodes that perform sensing and/or
actuation.
❖ Coordinator node collects data from the end
nodes and sends to the cloud.
❖ Data is stored and analyzed in the cloud
and application is cloud-based.
❖ Level-5 IoT systems are suitable for solutions
based on wireless sensor networks, in which
the data involved is big and the analysis
requirements are computationally intensive.
IoT Level-5
❖ Example: A monitoring system has various
components: end nodes collect various data
from the environment and send it to
coordinator node.
❖ Coordinator node acts as gateway and
allows the data to be transferred to cloud
storage using REST API.
❖ Controller service on the coordinator node
sends data to the cloud.
IoT Level-6
❖ A level-6 IoT system has multiple
independent end nodes that perform
sensing and/or actuation and send data to
the cloud.
❖ Data is stored in the cloud and application
is cloud-based.
❖ The analytics component analyzes the
data and stores the results in the cloud
database.
❖ The results are visualized with the
cloud-based application.
❖ The centralized controller is aware of the
status of all the end nodes and sends
control commands to the nodes.
IoT Level-6
❖ Example: Weather monitoring consists of
sensors that monitor different aspects of a
system.
❖ The end nodes send data to cloud
storage.
❖ Analysis component, application and
storage are in cloud.
❖ Centralized controller controls all nodes
and provides inputs.
REFERENCE MODEL AND ARCHITECTURE
❖ Reference Architecture that describes essential building blocks as well as design choices
❖ to deal with conflicting requirements regarding functionality, performance, deployment
and security.
❖ Interfaces should be standardized, best practices in terms of functionality and
information usage need to be provided.
❖ A Reference Architecture (RA) can be visualised as the ―Matrix that eventually gives
birth ideally to all concrete architectures.
❖ For establishing such a Matrix, based on a strong and exhaustive analysis of the State of
the Art, we need to envisage the superset of all possible functionalities, mechanisms and
protocols that can be used for building such concrete architecture and to show how
interconnections could take place between selected ones (as no concrete system is likely
to use all of the functional possibilities).
REFERENCE MODEL AND ARCHITECTURE
❖ Giving such a foundation along with a set of design-choices, based on the
characterisation of the targeted system w.r.t. various dimensions (like distribution,
security, real-time, semantics) it becomes possible for a system architect to select the
protocols, functional components, architectural options, needed to build their IoT systems.
❖ An Architectural Reference Model (ARM) is the combination of the Reference Model and
the Reference Architecture, the set of models, guidelines, best practices, views and
perspectives that can be used for building fully interoperable concrete IoT architectures
and systems.
❖ Business scenarios defined as requirements by stakeholders are the drivers of the
architecture work.
❖ With the knowledge of businesses aspirations, a holistic view of IoT architectures can be
derived.
REFERENCE MODEL AND ARCHITECTURE
REFERENCE MODEL AND ARCHITECTURE
❖ The IoT Reference Model provides the highest level of abstraction.
❖ It promotes a common understanding of the IoT domain.
❖ The description of the IoT Reference Model includes:
a general discourse on the IoT domain,
an IoT Domain Model as a top-level description,
an IoT Information Model
o explaining how IoT information is going to be modeled, and
an IoT Communication Model
o in order to understand specifics about communication between many
heterogeneous IoT devices and the Internet as a whole.
REFERENCE MODEL AND ARCHITECTURE
❖ The IoT Reference Architecture is the reference for building compliant IoT architectures.
❖ As such, it provides views and perspectives on different architectural aspects that are of
concern to stakeholders of the IoT.
❖ To organizations, an important aspect is the compliance of their technologies with
standards and best practices, so that interoperability across organizations is ensured.
IoT Protocol Suite
❖ In an IoT system, data is generated by multiple kinds of devices, processed in different
ways, transmitted to different locations, and acted upon by applications.
❖ The IoT protocols are classified into four broad categories namely: application protocols,
service discovery protocols, infrastructure protocols and other influential protocols.
IoT Protocol Suite
❖ Infrastructural Protocol
1. 802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer. Eg: 802.3 uses
co-axial cable; 802.3i uses copper twisted pair connection; 802.3j uses fiber optic connection;
802.3ae uses Ethernet over fiber.
2. 802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN) communication standards including
extensive description of link layer. Eg: 802.11a operates in 5GHz band, 802.11b and 802.11g
operates in 2.4GHz band, 802.11n operates in 2.4/5GHz band, 802.11ac operates in 5GHz
band, 802.11ad operates in 60Ghzband.
3. 802.16 - WiMax: IEEE802.16 is a collection of wireless broadband standards including exclusive
description of link layer. WiMax provide data rates from 1.5 Mb/s to 1Gb/s.
4. 802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless personal area
network(LR-WPAN). Basis for high level communication protocols such as ZigBee. Provides data rate
from 40kb/s to250kb/s.
5. 2G/3G/4G-Mobile Communication: Data rates from 9.6kb/s(2G) to up to100Mb/s(4G).
IoT Protocol Suite
❖ Infrastructural Protocol
1. 802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer. Eg: 802.3
uses co-axial cable; 802.3i uses copper twisted pair connection; 802.3j uses fiber optic
connection; 802.3ae uses Ethernet over fiber.
2. 802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN) communication standards
including extensive description of link layer. Eg: 802.11a operates in 5GHz band, 802.11b
and 802.11g operates in 2.4GHz band, 802.11n operates in 2.4/5GHz band, 802.11ac
operates in 5GHz band, 802.11ad operates in 60Ghzband.
3. 802.16 - WiMax: IEEE802.16 is a collection of wireless broadband standards including
exclusive description of link layer. WiMax provide data rates from 1.5 Mb/s to 1Gb/s.
4. 802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless personal
area network(LR-WPAN). Basis for high level communication protocols such as ZigBee. Provides
data rate from 40kb/s to250kb/s.
IoT Protocol Suite
❖ Infrastructural Protocol
5. 2G/3G/4G-Mobile Communication: Data rates from 9.6kb/s(2G) to up to100Mb/s(4G).
6. IPv4: Internet Protocol version4 is used to identify the devices on a n/w using a hierarchical
addressing scheme. 32 bit address. Allows total of 2^32 addresses.
7. IPv6: Internet Protocol version6 uses 128 bit address scheme and allows 2^128 addresses.
8. 6LOWPAN: (IPv6overLowpowerWirelessPersonalAreaNetwork) operates in 2.4 GHz frequency
range and data transfer 250 kb/s.
❖ Service Discovery Protocol
1. mDNS – Multicast Domain Name System (mDNS) : is a DNS like service discovery protocol to
resolve host names to IP addresses in a local network without using any unicast DNS server. It can
be used without any additional infrastructure or DNS server in the network. The protocol
operates on IP multicast UDP packets through which a node in the local network enquires the
names of all other nodes.
IoT Protocol Suite
The client node sends a query message to respond by a node with specific name. When the node
with the corresponding name receives the query, it responds with a multicast response message
containing its IP address. Being a multicast response, the target device IP address and name is also
saved by all the devices (nodes) of the network in their local caches.
2. DNS Service Discovery (DNS-SD) – This protocol stack uses standard DNS messages to discover
services in an IOT network. Based on mDNS, DNS-SD is used to resolve services available in a
network. The service discovery is implemented in two steps – in the first step, host names of the
service providers are resolved and in the next step, IP addresses are paired with the host names
using mDNS.
❖ Application Protocols:
1. HTTP: Hypertext transfer protocol is the application layer protocol that forms the foundations of
world wide web http includes, commands such as GET, PUT, POST, DELETE, HEAD, TRACE, OPTIONS
etc.
IoT Protocol Suite
❖ The protocol follows a request-response model where are client sends request to server using
the http, commands.
❖ Http is a stateless protocol and each http request is independent father request and http client
can be a browser or an application running on the client example and application running on
an IoT device ,mobile mobile applications or other software.
2. CoAP: CoAP – Constrained Application Protocol.
❖ Web transfer protocol for use with constrained nodes and networks.
❖ Designed for Machine to Machine (M2M) applications such as smart energy and building
automation.
❖ Based on Request‐Response model between end‐points
❖ Client‐Server interaction is asynchronous over a datagram oriented transport protocol such as
UDP.
❖ The Constrained Application Protocol (CoAP) is a session layer protocol designed by IETF
Constrained RESTful Environment CoRE) working group to provide lightweight RESTful (HTTP)
interface.
IoT Protocol Suite
❖ Representational State Transfer (REST) is the standard interface between HTTP client and
servers.
❖ Lightweight applications such as those in IoT, could result in significant overhead and power
consumption by REST.
❖ CoAP is designed to enable low‐power sensors to use RESTful services while meeting their
power constraints.
❖ Built over UDP, instead of TCP (which is commonly used with HTTP) andhas a light mechanism to
provide reliability.
❖ CoAP architecture is divided into two main sub‐layers:
➢ Messaging
➢ Request/response.
❖ The messaging sub‐layer is responsible for reliability and duplication of messages, while the
request/response sub‐layer is responsible for communication.
IoT Protocol Suite
❖ Features
➢ Reduced overheads and parsing complexity.
➢ URL and content‐type support.
➢ Support for the discovery of resources provided by known CoAP services.
➢ Simple subscription for a resource, and resulting push notifications.
➢ Simple caching based on maximum message age.
❖ CoAP has four messaging modes:
➢ Confirmable
➢ Non‐confirmable
➢ Piggyback
➢ Separate
IoT Protocol Suite
IoT Protocol Suite
3. MQTT: Message Queue Telemetry Transport.
❖ ISO standard (ISO/IEC PRF 20922).
❖ It is a publish‐subscribe‐based lightweight messaging protocol for use in conjunction with the
TCP/IP protocol.
❖ MQTT was introduced by IBM in 1999 and standardized by OASIS in 2013.
❖ Designed to provide connectivity (mostly embedded) between applications and middle‐wares
on one side and networks and communications on the other side.
❖ A message broker controls the publish‐subscribe messaging pattern.
❖ A topic to which a client is subscribed is updated in the form of messages and distributed by
the message broker.
❖ Designed for:
Remote connections
Limited bandwidth
Small‐code footprint
IoT Protocol Suite
❖ MQTT Components
❖ Publishers: Lightweight sensors
❖ Subscribers: Applications interested in sensor data
❖ Broker: Connect publishers and subscribers and Classify sensor data into topics
❖ MQTT Methods
Connect
Disconnect
Subscribe
Unsubscribe
Publish
IoT Protocol Suite
❖ Communication
❖ The protocol uses a publish/subscribe architecture (HTTP uses a request/response paradigm).
❖ Publish/subscribe is event‐driven and enables messages to be pushed to clients.
❖ The central communication point is the MQTT broker, which is in charge of dispatching all
messages between the senders and the rightful receivers.
❖ Each client that publishes a message to the broker, includes a topic into the message. The topic
is the routing information for the broker.
❖ Each client that wants to receive messages subscribes to a certain topic and the broker delivers
all messages with the matching topic to the client.
❖ Therefore the clients don’t have to know each other. They only communicate over the topic.
❖ This architecture enables highly scalable solutions without dependencies between the data
producers and the data consumers.
IoT Protocol Suite
❖ MQTT Topics
❖ A topic is a simple string that can have more hierarchy levels, which are separated by a slash.
❖ A sample topic for sending temperature data of the living room could be
house/living‐room/temperature.
❖ On one hand the client (e.g. mobile device) can subscribe to the exact topic or on the other
hand, it can use a wildcard.
❖ The subscription to house/+/temperature would result in all messages sent to the previously
mentioned topic house/livingroom/ temperature, as well as any topic with an arbitrary value in
the place of living room, such as house/kitchen/temperature.
❖ The plus sign is a single level wild card and only allows arbitrary values for one hierarchy.
❖ If more than one level needs to be subscribed, such as, the entire sub‐tree, there is also a
multilevel wildcard (#).
❖ It allows to subscribe to all underlying hierarchy levels.
❖ For example house/# is subscribing to all topics beginning with house.
IoT Protocol Suite
❖ Applications
Facebook Messenger uses MQTT for online chat.
Amazon Web Services use Amazon IoT with MQTT.
Microsoft Azure IoT Hub uses MQTT as its main protocol for telemetry messages.
The EVRYTHNG IoT platform uses MQTT as an M2M protocol for millions of connected
products.
Adafruit launched a free MQTT cloud service for IoT experimenters called Adafruit IO.
❖ SMQTT
❖ Secure MQTT is an extension of MQTT which uses encryption based on lightweight attribute
based encryption.
❖ The main advantage of using such encryption is the broadcast encryption feature, in which one
message is encrypted and delivered to multiple other nodes, which is quite common in oT
applications.
❖ In general, the algorithm consists of four main stages: setup, encryption, publish and decryption.
IoT Protocol Suite
❖ In the setup phase, the subscribers and publishers register themselves to the broker and get a
master secret key according to their developer’s choice of key generation algorithm.
❖ When the data is published, it is encrypted and published by the broker which sends it to the
subscribers, which is finally decrypted at the subscriber end having the same master secret key.
❖ The key generation and encryption algorithms are not standardized.
❖ SMQTT is proposed only to enhance MQTT security features.
4. XMPP – Extensible Messaging and Presence Protocol.
❖ A communication protocol for message‐oriented middleware based on XML (Extensible Markup
Language).
❖ Real‐time exchange of structured data.
❖ It is an open standard protocol.
❖ XMPP uses a client‐server architecture.
❖ As the model is decentralized, no central server is required.
IoT Protocol Suite
❖ XMPP provides for the discovery of services residing locally or across a network, and the
availability information of these services.
❖ Well‐suited for cloud computing where virtual machines, networks, and firewalls would
otherwise present obstacles to alternative service discovery and presence‐based solutions.
❖ Open means to support machine‐to‐machine or peer‐to‐peer communications across a diverse
set of networks.
❖ Advantages
❖ Decentralization – No central server; anyone can run their own XMPP server.
❖ Open standards – No royalties or granted permissions are required to implement these
specifications
❖ Security – Authentication, encryption, etc.
❖ Flexibility – Supports interoperability
IoT Protocol Suite
❖ Application
Publish‐subscribe systems
Signaling for VoIP
Video
File transfer
Gaming
Smart grid
Social networking services
5. AQMP: Advanced Message Queuing Protocol.
❖ Open standard for passing business messages between applications or organizations.
❖ Connects between systems and business processes.
❖ It is a binary application layer protocol.
❖ Basic unit of data is a frame. ISO standard: ISO/IEC 19464
IoT Protocol Suite
❖ Features
Security
Reliability
Interoperability
Routing
Queuing
Open standard
❖ Application
Monitoring and global update sharing.
Connecting different systems and processes to talk to each other.
Allowing servers to respond to immediate requests quickly and delegate time consuming tasks
for later processing.
Distributing a message to multiple recipients for consumption.
Enabling offline clients to fetch data at a later time.
Introducing fully asynchronous functionality for systems.
Increasing reliability and uptime of application deployments.
IoT Protocol Suite
6. DDS: Data distribution service is the date centric middleware standard for device-to-device
machine to machine communication
❖ DDS uses a publish subscribe model where publisher example device that generate data
create topics to which subscribers per can subscribe publisher is an object responsible for data
distributions and the subscriber responsible for receiving published data.
❖ DDS provide quality of service (QoS) control and configurable reliability
❖ QoS cna be configured in 3 ways:
At‐most‐once: each message is delivered once or never
At‐least‐once: each message is certain to be delivered, but may do so multiple times
Exactly‐once: message will always certainly arrive and do so only once
6. Web Socket: Allows full-duplex communication over single socket. Based on TCP.
❖ Allows streams of messages to be sent back and forth between the client and server while
keeping the TCP connection open.
❖ Client can be a browser, IoT device or mobile application
IoT Protocol Suite
Communication Protocols
❖ Communications protocols form the backbone of IoT system and enable network connectivity
and coupling to applications.
❖ Communications protocols allow device to exchange data over the network.
❖ These protocols define the data exchange formats and data encoding schemes for devices
and routing of packets from source to destination.
❖ Other function of the protocol include sequence control flow control and transmissions of Lost
packet.
Communication Protocols
❖ Bluetooth:
An important short-range IoT communications Protocols / Technology.
It is expected to be key for wearable products in particular, again connecting to
the IoT albeit probably via a smartphone in many cases.
The new Bluetooth Low-Energy (BLE) – or Bluetooth Smart, as it is now branded – is
a significant protocol for IoT applications. It offers a similar range to Bluetooth it
has been designed to offer significantly reduced power consumption.
❖ Zigbee:
ZigBee is similar to Bluetooth and is majorly used in industrial settings.
It has some significant advantages in complex systems offering low-power
operation, high security, robustness and high and is well positioned to take
advantage of wireless control and sensor networks in IoT applications.
Communication Protocols
❖ Z-Wave:
Z-Wave is a low-power RF communications IoT technology that primarily design for
home automation for products such as lamp controllers and sensors among many
other devices.
A Z-Wave uses a simpler protocol than some others, which can enable faster and
simpler development, but the only maker of chips is Sigma Designs
❖ Wi-Fi:
WiFi connectivity is one of the most popular IoT communication protocol, often an
obvious choice for many developers, especially given the availability of WiFi within
the home environment within LANs.
There is a wide existing infrastructure as well as offering fast data transfer and the
ability to handle high quantities of data.
Communication Protocols
Currently, the most common WiFi standard used in homes and many businesses is
802.11n, which offers range of hundreds of megabit per second, which is fine for
file transfers but may be too power-consuming for many IoT applications.
❖ Cellular:
Any IoT application that requires operation over longer distances can take
advantage of GSM/3G/4G cellular communication capabilities. While cellular is
clearly capable of sending high quantities of data, especially for 4G, the cost and
also power consumption will be too high for many applications.
But it can be ideal for sensor-based low-bandwidth-data projects that will send
very low amounts of data over the Internet.
Communication Protocols
❖ NFC:
NFC (Near Field Communication) is an IoT technology. It enables simple and safe
communications between electronic devices, and specifically for smartphones, allowing
consumers to perform transactions in which one does not have to be physically present.
It helps the user to access digital content and connect electronic devices. Essentially it
extends the capability of contactless card technology and enables devices to share
information at a distance that is less than 4cm.
❖ LoRaWAN:
LoRaWAN is one of popular IoT Technology, targets wide-area network (WAN)
applications. The LoRaWAN design to provide low-power WANs with features
specifically needed to support low-cost mobile secure communication in IoT, smart city,
and industrial applications.
Specifically meets requirements for low-power consumption and supports large
networks with millions and millions of devices, data rates range from 0.3 kbps to 50
kbps.

You might also like