You are on page 1of 108

By

Dr. Krishna Keerthi Chennam


IoT(Internet of Things)
• Internet technology connecting devices,
machines and tools to the internet by means of
wireless technologies.
• Over 9 billion ‘Things’ connected to the Internet,
as of now.
• ‘Things’ connected to the Internet are projected to
cross 20 billion in the near future.
• Unification of technologies such as low-power
embedded systems, cloud computing, big-data,
machine learning, and networking.
Origin of Terminology

In the 2000s, we are heading into a new era of


ubiquity, where the “users” of the Internet will
be counted in billions and where humans may
become the minority as generators and
receivers of traffic. Instead, most of the traffic
will flow between devices and all kinds of
“things”, thereby creating a much wider and
more complex Internet of Things.
• Business/Manufacturing
✔ Real-time analytics of supply chains and
equipment, robotic machinery.
• Healthcare
✔ Portable health monitoring, electronic
recordkeeping, pharmaceutical safeguards.
• Retail
✔ Inventory tracking, smartphone purchasing,
anonymous analytics of consumer choices.
• Security
✔ Biometric and facial recognition locks, remote
sensors.
 ATM
• These ubiquitous money dispensers went online for the
first time way back in 1974.
 WEB
• World Wide Web made its debut in 1991 to
revolutionize computing and communications.
 SMART METERS
• The first power meters to communicate remotely with
the grid were installed in the early 2000s.
 DIGITAL LOCKS
• Smartphones can be used to lock and unlock doors
remotely, and business owners can change key codes
rapidly to grant or restrict access to employees and
guests.
 SMART HEALTHCARE
• Devices connect to hospitals, doctors and relatives to
alert them of medical emergencies and take preventive
measures.
 SMART VEHICLES
• Vehicles self-diagnose themselves and alert owners
about system failures.
 SMART CITIES
• City-wide infrastructure communicating amongst
themselves for unified and synchronized operations and
information dissemination.
 SMART DUST
• Computers smaller than a grain of sand can be sprayed
or injected almost anywhere to measure chemicals in
the soil or to diagnose problems in the human body.
Modern Day IoT Applications
 Smart Parking  Forest Fire Detection
 Structural health  Air Pollution
 Noise Urban Maps  Snow Level Monitoring
 Landslide and Avalanche
 Smartphone Detection
Prevention
 Traffic Congestion  Earthquake Early Detection
 Smart Lighting  Water Leakages
 Waste Management  Radiation Levels
 Smart Roads  Explosive and Hazardous Gases
 River Floods  Supply Chain Control
 NFC Payment
 Smart Grid
 Intelligent Shopping Applications
 Tank level  Smart Product Management
 Water Flow
 Stock Calculation
 Perimeter Access Control
 Liquid Presence
UNIT - 1
1.1.Definition of IoT

A dynamic global network infrastructure with


self-configuring capabilities based on standard and
interoperable communication protocols where
physical and virtual "things" have identities, physical
attributes, and virtual personalities and use intelligent
interfaces, and are seamlessly integrated into the
information network, often communicate data
associated with users and their environments.

Bahga & Madisetti, © 2015


Book website: http://www.internet-of-things-book.com
1.2.Characteristics of
IoT
•Dynamic & Self-Adapting
•Self-Configuring
•Interoperable Communication Protocols
•Unique Identity
•Integrated into Information Network
• Efficient, scalable and associated architecture
• Unambiguous naming and addressing
• Abundance of sleeping nodes, mobile and non-IP
devices
• Intermittent connectivity
1.3.Physical Design of IoT
• The "Things" in IoT usually refers to IoT devices
which have unique identities and can perform
remote sensing, actuating and monitoring
capabilities.
• IoT devices can:
• Exchange data with other connected devices and
applications (directly or indirectly), or
• Collect data from other devices and process the data
locally or
• Send the data to centralized servers or cloud-based
application back-ends for processing the data, or
• Perform some tasks locally and other tasks within
the IoT infrastructure, based on temporal and space
constraints
1.4.Generic block diagram of an IoT
• An IoT device may Device
consist of several
interfaces for
connections to other
devices, both wired
and wireless.
• I/O interfaces for
sensors
• Interfaces for
Internet
connectivity
• Memory and storage
interfaces
• Audio/video interfaces.
1.5.Logical Design of IoT
• Logical design of an IoT
system refers to an abstract
representation of the entities
and processes without going
into the low-level specifics
of the implementation.

• An IoT system comprises


of a number of functional
blocks that provide the
system the capabilities for
identification, sensing,
actuation, communication,
and management.
• Devices: An IoT system comprises of devices the provide
sensing, actuation, monitoring and control functions
• Communication: Handles the communication for IoT
system
• Services: Services for device monitoring, device control
service, data publishing service, and services for
discovery.
• Management: this blocks provides various functions to
govern the IoT system
• Security: this blocks secures the IoT system and by
providing functions such as authentication, authorization
message and content integrity, and data security.
• Application: This is an interface that the users can use to
control and monitor various aspects of the IoT system.
Applications also allow users to view the system status
and view or analyse the processed data
1.6 IoT Communication Models
1. Request -Response
2. Publish-Subscribe
3. Push-Pull
4. Exclusive- Pair
Request-Response communication
model

• Request-Response is a communication model in which the


client sends requests to the server and the server responds
to the requests.
• When the server receives a request, it decides how to
respond, fetches the data, retrieves resource
representations, prepares the response, and then sends the
response to the client.
Publish-Subscribe communication model

• Publish-Subscribe is a communication model that


involves publishers, brokers and consumers.
• Publishers are the source of data. Publishers send the data
to the topics which are managed by the broker. Publishers
are not aware of the consumers.
• Consumers subscribe to the topics which are managed by
the broker.
• When the broker receives data for a topic from the
publisher, it sends the data to all the subscribed consumers.
Push-Pull communication model

• Push-Pull is a communication model in which the data producers


push the data to queues and the consumers pull the data from the
queues. Producers do not need to be aware of the consumers.
• Queues help in decoupling the messaging between the producers
and consumers.
• Queues also act as a buffer which helps in situations when there
is a mismatch between the rate at which the producers push data
and the rate rate at which the consumers pull data.
Exclusive Pair communication model
• Exclusive Pair is a
bidirectional, fully duplex
communication model that
uses a persistent
connection between the
client and server.
• Once the connection is
setup it remains open until
the client sends a request
to close the connection.
• Client and server can send
messages to each other
after connection setup.
1.7 IOT Communication APIs
REST-based Communication APIs
WebSocket-based communication APIs
REST-based Communication
• Representational State Transfer APIs
(REST) is a set of architectural
principles by which you can
design web services and web
APIs that focus on a system’s
resources and how resource
states are addressed and
transferred.
• REST APIs follow the
request- response
communication model.
• The REST architectural
constraints apply to the
components, connectors, and
data elements, within a
distributed hypermedia system.
WebSocket-based Communication APIs
• WebSocket APIs allow
bi- directional, full
duplex
communication
between clients and
servers.
• WebSocket APIs follow
the exclusive pair
communication model
1.8 IoT Protocols
Link Layer-
➔ Protocols determine the data is physically sent over the network
physical layer(Copper wire, coaxial cable or radio wave).
➔ Scope of link layer is the local network connection to which host is
attached.
➔ Hosts on the same link exchange data packets over the link layer
using link layer protocols.
➔ Link Layer Protocols
a. 802.3 – Ethernet
b. 802.11 – WiFi
Provides data rates from 1Mb/s to upto 6.75 Gb/s
c. 802.16 – WiMax Wireless Broadband Standards
Provides data rates from 1.5Mb/s to 1Gb/s, recently data
rates of 100Mbins/s for Mobile Stations and 1 Gbits/s for
fixed stations
d. 802.15.4 – LR-WPAN Low Rate Wireless Personal area network
Provides Low cost and Low speed communication for power
constrained devices
e. 2G/3G/4G Mobile Communication
Provides data rates from 9.6Kb/s(for 2G to upto
100Mb/s(for 4G)
Network/Internet Layer
➔ Responsible for sending IP datagrams from the source
network to the destination network.
➔ Performs host addressing and packet routing
➔ Datagrams contain the source and destination addresses
which are used to route them from source to destination
across multiple networks
• IPv4(Internet protocol version 4) uses 32 bit address
allows 2**32 addresses
• IPv6(Internet protocol version 6) uses 128 bit
address allows 2**128 adderss
• 6LoWPAN(IPv6 over Low power Wireless Personal
Area Networks) brings IP protocol to the low
power devices which have limited processing
capability.
Transport Layer
➔ Provides end to end message transfer capability
independent of the under laying network.
➔ The message transfer capability can set connections using
handshakes(TCP) or without handshakes /ack(UDP).
➔ Provides error control, segmentation flow control and
congestion control functions
• TCP(Transmission Control Protocol)
Connection oriented protocol. Used by web browsers, email
programs, file transfer(FTP). TCP ensures reliable transmission
of packets in order. Also provides error detection capability to
avoid duplicate packets an discard and lost packets can re
transmitted.
• UDP(User Datagram protocol)
Connectionless protocol and transaction oriented, useful for time
sensitive applications with small data exchanges and dont not
overhead. Also ensures reliable delivery or ensuring connections
created are realiable
Application Layer
➔ Interface with the lower layer protocols to send the
data over network.
• HTTP(Hypertext transfer protocol)
• CoAP(Constrained Application Protocol) used for M2M
applications with constrained devices and networks. Uses in
request response model
• WebSocket allows full duplex communication over a single
socket connection for sending messages between client and
server
• MQTT(Message Queue Telemetry Transport) is a light weight
messaging based on publish subscribe model.
• XMPP(Extensible Messaging and Presence Protocol is a real time
communication and streaming XML data between network
entities
• DDS(Data Distribution Service) is a data centric middleware
standard for M2M communication, uses publish subscribe
model
• AMQP(Advanced Message Queuing Protocol) supports point to
point and publish subscribe models.
1.9 IoT Enabling Technologies
● Wireless Sensor Networks
● Cloud Computing
● BigData Analytics
● Communication Protocols
● Embedded Systems
Wireless Sensor Networks (WSN)
● It is a collection of devices which communicate through wireless channels
● A WSN consists of distributed devices with sensors which are used to
monitor the environmental and physical conditions.
● A WSN consists of a number of end nodes, routers and coordinators.
● End nodes can also act as routers. A coordinator collects data from all
the nodes and is connected to Internet.
■ Weather monitoring systems
■ Indoor air quality monitoring systems
■ Soil moisture monitoring systems
■ Surveillance systems
■ Smart grids
■ Structural health monitoring systems
Cloud Computing
Cloud computing is a computing model in which applications and services are
delivered over Internet. The resources provisioned by cloud can be compute,
networking or storage. Cloud allows the users to access resources based on utility
model. The characteristics of cloud computing are:
● On demand: The resources in the cloud are available based on the traffic. If the
incoming traffic increases, the cloud resources scale up accordingly and when the
traffic decreases, the cloud resources scale down accordingly.
● Autonomic: The resource provisioning in the cloud happens with very less to no
human intervention. The resources scale up and scale down automatically.
● Scalable: The cloud resources scale up and scale down based on the demand or
traffic. This property of cloud is also known as elasticity.
● Pay-per-use: On contrary to traditional billing, the cloud resources are billed on
pay-per-use basis. You have to pay only for the resources and time for which you
are using those resources.
● Ubiquitous: You can access the cloud resources from anywhere in the world from
any device. All that is needed is Internet. Using Internet you can access your files,
databases and other resources in the cloud from anywhere.
Cloud computing offers three basic service models using which
users can subscribe to cloud resources. These service models are:
● Infrastructure-As-A-Service (IAAS)
● Platform-As-A-Service (PAAS)
● Software-As-A-Service (SAAS)

IAAS model provides the core infrastructure to companies for building


their own applications. This core infrastructure includes servers, storage,
networking, etc.
PAAS model offers development runtimes for the users to build and deploy
their application.
SAAS model offers already developed and deployed applications for the
users to use. Examples of SAAS offerings are Gmail, Facebook, DropBox,
YouTube, etc.
BigData Analytics
BigData is a collection of data coming from various types of sources. The data is
often huge which cannot be handled by the traditional databases and data
warehouses. BigData is often characterized by six Vs. They are:
● Volume: Refers to the huge volume of data aggregated from various sources.
● Variety: Refers to different types of data. Data can be structured,
semi-structured or unstructured.
● Velocity: Refers to the speed at which the data is generated. Now-a-days the
amount of data available on the Internet per minute is several peta bytes or even
more.
● Veracity: Refers to the degree to which the data can be trusted. If the data
collected is incorrect or has manipulated or wrong values, the analysis of such
data is useless.
● Value: Refers to the business value of the collected. Even though we have huge
amount of data, but it is not useful for gaining profits in the business, such data
is useless.
● Variability: Refers to the ways in which the big data can be used and
formatted.
Ex of big data generated by IoT systems are :
1. Sensor data generated by IoT systems such as
weather monitoring stations
2. Machine sensor data collected from sensors
embedded in industrial and energy systems for
monitoring their health and detecting failures
3. Health and fitness data generated by IoT devices
such as wearable fitness bands
4. Data generated by IoT systems for location and
tracking of vehicles
5. Data generated by retail inventory monitoring
systems
Communication Protocols
Communications protocols form the backbone for IoT
systems. They allow devices to communicate with each
other. Protocols define the data exchange formats, data
encoding and addressing schemes for devices.

Protocols also provide flow control, error control, and


other functions like sequence control

Sequence control(that helps in ordering packets determining


lost packets)

Flow control(that helps in controlling the rate at which the


sender is sending the data , the receiver or the network is not
overwhelmed)
Embedded Systems
Embedded system can be imagined as computing hardware with software
embedded in it. An embedded system is a microcontroller or
microprocessor based system which is designed to perform a specific task.
The key components include microcontroller/micrprocessor, memory,
networking units, I/O, and storage. It runs Real-Time Operating Systems
(RTOS).
An embedded system has three components. They are:
● Hardware
● Software
● Real Time Operating system (RTOS) that supervises the application
software and provide mechanism to let the processor run a process as per
schedule by following a plan to control the latencies
The characteristics of an embedded system are:
1.Single-functioned 4. Memory
2.Tightly constrained 5. Connected
3.Reactive and Real time
1.10 IoT Levels & Deployment Templates
An IoT system comprises of the following components:
• Device: An IoT device allows identification, remote
sensing, actuating and remote monitoring capabilities.
• Resource: Resources are software components on the
IoT device for accessing, processing, and storing sensor
information, or controlling actuators connected to the
device. Resources also include the software
components that enable network access for the
device.
• Controller Service: Controller service is a native
service that runs on the device and interacts with
the web services. Controller service sends data from
the device to the web service and receives
commands from the application (via web services)
for controlling the device.
• Database: Database can be either local or in the cloud
and stores the data generated by the IoT device.
• Web Service: Web services serve as a link between
the IoT device, application, database and analysis
components. Web service can be either implemented
using HTTP and REST principles (REST service) or
using WebSocket protocol (WebSocket service).
• Analysis Component: The Analysis Component is
responsible for analyzing the IoT data and generate
results in a form which are easy for the user to
understand.
• Application: IoT applications provide an interface that
the users can use to control and monitor various
aspects of the IoT system. Applications also allow
users to view the system status and view the
processed data.
IoT Level-1
• A level-1 IoT system has
a single node/device
that performs sensing
and/or actuation, stores
data, performs analysis
and hosts the
application
• Level-1 IoT systems
are suitable for
modeling low- cost
and low-complexity
solutions where the
data involved is not
big and the analysis
requirements are not
computationally
intensive.
IoT Level-2
• A level-2 IoT system has a
single node that performs
sensing and/or actuation
and local analysis.
• Data is stored in the cloud
and application is usually
cloud- based.
• Level-2 IoT systems are
suitable for solutions where
the data involved is big,
however, the primary
analysis requirement is not
computationally intensive
and can be done locally
itself.
IoT Level-3
• A level-3 IoT system has
a single node. Data is
stored and analyzed in
the cloud and application
is cloud- based.
• Level-3 IoT systems are
suitable for solutions
where the data involved
is big and the analysis
requirements are
computationally
intensive.
IoT Level-4
• A level-4 IoT system
has multiple nodes that
perform local analysis.
Data is stored in the
cloud and application
is cloud-based.
• Level-4 contains local
and cloud- based
observer nodes which
can subscribe to and
receive information
collected in the cloud
from IoT devices.
• Level-4 IoT systems are
suitable for solutions
where multiple nodes
are required, the data
involved is big and the
analysis requirements
are computationally
intensive.
IoT Level-5
• A level-5 IoT system has
multiple end nodes and one
coordinator node.
• The end nodes that perform
sensing and/or actuation.
• Coordinator node collects data
from the end nodes and sends
to the cloud.
• Data is stored and analyzed in
the cloud and application is
cloud-based.
• Level-5 IoT systems are
suitable for solutions based
on wireless sensor networks,
in which the data involved is
big and the analysis
requirements are
computationally intensive.
IoT Level-6
• A level-6 IoT system has
multiple independent end
nodes that perform sensing
and/or actuation and send
data to the cloud.
• Data is stored in the cloud
and application is
cloud-based.
• The analytics component
analyzes the data and stores
the results in the cloud
database.
• The results are visualized
with the cloud-based
application.
• The centralized controller is
aware of the status of all the
end nodes and sends control
commands to the nodes.
1.11 Sensors
● Sensors are such devices which are used to convert physical quantities,
events or characteristics into the electrical signals for the purpose of
monitoring and controlling.
● Sensor takes input from environment and converts into electrical form
then fed to the system or controller.
● Sensor works as an input device.
● For example- Thermocouple, photo cell, RTD, LVDT, strain gauge,
Load cell etc
Types of Sensor: Active Sensor & Passive Sensor
Active Sensor is requires an external source of power to operate

Passive Sensor is does not requires an external source of power to operate


1. Temperature: The temperate sensor records the amount of heat in a given setting.
It can be a machine, a room, a car, a lab, etc. This information can be used to take
the desired action, like changing the temperature to optimal settings. The same can
be automated according to some specific environmental conditions and settings.
2. Moisture: Where temperature sensors record the heat, moisture sensors record
the amount of humidity. They have a wide array of applications in the
environment, food supply chains, medicinal labs, agriculture, etc.
3. Light: Light sensors record and assess the ambient light settings in a defined area
and recommend actions to change the same. In your smartphone, when the
brightness is adjusted according to the exposure to light, the light sensor and the
electrical actuator play their part. In the modern homes that have automated light
settings, these sensors are used.
4. Motion: Motion sensors are usually installed in security systems and help detect
unauthorized activity. Upon sensing activity either by changes in the heat or
weight, the sensor activates an alarm system sending notifications to the right people.
Motion IoT sensors use radar, infrared, or ultrasonic waves to detect activity in
their vicinity.
5. Noise: Noise sensors, as the name suggests, record the noise levels in the given
environment. It can be an entire city, a room, a car, etc. In IoT, these sensors are used to
build safe working and living environments for people. They are also used to send
warning notifications to the right people when noise levels go beyond the stipulated
threshold limit.
6. Proximity: Motion sensors and proximity sensors can be kept in the same basket, as
the majority of their functions are similar. These sensors record activity nearby with the
help of electromagnetic waves, including infrared. They are used in cars, parking lots,
retail stores, stadiums, airports, and in several other places to notify the people about
their proximity to different components.
7. Level: From granular materials to semi-solid liquids, level sensors detect the quantity
or level of different substances. Manufacturing industries, particularly beverage,
water treatment, and waste management organizations, have the best use of level
sensors.
8. Accelerometers: Accelerometers are an impressive type of IoT sensor used to record
and measure an object’s acceleration. These types of sensors record the rate of change
of an object’s speed in relation to time. They have the added advantage of recording
changes in gravity. They can be popularly used in driving fleets and smart pedometers or
9. Gas: Gas sensors are used to detect changes in air quality. These sensors are
built to detect the presence of toxic, combustible, and other hazardous gasses
in a given area. Tje installation of this type of sensor in mining, oil, gas, and
energy organizations. They are also installed in smart homes and buildings
10. Optical: Optical sensors have several use cases but have become an important
part of driverless cars. These sensors are used to detect signals and signs to
provide information about the surrounding environment. In a driverless car,
these sensors are used to detect objects and signs on the road, send the signals to
the central control unit and dictate a change in behavior if required.
11. Gyroscope: These sensors are used to measure the velocity of a moving
object. Velocity refers to the speed and rotation of an object around its axis.
Gyroscope sensors are commonly used in car navigation systems and in stability
control systems.
12. Chemical: Chemical sensors and gas sensors in the same category. With
these sensors, measurements and detection of several types of chemicals. To
build IoT solutions in a factory setting, these sensors can play an important
role in ensuring workers' safety and that of the environment.
1.12Types of Actuators
1.Hydraulic: These actuators harness hydraulic power to perform mechanical functions and
operations. Generally, these types of actuators are powered by a cylinder or a fluid motor. The
mechanical motion is converted into oscillatory, linear, or rotary.

2. Pneumatic: Pneumatic actuators create two types of motions, rotary or linear. They are powered
by a vacuum or compressed air at high pressure to implement the required type of motion.
Compared to other types of actuators, pneumatic actuators are low-cost and low-maintenance
actuators.

3. Electrical: In these actuators, a motor converts electrical energy into mechanical motion. These
actuators are powered by electricity and provide precision control. These actuators are heavily used
in industrial settings to automate mechanical operations.

4. Thermal: The thermal actuators have thermal-sensitive material fitted inside, which is used to
produce linear motion. The word thermal implies that these actuators are used in response to
temperature changes. The most popular use case includes shutting off valves and operating latches
or switches.

5. Magnetic: These types of actuators convert electromagnetic energy into mechanical output and
operate in a linear or rotary direction. Magnetic actuators can provide continuous mechanical
operation and are popularly used in the automotive and aerospace industries.
Baseline Technologies

A number of technologies that are very closely


related to IoT include
• Machine-to-Machine (M2M) communications,
• Cyber-Physical-Systems (CPS)
• Web-of-Things (WoT).

You might also like