You are on page 1of 37

IOT and Applications

Chapter: 1

IOT and Web Technology


IoT:Definitin, various application areas of IoT

• A global infrastructure for the information society, enabling advanced


services by interconnecting things based on existing and evolving inter-
operable information and communication technology.

• Appliations:
 Smart Home
 Smart Cities
 Wearables
 Connected Cars
 Smart Retail
 Smart Healthcare
Time for convergence for IoT
• Smartphones cannot run user-driven applications which are connected
to sensors. Some applications are there but they still do not work.
Continue......
• The Coherence of object capabilities and behaviour:
 Large number of objects available with sensing and actuation capablities for
information proceeding

• The Coherence of application interactivity:


 The application interaction will increase, the complexity will increase and the
boundries between the applications will be unsclear to a hih degree

• The Coherence of corresponding technology approaches:


Development of robotics, smart cities, the future internet will evolve and
ultimately merge with IOT

• The Coherence of real and virtual world:


The real and virtual world are seen as two antagonistic conceptions but they
will converge with the help of IOT in future
Issues of IoT:
• How will the devices be named and organized?
• How will the devices communicate with each other?
• How is the performance measurement and optimized?
• How are security and privacy ensured?
• How will the devices be maintained?
M2M : reasons for shifting from M2M to IoT
• M2M: Machine to Machine(M2M ) is a broad label that can be used to
describe any technology that enables networked devices to exchange
information and perform actions without the manual assistance of humans
• Factors responsible for shift from M2M to IOT:
 Moving away from an isolated environment to an open
environment
 Use of IP and web as a technology toolbox
 Current Internet as a foundation for enterprise and
government operations
 Multimodal sensing and actuation
 Knowledge creating technologies
 general move towards horizontal layering of both
technology and business
Smart parking application of IoT:
• not only be aware of the occupancy status but also guides the user to it too.
• no human intervention in this parking system
• Occupancy sensors which will check if the slot is occupied by car or not
• Gateway devices : transmit the occupancy status to the server
• Collect the data from sensor and send it to server
• Server: Calculte which slots are empty based on the data
• then it will communicate with the user mobile application, show the parking
map and the empty slots
• this way the user will not have to find empty slots. save time, money and
energy
The smart home application of
IoT:
• the most popular applications of IoT.
• devices turning off after leaving home or turning on before reaching
• save time , money and energy
• every appliance, sensor and service in the home will be connected to
the internet.
• everything accessed by an application on the smartphone
eHealth IoT applications
• a huge impact on the healthcare sector.
• some of the application of IoT in eHealth.

 Remote monitoring systems and emergency notification system: measure


blood pressure and heart rate by wearing IOT deavice. more advanced devices
to monitor specialized implants in future.
Real time location monitoring system: check patient's location and reach
immediately in case of emergency.wheelchair, pump can be tagged and
reached easily.
Patient's data will be uploaded to the cloud: Medical person can find without
patient's help. Bring down medical cost and improve quality. Faster and
affordable to patients.
Continue.....
 Research area in Health Sector: New things and concept which they can
make reachable to patient with the help of IOT devices. ex. app for patients
to guide them about medicine.

• There are lot of issues that the manufactures will have to face in order to
achieve this. some of the issuses are:
 Meeting the demand for number of resources
 Motivate people to share their medical information online
 keep the services at reasonable cost
 Real Timeliness
 Developing smart hospitals
security concerns for the smart
home.
• The biggest security concerns for smart home:
1)Hacking the connected thermostats:
• A thermostat: a device which is connected to the internet and
maintains temperature of the house.
• hacking of thermostat : how many people are there, their schedules
and sleep timimngs as every mentioned thing affects the temperature
2) Hacking the Smart TV:
• Some smart tvs come with the camera that can be hacked
• spy on you and family when tv is not turned on
Continue.....
3) Hacking the Security Systems:
• Security systems like door ocks, cameras etc with the help of mobile
app
• if someone hacks then they can enter in home and spy on you using
cameras
4) Eavsdropping :
• Hack the communication systems like email, Phone calls etc and can
steal valuable informtion
5) Hacking the lighting system:
• by hacking them, they can change the amount of power the house
is consuming and make financial losses.
Reasons to converge the
technologies and shift to IoT.
• Improved customer engagement and communication
• Support for wide range of data collection
• Automation in almost object
• Improves the quality of life of people
• Saves time
• Saves Money
• Optimizes technology
Research directions for IoT.
• The goal of the IoT Strategic Research Agenda is to direct the research
efforts to focus areas of identified significant value creation.
• The latest computing and communication technologies are going to
transform corporate and personal environment radically.
• Cloud Networking, nano-electronics, network virtulization etc require
an internet connection all the time.
• Mobile data traffic will increase rapidly and mobile operators are facin a
problem to provide the required bandwidth to the customers due to
that.
• The extra frequency spectrum is not available in some countries.
Continue.....
• So, there can be am integration of existing Wi-Fi network into the mobile eco-system
and will have big impact on IOT eco-system
• The architecture of mobile devices will change as the baseband chip takes control of
the routine process. So, it is necessary to develop a chip that integrates all the
process. it is called a multicom chip.
• Today many european projects address IOT Technologies, knowledge and also it has
been mentioned that these topics can be heterogeneous and specialized also there is
a strong need for integration of the individual results.
• In this context, the integration of knowlege has been conceptualized as the process
through which some specialized cognizance situated in multiple projects across
europe is applied and assimilated.
• The agenda of strategic research and innovation has been developed with the proper
support of a european-led community of interrelated projects and stakeholders with
dedication to the innovation, creation, development and use of IOT technology
security concerns for the
industry in IoT
• These are some of the major security concerns for industries:
1)Rush in production:
•The consumer demand is increasing day by day and industries are
not focusing on security of the products that they produce in order to
meet the demands quickly
•This can lead to hazardous results
• It can cause problems like malware vulnerabilities, Man in the
middle, DDoS attacks
Continue.....
2) No Standardization:
• No firm standards that the companies have to follow while developing their
products
•This can lead to security issues on some devices
• So standardization is necessary when we are talking about every device
being connected to the internet.
3) Privacy:
• Privacy is huge concern for industries.
•Information that the user communicates with the device will be going on
the internet
•So, the industries have to ensure the safety of that data. otherwise, the
users will lose their trust and the idea of IOT can fail.
Continue.....
4) Protecting from other corporations:
• Some users may not want to share their data with everything
• So protecting the data from other corporation is equally important as protecting
it from hackers
5) Upgrades :
• Mostly the computer upgrade the software by itself as the users are too lazy to
do that.
• But when we talk about IOT, the safety of your data is in the user's hands. so, this
will require the user to update every software and device every time and that can
raise some security issues.
6)More devices, more problems:
• The number of increasing devices connected to Internet. Problems will increase as
the number of IOT devices increase
• Huge challenge for Industries to handle such big data and maintain its security.
IoT Protocols
• Link Layer
• 802.3 – Ethernet
• 802.11 – WiFi
• 802.16 – WiMax
• 802.15.4 – LR-WPAN
• 2G/3G/4G
• Network/Internet Layer
• IPv4
• IPv6
• 6LoWPAN
• Transport Layer
• TCP
• UDP
• Application Layer
• HTTP
• CoAP
• WebSocket
• MQTT
• XMPP
• DDS
• AMQP

Bahga & Madisetti, © 2015


Book website: http://www.internet-of-things-book.com
Logical Design of IoT

• Logical design of an IoT system


refers to an abstract
representation of the entities
and processes without going
into the low-level specifics of
the implementation.

• An IoT system comprises of a


number of functional blocks
that provide the system the
capabilities for identification,
sensing, actuation,
communication, and
management.

Bahga & Madisetti, © 2015


Book website: http://www.internet-of-things-book.com
Request-Response communication model

• Request-Response is a
communication model in which
the client sends requests to
the server and the server
responds to the requests.

• When the server receives a


request, it decides how to
respond, fetches the data,
retrieves resource
representations, prepares
the response, and then
sends the response to the
client.
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
Publish-Subscribe communication model

• Publish-Subscribe is a
communication model that
involves publishers, brokers and
consumers.
• Publishers are the source of data.
Publishers send the data to the
topics which are managed by the
broker. Publishers are not aware
of the consumers.
• Consumers subscribe to the topics
which are managed by the broker.
• When the broker receives data for
a topic from the publisher, it
sends the data to all the
subscribed consumers.

Bahga & Madisetti, © 2015


Book website: http://www.internet-of-things-book.com
Push-Pull communication model

• Push-Pull is a communication
model in which the data
producers push the data to
queues and the consumers pull
the data from the queues.
Producers do not need to be
aware of the consumers.
• Queues help in decoupling the
messaging between the producers
and consumers.
• Queues also act as a buffer which
helps in situations when there is a
mismatch between the rate at
which the producers push data
and the rate rate at which the
consumers pull data.

Bahga & Madisetti, © 2015


Book website: http://www.internet-of-things-book.com
Exclusive Pair communication model
• Exclusive Pair is a
bidirectional, fully duplex
communication model that
uses a persistent connection
between the client and
server.
• Once the connection is setup
it remains open until the
client sends a request to
close the connection.
• Client and server can send
messages to each other after
connection setup.

Bahga & Madisetti, © 2015


Book website: http://www.internet-of-things-book.com
REST-based Communication APIs

• Representational State Transfer


(REST) is a set of architectural
principles by which you can design
web services and web APIs that
focus on a system’s resources and
how resource states are
addressed and transferred.
• REST APIs follow the request-
response communication model.
• The REST architectural constraints
apply to the components,
connectors, and data elements,
within a distributed hypermedia
system.

Bahga & Madisetti, © 2015


Book website: http://www.internet-of-things-book.com
WebSocket-based Communication APIs
• WebSocket APIs allow bi-
directional, full duplex
communication between
clients and servers.
• WebSocket APIs follow the
exclusive pair
communication model

Bahga & Madisetti, © 2015


Book website: http://www.internet-of-things-book.com
IoT Levels & Deployment Templates
An IoT system comprises of the following components:
• Device: An IoT device allows identification, remote sensing, actuating and
remote monitoring capabilities. You learned about various examples of IoT
devices in section
• Resource: Resources are software components on the IoT device for
accessing, processing, and storing sensor information, or controlling
actuators connected to the device. Resources also include the
software components that enable network access for the device.
• Controller Service: Controller service is a native service that runs on
the device and interacts with the web services. Controller service sends
data from the device to the web service and receives commands from
the application (via web services) for controlling the device.

Bahga & Madisetti, © 2015


Book website: http://www.internet-of-things-book.com
IoT Levels & Deployment Templates
• Database: Database can be either local or in the cloud and stores the data
generated by the IoT device.
• Web Service: Web services serve as a link between the IoT device,
application, database and analysis components. Web service can be
either implemented using HTTP and REST principles (REST service) or using
WebSocket protocol (WebSocket service).
• Analysis Component: The Analysis Component is responsible for analyzing
the IoT data and generate results in a form which are easy for the user to
understand.
• Application: IoT applications provide an interface that the users can use to
control and monitor various aspects of the IoT system. Applications also
allow users to view the system status and view the processed data.

Bahga & Madisetti, © 2015


Book website: http://www.internet-of-things-book.com
IoT Level-1
• A level-1 IoT system has a
single node/device that
performs sensing and/or
actuation, stores data,
performs analysis and hosts
the application
• Level-1 IoT systems are
suitable for modeling low-
cost and low-complexity
solutions where the data
involved is not big and the
analysis requirements are
not computationally
intensive.

Bahga & Madisetti, © 2015


Book website: http://www.internet-of-things-book.com
IoT Level-2

• A level-2 IoT system has a


single node that performs
sensing and/or actuation and
local analysis.
• Data is stored in the cloud and
application is usually cloud-
based.
• Level-2 IoT systems are
suitable for solutions where
the data involved is big,
however, the primary analysis
requirement is not
computationally intensive and
can be done locally itself.
Bahga & Madisetti, © 2015
Book website: http://www.internet-of-things-book.com
IoT Level-3
• A level-3 IoT system has a
single node. Data is
stored and analyzed in the
cloud and application is
cloud- based.
• Level-3 IoT systems are
suitable for solutions
where the data involved is
big and the analysis
requirements are
computationally intensive.

Bahga & Madisetti, © 2015


Book website: http://www.internet-of-things-book.com
IoT Level-4

• A level-4 IoT system has multiple


nodes that perform local analysis.
Data is stored in the cloud and
application is cloud-based.
• Level-4 contains local and cloud-
based observer nodes which can
subscribe to and receive
information collected in the cloud
from IoT devices.
• Level-4 IoT systems are suitable
for solutions where multiple
nodes are required, the data
involved is big and the analysis
requirements are computationally
intensive.

Bahga & Madisetti, © 2015


Book website: http://www.internet-of-things-book.com
IoT Level-5

• A level-5 IoT system has multiple end


nodes and one coordinator node.
• The end nodes that perform sensing
and/or actuation.
• Coordinator node collects data from
the end nodes and sends to the cloud.
• Data is stored and analyzed in the
cloud and application is cloud-based.
• Level-5 IoT systems are suitable for
solutions based on wireless sensor
networks, in which the data involved
is big and the analysis requirements
are computationally intensive.

Bahga & Madisetti, © 2015


Book website: http://www.internet-of-things-book.com
IoT Level-6

• A level-6 IoT system has multiple


independent end nodes that
perform sensing and/or actuation
and send data to the cloud.
• Data is stored in the cloud and
application is cloud-based.
• The analytics component analyzes
the data and stores the results in
the cloud database.
• The results are visualized with the
cloud-based application.
• The centralized controller is aware
of the status of all the end nodes
and sends control commands to
the nodes.

Bahga & Madisetti, © 2015


Book website: http://www.internet-of-things-book.com
Thank You.....

You might also like