You are on page 1of 49

CSE 3009 Internet of Things

FALL 20-21

Module 3

Dr. M.Sudha
Associate Professor
School of Information technology & Engineering

Content Source : Arshdeep Bahga and Vijay Madisetti, Internet of Things A Hand-on Approach, Universities press, 2015
Text Books :
1. Dieter Uckelmann et.al, Architecting the Internet of Things, Springer, 2011
2. Arshdeep Bahga and Vijay Madisetti, Internet of Things A Hand-on Approach, Universities press, 2015
Module 3
• Four pillars of IOT paradigm,
• RFID, Wireless Sensor Networks,
• SCADA (Supervisory Control and Data Acquisition)
• M2M - IOT Enabling Technologies
• Big Data Analytics
• Cloud Computing
• Embedded Systems.
RFID : Radio frequency identification system

• Radio frequency identification system (RFID) is a technology that


captures digital data encoded in smart labels and RFID tags through a
reader via radio waves.
• RFID serves a similar purpose to that of a bar code or a magnetic
strip of an ATM card where data from a label or tag is captured by
the device and then later stored in the database.
• However, RFID works better than a barcode and ATM magnetic strips.
The most significant advantage of using RFID over barcode is that it
doesn’t need to be placed or positioned relative to the scanner.
RFID: How Does it Work?

• At a simple level, RFID systems consist of three components:


1. an RFID tag or smart label,
2. an RFID reader, and
3. an antenna.
• RFID tags contain an integrated circuit and an antenna, which are
used to transmit data to the RFID reader (also called an interrogator).
• The reader then converts the radio waves to a more usable form of
data. Information collected from the tags is then transferred through
a communications interface to a host computer system where the
data can be stored in a database and analyzed later.
The major part that RFID
• The major part that RFID consists of are:
• 1. RFID tag
• 2. RFID reader
• RFID Tag
• An RFID tag consists of an embedded transmitter and a receiver. RFID
component comprises two parts:
• Integrated circuit: It’s used for storing and processing the information.
• Antenna: It’s used to transmit and receive signals.
• RFID tags also have non-volatile memory storage, which includes either
programmable or fixed logic for sensor data and transmission.
RFID Tags can be categorized as:
• Passive: This tag remains dormant since it has no battery. It uses the reader’s
signal energy to turn on the tag along with reflecting a signal back to the
reader that carries the information.
• Active: Active RFID tags have a battery in it that transmits signals periodically.
These tags have a range of up to 100 meters due to the presence of a battery.
Due to this, active tags are useful in location tracking applications.
• Battery-assistive passive: These tags do contain a battery, but it doesn’t
transmit signals periodically like that of active RFID tags.

• The battery is used to turn the tag when it receives a signal, which enables all
the energy from the reader’s signal to reflect.
RFID Reader

• An RFID reader consists of an interrogator, which is nothing but a two-way


radio-transmitted receiver, also known as a transceiver.
• The prime function of a transceiver is to transmit an encoded signal that
activates the tag.
• In response, the tag transponder initiates the conversion of radio signals into
usable power along with responding to the reader.
• RFID also has a key application in defense. It’s used for weapon and
soldier’s movement tracking.
• RFID can be useful to track the movement and health of animals on a
farm. 
SCADA and IoT
What is SCADA?
Supervisory Control And Data Acquistion
- Collect measurements and status data from the process
- Remotely intervene in the process
- Centralized system platform
- Based on distributed I/O

Applicable Processes
- Oil or Gas prodcution facilities
- Piplelines for gas, oils, chemicals or water.
- Railway/Transportation Process
- Nuclear, Gas, Hyrdo generation plants
The typical control room
What is controlled by SCADA
• Tap changers
• Switching devices
• Shunt capacitor/reactor
• Generator setpoints
• Excitation & power
output
• Sequential control
SCADA architecture

Reference: C37.1-2007 IEEE Standard for SCADA and Automation Systems


SCADA Components

Human Machine Interface - HMI


• Communication between operator
and machine
• Input
- Mouse, keyboard, touch screen
• Output
- Screen, audio, print-outs or mimic
board
• A weak link
- Information
overload/misinterpretation
SACAD Component: Application Servers
• Application servers provide the computing platform for the
SCADA System, included servers are:
- Real-time database
- Historical database
- Energy Management applications
• State Estimation
• Optimal/Dispatcher Powerflow
• Voltage Stability Assessment
• Etc….
- Geographic Information Systems
• Distribution Management
SCADA Components : System Configuration Servers
• Allows configuration of the SCADA system
environment, typical servers include:
- Data engineering of the SCADA system providing manual
data entry into the SCADA topology database including
lidnes, circuitbreakers, stations, …..

-SubstationdDevice configuration, such as IED


configuration tools and databses of IED configuration.
Remote access tools for configuration
Data Engineering
RUN TIME ENVIRONMENT
ENGINEERING ENVIRONMENT RUN TIME ENVIRONMENT

DE 400

Data Entry A-

B-

Graphical Editor C-

Forms

Import

Customer's Oracle Avanti Present


MDB Data Loading PDB
Data Source

Picture
generator Picture files
SCADA components - Communication Servers

• Variety of servers for communication


- Communication to other Control centers using ICCP
- Communication to office applications
SCADA components

Communication Front End


• Manages communication with the field devices
• Supports communication with variety of protocols
• Cyclic polling and event based communication, provides messages queuing
SCADA Components

Remote Terminal
• A remote terminal unit (RTU) is a microprocessors- controlled
electronic device that interfaces objects in the physical world to a
distributed control systems or SCADA by transmitting telemetry
data to the system, and by using messages from the supervisory
system to control connected objects.
Communication Topologies
• Radial serial circuit

• Multi-drop circuit
Networked solutions

Communication between Master Station (Front End) is via


TCP/IP over a shared Wide Are Network

Reference: C37.1-2007 IEEE Standard for SCADA and Automation Systems


Communication Principles
• Cyclic Polling
- Front-End communication server requests data periodically from
each RTU.
- Period times vary from 2-4 up to 10-15 seconds.
- Real-time?

• Report By Exception
- Cyclic polling as above
- RTU only responds if a value has changed

• Balanced protocols
- The RTU can send a request to be polled by the Front-End
Communication
• Wide Area Network
- Analog point to point and multi-point modem networks
- Frame relay/Cell relay type point to point and multi-point
networks
- Wireless Radio/Satellite networks
- Fiber-optic based networks

• Protocols
- Modbus
- Profibus
- IEC60870-5-101,104
- DNP 3
- IEC61850-90-2
- IEC60870-6-ICCP (between control centers)
SCADA functions
• Data acquisition
• Analog and discrete values
• Event and alarm processing
• Event and alarm
• Control
• Tap changer
• Shut capacitor/reactor
• Switching devices
• Generator excitation (AGC)
• Data storage, archiving and analysis
Data acquisition
• Points
- Measured values
• Pseudo points
- Derived values
• Scan
- process by which data acquisition
system interrogates RTU/IED
• Scanning rate
- 1 sample/2 seconds
• Time skew
- elapsed time between the first
measurement and the final
measurement is taken

Reference: North-Corte Green Control & Automation ofElectric


SCADA: Data Acquisition (Cont.)
• Measurements and Status Indications Collected are
stored in a Real Time Database.

• The Values are Time tagged in the database.

• As new Values come in from the RTUs/IEDs old values are


overwritten (or archived).
Monitoring and Event Processing
• Events
• Changing positions
• Breaker / Disconnector opens or closes
• Value above/below a threshold
• Equipment activated
• Reactor or capacitor engaged
• Automatic changes
• On load tap changer changes state
• Alarms
• Critical events
• It is a matter of definition
Alarm and Event Management
Alarm list

Breaker
opens

Event list
Event and alarm
• Events
• Changing positions
– Breaker/Disconnector opens or closes
– Value above/below a threshold
• Equipment activated
– Reactor or capacitor engaged
• Automatic changes
– tap changer changes its position
• Alarms
– Criticality
– Sensitivity‘’’’
Timestamping
• Sequence of events is often important in analysis of chains
of events

• Time stamping of Events


- As close as possible to the source. For example the IED that
collected the measurement
- Requires time synchronisation of distributed devices
- Additional Time-stamp at Front-End
SCADA: Data Storage, Archiving and
Analysis
• Data Collected from the process is sometimes archived, this
due to many reasons:
• Regulations
• Billing
• Future Load planning
• Performance Audits
• Post Mortem Review, in case of disturbances or
interruptions in the process.

• Changed Values are “archived” at cyclic intervals, the interval depends on the
importance of the values. Examples of cyclic intervals are: every scan interval, every
10 seconds or every hour.
Sequence of Events recorders

• Local function implemented in Substation Controller that


keeps a record of all events in the substation

• Not all events are sent to the SCADA system

• SER logfiles can be uploaded to the SCADA system to enable


analysis
SCADA: Control Functions
• Individual Device Control
• Direct open/close commands to individual devices
• Check-back before Operate function.

• Control Messages to Regulating Equipment


• E.g. Raising or lowering tap changer taps
• Sequential Control
• E.g. in the case of a set of sequential switching steps to restore power
through predefined backup configuration.
• Automatic Control
• Triggered by an event of lapse of specific time period that invokes a control
actions
• E.g. automatically changing load tab changer due to voltage set point
violation
Outline

• M2M
• Differences and Similarities between M2M and IoT
M2M or Machine to Machine
• M2M concept refers to two or more machines can communicate with
each other and carry out certain functions without human intervention.
Some degree of intelligence can be observed in the M2M model.
• key applications which leverage M2M technology to provide services -
1. Warehouse Management Systems (WMS)
2. Supply Chain Management (SCM)
3. Harvesting energy like oil and gas
4. Customer billing like smart meters
5. Traffic control
6. telemedicine
7. Remote monitoring
IoT or Internet of Things
• IoT refers is an ecosystem of connected devices (via the Internet) where
the devices have the ability to collect and transfer data over a network
 automatically without human intervention. IoT helps objects to interact
with internal and/or external environment which in turn control the 
decision making.
• Applications and services of IOT Technology are –
1. Smart Home
2. Connected cars
3. Agriculture and Retail
4. Smart cities
5. Healthcare
6. Poultry and Farming
M2M vs IoT
Machine-to-Machine (M2M)
• Machine-to-Machine (M2M) refers to networking of machines (or
devices) for the purpose of remote monitoring and control and data
exchange.
Machine-to-Machine (M2M)
• An M2M area network comprises of machines (or M2M nodes) which
have embedded hardware modules for sensing, actuation and
communication.
• Various communication protocols can be used for M2M local area
networks such as ZigBee, Bluetooh, ModBus, M-Bus, Wirless M-Bus,
Power Line Communication (PLC), 6LoWPAN, IEEE 802.15.4, etc.
• The communication network provides connectivity to remote M2M
area networks.
• The communication network can use either wired or wireless networks
(IP- based).
• While the M2M area networks use either proprietary or non-IP
based communication protocols, the communication network uses
IP-based networks.
M2M gateway
• Since non-IP based protocols are used within M2M area networks,
the M2M nodes within one network cannot communicate with
nodes in an external network.
• To enable the communication between remote M2M area
networks, M2M gateways are used.
Difference between IoT and M2M

• Communication Protocols
• M2M and IoT can differ in how the communication between the machines or
devices happens.
• M2M uses either proprietary or non-IP based communication protocols for
communication within the M2M area networks.
• Machines in M2M vs Things in IoT
• The "Things" in IoT refers to physical objects that have unique identifiers and
can sense and communicate with their external environment (and user
applications) or their internal physical states.
• M2M systems, in contrast to IoT, typically have homogeneous machine types
within an M2M area network.

Book website: http://www.internet-of-things-book.com


Bahga & Madisetti, © 2015
Difference between IoT and M2M
• Hardware vs Software Emphasis
• While the emphasis of M2M is more on hardware with embedded modules, the
emphasis of IoT is more on software.
• Data Collection & Analysis
• M2M data is collected in point solutions and often in on-premises storage
infrastructure.
• In contrast to M2M, the data in IoT is collected in the cloud (can be public, private or
hybrid cloud).
• Applications
• M2M data is collected in point solutions and can be accessed by on-premises applications
such as diagnosis applications, service management applications, and on- premisis
enterprise applications.
• IoT data is collected in the cloud and can be accessed by cloud applications such as
analytics applications, enterprise applications, remote diagnosis and management
applications, etc.
Communication in IoT vs M2M
SDN
• Software-Defined Networking (SDN) is a
networking architecture that separates
the control plane from the data plane
and centralizes the network controller.
• Software-based SDN controllers maintain
a unified view of the network and make
confi guration, management and
provisioning simpler.
• The underlying infrastructure in SDN uses
simple packet forwarding hardware as
opposed to specialized hardware in
conventional networks.
Key elements of SDN
• Centralized Network Controller
• With decoupled control and data planes and centralized network controller,
the network administrators can rapidly configure the network.
• Programmable Open APIs
• SDN architecture supports programmable open APIs for interface between
the SDN application and control layers (Northbound interface).
• Standard Communication Interface (OpenFlow)
• SDN architecture uses a standard communication interface between the
control and infrastructure layers (Southbound interface).
• OpenFlow, which is defined by the Open Networking Foundation (ONF) is
the broadly accepted SDN protocol for the Southbound interface.
NFV
• Network Function Virtualization (NFV)
is a technology that leverages
virtualization to consolidate the
heterogeneous network devices onto
industry standard high volume
servers, switches and storage.
• NFV is complementary to SDN as NFV
can provide the infrastructure on
which SDN can run.
Key elements of NFV
• Virtualized Network Function (VNF):
• VNF is a software implementation of a network function which is capable of running
over the NFV Infrastructure (NFVI).
• NFV Infrastructure (NFVI):
• NFVI includes compute, network and storage resources that are virtualized.
• NFV Management and Orchestration:
• NFV Management and Orchestration focuses on all virtualization-specific
management tasks and covers the orchestration and life-cycle management of
physical and/or software resources that support the infrastructure virtualization,
and the life-cycle management of VNFs.
NFV Use Case
• NFV can be used to virtualize the Home Gateway. The NFV infrastructure in the cloud hosts
a virtualized Home Gateway. The virtualized gateway provides private IP addresses to the
devices in the home. The virtualized gateway also connects to network services such as VoIP
and IPTV.

You might also like