You are on page 1of 30

IoT Enabling Technologies

• Wireless Sensor Network


• Cloud Computing
• Big Data Analytics
• Communication Protocols
• Embedded Systems
• Security Protocols and architectures,
communication protocols,
• web services,
• Mobile Internet
• Semantic Search engines.
1. Wireless Sensor
Network
•Distributed Devices with sensors used to monitor
the
environmental and physical conditions

It is a network formed by large no. of sensor nodes to detect


light, heat , pressure ect.
i.e. used to monitor environmental and
physical conditions.
•Each node can have several sensors
attached to it.
• Each node can also acts as a
routers
• Coordinator collects data from all
nodes
• Coordinator acts as gateway that
connects WSN to the internet.
Examples of
WSNs
• Indoor Air Quality Monitoring system
• Weather Monitoring System
• Soil Moisture Monitoring System
• Survelliance Systems
• Health Monitoring Systems

Protocols used
WSNs are enabled by wireless communication protocols such as
IEEE802.15.4
Zigbee is one of the most popular wireless technology used by WSNs. Zigbee specifications are
based on IEEE802.15.4 which is used for low powered devices.
Data rate: up to 250KBps. Range: upto 100 Meters
•Weather monitoring system use WSNs in which the nodes
collect temperature humidity and other data which is
aggregated and analyzed.
•Indoor air quality monitoring systems use WSNs to collect
data on the indoor air quality and concentration of various
gases
•Soil moisture monitoring system use WSNs to monitor soil
moisture at various locations.
•Surveillance system use WSNs for collecting Surveillance
data (such as motion detection data)
•Smart grid use WSNs for monitoring the grid at various
points.
•Structural health monitoring system use WSNs to monitor the
health of structures ( buildings, bridges) by collecting
vibration data from sensor nodes de deployed at various points
in the structure
2. Cloud Computing
Internet based
Vs
local storage computing

• Deliver applications and services over internet


Provides computing, networking and storage
resources on demand
Cloud Computing is a way of
making use of virtual computer
world wide using the same
personalized experience.

Types of Cloud
computing
services
1. IaaS(Infrastruct
IaaS: Clients can use storage to install and manage operating systems and
any desired applications.( i.e Virtual machines + virtual storage)
Ex: Web Hosting.

• Paas : Clients can install, build and modify • Saas : Clients can access and use
or control applications.
software at remote location using a
Ex: App cloud, Google App Engine web browser.
Ex: Google documents
Benefits of Cloud Computing

1. It doesn’t require you to maintain or manage it(no need to have an IT


expert).
2. Effectively infinite size, so no need to worry about running out of
capacity.
3. You can access cloud based applications and services from
anywhere( Device independent ).
2. Big Data
Analytics
• Collection of data whose volume, velocity or variety is too large and
difficult to store, manage, process and analyze the data using
traditional databases.
• Big Data analytics is the process of collecting, organizing and
analyzing large sets of data (called Big Data) to discover
patterns and other useful information.

Big data Analytics involves


Data cleansing
Data munging (Data Wrangling)
Correcting Data Processing and
Removing Converting data from one format
Replacing Data Visualization to other
Big Data
Analytics
Characteristics of Big Data is 3V

Variety Includes different types of


data
Structured
Semi-Structured
Unstructured
All of above
Volume refers to the amount of
data
-text, audio ,
video Terabyte
Records
Velocity Refers to speed at which Transaction
data
is processed
s Files
Tables
Batch
Acc to IBM in 2012: 2.5
Real-time Billion GB
Streams data was generated everyday!
Examples
• Lots of data is being collected and warehoused
• Web data, e-commerce
• purchases at department/ grocery stores
• Bank/Credit Card transactions
• Social Network
Some examples of big data generated by IoT
systems are described as follows:
•Sensor data generated by IoT system such as weather
monitoring stations.
•Machine sensor data collected from sensors
embedded in industrial and energy systems for
monitoring their health and detecting Failures.
•Health and fitness data generated by IoT devices such
as wearable fitness bands
•Data generated by ioT systems for location and
tracking of vehicles
•Data generated by retail inventory monitoring
systems
3. Communication Protocols
• Backbone of IOT system
•Allows devices to exchange data over networks.
•A group of protocols designed to work together are
known as a protocol suite; when implemented in
software they are a protocol stack.
• Define data exchange formats
- Data encoding
In IoT we used MQTT, COAP, AMQP etc. protocols.
- Addressing Schemes
- Routing of packets from sources to destination
• Other Functions
- Sequence control(ordering data packets)
- Flow control(controlling transfer rate)
- Retransmission of lost packets
Bluetooth
Bluetooth is a global 2.4 GHz personal area network for short-range wireless
communication.  Device-to-device file transfers, wireless speakers, and wireless
headsets are often enabled with Bluetooth.
BLE
BLE is a version of Bluetooth designed for lower-powered devices that use less data.
To conserve power, BLE remains in sleep mode except when a connection is
initiated. This makes it ideal for wearable fitness trackers and health monitors.
ZigBee
The ZigBee protocol uses the 802.15.4 standard and operates in the 2.4 GHz
frequency range with 250 kbps. The maximum number of nodes in the network is
1024 with a range up to 200 meter. ZigBee can use 128 bit AES encryption.
Z-Wave
Z-Wave is a sub-GHz mesh network protocol, and is a proprietary stack. It operates
in the sub-1GHz band and is impervious to interference from WiFi and other
wireless technologies in the 2.4-GHz range such as Bluetooth or ZigBee. It’s often
used for security systems, home automation, and lighting controls.
4. Embedded Systems
•A microcontroller-based, software-driven, reliable, real-
time control system, designed to perform a specific task..
• It can be thought of as a computer hardware system having
software embedded in it.
• An embedded system can be either an independent system or a
part of a large system.
Embedded Systems found in..
Key Components
• Microprocessor or micro controller
• Memory (RAM, ROM ect.)
• Storage ( Flash Memory)
• Networking units(Ethernet, Wifi adaptors )
• I/O units ( Keyboard, display ect)

Some Embedded systems have

• DSP(Digital Signal Processor)


• Graphics Processor
• App Specific Processor

•Embedded systems run embedded OS


Ex: RTOS(Real Time OS)(like symbian, Vxworks , Windows
embedded compact ect.)
SDN

Software-Defined Networking (SDN) is


a networking architecture that
separates the control plane from the
data plane and centralizes the
network controller.
Software-based SDN controllers
maintain a unified view of the
network and make configuration,
management and provisioning
simpler.
The underlying infrastructure in SDN
uses simple packet forwarding
hardware as opposed to specialized
hardware in conventional networks.

Book website: http://www.internet-of-things-book.com Bahga & Madisetti, © 2015


Key Elements of SDN

Centralized Network Controller


With decoupled control and data planes and a centralized network controller,
the network administrators can rapidly configure the network.
Programmable Open APIs
SDN architecture supports programmable open APIs for interface between the
SDN application and control layers (Northbound interface).
Standard Communication Interface (OpenFlow)
SDN architecture uses a standard communication interface between the
control and infrastructure layers (Southbound interface).
OpenFlow, which is defined by the Open Networking Foundation (ONF), is the
broadly accepted SDN protocol for the Southbound interface.

Book website: http://www.internet-of-things-book.com Bahga & Madisetti, © 2015


NFV

Network Function Virtualization


(NFV) is a technology that
leverages virtualization to
consolidate the heterogeneous
network devices onto industry-
standard high-volume servers,
switches and storage.
NFV is complementary to SDN
as NFV can provide the
infrastructure on which SDN
can run.

Book website: http://www.internet-of-things-book.com Bahga & Madisetti, © 2015


Key Elements of NFV

Virtualized Network Function (VNF)


VNF is a software implementation of a network function which is capable of
running over the NFV Infrastructure (NFVI).
NFV Infrastructure (NFVI)
NFVI includes computer, network and storage resources that are virtualized.
NFV Management and Orchestration
NFV Management and Orchestration focuses on all virtualization-specific
management tasks and covers the orchestration and life-cycle management
of physical and/or software resources that support infrastructure
virtualization and the life-cycle management of VNFs.

Book website: http://www.internet-of-things-book.com Bahga & Madisetti, © 2015


NFV – Use Case

NFV can be used to virtualize the Home Gateway. The NFV Infrastructure in the cloud hosts a
virtualized Home Gateway. The virtualized gateway provides private IP addresses to the devices in
the home. The virtualized gateway also connects to network services such as VoIP and IPTV.

Book website: http://www.internet-of-things-book.com Bahga & Madisetti, © 2015

You might also like