Internet of Things - CHP 1
Internet of Things - CHP 1
Internet of Things - CHP 1
Internet of Things (IoT) refers to a network of physical devices, vehicles, home appliances, and
other objects embedded with sensors, software, and other technologies to connect and exchange
data with other devices and systems over the internet. These devices are often equipped with
unique identifiers (UIDs) and the capability to transmit data without requiring human-to-human
or human-to-computer interaction.
Characteristics of IoT
1. Connectivity:
○ IoT devices must be connected to a network (usually the internet) to communicate
and exchange data with other devices, servers, or applications. This connectivity
is the backbone of IoT, enabling devices to send and receive information.
2. Interactivity:
○ IoT devices can interact with each other and with users. They can respond to
commands or queries and even take autonomous actions based on pre-defined
rules or data analytics.
3. Sensors and Actuators:
○ Sensors in IoT devices gather data from the environment, while actuators can
perform actions based on the data received or processed. For example, a
thermostat (sensor) detects the room temperature, and an actuator adjusts the
heating or cooling system accordingly.
4. Real-Time Data Collection and Analysis:
○ IoT systems typically collect and analyze data in real time, allowing for timely
responses or decision-making. This is crucial in applications like smart cities,
healthcare monitoring, and industrial automation.
5. Scalability:
○ IoT networks can scale from a few devices to billions, managing vast amounts of
data and ensuring that the network can grow to accommodate more devices and
more data.
6. Intelligence:
○ IoT devices can use algorithms, artificial intelligence (AI), and machine learning
(ML) to process data, make decisions, and improve efficiency. This intelligence
allows IoT systems to adapt to changing conditions and optimize performance.
7. Heterogeneity:
○ IoT systems involve diverse devices with different hardware, software, and
communication protocols. Despite this heterogeneity, they must work seamlessly
together within the network.
8. Security:
○ With so many devices connected to the internet, IoT systems face significant
security challenges. Ensuring data privacy, secure communication, and protecting
against unauthorized access are crucial aspects of IoT security.
9. Energy Efficiency:
○ Many IoT devices are battery-powered, so energy efficiency is critical. Devices
must be designed to consume minimal power, often using low-power
communication protocols and energy-efficient sensors.
10. Autonomy:
○ IoT devices can often operate independently without human intervention. They
can perform tasks, make decisions, and even self-heal by detecting and correcting
errors automatically.
Q2. IOT Protocol
Ans.
IoT Protocols and Their Types
IoT Protocols are the foundational elements that enable seamless communication between
devices and networks in the Internet of Things (IoT). They provide the rules and standards
governing data exchange, ensuring interoperability and efficient operation.
1. Transmission Protocols:
○ Wi-Fi: Widely used for indoor and outdoor connectivity, offering high data rates
and relatively low power consumption.
○ Bluetooth: Ideal for short-range, low-power connections, often used for personal
area networks (PANs).
○ Zigbee: A low-power, mesh networking protocol designed for home automation
and industrial applications.
○ LoRaWAN: A long-range, low-power wide area network (LPWAN) protocol
suitable for IoT applications requiring extended coverage and minimal energy
consumption.
○ NB-IoT: A narrowband IoT technology designed for low-data-rate, low-power
applications, often used in cellular networks.
2. Application Layer Protocols:
○ MQTT (Message Queuing Telemetry Transport): A lightweight,
publish-subscribe protocol for IoT devices, providing efficient communication
and low overhead.
○ HTTP (Hypertext Transfer Protocol): A widely used protocol for web-based
communication, often used in IoT applications that require web-based interfaces
or data exchange.
○ CoAP (Constrained Application Protocol): A specialized protocol designed for
resource-constrained IoT devices, offering efficient communication over UDP.
○ LWM2M (Lightweight M2M): A standardized protocol for managing and
controlling IoT devices,providing a unified framework for device interactions.
3. Transport Layer Protocols:
○ TCP (Transmission Control Protocol): A reliable, connection-oriented protocol
that guarantees delivery of data packets, often used for applications requiring high
reliability.
○ UDP (User Datagram Protocol): A connectionless protocol that provides
best-effort delivery, suitable for applications where reliability is not critical and
efficiency is prioritized.
Factors to Consider When Choosing IoT Protocols
These functional blocks are made up of devices that handle interactions between a web
server and the client, enable controls and monitoring functions, manage data transfer, secure
the IoT system through authentication and various purposes, and offer an interface for
monitoring and managing various concepts. Let’s gather more information about the IoT
Functional Blocks.
Sensor/Actuator block
The sensor/actuator block serves as the data entry point in an IoT system. Sensors collect
data from their surroundings, whereas actuators drive physical processes. Sensors gather data
on temperature, humidity, light, motion, and other variables, whereas actuators turn on lights,
open doors, and control machines. These gadgets work together to collect data and operate in
the physical world.
Connectivity Block
Once the sensor/actuator block has collected data, it must be sent to the remainder of the
system. This is when the connection block enters the picture. The connectivity block is in
charge of creating and managing communication channels amongst IoT system devices. This
can be accomplished with the use of several technologies such as Wi-Fi, Bluetooth, ZigBee,
and cellular networks.
Application Block
The application block is the component of the IoT system that gives value to the end user.
This block is in charge of utilizing the processed data to provide a specified function or
service. An application block, for example, could be used to provide insights into energy
usage in a building or to adjust the temperature in a greenhouse.
Security Block
The security block is in charge of assuring the IoT system's security and protection against
illegal access. This block is in charge of authentication and authorization, as well as data
encryption during transmission and storage. It also handles intrusion detection and response,
assisting in the prevention and mitigation of threats.
Management Block
The management block is in charge of overseeing the overall operation of the IoT system.
This block is capable of handling device configuration, firmware updates, and system
monitoring. It can also give analytics and reporting, allowing system administrators to
understand how the system is operating and find areas for improvement.
Q4. Communication Model In IOT
Ans.
IoT devices are found everywhere and will enable circulatory intelligence in the
future. For operational perception, it is important and useful to understand how
various IoT devices communicate with each other. Communication models used
in IoT have great value. The IoTs allow people and things to be connected any
time, any space, with anything and anyone, using any network and any service.
● The client, when required, requests the information from the server.
This request is usually in the encoded format.
● This model is stateless since the data between the requests is not
retained and each request is independently handled.
● The server Categories the request, and fetches the data from the
database and its resource representation. This data is converted to
response and is transferred in an encoded format to the client. The
client, in turn, receives the response.
● On the other hand — In Request-Response communication model
client sends a request to the server and the server responds to the
request. When the server receives the request it decides how to
respond, fetches the data retrieves resources, and prepares the
response, and sends it to the client.
2. Publisher-Subscriber Model –
This model comprises three entities: Publishers, Brokers, and Consumers.
● Publishers are the source of data. It sends the data to the topic which
are managed by the broker. They are not aware of consumers.
● Consumers subscribe to the topics which are managed by the broker.
● Hence, Brokers responsibility is to accept data from publishers and
send it to the appropriate consumers. The broker only has the
information regarding the consumer to which a particular topic belongs
to which the publisher is unaware of.
3. Push-Pull Model –
The push-pull model constitutes data publishers, data consumers, and data
queues.
Communication APIs are critical in the Internet of Things (IoT) as they define how data is
exchanged between devices, servers, and applications. Among the most commonly used
communication APIs in IoT are REST (Representational State Transfer) and WebSockets. Both
serve distinct purposes and have unique characteristics that make them suitable for different IoT
scenarios.
Definition
REST is an architectural style that uses standard HTTP methods to interact with resources,
typically represented in formats like JSON or XML. It is stateless, meaning each request from a
client to a server must contain all the necessary information to understand and process the
request.
Key Characteristics
● Statelessness: Each HTTP request is independent, and the server does not retain any
session information between requests. This simplifies the interaction model and scales
well in distributed systems.
● Resource-Based: REST treats every piece of data as a resource that can be created, read,
updated, or deleted (CRUD operations). Each resource is identified by a unique URI
(Uniform Resource Identifier).
● HTTP Methods: RESTful APIs commonly use standard HTTP methods such as GET
(retrieve data), POST (create data), PUT (update data), and DELETE (remove data).
● Scalability: REST is inherently scalable due to its stateless nature, making it suitable for
large-scale IoT applications where many devices need to interact with a server.
● Interoperability: REST APIs are widely supported and easily integrated with various
programming languages and platforms, making them versatile for different IoT
environments.
● Smart Home Applications: REST APIs are commonly used in smart home systems to
control devices like thermostats, lights, and security cameras. For example, a REST API
can be used to send a GET request to retrieve the current temperature from a smart
thermostat or a POST request to set a new temperature.
● IoT Device Management: REST APIs are used to manage and configure IoT devices
remotely. For instance, a POST request might be used to update firmware, or a DELETE
request could deregister a device from the network.
● Data Collection and Monitoring: RESTful APIs are often employed to collect sensor
data from IoT devices. A device could periodically send POST requests with sensor
readings to a central server for storage and analysis.
Advantages
Limitations
● Latency: Since REST is built on HTTP, each request requires a new connection, which
can introduce latency in time-sensitive applications.
● Not Real-Time: REST is not designed for real-time communication, making it less
suitable for applications that require instantaneous data updates.
2. WebSockets
Definition
Key Characteristics
● Real-Time Monitoring and Control: WebSockets are ideal for applications that require
real-time data streaming, such as live monitoring of industrial equipment or remote
control of drones. For example, a WebSocket connection can be used to stream live
sensor data from a manufacturing line to a monitoring dashboard.
● Smart Cities: In smart city applications, WebSockets can be used to manage traffic
signals, streetlights, and environmental sensors in real-time, adjusting to changing
conditions instantaneously.
● IoT Gaming and VR/AR: WebSockets are used in IoT-enabled gaming and VR/AR
applications, where low-latency communication is crucial for delivering a seamless user
experience.
Advantages
Limitations
● Automation: M2M systems automate tasks, reducing the need for human involvement.
● Data Exchange: Devices exchange data to share information and coordinate actions.
● Remote Monitoring: M2M enables remote monitoring of devices and systems.
● Real-time Control: Devices can be controlled in real-time based on data collected.
● Efficiency: M2M improves efficiency by optimizing operations and reducing costs.
Applications of M2M:
● Smart Cities: M2M is used for traffic management, waste management, and energy
efficiency.
● Healthcare: M2M enables remote patient monitoring, wearable devices, and medical
equipment connectivity.
● Industrial Automation: M2M is employed for factory automation, predictive
maintenance, and supply chain management.
● Smart Homes: M2M powers home automation systems, including security, lighting, and
appliances.
● Transportation: M2M is used for fleet management, telematics, and autonomous
vehicles.
Benefits of M2M:
Some degree of
Devices have objects that are
Intelligence intelligence is observed
responsible for decision making
in this.
Specialized device
It requires Generic commodity devices.
solutions.
Communication and
Centric Information and service centric
device centric.