IoT Module 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 46

SUB:-Internet of things(IOT)

Subject Code: 21150203

Prepared by:Prof. Foram Shukla


UNIT I :
Introduction to IOT
Outline
❖ Understanding IoT fundamentals
❖ IOT Architecture and protocols
❖ Various Platforms for IoT
❖ Real time Examples of IoT
❖ Overview of IoT components and IoT Communication Technologies
❖ Challenges in IOT
Understanding IoT fundamentals

First of all we should discuss about the name “IoT – Internet of Things” in detail.
Cont..

● It is a computing concept that describes the idea of everyday physical objects


being connected to the internet and being able to identify themselves to other
devices.
● The IoT is not just limited to the connected or networked devices, but in a broad
way IoT devices exchange meaningful information from one device to another
to getdesire result.
● IoT is not a single technology, it’s a combination of technologies and domain
knowledge.
● As a result, engineers from different domains have to work together for building
a complete IoT product.
● It is being used to create smart infrastructure in various verticals such as Power,
Automotive, Safety & Surveillance, Remote Health Management,
Agriculture, Smart Homes and Smart Cities etc, using connected devices.
Cont..
The four pillars of IoT and the main concepts to understand are:

● Data. IoT technologies provide myriad ways to collect data about the physical world. Data

is the fuel of IoT and is why it is so important.

● Device. The actual, physical components or things in the internet of things that collect this

data.

● Analytics. The process of making collected data useful by turning raw data into actionable

insights.

● Connectivity. Makes sharing data and insights possible, increasing the value of that data.

This is the internet in internet of things.


Cont…
Specific types of IoT and its applications:

● Industrial internet of things (IIoT). Refers to the use of IoT in industrial applications.

● Internet of medical things (IoMT). The use of IoT in medicine.

● V2X communications (vehicle to everything communications). A vehicle's ability to sense

its environment and communicate with it.

● Internet of battlefield things (IoBT). When IoT is used for military purposes.
Cont…
The advantages of IoT span across every area of lifestyle and business.

Here is a list of some of the advantages that IoT has to offer:

● Improved Customer Engagement – Current analytics suffer from blind-spots and


significant flaws in accuracy; and as noted, engagement remains passive. IoT
completely transforms this to achieve richer and more effective engagement with
audiences.
● Technology Optimization – The same technologies and data which improve the
customer experience also improve device use, and aid in more potent improvements
to technology. IoT unlocks a world of critical functional and field data.
Cont…
● Reduced Waste – IoT makes areas of improvement clear. Current analytics give us
superficial insight, but IoT provides real-world information leading to more effective
management of resources.
● Enhanced Data Collection – Modern data collection suffers from its limitations and
its design for passive use. IoT breaks it out of those spaces, and places it exactly
where humans really want to go to analyze our world. It allows an accurate picture of
everything.
Cont…
Though IoT delivers an impressive set of benefits, it also presents a significant set of
challenges. Here is a list of some its major issues:
1. Security – IoT creates an ecosystem of constantly connected devices communicating ove
networks. The system offers little control despite any security measures. This leaves users
exposed to various kinds of attackers.
2. Privacy – The sophistication of IoT provides substantial personal data in extreme detail
without the user's active participation.
3. Complexity – Some find IoT systems complicated in terms of design, deployment, and
maintenance given their use of multiple technologies and a large set of new enabling
technologies.
4. Flexibility – Many are concerned about the flexibility of an IoT system to integrate easily
with another. They worry about finding themselves with several conflicting or locked
systems.
5. Compliance – IoT, like any other technology in the realm of business, must comply with
regulations. Its complexity makes the issue of compliance seem incredibly challenging
when many consider standard software compliance a battle.
How does IoT work?
IoT works through a combination of wireless networking technology, physical devices, advanced
data analytics and cloud computing. The basic process of how IoT works is as follows:

● A group of physical devices is wired or wirelessly linked to each other and/or a central
area.
● The devices collect data from the external world using some kind of sensor.
● That data is then stored somewhere, whether it be in the cloud, an intermediary network
location, or on the device itself.
● The data is then processed, often by machine learning and artificial intelligence.
Architecture of IoT
There is no single consensus on architecture for IoT, which is agreed universally. Different
architectures have been proposed by different researchers.

The most basic architecture is a three-layer architecture as shown in Figure. It was introduced in the
early stages of research in this area. It has three layers, namely, the perception, network, and
application layers.
(i) The perception layer is the physical layer, which has sensors for sensing and gathering
information about the environment. It senses some physical parameters or identifies other smart
objects in the environment.
(ii) The network layer is responsible for connecting to other smart things, network devices, and
servers. Its features are also used for transmitting and processing sensor data.
(iii) The application layer is responsible for delivering application specific services to the user. It
defines various applications in which the Internet of Things can be deployed, for example, smart
homes, smart cities, and smart health.
Cont..
Cont..

The role of the perception and application layers is the same as the architecture with three layers. We
outline the function of the remaining three layers.

(i)The transport layer transfers the sensor data from the perception layer to the processing layer
and vice versa through networks such as wireless, 3G, LAN, Bluetooth, RFID, and NFC.
(ii)The processing layer is also known as the middleware layer. It stores, analyzes, and processes
huge amounts of data that comes from the transport layer. It can manage and provide a diverse set
of services to the lower layers. It employs many technologies such as databases, cloud computing,
and big data processing modules.
(iii) The business layer manages the whole IoT system, including applications, business and profit
models, and users’ privacy.
List of Common IoT Protocols
IoT Network Protocols
● Wi-Fi
● LTE CAT 1
● LTE CAT M1
● NB-IoT
● Bluetooth
● ZigBee
● LoRaWAN

IoT Data Protocols


● AMQP
● MQTT
● HTTP
● CoAP
● DDS
● LwM2M
IOT Network protocols
1) Wi-Fi
Wi-Fi is a ubiquitous protocol that can be found almost anywhere—industrial plants, homes,
commercial buildings, and even your neighborhood restaurants. This widely favored technology is
able to transmit large volumes of data over reasonable distances. However, many low-power or
battery-powered IoT devices are unlikely to use Wi-Fi due to its high power consumption rate.

2) LTE CAT 1 (Long Term Evolution Category 1)


LTE CAT 1 is a communication standard specifically designed for servicing IoT applications.
Compared with other standards, it scales down bandwidth and communication demand to save power
and cost for large-scale and long-range IoT systems.

3) LTE CAT M1 ( Long Term Evolution Category M1)


LTE CAT M1—which can also be referred to as Cat-M—is a low-cost, low-power, wide-area network
that specializes in transferring low to medium amounts of data. It was developed by the 3rd
Generation Partnership Project
4) NB-IoT (Narrow band IOT)
While the protocols detailed previously have been in application for a long time, Narrow Band-IoT is a
new, fast-growing, low-power, wide-area technology intended to specifically target the needs of
battery-powered IoT devices.

NB-IoT's advantages include improvements in power consumption, system capacity, and spectrum
efficiency. For example, NB-IoT can connect huge fleets with up to 50,000 devices per network cell.
However, NB-IoT doesn’t come without challenges. The protocol has very limited bandwidth, which
can slow or limit data transmission capabilities and make essential features like over-the-air updates
difficult or impossible to achieve.
5) Bluetooth
Bluetooth focuses on point-to-point, short-range communication of a relatively small amount of data. In
the IoT space, Bluetooth is commonly used to connect small, battery-powered sensors to IoT gateways
or to facilitate communication with a smartphone, eBike, or other smart device.
6)ZigBee (Zonal Intercommunication Global-standard)

Ratified in the early 2000s, ZigBee stands out as a low-cost, low-power, and reliable
wireless network technology. The standard is adaptable and supports multiple network
topologies, including mesh networks, point-to-multipoint, and point-to-point. ZigBee is
most commonly used in home or building automation settings.

7) LoRaWAN

Long-range wide area network—also referred to as LoRa—is a long-range, radio-wide


networking protocol with low power consumption. Normally, LoRaWAN wirelessly
connects multiple battery-operated devices to the Internet within regional, national, or
global networks.

In the IoT field, LoRaWAN plays an important role in bidirectional communication,


end-to-end security.
IoT Data Protocols
1) AMQP
Known for its reliability and interoperability, Advanced Message Queuing Protocol is an open messaging standard. This
protocol utilizes queues of data, enabling connected systems to communicate asynchronously and better handle issues like
traffic spikes and poor network conditions.

2) MQTT
Message Queue Telemetry Transport is a lightweight pub/sub messaging protocol suitable for connecting small, low-power
devices.

This data protocol was designed specifically for IoT communication and requires minimal memory and processing power. On
the wire, MQTT's bidirectional pub/sub architecture makes the protocol flexible and scalable for a wide variety of use cases
and IoT system architectures.

Additionally, the MQTT protocol is designed with reliability and scalability in mind—security is provided via Transport
Layer Security, and persistent sessions allow the protocol to adapt to poor network conditions and reduce connection time
overhead.
3) HTTP
You might recognize this acronym as appearing at the beginning of every website address you type, as
Hypertext Transfer Protocol is the foundation of data communication for the World Wide Web.

However, within the context of IoT applications, HTTP has many drawbacks. For instance, this protocol
establishes a synchronous connection between two devices in order to transfer data—which presents a
number of challenges for IoT deployments because devices and endpoints may not be online at the same time
and connections may be unreliable due to network conditions.

Ultimately, while HTTP is a great choice for transferring website data, it is generally not a
good choice for an IoT application.
4) CoAP
Constrained Application Protocol is used with constrained nodes and networks. This
protocol is suited for IoT applications as it reduces the size of network packages, thereby
decreasing network bandwidth overload. Other benefits of CoAP include improving the
IoT life cycle, saving battery power and storage space, and reducing the amount of data
required to operate.

5) DDS
Released in 2004, Data Distribution Service is a middleware architecture for real-time
systems that focus on data communication between the nodes of a publication- or
subscription-based messaging architecture.

DDS is mainly used under circumstances that require real-time data exchange—for
example, autonomous vehicles, power generation, and robotics.
6) LwM2M
Lightweight Machine-to-Machine protocol is designed for remote management of M2M
devices and related services. LwM2M reduces costs associated with low-power module
deployment and equipping devices with faster IoT solutions.
Physical and Data Link Layers
The first two layers from the bottom—the physical and data link layers—define the physical connection of end devices to
the network. More specifically:

● The physical layer receives unstructured raw data between devices and physical transmission media, then
transmits the digital information into electrical, radio, or optical signals.
● The data link layer catches the data and detects/corrects any errors that may have occurred. This layer also defines
the protocol for flow control, as well as establishing and terminating connections between two physically
connected devices.

The network, transport, and session layers facilitate data transfer over the connection, with a focus on logical
addressing, traffic directing, error correction, flow control, congestion avoidance, session management, and
reliability.

Presentation and Application Layers


The two layers at the top—presentation and application—deal with data formatting and the boundary between the data
coming from devices in the field and a business application or database.

● The presentation layer transforms data into the form that is accepted by the application.
● The application layer—the layer closest to the user—typically identifies communication partners, determines
resource availability, and synchronizes communication.
Various Platforms for IoT
There are several types of IoT platforms.
● Hardware development platforms provide physical development boards for creating IoT devices,
including microcontrollers, microprocessors, Systems on Chip (SoC), Systems on Module (SoM).
● App development platforms serve as an integrated development environment (IDE) with tools and
features for coding applications.
● Connectivity platforms provide communication technologies to connect physical objects with the data
center (on-premise or cloud) and transmit information between them. Among popular connectivity
protocols and standards for the Internet of Things are MQTT, DDS, AMQP, Bluetooth, ZigBee, WiFi,
Cellular, LoRaWAN and more.
● Analytics platforms use intelligent algorithms to analyze collected information and transform it into
actionable insights for customers.
● End-to-end IoT platforms cover all aspects of IoT products, from development and connectivity to
data management and visualization.
Most Popular IoT Platforms in 2023
Google launched its platform for Internet of Things development on the basis of
its end-to-end Google Cloud Platform. Currently, it’s one of the world’s top
1. Google Cloud IoT Internet of Things platforms. Google Cloud IoT is the integration of various
services that add value to connected solutions.

● Cloud IoT Core allows you to capture and handle device data. A device
manager component is used to register devices with the service, and
monitor and configure them. MQTT and HTTP protocol bridges are used
for device connection and communication with the Google Cloud Platform.
● Cloud Pub/Sub performs data ingestion and message routing for further
data processing.
● Google BigQuery enables secure real-time data analytics.
● AI Platform applies machine learning features.
● Google Data Studio visualizes data by making reports and dashboards.
● Google Maps Platform helps visualize the location of connected assets.
Cisco IoT Cloud Connect is originally an offering for mobile operators. This mobility
cloud-based software suite for industrial and individual use cases is on the list of the best
2. Cisco IoT Cloud Connect Internet of Things cloud platforms. Cisco also provides reliable IoT hardware, including
switches, access points, routers, gateways and more.

Take a look at some examples of powerful Cisco Internet of Things products and
solutions.

● Cisco IoT Control Center ensures impeccable cellular connectivity


management, allowing you to integrate all your IoT devices in one SaaS solution.
● Extended Enterprise Solution allows for the development of IoT business
applications at the edge and ensures rapid deployment and centralized network
management.
● Edge Intelligence simplifies data processing by allocating data flows either to
local or multi-cloud environments.
● Industrial Asset Vision utilizes sensors to monitor your assets continuously and
deliver data for better decision-making.
● Cisco IoT Threat Defense protects sensible data and devices against
cyberattacks, providing secure remote access, segmentation, visibility and
analysis, and other security.
Salesforce specializes in customer relations management
and masterfully enhances this segment with the help of IoT
3. Salesforce IoT Cloud solutions.

Core features of Salesforce IoT Cloud:

● Full integration of customers, products and CRM


● No need for programming skills to create rules,
conditions and events due to a simple point-and-click
UI
● Compatibility with third-party websites, services and
other products
● A proactive approach to customer issues and needs

Core use cases:

● Government administration
● Machinery
● Financial services
● Marketing and advertising
One of the leading players in the market, Amazon AWS IoT Core allows you to
connect devices to AWS cloud services without the need to manage servers. The
platform provides reliability and security for managing millions of devices.
4. Amazon AWS Core features of Amazon AWS IoT Core:
● A wide choice of connection protocols, including MQTT, HTTP and
IoT Core
LoRaWAN
● A high level of security provided by end-to-end encryption throughout all
points of connection, automated configuration and authentication
● Machine learning capabilities
● A variety of services for edge computing
Core use cases:
● Connected vehicles
● Connected homes
● Asset tracking
● Smart building
● Industrial IoT
Real time Examples of IoT
1)Smart Home Security
Let's start with how IoT helps secure your home. Window and door contacts, glass break and
motion detectors, and heat, smoke, and water detectors combined with security alarm pads,
cameras, and smart doorbells help secure your home against break-ins, fire, and floods.

Readings and alarms from these sensors flow to an in-home controller and then on to the cloud via
the Internet or through battery-powered cellular communicators.

From the cloud, you will be alerted through a mobile phone or computer app to any untoward
activity in the home. Using the app, you can check sensor logs and cameras to determine what's
happening and where. You can arm or disarm the security system remotely to deny or allow access
to your home. For more security, you can set up personalized access codes for specific authorized
users and be informed when they enter and leave your home.
2) SMART WATCH

Smartwatches not only


help us stay connected,
but as a part of an IoT
system, they allow
access needed for
improved productivity.
3) Smart Toll Collection
Our next IoT driving example is electronic toll collection (ETC). This application is common in
urban areas with toll roads, bridges, and tunnels. There are electronic toll collection systems
throughout the states, with the E-ZPass network covering 19 states from Maine, south to
Florida, and west to Minnesota. Florida's SunPass is tied into that network. In California, the
FasTrak network is used by toll agencies from the Bay Area to San Diego.

You probably know how these systems work! You have a transponder on your vehicle
windshield that is read by sensors at each smart toll booth that you pass. The transponder ID is
fed to the cloud for validation — the booth flashes a "Toll Paid" sign — and on you go. The
transponder-reading technology is so accurate that you can go through an express lane at 50
miles per hour.
4) Healthcare
Many wearable devices have health and wellness applications, but there are numerous direct
healthcare applications of IoT technology. For instance, it has been reported that smartwatches
were able to detect early COVID-19 symptoms up to a week earlier than nasal swab tests.

In fact, people now talk about the Internet of Medical Things (IOMT). The most common
healthcare applications of IoT are patient monitors and trackers. These can be for diagnostic
purposes or for remote patient surveillance. Monitoring devices can measure vital signs such as
heart rate, temperature, blood pressure, and glucose levels.
Overview of IoT components and IoT Communication
Technologies,
1. Things or Device
These are fitted with sensors and actuators. Sensors collect data from the environment and give to
gateway where as actuators performs the action (as directed after processing of data).

2. Gateway
The sensors give data to Gateway and here some kind of pre-processing of data is even done. It also act
as a level of security for the network and for the transmitted data.

3. Cloud
The data after being collected is uploaded to cloud. Cloud in simple terms is basically a set of servers
connected to internet 24*7.
4. Analytics
The data after being received in the cloud processing is done . Various algorithms are
applied here for proper analysis of data (techniques like Machine Learning etc are even
applied).

5. User Interface
User end application where user can monitor or control the data.
IoT Communication Technologies
IoT Communication: IoT is the connection of devices over the internet, where these
smart devices communicate with each other , exchange data , perform some tasks without
any human involvement.

These devices are embedded with electronics, software, network and sensors which help in
communication.

Communication between smart devices is very important in IOT as it enables these


devices to gather, exchange data which contribute in success of that IOT product/project.
Types of Communications in IOT:
The following are some communication types in IoT:-
1. Human to Machine (H2M):
In this human gives input to IOT device i.e as speech/text/image etc. IOT device (Machine) like
sensors and actuators then understands input, analyses it and responds back to human by means
of text or Visual Display. This is very useful as these machines assist humans in every everyday
tasks. It is a combo of software and hardware that includes human interaction with a machine to
perform a task. Merits: This H2M has a user-friendly interface that
can be quickly accessed by following the
instructions. It responds more quickly to any fault
or failure. Its features and functions can be
customized.
Examples:
● Facial recognition.
● Bio-metric Attendance system.
● Speech or voice recognition.
2. Machine to Machine (M2M):

The process of exchanging information or messages between two or more machines or devices
is known as Machine to Machine (M2M) communication.
It is the communication among the physical things which do not need human intervention.
Advantages –
This M2M can operate over cellular networks and is simple to manage. It can be used both indoors and
outdoors and aids in the communication of smart objects without the need for human interaction. The M2M
contact facility is used to address security and privacy problems in IoT networks. Large-scale data
collection, processing, and security are all feasible.
Disadvantages –
However, in M2M, use of cloud computing restricts versatility and creativity. Data security and ownership
are major concerns here. The challenge of achieving interoperability between cloud/M2M IoT systems is
daunting. M2M connectivity necessitates the existence of a reliable internet connection.
Examples:
● Smart Washing machine sends alerts to the owners’ smart devices after completion of washing or
drying of clothes.
● Smart meters tracks amount of energy used in household or in companies and automatically alert
the owner.
3. Machine to Human (M2H) :

In this machine interacts with Humans. Machine triggers information(text


messages/images/voice/signals) respective / irrespective of any human presence. This type of
communication is most commonly used where machines guide humans in their daily life. It is
way of interaction in which humans co-work with smart systems and other machines by using
tools or devices to finish a task.
Examples:
● Fire Alarms
● Traffic Light
● Fitness bands
● Health monitoring devices
4. Human to Human (H2H) :
This is generally how humans communicate with each other to exchange information by speech, writing,
drawing, facial expressions, body language etc. Without H2H, M2M applications cannot produce the
expected benefits unless humans can immediately fix issues, solve challenges, and manage scenarios.
The process of exchanging information
or messages between two or more people is known as human to human (H2H) communication. This can be
done through various means such as verbal,
non-verbal, or written communication.
Challenges in IOT

There are various types of challenges in front of IoT.


1) Lack of encryption
2) Insufficient testing and updating
3) Lack of standardization
4) Unsecured data transmission:
5) Privacy concerns
Thank you…

You might also like