IoT Module 1
IoT Module 1
IoT Module 1
First of all we should discuss about the name “IoT – Internet of Things” in detail.
Cont..
● Data. IoT technologies provide myriad ways to collect data about the physical world. Data
● Device. The actual, physical components or things in the internet of things that collect this
data.
● Analytics. The process of making collected data useful by turning raw data into actionable
insights.
● Connectivity. Makes sharing data and insights possible, increasing the value of that data.
● Industrial internet of things (IIoT). Refers to the use of IoT in industrial applications.
● Internet of battlefield things (IoBT). When IoT is used for military purposes.
Cont…
The advantages of IoT span across every area of lifestyle and business.
● A group of physical devices is wired or wirelessly linked to each other and/or a central
area.
● The devices collect data from the external world using some kind of sensor.
● That data is then stored somewhere, whether it be in the cloud, an intermediary network
location, or on the device itself.
● The data is then processed, often by machine learning and artificial intelligence.
Architecture of IoT
There is no single consensus on architecture for IoT, which is agreed universally. Different
architectures have been proposed by different researchers.
The most basic architecture is a three-layer architecture as shown in Figure. It was introduced in the
early stages of research in this area. It has three layers, namely, the perception, network, and
application layers.
(i) The perception layer is the physical layer, which has sensors for sensing and gathering
information about the environment. It senses some physical parameters or identifies other smart
objects in the environment.
(ii) The network layer is responsible for connecting to other smart things, network devices, and
servers. Its features are also used for transmitting and processing sensor data.
(iii) The application layer is responsible for delivering application specific services to the user. It
defines various applications in which the Internet of Things can be deployed, for example, smart
homes, smart cities, and smart health.
Cont..
Cont..
The role of the perception and application layers is the same as the architecture with three layers. We
outline the function of the remaining three layers.
(i)The transport layer transfers the sensor data from the perception layer to the processing layer
and vice versa through networks such as wireless, 3G, LAN, Bluetooth, RFID, and NFC.
(ii)The processing layer is also known as the middleware layer. It stores, analyzes, and processes
huge amounts of data that comes from the transport layer. It can manage and provide a diverse set
of services to the lower layers. It employs many technologies such as databases, cloud computing,
and big data processing modules.
(iii) The business layer manages the whole IoT system, including applications, business and profit
models, and users’ privacy.
List of Common IoT Protocols
IoT Network Protocols
● Wi-Fi
● LTE CAT 1
● LTE CAT M1
● NB-IoT
● Bluetooth
● ZigBee
● LoRaWAN
NB-IoT's advantages include improvements in power consumption, system capacity, and spectrum
efficiency. For example, NB-IoT can connect huge fleets with up to 50,000 devices per network cell.
However, NB-IoT doesn’t come without challenges. The protocol has very limited bandwidth, which
can slow or limit data transmission capabilities and make essential features like over-the-air updates
difficult or impossible to achieve.
5) Bluetooth
Bluetooth focuses on point-to-point, short-range communication of a relatively small amount of data. In
the IoT space, Bluetooth is commonly used to connect small, battery-powered sensors to IoT gateways
or to facilitate communication with a smartphone, eBike, or other smart device.
6)ZigBee (Zonal Intercommunication Global-standard)
Ratified in the early 2000s, ZigBee stands out as a low-cost, low-power, and reliable
wireless network technology. The standard is adaptable and supports multiple network
topologies, including mesh networks, point-to-multipoint, and point-to-point. ZigBee is
most commonly used in home or building automation settings.
7) LoRaWAN
2) MQTT
Message Queue Telemetry Transport is a lightweight pub/sub messaging protocol suitable for connecting small, low-power
devices.
This data protocol was designed specifically for IoT communication and requires minimal memory and processing power. On
the wire, MQTT's bidirectional pub/sub architecture makes the protocol flexible and scalable for a wide variety of use cases
and IoT system architectures.
Additionally, the MQTT protocol is designed with reliability and scalability in mind—security is provided via Transport
Layer Security, and persistent sessions allow the protocol to adapt to poor network conditions and reduce connection time
overhead.
3) HTTP
You might recognize this acronym as appearing at the beginning of every website address you type, as
Hypertext Transfer Protocol is the foundation of data communication for the World Wide Web.
However, within the context of IoT applications, HTTP has many drawbacks. For instance, this protocol
establishes a synchronous connection between two devices in order to transfer data—which presents a
number of challenges for IoT deployments because devices and endpoints may not be online at the same time
and connections may be unreliable due to network conditions.
Ultimately, while HTTP is a great choice for transferring website data, it is generally not a
good choice for an IoT application.
4) CoAP
Constrained Application Protocol is used with constrained nodes and networks. This
protocol is suited for IoT applications as it reduces the size of network packages, thereby
decreasing network bandwidth overload. Other benefits of CoAP include improving the
IoT life cycle, saving battery power and storage space, and reducing the amount of data
required to operate.
5) DDS
Released in 2004, Data Distribution Service is a middleware architecture for real-time
systems that focus on data communication between the nodes of a publication- or
subscription-based messaging architecture.
DDS is mainly used under circumstances that require real-time data exchange—for
example, autonomous vehicles, power generation, and robotics.
6) LwM2M
Lightweight Machine-to-Machine protocol is designed for remote management of M2M
devices and related services. LwM2M reduces costs associated with low-power module
deployment and equipping devices with faster IoT solutions.
Physical and Data Link Layers
The first two layers from the bottom—the physical and data link layers—define the physical connection of end devices to
the network. More specifically:
● The physical layer receives unstructured raw data between devices and physical transmission media, then
transmits the digital information into electrical, radio, or optical signals.
● The data link layer catches the data and detects/corrects any errors that may have occurred. This layer also defines
the protocol for flow control, as well as establishing and terminating connections between two physically
connected devices.
The network, transport, and session layers facilitate data transfer over the connection, with a focus on logical
addressing, traffic directing, error correction, flow control, congestion avoidance, session management, and
reliability.
● The presentation layer transforms data into the form that is accepted by the application.
● The application layer—the layer closest to the user—typically identifies communication partners, determines
resource availability, and synchronizes communication.
Various Platforms for IoT
There are several types of IoT platforms.
● Hardware development platforms provide physical development boards for creating IoT devices,
including microcontrollers, microprocessors, Systems on Chip (SoC), Systems on Module (SoM).
● App development platforms serve as an integrated development environment (IDE) with tools and
features for coding applications.
● Connectivity platforms provide communication technologies to connect physical objects with the data
center (on-premise or cloud) and transmit information between them. Among popular connectivity
protocols and standards for the Internet of Things are MQTT, DDS, AMQP, Bluetooth, ZigBee, WiFi,
Cellular, LoRaWAN and more.
● Analytics platforms use intelligent algorithms to analyze collected information and transform it into
actionable insights for customers.
● End-to-end IoT platforms cover all aspects of IoT products, from development and connectivity to
data management and visualization.
Most Popular IoT Platforms in 2023
Google launched its platform for Internet of Things development on the basis of
its end-to-end Google Cloud Platform. Currently, it’s one of the world’s top
1. Google Cloud IoT Internet of Things platforms. Google Cloud IoT is the integration of various
services that add value to connected solutions.
● Cloud IoT Core allows you to capture and handle device data. A device
manager component is used to register devices with the service, and
monitor and configure them. MQTT and HTTP protocol bridges are used
for device connection and communication with the Google Cloud Platform.
● Cloud Pub/Sub performs data ingestion and message routing for further
data processing.
● Google BigQuery enables secure real-time data analytics.
● AI Platform applies machine learning features.
● Google Data Studio visualizes data by making reports and dashboards.
● Google Maps Platform helps visualize the location of connected assets.
Cisco IoT Cloud Connect is originally an offering for mobile operators. This mobility
cloud-based software suite for industrial and individual use cases is on the list of the best
2. Cisco IoT Cloud Connect Internet of Things cloud platforms. Cisco also provides reliable IoT hardware, including
switches, access points, routers, gateways and more.
Take a look at some examples of powerful Cisco Internet of Things products and
solutions.
● Government administration
● Machinery
● Financial services
● Marketing and advertising
One of the leading players in the market, Amazon AWS IoT Core allows you to
connect devices to AWS cloud services without the need to manage servers. The
platform provides reliability and security for managing millions of devices.
4. Amazon AWS Core features of Amazon AWS IoT Core:
● A wide choice of connection protocols, including MQTT, HTTP and
IoT Core
LoRaWAN
● A high level of security provided by end-to-end encryption throughout all
points of connection, automated configuration and authentication
● Machine learning capabilities
● A variety of services for edge computing
Core use cases:
● Connected vehicles
● Connected homes
● Asset tracking
● Smart building
● Industrial IoT
Real time Examples of IoT
1)Smart Home Security
Let's start with how IoT helps secure your home. Window and door contacts, glass break and
motion detectors, and heat, smoke, and water detectors combined with security alarm pads,
cameras, and smart doorbells help secure your home against break-ins, fire, and floods.
Readings and alarms from these sensors flow to an in-home controller and then on to the cloud via
the Internet or through battery-powered cellular communicators.
From the cloud, you will be alerted through a mobile phone or computer app to any untoward
activity in the home. Using the app, you can check sensor logs and cameras to determine what's
happening and where. You can arm or disarm the security system remotely to deny or allow access
to your home. For more security, you can set up personalized access codes for specific authorized
users and be informed when they enter and leave your home.
2) SMART WATCH
You probably know how these systems work! You have a transponder on your vehicle
windshield that is read by sensors at each smart toll booth that you pass. The transponder ID is
fed to the cloud for validation — the booth flashes a "Toll Paid" sign — and on you go. The
transponder-reading technology is so accurate that you can go through an express lane at 50
miles per hour.
4) Healthcare
Many wearable devices have health and wellness applications, but there are numerous direct
healthcare applications of IoT technology. For instance, it has been reported that smartwatches
were able to detect early COVID-19 symptoms up to a week earlier than nasal swab tests.
In fact, people now talk about the Internet of Medical Things (IOMT). The most common
healthcare applications of IoT are patient monitors and trackers. These can be for diagnostic
purposes or for remote patient surveillance. Monitoring devices can measure vital signs such as
heart rate, temperature, blood pressure, and glucose levels.
Overview of IoT components and IoT Communication
Technologies,
1. Things or Device
These are fitted with sensors and actuators. Sensors collect data from the environment and give to
gateway where as actuators performs the action (as directed after processing of data).
2. Gateway
The sensors give data to Gateway and here some kind of pre-processing of data is even done. It also act
as a level of security for the network and for the transmitted data.
3. Cloud
The data after being collected is uploaded to cloud. Cloud in simple terms is basically a set of servers
connected to internet 24*7.
4. Analytics
The data after being received in the cloud processing is done . Various algorithms are
applied here for proper analysis of data (techniques like Machine Learning etc are even
applied).
5. User Interface
User end application where user can monitor or control the data.
IoT Communication Technologies
IoT Communication: IoT is the connection of devices over the internet, where these
smart devices communicate with each other , exchange data , perform some tasks without
any human involvement.
These devices are embedded with electronics, software, network and sensors which help in
communication.
The process of exchanging information or messages between two or more machines or devices
is known as Machine to Machine (M2M) communication.
It is the communication among the physical things which do not need human intervention.
Advantages –
This M2M can operate over cellular networks and is simple to manage. It can be used both indoors and
outdoors and aids in the communication of smart objects without the need for human interaction. The M2M
contact facility is used to address security and privacy problems in IoT networks. Large-scale data
collection, processing, and security are all feasible.
Disadvantages –
However, in M2M, use of cloud computing restricts versatility and creativity. Data security and ownership
are major concerns here. The challenge of achieving interoperability between cloud/M2M IoT systems is
daunting. M2M connectivity necessitates the existence of a reliable internet connection.
Examples:
● Smart Washing machine sends alerts to the owners’ smart devices after completion of washing or
drying of clothes.
● Smart meters tracks amount of energy used in household or in companies and automatically alert
the owner.
3. Machine to Human (M2H) :