IOT EXAM Suggestion

Download as pdf or txt
Download as pdf or txt
You are on page 1of 60

Web of Things Architecture

1. Introduction

This document is an explanation about the architecture of “Web Of Things (WoT)”.

The purpose of this document is to provide


(a) a guideline of the mapping between functional architecture and physical devices
configuration,
(b) a description of the role and functionality of each logical module,
(c) a reference for where should be standardized.

2. Requirements for functional architecture of WoT

2.1 Flexibility

There is a wide variety of Physical devices configuration for WoT implementations.


Functional WoT architecture should be able to be mapped to and cover all of the
variations.

2.2 Compatibility

We have already had many legacy IoT solutions and IoT standardization activities in
many business fields.
Functional WoT architecture should provide bridge between legacy IoT solutions and
Web technology based on WoT concepts. And it should guarantee to be upper compatible
to legacy IoT solutions and current standards.

2.3 Safety and Security

Functional WoT architecture should have the room for providing safety and security
functionalities.
In the IoT solutions, once cyber security barrier is hacked, it is more easily led to safety
issues than conventional web solutions. That is because hacked IoT devices often treat

Unrestricted
heal cycle such as central heating systems, physical moving devices such as cars.

3. Mapping variations

In real world, there are many variations for mapping logical WoT servient to physical
devices structure.
This chapter tries to list up informative mapping samples.

3.1 Simple Use case

Fig.2 Simple use case

Fig.2 shows very simple use case such that a browser accessed WoT Servient to get some
information of legacy device and/or put some parameters to control legacy device.

In this use case, browser’s App Script refers Things Description of WoT servient and get
information of who it is, what kind of APIs it provides.
Then App Script calls client API and through resource management processes and
protocol mapping process, the request is mapped on internet protocol such as HTTP,
CoAP and so on.
The protocol accesses Web Server block of WoT servient. After that the request is
transferred to App Script in WoT servient through protocol mapping process and

Unrestricted
resource management process.
App Script understands what kind of request comes from browser and according to the
request, App Script controls legacy device through physical APIs.

3.2 WoT servient on device

Fig.3 WoT Servient on device itself

The first example is WoT servient on device itself. This is referred as “WoT Device”.
The right most WoT servient in Fig.3 shows an air conditioner which has rich CPU and
large memory and provides web server functionality connected directly to internet.

Then the leftmost browser and/or another application on internet can access the air
conditioner through internet directly.

3.3 WoT servient on Smartphone

The second example is WoT servient on Smartphone.


Smartphone becomes very popular and it provides gateway functionality which bridges
between internet and legacy device without any intermediate hardware.

Unrestricted
Fig.4 WoT servient on Smartphone (A)

Fig.4 shows an example of WoT servient on Smartphone. In Fig.4, there are


independent 2 software modules, one is browser which has user experience to provide
interaction, the the other is WoT servient which might not have any user interface and
it provides gateway functionality to access legacy device.

Fig.5 WoT servient on Smartphone (B)

Unrestricted
Fig.5 shows another example of WoT servient mapped on smartphone.
In this mapping case, a browser is expanded to include WoT servient functionality. Then
there is no need for an app script to call web server block. Instead the client API should
be called directly inside.

3.4 WoT servient on Smart Home Hub

Fig.6 WoT servient on smart home hub

Fig.6 shows an example of WoT servient on smart home hub.


Smart home hub is usually introduced home automation and/or home energy
management solution.
Looking at consumer electronics, there are very wide variety of physical communication
format such as WiFi, 802.15.4g, Bluetooth low energy, HDPLC and so on. In order to
normalize those variations, almost all home systems introduce a smart home hub.
In Fig.6, WoT servient wraps the difference of communicating legacy devices and
provides to other clients a universal devices accessing method.
In home inside, as the communication method between WoT servient on smart home
hub and clients WiFi is usually adopted.

5.4 WoT servient on Cloud Server

Client Apps can control devices at home through WoT servient on a Smart Home Hub.
But the location of client Apps is restricted within home because physical

Unrestricted
communication path “WiFi” and/or wired Ethernet between smart home hub and client
apps such as browser is limited inside home.

So, controlling devices at home from outside the house, WoT servient from a smart home
hub should be mapped to a globally accessible cloud.

Fig.7 WoT Servient on Cloud Server

Fig.7 shows an example of WoT servient on a cloud server.


In Fig.7 case, a browser accesses WoT servient on the cloud named “platform”. This WoT
servient provides Things Description through internet globally. So, wherever browser
user is, he/she can access this WoT servient.
WoT servient accepts browser and/or other application’s request through HTTP, CoAP
and so on. Then WoT Servient on the cloud server finds out the route to access the WoT
servient on a smart home hub. In Fig.7 case, Things Description of WoT Servient on
cloud server is mirror of that on the smart home hub.
After finding out the route, WoT Servient on the cloud server transfer browser’s request
to WoT Servient on the smart home hub.
After that, the smart home hub processes the request according to Fig.6 case.

In this Fig.7 case, the smart home hub works as


a) Unifier of very wide variety of legacy communication protocols both in the physical
and logical view;
b) Firewall between internet as WoT Servient on the cloud server and legacy connected
devices at home;

Unrestricted
c) Privacy filter which substitutes real image and/or speech, and logs data at home to
symbols;
d) Autonomous WoT Servient which provides house inside the server, even if the
connection is shut down between internet and the smart home hub;
e) Emergency Apps running in a local environment when the fire alarm and similar
event occur.

4. General Description of WoT Servient

In Web of Things (WoT), functional virtual device is named “WoT Servient” which
provides the access to, control and get the status and values from IoT physical devices.

General WoT Servient functional architecture is presented in Fig.1

Fig.1 Functional Architecture of WoT Servient

Unrestricted
The role and functionality of each module is as follows;

Web Server

Web server accepts requests from networked clients through internet and sends
responses to clients.
Examples of protocols between WoT servient and clients include HTTP, CoAP, MQTT
and so on.

REST style API can be defined in front of the Web Server module. This API is named
“WoT API”. WoT API is the subject of the standardization activity. .

Web Client

WoT Servient can access other web servers and/or WoT servients through internet.
In these cases a web client module communicates with other servers via protocols such
as HTTP.

When web client modules calls other WoT servients not legacy web servers, the API is
WoT API.

Legacy Communication

As described before, currently, there are many IoT services and standards proposed by
many organizations.
In order to communicate such legacy devices, WoT servient includes legacy
communication module for such protocols as Echonet Lite, QNX, ONVIF, DLNA and so
on..

Protocol Mapping

Protocol Mapping block maps API and parameters to communication protocols such as
HTTP, CoAP, MQTT and so on.

And in Protocol Mapping block, there is a block named Adapter which translates web

Unrestricted
based API to legacy communication such as Echonet Lite, QNX, ONVIF, DLNA and so
on.

Resource Manager

WoT servient manages many resources.


As server, WoT servient manages clients’ request queue for serialization of controlling
thing and so on. Provided APIs (resources) are described in Thing Description.

As client, WoT servient caches requesting servers information to accelerate next


requesting process.

As things controller, WoT servient manages the inside status of thing and so on.

Whole of those management block is named Resource Management.

Things Description

Things Description is a declaration of properties and capabilities of a thing or a legacy


device. Examples include the name of thing, APIs (resources) which is provided by WoT
servient, parameter data type of each APIs and so on.

Other clients refer WoT servient’s “Things Description” to understand the ability of the
WoT Servient.

Server API Provider and Server API

Sever API is the API for creating server functions. Server API Provider provides utilizes
resource management, protocol mapping and son and provides Server APIs.

Client API Provider and Client API

Client API is the API for creating client functions. Client API Provider provides utilizes
resource management, protocol mapping and son and provides Client APIs.

Physical API Provider and Physical API

Unrestricted
Physical API is the API for creating physical things controlling functions such as GPIB,
I2C and so on. Physical API Provider provides utilizes resource management, protocol
mapping and son and provides Physical APIs.

App Script

Calling Server API, Client API and Physical API, application script is created.

5. Conclusion

. A functional architecture for WoT Servient is introduced in Fig.1. This functional


architecture can explain well a wide variety of different WoT application scenarios.

As the next stage of the standardization, we should standardize the following 3 items.
1) WoT API mapped to protocols that enable communication between a client and WoT
Servient;
2) Things Description to declare properties and capabilities of WoT Servient to the
Web;
3) Server API, Client API and Physical API to enable App scripts.

Unrestricted
DOI: http://dx.doi.org/10.26483/ijarcs.v10i3.
ISSN No. 0976-5697
Volume 10, No. 3, May-June 2019
International Journal of Advanced Research in Computer Science
RESEARCH PAPER
Available Online at www.ijarcs.info

AN EMPIRICAL ANALYSIS OF WEB OF THINGS (WOT)

Dr. Firoj Parwej Nikhat Akhtar


Research Scholar, Research Scholar-Ph.D
Department of Computer Science & Engineering, Department of Computer Science & Engineering,
Singhania University, Rajasthan, India Babu Banarasi Das University, Lucknow, India
[email protected] [email protected]

Dr. Yusuf Perwej


Assistant Professor, Department of Information Technology,
Al Baha University, Al Baha,
Kingdom of Saudi Arabia (KSA)
[email protected]

Abstract: The IoT has primarily focused on establishing connectivity in a diversify of constrained networking environments, and the next
logical aim is to build on top of network connectivity by focusing on the application layer. In the Web of Things (WoT), we are thinking
about smart things as first class citizens of the Web. We position the Web of Things as a purification of the Internet of Things by integrating
smart things not only into the Internet, for instance the network, but into the Web (the application layer). The Web of Things is a
computing concept that describes a future where day-to-day objects are fully integrated with the Web. The WoT is very homogeneous to the IoT
in some ways and in others it is drastically different. The stipulation for WoT is for the "things" to have embedded computer systems that enable
communication with the Web. This type of smart devices would then be able to communicate with each other using current Web standards. For
instance, renowned Web languages PHP, HTML, Python, and JavaScript can be used to easily build applications involving smart things and
users can leverage well-known Web mechanisms such as caching, browsing, searching, and bookmarking to communicate and share these
devices. In this paper, aim to demonstrate a close-up view about Web of Things, including Web of things architecture, Open platform in Web of
Thing, Web-enabling devices, Web of Thing security, use cases of Web of Things. The WoT concept, smart things and their services are fully
integrated in the Web by reusing and conforming technologies and patterns commonly used for conventional Web content.

Keywords: Web of Things (WoT); Information Retrieval; Semantic Web; Web Search Engines; Web APIs; Internet of Things (IoT).

application models [5]. This piece will investigate the technical


I. INTRODUCTION features that encapsulate WoT, and I will provide examples of
current use cases applications in use at present, as well as offer
Today scenario, it is a global network which connects some hopeful prospects for the future of the web and things.
people and we are use desktops, laptops, tablets, and phones to Some many things trying to communicate with one another in
communicate with each other [1]. Generally the information we various ways, it is challenging to seamlessly build a single
send around goes via servers which run websites, email communication platform in which all things speak together
software, etc. The Internet of Things (IoT) [2] is a term to efficaciously. Many have attempted to create completely new
describe how physical objects are being connected to the platforms of communication, so all devices can communicate
Internet so that they can be explored, monitored, controlled or efficaciously, also known as an application layer protocol.
interacted with. The IoT is more frequently used in the context However, this is time-consuming and may be nearly unfeasible.
of radio frequency identification (RFID) [3] and how physical Consequently, many others believe we must use a platform that
objects are tied to the Internet and can communicate with each already exists. In this context, the WoT comes into play [6].
other [4]. IoT systems have applications across industries via The web has been an already established system that can permit
their distinctive flexibility and ability to be appropriate in any all things to communicate with each other. The Web may be
environment. They ameliorate data collection, operations, used as a type of application [5] where all things can
automation and much more via smart devices and powerful communicate together in the most dexterous manner. The Web
enabling technology. As more "things" on planet Earth are of Things is intended to enable interoperability across IoT
converted to the inventory of digitally connected Internet Platforms and application domains.
devices, the roles and accountability of web developers and In the first instance, it endues mechanisms to formally
technology managers will need to develop in keeping pace with describe IoT interfaces to permit IoT devices and services to
the ever expanding list of appliances and gadgets that need a communicate with each other, independent of their underlying
web interface. This global tendency is known as “Internet of implementation, and across multiple networking protocols [7].
Things”, and as a vision has inspired that same premise for In WoT, applications communicate with physical objects with
“Web of Things”, and incorporates similar features and the familiar HTTP protocol and RESTful API. This over-

© 2015-19, IJARCS All Rights Reserved 1


Firoj Parwej et al, International Journal of Advanced Research in Computer Science, 10 (3), May-June 2019,

simplifies the access to physical objects, assent them to be used In these surveys, WoTSE either receives a [20] concise
in web applications and merged with current web resources [8]. discussion as a potential research topic or a short introduction
presenting some representative works [21]. They either focus
II. THE WEB OF THINGS (WOT) on one type of WoTSE or listing potential research issue
without bearing in mind the state of the field. In these surveys
If you take a moment and think about how we, humankind, [22], analyzes seven prototypes on nine dimensions that focus
function you will quest that we have a five senses, which are on the ability to handle real-time, local sensor queries. In these
felt by corresponding organs, then the stimuli are sent to the approaches [23], WoTSE from perspective of EPC worldwide
brain via the nerves, finally the brain processes these stimuli. discovery service. They analyze five works on nine
The outcome is most often knowledge and perhaps also dimensions. Finally, evaluates the including both WoT-
actions can be triggered the brain, then transmits commands specific prototypes and outcome from other fields that are
via the nerves to the muscles which then trigger moving hands, expected to be applicable to WoT [24].
legs, talking, etc. In this context, it is to see “things” as organs
which detect the stimuli. These are then sent via wireless or IV. THE WEB OF THINGS ARCHITECTURE
wired technology, usually on an IP/HTTP network to
processing and storage engines and these engines then crunch Today scenario, web technology is ubiquitous and it has
the obtained information and generate knowledge. become part of our day-to-day lives and, moreover, many
Occasionally they can also trigger an action like as sending a tech-savvy human beings without explicit training are able to
tweet. The Web of Things, as a concept, [9] is discovery its create their own web applications [25]. Consequently, the Web
way to day to day life and is gaining prominence with the of Things initiative goals for applying the well-known and
development of the internet towards a network of proven patterns from the web to the demanding IoT domain
interconnected objects, ranging from cars and transportation [5].
cargos to electrical appliances [5]. This development will
endure new services and will enable new directions for
communication and new types of agents involved in this
process. The Web of Things offers to counter this
fragmentation via metadata. That enables convenient
integration across IoT platforms, and which make easy for
application development via a common interaction model that
is independent of the underlying protocols [7]. This is
expected to drive down the costs and risks involved in
developing services, and assistance realize the full potential
for the IoT [2]. The WoT confer economical and rapid services
with high-speed connectivity integrating miscellaneous
wireless network technologies. The Web of Things is a
refinement of the IoT [10] by integrating smart things not only
into the Internet (network), but into the web architecture (an
application). The Web of Things permits interoperability
between devices from dissimilar manufacturers and fosters
cross-device applications. It also makes it possible for a huge
group of amateurs to buy all sorts of devices, build
expeditiously their smart home systems [5], and especially
reuse and customize these systems effortlessly for their
peerless needs and incline. Figure 1. The Web of Things Architecture

III. RELATED WORKS As an outcome, devices can be browsed and bookmarked,


Web pages can directly include real-time data from sensors,
The WoT integrates several research and application fields, and users can build physical mashups that augment and control
among which embedded systems, wireless networks, software their day-to-day objects [26]. In this section, we are discussing
infrastructure, Web technologies and artificial intelligence. the four layers of web of things architecture; it is based on, the
According to [11] and more recently, a Web of Things device accessibility layer, findability layer, sharing layer and
infrastructure should permit, explore objects without composition layer as shown in figure 1. The WoT architecture
configuration, dynamically adapt to its environment, be is an endeavor to structure the galaxy of web protocols and
secured, so that things and applications are innocuous and avoid tools into a useful framework for connecting any device or
privacy matter, permit manual or semi-automatic service object to the web. Users should be able to access and use smart
composition and confer services that make sense for the users. things absentia the need for installing additional software [27].
From a more technical perspective, it should rely on Web From a web browser they should further have means to
standards to achieve interoperability [12] take into account directly extract, share, and save smart things data and services.
several communication models, for instance request &
response, message oriented, event based, publish subscribe [13] This empowers creating applications [3] in which real-world
[14], permit executing code on objects or delegating it to the data are directly consumed by resource coercible devices,
cloud semantically conclude available functions and enrich data namely mobile phones or wireless sensor nodes absentia need
[15]. Preliminary surveys serve as road-maps [16] to realize dedicated software on these devices.
IoT and WoT [17]. Their cover versions, definitions, enabling
technologies and propose potential research directions [18]. A. Accessibility Layer
Subsequent surveys focus on more specific usages. In the
opinion of [19], WoT from the cloud computing perspective.

© 2015-19, IJARCS All Rights Reserved 2


Firoj Parwej et al, International Journal of Advanced Research in Computer Science, 10 (3), May-June 2019,

This accessibility layer is accountable for turning any Thing D. Composition Layer
into a web thing that can be interacted with using HTTP
requests just like any other resource on the Web. In other At huge, the Web of Things materializes into an open
words, a web thing is a REST API that permits to ecosystem of digitally enlarge objects on top of which
communicate with something in the real world [24]. The applications can be created using standard web languages and
accessibility layer in the WoT is built around two main tools. The earlier layers, we allowed developers to access and
patterns firstly all things should be exposing their services via search for web enabled smart things and owners to have a
a RESTful API, either directly or via a gateway. REST is an straightforward and scalable mechanism to share them. In this
architectural style at the root of the programmable web thanks endmost layer, [26] we would like to push further the
to its implementation in HTTP 1.1. As an outcome, if things boundaries of the WoT so that from getting close to
offer RESTful APIs over HTTP, they get a URL and become developers, it also gets closer to end-users and enables them to
seamlessly integrated with the World Wide Web and its tools create straightforward composite applications on top of smart
like as browsers, hyperlinked HTML pages and JavaScript things. The role of the endmost layer is to integrate the
applications. In this context, various designs describing how services and data offered by things into higher level web,
the services offered by things can be accessed via REST have making it even simpler to create applications include things
been proposed. Secondly, the entreaty response nature of and virtual web services.
HTTP is often cited as one of the limitations for IoT use-cases
as it does not match the event-driven nature of applications V. OPEN PLATFORM IN WEB OF THING
that are common in the wireless sensor networks. To get the
better of this shortcoming while keeping a focus on fostering The impenitent internet will confer a wide range of real
integration with the web, various authors have suggested the world services supported by networked smart things setting up
use of HTML5 web sockets either natively or via the use of complex smart spaces on a worldwide scale. An open platform
translation brokers for instance translating from MQTT [3] or to provide developers with swift and convenient prototyping
CoAP to web sockets. tools to plug smart things into the web [6]. This is called the
Web of Things Open Platform (WoToP) and this model is
B. Findability Layer many design principles. Firstly, the management of massive
amounts of data generated by huge ecosystems of smart
The web faced homogeneous challenges, when it moved objects. Secondly, support for various communication modes
from a hypertext of several thousands of documents to an to deliver information to clients according to their information
application platform interconnecting an unprecedented number consumption needs and most typical communication modes
of documents, multimedia content and services. The are supported on-demand and event-driven. Thirdly, usage of
concentrate of this layer is to provide a way to explore and an information model and standardized protocol based on the
locate things on the web and hence is strongly impression of representational state transfer (REST) in order to propose a
the semantic web. This layer makes sure that your Thing can public API accessible to as several clients as possible.
not only be easily used by other HTTP clients, but can also be Fourthly, finding, configuration and management [7] of
findable and automatically usable by other WoT applications miscellaneous ecosystems of smart things, i.e. Things
[25]. The approach here is to reuse web semantic standards to equipped with sets of sensors and actuators as well as
describe things and their services. This enables finding for processing capabilities that are competent in performing
things via search engines and other web indexes as well as the inferences from its own contextual information. Fifthly, the
automatic generation of user interfaces or tools to integration process is supported by a set of synchronized smart
communicate with Things. This enables finding for things via gateways which implements both IP/TCP stack and particular
search engines and other web indexes as well as enabling protocols depending on the embedded devices plugged into it.
machine to machine communicate based on a small set of
well-defined standards and formats.
VI. DISCOVERY AND SEARCH IN THE WEB OF
C. Sharing Layer THINGS

This accountable for the share layer, which specifies how the The Web of Things search engines (WoTSE) is librarians
data generated by Things can be shared in an efficient and of WoT. They explore and gather WoT resources in a specific
secure manner over the web. At this level, another batch of scope and permit users to “search” on these resources. For
web protocols assists. Firstly, TLS, the protocol that makes succinctness and consistency, we use the term WoTSE for
transactions on the web securely. Then, techniques like as both systems designed specifically for WoT and IoT that can
delegated web authentication mechanisms like an oath which be adapted to WoT.
can be integrated with our Things’ APIs. The most basic needs
for a WoT sharing platform is to be secure in order to make 1. Detect Physical Objects: The WoTSE are commonly used
sure that access to smart things is not allowed to attackers. A to detect physical objects, which are tagged with passive
WoT sharing platform should be uncomplicated and easy to RFID tags [29] or sensor nodes [30].
use. Sharing the platform should also react mental models
users are already familiar with [28]. In special, it should as 2. Sensor Explore: The use of WoTSE [31] for retrieving
much as possible react the existing faith and social models of sensors based on their stable meta-data and contexts, like
users. A WoT sharing platform should also support advertising as the cost and trustworthiness.
the shared things directly on the web. In order to decrease the
load of users and ameliorate security, sharing a smart thing 3. Discovery Entity with Dynamic State: A WoTSE that
and advertising the fact that it was shared should occur on the discovery for [32] demonstrates physical objects, for
same channel without explicitly make known credentials. instance meeting room, based on their real-time status for
instance “empty” derived from their sensor readings.

© 2015-19, IJARCS All Rights Reserved 3


Firoj Parwej et al, International Journal of Advanced Research in Computer Science, 10 (3), May-June 2019,

4. Discovery Actuation Services: The use of WoTSE [33] as B. The WoT Middleware Layer
a middleware for retrieving services offered by physical
objects for instance changing lamp intensity. The functionalities of this layer permit designers and
developers of WoT services to model, implement and deploy
5. Retrieving Data Records: The use of WoTSE [34] to complicated smart spaces and disclose them according to the
retrieve data records compatible to an individual physical WoT model. In the IoT ecosystem monitor component
object. objectives at listening data from the adapters deployed on the
IoT ecosystem layer. Principally, it registers every device
VII. OPEN PLATFORM ARCHITECTURE IN WEB connected to the WoToP as well as its own context
OF THING information and events generated by them. The information
temporally stored in that cache is periodically dumped into a
The open platform architecture [35] in Web of Thing is knowledge base, which handle its persistency. In the event
based on a layered architecture composed of three layers management subsystem was designed to enable WoToP to
interconnected among them via well-defined interfaces shown handle asynchronous communications for those clients that
in figure 2. In this architecture, every layer contains need to consume context information according to particular
subsystems and components that fulfill particular aims. needs. This subsystem contains differing mechanisms to send
notifications or events to the clients [35]. In the middleware
configuration subsystem objectives in preparing and
configuring the execution environment of the Web of Things
middleware. An optimized configuration depends on the
features of the device that is going to run the middleware. The
standard parameters that can be configured via this subsystem
are associated with the location and credentials to access the
knowledge base, maximum number of clients that can access
to WoToP services at the same time or maximum number of
subscriptions that can be established in the subscription table.
In the middleware core is to disclose the interfaces of the
components, building the WoToP architecture, in order to
facilitate the essential communication among them. This kind
of communication is based on OSGI services.

C. Resource Composition and Orchestration Layer

As described in the earlier point, the resource composition


and orchestration layer is a planned subsystem of the WoToP
architecture since this layer enables WoToP to endow enriched
RESTful services to handle smart spaces. The resources
endowed by this layer are RESTful services which are
implemented by components. Those components are deployed
in the resource container which facilitates the handling of their
lifecycle. The lifecycle of the components deployed in the
resource container is planned in four phases running, stopping,
Figure 2. The Architecture of the Web of Things Open Platform destroying, and initializing. The initializing and the destroying
phase allocate and free memory for the operation of the
A. The IoT Ecosystem Layer component. The running and the stopping phase are
principally focused on opening and closing the REST
The IoT [2] ecosystem layer enables the WoToP link to endpoints that facilitates the access to the resources that are
things coexisting in the real-world. These things are usually proposed by the components.
smart, and they are characterized according to dissimilar
natures and objectives within the smart space they belong to. VIII. THE ARCHITECTURE FOR WOTSE
A smart thing consists of one or more embedded devices
The query resolution process that we introduced is
equipped with sensors and actuators that enable it to play a
common in the existing WoTSE plan. Its implementation,
role in the smart space, coexisting with other smart things to
transformation depending on the meta-path of every search
fulfill a given objective. The Internet of Things ecosystem
layer implements a mechanism based on the Plug & Play engine, but its activities and their arrangement are irreversible.
Because, this model activities as standalone modules for
model. In this procedure, devices of very dissimilar
building architecture for WoTSE. In figure 3 demonstrate our
technologies can be plugged to the WoToP. The components
modular architecture. In these modules our architecture is
implementing drivers for any technology are called adapters,
and they are stored in a repository. This procedure is supported organized into layers. The two lower layers handle discovery
activities and the two upper layers handle search activities.
by an OSGi framework that permits, scheduling [36] the life-
The storage modules for resource collections and indexes link
cycle of adapters, i.e. load, unload, run and stop. To integrate
the adapters with OSGi, they are implemented as bundles that two set of layers. The whole system is kept safe by security,
are stored in an OSGi Bundle Repository (OBR). Whenever a privacy, and trust assessment measures, which are grouped
new device is plugged to a WoToP gateway, be expected to into a vertical layer. The discoverer module detects resource,
identify in the meta-path of the search engine, in a certain
bundle is retrieved and loaded automatically.
physical scope. It can also be extended to discover the
relationship between objects and resources.
© 2015-19, IJARCS All Rights Reserved 4
Firoj Parwej et al, International Journal of Advanced Research in Computer Science, 10 (3), May-June 2019,

WoTSE. It evaluates the support that each module receives


from the current works and how it is commonly implemented.

IX. THE WEB ENABLING DEVICES

In spite of the fact that, web servers are likely to be


embedded into more and more devices, we cannot suppose
that every smart device will directly offer a RESTful interface.
In some instance, it makes sense to hide the platform
dependent protocol to access the resources of a particular
device, and to disclose them as RESTful service provided by a
gateway. The real interactions behind that RESTful service are
invisible and often will, contain specialized protocols for the
specific implementation sequence of events. The REST
elucidates the notion of intermediaries as a core part of the
architectural style, and therefore such a design can
comfortably be achieved by implementing the RESTful
service on intermediaries. By using either proxies or reverse
proxies, besides, it is possible to establish like an intermediary
from the client or from the server side, effectively introducing
a robust pattern for wrapping non-RESTful services in
RESTful abstractions. In these circumstances, two solutions
are possible first web connectivity directly on the smart things,
and the second indirectly via a proxy. The prior work has
shown that serving content using web servers for resource
constrained devices is presumable [39].

Figure 3. A Modular Architecture for Web of Things Search Engines

The retriever module collects the discovered resources and


passes them to the upper layer and index layer stores and
indexes resources with its collection manager and indexer
modules. This layer also possesses query independent (Q.I)
ranker to rank resources according to their inartificial order,
independent from user queries. For example, page rank is a
form of Q.I Ranking [37]. The depending on the timing
between discovery and search activity, a WoTSE can push
resources directly to the query resolution process, skipping the
index and storage layer. For example, the MAX search engine
discovers applicable objects in its vicinity during the query
resolution process by broadcasting the query [38]. The set of
responding objects, forms its query resource collection, which
is blundering after the query is resolved. The search layer
carries out the query resolution process. The query processor
module metamorphoses raw user queries into the form
Figure 4. The Web Enabling Devices
possible by the system. The query dependent (Q.D) ranker
scores discovered query resources with regard to the user
In addition, the foreseeable future, most embedded
query and utilizes the recorded links between resources to platforms will have native support for TCP/IP connectivity in
quest their corresponding outcome resources. The ranking
specific with 6LowPAN [40], consequently, a web server on
aggregator module is accountable for combining dissimilar
most devices is a suitable assumption. This approach is
Q.D and Q.I ranking outcome into a final score for each
sometimes desirable, as there is no need to translate HTTP
resource. Finally, the result processor extracts and combined requests from web clients into the appropriate protocol for the
the information from matching outcome resources and
various devices, and thus devices can be straight integrated
produces search outcome. The user interface layer interfaces
and make them RESTful APIs straight accessible on the web.
WoTSE with users. It confers query interface and outcome
In spite of, when an on-board HTTP server is not feasible or
interface to receive queries and return search outcome. Their not desirable, web integration takes place using a reverse
forms and implementations vary depending on the meta-path
proxy that bridges devices that are not directly accessible as
of a WoTSE. It also depends on the type of users targeted by
web resources. We call like as proxy a smart gateway [41] to
the WoTSE. Factually, a system designed for software
account for the fact that it is a network component that does
applications needs a various interface than a system designed
more than only data forwarding. A smart gateway is a web
for human users. The modular architecture endues a reference
server that hides the authentic communication between
framework assessing the diverse implementation of current
networked devices, for instance Bluetooth, Zigbee or
RedTacton [42] and the clients via the use of dedicated drivers

© 2015-19, IJARCS All Rights Reserved 5


Firoj Parwej et al, International Journal of Advanced Research in Computer Science, 10 (3), May-June 2019,

behind a RESTful service. From the web subscriber viewpoint, protocols makes the collection, storage, and analysis of data
the real web enabling process is fully transparent, as from miscellaneous sensors much simpler. In fact, integrating
interactions are HTTP in both matters. data across several cloud services is much faster thanks to the
straightforwardness and the ubiquity of REST APIs.
X. THE WEB OF THINGS SECURITY
B. The Web of Things and Marketing
Usually, openness and sharing in any ecosystem [10] come
always with security and privacy problem, same applies to the The mobile applications can retrieve data about CPG and
WoT. Things’ shared resources and data need to be secure FMCG products communicate with them to attach digital
against vulnerabilities raised from malicious intervention and content, and share information about them on social networks
inadvertent errors. In the last few decades, many web services much rapidly and more comfortably over the web. If every
based solutions have been proposed to address those privacy product in the world had its own URL and web API, it would
and security problem. Despite the fact that, those solutions in be comfortably in any application to recognize a product and
most of the time are not relevant to the constrained access its data without much integration effort. At
environment such as the WoT. Besides, it does introduce new EVRYTHNG4 firm, we used our Web of Thing platform to
dimensions of risk due to its miscellaneous nature. The connect products to the web and deliver such Marketing 2.0
controlling subscriber identity is a vital process in any applications. As an instance, Diageo in Brazil printed
application and system [43]. Such control contains distinctive QR codes on its whiskey bottles so that their
authenticating users, identifying them and life cycle of such customers could attach a personalized message to each bottle
identities. This process is also applied on the subscriber data in that case, it was a video created on the customer’s
inside an ecosystem, since personal information like as smartphone for Father’s Day [45].
identity, credentials, social security, etc., must be protected
against unauthorized access. Securing the communication C. The Web of Things and Wearable
between the various components of the Web of Thing
environment is compulsory, in order to preserve data Integrating wearable and quantified self devices on the
confidentiality and integrity and to prevent a third party from web, so that the data is directly accessible by other devices and
eavesdropping and intercepting information exchanged applications will make it much easier to develop new classes
between the various entities of the system. Conventional of extensible applications for elder care, health and fitness, or
access control focuses on the protection of data based on the fun and sports.
identity and attributes of the users [44]. Normally the access
control is used to protect front-end and back-end data and D. The Web of Things and Industry
system resources by adding restrictions on who can access the
data, what users can do, which resource they have access to Using web standards to interconnect all the elements in a
and what operations are allowed to be performed on the data. business process, such as the shop-floor machinery, enterprise
Ideally, access control prevents unauthorized users from software, employees in various departments, products,
viewing, copying or alteration the data. customer, and suppliers, will represent a significant change in
how companies do business. Turning all the elements in a
XI. USE CASES OF WEB OF THINGS factory into easy-to-combine LEGO-like bricks will make it
much easier and faster for companies to adapt to changing
The WoT extends the IoT in order to enable access and environments, get their products to market more quickly,
control of physical objects using web standards. The objects optimize their business and manufacturing processes, and so
are expected to show up logical interfaces via web services, to on. When all the actors in those processes are able to
describe web contents and services using semantic web automatically decide how best to perform their duty based on
languages and annotations, and to communicate together via real-time data, there’s no doubt that the way we design,
standard protocols in order to provide software interoperability manufacture, and distribute physical products will be
between objects. Such a WoT marketplace should permit profoundly changed.
developers and industrial companies to distribute their
software applications and components, and should endue end- E. The Web of Things and Smart Homes
users with software pieces, allowing them to implement
various functionalities into their objects in order to perform The smart home environment is probably symptomatic of
dissimilar tasks. There are several potential application the (too) vast number of standards and protocols that exist for
domains for the Web of Things, stretching across many connecting things to networks. Although all devices in your
industry sectors. In this section, we are attempting to structure home should talk to each other, they can’t because those
these domains and link to further details for the associated use protocols are incompatible and you end up with more apps and
cases of WoT. remote controls than ever before. The Web of Things offers an
alternative approach where web languages are the baseline, the
A. The WSNS and the Web of Things minimal API that devices should offer either directly or
indirectly through gateways. In our own company
It’s understandable that the majority of WSN devices “EVRYTHNG19” we used the Web of Things approach to
weren’t designed for the public. Those platforms were connect, at scale, a number of home automation devices from
intended to be mainly programmed by experts. Despite the fact different manufacturers. The Web of Things allows
that, web protocols are heavier than the optimized protocols interoperability between devices from different manufacturers
used in embedded devices, there has been a lot of progress in and fosters cross-device applications. It also makes it possible
optimized HTTP libraries that run on constrained devices. for a larger group of amateurs to buy all sorts of devices, build
Besides, devices are becoming increasingly stronger and many rapidly their smart home systems, and especially reuse and
come with Wi-Fi connectivity on board. The ability to
communicate with embedded sensors using standard web

© 2015-19, IJARCS All Rights Reserved 6


Firoj Parwej et al, International Journal of Advanced Research in Computer Science, 10 (3), May-June 2019,

customize these systems easily for their unique needs and location. In contrast, there are always new devices and
desires. protocols in the IoT world, and each time one of the many
protocols change, all the other pieces of the puzzle that use the
F. The Web of Things and Smart Logistics device need to be updated.

Imagine a web-enabled supply chain that knows in real time E. Validating the Discovered Web of Things Content
the temperature of your strawberries and can send alerts as
soon as the conditions change or even regulate automatically As real-world information in WoT is provided by exposing
the temperature of trucks, ships, and warehouses according to electronic tags and sensors that can be breached and forged, a
the type of the products being stored and transported all of that malicious party can inject false information into WoT, which
information accessible over web APIs. Sharing historical data would be distributed by WoT Search Engines. A potential
about devices using web standards will make it much easier solution for this issue is validating the information received
for multiple applications to work together across the whole from sensors against past patterns and readings of their
lifecycle of products. This means much lower integration costs neighboring sensors. Another potential solution is building the
and high data integrity across the different systems that will audit-ability into WoTSE. Ensuring that one would be held
process and handle those products. accountable for his malicious activities is a powerful
preventive mechanism.
G. The Web of Things and Smart Cities
F. Slack Coupling between Elements Web of Things
Using web standards in the context of smart cities is
particularly interesting because they make it much easier to The HTTP is loosely coupled by design because the contract
share sensor data with the public and make it easy for (API specification) between actors on the web is both simple
developers to consume real-time data about traffic, pollution, and well defined, which leaves little room for ambiguity. This
or public transportation in their own urban applications. allows any actor to change and evolve independently from
each other (as long as the contract doesn’t change). That’s why
XII. BENEFIT OF WEB OF THINGS you can still visit a web page that hasn’t been updated since
the early ’90s (we’ll skip any comments about its visual
In this section, we are discussing the benefit of Web of Things. design). The ability for devices on the Internet of Things to
talk to new devices as they get added without requiring any
A. Convenient to Program Web of Things firmware updates is essential for a global Web of Things.

The web protocols can easily be used to read and write data G. Storing and Disinfect the Collected Data Web of Things
from to the devices, and are especially much simpler to use
and faster to learn than the complex IoT protocols. In addition, A WoT Search Engine must find a balance between the
if all devices could offer a Web API, developers could use the number of old readings stored for resolving historical queries
same programming model to interact with any of them. Once and building prediction models, and the scale, the resources
you get the basic skills needed to build simple web that it manages, because each set of past measurements
applications, you can rapidly talk to new devices with minimal duplicates the whole resource collection. As a result,
effort. mechanisms for ensuring the scalability of the data storage
such as distribution, deployment and purging strategies must
B. Supporting Scalability Web of Things be investigated.

The WoTSE must fit the search activity in local scale XIII. CONCLUSION
naturally, and at the same time, they must also be able to scale
up to reach billion devices in the world. Scaling up a The Web of Things is an evolution of the Internet of Things
centralized search engine is not a preferable solution, because that refers to the adoption of a technology that will enable
these systems are too far from the physical world, making this sort of global functionality among smart devices. The
them insensitive to changes. WoT makes them naturally fit for WoT was inspired by the IoT as in common day-to-day
local search activity, while linking them together provides the devices are connected to the Web and can communicate via
coverage to address the upper ends of WoT scale. different systems. The Web of Things is about the use of the
web technology for building communication competence for
C. Open and Extensible Standards Web of Things smart objects. The WoT mainly focuses on software
standards and frameworks like as HTTP, REST and URIs to
The reason web standards have reached such popularity is create applications and services that integrate and interact
that they’re entirely open and free, so there’s virtually zero with heterogeneity of network devices. So, you could think
risk that they would change overnight. They ensure that data of the WoT as day-to-day objects being able to access Web
can be rapidly and easily moved across systems, hence HTTP services. The Web of Things is not just another vertical IoT
and REST is an obvious choice when one wants to offer public technology stack to compete with current platforms. It is
access to some data. intended as integrate horizontal application layer to bridge
together multiple underlying IoT protocols. The key point is
D. Rapidly and Effortless to Deploy, Maintain, and Integrate that this doesn't involve the reinvention of the means of
Web of Things communication because current standards are used. The
WoT is dissimilar because it doesn’t care about underlying
There’s no risk that the web will suddenly stop working networking protocols or standards, only about how to weave
and require an upgrade. Yet, the limits of what can be done on different isolated systems and devices into a single, web-
the web have not ceased to be redefined in a decade, such as based ecosystem.
the ability to capture images from a camera or share one’s
© 2015-19, IJARCS All Rights Reserved 7
Firoj Parwej et al, International Journal of Advanced Research in Computer Science, 10 (3), May-June 2019,

XIV. REFERENCES USA, ISSN (Print): 2372-4749 ISSN (Online): 2372-


4757, Science and Education Publishing Vol. 4, No. 1,
[1] Yusuf Perwej, “An Experiential Study of the Big Data,” page 20-29, June 2017, DOI: 10.12691/jcn-4-1-3
International Transaction of Electrical and Computer [14] Yusuf Perwej, Kashiful Haq, U. Jaleel, S. Saxena, “Some
Engineers System (ITECES), USA, ISSN (Print): 2373- drastic improvements found in the analysis of routing
1273 ISSN (Online): 2373-1281, Vol. 4, No. 1, page 14- protocol for the Bluetooth technology using scatternet” ,
25, March 2017, DOI:10.12691/iteces-4-1-3. International Conference on Computing, Communications
[2] [2] Yusuf Perwej, Mahmoud Ahmed Abou Ghaly, and Information Technology Applications (CCITA-2010)
Bedine Kerim and Hani Ali Mahmoud Harb, “An ,Ubiquitous Computing and Communication Journal
Extended Review on Internet of Things (IoT) and its (UBICC) Seoul, South Korea, Volume CCITA-2010,
Promising Applications” , Communications on Applied Number 5 , pages 86-95, ISSN Online 1992-8424, ISSN
Electronics (CAE), ISSN : 2394-4714, Foundation of Print 1994-4608, 2010
Computer Science FCS, New York, USA, Volume 9, [15] Amelie Gyrard, “A machine-to-machine architecture to
Number 26, Pages 8– 22, February 2019, merge semantic sensor measurements,” in Proceedings of
DOI: 10.5120/cae2019652812 the 22nd international conference on World Wide Web
[3] Yusuf Perwej, Majzoob K. Omer, Osama E. Sheta, Hani companion. International World Wide Web Conferences
Ali Mahmoud Harb, Mohmed S. Adrees, “The Future of Steering Committee, 2013, pp. 371–376.
Internet of Things (IoT) and Its Empowering [16] L. Atzori, A. Iera, and G. Morabito, “The internet of
Technology”, International Journal of Engineering things: A survey”, Comput. Netw. 54, 15, 2787–2805,
Science and Computing (IJESC), ISSN : 2321- 3361, 2010, DOI: 10.1016/j.comnet.2010.05.010
Volume 9, Issue No.3, Pages 20192– 20203, March 2019 [17] Alessandro Bassi and Geir Horn,” Internet of things in
[4] Nikhat Akhtar, Firoj Parwej, Yusuf Perwej, “A Perusal of 2020: A roadmap for the future”, In Proceedings of the
Big Data Classification and Hadoop Technology,” European Commission: Information Society and Media,
International Transaction of Electrical and Computer 2008
Engineers System (ITECES), USA, ISSN (Print): 2373- [18] Daniele Miorandi, Sabrina Sicari, Francesco De
1273 ISSN (Online): 2373-1281, Vol. 4, No. 1, page 26- Pellegrini, and Imrich Chlamtac,” Internet of things:
38, May 2017, DOI: 10.12691/iteces-4-1-4. Vision, applications and research challenges”, Ad
[5] Yusuf Perwej , Kashiful Haq, Firoj Parwej, Mumdouh Hoc Netw. 10, 7,1497–1516, 2012
Mirghani Mohamed Hassan ,“ The Internet of Things [19] Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic,
(IoT) and its Application Domains” , International Journal and Marimuthu Palaniswami. 2013. Internet of things
of Computer Applications (IJCA) ,USA , ISSN 0975 – (IoT):
8887, Vol. 182, No.49, Pages 36- 49, April 2019, DOI : [20] A vision, architectural elements, and future directions.
10.5120/ijca2019918763 Fut. Gen. Comput. Syst. 29, 7 (2013), 1645–1660.
[6] Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, [21] Friedemann Mattern and Christian Floerkemeier,”From
Zakaria Maamar ,” Web of Things: Description, the Internet of Computers to the Internet of Things”,
Discovery and Integration ”, International Conference on Springer, 242–259, 2010
Internet of Things and 4th International Conference on [22] Yongrui Qin, Quan Z. Sheng, Nickolas J. G. Falkner,
Cyber, Physical and Social Computing, IEEE, Dalian, Schahram Dustdar, Hua Wang, Athanasios V.
China, Oct. 2011 Vasilakos,”When things matter: A survey on data-centric
[7] B. C. Blessing Solomon ; Sharmila Mary Aral,” WOT internet of things”, J. Netw. Comput. Appl. 64, 137–153,
based routing protocol for the home diagnostic 2016
instruments”, Third International Conference on Science [23] [22] Kay Romer, Benedikt Ostermaier, Friedemann
Technology Engineering & Management (ICONSTEM), Mattern, Michael Fahrmair, and Wolfgang Kellerer,”Real-
IEEE, Chennai, India, March 2017 time search for real-world entities: A survey”, Proc. IEEE
[8] Simon Duquennoy, Gilles Grimaud, and Jean-Jacques 98, 11, 1887–1902, 2010
Vandewalle,”The web of things: Interconnecting devices [24] Sergei Evdokimov, Benjamin Fabian, Steffen Kunz, and
with high usability and performance”, In Proceedings of Nina Schoenemann, “Comparison of discovery service
the International Conference on Embedded Software and architectures for the internet of things”, In Proceedings of
Systems (ICESS’09). IEEE, 323–330, 2009 the IEEE International Conference on Sensor Networks,
[9] Heath, T., Bizer, C, “Linked Data: Evolving the Web into Ubiquitous, and Trustworthy Computing (SUTC’10),
a Global Data Space”, Morgan & Claypool, ISBN 978- IEEE, 237–244, 2010
1608454303, February 2011 [25] Yuchao Zhou, Suparna De,Wei Wang, and Klaus
[10] Yusuf Perwej, Firoj Parwej, Mumdouh Mirghani Moessner,” Search techniques for the web of things : A
Mohamed Hassan, Nikhat Akhtar, “The Internet-of- taxonomy and survey”, Sensors 16, 5, 600, 2016
Things (IoT) Security: A Technological Perspective and [26] Li Xiao-Hong,” Research and Development of Web of
Review” , International Journal of Scientific Research in Things System Based on Rest Architecture”, Fifth
Computer Science, Engineering and Information International Conference on Intelligent Systems Design
Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 5, and Engineering Applications, IEEE, Hunan, China, June
Issue 1, Pages 462-482, February 2019, 2014
DOI: 10.32628/CSEIT195193 [27] Guinard, D., Trifa, V., Pham, T., Liechti O, “Towards
[11] Dominique Guinard, Vlad Trifa, Friedemann Mattern, and Physical Mishap’s in the Web of Things”, In Proc. INSS
Erik Wilde, “From the Internet of Things to the Web of Pittsburgh, PA, USA, 2009
Things: Resource Oriented Architecture and Best [28] S. S. Mathew, Y. Atif, Q. Z. Sheng, Z. Maamar, "Web of
Practices”, chapter 5, pp. 97–129, Springer, New York things: Description discovery and integration", Internet of
Dordrecht Heidelberg London, 2011 Things (iThings/CPSCom) 2011 International Conference
[12] Dominique Guinard, Vlad Trifa, and Erik Wilde, “A on and 4th International Conference on Cyber Physical
resource oriented architecture for the web of things,” in and Social Computing, pp. 9-15, Oct 2011.
Proceedings of Internet of Things 2010 International [29] Michelle L Mazurek, J. P Arsenault, Joanna Bresee, Nitin
Conference (IoT 2010), Tokyo, Japan, Nov. 2010 Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang,
[13] Yusuf Perwej, “The Next Generation of Wireless Jenny Olsen, Brandon Salmon, Richard Shay, Kami
Communication Using Li-Fi (Light Fidelity) Vaniea, Lujo Bauer, Lorrie Faith Cranor, Gregory R
Technology,” Journal of Computer Networks (JCN), Ganger, and Michael K Reiter,”Access Control for Home
Data Sharing: Attitudes, Needs and Practices”, In Proc. of
© 2015-19, IJARCS All Rights Reserved 8
Firoj Parwej et al, International Journal of Advanced Research in Computer Science, 10 (3), May-June 2019,

the 28th international conference on Human factors in DOI: 10.21474/IJAR01/6672


computing systems (CHI 2010), CHI '10, pages 645{654, [38] Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry
New York, NY, USA, ACM, 2010 Winograd,” The pagerank citation ranking: Bringing order
[30] Mizuho Komatsuzaki, Koji Tsukada, Itiro Siio, Pertti to the Web”, Stanford InfoLab, 1999
Verronen, Mika Luimula, and Sakari Piesk,”IteMinder: [39] Kok-Kiong Yap, Vikram Srinivasan, and Mehul
Finding items in a room using passive RFID tags and an Motani,”MAX: Human-centric search of the physical
autonomous robot”, In Proceedings of the 13th world”, In Proceedings of the 3rd International
International Conference on Ubiquitous Computing. Conference on Embedded Networked Sensor Systems.
ACM, 599–600, 2011 ACM, 166–179, 2005
[31] Simon Mayer, Dominique Guinard, and Vlad Trifa,”
Searching in a web-based infrastructure for smart things”, [40] Duquennoy S, Grimaud G, Vandewalle J,”The Web of
In Proceedings of the 3rd International Conference on the Things: interconnecting devices with high usability and
Internet of Things (IOT’12). IEEE, 119–126, 2012 performance,” Proceedings of the 6th IEEE International
[32] Charith Perera, Arkady Zaslavsky, Peter Christen, Conference on Embedded Software and Systems
Michael Compton, and Dimitrios Georgakopoulos,” (ICESS’09). HangZhou, Zhejiang, China, 2009
Contextaware sensor search, selection and ranking model [41] Hui J, Culler D, “Extending IP to low-power, wireless
for internet of things middleware”, In Proceedings of the personal area networks”, IEEE Inter-net Comput 12:37-
IEEE 14th International Conference on Mobile Data 45, 2008
Management (MDM’13), Vol. 1. IEEE, 314–322, 2013 [42] Trifa V, Wieland S, Guinard D, Bohnert TM, “Design and
[33] Benedikt Ostermaier, K. Romer, Friedemann Mattern, Implementation of a Gateway for Web-based Interaction
Michael Fahrmair, and Wolfgang Kellerer,”A real-time and Management of Embedded Devices.”, Proceedings of
search engine for the web of things”, In Proceedings of the 2nd International Workshop on Sensor Network
the 1st International Conference on the Internet of Things Engineering (IWSNE 09). Marina del Rey, CA, USA,
(IOT’10). IEEE, 1–8, 2010 2009
[34] Benoit Christophe, Vincent Verdot, and Vincent [43] Yusuf Perwej, “A Literature Review of the Human Body
Toubiana,”Searching the web of things”, m In as a Communication Medium using RedTacton”
Proceedings of the 5th IEEE International Conference on Communications on Applied Electronics (CAE), ISSN :
Semantic Computing (ICSC’11). IEEE, 308–315, 2011 2394-4714, Foundation of Computer Science FCS, New
[35] Sergei Evdokimov, Benjamin Fabian, Steffen Kunz, and York, USA, Volume 9, No.4, Pages 7 – 17, April 2016,
Nina Schoenemann.,”Comparison of discovery service DOI: 10.5120/cae2016652161
architectures for the internet of things”, In Proceedings of [44] X Yang, Z Li, Z Geng, H Zhang, "A Multi-layer Security
the IEEE International Conference on Sensor Networks, Model for Internet of Things" in Internet of Things, Berlin
Ubiquitous, and Trustworthy Computing (SUTC’10). Heidelberg:Springer, pp. 388-393, 2012
IEEE, 237–244, 2010 [45] Ezedine Barka, Sujith Samuel Mathew, Yacine Atif,
[36] YangQun Li, "An Integrated Platform for the Internet of "Securing the web of things with role-based access
Things Based on an Open Source Ecosystem", Future control", International Conference on Codes Cryptology
Internet, vol. 10, pp. 105, 2018 and Information Security, pp. 14-26, 2015
[37] Yusuf Perwej , “The Ambient Scrutinize of Scheduling [46] http://adage.com/article/global-news/diageo-personalizes-
Algorithms in Big Data Territory”, International Journal whiskeys-videos-gift-givers/238015/.
of Advanced Research (IJAR), ISSN 2320-5407, Volume
6, Issue 3, PP 241-258, March 2018,

© 2015-19, IJARCS All Rights Reserved 9


INTERNET OF THINGS

What is the internet of things (IoT)?


The internet of things, or IoT, is a network of interrelated devices that connect and exchange
data with other IoT devices and the cloud. IoT devices are typically embedded with
technology such as sensors and software and can include mechanical and digital machines and
consumer objects.

Increasingly, organizations in a variety of industries are using IoT to operate more efficiently,
deliver enhanced customer service, improve decision-making and increase the value of the
business.

With IoT, data is transferable over a network without requiring human-to-human or human-
to-computer interactions.

A thing in the internet of things can be a person with a heart monitor implant, a farm animal
with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire
pressure is low, or any other natural or man-made object that can be assigned an Internet
Protocol address and is able to transfer data over a network.
How does IoT work?
An IoT ecosystem consists of web-enabled smart devices that use embedded systems -- such
as processors, sensors and communication hardware -- to collect, send and act on data they
acquire from their environments.
IoT devices share the sensor data they collect by connecting to an IoT gateway, which acts as
a central hub where IoT devices can send data. Before the data is shared, it can also be sent to
an edge device where that data is analyzed locally. Analyzing data locally reduces the volume
of data sent to the cloud, which minimizes bandwidth consumption.

Sometimes, these devices communicate with other related devices and act on the information
they get from one another. The devices do most of the work without human intervention,
although people can interact with the devices -- for example, to set them up, give them
instructions or access the data.

The connectivity, networking and communication protocols used with these web-enabled
devices largely depend on the specific IoT applications deployed.

IoT can also use artificial intelligence and machine learning to aid in making data collection
processes easier and more dynamic.
IoT technologies as a driver for business model innovation and digital transformation in industrial
companies

You may know several companies that excel in developing technological


innovations as a base to improve their products and secure their
competitive advantage. As IoT technologies make data ubiquitous and data
sharing super-easy, those companies usually face a major challenge as the
main driver for competitive advantage is no longer advances in product
technology but IoT enabled services which allow their industrial customers to
save money or to improve performance of their offerings.

I was recently advising a large company in the human and health and
nutrition business. It is an interesting case study to identify the promises and
challenges when your company is changing its business model to capture
the value from advanced IoT applications. This company has a leading
position in the market with highly functional products for large client firms in
mills and other nutrition business. The current business model – selling the
product at a premium price supported with some free IoT services based on
data from sensors in clients’ storage and production facilities – was no
longer sustainable: As the IoT services were generating increasingly more
value for clients, it was no longer an option to offer them for free to
customers. New business models were required, and this, in turn, compelled
management to transform the company’s structure, processes and culture.

What are the main findings from this study?

1. The benefits of a gradual digitalization process


· The company developed its digitalization skills gradually as a
supporting function for the prevailing business model – they developed free
digital services to support premium priced products. In other words,
digitalization was generating value from the start and business units were
eager to integrate them as part of their sales strategy. Many firms, in
contrast, start digitalization as a (corporate) transformation project that
doesn’t address the needs of its businesses and consequently doesn’t receive
internal support.

· The gradual development of IoT services backing the businesses led


automatically to new insights about the potential of the technology and
fueled the discussion about the need for new business and revenue models.

2. What type of revenue model to choose?

· The awareness that the company’s business model had to change was
growing as the IoT applications became more advanced. However, this
awareness was unequally distributed in the company: the digital service
development team was well aware of the potential while sales and marketing
managers in the business were still clinging to the existing business model.
This divergence in view is typical for companies that move fast to apply IoT
technologies, and it is one of the major challenges during digital
transformation processes.

· IoT enabled business models imply not only new revenue models, but
also the transition from one to the other business and revenue model. As the
company was progressing steadily with more audacious IoT enabled
business models, it set up a roadmap to adopt a set of consecutive business
models over time. The roadmap showed a stepwise process with increasing
levels of customer value creation over time. The first stage was based on
simple services such as automatic refilling and reducing downtime. The next
stage would assist customers in developing new process insights improving
their productivity. The last stage would have a transformational impact
maximizing quality, safety, productivity and profitability of industrial
customers through integrated solutions.

· Along these shifts in value creation, new ways to capture value had to
be developed. For the first two stages the company chose for a tiered
subscription model. Subscription models have the advantage that they are
easy to implement compared to outcome-based revenue models. A tiered
subscription model was advisable given the differences between the
company’s customers and the diversity of systems that the company offers
to them. The tiered subscription model also incorporated a pay-as-you go
model for the use of the products. The company didn’t choose for an
outcome based revenue model for it requires access to customers’ data,
performance metrics to agree upon, sufficient control of the
production environment, and a detailed understanding of the customers’
business. A subscription model was much easier to deal with even though
the company may, by choosing this revenue model, leave some money on
the table.

· For the last stage , the company could introduce consultancy services
(monetization of IoT data) as an additional business model. Those
consultancy services are customized to the needs of the customers, but once
developed economies of scale can be reached by applying similar services to
different customers and application areas.

· Transitions between business ( & revenue) models also have to be


managed carefully. To avoid cannibalization of current revenues the
prevailing business model (premium priced liquids and free services) was
continued for existing offerings while the subscription based model
could be developed for new types of services and applications.

· As the company was rapidly developing advanced IoT capabilities and


gained more recognition among customers, it could eventually consider a
platform based business model. A platform model would transform the role
of the company – no longer (only) a supplier but a platform provider and
platform owner. In this model, revenues stem from the transactions between
customers and suppliers on the platform. In this case, the company would no
longer be limited by its own products and services but it could include
offerings of complementors and competitors in the same way
as Klöckner did with XOM Materials, an industry wide B2B digital platform
for steel, metal and industrial products trading.

3. Revenue models can’t change without digital transformation

· The switch to new IoT enabled business models can only be


implemented successfully if companies are establishing a digital culture. The
divide between the digital savvy people in the company’s digital services
team on the one hand and the businesses on the other hand can only be
bridged through corporate wide initiatives that lead to the digital
transformation of the organization and the culture. Sales is an excellent
example: sales were still organized around selling products while digital
services require a service oriented sales process in which technical
knowledge is essential to offer value propositions to customers. Salespeople
need to be technically skilled and they have to work together with technical
people to understand, pitch and deliver new digital services to customers.

· Also top management has to be on board to scale up the digital


transformation from project based initiatives in the digital services unit to a
corporate wide transformation process.

4. From closed to open transformation

· The company has been developing the digitalization process internally.


Other companies that go through a digital transformation process tend to
rely on partners to speed up and secure the transition. Reliance on external
resources and competencies is necessary to succeed in a digital
transformation journey: Collaboration with universities and research labs to
find advanced solutions and skilled people; working with complementors
and suppliers to offer joint solutions; participating in explorative R&D and
innovation projects to explore the potential of digital applications integrating
data across the supply chain; partnering with customers as lead users to get
an in-depth understanding of their latent needs and aspirations.

M2M: Machine-to-Machine Communications


One of the new technologies that’s part of the Internet of Things is Machine-to-Machine (M2M)
communications. M2M, though not well-defined, is a set of methods and protocols to allow devices
to communicate and interact over the Internet (or other network) without human intervention. M2M
is sometimes considered to be low-overhead short-range wireless communication between
machines, utilizing protocols with much less overhead than full-blown TCP/IP. Many M2M
applications involve low power wireless devices with limited computing power and narrowly-
defined functionality. Low-overhead protocols have been devised for them, including Message
Queue Telemetry Transport (MQTT), Constrained Application Protocol (CoAP), and Open Mobile
Alliance Light Weight M2M (OMA LWM2M). CoAP is actually a specialized web transfer protocol
designed for applications such as smart energy and building automation. There is, of course, no
reason why IoT devices cannot use high-powered CPUs and wide bandwidth, and in many
applications this is clearly necessary, such as smart cars interacting with external servers. So IoT
spans a huge range from very simple low-powered specialized devices and sensors with low
bandwidth needs to complex, high-powered devices in large high-bandwidth environments.

WSNs: Wireless Sensor Networks


IoT configurations often involve sensors, which can be connected by wireless networks. Such
sensor networks are termed “Wireless Sensor Networks” or WSNs. A WSN comprises spatially
distributed autonomous devices equipped with sensors, connected through a wireless network to
some type of gateway. The sensors typically monitor physical or environmental conditions. The
gateway communicates with another set of devices that can act on the information from the
sensors. Application examples include patient monitoring; environmental monitoring of air, water,
and soil; structural monitoring for buildings and bridges; industrial machine monitoring; and
process monitoring. The wireless network could be WiFi or Bluetooth, and the protocol one of the
three listed above.
The boundaries between these networks are not clearly drawn, and in practice they overlap
considerably. Figure 3 shows the relationship schematically:

Figure 3. Relationship of IoT, M2M, and WSN

Figure 4. Goals of IoT


The objectives revolve around efforts to reduce costs and save time. But they also promise to
make new things possible that are not feasible now, such as devices for improved patient
monitoring and improved transportation systems utilizing autonomous vehicles and other modes.

IoT Enabling Technologies


There are many technologies that support IoT and make possible its steady advance. A partial
list includes the following:
 Cheap and ubiquitous telecommunications
 Smart software
 Smart devices
 Cheap memory
 Cheap and extremely powerful microprocessors
 Cloud Computing
 Big data, event stream processing, real-time analytics
 Machine Learning
 Wireless sensor networks
 Low power short-range and wide area wireless networks
 Embedded systems
 Automation and control Systems
 Existing and emerging telecom technologies: Li-Fi, LPWAN, LTE-Advanced, 5G, WiFi-Direct, BLE,
ZigBee, Z-Wave, Thread, HaLow, …

 SCADA (Supervisory Control and Data Acquisition) and RFID (Radio
Frequency Identification) are both protocols that can be used in IoT (Internet of
Things) applications.
 SCADA is a protocol used to remotely monitor and control industrial processes
and equipment. It is commonly used in manufacturing, energy, and other
industrial settings. SCADA systems typically consist of a central server or
control unit that communicates with remote sensors, actuators, and other
devices over a network. The SCADA protocol is designed to provide secure
and reliable communication between the central control unit and the remote
devices. Some commonly used SCADA protocols include Modbus, DNP3, and
OPC.
 RFID is a wireless communication protocol that is used for identifying and
tracking objects or people. RFID tags are small devices that can be attached to
objects or embedded in products. They contain a microchip and an antenna
that can communicate with RFID readers over a wireless connection. RFID
tags can be used to track inventory, monitor supply chains, and provide access
control in security systems. The RFID protocol defines how the tags and
readers communicate with each other, and how the data is transmitted
between them. Some commonly used RFID protocols include EPCglobal and
ISO/IEC 18000.
 In IoT applications, both SCADA and RFID protocols can be used to collect
data from remote devices and transmit it to a central location for analysis and
processing. SCADA protocols are typically used for monitoring and controlling
industrial processes, while RFID protocols are more commonly used for
tracking and identifying objects or people. However, there may be some
overlap between the two, as RFID tags could be used to track the movement of
goods or products within an industrial process that is being monitored by a
SCADA system.

Lack of standardization

The lack of standardization creates interoperability issues, which can lead to


compatibility problems and limited functionality.

For example, if two IoT devices cannot communicate with each other
because they use different protocols or data formats, they cannot work
together to achieve a common goal.

IEEE 802.15.4e:
802.15.4e for industrial applications and 802.15.4g for the smart utility networks (SUN)
The 802.15.4e improves the old standard by introducing mechanisms such as time
slotted access, multichannel communication and channel hopping.
 IEEE 802.15.4e introduces the following general functional enhancements:
1. Low Energy (LE): This mechanism is intended for applications that can trade
latency for energy efficiency. It allows a node to operate with a very low duty cycle.
2. Information Elements (IE) It is an extensible mechanism to exchange information at
the MAC sublayer.
3. Enhanced Beacons (EB): Enhanced Beacons are an extension of the 802.15.4
beacon frames and provide a greater flexibility. They allow to create application-
specific frames.
4. Multipurpose Frame: This mechanism provides a flexible frame format that can
address a number of MAC operations. It is based on IEs.
5. MAC Performance Metric: It is a mechanism to provide appropriate feedback on the
channel quality to the networking and upper layers, so that appropriate decision can be
taken.
6. Fast Association (FastA) The 802.15.4 association procedure introduces a
significant delay in order to save energy. For time-critical application latency has
priority over energy efficiency.
 IEEE 802.15.4e defines five new MAC behavior modes.
1. Time Slotted Channel Hopping (TSCH): It targets application domains such as
industrial automation and process control, providing support for multi-hop and
multichannel communications, through a TDMA approach.
2. Deterministic and Synchronous Multi-channel Extension (DSME): It is aimed to
support both industrial and commercial applications.
3. Low Latency Deterministic Network (LLDN): Designed for single-hop and single
channel networks
4. Radio Frequency Identification Blink (BLINK): It is intended for application domains
such as item/people identification, location and tracking.
5. Asynchronous multi-channel adaptation (AMCA): It is targeted to application
domains where large deployments are required, such as smart utility networks,
infrastructure monitoring networks, and process control networks.

Properties:
1. Standardization and alliances: It specifies low-data-rate PHY and MAC layer
requirements for wireless personal area networks (WPAN).
IEEE 802.15. Protocol Stacks include:
 ZigBee: ZigBee is a Personal Area Network task group with a low rate task group 4.
It is a technology of home networking. ZigBee is a technological standard created
for controlling and sensing the network. As we know that ZigBee is the Personal
Area network of task group 4 so it is based on IEEE 802.15.4 and is created by
Zigbee Alliance.
 6LoWPAN: The 6LoWPAN system is used for a variety of applications including
wireless sensor networks. This form of wireless sensor network sends data as
packets and uses IPv6 – providing the basis for the name – IPv6 over Low power
Wireless Personal Area Networks.
 ZigBee IP: Zigbee is a standards-based wireless technology that was developed for
low-cost and low-power wireless machine-to-machine (M2M) and internet of things
(IoT) networks.
 ISA100.11a: It is a mesh network that provides secure wireless communication to
process control.
 Wireless HART: It is also a wireless sensor network technology, that makes use of
time-synchronized and self-organizing architecture.
 Thread: Thread is an IPv6-based networking protocol for low-power Internet of
Things devices in IEEE 802.15. 4-2006 wireless mesh network. Thread is
independent.
2. Physical Layer: This standard enables a wide range of PHY options in ISM bands,
ranging from 2.4 GHz to sub-GHz frequencies. IEEE 802.15.4 enables data
transmission speeds of 20 kilobits per second, 40 kilobits per second, 100 kilobits per
second, and 250 kilobits per second. The fundamental structure assumes a 10-meter
range and a data rate of 250 kilobits per second. To further reduce power usage, even
lower data rates are possible. IEEE 802.15.4 regulates the RF transceiver and channel
selection, and even some energy and signal management features, at the physical
layer. Based on the frequency range and data performance needed, there are now six
PHYs specified. Four of them employ frequency hopping techniques known as Direct
Sequence Spread Spectrum (DSSS). Both PHY data service and management service
share a single packet structure so that they can maintain a common simple interface
with MAC.
3. MAC layer: The MAC layer provides links to the PHY channel by determining that
devices in the same region will share the assigned frequencies. The scheduling and
routing of data packets are also managed at this layer. The 802.15.4 MAC layer is
responsible for a number of functions like:
 Beaconing for devices that operate as controllers in a network.
 used to associate and dissociate PANs with the help of devices.
 The safety of the device.
 Consistent communication between two MAC devices that are in a peer-to-peer
relationship.
Several established frame types are used by the MAC layer to accomplish these
functions. In 802.15.4, there are four different types of MAC frames:
 frame of data
 Frame for a beacon
 Frame of acknowledgement
 Frame for MAC commands
4. Topology: Networks based on IEEE 802.15.4 can be developed in a star, peer-to-
peer, or mesh topology. Mesh networks connect a large number of nodes. This
enables nodes that would otherwise be out of range to interact with each other to use
intermediate nodes to relay data.
5. Security: For data security, the IEEE 802.15.4 standard employs the Advanced
Encryption Standard (AES) with a 128-bit key length as the basic encryption technique.
Activating such security measures for 802.15.4 significantly alters the frame format and
uses a few of the payloads. The very first phase in activating AES encryption is to use
the Security Enabled field in the Frame Control part of the 802.15.4 header. For safety,
this field is a single bit which is assigned to 1. When this bit is set, by taking certain
bytes from its Payload field, a field known as the Auxiliary Security Header is formed
following the Source Address field.
6. Competitive Technologies: The IEEE 802.15.4 PHY and MAC layers serve as a
basis for a variety of networking profiles that operate in different IoT access scenarios.
DASH7 is a competing radio technology with distinct PHY and MAC layers.

The architecture of LR-WPAN Device:

IEEE 802.15.4

Advantages of IEEE 802.15.4:


IEEE 802.15.4 has the following advantages:
 cheap cost
 long battery life,
 Quick installation
 simple
 extensible protocol stack

Disadvantages of IEEE 802.15.4:


IEEE 802.15.4’s drawbacks include:
 IEEE 802.15.4 causes interference and multipath fading.
 doesn’t employ a frequency-hopping approach.
 unbounded latency
 interference susceptibility
Applications of IEEE 802.15.4:
IEEE 802.15.4 Applications:
 Wireless sensor networks in the industry
 Building and home automation
 Remote controllers and interacting toys
 Automotive networks

BACnet Protocol : Architecture, Working, Types, Objects & Its


Applications
What is BACnet Protocol?
A data communication protocol that is used to build an automated control network, is
known as BACnet or Building Automation Control Network. This data communication
protocol is both an ISO & ANSI standard used for interoperability between
cooperating building automation devices. Bacnet Protocol includes a set of rules for
governing the data exchange on a computer network that simply covers all from what
type of cable to utilize, to form a particular command or request in a normal way.
To attain interoperability across a broad spectrum of equipment, the BACnet
specification includes three major parts. Primary, Secondary, and tertiary. So the
primary part defines a technique to represent any kind of building automation
apparatus in a normal way.
The secondary part describes messages that can be transmitted across a network of
computers to check and manage such equipment. The final part describes a set of
suitable LANs which are used for conveying BACnet communications.
Why is Bacnet Protocol required?
The BACnet protocol’s importance is to define typical techniques that manufacturers
can execute to build components as well as systems that are interoperable through
other components & systems of BACnet.
It also specifies how data is signified on the network as well as the services that are
utilized to transmit data from one node of BACnet to another node. It also has
messages that recognize network & data nodes.
BACnet is used as a tool by owners of buildings & system specifiers for the
specification of the interoperable system. This protocol does not change the need for
indicating what a consumer needs. So, it provides simply some consistent tools to
assist the creation & specification of systems that can interoperate.
BACnet protocol is used in all types of automated building systems. So, there are
interoperable products available within different categories like security, fire, lighting,
elevators, HVAC, etc. This protocol simply addresses the interoperability goal
through simply defining a general working model of automation devices, a technique
used for defining the data that they include, & also a technique used for explaining
protocols that a single device can utilize to inquire one more device to execute some
preferred action.
Bacnet Protocol Architecture
The BACnet protocol architecture is predominately restricted to lighting controls,
HVAC & gateways. This protocol highlights lightweight and efficient communication
which is optimized for short messages, small networks, and inter-networks.
Bacnet Protocol
Architecture
BACnet protocol architecture is a collapsed architecture that matches to 4-layers of
the OSI model. The four layers in the BACnet architecture mainly include Application,
Network, Data Link & Physical. Even though, just the Network layer & Application
layer are simply BACnet.
The above architecture is the BACnet protocol stack which includes different layers
as shown in the diagram. This protocol is a collapsed version of the OSI stack. The
transport and session layers are not used. The application layer takes on the
functions of these two layers.
BACnet Physical Layer
The upper layers of BACnet do not depend on the physical layer. So the Physical
layer of BACnet makes it feasible for BACnet to be executed on different networks.
The physical layers of BACnet have been specified with ARCNET, Ethernet, IP
tunnels, BACnet/IP, RS-232, RS485, and Lonworks/LonTalk. RS232 is for point-to-
point communication. RS485 supports up to 32 nodes with a distance of 1200 m at
76Kbps.
BACnet Protocol Link Layer
BACnet protocol is implemented directly with LonTalk or IEEE802.2 link layers. So it
specifies Point to Point (PTP) data link layer for RS232 connections. It specifies
MS/TP data link layer intended for RS-485 connections. The standard simply
specifies BVLL (BACnet Virtual Link Layer) which states all the services required
through the BACnet device at this link layer.
IP BACnet Virtual Link Layer encapsulates required control data in a header of
BACnet virtual link control information. Because of IP, BVLL, and BACnet protocol
devices can directly communicate over IP networks without the requirement of any
router device.
BACnet protocol utilizes BBMD (BACnet broadcast management device) concept
which executes the required broadcast for the preferred link layer. So, the BACnet
broadcast message is changed into IP-based broadcast or multicast messages.
BACnet Network Layer
This layer simply specifies the required addresses of the network for routing. BACnet
network includes a minimum of one or above segments that are connected with
bridges once they utilize similar LAN technologies. If they utilize various LAN
protocols then they are connected through routers.
Application Layer
BACnet does not separate presentation as well as application layers. So it takes care
of reliability & sequencing or segmentation mechanisms generally connected with
both the session & transport layers. BACnet includes devices like objects to
exchange service primitives which are described with ASN.1 syntax & serialized with
ASN.1 BER.
BACnet Security Layer
The concept of BACnet security can be understood easily with an example say when
BACnet device-A requests a session key from the key server for establishing secure
communication through device-B, then this key is transmitted to both the device-A &
device-B through the key server which is known as ‘SKab’. BACnet protocol uses 56-
bit DES encryption.
How Does Bacnet Protocol Work?
BACnet is a typical electronic communication protocol that works by allowing different
kinds of manufacturers’ building automation as well as monitoring systems like fire
alarms, HVAC, and perimeter security for communicating with each other. This
protocol can work with nearly any normal data protocol including TCP/IP.
BACnet protocol enables the comprehensive BMSs (building management systems)
development that allows operators to construct, observe & control different building
systems within a single application.
This protocol is also used to expand the flexibility & scope of the automation that can
be executed. For instance, an automation system could be setup such that once the
fire protection system notices a fire, then the system sends commands to the
following.
 To the control system of the elevator to send all elevators to the ground floor
immediately.
 To the paging system of the building to transmit an audible voice signal to inform
occupants of the building wherever the blaze was detected & how to go out from
the building.
 From the audio or visual systems of the building to flash messages on TV displays
within the conference rooms.
 To an interface of phone system for sending alerts through text message to the
facilities & engineering teams of the building.
With BACnet protocol, all the data is signified in terms of an object. So each object
signifies data regarding a device or component. Signifying information like an object
simply provides the benefit that the latest objects can be formed otherwise existing
objects can be modified based on the requirements of the user.
An object signifies physical information (physical inputs, outputs) & nonphysical
information (software/calculations). It is very significant to note that every object may
signify a single portion of information otherwise a group of information which
executes the same and exact function.
BACnet Object
BACnet object is a concept that allows the communication as well as a group of data
related to i/ps, o/ps, software & calculations to be executed. The BACnet Object can
visible itself in different ways like Single Points, Logical Groups, Program Logic,
Schedules & Historical Data.
The BACnet objects are both physical & non-physical. For instance, a thermostat is
considered a physical concept & the HVAC system is considered the output device.
The best example of a non-physical concept is the maintenance schedule of an
HVAC in the software form.
All BACnet objects include different properties of information exchange & commands.
These properties represented in a tabular format with two columns. The first column
includes the name of the property & the second column provides the value of the
property. In the second column, the Information can exist in a write-enable/read-only
format.

Oracle Integration Cloud Architecture Diagram


However, I can certainly explain the basic architecture of the Oracle
Integration Cloud (OIC).

The Oracle Integration Cloud is made up of several key components, each


contributing to the overall functionality of the system. Here’s a general
breakdown:

Integration: This is the core part of the Oracle Integration Cloud, which
allows you to create integrations between your different applications. It uses
adapters to connect to various cloud and on-premises applications.

Process: This is used to model, automate, and manage business processes. It


is a complete, end-to-end process management platform that allows you to
build and manage both structured and dynamic processes.

Visual Builder: This is a development tool for creating and hosting web,
mobile, and progressive web interfaces. It uses a visual development
experience to create apps.

Insights: This component provides real-time business analytics and helps


you understand more about your business processes and integrations.

These components are hosted in the Oracle Cloud Infrastructure (OCI), which
provides the necessary computing resources. Moreover, all the components
are underpinned by shared services such as security, notifications, identity
management, etc.

In terms of connectivity, the OIC can connect to both cloud-based and on-
premises applications using its extensive range of adapters. It can also use
REST and SOAP APIs to interact with external systems.

Remember, the architecture can be quite complex depending on the


specifics of a deployment, and additional components such as Oracle API
Platform Cloud Service, Oracle Java Cloud Service, or Oracle SOA Cloud
Service might be involved in some scenarios.
IoTivity is an open-source, reference implementation of the OCF
Secure IP Device Framework.
The OCF Secure IP Device Framework provides a versatile
communications layer with best-in-class security for Device-to-Device
(D2D) and Device-to-Cloud (D2C) connectivity over IP. IoT
interoperability is achieved through the use of consensus-derived,
industry standard data models spanning an array of usage verticals.
The OCF Secure IP Device Framework may be harnessed alongside
other IoT technologies in a synergistic fashion to lend a
comprehensive and robust IoT solution.

The IoTivity project offers device vendors and application developers


royalty-free access to OCF technologies under the Apache 2.0 license.

IoTivity stack FeaturesPermalink

 OS agnostic: The IoTivity device stack and modules work cross-


platform (pure C code) and execute in an event-driven style. The
stack interacts with lower level OS/hardware platform-specific
functionality through a set of abstract interfaces. This decoupling
of the common OCF standards related functionality from
platform adaptation code promotes ease of long-term
maintenance and evolution of the stack through successive
releases of the OCF
specifications.

 Porting layer: The platform abstraction is a set of generically


defined interfaces which elicit a specific contract from
implementations. The stack utilizes these interfaces to interact
with the underlying OS/platform. The simplicity and
boundedness of these interface definitions allow them to be
rapidly implemented on any chosen OS/target. Such an
implementation constitutes a “port”.
 Optional support for static memory: On minimal environments
lacking heap allocation functions, the stack may be configured to
statically allocate all internal structures by setting a number of
build-time parameters, which by consequence constrain the
allowable workload for an application.

What Is The Difference Between The "Internet Of Things" And The "Web Of Things"?
IoT WoT
Devices can be connected with any form of WoT is made to handle and use the potential of
internet IoT
It deals with actuators, sensors, computation, It deals with web servers and Protocols. WoT is
communication Interfaces. Digitally Augmented made up of the applications that are made for Io
objects make IoT Devices.
Every IoT devices have a different Protocol A single protocol is used for multiple/various IoT
devices.
Programing is difficult because of multiple Programming is easy so it doesn’t have multiple
protocols protocols.
All the protocols and standard are private and it WoT can be accessed freely by anyone, anytime.
cannot be accessed publicly
Arduino Tutorial

Arduino is a project, open-source hardware, and software platform used to design and build
electronic devices. It designs and manufactures microcontroller kits and single-board interfaces
for building electronics projects.

The Arduino boards were initially created to help the students with the non-technical background.

The designs of Arduino boards use a variety of controllers and microprocessors.

The Arduino board consists of sets of analog and digital I/O (Input / Output) pins, which are
further interfaced to breadboard, expansion boards, and other circuits. Such boards feature the
model, Universal Serial Bus (USB), and serial communication interfaces, which are used for
loading programs from the computers.

It also provides an IDE (Integrated Development Environment) project, which is based on the
Processing Language to upload the code to the physical board.

The projects are authorized under the GPL and LGPL. The GPL is named as GNU General Public
License. The licensed LGPL is named as GNU Lesser General Public License. It allows the use of
Arduino boards, it's software distribution, and can be manufactured by anyone.

It is also available in the form of self practicing kits.

The Arduino is used for various purposes, such as:


o Finger button
o Button for motor activation
o Light as a sensors
o LED button
o Designing
o The Building of electronic devices

What is Arduino?
Arduino is a software as well as hardware platform that helps in making electronic projects. It is
an open source platform and has a variety of controllers and microprocessors. There are various
types of Arduino boards used for various purposes.

The Arduino is a single circuit board, which consists of different interfaces or parts. The board
consists of the set of digital and analog pins that are used to connect various devices and
components, which we want to use for the functioning of the electronic devices.

Most of the Arduino consists of 14 digital I/O pins.

The analog pins in Arduino are mostly useful for fine-grained control. The pins in the Arduino
board are arranged in a specific pattern. The other devices on the Arduino board are USB port,
small components (voltage regulator or oscillator), microcontroller, power connector, etc.

Features
The features of Arduino are listed below:
o Arduino programming is a simplified version of C++, which makes the learning process easy.
o The Arduino IDE is used to control the functions of boards. It further sends the set of specifications
to the microcontroller.
o Arduino does not need an extra board or piece to load new code.
o Arduino can read analog and digital input signals.
o The hardware and software platform is easy to use and implement.
AD

History
The project began in the Interaction Design Institute in Ivrea, Italy. Under the supervision of Casey
Reas and Massimo Banzi, the Hernando Bar in 2003 created the Wiring (a development platform).
It was considered as the master thesis project at IDII. The Wiring platform includes the PCB (Printed
Circuit Board). The PCB is operated with the ATmega168 Microcontroller.

The ATmega168 Microcontroller was an IDE. It was based on the library and processing functions,
which are used to easily program the microcontroller.

In 2005, Massimo Banzi, David Cuartielles, David Mellis, and another IDII student supported the
ATmega168 to the Wiring platform. They further named the project as Arduino.

The project of Arduino was started in 2005 for students in Ivrea, Italy. It aimed to provide an easy
and low-cost method for hobbyists and professionals to interact with the environment using the
actuators and the sensors. The beginner devices were simple motion detectors, robots, and
thermostats.

In mid-2011, the estimated production of Arduino commercially was 300,000. In 2013, the Arduino
boards in use were about 700,000.

Around April 2017, Massimo Banzi introduced the foundation of Arduino as the "new beginning
for Arduino". In July 2017, Musto continued to pull many Open Source licenses and the code from
the websites of the Arduino. In October 2017, Arduino introduced its collaboration with the ARM
Holdings. The Arduino continues to work with architectures and technology vendors.
AD

Microcontroller
The most essential part of the Arduino is the Microcontroller, which is shown below:

o Microcontroller is small and low power computer. Most of the microcontrollers have a RAM
(Random Access Memory), CPU (Central Processing Unit), and a memory storage like other
computer systems.
o It has very small memory of 2KB (two Kilobytes). Due to less memory, some microcontrollers are
capable of running only one program at a time.
o It is a single chip that includes memory, Input/Output (I/O) peripherals, and a processor.
o The GPIO (General Purpose Input Output) pins present on the chip help us to control other
electronics or circuitry from the program.

Electronic devices around Us


We have many electronic devices around us. Most of the appliance consists of the microcontroller
for its functioning. Let's discuss some of the examples.
o Microcontroller present in Microwave Oven accepts the user input and controls the magnet run
that generate microwave rays to cook the food and displays the output timer.
o Modern cars also contain dozens of microcontrollers working in tandem (one after another) to
control functions like lighting, radio interface, etc.

Projects
Let's consider a simple project of LED blink.
AD

We need a software to install our sketch or code to the Arduino board. The LED will blink after the
successful uploading of code. The software is called as Arduino IDE (Integrated Development
Environment).

There are various projects created with the help of the Arduino. Some of the projects are listed
below:
o Home Automation System using IOT (Internet of Things).
o Solar Power water trash collector.
o Fire Detector, etc.
Some projects require a list of components. So, for easy convenience and hands-on projects, the
Arduino kits are available easily in market.

Arduino Kits
We can easily start with our electronics projects using the complete kit. It also helps us to create
hand-on and engaging projects.

Some of the popular Arduino kits are listed below:


o Arduino Starter kit
o Robot Linking UNO kit for learning
o Arduino UNO 3 Ultimate starter kit
o UNO Super starter kit
o Mega 2560 Starter Kit

Arduino IDE
The IDE makes the traditional projects even easier and simpler. The USB cable is used to load the
program or sketch on the specific Arduino board.

The IDE application is suitable for Windows, Mac OS X, and Linux. It supports the programming
language C and C++. We need to connect the Genuino and Arduino board with the IDE to upload
the sketch written in the Arduino IDE software.

Many other companies including Sparkfun Electronics, also make their own boards that are
compatible with Arduino IDE.

Arduino Boards
There are variety of Arduino board used for different purposes. The board varies in I/O pins, size,
etc. The various components present on the Arduino boards are Microcontroller, Digital
Input/Output pins, USB Interface and Connector, Analog Pins, Reset Button, Power button, LED's,
Crystal Oscillator, and Voltage Regulator. Some components may differ depending on the type of
board.

Let's discuss some of the popular Arduino boards.


o Arduino UNO
o Arduino Nano
o Arduino Mega
o Arduino Due
o Arduino Bluetooth

Shields
o Shields are defined as the hardware device that can be mounted over the board to increase the
capabilities of the projects.
o The shield is shown below:
o The shield together with Arduino can make the projects even smarter and simpler. For example,
Ethernet shields are used to connect the Arduino board to the Internet.
o The shields can be easily attached and detached from the Arduino board. It does not require any

Applications of Industrial Internet of Things


(IIoT)

How does Industrial IoT works?


Industrial IoT is a system includes smart sensors, machines, tools, software platforms,
cloud servers and applications. Smart sensors are deployed at every stages of
manufacturing floor for specific applications. These sensor networks continuously
send data to the IoT gateway (act as a hub between IoT devices and cloud) which
receive and transmit the data to the cloud application server for processing and
analysis. Sophisticated application programs are developed to handle large amount
data within secure network and it is accessible using Smartphone applications.
1. Industrial Automation
Industrial automation is one of most significant and common application of Internet
of Things. Automation of machines and tools enables companies to operate in an
efficient way with sophisticated software tools to monitor and make improvements
for next process iterations.
Accuracy of process stages can be improved to a greater level using machine
automation. Automation tools like PLC (Programmable Logic Control) and PAC
(Programmable Automation Control) are used with smart sensor networks connected
to a central cloud system which collect huge amount of data. Specially designed
software and applications are used to analyze the data and its behavior for
improvements.
Industrial automation improves accuracy, efficiency; reduces errors, easy to control
and remotely accessible via applications. Machines can operate at harsh
environments than humans; automation of machines and tools reduces man power
requirements for specific tasks.

Connected Factories
Connected Factory concept is an effective solution for improvements in all areas of
operation. Major components such as machines, tools and sensors will be connected
to a network for easier management and access. Overview of process flow, monitor
down time, status checking of inventory, shipment, schedule maintenance and
stop/pause a particular process for further analysis etc… can be done remotely using
industrial IoT solutions.
2. Smart Robotics
Many companies are developing intelligent robotics system for IoT-enabled factories.
Smart robotics ensures smooth handling of tools and materials in the manufacturing
line with precise accuracy and efficiency. Predefined specifications can be set for
maximum precision (up to few nanometers scale for some applications) using
intelligent robotic arms.
Man machine interface design concept will reduce the complexity of operation and it
will reflect in future IoT enabled manufacturing as improved productivity.
Robots can be programmed to perform complex tasks with high end embedded
sensors for real-time analysis. These robotics networks are connected to a secure
cloud for monitoring and controlling. Engineering team can access and analyze this
data to take quick actions for product improvements or preventing an unexpected
failure due to machine fault.
3. Predictive Maintenance
Modern industrial machines equipped with smart sensors continuously monitoring
the status of each major components and it can detect any critical issues before the
system is completely down. Smart sensors will trigger maintenance warning to the
centralized system and the alert messages will be delivered to responsible
persons/groups.
Maintenance engineers can analyze the data and plan for schedules maintenance
effectively without affecting routine task.
Predictive maintenance is an effective solution to avoid unnecessary downtime in the
production line. Unexpected failure of machines could cause damage to products,
delay in delivery and business loss for manufacturers.
Status of each machines are stored to a cloud system in a real-time basis. History of
each machines, performance, and next scheduled maintenance are easily accessible
remotely (on PCs, via web interface or via smartphone applications). Performance
improvements can be calculated and implemented for each machines and process
stages of products using collected data analysis.
4. Integration of Smart Tools / Wearables
Integration of smart sensors to tools and machines enables the workforce to perform
the task with improved accuracy and efficiency. Specially designed wearables
and smart glass helps employees to reduce error and improve safety at the working
environments.
Smart wearables can trigger instant warning messages to employees during
emergency situations like gas leak or fire. Wearables can monitor health condition of
individuals continuously and feedback if not fit for particular task.
5. Smart Logistics Management
Image source: techminds.info
Logistics is one of the important areas in many industries, which needs continuous
improvements to support increasing demands. Smart sensor technology is a perfect
fit to solve many of the complex logistics operations and manage goods efficiently.
Retail giants like Amazon using drones to deliver goods to their customers. Advanced
technologies like drones offer better efficiency; accessibility, speed and it require less
manpower. However, initials investments are huge compared to conventional
methods and implementation has limitations.
Airline is another major industry, which uses IoT for its daily operations at the
production and predictive maintenance of airplanes in service. At the manufacturing
plant, airline companies use IoT solutions to track thousands of components required
for every single day at work. Centralised management of inventories helps to manage
its supplies effortlessly.
Suppliers will be automatically informed if any items are required to top up. Without
much human action, inventory management can be effectively implemented using
IoT.
Smart sensors continuously monitor airplane’s machineries, the data is collected real-
time and send to the airplane manufacturer. Maintenance of any part of an airplane
will be triggered, concerned team will be informed and maintenance will be carried
out once the plane is landed without any delay. Manufacturers can plan and deliver
spare parts efficiently based on the data shared by the system.
6. Software integration for product optimization
Smart analytics solution is one of most important component of any IoT system
which further enhances the possibilities of the system for improvement and
optimization.
Major companies are implementing customized software for deep analysis of huge
amount of data collected from large sensor networks and machines. Detailed analysis
of data and understanding the behavior over time gives much better overview of
process improvement strategies for product optimization.
Improvement ideas could be directly related to product recipe or optimization of
particular machinery for better performance and output. Cost effective solutions can
be achieved using analysis of data and its behavior patterns over a period of time.
Analysis of huge amount of data was a hard, inaccurate and time consuming task
before introduction of these software tools.
7. Smart Package Management
Package management using IoT technology gives lot of convenience and efficiency
for manufacturing units. Smart sensors can monitor each stages of packing and
update status in real-time manner. Embedded sensors can detect vibrations,
atmospheric conditions like temperature and humidity etc… and feedback if
something goes wrong during transit or storage.
8. Enhanced Quality and Security
Introduction of IoT technology in to manufacturing offers enhanced product quality.
Continuous monitoring and analysis of each stages ensure better quality by
improving process steps for optimum quality.
Integration of smart tools and software assisted procedures offer higher level of
security. Software controlled automation and data collection from huge sensor
network is connected to a highly secure gateway and cloud server platform.
Complex encryption techniques are used in IIoT platform for enhanced security.
9. Autonomous vehicles
Image source: newequipment.com
Automotive industries are using IoT enables self driving vehicles to supply goods and
logistics management within their company premises. Smart vehicles can detect
traffic congestions along its path and make deviation to reach its destination is
shortest time. These vehicles are equipped with many smart sensors continuously
detect location data using GPS and wireless technologies for communication with the
control station.
10. Power Management
IoT can offer better solutions for power management in industries. Specific sensors
can detect environment and trigger to turn on/off control of lights, air conditioners,
humidity controls, liquid flow etc… for efficient power management.

Advantages of Industrial Internet of Things

 Improved accuracy
 Product and process optimization
 Predictive maintenance and analysis
 Higher efficiency
 Remote accessibility and monitoring
 Enhanced security
 Scalability of network
 Reduced down time for machines and process
 Power savings
 Cost effectiveness
e. What are some of the main differences between arduino and raspberry Pi ?

Ans.

.
Arduino Raspberry Pi

1. Control unit of Arduino is from Control unit of Raspberry Pi is from ARM family.
Atmega family.

2. Arduino is based on a Raspberry Pi is based on a microprocessor.


microcontroller.

3. It is designed to control the Raspberry Pi computes data and produces valuable


electrical components connected to outputs, and controls components in a system based
the circuit board in a system. on the outcome of its computation.

4. Arduino boards have a simple Raspberry Pi boards have a complex architecture of


hardware and software structure. hardware and software.

5. CPU architecture: 8 bit. CPU architecture: 64 bit.

6. It uses very less RAM, 2 kB. Raspberry Pi requires more RAM, 1 GB.

7. It clocks a processing speed of 16 Raspberry Pi clocks a processing speed of 1.4 GHz.


MHz.
a. Define internet of things.
Ans. The Internet of Things (IoT) is a concept that allows internetworking items
and applications to communicate with one another.

b. Illustrate sources of the IoT with example.


Ans. Arduino Yun :
-Arduino Yun board uses microcontroller ATmega32u4 that supports Arduino and
includes Wi-Fi, Ethernet, USB port, micro-SD card slot and three reset buttons.
- The board also combines with Atheros AR9331 that runs Linux.

c. Define M2M communication.


Ans. Machine-to-Machine (M2M) refers to the process of communicating a
physical object or device at a machine with others of the same sort, mostly for
monitoring but also for control purposes. Each machine in an M2M system
contains a smart device.

d. List features of value creation using IoT.

Ans. Following are the features of value creation using IoT :


1. Addressing to the emergent needs and real-time needs using predictive
analytics.
2. Information convergence creating new experiences for the current product
information.
3. Enabling the innovative services.
4. IoT enabling value capture and thus enables recurrent revenue.

e. What are communication technologies ?


Ans. Communication technologies that are used in IoT are :
1. RFID
2. Bluetooth
3. Wifi

f. What is data enrichment and consolidation ?


Ans. Data enrichment: Data enrichment refers to adding value, security and
usability of data.
Data consolidation: The collection and integration of data from various sources
into a single destination is referred to as data consolidation.
h. What is architectural view ?
Ans. Architectural view of IoT consists of three layers. The functionalities of the
layers are specified as :
1. Perception layer
2. Network layer
3. Application layer

a. Explain industries can benefit from IoT.


Ans. Following are the loT applications :
A. Smart metering :
1. A smart metre is an electronic device that monitors electric energy
consumption and transmits the data to the power supplier for monitoring and
billing.
2. Smart metres collect and report energy data hourly or more frequently.
3. Two-way communication between the metre and the central system is enabled
by smart metres.
B. E-health :
1. The Internet of Things (IoT) has a wide range of applications, including
healthcare.
2. IoT in e-health enables medical centres to operate more efficiently and
patients to receive better care.
3. There are unrivalled benefits to using this technology-based healthcare
strategy, which could increase the quality and efficiency of treatments, and thus
the health of patients.
4. The Internet of Things is extremely important in the context of e-health since
connected data on patients would allow for more efficient and complete therapy.
C. Smart city :
1. A smart city is one that uses information technology and the Internet of Things
to govern and regulate its operations.
2. This encompasses both administration and facility management, such as
libraries, hospitals, and utilities, as well as the public transit system.
3. The primary goal of smart cities is to improve infrastructure and services
through the use of technology, information, and data.
4. This includes access to water, electricity, affordable housing, education, health
care, and information technology communication.
5. Smart cities can increase the efficiency of city services by reducing
redundancies and streamlining staff roles.
b. Explain the main components of the IoT architecture.

Ans. Following are the components of IoT architecture :


1. Applications and analytics component :
a. This is the component that analyses and displays data collected via loT.
b. It has analytics tools, AI and machine learning capabilities, and visualisation
capabilities.
2. Integration component :
a. This is the component that ensures the apps, tools, security, and infrastructure
successfully connect with the company’s existing ERP and other management
systems.
b. Suppliers include software and cloud players, as well as open source and
middleware providers such as Oracle Fusion Middleware, LinkSmart, Apache
Kafka, and others.
3. Security and management component :
a. LoT security entails safeguarding the system’s physical components using
firmware and embedded security providers such as Azure Sphere, LynxOS,
Mocana, and Spartan.
b. Conventional security providers, such as Forescout, Symantec, and Trend
Micro, also provide IoT security solutions.
4. Infrastructure component :
a. Physical devices are included. IoT sensors that collect data and actuators that
control the environment.
b. It also includes the network that the sensors or actuators are connected to.
This is usually, but not necessarily, a wireless network, such as Wi-Fi, 4G, or 5G.

a. Explain MAC protocol survey.

Ans. Schemes of MAC protocol are :

1. Frequency Division Multiple Access (FDMA) :


a. DMA divides the entire channel bandwidth into equal subchannels that are
sufficiently separated (via guard bands) to prevent co channel interference, as
shown in Fig.
Explain MAC protocol survey
b. The capacity of each subchannel is the capacity associated with the entire
channel bandwidth.
c. Each source node can then be assigned one (or more) of these subchannels
for its own exclusive use.
d. To receive packets from a particular source node, a destination node must be
listening on the proper subchannel.
2. Time Division Multiple Access (TDMA) :

a. TDMA divides the entire channel bandwidth into equal time slots that are then
organized into a synchronous frame, as shown in Fig.
Explain MAC protocol survey
b. Each slot represents one channel with a capacity equal to the total channel
bandwidth.
c. Each node is subsequently given one (or more) time slots to use exclusively.
d. As a result, packet transmission in a TDMA system proceeds serially, with
each node accessing the channel in turn.

3. Code Division Multiple Access (CDMA) :

a. CDMA allows many transmissions to use the same channel without interfering.
b. Collisions are prevented by employing unique coding techniques that enable
information to be extracted from the combined signal.
c. CDMA operates by effectively spreading information bits across a channel that
has been artificially expanded.
d. This enhances the frequency variety of each transmission, making it less
vulnerable to fading and lowering the level of interference that other systems
running in the same spectrum may experience.
e. It also simplifies system design and deployment because all nodes operate in
the same frequency spectrum.

b. Explain IOT application layer protocols : HTTP, CoAP and MQTT.

Ans. HTTP :
The protocol that is used to transfer hypertext between two computers is known
as HyperText Transfer Protocol.

HTTP provides a communication standard between a web browser and a web


server. It is a set of rules that govern the transfer of data from one computer to
another. In the World Wide Web, data such as text, photos, and other multimedia
files are shared. When a web user opens their browser, they are indirectly using
HTTP. It is a distributed, collaborative, hypermedia information system application
protocol.

Constrained Application Protocol (COAP) :

A client-server protocol, the restricted application protocol. The COAP packet can
be exchanged between different client nodes that are commanded by the COAP
server using this protocol. The server is responsible for sharing information
based on its logic but is not required to acknowledge. This is utilised in apps that
implement the state transfer concept.

Message Query Telemetry Transport (MQTT) :

The message query telemetry transport protocol is a communication mechanism


for loT devices. This protocol is built on the publish-subscribe paradigm, in which
clients receive information solely from the subscribed subject via a broker. Before
messages are transmitted, a broker categorises them into labels.

b. Describe communicating data with H/W units.

Ans. Connectivity or communication between various hardware unit in IoT is


achieved by using following wireless communication protocols :

1. Satellite :
a. Satellite communications enable cell phone communication from a phone to
the next antenna of about 10 to 15 miles.
b. They are called GSM, GPRS, CDMA, GPRS, 2G / GSM, 3G, 4G/LTE, EDGE
and others based on connectivity speed.
c. This type of communication is commonly referred to as “M2M”
(Machine-to-Machine) in Internet of Things terminology since it allows devices
such as phones to transmit and receive data via the cell network.
2. Wi-Fi :
a. Wi-Fi isa Wireless Local Area Network (WLAN) that utilizes the IEEE 802.11
standard through 2.4 GHz UHF and 5 GHz ISM frequencies.
b. Wi-Fi provides Internet access to devices that are within the range (about 66
feet from access point).
3. Radio Frequency (RF) :
a. Radio frequency communications are probably the easiest form of
communications between devices.
b. Protocols like ZigBee or ZWave use a low-power RF radio embedded into
electronic devices and systems.
4. RFID :
a. RFID stands for Radio Frequency Identification.
b. RFID refers to small electronic devices that consist of a small chip and an
antenna.
c. The chip typically is capable of carrying 2,000 bytes of data or less.
d. The RFID device serves the same purpose as a bar code or a magnetic strip
on the back of a credit card or ATM card.
5. Bluetooth :
a. Bluetooth is a wireless technology standard that allows data to be exchanged
over short distances.
b. Bluetooth is found in a wide range of products, including phones, tablets,
media players, and robotics systems.
c. In low-bandwidth settings, the technique is highly useful for sending
information between two or more devices that are close to one other.

1) What is the Internet Of Things (IoT)?


Internet of Things (IoT) is a network of physical objects or people called “things”
that are embedded with software, electronics, network, and sensors that allow
these objects to collect and exchange data. The goal of IoT is to extend to
internet connectivity from standard devices like computer, mobile, tablet to
relatively dumb devices like a toaster.

2) Explain Raspberry Pi
Raspberry Pi is a computer which is capable of doing all the operations like a
conventional computer. It has other features such as onboard WiFi, GPIO pins,
and Bluetooth in order to communicate with external things.

3) How to run Raspberry pi in headless mode?


Raspberry pi in headless mode can be run by using SSH. The latest operating
system has an inbuilt VNC server that is installed for taking remote desktop on
Raspberry Pi.

4) What are the fundamental components of IoT?

The four fundamental components of an IoT system are:

Sensors/Devices: Sensors or devices are a key component that helps you to


collect live data from the surrounding environment. All this data may have various
levels of complexities. It could be a simple temperature monitoring sensor, or it
may be in the form of the video feed.
Connectivity: All the collected data is sent to a cloud infrastructure. The sensors
should be connected to the cloud using various mediums of communications.
These communication mediums include mobile or satellite networks, Bluetooth,
WI-FI, WAN, etc.
Data Processing: Once that data is collected, and it gets to the cloud, the
software product performs processing on the gathered data. This process can be
just checking the temperature, reading on devices like AC or heaters. However, it
can sometimes also be very complex, like identifying objects, using computer
vision on video.
User Interface: The information needs to be available to the end-user in some
way, which can be achieved by triggering alarms on their phones or sending
them notification through email or text message. The user sometimes might need
an interface which actively checks their IoT system.
5) What is the difference between IoT and IIoT?
The difference between IoT and IIoT is:
IoT IIoT

The full form of IoT is the The full form of IIoT is the Industrial
Internet of Things. Internet of Things.

A service model is A service model is machine-centric.


human-centric.

It supports customer-oriented It supports industry-oriented


applications. applications.

Communication transportation Communication transportation is


is done through wireless done through both wired and
devices. wireless devices.

The quality of data is medium The quality of data is high to very


to high. high.

Criticality is not severe. Criticality is severe.

8) Define Arduino
Arduino is a free electronics platform having easy to use hardware
and software. It has a microcontroller capable of reading input from
sensors to control the motors programmatically.

7) What are the disadvantages of IoT?


The disadvantages of IoT are:
● Security: IoT technology creates an ecosystem of connected
devices. However, during this process, the system may offer little
authentication control despite sufficient cybersecurity measures.
● Privacy: The use of IoT, exposes a substantial amount of
personal data, in extreme detail, without the user’s active
participation. This creates lots of privacy issues.
● Flexibility: There is a huge concern regarding the flexibility of an
IoT system. It is mainly regarding integrating with another system
as there are many diverse systems involved in the process.
● Complexity: The design of the IoT system is also quite
complicated. Moreover, it’s deployment and maintenance also
not very easy.
● Compliance: IoT has its own set of rules and regulations.
However, because of its complexity, the task of compliance is
quite challenging.

9) List mostly used sensors types in IoT


Mostly used sensor types in IoT are:
● Smoke sensor
● Temperature sensors
● Pressure sensor
● Motion detection sensors
● Gas sensor
● Proximity sensor
● IR sensors
11) What are the advantages of IoT?
Key benefits of IoT technology are as follows:
● Technical Optimization: IoT technology helps a lot in improving
techniques and making them better. For example, with IoT, a
manufacturer is able to collect data from various car sensors.
The manufacturer analyses them to improve its design and make
them more efficient.
● Improved Data Collection: Traditional data collection has its
limitations and its design for passive use. IoT facilitates
immediate action on data.
● Reduced Waste: IoT offers real-time information leading to
effective decision making & management of resources. For
example, if a manufacturer finds an issue in multiple car engines,
he can track the manufacturing plan of those engines and solves
this issue with the manufacturing belt.
● Improved Customer Engagement: IoT allows you to improve
customer experience by detecting problems and improving the
process.

13) What are the most common IoT applications?

The most common IoT applications are:


● Smart Thermostats: Helps you to save resources on heating
bills by knowing your usage patterns.
● Connected Cars: IoT helps automobile companies handle
billing, parking, insurance, and other related stuff automatically.
● Activity Trackers: Helps you to capture heart rate patterns,
calorie expenditure, activity levels, and skin temperature on your
wrist.
● Smart Outlets: Remotely turn any device on or off. It also allows
you to track a device’s energy level and get custom notifications
directly into your smartphone.
● Parking Sensors: IoT technology helps users to identify the
real-time availability of parking spaces on their phones.
● Connect Health: The concept of a connected healthcare system
facilitates real-time health monitoring and patient care. It helps in
improved medical decision-making based on patient data.

14) What is Pulse Width Modulation?


PWM or Pulse Width Modulation is a variation of how much time the signal is high in an analog fashion. The signal
can be high or low, and the user can even change the proportion of the time.

15) Mention applications of PWM in IoT


Applications of PWM in IoT are controlling the speed of DC motor, Controlling the direction of a servo moto, Dimming
LED, etc.

16) List available wireless communications boards available in Raspberry Pi?


Wireless communications boards available in Raspberry Pi are 1) WiFi and 2) BLE/Bluetooth.

17) What are the functions used to read analog and digital data from a sensor in Arduino?
Functions used to read analog and digital data from a sensor in Arduino are: digitalRead() and digitalWrite().

18) What is Bluetooth Low Energy?


Bluetooth Low Energy is a wireless PAN (Personal Area Network) technology. It uses less power to transmit
long-distance over a short distance.

19) Define MicroPython


MicroPython is a Python implementation, which includes a small subset of its standard library. It can be optimized to
run on the ModeMCU microcontroller.

20) List available models in Raspberry Pi


Models of Raspberry Pi are:

Raspberry Pi 1 Model B
Raspberry Pi 1 Model B+
Raspberry Pi 1 Model A
Raspberry Pi Zero
Raspberry Pi 3 Model B
Raspberry Pi 1model A+
Raspberry Pi Zero W
Raspberry Pi 2
21) What are the challenges of IoT?
Important challenges of IoT are:

Insufficient testing and updating


Concern regarding data security and privacy
Software complexity
Data volumes and interpretation
Integration with AI and automation
Devices require a constant power supply which is difficult
Interaction and short-range communication
22) Mention some of the commonly used water sensors
The commonly used water sensors are:

Turbidity sensor
Total organic carbon sensor
pH sensor
Conductivity sensor

23) Differentiate between Arduino and Raspberry pi


The difference between Arduino and Raspberry pi is:
Arduino Raspberry pi

Arduino is an open, programmable Raspberry pi is a credit card


USB microcontroller. size computer.

It can execute one program at a Users can run more than one
time. program at a time.

24) What are mostly used IoT protocols?


The mostly used IoT protocols are:

XMPP
AMQP
Very Simple Control Protocol (VSCP)
Data Distribution Service (DDS)
MQTT protocol
WiFi
Simple Text Oriented Messaging Protocol(STOMP)
Zigbee

29) What is IoT Thingworx?


Thingworx is a platform for the fast development and deployment of
connected devices. It is a collection of integrated IoT development
tools that support analysis, production, property, and alternative
aspects of IoT development.
30) What is Salesforce IoT Cloud?
The Salesforce IoT Cloud is an online platform for storing and processing IoT
information.
It is an assortment of various application development elements, which are called
lightning.
This program gathers information from websites, devices, customers, and partners. It
then triggers actions for period responses.

55) What is the difference between M2M and IoT?


The difference between M2M and IoT is:
M2M IoT

Communication is done within Communication is done for


an embedded software at the grand-scale projects.
client site.

It uses isolated systems of It uses integrated devices,


devices having the same applications, and data across
standards. varying standards.

M2M offers limited scalability IoT is inherently more scalable.


options.

A cellular network or wired It uses an active Internet


network is used for device connection for device connectivity.
connectivity.

Machines can communicate with Many machines can communicate


one machine at a time. with each other over the Internet.

56) What are the features of influxDB?


Features of influxDB are:
● Provides support of visualization tools
● Works with distributed time-series database
● It does not have any external dependencies

58) What are IoT testing tools?


IoT testing tools can be divided into hardware and software:
● IoT testing software: Tcpdump and Wireshark.
● Hardware for IoT testing: JTAG Dongle, Digital Storage
Oscilloscope, and Software Defined Radio.

45) What is the importance of the Internet of Everything?
Internet of Everything is important because:
It brings together people, processes, things, and data to make network
connections valuable and relevant.
It converts the information into actions to create new capabilities and
opportunities for businesses.

52) What are the operating systems supported by Pi?


Operating systems supported by Pi are:
Raspbian
Open ELEC (Open Embedded Linux Entertainment center)
RISC OS
Lakka
OSMC (Open Source Media Centre)
Windows IoT Core

68) What is IoT Testing?


IoT testing is a type of testing to check IoT devices. Today there is an increasing
need to deliver better and faster services. There is a huge demand to access,
create, use, and share data from any device. The thrust is to provide greater
insight and control over various interconnected IoT devices. Hence, the IoT
testing framework is important.

73) What are the risks associated with the IOE Internet of Everything?
Risks associated with IOE are 1) Privacy, 2) Security, 3) Network congestion, and
4) Electricity consumption at the peaks.

75) What is the importance of the network in IoT?


The network is the main part of the IoT. It is responsible for providing a practical
and smart system that makes strong infrastructure. The network offers scalability
to help devices coordinate with other lines with the Internet.
77) Explain the types of testing in IoT?
IoT devises testing types are:

Usability Testing: There are so many devices of different shape and form factors
are used by the users. Moreover, the perception also varies from one user to
others. That’s why checking the usability of the system is very important in IoT
testing.
Compatibility Testing: There are lots of devices that can be connected through
the IoT system. These devices have varied software and hardware configuration.
Therefore, a possible combination is huge. As a result, checking the compatibility
in the IoT system is important.
Reliability and Scalability Testing: Reliability and Scalability is important for
building an IoT test environment which involves a simulation of sensors by
utilizing virtualization tools and technologies.
Data Integrity Testing: It’s important to check the Data integrity in IoT testing as it
requires a large amount of data and its application.
Security testing: In the IoT environment, many users are accessing a massive
amount of data. Thus, it is important to validate user via authentication, have
data privacy controls as part of security testing.
Performance Testing: Performance testing is important to create a strategic
approach for developing and implementing an IoT testing plan.

You might also like