IOT (Unit III) ...
IOT (Unit III) ...
IOT (Unit III) ...
ELEMENTS OF IOT
.
Application of sensor and Actuators:
❖ With IoT edge, the data may only have to travel yards instead of
miles, saving precious time and enhancing safety.
IoT Edge Devices:
❖ IoT edge computing depends on devices to receive, process,
and output IoT data. This involves a system of connectivity
dependent on devices and sensors. The data gets sent
through a messaging system, processed by a computer, and
then stored. Because IoT devices generate, process, and
implement large amounts of data, keeping the computing
process near the edge prevents latency and operational
issues.
IoT gateways are designed to simplify and streamline IoT device communications and
management. Some common functions of IoT devices include:
IoT infrastructure
can be divided into
four architectural
layers. These
include:
Sensor Layer: At the sensor layer, devices collect data for future processing. IoT devices operate at this
layer.
Network or Data Acquisition Layer: At this layer, data is aggregated from multiple sources and securely
transmitted to processing systems. Data acquisition systems (DAS) are responsible for aggregating and
converting data to a desired format. IoT gateways operate at this level to provide secure connectivity
between IoT devices and processing infrastructure.
Data Pre-processing Layer: At this layer, IoT sensor data undergoes pre-processing and basic data
analytics to reduce data volume before it is transmitted on to cloud-based infrastructure. IoT edge
devices operate at this layer.
Cloud Analysis or Application Layer: Cloud-based infrastructure performs in-depth data analytics and
provides applications and users with access to data and analytic results. Data storage or warehousing
may also occur at this layer.
IoT Edge Security:
❖ IoT gateways are an example of an intelligent IoT device deployed at the network edge. These devices c
provide both benefits and downsides for IoT security, including:
❖ Data Minimization: IoT gateways are responsible for filtering data produced by IoT devices before sendin
it out over the Internet. This helps to reduce both the volume of data sent and the amount of sensitive
information that may be leaked in network communications or via compromised cloud-based servers.
❖ Decentralized Infrastructure: IoT gateways have limited data processing capabilities, which have benefit
and drawbacks for security. Distributed data processing via edge computing helps to improve resiliency
and data minimization; however, a distributed architecture may be more difficult to secure because it
cannot be protected by perimeter-based defenses.
❖ Edge-Based Security: IoT gateways can incorporate integrated security functionality that sits between I
devices and the public Internet. This can help to protect an organization’s IoT devices and the sensitive
data that they collect against cyber threats because the IoT helps to close the security gaps that are
common in IoT devices
Communication Models in IoT (Internet of Things ):
❖ This model comprises three entities: Publishers, Brokers, and Consumers. Publishers are the
source of data. It sends the data to the topic which are managed by the broker. They are
not aware of consumers.
❖ Consumers subscribe to the topics which are managed by the broker.
❖ Hence, Brokers responsibility is to accept data from publishers and send it to the
appropriate consumers. The broker only has the information regarding the consumer to
which a particular topic belongs to which the publisher is unaware of.
3. Push-Pull Model –
❖ The push-pull model constitutes data publishers, data consumers, and data queues.
❖ Publishers and Consumers are not aware of each other.Publishers publish the message/data and
push it into the queue. The consumers, present on the other side, pull the data out of the queue.
Thus, the queue acts as the buffer for the message when the difference occurs in the rate of push
or pull of data on the side of a publisher and consumer.
❖ Queues help in decoupling the messaging between the producer and consumer. Queues also
act as a buffer which helps in situations where there is a mismatch between the rate at which the
producers push the data and consumers pull the data.
4. Exclusive Pair –
❖ Exclusive Pair is the bi-
directional model,
including full-duplex
communication among
client and server.
❖ The connection is
constant and remains
open till the client sends
a request to close the
connection.
❖ The Server has the
record of all the
connections which has
been opened.
❖ This is a state-full
connection model and
the server is aware of all
open connections.
❖ WebSocket based
communication API is
fully based on this model
Introduction to WPAN technologies and standards:
Bluetooth is used for connecting various devices including smartphones; Zigbee finds its
applications in
home automation & smart metering while Ultra-Wideband (UWB) provides short-range high
data rate Communications
Bluetooth:
Since its inception till now, Bluetooth remains one of the most widely used WPAN technologies even
today. It’s known for being easy-to-use having low power consumption capabilities that make it
compatible across a range of gadgets like laptops, smartphones, wearables & more making it an
essential tool for modern-day wireless communication.
For instance, BLE (Bluetooth Low Energy) allows wearable tech products (smartwatches/fitness
trackers)
to communicate efficiently without draining battery life quickly.
With every new version launched, this technology continues to evolve responding effectively to user
needs by providing reliable connectivity solutions. For example, the implementation of mesh
networking fosters many-to-many connections instead of traditional pairings expanding possible
applications which includes IoT-based systems at homes/scale industry automations where numerous
nodes require seamless network spectrum links.
Zigbee:
Zigbee is one of the most used low-power wireless technologies in WPANs. It enables reliable
transmission of small data packets making it ideal for home automation or building control
systems
applications. Zigbee can support thousands of connected devices simultaneously without
affecting
throughput speed or latency.
UWB:
Another popular technology utilized by WPANS is UWB which utilizes broad spectrum
frequencies to
transfer large amounts of data quickly over shorter distances without requiring external
positioning
systems like GPS – this makes them convenient solutions primarily utilized by IoT-related
industries
involved in areas such as smart homes where user locations play an essential role controlling
lights/temperature settings automatically via indoor location-based services needing high
accuracy
within centimetres.
WPAN standards and protocols:
Near Field Communication (NFC) offers specialized forms/wireless tech enabling information
exchange/data transfers between proximity NFC enabled devices using formats known
collectively
under Near Field Communications (NFC). These include NDEF format developed specifically
providing
efficient storage/exchange formats suitable mainly for contactless payments/small amount-
data
transfers compatible with any other similar system/device configured accordingly.
❖ Low Power Consumption – WPAN technology is designed to consume low power and thus
extends the battery life of connected devices.Short Range Communication – The limited
range makes it nearly impossible for unauthorized users or hackers from accessing data
transmitted through WPAN networks without physical access to the device transmitting
information.
❖ Cost-Effective Solution – Implementing WPANS can be cost-effective compared with other
networking solutions as they require less infrastructure investment due their shorter-range
capabilitiesInteroperability – Due to standardization efforts such as IEEE 802 standards family
in which Bluetooth operates under different types of electronic gadgets like smartphones,
computers etc.,
❖ connect seamlessly and allow better integration within IoT ecosystemsEase of use and
installation – Setting up a personal area network using technologies like Bluetooth requires
minimal technical knowledge making connecting various peripherals easy.
Disadvantages :
❖ Security Risks – As alluded earlier on, since these systems rely heavily upon radio
frequency communications, over-the-air transmissions may result in
eavesdropping by third parties who might gain unauthorized access of sensitive
files thereby compromising privacy concerns related to user’s confidential data if
not properly secured against cyber-attacks.
❖ Limited Coverage Areas – These networks typically cover small areas only hence
requiring additional equipment when trying to expand coverage beyond its
intended reach.
❖ Speed Limitations – While many modern-day applications work well with today’s
Wi-Fi speeds, others need higher transfer rates than what current generation
WLAN protocols provide at present time resulting in reduced efficiency overall
especially where there exist high bandwidth requirements needed for multimedia
content streaming services among others.
❖ WPANs offer numerous benefits including low power consumption,
interoperability and ease of use but can pose security risks while also having
limited range capabilities that may require additional equipment to expand their
reach beyond its intended purposes making it important to weigh the pros and
cons before deciding if these networks are suitable for your needs or not!
Future predictions for WPAN :
In the coming years, Wireless Personal Area Networks (WPANs) are expected to undergo significan
changes. This includes greater integration with fifth-generation networks (5G), increased adoption
of
Internet of Things (IoT) devices, emergence of new technologies and advancements in
communication
efficiency and security
In addition to integrating more seamlessly into existing infrastructures within smart homes or IoT
ecosystems generally speaking – there is also set be an increase seen around emerging low-
power
wireless sensor networking solutions which use less energy than traditional protocols while still
providing efficient communications over longer distances without running out battery life too
quickly
due largely thanks these advances
The trend towards seamless interconnectivity shows no signs slowing down anytime
soon either –particularly when it comes specifically related usage cases involving
shorter range transfers enabled using Bluetooth Low Energy protocol known
commonly abbreviated BLE/Zigbee/NFC Forum Standards among others all poised to
make their mark during upcoming years ahead.
Advancements in Efficiency and Security of
Communication :
❖ LPWA (sometimes called mobile IoT) networking technologies, such as LTE-M and NB-
IoT, transmit data at slower rates than other cellular technologies. However, LPWA
technologies also cost less, use less power, have better wireless coverage inside
buildings, underground and in rural areas, and can transmit data to more devices in a
condensed area than these other cellular technologies.
❖ Five years ago, Low Power Wide Area (LPWA) technologies weren’t on the radar,
however the Internet of Things was coming alive and taking off because people were
inspired by the possibilities.
❖ At that time, the market for connected things was small and mostly dominated by
Personal Area Network (PAN) technologies, such as Bluetooth, and Wireless Local Area
Network (WLAN) technologies, like Wi-Fi. With all the hype around IoT, many analysts
were predicting there would be more than 20 billion connected devices by 2022.
❖ Most of this volume was predicted to go to PAN/WLAN technologies, not to traditional
cellular. That’s because PAN/WLAN technologies do a better job of meeting the cost
and power requirements of IoT applications. However, these technologies provide little
coverage, which is a key requirement for many IoT applications. Even traditional
cellular, with its superior coverage, still has dead zones deep inside buildings or in very
remote locations.
❖ It’s important to note that no one technology will serve every IoT application. There are
definitely applications where PAN/WLAN technologies, such as low energy Bluetooth,
Zigbee and Wi-Fi, are still the clear choice. Traditional cellular also has its own unique set of
advantages that PAN /WLAN and LPWA technologies cannot provide, such as full mobility
at very high data rates and without the complexity and need to pair devices to an access
point
Re-engineering cellular for the IoT :
❖ As with many things in life, there are trade-offs, and designing wireless
technology is no different. Traditional cellular has always been designed for
consumer applications (e.g. smart phones and laptops), so the technology has
been engineered to deliver higher and higher speeds to transmit more and
more data in a very efficient way.
❖ When it comes to IoT, many applications are happy with low data rates and
only need to transmit small amounts of data, thus efficiency is not as big a
concern compared to consumer applications, which send gigabytes of data.
These differences allowed engineers to make tradeoffs that dramatically
reduced the complexity but were unacceptable for traditional cellular.
❖ As a result, cost savings are achieved as LPWA technologies require much less
processing power and less memory. Low current results from the reduced
processing and more opportunities to enter deep sleep. Higher coverage
comes from slowing the data rate. And more capacity comes from the
evolution of LTE networks to support a million connections per square kilometer.
In short, LPWA technologies are designed from the ground up to meet those key
four C’s for IoT.
❖ Let’s look at some examples. If the objective of IoT is to connect as many objects as
possible, we know that there is no single technology that is going to be perfect for
everything.
❖ Take connected home applications as an example. A furnace could be connected
to a thermostat via Wi-Fi and, since the furnace and thermostat are not mobile, a
WLAN technology provides the coverage required and thus makes it a suitable
technology choice.But what about services you want to bring into your home from
third parties? Due to reliability concerns, a security service may not want to rely on
your home Wi-Fi network to monitor your house and property. Here, using an LPWA
technology that supports the data rate requirements and allows voice calls for the
alarm panel might be the best fit. Moving outside the home, things like container
and vehicle tracking devices would also be ideally suited for LPWA. As would
tracking devices for your pets, children, or elderly parents.
❖ However, LPWA technology is not well suited to creating mobile hotspots or high-
rate video streaming services in vehicles, buses, and trains, due to the low data
rates LPWA technologies provide, thus these applications are best serviced by
traditional cellular technologies.
❖ The applications and deployment scenarios are nearly infinite, but the bottom line is
that LPWA technologies unlock the potential of IoT and open new IoT use cases by
providing the three C’s, which other wireless technologies can’t provide.
UniT iii …
… The end