IOT Notes Unit 1 2 3 4 and 5
IOT Notes Unit 1 2 3 4 and 5
IOT Notes Unit 1 2 3 4 and 5
INTRODUCTION TO IOT
IOT allows devices or hardware together information and send it over the internet to cloud, app or software.
The Internet of Things, also called The Internet of Objects, refers to a wireless network between objects; usually the
network will be wireless and self-‐configuring, such as household appliances.
The term "Internet of Things" has come to describe a number of technologies and research disciplines that enable the
Internet to reach out into the real world of physical objects.
Characteristics
1) Dynamic & Self Adapting: IoT devices and systems may have the capability to dynamically adapt with the changing
contexts and take actions based on their operating conditions, user‗s context or sensed environment.
Eg: the surveillance system is adapting itself based on context and changing conditions.
2) Self Configuring: allowing a large number of devices to work together to provide certain functionality.
3) Unique Identity: Each IoT device has a unique identity and a unique identifier (IP address).
4) Intelligence
Applications of IoT
1) Home
2) Industry
3) Environment
4) Retail
5) Agriculture
6) Science and Research
7) Health & Life Style
8) College/University/Institute
Advantages of IoT
1. Increased convenience
2. Better monitoring
3. Save time
4. Minimize human effort
5. Ease of Access
6. Automation and Control
7. Enhance Data Collection
8. Improve security
9. Improved efficiency
Disadvantages of IoT
1. An IoT device is very costly and time-consuming.
2. Security issues
3. complexity of systems
4. High dependency on the internet
5. Increased unemployment
6. Privacy concern
7. Connectivity and Power
8. Dependence on technology
9. Limited battery life on some devices.
1. IoT devices
2. Security
3. Network
4. Gateway
5. The cloud
6. Application
7. User
Components of IoT
1. Sensors/Devices:
Sensors/Devices collect data from their environment. e.g. Our phone is a device that has multiple sensors like GPS,
camera, Motion etc. where data is being collected based on surroundings
2. Connectivity to Cloud :
The sensors/devices can be connected to the cloud and store, through a variety of methods including: Bluetooth, WiFi,
Cellular etc.
3. Data Processing :
Software perform data processing on cloud data to get a analyzed or computed data. e.g Computing the temperature
within an acceptable range.
4. User Interface :
The analyzed or computed data is made useful to the end user via and alert(email, text, notification). e.g a alert message
when temperature is beyond the acceptable range.
Unit II
IoT Protocols
A)Link Layer
802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer. Eg: 802.3
uses co-axial cable
802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN) communication standards including
extensive description of link layer.
802.16 - WiMax: IEEE802.16 is a collection of wireless broadband standards including exclusive
description of link layer.
802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless personal area
network(LR-WPAN).
B) Network Layer:
Responsible for sending IP datagrams from source network to destination network
C)Transport Layer:
TCP: Transmission Control Protocol used by web browsers (along with HTTP and HTTPS),
email(along with SMTP, FTP). Connection oriented and stateless protocol.
UDP: User Datagram Protocol is connectionless protocol.
D) Application Layer:
BACnet
Building Automation Control Network
Open communication protocol standards that building management systems
Data that BACnet sends can be much more complex
It is more Complex
It is Low cost Protocol
It support User Datagram Protocol(UDP)
Communication across devices
BACnet uses a client-server architecture, where devices can act as either clients or servers.
It also supports a variety of networking technologies, such as IPv4, IPv6, and BACnet/IP,Zigbee.
Multiple devices communication Network
Modbus (M bus)
Modbus is a network protocol best used for industrial automation systems specifically for connecting electronic
equipment.
Open communication protocol used in building automation and control systems
Room Heater(30 C to 90 C)
Protocol that uses a master-slave architecture, where one device (the master) sends commands to one or more
devices (the slaves).
Two-way communication between devices
Less complex
Low cost protocol
Communication between devices
It support TCP(Transmission Control Protocol)
Lonworks
Local Operating Network
Use in building automation and control systems.
Uses a distributed control architecture
High Cost
It also supports a variety of networking technologies, such as IPv4 and IPv6.
BACnet Modbus Lonworks
Building Automation Control M Bus Local Operating Network
Network
Zigbee
Zigbee technology addresses needs of industrialmeasurement and control (automation)
Zigbee Alliance is consortium of 150+ companies
Includes Honeywell, Motorola, Phillips, Samsung, Mitsubishi
IEEE 802.15.4 is “Low-Rate Wireless PAN Standard”
Zigbee Alliance promotes IEEE 802.15.4 standard
IEEE 802.15.4 defines only Physical and MAC layers
Not attractive for business communication networks because of low data rate
FFD RFD
Full-Function Device Reduced-Function Device
High Cost Low Cost
With Network Without Network
More Complex Less Complex
Use Bluetooth, Wifi, IP Address No Use Bluetooth, Wifi, IP Address
Four Pillars for IOT
M2M Machine To Machine
WSN Wireless Sensor Network
SCADA-Supervisory Control and Data Acquistion
RFID-Radio Frequency Identification
Advantage
1. Higher range,
2. Minimum latency,
3. Higher throughput
4. Consume less energy.
5. Reduces fragmentation
6. Non IP Protocol
Disadvantage
1. It is designed and optimized for small number of network devices.
2. Limit flexibility and innovation.
Application
Smart Home Meter
Asset Tracking
Supply chain management (SCM)
Vending machine:
Warehouse management systems
Manufacturing
SCADA
Supervisory Control and Data Acquisition
Using short range n/w inside a building or an industrial plant
Store large amount of data
Installation cost is high
Very Complex
As per User Requirement, You can store data
It support hardware and software system
SCADA Advantage
1. Faster and Easier
2. Centralized control
3. Real-time data
4. It is fast in obtaining response
5. Remote access
SCADA Disadvantage
1. Installation costs are higher
2. Increases unemployment rates
3. System supports use of restricted softwares and hardware equipments.
4. Not Suitable for small project
SCADA Application
Food Processing Industry
Chemical Industry
Water Treatment Plant
Where
RFID
Radio Frequency Identification
RFID scanners can read multiple codes at once.
RFID systems are much more efficient for scanning a large number of items
Uses radio frequency to read and capture information stored on a tag attached to an object
Real Time Data Use
Track the object/Identify the object
Eliminate the Human Error
Types of RFID
Passive RFID
Active RFID
Advantages of RFID
1. Better Security then Bar Code
2. More Efficiency
3. Durability
4. Support Long Range then Bar Code
5. Identify the goods
Disadvantages of RFID
1. High Cost then Bar code
2. Not Accurate Everytime
3. Power Shortage Issue
4. Implementation can be difficult & time consuming
5. RFID technology is harder to understand
Application of RFID
Animal Tracking
Library Book
Automatic Toll Deduction (Fast Tag Card)
Identify Real Time Train Coach Position/Tracking
RFID GPS
Radio Frequency Identification Global Positioning System
Range Upto 500 meter Range Upto 1000+ Meter
No Battery Battery Range(1-7 Days)
Power Consumption is very low Power Consumption is very High
Used to track high-value goods. Used to track Low value goods.
UWB
Ultra Wide Band
70 meters (Low), 250 meters (Max.)
More Accuracy then RFID
UWB is ideal for accurate position tracking, low latency multimedia and high data rate applications
Most recent location technologies
Very secure Then RFID
Less cost compare to RFID
UMB is 2 way Communication but RFID is One Way Communication
Which One of technology is best for position tracking and Security (RFID,UMB ,GPS)?
WSN Applications
1. Environmental monitoring
2. Health care
3. Disaster Mitigation
4. Industrial applications
5. Security and safety applications
6. Military Applications
Important Issues
1. Coverage
2. Connectivity
3. Power management
4. Self-deployment
5. Security
Need of WSNs
3. Limited processing
Challenges in WSN
1. Fault Performance
2. Scalability
3. Production Cost
4. Operation Environment
5. Quality of Service
6. Data Aggregation
7. Data Compression
8. Data Latency
HTTP
HTTP stands for Hyper Text Transfer Protocol.
o
It is a protocol used to access the data on the World Wide Web (www).
The HTTP protocol can be used to transfer the data in theform of plain text,
hypertext, audio, video, and so on.
The full form of HTTPS is Hypertext Transfer Protocol Secure. HTTPS is a secure version of
the HTTP protocol. To provide encryption, HTTPS uses an encryption protocol known as
Transport Layer Security. The use of HTTPS protocol is mainly required where we need to
enter the bank account details.
It is written in the address bar as https://.
HTTP vs. HTTPS
HTTP vs. HTTPS
OSI Model
OSI stands for Open Systems Interconnection
Created by International Standards Organization (ISO)
Was created as a framework and reference model to explain how different
networking technologies work together and interact .
Each layer has specific functions it is responsible for
All layers work together in the correct order to move data around a network
Open System Interconnect is an open standard for all communication systems. OSI
model is established by International Standard Organization (ISO). This model has
seven layers:
TCP/IP Model
Internet uses TCP/IP protocol suite, also known as Internet suite. This defines
Internet Model which contains four layered architecture. OSI Model is general
communication model but Internet Model is what the internet uses for all its
communication. This model has the following layers:
• TCP stands for Transmission Control Protocol
• IP stands for Internet Protocol
Application Layer: This layer defines the protocol which enables user to interact
with the network. For example, FTP, HTTP etc.
Transport Layer: This layer defines how data should flow between hosts. Major
protocol at this layer is Transmission Control Protocol (TCP). This layer ensures
data delivered between hosts is in-order and is responsible for end- to-end
delivery.
Internet Layer: Internet Protocol (IP) works on this layer. This layer facilitates
host addressing and recognition. This layer defines routing.
Link Layer: This layer provides mechanism of sending and receiving actual data.
Unlike its OSI Model counterpart, this layer is independent of underlying network
architecture and hardware.
IEEE 802 Model
2 Layer Model
APS Layer
Application Support Sublayer
Interface between Network Layer and Application Layer
End To End Security
5layer Architecture
1.Physical Layer
2. Media Access Layer
3. Network Layer
4. Application Support Sublayer
5. Application Layer
APS Function
Packet Filtering for Device
Ensuring communication between devices
Resources Management
User Tracking
Context Management
Service Management
Data Management
Security Management
IoT Stack Architecture
2.Connectivity
The device would be connected to internet using Wifi, Ethernet, 3G and other technologies. This
Connectivity layer enables the device to send data to cloud and vice versa.
3.Edge Computing
Data filtering
Formatting
Expanding/decoding
Assessment
4.Data Accumulation
Data accumulation layer stores the data in an easy accessible format .
5.Data Abstraction
The layer focuses on rendering data and its storage in ways that enable developing simpler,
performance-enhanced applications.
6.Application
It links the software layer with physical layer.
Highly Secure
More Flexible
Scalable
OIC
Roles
OIC OIC
OIC
Device Device
Implem-
Abstraction
entation
Specific Interfaces
Protocol Connectivity Connectivity
Layer
Application of OIC
1. Smart Camera
2. Smart Home Application
3. Access Control Devices
4. Health monitor
5. Indoor Environment Control
6. Lighting Camera
Importance of OIC
1. Improve Efficiency
2. Reduce Cost
3. Improve Customer Experience
Note It is also called Network to Network Architecture.
Drawback of SOA
1. High Cost
2. Very Complex
3. High Investment
Application of SOA
1. Gaming Software/App
2. Healthcare Software/App
3. Army and Air force Software/App
5 Layer of SOA Service Object Architecture
1. Object
2. Object Abstraction
3. Service Management
4. Service Composition
5. Application
4 Layer of SOA Service Object Architecture
Unit 4
Z wave
1. Z-Wave also known as a smart home hub
2. Z-Wave is a wireless communications protocol used primarily for
residential and commercial building automation
3. More-User friendly and Easier to setup
4. Range 30-65 Meters
5. Z-Wave and Zigbee are two of the biggest names in smart home
communication protocols
6. It is a mesh network using low-energy radio waves
7. More Expensive then Zigbee
8. Z-Wave network, limited to four hops, supports a maximum of 232
devices.
9. Z-Wave chips are only available from Silicon Labs.
All Z-Wave technology is backward-compatible.
Physical Range 100-800 Meters
Internet of Everything
IoE is the intelligent connection of people, process, data and things
COAP MQTT
Constrained Application Protocol Message Queuing Telemetry Transport
4 bytes sized header 2 bytes sized header
This uses both Asynchronous and Uses only Asynchronous
Synchronous.
Client server-based protocol and Communication-based protocol (Publish-
Publish-Subscribe model. Subscribe model)
Communication model is one-one(One Communication model is Many-
to One Protocol) Many(Many to Many Protocol
It support User Datagram It Support Transmission Control
Protocol(UDP) Protocol(TCP)
CoAP is not more matured and stable MQTT is more matured and stable than
than MQTT CoAP.
2. Publish-Subscibe Model:
Two Pillar for web
Web of Things (WOT) Architecture
4 Layer Architecture Webs of Things (WOT)
1. Access Layer
2. Find Layer
3. Share Layer
4. Compose Layer
Difference between IPV6 and Low PAN
LowPAN- “Low Power wireless Personal Area Network”
LowPAN Support only IPV6 address so it is called 6 LowPAN.
LowPAN Support mesh Routing but IPV6 does not support it
IPV6 only use for data segment, lowPAN use for data segmentation and
Re assemble of Date.
IPv6 operates in 2.4 GHz frequency range
Drowback of LowPAN
Only support IPV6 address
Support only 128 bit address
Low PAN is sub network of IPV6.
Unit 5
IoT platform provides security and authentication for sensors and users.
IoT Platform fills the gap between the devices (sensors) and application (network).
Brownfield IOT
DDS Protocol
Data Distribution Service Protocol
Use Publish Subscribe Model
It is Use For device-to-device or machine-to-machine communication.
It requires real-time data exchange.
Applications
1. Aerospace and defense
2. Air-traffic control
3. Autonomous vehicles medical devices
4. Robotics
5. Power generation
6. Simulation and testing
7. Smart grid management
8. Transportation systems
XMPP Protocol
Extensible Message and Presence Protocol
It supports for Real Time Communication.
It Support client-server and server-server communication.
Full Duplex
Open technologies for instant messaging, presence, multi-party chat, voice and
video calls.
It is decentralized.
MQTT Protocol
Publish-Subscribe Model.
Web Socket
It is Communication Model.
Distributed applications.
High-level messaging.
Push-Pull Model
Producers push data to queues and consumers pull data from the queues.
Exclusive Pair
Bi directional
Full duplex
It is also Called Stateful Communication Model