Iot

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 18

IOT (INTERNET OF THINGS )

IOT Stands For Internet Of Things, Which Is A Network Of Physical Objects That
Are Connected To The Internet And Can Exchange Data With Other Devices And
System.
Today The Internet Has Become Ubiquitous, Has Touched Almost Every Corner Of The
Globe, And Is Affecting Human Life In Unimaginable Ways.
One Year after The Past Edition Of The Cluster Book 2012 It Can Be Clearly Stated That The
Internet Of Things (IOT) Has Reached Many Different Players And Gained Further Recognition.
Out Of The Potential Internet Of Things Application Areas ,Smart Cities (And Regions), Smart
Car And Mobility, Smart Home And Assisted Living, Smart Industries, Public Safety, Energy &
Environmental Protection, Agriculture And Tourism As Part Of A Future IOT Ecosystem Have
Acquired High Attention.

DEFINITIONS
There Are Two Definitions of IOT

Vermesan:
The Internet of Things as Simply an Interaction between the Physical and Digital Worlds. The
Digital World Interacts With The Physical World Using A Plethora Of Sensors And Actuators.

Pe˜na-L´opez:
The Internet Of Things Is Defined As A Paradigm In Which Computing And Networking
Capabilities Are Embedded In Any Kind Of Conceivable Object.

components and working


IoT is not a single technology; rather it is an agglomeration of various technologies that work
together in tandem.
 Sensors and actuators are devices, which help in interacting with the physical environment.
The data collected by the sensors has to be stored and processed intelligently in order to derive
useful inferences from it.
 Note that we broadly define the term sensor; a mobile phone or even a microwave oven can
count as a sensor as long as it provides inputs about its current state (internal state +
environment).
An actuator is a device that is used to effect a change in the environment such as the
temperature controller of an air conditioner
The process of effecting a change in the physical world is often dependent on its state at that
point of time. This is called context awareness. Each action is taken keeping in consideration the
context because an application can behave differently in different contexts.
For example, a person may not like messages from his office to interrupt him when he is on
vacation. Sensors, actuators, compute servers, and the communication network form the core
infrastructure of an IOT framework. However, there are many software aspects that need to be
considered.
First, we need a middleware that can be used to connect and manage all of these heterogeneous
components. We need a lot of standardization to connect many different devices.
The Internet of Things finds various applications in health care, fitness, education,
entertainment, social life, energy conservation, environment monitoring, home automation, and
transport systems.

NETWORKING STANDARDS AND TECHNOLOGIES


The Open Systems Interconnection (OSI) Model Is An ISO-Standard Abstract Model Is A
Stack Of Seven Protocol Layers.
From The Top Down, They Are: Application, Presentation, Session, Transport, Network, Data
Link And Physical. TCP/IP, Or The Internet Protocol Suite, Underpins The Internet, And It
Provides A Simplified Concrete Implementation Of These Layers In The OSI Model.

The TCP/IP Model Includes Only Four Layers, Merging Some Of The OSI Model Layers.

Network Access & Physical Layer:


This TCP/IP Layer Subsumes Both OSI Layers 1 And 2.
The Physical (PHY) Layer (Layer 1 Of OSI) Governs How Each Device Is Physically Connected
To The Network With Hardware, For Example With An Optic Cable, Wires, Or Radio In The
Case Of Wireless Network Like Wi-Fi IEEE 802.11 A/B/G/N). At The Link Layer (Layer 2 Of
OSI), Devices Are Identified By A MAC Address, And Protocols At This Level Are Concerned
With Physical Addressing, Such As How Switches Deliver Frames To Devices On The Network.
Internet Layer:
This Layer Maps To the OSI Layer 3 (Network Layer). OSI Layer 3 Relates To Logical
Addressing. Protocols At This Layer Define How Routers Deliver Packets Of Data Between
Source And Destination Hosts Identified By IP Addresses. Ipv6 Is Commonly Adopted For IOT
Device Addressing.
Transport Layer:
The Transport Layer (Layer 4 In OSI) Focuses On End-To-End Communication And Provides
Features Such As Reliability, Congestion Avoidance, And Guaranteeing That Packets Will Be
Delivered In The Same Order That They Were Sent. UDP (User Datagram Protocol) Is Often
Adopted For IOT Transport for Performance Reasons.
Application Layer:
The Application Layer (Layers 5, 6, And 7 In OSI) Covers Application- Level Messaging.
HTTP/S Is An Example Of An Application Layer Protocol That Is Widely Adopted Across The
Internet.

NETWORK ACCESS AND PHYSICAL LAYER IOT NETWORK


TECHNOLOGIES

IOT network technologies to be aware of toward the bottom of the protocol stack include cellular, Wi-Fi,
and Ethernet, as well as more specialized solutions such as LPWAN, Bluetooth Low Energy (BLE),
ZIGBEE, NFC, and RFID.
NB-IOT is becoming the standard for LPWAN networks, according to Gartner. This IOT for All articles
tells more about NB-IOT.

The following are network technologies with brief descriptions of each:

LPWAN:
(Low Power Wide Area Network) is a category of technologies designed for lowpower, long-
range wireless communication. They are ideal for large-scale deployments of low-power IOT
devices such as wireless sensors. LPWAN technologies include Lo Ra (Long Range physical
layer protocol), Haystack, SIGFOX, LTE-M, and NB-IOT (Narrow-Band IOT).
CELLULAR:
The LPWAN NB-IOT and LTE-M standards address low-power, low-cost IOT communication
options using existing cellular networks. NB-IOT is the newest of these
standards and is focused on long-range communication between large numbers of primarily
indoor devices. LTE-M and NB-IOT were developed specifically for IOT, however existing
cellular technologies are also frequently adopted for long-range wireless communication. While
this has included 2G (GSM) in legacy devices (and currently being phased out), CDMA (also
being retired or phased out), it also includes 3G, which is rapidly being phased out with several
network providers retiring all 3G devices. 4G is still active and will be until 5G becomes fully
available and implemented.
BLUETOOTH LOW ENERGY (BLE):
BLE is a low-power version of the popular Bluetooth 2.4 GHz wireless communication protocol.
It is designed for short-range (no more than 100 meters) communication, typically in a star
configuration, with a single primary device that controls several secondary devices. Bluetooth
operates across both layers 1 (PHY) and 2 (MAC) of the OSI model. BLE is best suited to
devices that transmit low volumes of data in bursts. Devices are designed to sleep and save
power when they are not transmitting data.
Personal IOT devices such as wearable health and fitness trackers, often use BLE.
ZIGBEE:
ZIGBEE operates on 2.4GHz wireless communication spectrum. It has a longer range than BLE
by up to 100 meters. It also has a slightly lower data rate (250 kbps maximum compared to 270
kbps for BLE) than BLE. ZIGBEE is a mesh network protocol. Unlike BLE, not all devices can
sleep between bursts. Much depends on their position in the mesh and whether they need to act
as routers or controllers within the mesh. ZIGBEE was designed for building and home
automation applications. Another closely related technology to ZIGBEE is Z- Wave, which is
also based on IEEE 802.15.4. Z-Wave was designed for home automation. It has been proprietary
technology, but was recently released as a public domain specification.
NFC:
The near field communication (NFC) protocol is used for very small range communication (up to
4 cm), such as holding an NFC card or tag next to a reader. NFC is often used for payment
systems, but also useful for check-in systems and smart labels in asset tracking.
RFID:
FID stands for Radio Frequency Identification. RFID tags store identifiers and data. The tags are
attached to devices and read by an RFID reader. The typical range of RFID is less than a meter.
RFID tags can be active, passive, or assisted passive. Passive tags are ideal for devices without
batteries, as the ID is passively read by the reader. Active tags periodically broadcast their ID,
while assisted passive tags become active when RFID reader is present. Dash7 is a
communication protocol that uses active RFID that is designed to be used within Industrial IOT
applications for secure long-range communication. Similar to NFC, a typical use case for RFID
is tracking inventory items within retail and industrial IoT applications.
WI-FI:
WI-FI is standard wireless networking based on IEEE 802.11a/b/g/n specifications.
802.11n offers the highest data throughput, but at the cost of high-power consumption, so IOT
devices might only use 802.11b or g for power conservation reasons. Although WIFI is adopted
within many prototype and current generation IoT devices, as longer-range and lower-power
solutions become more widely available, it is likely that wifi will be superseded by lower-power
alternatives.
ETHERNET:
Widely deployed for wired connectivity within local area networks, Ethernet implements the
IEEE 802.3 standard. Not all IoT devices need to be stationery wireless . For example, sensor
units installed within a building automation system can use wired networking technologies like
Ethernet. Power line communication (PLC), an alternative hard-wired solution, uses existing
electrical wiring instead of dedicated network cables

INTERNET LAYER IOT NETWORK TECHNOLOGIES


Internet layer technologies (OSI Layer 3) identify and route packets of data. Technologies
commonly adopted for IOT are related to this layer, and include IPv6, 6LoWPAN, and RPL.

IPV6:
At the Internet layer, devices are identified by IP addresses. IPv6 is typically used for IOT
applications over legacy IPv4 addressing. IPv4 is limited to 32-bit addresses, which only provide
around 4.3 billion addresses in total, which is less than the current number of IOT devices that
are connected, while IPv6 uses 128 bits, and so provides 2 128 addresses (around
3.4 × 10 38 or 340 billion billion billion billion) addresses. In practice, not all IOT devices need
public addresses. Of the tens of billions of devices expected to connect via the IOT over the next
few years, many will be deployed in private networks that use private address ranges and only
communicate out to other devices or services on external networks by using gateways.
6LOWPAN:
The IPv6 Low Power Wireless Personal Area Network (6LoWPAN) standard allows IPv6 to be
used over 802.15.4 wireless networks. 6LoWPAN is often used for wireless sensor networks,
and the Thread protocol for home automation devices also runs over 6LoWPAN.
RPL:
The Internet Layer also covers routing. IPv6 Routing Protocol for Low-Power and LOSSY
Networks (RPL) is designed for routing IPv6 traffic over low-power networks like those
networks implemented over 6LoWPAN. RPL (pronounced “ripple”) is designed for routing
packets within constrained networks such as wireless sensor networks, where not all devices are
reachable at all times and there are high or unpredictable amounts of packet loss. RPL can
compute the optimal path by building up a graph of the nodes in the network based on dynamic
metrics and constraints like minimizing energy consumption or latency.

APPLICATION LAYER IOT NETWORK TECHNOLOGIES

HTTP and HTTPS are ubiquitous across internet applications, which is true also within IOT,
with restful HTTP and HTTPS interfaces widely deployed. COAP (Constrained Application
Protocol) is like a lightweight HTTP that is often used in combination with 6LoWPAN over
UDP. Messaging protocols like MQTT, AMQP, and XMPP are also frequently used within IoT
applications:

MQTT:
Message Queue Telemetry Transport (MQTT) is a publish/subscribe-based messaging protocol
that was designed for use in low bandwidth situations, particularly for sensors and mobile
devices on unreliable networks.
AMQP:
Advanced Message Queuing Protocol (AMQP) is an open standard messaging protocol that is
used for message-oriented middleware. Most notably, AMQP is implemented by Rabbit MQ.
XMPP:
The Extensible Messaging and Presence Protocol (XMPP) was originally designed for real-time
human-to-human communication including instant messaging. This protocol has been adapted
for machine-to-machine (M2M) communication to implement lightweight middleware and for
routing XML data. XMPP is primarily used with smart appliances.

Your choice of technologies at this layer will depend on the specific application requirements of
your IOT project. For example, for a budget home automation system that involves several
sensors, MQTT would be a good choice as it is great for implementing messaging on devices
without much storage or processing power because the protocol is simple and lightweight to
implement.

IOT NETWORKING CONSIDERATIONS AND CHALLENGES

When you consider which networking technologies to adopt within your IOT application, be
mindful of the following constraints:
 Range
 Bandwidth
 Power usage
 Intermittent connectivity
 Interoperability
 Security

RANGE:
Networks can be described in terms of the distances over which data is typically transmitted by
the IOT devices attached to the network:
 PAN(Personal Area Network):
PAN is short-range, where distances can be measured in meters, such as a wearable fitness tracker device
that communicates with an app on a cell phone over BLE.
 LAN(LOCAL AREA NETWORK):
LAN is short- to medium-range, where distances can be up to hundreds of meters, such as home
automation or sensors that are installed within a factory production line that communicate over
WI-FI with a gateway device that is installed within the same building.
 MAN (METROPOLITAN AREA NETWORK):
MAN is long-range (city wide), where distances are measured up to a few kilometers, such as
smart parking sensors installed throughout a city that are connected in a mesh network
topology.
 WAN (Wide Area Network):
WAN is long-range, where distances can be measured in kilometers, such as agricultural sensors
that are installed across a large farm or ranch that are used to monitor micro-climate
environmental conditions across the property .

Your network should retrieve data from the IOT devices and transmit to its intended destination.
Select a network protocol that matches the range is required. For example, do not choose BLE
for a WAN application to operate over a range of several kilometers. If transmitting data over
the required range presents a challenge, consider edge computing. Edge computing analyzes
data directly from the devices rather than from a distant data center or elsewhere.

Bandwidth
Bandwidth is the amount of data that can be transmitted per unit of time. It limits the rate at
which data can be collected from IOT devices and transmitted upstream.

Bandwidth is affected by many factors, which include:


 The volume of data each device gathers and transmits
 The number of devices deployed
 Whether data is being sent as a constant stream or in intermittent bursts, and if any peak
periods are notable.

The packet size of the networking protocol should match up with the volume of data
typically transmitted. It is inefficient to send packets padded with empty data. In contrast,
there are overheads in splitting larger chunks of data up across too many small packets.
Data transmission rates are not always symmetrical (that is, upload rates might be slower
than download rates). So, if there is two-way communication between devices, data
transmission needs to be factored in. Wireless and cellular networks are traditionally low
bandwidth, so consider whether a wireless technology is the right choice for high-volume
applications.

Consider whether all raw data must be transmitted. A possible solution is to capture less data
by sampling less frequently. Thus, you’ll capture fewer variables and may filter data
from the device to drop insignificant data. If you aggregate the data before you transmit
it, you reduce the volume of data transmitted. But this process affects flexibility and
granularity in the upstream analysis. Aggregation and bursting are not always suitable for
time-sensitive or latency-sensitive data. All of these techniques increase the data
processing and storage requirements for the IOT device.
POWER USAGE:
Transmitting data from a device consumes power. Transmitting data over long ranges
requires more power than over a short range. You must consider the power source – such
as a battery, solar cell, or capacitor – of a device and its total lifecycle. A long and
enduring lifecycle will not only provide greater reliability but reduce operating cost.
Steps may be taken to help achieve longer power supply lifecycles. For example, to
prolong the battery life, you can put the device into sleep mode whenever it is idle.
Another best practice is to model the energy consumption of the device under different
loads and different network conditions to ensure that the device’s power supply and
storage capacity matches with the power that is required to transmit the necessary data by
using the networking technologies that you adopted.
INTERMITTENT CONNECTIVITY:
IOT devices aren’t always connected. In some cases, devices are designed to connect
periodically. However, sometimes an unreliable network might cause devices to drop off
due to connectivity issues. Sometimes quality of service issues, such as dealing with
interference or channel contention on a wireless network using a shared spectrum.
Designs should incorporate intermittent connectivity and seek any available solutions to
provide uninterrupted service, should that be a critical factor for iot landscape design.

INTEROPERABILITY:
Devices work with other devices, equipment, systems, and technology;
they are interoperable. With so many different devices connecting to the IOT, interoperability
can be a challenge. Adopting standard protocols has been a traditional approach for maintaining
interoperability on the Internet. Standards are agreed upon by industry participants and avoid
multiple different designs and directions. With proper standards, and participants who agree to
them, incompatibility issues, hence interoperability issues may be avoided.

However, for the IOT, standardization processes sometimes struggle to


keep up with innovation and change. They are written and released based on upcoming versions
of standards that are still subject to change. Consider the ecosystem around the technologies: Are
they widely adopted?
Are they open versus proprietary? How many implementations are
available?

Using these questions to plan your IOT networks help plan better
interoperability for a more robust IOT network.
SECURITY:
Security is a priority. Selection of networking technologies that
implement end-to- end security, including authentication, encryption, and open port protection is
crucial. IEEE
802.15.4 includes a security model that provides security features that
include access control, message integrity, message confidentiality, and replay protection, which
are implemented by
technologies based on this standard such as ZIGBEE.

Consider the following factors in shaping a secure and safe IOT


network:

Authentication:
Adopt secure protocols to support authentication for devices, gateways,
users, services, and applications. Consider using adopting the X.509 standard for device
authentication.
Encryption:
If you are using WI-FI, use Wireless Protected Access 2 (WPA2) for
wireless network encryption. You may also adopt a Private Pre-Shared Key (PPSK) approach.
To ensure privacy and data integrity for communication between applications, be sure to adopt
TLS or Datagram Transport-Layer Security (DTLS), which is based on TLS, but adapted for
unreliable connections that run over UDP. TLS encrypts application data and ensures its
integrity.
Port Protection:
Port protection ensures that only the ports required for communication
with the gateway or upstream applications or services remain open to external connections. All
other ports should be disabled or protected by firewalls. Device ports might be exposed when
exploiting Universal Plug and Play (UPnP) vulnerabilities. Thus, UPnP should be disabled on
IOT Applications

IOT applications promise to bring immense value into our lives. With newer wireless networks,
superior sensors and revolutionary computing capabilities, the Internet of Things could be the next
frontier in the race for its share of the wallet. IOT applications are expected to equip billions of
everyday objects with connectivity and intelligence. It is already being deployed extensively,
FEW APPLICATIONS OF IOT:

WEARABLES
Smart Home Applications
Smart Buildings
Smart Infrastructure
Securities
Health Care
Smart Cities
Agriculture
Industrial Automation
Iot Applications:Smart Home, Smart Buildings And Infrastructure

IOT home automation is the ability to control domestic appliances by electronically


controlled, internet-connected systems. It may include setting complex heating and lighting
systems in advance and setting alarms and home security controls, all connected by a
central hub and remote-controlled by a mobile app.

The rise of Wi-Fi’s role in home automation has primarily come about due to the networked
nature of deployed electronics where electronic devices (TV sand AV receivers, mobile devices,
etc.) have started becoming part of the home IP network and due the increasing rate of adoption
of mobile computing devices (smartphones, tablets, etc.), see above Figure.

The networking aspects are bringing online streaming services or network playback, while
becoming a mean to control of the device functionality over the network. At the same time
mobile devices ensure that consumers have access to a portable ‘controller’ for the electronics
connected to the network. Both types of devices can be used as gateways for IOT applications. In
this context many companies are considering building platforms that integrate the building
automation with entertainment ,healthcare monitoring, energy monitoring and wireless sensor
monitoring in the home and building environments.
IOT applications using sensors to collect information about the operating conditions combined
with cloud hosted analytics software that analyzes disparate data points will help facility
managers become far more proactive about managing buildings at peak efficiency.

Issues of building ownership (i.e., building owner, manager, or occupants)challenge integration


with questions such as who pays initial system cost and who collects the benefits over time. A
lack of collaboration between the subsectors of the building industry slows new technology
adoption and can vent new buildings from achieving energy, economic and environmental
performance targets.

Integration of cyber physical systems both within the building and with external entities, such as
the electrical grid, will require stakeholder cooperation to achieve true interoperability. As in all
sectors, maintaining security will be a critical challenge to overcome.

Within this field of research the exploitation of the potential of wireless sensor networks (WSNs)
to facilitate intelligent energy management in building s ,which increases occupant comfort
while reducing energy demand, is highly relevant.

In addition to the obvious economic and environmental gains from the introduction of such
intelligent energy management in buildings other positive effects will be achieved. Not least of
which is the simplification of building control; as placing monitoring, information feedback
equipment and control capabilities in a single location will make a buildings’ energy
management system easier to handle for the building owners, building managers, maintenance
crews and other users of the building. Using the Internet together with energy management
systems also offers an opportunity to access a buildings’ energy information and control systems
from a laptop or a Smartphone placed anywhere in the world. This has a huge potential for
providing the managers, owners and inhabitants of buildings with energy consumption feedback
and the ability to act on that information.

In the context of the future Internet of Things, Intelligent Building Management Systems can be
considered part of a much larger information system .This system is used by facilities managers
in buildings to manage energy use and energy procurement and to maintain buildings systems. It
is based on the infrastructure of the existing Intranets and the Internet, and therefore utilizes the
same standards as other IT devices. Within this context reductions in the cost and reliability of
WSNs are transforming building automation, by making the maintenance of energy efficient
healthy, productive work spaces in buildings increasingly cost effective.
Home Appliance in Internet of Things:
Smart home systems are integrated and enable you to play an active role in every part of your
home by surrounding your home. When you’re not at home, but your mind stays at home, it’s
behind you. With smart home systems, you can intervene in your home as if you are at home
and perform the necessary controls .In addition to these protection systems, smart home
appliances have been making human life easier since the day it was developed.

Smart Washing Machine

It is very important to save time in daily life. we live in a period where we have to keep up.
That’s where technology comes in. You can access the developed smart washing machine on
your smartphone. You can monitor and control the process at the same time. This smart washing
machine can also dry your laundry with the control application.

Smart Refrigerator With Internet Of Things


Internet in this kitchen which makes life easier for you and your family in the kitchen. With this
internet connection, you can transmit a lot of information to your shopping list in the weather.
You can also view the inside of your refrigerator with its camera technology.
  Shortest Way To Dry Hair
This time it has infrared technology. With this technology, the device is created wirelessly.
Wireless shape so you can dry your hair without connecting the machine.

Smart Doorbell
The most important thing in smart home applications is known to be secure and protected home.
With this smart doorbell designed for security, you can recognize people who come to your
home with high quality. The night also has infrared technology added to the smart bell. This
will also send the screen to you when it gets dark.

Smart Camera For Safe Home


Control of your home is in your hands from every part. This smart camera sends records
from every part of your home to your smartphone with the Internet of Things technology.
Research on smart camera technology will continue for those who want a safe life.
:

Advantages Of IOT:

It can assist in the smarter control of homes and cities via mobile phones. It
enhances security and offers personal protection.
By automating activities, it saves us a lot of time.
Information is easily accessible, even if we are far away from our actual
location, and it is updated frequently in real time.
Electric Devices are directly connected and communicate with a controller
computer, such as a cell phone, resulting in efficient electricity use. As a result,
there will be no unnecessary use of electricity equipment.
Personal assistance can be provided by IoT apps, which can alert you to your
regular plans.
It is useful for safety because it senses any potential danger and warns users.
For example, GM OnStar, is a integrated device that system which
identifies a car crash or accident on road. It immediately makes a call if an
accident or crash is found.
It minimizes human effort because IoT devices connect and communicate with

one another and perform a variety of tasks without the need for human
intervention.
Patient care can be performed more effectively in real time without the need
for a doctor’s visit. It gives them the ability to make choices as well as provide
evidence-based care.
Asset tracking, traffic or transportation tracking, inventory control, delivery,
surveillance, individual order tracking, and customer management can all be
made more cost-effective with the right tracking system.
Disadvantages Of IOT:
Hackers may gain access to the system and steal personal information. Since
we add so many devices to the internet, there is a risk that our information as it
can be misused.
They rely heavily on the internet and are unable to function effectively
without it.
With the complexity of systems, there are many ways for them to fail.
We lose control of our lives—our lives will be fully controlled and reliant on
technology.
Overuse of the Internet and technology makes people unintelligent because
they rely on smart devices instead of doing physical work, causing them to
become lazy.
Unskilled workers are at a high risk of losing their jobs, which could lead to
unemployment. Smart surveillance cameras, robots, smart ironing systems,
smart washing machines, and other facilities are replacing security guards,
maids, ironmen, and dry-cleaning services etc.
It is very difficult to plan, build, manage, and enable a broad technology to
IoT framework.
Deploying IoT devices is very costly and time-consuming.

You might also like