SlideShare a Scribd company logo
1 of 38
CONNECTING
SMART OBJECT
IN INTERNET OF
THINGS
INTRODUCTION
IoT devices and sensors must be connected to the network for their data to be utilized. In
addition to the wide range of sensors, actuators and smart objects that make up IoT, there
are also a number of different protocols used to connect them.
What’s so special about “Smart Object”?
There’s many types of smart objects, so various answer might include:
1. It’s very constrained in some way (cost, power, memory, bandwidth and etc.)
2. It interacts directly with physical world even when no user is around and so potentially
more dangerous
3. It’s physically accessible by untrusted people and so many be more vulnerable
4. It’s physically inaccessible by trusted people and has a long lifespan (5-40 years)
2
INTRODUCTION
The term smart object is often used interchangeably with terms such as smart sensor,
smart device, IoT device, intelligent device, thing, smart thing, intelligent node, intelligent
thing, ubiquitous thing, and intelligent product
A smart object is a device that has, at a minimum, the following four defining
characteristics:
1. Processing unit
2. Sensor(s) and/or actuator(s)
3. Communication device
4. Power source
3
CHARACTERISTICS SMART OBJECTS
1. Processing Unit
A smart object has some type of processing unit for acquiring data, processing and analyzing
sensing information received by the sensor(s), coordinating control signals to any actuators,
and controlling a variety of functions on the smart object, including the communication and
power systems.
The most common is a microcontroller because of its small form factor, flexibility, programming
simplicity, ubiquity, low power consumption, and low cost
2. Sensor(s) and/or actuator(s):
 A smart object can interact with the physical world through sensors and actuators.
 A sensor learns and measures its environment, whereas an actuator can produce some
change in the physical world.
 A smart object does not need to contain both sensors and actuators.
 In fact, a smart object can contain one or multiple sensors and/or actuators, depending upon
the application.
4
CHARACTERISTICS SMART OBJECTS
3. Communication device:
The communication unit is responsible for connecting a smart object with other smart objects
and the outside world (via the network).
 Communication devices for smart objects can be either wired or wireless
 In IoT networks smart objects are wirelessly interconnected for a number of reasons, including
cost, limited infrastructure availability, and ease of deployment.
There are myriad different communication protocols for smart objects.
5
CHARACTERISTICS SMART OBJECTS
4. Power source:
 Smart objects have components that need to be powered.
 Most significant power consumption comes from the communication unit of a smart object.
 The power requirements vary greatly from application to application.
 Smart objects are limited in power, are deployed for a very long time, and are not easily
accessible.
 This combination, when the smart object relies on battery power, implies that power efficiency,
judicious power management, sleep modes, ultra-low power consumption hardware, and so on
are critical design elements
6
CHARACTERISTICS SMART OBJECTS
7
HOW DOES IT WORK?
9
The overall SmartThings solution has 4 logical architectural layers:
 End Devices - Which connect to the SmartThings Hub, or in some cases directly to the Cloud
 Smart Things Hub- Which acts as a gateway for getting events & messages to/from the Cloud
 Smart Things Cloud- Which provides the abstraction and intelligence layers described above,
as well as the Web Services that support the presentation layer.
 User Experience- Which provides the presentation layer for SmartThings in the form of mobile
applications and our Web IDE 10
10
Within the SmartThings Cloud however there are also four logical “layers” of the
architecture as well:
 Connectivity - Which is responsible for maintaining persistent connectivity to SmartThings
Hubs and the SmartThings Mobile application
 Event Processing & Routing - This layer routes events from hubs/devices to SmartApps that
are subscribed to specific devices/events.
 Applications - This layer provides the Data Access Layer for data about accounts, users, and
devices and is responsible for the execution of SmartApps.
Web Services - This layer provides the web services or Application Programmatic Interface
(API) layer that supports both the mobile applications as well as developers who want to
integrate from an external system using the SmartThings APIs
COMMON
COMMUNICATION
PATTERNS
1
12
Device-to-
device within
same network
Device-to-cloud
Device-to-ALG
(to cloud or
another local
network)
Bank-end data
sharing
DEVICE-TO-DEVICE PATTERN
 device talks directly to another local device (often smart phone or wearable)
 Security & trust often based on direct relationship between the devices (pairing)
 Rarely used IP today but apps instead directly sit over link layer protocol
 Bluetooth, Z-Wave, Zigbee
 Results in many organization doing somewhat redundant work, with differing information models for the
same type of device
13
Smart Object Other Device
Local
Network
14
DEVICE-TO-CLOUD PATTERN
 Device connects directly to some cloud service
 Allows users to access data/device from anywhere
 Requires choosing L2 already widely deployed, e.g., Wi-Fi
 Many different config. bootstrap solutions exist today
 Often service and device are from same vendor • Can
lead to silos with proprietary protocols
 Device might become unusable if ASP goes away or
changes hosting provider
 Standard protocols and/or open source can mitigate
15
Application
Service Provider
Smart Object
Local Network
Internet
16
DEVICE-TO-ALG PATTERN
 Typically used in any of these cases:
a) Uses L2 media not already ubiquitous (e.g., 802.15.4)
b) Special local authentication/authorization is required
c) Interoperability needed with legacy non-IP devices
 Often ALG and device are from same vendor
 Another common model is ALG in a smartphone
17
Application
Service Provider
App- Layer
Gateway
Local Network
Internet
ALG - App- Layer Gateway
Local Network
Local Network
Smart Object
Other Device
DEVICE-TO-ALG PATTERN
 ALG also allows integrating IPv6-only devices and legacy IPv4-only
devices/apps/cloud services
 Cheaper and more reliable generic gateways more likely if devices use standard
protocols not requiring an app-layer gateway
 Lack of standard data models for device types hampers this
18
ALG - App- Layer Gateway
19
20
BACK-END DATA SHARING PATTERN
 Data silos result from proprietary schemas
 Intentionally or simply due to lack of any standardization
 Many usage scenarios need data/devices from multiple sources
 Results in federated cloud services and/or (often RESTful) cloud APIs
 Standard protocols (HTTP, OAuth, etc.) help but are not sufficient
 Standardized information models generally outside scope of IETF 18
21
What are data silos? A data silo is a repository of data that's controlled by one department or business unit and isolated from
the rest of an organization
22
COMMUNICATION
CRITERIA
2
“Communications Criteria,” describes the characteristics and attributes should be
considered when selecting and dealing with connecting smart objects.
The various technologies used for connecting sensors can differ greatly depending on
the criteria used to analyze them.
1. Range
2. Frequency Bands
3. Topology
24
RANGE
 How far does the signal need to be propagated?
 what will be the area of coverage for a selected wireless technology?
 Should indoor versus outdoor deployments be differentiated? i. Short range: The
classical wired example is a serial cable
The simplest approach to answering these types of questions is to categorize the
technologies
25
RANGE
i. Short Range
The classical wired example is serial cable. Wireless short-range technologies are often
considered as an alternative to a serial cable, supporting tens of meters of maximum
distance between two devices. Examples of short-range wireless technologies are IEEE
802.15.1 Bluetooth and IEEE 802.15.7 Visible Light Communications(VLC)
ii. Medium Range
This range is the main category of IoT access technologies. In the range of tens to
hundreds of meters, many specifications and implementations are available. The
maximum distance is generally less than 1 mile between two devices, although RF
technologies do not have real maximum distances defined, as long as the radio signal
is transmitted and received in the scope of the applicable specification.
Example: IEEE 802.3 Ethernet and IEEE 1901.2 Narrowband Power Line
Communications (PLC)
26
RANGE
iii. Long Range
Distances greater than 1 mile between two devices require long-range technologies.
Wireless examples are cellular (2G, 3G, 4G) and some applications of outdoor IEEE
802.11 Wi-Fi and Low-Power Wide-Area (LPWA) technologies. LPWA communications
have the ability to communicate over a large area without consuming much power.
These technologies are therefore ideal for battery-powered IoT sensors. IEEE 802.3 over
optical fiber and IEEE 1901 Broadband Power Line Communications are classified as
long range
27
FREQUENCY BANDS
 Radio spectrum is regulated by countries and/or organizations, such as the
International Telecommunication Union (ITU) and the Federal Communications
Commission (FCC).
 These groups define the regulations and transmission requirements for various
frequency bands.
 For example, portions of the spectrum are allocated to types of telecommunications
such as radio, television, military, and so on
 On IoT access technologies, the frequency bands leveraged by wireless
communications are split between licensed and unlicensed bands.
 Licensed spectrum is generally applicable to IoT long-range access technologies and
and allocated to communications infrastructures deployed by services providers,
public services (for example, first responders, military), broadcasters, and utilities.
 Examples of licensed spectrum commonly used for IoT access are cellular, WiMAX,
and Narrowband IoT (NB-IoT) technologies.
28
FREQUENCY BANDS
 The ITU has also defined unlicensed spectrum for the industrial, scientific, and
medical (ISM) portions of the radio bands for short-range devices (SRDs).
 Unlicensed means that no guarantees or protections are offered in the ISM bands for
device communications.
 For IoT access, these are the most well-known ISM bands:
1. 2.4 GHz band as used by IEEE 802.11b/g/n Wi-Fi
2. IEEE 802.15.1 Bluetooth
3. IEEE 802.15.4 WPAN(Wireless Personal Area Network).
29
TOPOLOGY
 Among the access technologies available for connecting IoT devices, three main
topology schemes are dominant: star, mesh, and peer-to-peer.
 For long range and short-range technologies, a star topology is prevalent, as seen
with cellular, LPWA, and Bluetooth networks.
 Star topologies utilize a single central base station or controller to allow
communications with endpoints.
 For medium-range technologies, a star, peer-to-peer, or mesh topology is
common.
 Peer-to-peer topologies allow any device to communicate with any other device as
long as they are in range of each other.
 Obviously, peer-to-peer topologies rely on multiple full-function devices. Peer-to-
peer topologies enable more complex formations, such as a mesh networking
topology.
30
31
APPLICATION OF
CONNECTING SMART
OBJECT
3
SMART CITIES
• Controlling shipping traffic in the
Netherlands canals with wireless sensors
• Saving water with Smart Irrigation System in
Barcelona
• Traffic and Road conditions monitoring in
Malaga
33
SMART AGRICULTURE
• Precision farming to control irrigation and
improve fertilization strategies on corn corps
• Improving banana crops production and
agriculture sustainability in Colombia
• Preventing environmental impact in
wastewater irrigation area for the largest
meat industry in Australia
34
SMART ENVIRONMENT
• Rain forest monitoring for climate change in
Peru
• Water and air quality monitoring in civil
works
• Monitoring bee health and global pollination
35
SMART HOME
• Smart appliances: remote diagnostic,
proactive alerts etc.
• Water treatment: automated consumable
ordering
• Fire and safety: property monitoring,
emergency alert etc.
36
TUTORIAL
3
Please find the characteristics of these Access Technologies. The characteristics should
include wired or wireless, frequency bands, topology, range and data rate. Make a table
for this tutorial
List of Access Technologies
1. IEEE 802.15.4
2. IEEE 802.15.4g
3. IEEE 1901.2a
4. IEEE 802.11ah
5. LoRaWAN
6. NB-IOT

More Related Content

What's hot

What's hot (20)

WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
RFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSRFID with INTERNET OF THINGS
RFID with INTERNET OF THINGS
 
IoT and connected devices: an overview
IoT and connected devices: an overviewIoT and connected devices: an overview
IoT and connected devices: an overview
 
Zigbee technology ppt
Zigbee technology pptZigbee technology ppt
Zigbee technology ppt
 
MQTT IOT Protocol Introduction
MQTT IOT Protocol IntroductionMQTT IOT Protocol Introduction
MQTT IOT Protocol Introduction
 
Sensors in IOT
Sensors in IOTSensors in IOT
Sensors in IOT
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
 
Tutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standardTutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standard
 
Zigbee
ZigbeeZigbee
Zigbee
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
IOT Presentation Seminar PPT
IOT Presentation Seminar PPTIOT Presentation Seminar PPT
IOT Presentation Seminar PPT
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
1. Introduction to Embedded Systems & IoT
1. Introduction to Embedded Systems & IoT1. Introduction to Embedded Systems & IoT
1. Introduction to Embedded Systems & IoT
 

Similar to connecting smart object in IoT.pptx

Similar to connecting smart object in IoT.pptx (20)

Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
Chapter 1 pdf
Chapter 1 pdfChapter 1 pdf
Chapter 1 pdf
 
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
 
Iot
IotIot
Iot
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdf
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdf
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
IOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxIOT Network architecture and Design.pptx
IOT Network architecture and Design.pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
 
Iot
IotIot
Iot
 
IOT ajay binay.pdf
IOT ajay binay.pdfIOT ajay binay.pdf
IOT ajay binay.pdf
 
7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf
 
The technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas IncThe technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas Inc
 
IOT_PPT.pptx
IOT_PPT.pptxIOT_PPT.pptx
IOT_PPT.pptx
 

More from AnisZahirahAzman (15)

Chapter 6.pdf
Chapter 6.pdfChapter 6.pdf
Chapter 6.pdf
 
Chapter 4.pdf
Chapter 4.pdfChapter 4.pdf
Chapter 4.pdf
 
Chapter 10.pdf
Chapter 10.pdfChapter 10.pdf
Chapter 10.pdf
 
Chapter 3.pdf
Chapter 3.pdfChapter 3.pdf
Chapter 3.pdf
 
Chapter 2.pdf
Chapter 2.pdfChapter 2.pdf
Chapter 2.pdf
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 
Chapter 2.pdf
Chapter 2.pdfChapter 2.pdf
Chapter 2.pdf
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 
Chapter 13.pptx
Chapter 13.pptxChapter 13.pptx
Chapter 13.pptx
 
IoT Protocol Stack.pdf
IoT Protocol Stack.pdfIoT Protocol Stack.pdf
IoT Protocol Stack.pdf
 
Chapter 9.pptx
Chapter 9.pptxChapter 9.pptx
Chapter 9.pptx
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
introduction to c.pptx
introduction to c.pptxintroduction to c.pptx
introduction to c.pptx
 
component of c language.pptx
component of c language.pptxcomponent of c language.pptx
component of c language.pptx
 

Recently uploaded

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 

connecting smart object in IoT.pptx

  • 2. INTRODUCTION IoT devices and sensors must be connected to the network for their data to be utilized. In addition to the wide range of sensors, actuators and smart objects that make up IoT, there are also a number of different protocols used to connect them. What’s so special about “Smart Object”? There’s many types of smart objects, so various answer might include: 1. It’s very constrained in some way (cost, power, memory, bandwidth and etc.) 2. It interacts directly with physical world even when no user is around and so potentially more dangerous 3. It’s physically accessible by untrusted people and so many be more vulnerable 4. It’s physically inaccessible by trusted people and has a long lifespan (5-40 years) 2
  • 3. INTRODUCTION The term smart object is often used interchangeably with terms such as smart sensor, smart device, IoT device, intelligent device, thing, smart thing, intelligent node, intelligent thing, ubiquitous thing, and intelligent product A smart object is a device that has, at a minimum, the following four defining characteristics: 1. Processing unit 2. Sensor(s) and/or actuator(s) 3. Communication device 4. Power source 3
  • 4. CHARACTERISTICS SMART OBJECTS 1. Processing Unit A smart object has some type of processing unit for acquiring data, processing and analyzing sensing information received by the sensor(s), coordinating control signals to any actuators, and controlling a variety of functions on the smart object, including the communication and power systems. The most common is a microcontroller because of its small form factor, flexibility, programming simplicity, ubiquity, low power consumption, and low cost 2. Sensor(s) and/or actuator(s):  A smart object can interact with the physical world through sensors and actuators.  A sensor learns and measures its environment, whereas an actuator can produce some change in the physical world.  A smart object does not need to contain both sensors and actuators.  In fact, a smart object can contain one or multiple sensors and/or actuators, depending upon the application. 4
  • 5. CHARACTERISTICS SMART OBJECTS 3. Communication device: The communication unit is responsible for connecting a smart object with other smart objects and the outside world (via the network).  Communication devices for smart objects can be either wired or wireless  In IoT networks smart objects are wirelessly interconnected for a number of reasons, including cost, limited infrastructure availability, and ease of deployment. There are myriad different communication protocols for smart objects. 5
  • 6. CHARACTERISTICS SMART OBJECTS 4. Power source:  Smart objects have components that need to be powered.  Most significant power consumption comes from the communication unit of a smart object.  The power requirements vary greatly from application to application.  Smart objects are limited in power, are deployed for a very long time, and are not easily accessible.  This combination, when the smart object relies on battery power, implies that power efficiency, judicious power management, sleep modes, ultra-low power consumption hardware, and so on are critical design elements 6
  • 8. HOW DOES IT WORK?
  • 9. 9 The overall SmartThings solution has 4 logical architectural layers:  End Devices - Which connect to the SmartThings Hub, or in some cases directly to the Cloud  Smart Things Hub- Which acts as a gateway for getting events & messages to/from the Cloud  Smart Things Cloud- Which provides the abstraction and intelligence layers described above, as well as the Web Services that support the presentation layer.  User Experience- Which provides the presentation layer for SmartThings in the form of mobile applications and our Web IDE 10
  • 10. 10 Within the SmartThings Cloud however there are also four logical “layers” of the architecture as well:  Connectivity - Which is responsible for maintaining persistent connectivity to SmartThings Hubs and the SmartThings Mobile application  Event Processing & Routing - This layer routes events from hubs/devices to SmartApps that are subscribed to specific devices/events.  Applications - This layer provides the Data Access Layer for data about accounts, users, and devices and is responsible for the execution of SmartApps. Web Services - This layer provides the web services or Application Programmatic Interface (API) layer that supports both the mobile applications as well as developers who want to integrate from an external system using the SmartThings APIs
  • 12. 12 Device-to- device within same network Device-to-cloud Device-to-ALG (to cloud or another local network) Bank-end data sharing
  • 13. DEVICE-TO-DEVICE PATTERN  device talks directly to another local device (often smart phone or wearable)  Security & trust often based on direct relationship between the devices (pairing)  Rarely used IP today but apps instead directly sit over link layer protocol  Bluetooth, Z-Wave, Zigbee  Results in many organization doing somewhat redundant work, with differing information models for the same type of device 13 Smart Object Other Device Local Network
  • 14. 14
  • 15. DEVICE-TO-CLOUD PATTERN  Device connects directly to some cloud service  Allows users to access data/device from anywhere  Requires choosing L2 already widely deployed, e.g., Wi-Fi  Many different config. bootstrap solutions exist today  Often service and device are from same vendor • Can lead to silos with proprietary protocols  Device might become unusable if ASP goes away or changes hosting provider  Standard protocols and/or open source can mitigate 15 Application Service Provider Smart Object Local Network Internet
  • 16. 16
  • 17. DEVICE-TO-ALG PATTERN  Typically used in any of these cases: a) Uses L2 media not already ubiquitous (e.g., 802.15.4) b) Special local authentication/authorization is required c) Interoperability needed with legacy non-IP devices  Often ALG and device are from same vendor  Another common model is ALG in a smartphone 17 Application Service Provider App- Layer Gateway Local Network Internet ALG - App- Layer Gateway Local Network Local Network Smart Object Other Device
  • 18. DEVICE-TO-ALG PATTERN  ALG also allows integrating IPv6-only devices and legacy IPv4-only devices/apps/cloud services  Cheaper and more reliable generic gateways more likely if devices use standard protocols not requiring an app-layer gateway  Lack of standard data models for device types hampers this 18 ALG - App- Layer Gateway
  • 19. 19
  • 20. 20
  • 21. BACK-END DATA SHARING PATTERN  Data silos result from proprietary schemas  Intentionally or simply due to lack of any standardization  Many usage scenarios need data/devices from multiple sources  Results in federated cloud services and/or (often RESTful) cloud APIs  Standard protocols (HTTP, OAuth, etc.) help but are not sufficient  Standardized information models generally outside scope of IETF 18 21 What are data silos? A data silo is a repository of data that's controlled by one department or business unit and isolated from the rest of an organization
  • 22. 22
  • 24. “Communications Criteria,” describes the characteristics and attributes should be considered when selecting and dealing with connecting smart objects. The various technologies used for connecting sensors can differ greatly depending on the criteria used to analyze them. 1. Range 2. Frequency Bands 3. Topology 24
  • 25. RANGE  How far does the signal need to be propagated?  what will be the area of coverage for a selected wireless technology?  Should indoor versus outdoor deployments be differentiated? i. Short range: The classical wired example is a serial cable The simplest approach to answering these types of questions is to categorize the technologies 25
  • 26. RANGE i. Short Range The classical wired example is serial cable. Wireless short-range technologies are often considered as an alternative to a serial cable, supporting tens of meters of maximum distance between two devices. Examples of short-range wireless technologies are IEEE 802.15.1 Bluetooth and IEEE 802.15.7 Visible Light Communications(VLC) ii. Medium Range This range is the main category of IoT access technologies. In the range of tens to hundreds of meters, many specifications and implementations are available. The maximum distance is generally less than 1 mile between two devices, although RF technologies do not have real maximum distances defined, as long as the radio signal is transmitted and received in the scope of the applicable specification. Example: IEEE 802.3 Ethernet and IEEE 1901.2 Narrowband Power Line Communications (PLC) 26
  • 27. RANGE iii. Long Range Distances greater than 1 mile between two devices require long-range technologies. Wireless examples are cellular (2G, 3G, 4G) and some applications of outdoor IEEE 802.11 Wi-Fi and Low-Power Wide-Area (LPWA) technologies. LPWA communications have the ability to communicate over a large area without consuming much power. These technologies are therefore ideal for battery-powered IoT sensors. IEEE 802.3 over optical fiber and IEEE 1901 Broadband Power Line Communications are classified as long range 27
  • 28. FREQUENCY BANDS  Radio spectrum is regulated by countries and/or organizations, such as the International Telecommunication Union (ITU) and the Federal Communications Commission (FCC).  These groups define the regulations and transmission requirements for various frequency bands.  For example, portions of the spectrum are allocated to types of telecommunications such as radio, television, military, and so on  On IoT access technologies, the frequency bands leveraged by wireless communications are split between licensed and unlicensed bands.  Licensed spectrum is generally applicable to IoT long-range access technologies and and allocated to communications infrastructures deployed by services providers, public services (for example, first responders, military), broadcasters, and utilities.  Examples of licensed spectrum commonly used for IoT access are cellular, WiMAX, and Narrowband IoT (NB-IoT) technologies. 28
  • 29. FREQUENCY BANDS  The ITU has also defined unlicensed spectrum for the industrial, scientific, and medical (ISM) portions of the radio bands for short-range devices (SRDs).  Unlicensed means that no guarantees or protections are offered in the ISM bands for device communications.  For IoT access, these are the most well-known ISM bands: 1. 2.4 GHz band as used by IEEE 802.11b/g/n Wi-Fi 2. IEEE 802.15.1 Bluetooth 3. IEEE 802.15.4 WPAN(Wireless Personal Area Network). 29
  • 30. TOPOLOGY  Among the access technologies available for connecting IoT devices, three main topology schemes are dominant: star, mesh, and peer-to-peer.  For long range and short-range technologies, a star topology is prevalent, as seen with cellular, LPWA, and Bluetooth networks.  Star topologies utilize a single central base station or controller to allow communications with endpoints.  For medium-range technologies, a star, peer-to-peer, or mesh topology is common.  Peer-to-peer topologies allow any device to communicate with any other device as long as they are in range of each other.  Obviously, peer-to-peer topologies rely on multiple full-function devices. Peer-to- peer topologies enable more complex formations, such as a mesh networking topology. 30
  • 31. 31
  • 33. SMART CITIES • Controlling shipping traffic in the Netherlands canals with wireless sensors • Saving water with Smart Irrigation System in Barcelona • Traffic and Road conditions monitoring in Malaga 33
  • 34. SMART AGRICULTURE • Precision farming to control irrigation and improve fertilization strategies on corn corps • Improving banana crops production and agriculture sustainability in Colombia • Preventing environmental impact in wastewater irrigation area for the largest meat industry in Australia 34
  • 35. SMART ENVIRONMENT • Rain forest monitoring for climate change in Peru • Water and air quality monitoring in civil works • Monitoring bee health and global pollination 35
  • 36. SMART HOME • Smart appliances: remote diagnostic, proactive alerts etc. • Water treatment: automated consumable ordering • Fire and safety: property monitoring, emergency alert etc. 36
  • 38. Please find the characteristics of these Access Technologies. The characteristics should include wired or wireless, frequency bands, topology, range and data rate. Make a table for this tutorial List of Access Technologies 1. IEEE 802.15.4 2. IEEE 802.15.4g 3. IEEE 1901.2a 4. IEEE 802.11ah 5. LoRaWAN 6. NB-IOT