SlideShare a Scribd company logo
1 of 67
Introduction of IOT
PRESENTED : DR. S.K. AGGARWAL
1
Introduction of IOT
Definition & Characteristics of
IoT.
Physical Design of IoT.
Logical Design of IoT.
IoT Enabling Technologies.
IoT Levels & Deployment
Templates.
2
Introduction of IOT
Internet of Things (IoT) comprises things that have unique identities and
connected to the Internet.
 While many existing devices, such as networked mobile phones , already
have some form of unique identities and are also connected to the Internet.
 The focus on IoT is in the configuration, control and networking via the
Internet of devices or "things" that are traditionally not associated with the
Internet, Like thermostats, utility meters, a Bluetooth-connected headset,
irrigation pumps and sensors, or control circuits for an electric car's engine.
 Experts forecast that by the year 2020 there will be a total of 50 billion
devices/things connected to the Internet.
3
4
Inferring information and knowledge from data
5
Applications of IoT
Definition & Characteristics of IoT
A dynamic global network infrastructure with self-
configuring capabilities based on standard and
interoperable communication protocols where physical
and virtual "things" have identities, physical attributes, and
virtual personalities and use intelligent interfaces, and are
seamlessly integrated into the information network, often
communicate data associated with users and their
environments.
6
Definition & Characteristics of IoT
Dynamic & Self-Adapting: IoT devices and systems may
have the capability to dynamically adapt with the
changing contexts and take actions based on their
operating conditions, user's context, or sensed
environment.
For example, consider a surveillance system comprising of
a number of surveillance cameras.
7
Definition & Characteristics of IoT
Self-Configuring:
loT devices may have self-configuring capability, allowing
a large number of devices to work together to provide
certain functionality (such as weather monitoring).
8
Definition & Characteristics of IoT
Interoperable Communication Protocols:
loT devices may support a number of interoperable
communication protocols and can communicate with
other devices and also with the infrastructure.
9
Definition & Characteristics of IoT
Unique Identity:
Each IoT device has a unique identity and a unique
identifier (such as an IP address or a URI).
10
Definition & Characteristics of IoT
Integrated into Information Network:
IoT devices are integrated into the information network
that allows them to communicate and exchange
data with other devices and systems.
IoT devices can be dynamically discovered in the
network, by other devices and/or the network, and
have the capability to describe themselves (and their
characteristics) to other devices or user applications.
11
Physical Design of loT
The "Things" in loT refers to loT devices which have unique identities and can perform
remote sensing, actuating and monitoring capabilities.
loT devices can exchange data with other connected devices and applications, or
collect data from other devices and process the data either locally or send the data to
centralized servers or cloud-based application back-ends for processing the data, or
perform some tasks locally and other tasks within the loT infrastructure, based on
temporal and space constraints.
12
Things" in loT 13
An loT device may
consist of several
interfaces for
connections to other
devices, both wired and
wireless. These include (i)
I/O interfaces for sensors,
(ii) interfaces for Internet
connectivity,
(iii) memory and storage
interfaces and
(iv) audio/video
loT Protocols
 Link layer protocols determine how the data is physically sent over
the network 's physical layer or medium .
 The scope of the link layer is the local network connection to which
host is attached.
 Hosts on the same link exchange data packets over the link layer
using link layer protocols.
 Link layer determines how the packets are coded and signaled by
the hardware device over the medium to which the host is
attached .
14
Link layer protocols
802.3 - Ethernet : IEEE 802.3 is a collection of wired Ethernet standards
for the link layer. These standards provide data rates from 10 Mb/s to 40
Gb/s and higher.
802.11 - WiFi : IEEE 802.11 is a collection of wireless local area network
(WLAN) communication standards, including extensive description of
the link layer. These standards provide data rates from 1 Mb/s to upto
6.75 Gb/s.
802.16 - WiMax : IEEE 802.16 is a collection of wireless broadband
standards, including extensive descriptions for the link layer . These
standards provide data rates from 1.5 Mb/s to 1 Gb/s.
15
16
Link layer protocols
802.15.4 - LR-WPAN : IEEE 802.15.4 is a collection of
standards for low-rate wireless personal area
networks (LR-WPANs). LR-WPAN standards provide
data rates from 40 Kb/s 250 Kb/s.
2G/ 3G/ 4G - Mobile Communication : There are
different generations of mobile communication
standards including second generation (2G ),
third generation (3G) and fourth generation (4G).
Data rates for these standards range from 9.6 Kb/s
(for 2G) to upto 100 Mb/s .
17
loT Protocols
Network/Internet layer.
Transport layer
Application layer
18
Assignment
19
Logical Design of loT
Logical design of an IoT system refers to an abstract representation of
the entities and processes without going into the low-level specifics of
the implementation.
20
Logical Design of loT
loT Functional Blocks
Device : An loT system comprises of devices that provide sensing,
actuation, monitoring and control functions.
Communication : The communication block handles the
communication for the loT system.
Services : An loT system uses various types of IoT services such as
services for device monitoring, device control services, data
publishing services and services for device discovery.
Management : Management functional block provides various
functions to govern the loT system.
Security Security functional block secures the loT system and by
providing functions such as authentication, authorization, message
and content integrity, and data security.
Application : loT applications provide an interface that the users
can use to control and monitor various aspects of the loT system.
Applications also allow users to view the system status and view or
analyze the processed data.
21
Logical Design of loT(loT Functional Blocks)
22
Logical Design of loT
loT Communication Models
Request-Response is a communication model in which the client sends
requests to the server and the server responds to the requests. When
the server receives a request, it decides how to respond, fetches the
data, retrieves resource representations, prepares the response, and
then sends the response to the client.
Request-Response model is a stateless communication model and
each request-response pair is independent of others.
23
Logical Design of loT(loT Communication Models)
24
Logical Design of loT(loT
Communication Models)
Publish-Subscribe is a communication model that involves publishers,
brokers and consumers.
Publishers are the source of data. Publishers send the data to the topics
which are managed by the broker.
Publishers are not aware of the consumers. Consumers subscribe to the
topics which are managed by the broker.
When the broker receives data for a topic from the publisher, it sends
the data to all the subscribed consumers.
25
Logical Design of loT(loT Communication Models)
26
Logical Design of loT(loT
Communication Models)
Push-Pull : Push-Pull is a communication model in which the data
producers push the data to queues and the consumers pull the data
from the queues.
Producers do not need to be aware of the consumers. Queues help in
decoupling the messaging between the producers and consumers.
Queues also act as a buffer which helps in situations when there is a
mismatch between the rate at which the producers push data and the
rate rate at which the consumers pull data.
27
Logical Design of loT(loT
Communication Models)
28
Logical Design of loT(loT
Communication Models)
Exclusive Pair : Exclusive Pair is a bi-directional, fully duplex
communication model that uses a persistent connection between the
client and server.
Once the connection is setup it remains open until the client sends a
request to close the connection.
Client and server can send messages to each other after connection
setup. Exclusive pair is a stateful communication model and the server
is aware of all the open connections.
29
Logical Design of loT(loT Communication
Models) 30
Logical Design of loT(loT Communication
Apls)
Representational State Transfer (REST) is a set of architectural principles
by which you can design web services and web APIs that focus on a
system's resources and how resource states are addressed and
transferred. REST APIs follow the request-response communication
model described in previous section. The REST architectural constraints
apply to the components, connectors, and data elements, within a
distributed hypermedia system. The REST architectural constraints are
as follows:
31
The REST architectural constraints are as
follows: Client-Server: The principle behind the client-server constraint is the
separation of concerns. For example, clients should not be concerned with
the storage of data which is a concern of the server. Similarly, the server
should not be concerned about the user interface, which is a concern of
the client. Separation allows client and server to be independently
developed and updated .
 Stateless: Each request from client to server must contain all the information
necessary to understand the request, and cannot take advantage of any
stored context on the server. The session state is kept entirely on the client.
 Cache-able : Cache constraint requires that the data within a response to
a request be implicitly or explicitly labeled as cache-able or non-cache-
able. If a response is cache-able, then a client cache is given the right to
reuse that response data for later, equivalent requests. Caching can
partially or completely eliminate some interactions and improve efficiency
and scalability.
 Layered System: Layered system constraint, constrains the behavior of
32
Uniform Interface: Uniform Interface constraint requires
that the method of communication between a client
and a server must be uniform. Resources are identified
in the requests (by URis in web based systems) and are
themselves separate from the representations of the
resources that are returned to the client. When a
client holds a representation of a resource it has all
the information required to update or delete the
resource. Each message includes enough information
to describe how to process the message.
Code on demand: Servers can provide executable
code or scripts for clients to execute in their context.
This constraint is the only one that is optional.
33
34
This request (called a WebSocket handshake) is sent over HTTP and the
server interprets it as an upgrade request. If the server supports
WebSocket protocol, the server responds to the WebSocket
handshake response.
After the connection is setup, the client and server can send
data/messages to each other in full-duplex mode. WebSocket APis
reduce the network traffic and latency as there is no overhead for
connection setup and termination requests for each message.
WebSocket is suitable for IoT applications that have low latency or high
throughput requirements.
35
WebSocket APIs allow bi-directional , full duplex communication
between clients and servers. WebSocket APis follow the exclusive pair
communication model described in previous section.Unlike request-
response APis such as REST, the WebSocket APis allow full duplex
communication and do not require a new connection to be setup for
each message to be sent. WebSocket communication begins with a
connection setup request sent by the client to the server.
36
37
loT Enabling Technologies
38
IoT is enabled by several technologies including wireless sensor
networks, cloud computing, big data analytics, embedded systems,
security protocols and architectures, communication protocols, web
services, mobile Internet, and semantic search engines.
loT Enabling Technologies
 A Wireless Sensor Network (WSN) comprises of distributed devices with sensors
which are used to monitor the environmental and physical conditions.
 A WSN consist of a number of end-nodes and routers and a coordinator. End nodes
have several sensors attached to them.
 End nodes can also act as routers. Routers are responsible for routing the data
packets from end-nodes to the coordinator.
 The coordinator collects the data from all the nodes. Coordinator also acts as a
gateway that connects the WSN to the Internet.
39
loT Enabling Technologies
40
 Cloud computing involves provisioning of computing, networking and
storage resources on demand and providing these resources as metered
services to the users, in a "pay as you go" model.
 Cloud computing services are offered to users in different
forms
 Infrastructure-as-a-Service (IaaS)
 Platform-as-a-Service (PaaS)
 Software-as-a-Service (SaaS)
loT Enabling Technologies(cloud)
 Infrastructure-as-a-Service (IaaS) : IaaS provides the users the ability to provision computing
and storage resources. These resources are provided to the users as virtual machine instances
and virtual storage. Users can start, stop, configure and manage the virtual machine instances
and virtual storage.
 Platform-as-a-Service (PaaS) : PaaS provides the users the ability to develop and deploy
application in the cloud using the development tools, application programming interfaces
(APls), software libraries and services provided by the cloud service provider.
 Software-as-a-Service (SaaS) :Saas provides the users a complete software application or the
user interface to the application itself. The cloud service provider manages the underlying
cloud infrastructure including servers, network, operating systems, storage and application
software, and the user is unaware of the underlying architecture of the cloud.
41
loT Enabling Technologies
Big Data Analytics
Big data is defined as collections of data sets whose volume, velocity (in
terms of its temporal variation), or variety, is so large that it is difficult to
store, manage, process and analyze the data using traditional databases
and data processing tools.
Examples:
Sensor data generated by loT systems such as weather monitoring
stations.
Machine sensor data collected from sensors embedded in industrial
and energy systems for monitoring their health and detecting failures.
Health and fitness data generated by loT devices such as wearable
fitness bands.
Data generated by IoT systems for location and tracking of vehicles.
Data generated by retail inventory monitoring systems.
42
loT Enabling Technologies
 Communication protocols form the backbone of loT
systems and enable network connectivity and
coupling to applications.
 Communication protocols define the data
exchange formats, data encoding, addressing
schemes for devices and routing of packets from
source to destination.
 It also include sequence control, flow control and
retransmission of lost packets.
43
loT Enabling
Technologies
 An Embedded System is a computer system that has computer hardware and
software embedded to perform specific tasks.
 Key components of an embedded system include, microprocessor or
microcontroller, memory (RAM, ROM, cache), networking units (Ethernet, WiFi
adapters), input/output units (display, keyboard , etc.) and storage (such as flash
memory).
 Embedded system have special processors such as digital signal processors (DSPs),
graphics processors and application specific processors.
 Embedded systems run embedded operating systems such as real-time operating
systems (RTOS).
 Embedded systems based low-cost devices like digital watches, digital cameras,
point of sale terminals, vending machines.
44
loT Levels & Deployment Templates
An IoT system components
1.Device: An IoT device allows identification, remote sensing,
actuating and remote monitoring capabilities.
2.Resource: Resources are software components on the IoT device
for accessing, processing, and storing sensor information , or
controlling actuators connected to the device. Resources also
include the software components that enable network access for
the device.
3.Controller Service: Controller service is a native service that runs on
the device and interacts with the web services. Controller service
sends data from the device to the web service and receives
commands from the application (via web services) for controlling
the device.
4.Database: Database can be either local or in the cloud and stores
the data generated by the IoT device.
45
loT Levels & Deployment Templates
An IoT system components
5.Web Service: Web services serve as a link between the IoT device,
application , database and analysis components. Web service can be
either implemented using HTTP and REST principles (REST service) or using
WebSocket protocol (WebSocket service).
A comparison of REST and WebSocket is provided below:
 Stateless/Stateful: REST services are stateless in nature. Each request contains all the information
needed to process it. Requests are independent of each other. WebSocket on the other hand is stateful in
nature where the server maintains the state and is aware of all the open connections.
 Uni-directional/Bi-diredional: REST services operate over HTTP and are uni-directional. Request
is always sent by a client and the server responds to the requests. On the other hand, WebSocket is a bi-
directional protocol and allows both client and server to send messages to each other.
 Request-Response/Full Duplex: REST services follow a request-response communication model
where the client sends requests and the server responds to the requests. WebSocket on the other hand
allow full-duplex communication between the client and server, i.e., both client and server can send
messages to each other independently.
46
loT Levels & Deployment Templates
An IoT system components
Web Service:
 TCP Connections: For REST services, each HTTP request involves setting up a new TCP
connection. WebSocket on the other hand involves a single TCP connection over which
the client and server communicate in a full-duplex mode.
 Header Overhead: REST services operate over HTTP, and each request is independent of
others. Thus each request carries HTTP headers which is an overhead. Due the overhead
of HTTP headers, REST is not suitable for real-time applications. WebSocket on the other
hand does not involve overhead of headers. After the initial handshake (that happens
over HTTP), the client and server exchange messages with minimal frame information.
Thus WebSocket is suitable for real-time applications.
 Scalability: Scalability is easier in the case of REST services as requests are independent
and no state information needs to be maintained by the server. Thus both horizontal
(scaling-out) and vertical scaling (scaling-up) solutions are possible for REST services. For
WebSockets, horizontal scaling can be cumbersome due to the stateful nature of the
communication. Since the server maintains the state of a connection, vertical scaling is
easier for WebSockets than horizontal scaling.
47
loT Levels & Deployment Templates
An IoT system components
6.Analysis Component: The Analysis Component is responsible for analyzing the loT
data and generate results in a form which are easy for the user to understand.
Analysis of loT data can be performed either locally or in the cloud. Analyzed results
are stored in the local or cloud databases.
7.Application: loT applications provide an interface that the users can use to control
and monitor various aspects of the IoT system. Applications also allow users to view
the system status and view the processed data.
48
IoT Level-1
 It has a single node/device that performs sensing
and/or actuation, stores data, performs analysis
and hosts the application .
 Level-I IoT systems are suitable for modeling low-
cost and low-complexity solutions.
49
IoT Level-1
50
Example: For home automation
 The system consists of a single node.
 The device used in this system interfaces with the
lights and appliances using electronic relay
switches.
 The status information of each light or appliance is
maintained in a local database. REST services
deployed locally allow retrieving and updating the
state of each light or appliance in the status
database.
 The controller service continuously monitors the
state of each light or appliance and triggers the
relay switches accordingly.
Since the device is connected to the Internet, the
application can be accessed remotely as well.
IoT Level-2
 It has a single node that performs sensing and/or
actuation and local analysis .
 Data is stored in the cloud and application is
usually cloud-based.
 Level-2 IoT systems are suitable for solutions where
the data involved is big, however, the primary
analysis requirement is not computationally
intensive and can be done locally itself.
51
IoT Level-2
52
Example: System for smart irrigation.
 The system consists of a single node that
monitors the soil moisture level and
controls the irrigation system.
 The device used in this system collects
soil moisture data from sensors.
 The controller service continuously
monitors the moisture levels. If the
moisture level drops below a threshold,
the irrigation system is turned on.
 A cloud-based REST web service is used
for storing and retrieving moisture data
which is stored in the cloud database.
 A cloud-based application is used for
visualizing the moisture levels over a
period of time, which can help in making
IoT Level-3
 It has a single node.
 Data is stored and analyzed in the cloud and
application is cloud-based.
 Level-3 IoT systems are suitable for solutions where
the data involved is big and the analysis
requirements are computationally intensive.
53
IoT Level-3
54
Example: System for tracking package
handling.
 The system consists of a single node
(for a package) that monitors the
vibration levels for a package being
shipped.
 The controller service sends the
sensor data to the cloud in real-time
using a Web Socket service.
 The data is stored in the cloud and
also visualized using a cloud-based
application.
 The analysis components in the
cloud can trigger alerts if the
vibration levels become greater
IoT Level-4
 It has multiple nodes that perform local analysis.
Data is stored cloud and application is cloud-based .
 It contains local and cloud-based observer nodes which can subscribe to and
receive information collected in the cloud from IoT devices.
 Observer nodes can process information and use it for various applications,
however, observer nodes do not perform any control functions.
 Level-4 IoT systems are suitable for solutions where multiple nodes are required,
the data involved is big and the analysis requirements are computationally
intensive.
55
IoT Level-4
56
Example: For noise monitoring
 The system consists of multiple
nodes placed in different
locations for monitoring noise
levels in an area.
 The nodes in this example are
equipped with sound sensors.
 Nodes are independent of each
other.
 Each node runs its own controller
service that sends the data to the
cloud.
 The data is stored in a cloud
database.
 The analysis of data collected
from a number of node the
IoT Level-5
 It has multiple end nodes and one coordinator node.
 The end nodes that perform sensing and/or
actuation. Coordinator node collects data from the
end nodes and sends to the cloud.
 Data is stored and analyzed in the cloud and
application is cloud-based.
 Level-5 IoT systems are suitable for solutions based on
wireless sensor networks, in which the data involved is
big and the analysis requirements are
computationally intensive.
57
IoT Level-5
58
Example: For Forest fire detection.
 The system consists of multiple nodes
placed in different locations for
monitoring temperature, humidity
and carbon dioxide (C02) levels in a
forest.
 The coordinator node collects the
data from the end nodes and acts
as a gateway that provides Internet
connectivity to the IoT system.
 The controller service on the
coordinator device sends the
collected data to the cloud. The
data is stored in a cloud database.
 The analysis of data is done in the
computing cloud to aggregate the
data and make predictions.
 A cloud-based application is used
IoT Level-6
 It has multiple independent end nodes that perform sensing
and/or . actuation and send data to the cloud.
 Data is stored in the cloud and application is cloud-based.
 The analytics component analyzes the data and stores the
results in the cloud database.
 The results are visualized with the cloud-based application.
 The centralized controller is aware of the status of all the
end nodes and sends control commands to the nodes.
59
IoT Level-6
60
Example: For weather
Monitoring.
• The system consists of multiple
nodes placed in different locations
for monitoring temperature, humidity
and pressure in an area.
• The end nodes are equipped with
various sensors (such as temperature,
pressure and humidity). The end
nodes send the data to the cloud in
real-time using a Web Socket
service.
• The data is stored in a cloud
database. The analysis of data is
done in the cloud to aggregate the
data and make predictions.
• A cloud-based application is used for
visualizing the data.
Summary
Internet of Things (IoT) refers to
Physical and virtual objects that have unique identities and are connected to the Internet.
These are available for remote sensing, actuating and remote monitoring.
It can be used to develop intelligent applications Like energy generation, logistics, industrial
control, retail, agriculture,etc.
loT allows different types of devices, appliances, users and machines to communicate and
exchange data.
The applications of Internet of Things (loT) span a wide range of domains including (but not
limited to) homes, cities, environment, energy systems, retail , logistics, industry, agriculture and
health.
It allow remote sensing, actuating and remote monitoring capabilities.
61
Summary
 A level- I IoT system has a single node/device that
performs sensing and/or actuation, stores data,
performs analysis and hosts the application .
 A level-2 IoT system has a single node that
performs sensing and/or actuation and local
analysis.
 A level-3 loT system has a single node. Data is
stored and analyzed in the cloud and application
is cloud-based.
62
Summary
A level-4 IoT system has multiple nodes that
perform local analysis. Data is stored in the
cloud and application is cloud-based.
A level-5 IoT system has multiple end nodes
and one coordinator node.
A level-6 loT system has multiple independent
end nodes that perform sensing and/or
actuation and send data to the cloud
63
Reference
1. Internet of things by Arshdeep Bahga .
2. The Internet of Things in the Cloud: A Middleware Perspective by
Honbo Zhou
64
Question?
65
Thank you
66
67

More Related Content

What's hot

Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)Kunal Adhikari
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic designudhayakumarc1
 
Internet of Things: A Hands-On Approach paperback$@@
 Internet of Things: A Hands-On Approach paperback$@@ Internet of Things: A Hands-On Approach paperback$@@
Internet of Things: A Hands-On Approach paperback$@@loho454
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Prakhyath Rai
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxMeghaShree665225
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiespavan penugonda
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdfJoshuaKimmich1
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
6g wireless communication systems
6g wireless communication systems6g wireless communication systems
6g wireless communication systemsSAIALEKHYACHITTURI
 
IoT and its Applications
IoT and its ApplicationsIoT and its Applications
IoT and its ApplicationsAbdulla Shaheen
 

What's hot (20)

Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
netconf and yang
netconf and yangnetconf and yang
netconf and yang
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Internet of Things: A Hands-On Approach paperback$@@
 Internet of Things: A Hands-On Approach paperback$@@ Internet of Things: A Hands-On Approach paperback$@@
Internet of Things: A Hands-On Approach paperback$@@
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
 
Introduction to IOT
Introduction to IOTIntroduction to IOT
Introduction to IOT
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Protocols for IoT
Protocols for IoTProtocols for IoT
Protocols for IoT
 
6g wireless communication systems
6g wireless communication systems6g wireless communication systems
6g wireless communication systems
 
Iot
IotIot
Iot
 
IoT and its Applications
IoT and its ApplicationsIoT and its Applications
IoT and its Applications
 
IOT System.pptx
IOT System.pptxIOT System.pptx
IOT System.pptx
 

Similar to Introduction of iot

Similar to Introduction of iot (20)

IoT [Internet of Things]
IoT [Internet of Things]IoT [Internet of Things]
IoT [Internet of Things]
 
Internet of things unit-1
Internet of things unit-1Internet of things unit-1
Internet of things unit-1
 
IOT.pdf
IOT.pdfIOT.pdf
IOT.pdf
 
Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hyd
 
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
 
UNIT 1.pdf
UNIT 1.pdfUNIT 1.pdf
UNIT 1.pdf
 
Iot
IotIot
Iot
 
IOT ajay binay.pdf
IOT ajay binay.pdfIOT ajay binay.pdf
IOT ajay binay.pdf
 
7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf
 
Iot
IotIot
Iot
 
Definition of Internet of things and introduction
Definition of Internet of things and introductionDefinition of Internet of things and introduction
Definition of Internet of things and introduction
 
Internet of Things.pptx
Internet of Things.pptxInternet of Things.pptx
Internet of Things.pptx
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
Internet of things Unit I
Internet of things   Unit IInternet of things   Unit I
Internet of things Unit I
 
Unit III.docx
Unit  III.docxUnit  III.docx
Unit III.docx
 
Chapter 1 pdf
Chapter 1 pdfChapter 1 pdf
Chapter 1 pdf
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
Io t protocols overview
Io t protocols overviewIo t protocols overview
Io t protocols overview
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 

Introduction of iot

  • 1. Introduction of IOT PRESENTED : DR. S.K. AGGARWAL 1
  • 2. Introduction of IOT Definition & Characteristics of IoT. Physical Design of IoT. Logical Design of IoT. IoT Enabling Technologies. IoT Levels & Deployment Templates. 2
  • 3. Introduction of IOT Internet of Things (IoT) comprises things that have unique identities and connected to the Internet.  While many existing devices, such as networked mobile phones , already have some form of unique identities and are also connected to the Internet.  The focus on IoT is in the configuration, control and networking via the Internet of devices or "things" that are traditionally not associated with the Internet, Like thermostats, utility meters, a Bluetooth-connected headset, irrigation pumps and sensors, or control circuits for an electric car's engine.  Experts forecast that by the year 2020 there will be a total of 50 billion devices/things connected to the Internet. 3
  • 4. 4 Inferring information and knowledge from data
  • 6. Definition & Characteristics of IoT A dynamic global network infrastructure with self- configuring capabilities based on standard and interoperable communication protocols where physical and virtual "things" have identities, physical attributes, and virtual personalities and use intelligent interfaces, and are seamlessly integrated into the information network, often communicate data associated with users and their environments. 6
  • 7. Definition & Characteristics of IoT Dynamic & Self-Adapting: IoT devices and systems may have the capability to dynamically adapt with the changing contexts and take actions based on their operating conditions, user's context, or sensed environment. For example, consider a surveillance system comprising of a number of surveillance cameras. 7
  • 8. Definition & Characteristics of IoT Self-Configuring: loT devices may have self-configuring capability, allowing a large number of devices to work together to provide certain functionality (such as weather monitoring). 8
  • 9. Definition & Characteristics of IoT Interoperable Communication Protocols: loT devices may support a number of interoperable communication protocols and can communicate with other devices and also with the infrastructure. 9
  • 10. Definition & Characteristics of IoT Unique Identity: Each IoT device has a unique identity and a unique identifier (such as an IP address or a URI). 10
  • 11. Definition & Characteristics of IoT Integrated into Information Network: IoT devices are integrated into the information network that allows them to communicate and exchange data with other devices and systems. IoT devices can be dynamically discovered in the network, by other devices and/or the network, and have the capability to describe themselves (and their characteristics) to other devices or user applications. 11
  • 12. Physical Design of loT The "Things" in loT refers to loT devices which have unique identities and can perform remote sensing, actuating and monitoring capabilities. loT devices can exchange data with other connected devices and applications, or collect data from other devices and process the data either locally or send the data to centralized servers or cloud-based application back-ends for processing the data, or perform some tasks locally and other tasks within the loT infrastructure, based on temporal and space constraints. 12
  • 13. Things" in loT 13 An loT device may consist of several interfaces for connections to other devices, both wired and wireless. These include (i) I/O interfaces for sensors, (ii) interfaces for Internet connectivity, (iii) memory and storage interfaces and (iv) audio/video
  • 14. loT Protocols  Link layer protocols determine how the data is physically sent over the network 's physical layer or medium .  The scope of the link layer is the local network connection to which host is attached.  Hosts on the same link exchange data packets over the link layer using link layer protocols.  Link layer determines how the packets are coded and signaled by the hardware device over the medium to which the host is attached . 14
  • 15. Link layer protocols 802.3 - Ethernet : IEEE 802.3 is a collection of wired Ethernet standards for the link layer. These standards provide data rates from 10 Mb/s to 40 Gb/s and higher. 802.11 - WiFi : IEEE 802.11 is a collection of wireless local area network (WLAN) communication standards, including extensive description of the link layer. These standards provide data rates from 1 Mb/s to upto 6.75 Gb/s. 802.16 - WiMax : IEEE 802.16 is a collection of wireless broadband standards, including extensive descriptions for the link layer . These standards provide data rates from 1.5 Mb/s to 1 Gb/s. 15
  • 16. 16
  • 17. Link layer protocols 802.15.4 - LR-WPAN : IEEE 802.15.4 is a collection of standards for low-rate wireless personal area networks (LR-WPANs). LR-WPAN standards provide data rates from 40 Kb/s 250 Kb/s. 2G/ 3G/ 4G - Mobile Communication : There are different generations of mobile communication standards including second generation (2G ), third generation (3G) and fourth generation (4G). Data rates for these standards range from 9.6 Kb/s (for 2G) to upto 100 Mb/s . 17
  • 20. Logical Design of loT Logical design of an IoT system refers to an abstract representation of the entities and processes without going into the low-level specifics of the implementation. 20
  • 21. Logical Design of loT loT Functional Blocks Device : An loT system comprises of devices that provide sensing, actuation, monitoring and control functions. Communication : The communication block handles the communication for the loT system. Services : An loT system uses various types of IoT services such as services for device monitoring, device control services, data publishing services and services for device discovery. Management : Management functional block provides various functions to govern the loT system. Security Security functional block secures the loT system and by providing functions such as authentication, authorization, message and content integrity, and data security. Application : loT applications provide an interface that the users can use to control and monitor various aspects of the loT system. Applications also allow users to view the system status and view or analyze the processed data. 21
  • 22. Logical Design of loT(loT Functional Blocks) 22
  • 23. Logical Design of loT loT Communication Models Request-Response is a communication model in which the client sends requests to the server and the server responds to the requests. When the server receives a request, it decides how to respond, fetches the data, retrieves resource representations, prepares the response, and then sends the response to the client. Request-Response model is a stateless communication model and each request-response pair is independent of others. 23
  • 24. Logical Design of loT(loT Communication Models) 24
  • 25. Logical Design of loT(loT Communication Models) Publish-Subscribe is a communication model that involves publishers, brokers and consumers. Publishers are the source of data. Publishers send the data to the topics which are managed by the broker. Publishers are not aware of the consumers. Consumers subscribe to the topics which are managed by the broker. When the broker receives data for a topic from the publisher, it sends the data to all the subscribed consumers. 25
  • 26. Logical Design of loT(loT Communication Models) 26
  • 27. Logical Design of loT(loT Communication Models) Push-Pull : Push-Pull is a communication model in which the data producers push the data to queues and the consumers pull the data from the queues. Producers do not need to be aware of the consumers. Queues help in decoupling the messaging between the producers and consumers. Queues also act as a buffer which helps in situations when there is a mismatch between the rate at which the producers push data and the rate rate at which the consumers pull data. 27
  • 28. Logical Design of loT(loT Communication Models) 28
  • 29. Logical Design of loT(loT Communication Models) Exclusive Pair : Exclusive Pair is a bi-directional, fully duplex communication model that uses a persistent connection between the client and server. Once the connection is setup it remains open until the client sends a request to close the connection. Client and server can send messages to each other after connection setup. Exclusive pair is a stateful communication model and the server is aware of all the open connections. 29
  • 30. Logical Design of loT(loT Communication Models) 30
  • 31. Logical Design of loT(loT Communication Apls) Representational State Transfer (REST) is a set of architectural principles by which you can design web services and web APIs that focus on a system's resources and how resource states are addressed and transferred. REST APIs follow the request-response communication model described in previous section. The REST architectural constraints apply to the components, connectors, and data elements, within a distributed hypermedia system. The REST architectural constraints are as follows: 31
  • 32. The REST architectural constraints are as follows: Client-Server: The principle behind the client-server constraint is the separation of concerns. For example, clients should not be concerned with the storage of data which is a concern of the server. Similarly, the server should not be concerned about the user interface, which is a concern of the client. Separation allows client and server to be independently developed and updated .  Stateless: Each request from client to server must contain all the information necessary to understand the request, and cannot take advantage of any stored context on the server. The session state is kept entirely on the client.  Cache-able : Cache constraint requires that the data within a response to a request be implicitly or explicitly labeled as cache-able or non-cache- able. If a response is cache-able, then a client cache is given the right to reuse that response data for later, equivalent requests. Caching can partially or completely eliminate some interactions and improve efficiency and scalability.  Layered System: Layered system constraint, constrains the behavior of 32
  • 33. Uniform Interface: Uniform Interface constraint requires that the method of communication between a client and a server must be uniform. Resources are identified in the requests (by URis in web based systems) and are themselves separate from the representations of the resources that are returned to the client. When a client holds a representation of a resource it has all the information required to update or delete the resource. Each message includes enough information to describe how to process the message. Code on demand: Servers can provide executable code or scripts for clients to execute in their context. This constraint is the only one that is optional. 33
  • 34. 34
  • 35. This request (called a WebSocket handshake) is sent over HTTP and the server interprets it as an upgrade request. If the server supports WebSocket protocol, the server responds to the WebSocket handshake response. After the connection is setup, the client and server can send data/messages to each other in full-duplex mode. WebSocket APis reduce the network traffic and latency as there is no overhead for connection setup and termination requests for each message. WebSocket is suitable for IoT applications that have low latency or high throughput requirements. 35
  • 36. WebSocket APIs allow bi-directional , full duplex communication between clients and servers. WebSocket APis follow the exclusive pair communication model described in previous section.Unlike request- response APis such as REST, the WebSocket APis allow full duplex communication and do not require a new connection to be setup for each message to be sent. WebSocket communication begins with a connection setup request sent by the client to the server. 36
  • 37. 37
  • 38. loT Enabling Technologies 38 IoT is enabled by several technologies including wireless sensor networks, cloud computing, big data analytics, embedded systems, security protocols and architectures, communication protocols, web services, mobile Internet, and semantic search engines.
  • 39. loT Enabling Technologies  A Wireless Sensor Network (WSN) comprises of distributed devices with sensors which are used to monitor the environmental and physical conditions.  A WSN consist of a number of end-nodes and routers and a coordinator. End nodes have several sensors attached to them.  End nodes can also act as routers. Routers are responsible for routing the data packets from end-nodes to the coordinator.  The coordinator collects the data from all the nodes. Coordinator also acts as a gateway that connects the WSN to the Internet. 39
  • 40. loT Enabling Technologies 40  Cloud computing involves provisioning of computing, networking and storage resources on demand and providing these resources as metered services to the users, in a "pay as you go" model.  Cloud computing services are offered to users in different forms  Infrastructure-as-a-Service (IaaS)  Platform-as-a-Service (PaaS)  Software-as-a-Service (SaaS)
  • 41. loT Enabling Technologies(cloud)  Infrastructure-as-a-Service (IaaS) : IaaS provides the users the ability to provision computing and storage resources. These resources are provided to the users as virtual machine instances and virtual storage. Users can start, stop, configure and manage the virtual machine instances and virtual storage.  Platform-as-a-Service (PaaS) : PaaS provides the users the ability to develop and deploy application in the cloud using the development tools, application programming interfaces (APls), software libraries and services provided by the cloud service provider.  Software-as-a-Service (SaaS) :Saas provides the users a complete software application or the user interface to the application itself. The cloud service provider manages the underlying cloud infrastructure including servers, network, operating systems, storage and application software, and the user is unaware of the underlying architecture of the cloud. 41
  • 42. loT Enabling Technologies Big Data Analytics Big data is defined as collections of data sets whose volume, velocity (in terms of its temporal variation), or variety, is so large that it is difficult to store, manage, process and analyze the data using traditional databases and data processing tools. Examples: Sensor data generated by loT systems such as weather monitoring stations. Machine sensor data collected from sensors embedded in industrial and energy systems for monitoring their health and detecting failures. Health and fitness data generated by loT devices such as wearable fitness bands. Data generated by IoT systems for location and tracking of vehicles. Data generated by retail inventory monitoring systems. 42
  • 43. loT Enabling Technologies  Communication protocols form the backbone of loT systems and enable network connectivity and coupling to applications.  Communication protocols define the data exchange formats, data encoding, addressing schemes for devices and routing of packets from source to destination.  It also include sequence control, flow control and retransmission of lost packets. 43
  • 44. loT Enabling Technologies  An Embedded System is a computer system that has computer hardware and software embedded to perform specific tasks.  Key components of an embedded system include, microprocessor or microcontroller, memory (RAM, ROM, cache), networking units (Ethernet, WiFi adapters), input/output units (display, keyboard , etc.) and storage (such as flash memory).  Embedded system have special processors such as digital signal processors (DSPs), graphics processors and application specific processors.  Embedded systems run embedded operating systems such as real-time operating systems (RTOS).  Embedded systems based low-cost devices like digital watches, digital cameras, point of sale terminals, vending machines. 44
  • 45. loT Levels & Deployment Templates An IoT system components 1.Device: An IoT device allows identification, remote sensing, actuating and remote monitoring capabilities. 2.Resource: Resources are software components on the IoT device for accessing, processing, and storing sensor information , or controlling actuators connected to the device. Resources also include the software components that enable network access for the device. 3.Controller Service: Controller service is a native service that runs on the device and interacts with the web services. Controller service sends data from the device to the web service and receives commands from the application (via web services) for controlling the device. 4.Database: Database can be either local or in the cloud and stores the data generated by the IoT device. 45
  • 46. loT Levels & Deployment Templates An IoT system components 5.Web Service: Web services serve as a link between the IoT device, application , database and analysis components. Web service can be either implemented using HTTP and REST principles (REST service) or using WebSocket protocol (WebSocket service). A comparison of REST and WebSocket is provided below:  Stateless/Stateful: REST services are stateless in nature. Each request contains all the information needed to process it. Requests are independent of each other. WebSocket on the other hand is stateful in nature where the server maintains the state and is aware of all the open connections.  Uni-directional/Bi-diredional: REST services operate over HTTP and are uni-directional. Request is always sent by a client and the server responds to the requests. On the other hand, WebSocket is a bi- directional protocol and allows both client and server to send messages to each other.  Request-Response/Full Duplex: REST services follow a request-response communication model where the client sends requests and the server responds to the requests. WebSocket on the other hand allow full-duplex communication between the client and server, i.e., both client and server can send messages to each other independently. 46
  • 47. loT Levels & Deployment Templates An IoT system components Web Service:  TCP Connections: For REST services, each HTTP request involves setting up a new TCP connection. WebSocket on the other hand involves a single TCP connection over which the client and server communicate in a full-duplex mode.  Header Overhead: REST services operate over HTTP, and each request is independent of others. Thus each request carries HTTP headers which is an overhead. Due the overhead of HTTP headers, REST is not suitable for real-time applications. WebSocket on the other hand does not involve overhead of headers. After the initial handshake (that happens over HTTP), the client and server exchange messages with minimal frame information. Thus WebSocket is suitable for real-time applications.  Scalability: Scalability is easier in the case of REST services as requests are independent and no state information needs to be maintained by the server. Thus both horizontal (scaling-out) and vertical scaling (scaling-up) solutions are possible for REST services. For WebSockets, horizontal scaling can be cumbersome due to the stateful nature of the communication. Since the server maintains the state of a connection, vertical scaling is easier for WebSockets than horizontal scaling. 47
  • 48. loT Levels & Deployment Templates An IoT system components 6.Analysis Component: The Analysis Component is responsible for analyzing the loT data and generate results in a form which are easy for the user to understand. Analysis of loT data can be performed either locally or in the cloud. Analyzed results are stored in the local or cloud databases. 7.Application: loT applications provide an interface that the users can use to control and monitor various aspects of the IoT system. Applications also allow users to view the system status and view the processed data. 48
  • 49. IoT Level-1  It has a single node/device that performs sensing and/or actuation, stores data, performs analysis and hosts the application .  Level-I IoT systems are suitable for modeling low- cost and low-complexity solutions. 49
  • 50. IoT Level-1 50 Example: For home automation  The system consists of a single node.  The device used in this system interfaces with the lights and appliances using electronic relay switches.  The status information of each light or appliance is maintained in a local database. REST services deployed locally allow retrieving and updating the state of each light or appliance in the status database.  The controller service continuously monitors the state of each light or appliance and triggers the relay switches accordingly. Since the device is connected to the Internet, the application can be accessed remotely as well.
  • 51. IoT Level-2  It has a single node that performs sensing and/or actuation and local analysis .  Data is stored in the cloud and application is usually cloud-based.  Level-2 IoT systems are suitable for solutions where the data involved is big, however, the primary analysis requirement is not computationally intensive and can be done locally itself. 51
  • 52. IoT Level-2 52 Example: System for smart irrigation.  The system consists of a single node that monitors the soil moisture level and controls the irrigation system.  The device used in this system collects soil moisture data from sensors.  The controller service continuously monitors the moisture levels. If the moisture level drops below a threshold, the irrigation system is turned on.  A cloud-based REST web service is used for storing and retrieving moisture data which is stored in the cloud database.  A cloud-based application is used for visualizing the moisture levels over a period of time, which can help in making
  • 53. IoT Level-3  It has a single node.  Data is stored and analyzed in the cloud and application is cloud-based.  Level-3 IoT systems are suitable for solutions where the data involved is big and the analysis requirements are computationally intensive. 53
  • 54. IoT Level-3 54 Example: System for tracking package handling.  The system consists of a single node (for a package) that monitors the vibration levels for a package being shipped.  The controller service sends the sensor data to the cloud in real-time using a Web Socket service.  The data is stored in the cloud and also visualized using a cloud-based application.  The analysis components in the cloud can trigger alerts if the vibration levels become greater
  • 55. IoT Level-4  It has multiple nodes that perform local analysis. Data is stored cloud and application is cloud-based .  It contains local and cloud-based observer nodes which can subscribe to and receive information collected in the cloud from IoT devices.  Observer nodes can process information and use it for various applications, however, observer nodes do not perform any control functions.  Level-4 IoT systems are suitable for solutions where multiple nodes are required, the data involved is big and the analysis requirements are computationally intensive. 55
  • 56. IoT Level-4 56 Example: For noise monitoring  The system consists of multiple nodes placed in different locations for monitoring noise levels in an area.  The nodes in this example are equipped with sound sensors.  Nodes are independent of each other.  Each node runs its own controller service that sends the data to the cloud.  The data is stored in a cloud database.  The analysis of data collected from a number of node the
  • 57. IoT Level-5  It has multiple end nodes and one coordinator node.  The end nodes that perform sensing and/or actuation. Coordinator node collects data from the end nodes and sends to the cloud.  Data is stored and analyzed in the cloud and application is cloud-based.  Level-5 IoT systems are suitable for solutions based on wireless sensor networks, in which the data involved is big and the analysis requirements are computationally intensive. 57
  • 58. IoT Level-5 58 Example: For Forest fire detection.  The system consists of multiple nodes placed in different locations for monitoring temperature, humidity and carbon dioxide (C02) levels in a forest.  The coordinator node collects the data from the end nodes and acts as a gateway that provides Internet connectivity to the IoT system.  The controller service on the coordinator device sends the collected data to the cloud. The data is stored in a cloud database.  The analysis of data is done in the computing cloud to aggregate the data and make predictions.  A cloud-based application is used
  • 59. IoT Level-6  It has multiple independent end nodes that perform sensing and/or . actuation and send data to the cloud.  Data is stored in the cloud and application is cloud-based.  The analytics component analyzes the data and stores the results in the cloud database.  The results are visualized with the cloud-based application.  The centralized controller is aware of the status of all the end nodes and sends control commands to the nodes. 59
  • 60. IoT Level-6 60 Example: For weather Monitoring. • The system consists of multiple nodes placed in different locations for monitoring temperature, humidity and pressure in an area. • The end nodes are equipped with various sensors (such as temperature, pressure and humidity). The end nodes send the data to the cloud in real-time using a Web Socket service. • The data is stored in a cloud database. The analysis of data is done in the cloud to aggregate the data and make predictions. • A cloud-based application is used for visualizing the data.
  • 61. Summary Internet of Things (IoT) refers to Physical and virtual objects that have unique identities and are connected to the Internet. These are available for remote sensing, actuating and remote monitoring. It can be used to develop intelligent applications Like energy generation, logistics, industrial control, retail, agriculture,etc. loT allows different types of devices, appliances, users and machines to communicate and exchange data. The applications of Internet of Things (loT) span a wide range of domains including (but not limited to) homes, cities, environment, energy systems, retail , logistics, industry, agriculture and health. It allow remote sensing, actuating and remote monitoring capabilities. 61
  • 62. Summary  A level- I IoT system has a single node/device that performs sensing and/or actuation, stores data, performs analysis and hosts the application .  A level-2 IoT system has a single node that performs sensing and/or actuation and local analysis.  A level-3 loT system has a single node. Data is stored and analyzed in the cloud and application is cloud-based. 62
  • 63. Summary A level-4 IoT system has multiple nodes that perform local analysis. Data is stored in the cloud and application is cloud-based. A level-5 IoT system has multiple end nodes and one coordinator node. A level-6 loT system has multiple independent end nodes that perform sensing and/or actuation and send data to the cloud 63
  • 64. Reference 1. Internet of things by Arshdeep Bahga . 2. The Internet of Things in the Cloud: A Middleware Perspective by Honbo Zhou 64
  • 67. 67