SlideShare a Scribd company logo
UNIT 01
1.IOT
⇒The Internet of Things (IoT) describes the network of physical objects—“things”—that
are embedded with sensors, software, and other technologies for the purpose of
connecting and exchanging data with other devices and systems over the internet.
How IoT Works – 4 Main Components of IoT System
1)Sensors/Devices:
-Sensors are a key component that helps you to collect live data from the surrounding
environment
2)Connectivity:
-All the collected data is sent to cloud infrastructure . The sensors should be connected
to the cloud using various mediums of communication like mobile, bluetooth , wifi etc.
-The sensors/devices can be connected to the cloud through a variety of methods
including: cellular, satellite, WiFi, Bluetooth, low-power wide-area networks (LPWAN), or
connecting directly to the internet via ethernet.
3)Data Processing:
-Once the data is collected, and it gets to the cloud/storage, the software performs
processing on the gathered data.
-This process can be just checking the temp, reading on devices like AC or Heater.
4)User Interface:
-The info needs to be available to the end-user in some way which can be achieved by
triggering alarms or sending notifications .
-The user sometimes might need an interface which actively checks their IoT system.
Characteristics of IoT:
● Massively scalable and efficient
● IP-based addressing will no longer be suitable in the upcoming future.
● An abundance of physical objects is present that do not use IP, so IoT is made
possible.
● Devices typically consume less power. When not in use, they should be
automatically programmed to sleep.
● A device that is connected to another device right now may not be connected in
another instant of time.
● Intermittent connectivity – IoT devices aren’t always connected. In order to save
bandwidth and battery consumption, devices will be powered off periodically
when not in use. Otherwise, connections might turn unreliable and thus prove to
be inefficient.
Modern Applications:
-Smart Grids and energy saving
-Smart cities
-Smart homes/Home automation
-Healthcare
-Earthquake detection
-Radiation detection/hazardous gas detection
-Smartphone detection
-Water flow monitoring
-Traffic monitoring
-Wearables
-Smart door lock protection system
Advantages:
● It can assist in the smarter control of homes and cities via mobile phones. It
enhances security and offers personal protection.
● By automating activities, it saves us a lot of time.
● Information is easily accessible, even if we are far away from our actual location,
and it is updated frequently in real time.
● Personal assistance can be provided by IoT apps, which can alert you to your
regular plans.
Disadvantages:
● Hackers may gain access to the system and steal personal information. Since we
add so many devices to the internet, there is a risk that our information can be
misused.
● They rely heavily on the internet and are unable to function effectively without it.
● With the complexity of systems, there are many ways for them to fail.
● Deploying IoT devices is very costly and time-consuming.
What technologies have made IoT possible?
While the idea of IoT has been in existence for a long time, a collection of recent
advances in a number of different technologies has made it practical.
● Access to low-cost, low-power sensor technology. Affordable and reliable
sensors are making IoT technology possible for more manufacturers.
● Connectivity. A host of network protocols for the internet has made it easy to
connect sensors to the cloud and to other “things” for efficient data transfer.
● Cloud computing platforms. The increase in the availability of cloud
platforms enables both businesses and consumers to access the infrastructure
they need to scale up without actually having to manage it all.
● Machine learning and analytics. With advances in machine learning and
analytics, along with access to varied and vast amounts of data stored in the
cloud, businesses can gather insights faster and more easily. The emergence
of these allied technologies continues to push the boundaries of IoT and the
data produced by IoT also feeds these technologies.
● Conversational artificial intelligence (AI). Advances in neural networks
have brought natural-language processing (NLP) to IoT devices (such as
digital personal assistants Alexa, Cortana, and Siri) and made them appealing,
affordable, and viable for home use.
2.Sensors and Actuators
⇒
Sensors- Collects live data
Types of Sensors :
Analog Sensor : Continuous input requires ex.light sensors (LDRs), sound sensors,
pressure sensors, and analog temperature sensors.
Digital Sensor : Discrete Input (On,Off) ex.door sensor
Passive : Cannot independently sense the input (Accelerometer) ex.Photographic,
thermal, electric field sensing, chemical,IR sensor
Active : Independently sense the input ex. scanning electron microscopes, radar, GPS,
x-ray
Scalar : Magnitude ex. Smoke detector
Vector : Magnitude and Direction ex. Stick for blind people
Actuators - a machine component or system that moves or controls the mechanism or
the system.
Types of Actuators :
Pneumatic
Hydraulic
Electric
Thermal
Magnetic
3.Gateway
⇒ Gateway provides a bridge between different communication technologies which
means we can say that a Gateway acts as a medium to open up connection between
cloud and controller(sensors / devices) in Internet of Things (IoT).
Key functionalities of IoT Gateway :
● Establishing communication bridge
● Provides additional security.
● Performs data aggregation.
● Pre-processing and filtering of data.
● Provides local storage as a cache/ buffer.
● Data computing at edge level.
● Ability to manage the entire device.
● Adding more functional capability.
● Verifying protocols.
Working of IoT Gateway :
● Receives data from sensor network.
● Performs Pre processing, filtering and cleaning on unfiltered data.
● Transports into standard protocols for communication.
● Sends data to the cloud.
4.M2M Communication
⇒
-M2M systems use point-to-point communications between machines, sensors and
hardware over cellular or wired networks.
-Used for monitoring, control and data exchange
-Communication protocols are 6LOWPAN, XMPP etc.
-Each communication device is assigned a 48-bits IPV6 address.
M2M Architecture
1. M2M application
As the name suggests, the M2M application domain offers applications to use M2M
technology conveniently. Examples include server and end-user applications.
2. M2M network domain
The M2M network domain acts as a bridge between the M2M application domain and
the M2M device domain. It is made of two parts called the M2M core and M2M service
capabilities.
3. M2M device domain
The M2M device domain contains all the devices that can connect to the M2M network
easily. The device domain can also be called the M2M area network. The M2M device
domain includes devices that can connect directly over a network, devices that cannot
directly connect to a network and may perhaps require an M2M gateway and proprietary
devices.
features of M2M
● M2M consumes lower power as compared to its rival technologies.
● It acts as a network operator and provides packet-switched services
● It is capable of detecting events with the help of its monitoring abilities
● This allows for a delay in the transfer of data
● It allows for the specification to time to send and receive data
● It sends an alert call or wake up call to awaken devices when the device enters
an unknown premises
● This continuously receives and sends minimal amounts of data.
M2M VS IOT
Applications of M2M
-Manufacturing
-Healthcare Device Management
-Human Appliances
-Smart Utility Management
5.Data Management
● Data management is the process of taking the overall available data and refining
it down to important information.
● Different devices from different applications send large volumes and varieties of
information.
Data Center Management
-A data center is a facility which has multiple banks of computers, servers, large
memory systems, high speed network and internet connectivity.
-The center provides data security and protection using advanced tools, full data
backups along with data recovery, redundant data communication connections and full
system power as well as electricity supply backups.
6.Cloud Computing
⇒
● Cloud computing is the on-demand availability of computer system resources,
especially data storage and computing power, without direct active management
by the user.
● Delivery of computer services over the internet to offer faster innovation, flexible
resources, and economies of scale.
● It provides high level generalization of computation and storage models.
● It can be rapidly allocated and released with low management effort.
● It provides on-demand services that can be accessed from any place and at any
time.
Advantages
● Nearly zero cost for upfront infrastructure availability
● Real-Time infrastructure availability
● More efficient resource utilization
● Usage-Based costing
● Reduced time to market
● Data Security
● Unlimited Storage Capacity
Disadvantages
● Internet Connectivity : If you do not have good internet connectivity, you cannot
access this data.
● Limited Control : less control over the function and execution of services within a
cloud infrastructure.
Components of Cloud Computing
● Clients/end-users : The client infrastructure component is the part of the frontend
which provides a graphic user interface for the user to interact with the cloud.
● Services : Products and solutions
● Applications : Web apps, saas etc
● Platform : Database, Data-Storage-as-a-service
● Infrastructure : Virtualization , Iaas
The Role of Cloud Computing on the Internet of Things:
● Cloud computing works to improve the efficiency of daily tasks in conjunction with
the Internet of Things. Cloud computing is about providing a path for data to
reach its destination while the Internet of Things generates a huge amount of
data.
● The cloud is the only technology that can analyze, store, and access the IoT
depending on the deployment model. Because of the nature of on-demand
information, cloud computing with an Internet connection is available on any
device at any time
According to Amazon Web Services, there are four benefits of cloud computing:
● No need to pre-guess infrastructure capacity needs
● Saves money, because you only need to pay for those resources that you use,
the larger the scale, the more savings
● In a few minutes, platforms can be deployed around the world
● Flexibility and speed in providing resources to developers
● Thus, the role of cloud computing in IoT is to work together to store IoT data,
providing easy access when needed. It’s important to note that cloud computing
is an easy way to move large data packets across the Internet generated by the
IoT.
7.Identity Access Management
⇒IoT Device Identity Lifecycle Management is how internet-connected devices are
controlled and managed by receiving a unique digital identity. When an IoT device is
first manufactured and issued it receives a unique ID bound to a PKI certificate to keep
it secure.
IAM is a branch of cloud security that allows the legitimate person to retrieve legitimate
resources at the legitimate time for the legitimate reasons.
Features:
● Single access control Interface
● Increased security
● Access control over resource-level
8.Everything as a Service (XaaS) models
● SaaS
● PaaS
● Iaas
● DSaaS
a)SaaS : Software as a service
● Facility to execute service provider’s application at user’s end
● Applications are available as ‘services’
● Services can be accessed via different types of client devices.
● End-users do not possess the control of the cloud infrastructure.
● Example: Google apps, salesforce
benefits of SaaS
● Low setup and infrastructure costs
● Accessible from anywhere
● Scalability
● Industry leading service level agreements (SLAS) for uptime and performance
● Automatic, frequent updates
● Security at the highest level required by any customer
Limitations
● Centralized Control
● Switching Cost
● Limited Flexibility
● Data Security and Privacy
b)Paas: Platform as a service
● Facility for the consumer to execute consumer created or acquired applications
onto cloud infrastructure.
● Support for deployment of such applications
● The user does not control the cloud infrastructure
● User can control the deployed applications using given configurations
● Ex. Windows azure, Google app engine, AWS
Benefits of PaaS
● Faster time to market.
● Affordable access to a wider variety of resources.
● More freedom to experiment, with less risk.
● Easy, cost-effective scalability.
● greater flexibility for development teams.
● Lower costs overall.
Features of PaaS:
OS, Server-side scripting environment ,Database management system, Support,
Storage, Network access tools for design and development , Hosting
c)Iaas : Infrastructures as a service
● Provide access to networking features, computers and data storage space.
● User can deploy, execute and control any software
● On demand delivery of computing infrastructures
● Ex. DigitalOcean, Linode,Rackspace,Amazon Web Services (AWS)Cisco
Metacloud,Microsoft Azure,Google Compute Engine (GCE)
IaaS Provides
● Servers-Computers , machines
● Storage
● OS
● Network
Characteristics
● Scalability & elasticity
● Manageability & interoperability
● Availability & reliability
● Performance & optimization
● Accessibility & portability
c)DSaas : Data Storage as a service
● Is a service model where the data store or data warehouse is made available
through the internet on demand on rent to an enterprise
● Ex. Data storage performance of Tata Communication 10x, Apple and cisco
10.Explain the difference between the Services layer and the Network layer for IoT
architecture.
● Network Layer :
As the name suggests, it is the connecting layer between perception and
middleware layer. It gets data from the perception layer and passes data to the
middleware layer using networking technologies like 3G, 4G, UTMS, WiFI,
infrared, etc. This is also called communication layer because it is responsible for
communication between perception and middleware layer. All the transfer of data
is done securely keeping the obtained data confidential.
● Service Layer:
The application service layer lies at the top of the IoT-based healthcare
architecture. This layer caters to the design and management of applications to
provide remote healthcare services [14]. In this layer, the incoming information is
processed and analyzed to come up with optimal management strategies.
UNIT 02
1.Smart Object
A smart object is an object that enhances the interaction with other smart objects as
well as with people also. The world of IoT is the network of interconnected
heterogeneous objects (such as smart devices, smart objects, sensors, actuators,
RFID, embedded computers, etc.) uniquely addressable and based on standard
communication protocols.
In a day to day life, people have a lot of objects with internet or wireless or wired
connection. Such as:
● Smartphone
● Tablets
● TV computer
2.IEEE 802.15.4
⇒IEEE 802.15.4 is a low-cost, low-data-rate wireless access technology for devices
that are operated or work on batteries. This describes how low-rate wireless personal
area networks (LR-WPANs) function.
Properties
a)Standardization and alliances: It specifies low-data-rate PHY and MAC layer
requirements for wireless personal area networks (WPAN).
IEEE 802.15. Protocol Stacks include:
● ZigBee
● 6LoWPAN
● ZigBee IP
● Wireless HART
● Thread
b)Physical Layer: This standard enables a wide range of PHY options in ISM bands,
ranging from 2.4 GHz to sub-GHz frequencies.
c) MAC layer: The MAC layer provides links to the PHY channel by determining that
devices in the same region will share the assigned frequencies.
d)Topology: Mesh networks connect a large number of nodes. This enables nodes that
would otherwise be out of range to interact with each other to use intermediate nodes to
relay data.
e)Security: For data security, the IEEE 802.15.4 standard employs the Advanced
Encryption Standard (AES) with a 128-bit key length as the basic encryption technique.
3.6LOWPAN
● It is a technology that makes the individual nodes IP enabled.
● 6LoWPAN can interact with 802.15.4 devices and also other types of devices on
an IP Network. For example, Wi-Fi.
Features of 6LoWPAN:
● It is used with IEEE 802.15,.4 in the 2.4 GHz band.
● Outdoor range: ~200 m (maximum)
● Data rate: 200kbps (maximum)
● Maximum number of nodes: ~100
Advantages of 6LoWPAN:
● 6LoWPAN is a mesh network that is robust, scalable, and can heal on its own.
● It delivers low-cost and secure communication in IoT devices.
● It uses IPv6 protocol and so it can be directly routed to cloud platforms.
● It offers one-to-many and many-to-one routing.
● In the network, leaf nodes can be in sleep mode for a longer duration of time.
Disadvantages of 6LoWPAN:
● It is comparatively less secure than Zigbee.
● It has lesser immunity to interference than Wi-Fi and Bluetooth.
● Without the mesh topology, it supports a short range.
Applications of 6LoWPAN:
● It is a wireless sensor network.
● It is used in home-automation,
● It is used in smart agricultural techniques, and industrial monitoring.
4.TCP VS UDP
UNIT 03
1.Need for optimization in IP for iot
● An IP address, or Internet Protocol address, is a series of numbers that identifies
any device on a network. Computers use IP addresses to communicate with
each other both over the internet as well as on other networks.
● IoT applications are used to address many real-world issues – traffic congestion,
city services, economic development, citizen engagement, and public safety and
security. Smart cities often embed IoT sensors into the physical infrastructure,
such as streetlights, water meters and traffic signals.
2.Communication Protocols
a)MQTT:
-MQTT is the most commonly used messaging protocol for the Internet of Things (IoT).
MQTT stands for Message Queuing Telemetry Transport.
-It is an open source protocol used for connecting in M2M/IOT communication.
-The protocol is a set of rules that defines how IoT devices can publish and subscribe to
data over the Internet.
- MQTT is used for messaging and data exchange between IoT and industrial IoT
devices, such as embedded devices, sensors, industrial PLCs, etc.
- The sender (Publisher) and the receiver (Subscriber) communicate via Topics and are
decoupled from each other. The connection between them is handled by the MQTT
broker.
MQTT Broker:
-The MQTT broker filters all incoming messages and distributes them correctly to the
Subscribers.
Key benefits
-Light weight and efficient to minimize resources required for the client & network
bandwidth.
-Enables bidirectional communication between sensors and devices
b)COAP:
-COAP stands for constrained Application Protocols.
-is a specialized web transfer protocol for use with constrained nodes and constrained
networks.
-This protocol is designed for machine to machine applications such as smart energy
and building automation.
Features
● Web Protocol Used in M2M With Constrained Requirements
● Asynchronous Message Exchange
● Low Overhead
● Very Simple To Perform Syntactic Analysis
● (URI) Uniform Resource Identifier
● Proxy and Caching Capabilities
3.SCADA protocol
● A SCADA system feeds data to a graphical user interface or dashboard. That
data is then monitored by humans.
● IoT devices connected to the network are monitored.
● Collected data is generally stored in a cloud server.
● SCADA sensors detect small changes in the environment including temperature
and sound.
4.XMPP Protocol:
-XMPP is a short form for Extensible Messaging Presence Protocol. It’s protocol for
streaming XML elements over a network in order to exchange messages and presence
information in close to real time.
-This protocol is mostly used by instant messaging applications like WhatsApp.
Let’s dive into each character of word XMPP:
● X : It means eXtensible. XMPP is an open source project which can be
changed or extended according to the need.
● M : XMPP is designed for sending messages in real time. It has a very
efficient push mechanism compared to other protocols.
● P : It determines whether you are online/offline/busy. It indicates the state.
● P : XMPP is a protocol, that is, a set of standards that allow systems to
communicate with each other.
These are the basic requirements of any Instant Messenger which are fulfilled by
XMPP:
1. Send and receive messages with other users.
2. Check and share presence status
3. Manage subscriptions to and from other users.
4. Manage contact list
5. Block communications(receive message, sharing presence status, etc) to
specific users.
5. Brief on Zigbee technology:
-ZigBee is a Personal Area Network task group with low rate task group 4. It is a
technology of home networking. ZigBee is a technological standard created for
controlling and sensing the network. As we know that ZigBee is the Personal Area
network of task group 4 so it is based on IEEE 802.15.4 and is created by the Zigbee
Alliance.
-ZigBee is a standard that addresses the need for very low-cost implementation of Low
power devices with Low data rates for short-range wireless communications.
Types of ZigBee Devices:
● Zigbee Coordinator Device: It communicates with routers. This device is used for
connecting the devices.
● Zigbee Router: It is used for passing the data between devices.
● Zigbee End Device: It is the device that is going to be controlled.
General Characteristics of Zigbee Standard:
● Low Power Consumption
● Low Data Rate (20- 250 kbps)
● Short-Range (75-100 meters)
● Network Join Time (~ 30 msec)
● Support Small and Large Networks (up to 65000 devices (Theory); 240 devices
(Practically))
● Low Cost of Products and Cheap Implementation (Open Source Protocol)
● Extremely low duty cycle.
● 3 frequency bands with 27 channels.
Zigbee architecture is a combination of 6 layers.
1. Application Layer
2. Application Interface Layer
3. Security Layer
4. Network Layer
5. Medium Access Control Layer
6. Physical Layer
1. Physical layer: The lowest two layers i.e the physical and the MAC (Medium
Access Control) Layer are defined by the IEEE 802.15.4 specifications. The
Physical layer is closest to the hardware and directly controls and communicates
with the Zigbee radio. The physical layer translates the data packets in the
over-the-air bits for transmission and vice-versa during the reception.
2. Medium Access Control layer (MAC layer): The layer is responsible for the
interface between the physical and network layer. The MAC layer is also
responsible for providing PAN ID and also network discovery through beacon
requests.
3. Network layer: This layer acts as an interface between the MAC layer and the
application layer. It is responsible for mesh networking.
4. Application layer: The application layer in the Zigbee stack is the highest
protocol layer and it consists of the application support sub-layer and Zigbee
device object. It contains manufacturer-defined applications.
UNIT 04
1.Data Acquisition:
-A data acquisition system is a collection of software and hardware that allows us to
measure or control physical characteristics of something in the real world.
-Data acquisition means acquiring data from IoT or M2M devices.
-A complete data acquisition system consists of DAQ hardware, sensors and actuators,
signal conditioning hardware, and a computer running DAQ software.
Process of data acquisition:
Data acquisition system (DAS) is a computerized system that collects data from the real
world, converts it into the form of electrical signals and does required processing on it
for storage, and presentation on computers.
Transducers: They are converting physical quantities (such as temperature, pressure,
etc.) into electrical quantities, or measuring electrical quantities directly. They collect
data from the physical world.
Wired Communication Technology
● Wired communication refers to the transmission of data over a wire-based
communication technology.
● Wired communication can be serial asynchronous communication (e.g., UART)
or synchronous serial communication (e.g., SPI interface or parallel input, output,
input-output ports at the devices).
● Communication can be over a bus when a number of systems (chips, units,
integrated circuits or ports or interfacing circuits) connect through a common set
of interconnections.
● Bus refers to a number of systems connected through a common set of controls,
address and data signals such that the data signals are accepted by the device
at destination address only from a source at an instance.
2.Data Validation
Data acquired from the devices does not mean that the data is correct, meaningful or
consistent. Data consistency means within expected range data not corrected during
transmission. Therefore, data needs validation checks. Data validation software does
validation checks on the acquired data. The data validation network ensures that the
data generated by data sources in the IoT are trustworthy.
3.Data Store
A data store is a data repository of a set of objects which integrate into the store.
Features of data store are-
⦁Objects in a data store are modeled using classes which are defined by database
schemas.
⦁A data store is a general concept. It includes data repositories such as databases,
relational database, flat file, spreadsheet, mail server, web server, directory services,
VMware.
⦁A data store may be distributed over a multiple node. Apache Cassandra is an
example of a distributed data store.
⦁A data store may consist of multiple schemas or may consist of data in only one
scheme. e.g., of only one scheme data store is a relational database.
⦁A database is a repository of data which can be used for reporting, analytics, process,
Knowledge discovery, intelligence.
4.Unstructured Data Storage on cloud servers
● Unstructured data is essentially all data that doesn’t fall under the purview of
relational databases (RDBMS).
● Unstructured data is not structured via predefined data schema or models.
However, it has an internal structure – it can be textual or non-textual, or human-
or machine-generated, and can be stored within non-relational databases like
NoSQL.
● Examples of unstructured data include text files, email, mobile data, social
media, satellite imagery, sensor or surveillance data, communications such as
chats, etc.
Cloud Storage of Unstructured Data
● unstructured data can include pretty much all kinds of information. The file sizes
can range from anything to a few bits and bytes to gigabytes or more. Hence,
there is no one-size-fits-all approach in terms of data storage. The type of
storage where the data sits depends on the capacity as well as the set
input/output (I/O) requirements. So, anything from low I/O performance (NAS,
cloud instance, object storage) to high-performing, massive files (distributed file,
object storage).
● Network-attached storage (NAS) used to be associated with single file, siloed
storage of data. Not anymore. These days, scale-out NAS is able to manage
high-performance, high-capacity storage of the data. But again, object storage
has also grown over the years and leads in unstructured data storage. Object
storage comes with many advantages, such as having unique IDs for the stored
data, being high-performance, highly scalable, and easily accessed with APIs. It
is no surprise that most cloud providers opt for object storage.
● Cloud providers offer high-performance, scalable storage services to customers,
and there is a high demand for these flexible services. Some of them come in
subscription-based systems or open source, reducing the overall financial burden
to enterprises and organizations.
5.Authorization and authentication of iot connected devices
● IoT authentication is a model for building trust in the identity of IoT machines and
devices to protect data and control access when information travels via an
unsecured network such as the Internet.
● Strong IoT authentication is needed so that connected IoT devices and machines
can be trusted to protect against control commands from unauthorized users or
devices.
There are several methods by which we can achieve strong authentication to secure IoT
device communications:
● One-way authentication: in the case where two parties wish to communicate
with each other, only one party will authenticate itself to the other, while the other
party will not be authenticated.
● Two-way authentication: is also referred to as mutual authentication, in which
both entities authenticate each other.
● Three-way authentication: is where the central authority authenticates the two
parties and helps them to authenticate each other.
● Distributed: using a distributed straight authentication method between the
parties to the communication.
● Centralized: using a centralized server or a trusted third party to distribute and
manage the authentication certificates used.
Authorization : The authorization process is the tool used to validate the identity of
each endpoint in the IoT system. The certification process is configured upon enrollment
entry and informs the service provider of the method to be used when checking the
system’s identity during registration.
6.Xively
⦁Xively is an Internet of Things platform owned by Google. It is a platform for data
capture in real-time over the internet.
⦁Xively offers product companies a way to connect products, manage connected
devices and the data they produce, and integrate that data into other systems.
⦁It also provides APIs to connect and develop IoT applications.
⦁Xively is an open-source platform for Arduino which is an open-source prototyping
platform that provides connectivity with web deploying internet.
⦁Xively is a commercial PAAS for the IoT/M2M.
Xively PaaS services offers the following features:
● It enables services, a business services platform which connects the products,
including collaboration products, Rescue, Boldchat, join.me, and operations to the
Internet.
● Data collection in real-time over the Internet.
● Data visualization for data of connected sensors to IoT devices.
● Graphical plots of collected data.
● It generates alerts.
● Access to historical data.
●It supports Java, Python and Ruby, and Android platform.
● It supports REST.
How xively works:
⦁Programmers or Developers have to register with Xively to use cloud services.
⦁After registration and account creation, developers can create different devices for
which they have to create an IoT app. It can be easily done using the templates
provided in the Web Interface of Xively.
⦁Each connected device is allocated a unique FEED_ID. It specifies the data stream
and metadata of the connected device.
⦁Once this is done permissions on the IoT devices are assigned using the available
APIs. The available permissions are Create, Update, Delete and Read.
⦁One or more bidirectional channels are created after we connect a device with Xively.
Each channel is unique to the device connected.
⦁Xively cloud is connected with the help of these channels.
⦁Xively APIs are used by IoT devices to create communication enabled products.
7.Non-repudiation in IoT
⇒ Non-repudiation is the assurance that someone cannot deny the validity of
something. Non-repudiation is a legal concept that is widely used in information security
and refers to a service, which provides proof of the origin of data and the integrity of the
data.
8.IoT security Model
9.challenges in IoT :
a)Security challenges
Lack of encryption –
Although encryption is a great way to prevent hackers from accessing data, it is also
one of the leading IoT security challenges.
These drives like the storage and processing capabilities that would be found on a
traditional computer.
The result is an increase in attacks where hackers can easily manipulate the algorithms
that were designed for protection.
Insufficient testing and updating –
With the increase in the number of IoT(internet of things) devices, IoT manufacturers
are more eager to produce and deliver their device as fast as they can without giving
security too much of.
Most of these devices and IoT products do not get enough testing and updates and are
prone to hackers and other security issues.
Brute forcing and the risk of default passwords –
Weak credentials and login details leave nearly all IoT devices vulnerable to password
hacking and brute force.
Any company that uses factory default credentials on their devices is placing both their
business and its assets and the customer and their valuable information at risk of being
susceptible to a brute force attack.
IoT Malware and ransomware –
Increases with increase in devices.
Ransomware uses encryption to effectively lock out users from various devices and
platforms and still use a user’s valuable data and info.
Example –
A hacker can hijack a computer camera and take pictures.
By using malware access points, the hackers can demand ransom to unlock the device
and return the data.
b)Design challenge in IoT :
Battery life is a limitation –
Issues in packaging and integration of small-sized chips with low weight and less power
consumption. If you’ve been following the mobile space, you’ve likely seen how every
year it looks like there’s no restriction in terms of display screen size. Take the upward
thrust of ‘phablets’, for instance, which can be telephones nearly as huge as tablets.
Although helpful, the bigger monitors aren’t always only for convenience, rather,
instead, display screen sizes are growing to accommodate larger batteries. Computers
have been getting slimmer, but battery energy stays the same.
Increased cost and time to market –
Embedded systems are lightly constrained by cost.
The need originates to drive better approaches when designing the IoT devices in order
to handle the cost modeling or cost optimally with digital electronic components.
Designers also need to solve the design time problem and bring the embedded device
at the right time to the market.
Security of the system –
Systems have to be designed and implemented to be robust and reliable and have to be
secure with cryptographic algorithms and security procedures.
It involves different approaches to secure all the components of embedded systems
from prototype to deployment.
c)Deployment challenges in IoT :
Connectivity –
It is the foremost concern while connecting devices, applications and cloud platforms.
Connected devices that provide useful front and information are extremely valuable. But
poor connectivity becomes a challenge where IoT sensors are required to monitor
process data and supply information.
Cross platform capability –
IoT applications must be developed, keeping in mind the technological changes of the
future.
Its development requires a balance of hardware and software functions.
It is a challenge for IoT application developers to ensure that the device and IoT
platform drives the best performance despite heavy device rates and fixings.
Data collection and processing –
In IoT development, data plays an important role. What is more critical here is the
processing or usefulness of stored data.
Along with security and privacy, development teams need to ensure that they plan well
for the way data is collected, stored or processed within an environment.
Lack of skill set –
All of the development challenges above can only be handled if there is a proper skilled
resource working on the IoT application development.
The right talent will always get you past the major challenges and will be an important
IoT application development asset.
UNIT 05
1.Raspberry Pi
a)Operating System
● Raspberry pi is a low cost computer which is of credit card size and is used to
plug into a computer monitor. It has its mouse and keyboard.
● Through raspberry pi people can learn different programming languages like
Scratch and Python.
● It has all the features of desktop computers like internet surfing, processing word,
playing videos as well as playing games too.
● It is used by many kids to learn different programming languages. The raspberry
pi has become the truly Linux device of the year.
Advantages:
● Raspberry Pi is a power saver. It uses a very minimum amount of electricity to
operate.
● Raspberry Pi does not rely on pen drives or any hard disk to save and store its
work rather than using an SD card for storage as it is quite convenient to use and
it's fast.
● The Raspberry pi is very convenient to use because of its size; which is quite
manageable that it can be easily held in hand. Due to this factor it can be
integrated into devices also.
● The Raspberry Pi can be extended and used. It has a capability to add up
devices to itself and run. Several devices are available in the market at a very
affordable price. The devices can be connected to the Pi model with the help of a
USB port present in it.
● The Pi model can be used for making video players because it has an HDMI
display port. It supports high definition display and other functions of computers.
● The raspberry model is quite affordable as compared to other similar alternatives.
It offers the same specifications and quality at a lower price as compared to
others.
Drawbacks of the Pi
● The model cannot run the X86 operating system because of its hardware
specifications. In other terms unlike Windows it cannot run a 32bit operating
system on itself which is kind of set - back for itself.
● The Pi model is unable to add extra RAM in itself which is quite disappointing at
times.
● One of the disadvantages of Raspberry Pi is that it does not come with a case
due to which it's sometimes risky to handle because it's just a mother-board and
it can be damaged if misplaced.
● It has an issue while booting. You always need a SD card connected while
booting so if in any case we want to integrate the Pi model we need to keep this
in mind that the card will anyhow stick out.
● If in any case any issue occurs in the model it can be restarted and booted all
over again but we cannot completely rely on this point because it can be risky at
times.
● Last limitation is that the dimension of the model increases because the power
supply is provided with the help of a USB cable which adds on to its size.
b)Configuration
You can control most of your Raspberry Pi’s settings, such as the password, through the
Raspberry Pi Configuration application found in Preferences on the menu.
pi configuration menu
● System
○ Password — set the password of the pi user (it is a good idea to change
the password from the factory default ‘raspberry’)
○ Boot — select to show the Desktop or CLI (command line interface) when
your Raspberry Pi starts
○ Auto Login — enabling this option will make the Raspberry Pi
automatically log in whenever it starts
○ Network at Boot — selecting this option will cause your Raspberry Pi to
wait until a network connection is available before starting
● Interfaces
○ Camera — enable the Raspberry Pi Camera Module
○ SPI — enable the SPI GPIO pins
○ I2C — enable the I2C GPIO pins
○ Remote GPIO — allow access to your Raspberry Pi’s GPIO pins from
another computer.
● Performance
○ Overclock — change the CPU speed and voltage to increase performance
○ GPU Memory — change the allocation of memory given to the GPU
● Localisation
○ Locale — set the language, country, and character set used by your
Raspberry Pi
○ Timezone — set the time zone
○ Keyboard — change your keyboard layout
○ WiFi Country — set the WiFi country code
2.Iot strategies for smarter cities
⇒ The strategic components of area-based development in the Smart Cities Mission
are :
● city improvement (retrofitting)
● city renewal (redevelopment)
● city extension (greenfield development) plus a Pan-city initiative in which Smart
Solutions are applied covering larger parts of the city.
● It starts with having a realistic plan
● Smart cities require extensive experimentation
● A smart city vision should energize the private sector
● Smart cities demand smart data
● Get creative when rethinking transportation
● Don’t downplay digital security
● Smart city initiatives should complement low-tech initiatives
Applications:
1. Traffic Management
It is important to control the traffic in cities otherwise there are huge traffic jams in
popular places and totally empty streets otherwise. This also depends on the design
and layout of the roads but it can be managed by having smart traffic lights.
2. Air Pollution
Air pollution is a major problem in many metropolitan cities where the particulate matter
in the air is so high it is damaging to the lungs in the long run. But IoT along with
machine learning can be used to reduce air pollution. This is possible by collecting data
related to city pollution like emissions from vehicles, pollen levels, airflow direction,
weather, traffic levels, etc using IoT from various sources and then calculating pollution
forecasts to see the trends in pollution so they can be controlled.
3. Healthcare
Healthcare is an extremely important aspect of life, especially in current times when
non-communicable diseases like heart problems and cancer are increasing in big cities
while there are still a lot of deaths from infectious diseases in poorer places.
4. Public Transport
Public transport, whether it be buses or trains, are at the heart of any city. This is
especially true in big cities where there are big traffic jams and the metro train can be a
lifesaver! However, smart public transport can streamline traffic and also make
commuters’ life much easier.
5. Water Management
There is no life without water! But water is also a finite resource which is reducing at an
alarming rate. Therefore, using smart water management techniques in cities so that
water can be conserved for future generations is a good idea.
6.Buildings
Cities are obviously incomplete without buildings and larger cities have a lot of
skyscrapers as well. Now the challenge is to build smart buildings using IoT where all
the functionalities like lighting, air conditioners, heating, security, etc. can be connected
and controlled from a single source.
7. Waste Management
Waste management systems in a city can be optimized so that there is efficient waste
collection and disposal which helps in keeping the city clean and hygienic.
8. Parking
Less available space means that drivers have to waste their time finding parking spaces
and increase road traffic in this process This issue can be solved by using IoT
connected sensors around the city that point out the empty parking spaces around
wherever your destination is.
9. Natural Disaster Management
It is not possible to prevent natural disasters like hurricanes, earthquakes, tsunamis,
etc. but it is entirely possible to anticipate these disasters before they occur and then
manage them effectively.
10. Infrastructure
The infrastructure of a city i.e. its roads, buildings, etc are essentially what form the city.
And smart infrastructure is a very important part of creating a smart city.
Conclusion
These are only some of the applications of IoT in creating smart cities. There are many
more options that can be explored to make cities a better option for more than 70% of
the world’s population in the future. Many of these applications are already used in the
big metropolitan cities around the world, however, there are many barriers to creating
truly smart cities. Some of these may be bureaucracy or the fact that it takes time to
integrate the existing systems with new technology. Whatever the reason, there is no
doubt that the future is smart!

More Related Content

What's hot

Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdfUnit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
Jayanthi Kannan MK
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
Maathu Michael
 
Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On Approach
Arshdeep Bahga
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
sreelekha appakondappagari
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
pavan penugonda
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
Pradeep Kumar TS
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
Sagar Rai
 
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Selvaraj Seerangan
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
Ankur Kumar
 
Iot
IotIot
Chapter 7
Chapter 7Chapter 7
Chapter 7
pavan penugonda
 
Unit 4
Unit 4Unit 4
Intro to wireless sensor network
Intro to wireless sensor networkIntro to wireless sensor network
Intro to wireless sensor network
Vrince Vimal
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
PeriyanayagiS
 
6 g tecnology
6 g tecnology6 g tecnology
6 g tecnology
selvalakshmi24
 
Internet of Things - module 1
Internet of Things -  module 1Internet of Things -  module 1
Internet of Things - module 1
Syed Mustafa
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
Mateen Shahid
 

What's hot (20)

Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdfUnit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
 
Introduction to IOT
Introduction to IOTIntroduction to IOT
Introduction to IOT
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On Approach
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
Iot
IotIot
Iot
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Unit 4
Unit 4Unit 4
Unit 4
 
Intro to wireless sensor network
Intro to wireless sensor networkIntro to wireless sensor network
Intro to wireless sensor network
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
6 g tecnology
6 g tecnology6 g tecnology
6 g tecnology
 
Internet of Things - module 1
Internet of Things -  module 1Internet of Things -  module 1
Internet of Things - module 1
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 

Similar to IoT Notes Syllabus .pdf

Internet of things
Internet of thingsInternet of things
Internet of things
Selvaraj Kesavan
 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
Pratik Gohel
 
Internet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationInternet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M Communication
Sherin C Abraham
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
ezzAyman1
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
Mohamed Abdulfattah Gaber
 
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptxCHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
Fame22
 
Shubham hatzade
Shubham hatzadeShubham hatzade
Shubham hatzade
ShubhamHatzade3
 
123456.pptx
123456.pptx123456.pptx
123456.pptx
divyabrahma1
 
iotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdfiotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdf
rinabiswas456788oooo
 
Iot architecture
Iot architectureIot architecture
Iot architecture
Anam Iqbal
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
arjun431527
 
IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptx
ImpanaR2
 
III CSE IoT Unit - I.pptx
III CSE IoT Unit - I.pptxIII CSE IoT Unit - I.pptx
III CSE IoT Unit - I.pptx
AvinashAvuthu2
 
IOT Presentation new (2).pptx
IOT Presentation new (2).pptxIOT Presentation new (2).pptx
IOT Presentation new (2).pptx
MdMahfoozAlam5
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
IRJET Journal
 
IoT Presentation.pptx
IoT Presentation.pptxIoT Presentation.pptx
IoT Presentation.pptx
TejashreeNawale2
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)
Mayank Vijh
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
Bharat Tank
 
An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System
Saptarshi Nag
 
unit-3.pptx
unit-3.pptxunit-3.pptx
unit-3.pptx
VigneshRavi83
 

Similar to IoT Notes Syllabus .pdf (20)

Internet of things
Internet of thingsInternet of things
Internet of things
 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
 
Internet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationInternet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M Communication
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptxCHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
 
Shubham hatzade
Shubham hatzadeShubham hatzade
Shubham hatzade
 
123456.pptx
123456.pptx123456.pptx
123456.pptx
 
iotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdfiotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdf
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptx
 
III CSE IoT Unit - I.pptx
III CSE IoT Unit - I.pptxIII CSE IoT Unit - I.pptx
III CSE IoT Unit - I.pptx
 
IOT Presentation new (2).pptx
IOT Presentation new (2).pptxIOT Presentation new (2).pptx
IOT Presentation new (2).pptx
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
 
IoT Presentation.pptx
IoT Presentation.pptxIoT Presentation.pptx
IoT Presentation.pptx
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
 
An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System
 
unit-3.pptx
unit-3.pptxunit-3.pptx
unit-3.pptx
 

Recently uploaded

Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 

Recently uploaded (20)

Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 

IoT Notes Syllabus .pdf

  • 1. UNIT 01 1.IOT ⇒The Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. How IoT Works – 4 Main Components of IoT System 1)Sensors/Devices: -Sensors are a key component that helps you to collect live data from the surrounding environment 2)Connectivity: -All the collected data is sent to cloud infrastructure . The sensors should be connected to the cloud using various mediums of communication like mobile, bluetooth , wifi etc. -The sensors/devices can be connected to the cloud through a variety of methods including: cellular, satellite, WiFi, Bluetooth, low-power wide-area networks (LPWAN), or connecting directly to the internet via ethernet. 3)Data Processing: -Once the data is collected, and it gets to the cloud/storage, the software performs processing on the gathered data. -This process can be just checking the temp, reading on devices like AC or Heater. 4)User Interface: -The info needs to be available to the end-user in some way which can be achieved by triggering alarms or sending notifications . -The user sometimes might need an interface which actively checks their IoT system.
  • 2. Characteristics of IoT: ● Massively scalable and efficient ● IP-based addressing will no longer be suitable in the upcoming future. ● An abundance of physical objects is present that do not use IP, so IoT is made possible. ● Devices typically consume less power. When not in use, they should be automatically programmed to sleep. ● A device that is connected to another device right now may not be connected in another instant of time. ● Intermittent connectivity – IoT devices aren’t always connected. In order to save bandwidth and battery consumption, devices will be powered off periodically when not in use. Otherwise, connections might turn unreliable and thus prove to be inefficient. Modern Applications: -Smart Grids and energy saving -Smart cities -Smart homes/Home automation -Healthcare -Earthquake detection -Radiation detection/hazardous gas detection
  • 3. -Smartphone detection -Water flow monitoring -Traffic monitoring -Wearables -Smart door lock protection system Advantages: ● It can assist in the smarter control of homes and cities via mobile phones. It enhances security and offers personal protection. ● By automating activities, it saves us a lot of time. ● Information is easily accessible, even if we are far away from our actual location, and it is updated frequently in real time. ● Personal assistance can be provided by IoT apps, which can alert you to your regular plans. Disadvantages: ● Hackers may gain access to the system and steal personal information. Since we add so many devices to the internet, there is a risk that our information can be misused. ● They rely heavily on the internet and are unable to function effectively without it. ● With the complexity of systems, there are many ways for them to fail. ● Deploying IoT devices is very costly and time-consuming. What technologies have made IoT possible? While the idea of IoT has been in existence for a long time, a collection of recent advances in a number of different technologies has made it practical. ● Access to low-cost, low-power sensor technology. Affordable and reliable sensors are making IoT technology possible for more manufacturers. ● Connectivity. A host of network protocols for the internet has made it easy to connect sensors to the cloud and to other “things” for efficient data transfer. ● Cloud computing platforms. The increase in the availability of cloud platforms enables both businesses and consumers to access the infrastructure they need to scale up without actually having to manage it all. ● Machine learning and analytics. With advances in machine learning and analytics, along with access to varied and vast amounts of data stored in the cloud, businesses can gather insights faster and more easily. The emergence
  • 4. of these allied technologies continues to push the boundaries of IoT and the data produced by IoT also feeds these technologies. ● Conversational artificial intelligence (AI). Advances in neural networks have brought natural-language processing (NLP) to IoT devices (such as digital personal assistants Alexa, Cortana, and Siri) and made them appealing, affordable, and viable for home use. 2.Sensors and Actuators ⇒ Sensors- Collects live data Types of Sensors : Analog Sensor : Continuous input requires ex.light sensors (LDRs), sound sensors, pressure sensors, and analog temperature sensors. Digital Sensor : Discrete Input (On,Off) ex.door sensor Passive : Cannot independently sense the input (Accelerometer) ex.Photographic, thermal, electric field sensing, chemical,IR sensor Active : Independently sense the input ex. scanning electron microscopes, radar, GPS, x-ray Scalar : Magnitude ex. Smoke detector Vector : Magnitude and Direction ex. Stick for blind people Actuators - a machine component or system that moves or controls the mechanism or the system. Types of Actuators : Pneumatic Hydraulic Electric Thermal Magnetic 3.Gateway
  • 5. ⇒ Gateway provides a bridge between different communication technologies which means we can say that a Gateway acts as a medium to open up connection between cloud and controller(sensors / devices) in Internet of Things (IoT). Key functionalities of IoT Gateway : ● Establishing communication bridge ● Provides additional security. ● Performs data aggregation. ● Pre-processing and filtering of data. ● Provides local storage as a cache/ buffer. ● Data computing at edge level. ● Ability to manage the entire device. ● Adding more functional capability. ● Verifying protocols. Working of IoT Gateway : ● Receives data from sensor network. ● Performs Pre processing, filtering and cleaning on unfiltered data. ● Transports into standard protocols for communication. ● Sends data to the cloud. 4.M2M Communication ⇒ -M2M systems use point-to-point communications between machines, sensors and hardware over cellular or wired networks. -Used for monitoring, control and data exchange -Communication protocols are 6LOWPAN, XMPP etc. -Each communication device is assigned a 48-bits IPV6 address. M2M Architecture 1. M2M application As the name suggests, the M2M application domain offers applications to use M2M technology conveniently. Examples include server and end-user applications. 2. M2M network domain
  • 6. The M2M network domain acts as a bridge between the M2M application domain and the M2M device domain. It is made of two parts called the M2M core and M2M service capabilities. 3. M2M device domain The M2M device domain contains all the devices that can connect to the M2M network easily. The device domain can also be called the M2M area network. The M2M device domain includes devices that can connect directly over a network, devices that cannot directly connect to a network and may perhaps require an M2M gateway and proprietary devices. features of M2M ● M2M consumes lower power as compared to its rival technologies. ● It acts as a network operator and provides packet-switched services ● It is capable of detecting events with the help of its monitoring abilities ● This allows for a delay in the transfer of data ● It allows for the specification to time to send and receive data ● It sends an alert call or wake up call to awaken devices when the device enters an unknown premises ● This continuously receives and sends minimal amounts of data. M2M VS IOT
  • 8. -Manufacturing -Healthcare Device Management -Human Appliances -Smart Utility Management 5.Data Management ● Data management is the process of taking the overall available data and refining it down to important information. ● Different devices from different applications send large volumes and varieties of information. Data Center Management -A data center is a facility which has multiple banks of computers, servers, large memory systems, high speed network and internet connectivity.
  • 9. -The center provides data security and protection using advanced tools, full data backups along with data recovery, redundant data communication connections and full system power as well as electricity supply backups. 6.Cloud Computing ⇒ ● Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. ● Delivery of computer services over the internet to offer faster innovation, flexible resources, and economies of scale. ● It provides high level generalization of computation and storage models. ● It can be rapidly allocated and released with low management effort. ● It provides on-demand services that can be accessed from any place and at any time. Advantages ● Nearly zero cost for upfront infrastructure availability ● Real-Time infrastructure availability ● More efficient resource utilization ● Usage-Based costing ● Reduced time to market ● Data Security ● Unlimited Storage Capacity Disadvantages ● Internet Connectivity : If you do not have good internet connectivity, you cannot access this data. ● Limited Control : less control over the function and execution of services within a cloud infrastructure. Components of Cloud Computing ● Clients/end-users : The client infrastructure component is the part of the frontend which provides a graphic user interface for the user to interact with the cloud. ● Services : Products and solutions ● Applications : Web apps, saas etc ● Platform : Database, Data-Storage-as-a-service ● Infrastructure : Virtualization , Iaas The Role of Cloud Computing on the Internet of Things:
  • 10. ● Cloud computing works to improve the efficiency of daily tasks in conjunction with the Internet of Things. Cloud computing is about providing a path for data to reach its destination while the Internet of Things generates a huge amount of data. ● The cloud is the only technology that can analyze, store, and access the IoT depending on the deployment model. Because of the nature of on-demand information, cloud computing with an Internet connection is available on any device at any time According to Amazon Web Services, there are four benefits of cloud computing: ● No need to pre-guess infrastructure capacity needs ● Saves money, because you only need to pay for those resources that you use, the larger the scale, the more savings ● In a few minutes, platforms can be deployed around the world ● Flexibility and speed in providing resources to developers ● Thus, the role of cloud computing in IoT is to work together to store IoT data, providing easy access when needed. It’s important to note that cloud computing is an easy way to move large data packets across the Internet generated by the IoT. 7.Identity Access Management ⇒IoT Device Identity Lifecycle Management is how internet-connected devices are controlled and managed by receiving a unique digital identity. When an IoT device is first manufactured and issued it receives a unique ID bound to a PKI certificate to keep it secure. IAM is a branch of cloud security that allows the legitimate person to retrieve legitimate resources at the legitimate time for the legitimate reasons. Features: ● Single access control Interface ● Increased security ● Access control over resource-level 8.Everything as a Service (XaaS) models ● SaaS ● PaaS ● Iaas
  • 11. ● DSaaS a)SaaS : Software as a service ● Facility to execute service provider’s application at user’s end ● Applications are available as ‘services’ ● Services can be accessed via different types of client devices. ● End-users do not possess the control of the cloud infrastructure. ● Example: Google apps, salesforce benefits of SaaS ● Low setup and infrastructure costs ● Accessible from anywhere ● Scalability ● Industry leading service level agreements (SLAS) for uptime and performance ● Automatic, frequent updates ● Security at the highest level required by any customer Limitations ● Centralized Control ● Switching Cost ● Limited Flexibility ● Data Security and Privacy b)Paas: Platform as a service ● Facility for the consumer to execute consumer created or acquired applications onto cloud infrastructure. ● Support for deployment of such applications ● The user does not control the cloud infrastructure ● User can control the deployed applications using given configurations ● Ex. Windows azure, Google app engine, AWS Benefits of PaaS ● Faster time to market. ● Affordable access to a wider variety of resources. ● More freedom to experiment, with less risk. ● Easy, cost-effective scalability. ● greater flexibility for development teams. ● Lower costs overall.
  • 12. Features of PaaS: OS, Server-side scripting environment ,Database management system, Support, Storage, Network access tools for design and development , Hosting c)Iaas : Infrastructures as a service ● Provide access to networking features, computers and data storage space. ● User can deploy, execute and control any software ● On demand delivery of computing infrastructures ● Ex. DigitalOcean, Linode,Rackspace,Amazon Web Services (AWS)Cisco Metacloud,Microsoft Azure,Google Compute Engine (GCE) IaaS Provides ● Servers-Computers , machines ● Storage ● OS ● Network Characteristics ● Scalability & elasticity ● Manageability & interoperability ● Availability & reliability ● Performance & optimization ● Accessibility & portability c)DSaas : Data Storage as a service ● Is a service model where the data store or data warehouse is made available through the internet on demand on rent to an enterprise ● Ex. Data storage performance of Tata Communication 10x, Apple and cisco 10.Explain the difference between the Services layer and the Network layer for IoT architecture. ● Network Layer : As the name suggests, it is the connecting layer between perception and middleware layer. It gets data from the perception layer and passes data to the middleware layer using networking technologies like 3G, 4G, UTMS, WiFI, infrared, etc. This is also called communication layer because it is responsible for communication between perception and middleware layer. All the transfer of data is done securely keeping the obtained data confidential.
  • 13. ● Service Layer: The application service layer lies at the top of the IoT-based healthcare architecture. This layer caters to the design and management of applications to provide remote healthcare services [14]. In this layer, the incoming information is processed and analyzed to come up with optimal management strategies. UNIT 02 1.Smart Object
  • 14. A smart object is an object that enhances the interaction with other smart objects as well as with people also. The world of IoT is the network of interconnected heterogeneous objects (such as smart devices, smart objects, sensors, actuators, RFID, embedded computers, etc.) uniquely addressable and based on standard communication protocols. In a day to day life, people have a lot of objects with internet or wireless or wired connection. Such as: ● Smartphone ● Tablets ● TV computer 2.IEEE 802.15.4 ⇒IEEE 802.15.4 is a low-cost, low-data-rate wireless access technology for devices that are operated or work on batteries. This describes how low-rate wireless personal area networks (LR-WPANs) function. Properties a)Standardization and alliances: It specifies low-data-rate PHY and MAC layer requirements for wireless personal area networks (WPAN). IEEE 802.15. Protocol Stacks include: ● ZigBee
  • 15. ● 6LoWPAN ● ZigBee IP ● Wireless HART ● Thread b)Physical Layer: This standard enables a wide range of PHY options in ISM bands, ranging from 2.4 GHz to sub-GHz frequencies. c) MAC layer: The MAC layer provides links to the PHY channel by determining that devices in the same region will share the assigned frequencies. d)Topology: Mesh networks connect a large number of nodes. This enables nodes that would otherwise be out of range to interact with each other to use intermediate nodes to relay data. e)Security: For data security, the IEEE 802.15.4 standard employs the Advanced Encryption Standard (AES) with a 128-bit key length as the basic encryption technique. 3.6LOWPAN ● It is a technology that makes the individual nodes IP enabled. ● 6LoWPAN can interact with 802.15.4 devices and also other types of devices on an IP Network. For example, Wi-Fi. Features of 6LoWPAN: ● It is used with IEEE 802.15,.4 in the 2.4 GHz band. ● Outdoor range: ~200 m (maximum) ● Data rate: 200kbps (maximum) ● Maximum number of nodes: ~100 Advantages of 6LoWPAN: ● 6LoWPAN is a mesh network that is robust, scalable, and can heal on its own. ● It delivers low-cost and secure communication in IoT devices. ● It uses IPv6 protocol and so it can be directly routed to cloud platforms. ● It offers one-to-many and many-to-one routing. ● In the network, leaf nodes can be in sleep mode for a longer duration of time. Disadvantages of 6LoWPAN: ● It is comparatively less secure than Zigbee. ● It has lesser immunity to interference than Wi-Fi and Bluetooth. ● Without the mesh topology, it supports a short range. Applications of 6LoWPAN: ● It is a wireless sensor network. ● It is used in home-automation,
  • 16. ● It is used in smart agricultural techniques, and industrial monitoring. 4.TCP VS UDP UNIT 03 1.Need for optimization in IP for iot ● An IP address, or Internet Protocol address, is a series of numbers that identifies any device on a network. Computers use IP addresses to communicate with each other both over the internet as well as on other networks. ● IoT applications are used to address many real-world issues – traffic congestion, city services, economic development, citizen engagement, and public safety and security. Smart cities often embed IoT sensors into the physical infrastructure, such as streetlights, water meters and traffic signals.
  • 17. 2.Communication Protocols a)MQTT: -MQTT is the most commonly used messaging protocol for the Internet of Things (IoT). MQTT stands for Message Queuing Telemetry Transport. -It is an open source protocol used for connecting in M2M/IOT communication. -The protocol is a set of rules that defines how IoT devices can publish and subscribe to data over the Internet. - MQTT is used for messaging and data exchange between IoT and industrial IoT devices, such as embedded devices, sensors, industrial PLCs, etc. - The sender (Publisher) and the receiver (Subscriber) communicate via Topics and are decoupled from each other. The connection between them is handled by the MQTT broker. MQTT Broker: -The MQTT broker filters all incoming messages and distributes them correctly to the Subscribers. Key benefits -Light weight and efficient to minimize resources required for the client & network bandwidth. -Enables bidirectional communication between sensors and devices b)COAP: -COAP stands for constrained Application Protocols. -is a specialized web transfer protocol for use with constrained nodes and constrained networks. -This protocol is designed for machine to machine applications such as smart energy and building automation. Features ● Web Protocol Used in M2M With Constrained Requirements ● Asynchronous Message Exchange ● Low Overhead ● Very Simple To Perform Syntactic Analysis ● (URI) Uniform Resource Identifier ● Proxy and Caching Capabilities
  • 18.
  • 19. 3.SCADA protocol ● A SCADA system feeds data to a graphical user interface or dashboard. That data is then monitored by humans. ● IoT devices connected to the network are monitored. ● Collected data is generally stored in a cloud server.
  • 20. ● SCADA sensors detect small changes in the environment including temperature and sound. 4.XMPP Protocol: -XMPP is a short form for Extensible Messaging Presence Protocol. It’s protocol for streaming XML elements over a network in order to exchange messages and presence information in close to real time. -This protocol is mostly used by instant messaging applications like WhatsApp. Let’s dive into each character of word XMPP: ● X : It means eXtensible. XMPP is an open source project which can be changed or extended according to the need. ● M : XMPP is designed for sending messages in real time. It has a very efficient push mechanism compared to other protocols. ● P : It determines whether you are online/offline/busy. It indicates the state. ● P : XMPP is a protocol, that is, a set of standards that allow systems to communicate with each other. These are the basic requirements of any Instant Messenger which are fulfilled by XMPP: 1. Send and receive messages with other users. 2. Check and share presence status 3. Manage subscriptions to and from other users. 4. Manage contact list 5. Block communications(receive message, sharing presence status, etc) to specific users. 5. Brief on Zigbee technology: -ZigBee is a Personal Area Network task group with low rate task group 4. It is a technology of home networking. ZigBee is a technological standard created for controlling and sensing the network. As we know that ZigBee is the Personal Area network of task group 4 so it is based on IEEE 802.15.4 and is created by the Zigbee Alliance.
  • 21. -ZigBee is a standard that addresses the need for very low-cost implementation of Low power devices with Low data rates for short-range wireless communications. Types of ZigBee Devices: ● Zigbee Coordinator Device: It communicates with routers. This device is used for connecting the devices. ● Zigbee Router: It is used for passing the data between devices. ● Zigbee End Device: It is the device that is going to be controlled. General Characteristics of Zigbee Standard: ● Low Power Consumption ● Low Data Rate (20- 250 kbps) ● Short-Range (75-100 meters) ● Network Join Time (~ 30 msec) ● Support Small and Large Networks (up to 65000 devices (Theory); 240 devices (Practically)) ● Low Cost of Products and Cheap Implementation (Open Source Protocol) ● Extremely low duty cycle. ● 3 frequency bands with 27 channels. Zigbee architecture is a combination of 6 layers. 1. Application Layer 2. Application Interface Layer 3. Security Layer 4. Network Layer 5. Medium Access Control Layer 6. Physical Layer
  • 22. 1. Physical layer: The lowest two layers i.e the physical and the MAC (Medium Access Control) Layer are defined by the IEEE 802.15.4 specifications. The Physical layer is closest to the hardware and directly controls and communicates with the Zigbee radio. The physical layer translates the data packets in the over-the-air bits for transmission and vice-versa during the reception. 2. Medium Access Control layer (MAC layer): The layer is responsible for the interface between the physical and network layer. The MAC layer is also responsible for providing PAN ID and also network discovery through beacon requests. 3. Network layer: This layer acts as an interface between the MAC layer and the application layer. It is responsible for mesh networking. 4. Application layer: The application layer in the Zigbee stack is the highest protocol layer and it consists of the application support sub-layer and Zigbee device object. It contains manufacturer-defined applications. UNIT 04 1.Data Acquisition: -A data acquisition system is a collection of software and hardware that allows us to measure or control physical characteristics of something in the real world. -Data acquisition means acquiring data from IoT or M2M devices.
  • 23. -A complete data acquisition system consists of DAQ hardware, sensors and actuators, signal conditioning hardware, and a computer running DAQ software. Process of data acquisition: Data acquisition system (DAS) is a computerized system that collects data from the real world, converts it into the form of electrical signals and does required processing on it for storage, and presentation on computers. Transducers: They are converting physical quantities (such as temperature, pressure, etc.) into electrical quantities, or measuring electrical quantities directly. They collect data from the physical world. Wired Communication Technology ● Wired communication refers to the transmission of data over a wire-based communication technology. ● Wired communication can be serial asynchronous communication (e.g., UART) or synchronous serial communication (e.g., SPI interface or parallel input, output, input-output ports at the devices). ● Communication can be over a bus when a number of systems (chips, units, integrated circuits or ports or interfacing circuits) connect through a common set of interconnections. ● Bus refers to a number of systems connected through a common set of controls, address and data signals such that the data signals are accepted by the device at destination address only from a source at an instance.
  • 24. 2.Data Validation Data acquired from the devices does not mean that the data is correct, meaningful or consistent. Data consistency means within expected range data not corrected during transmission. Therefore, data needs validation checks. Data validation software does validation checks on the acquired data. The data validation network ensures that the data generated by data sources in the IoT are trustworthy. 3.Data Store A data store is a data repository of a set of objects which integrate into the store. Features of data store are- ⦁Objects in a data store are modeled using classes which are defined by database schemas. ⦁A data store is a general concept. It includes data repositories such as databases, relational database, flat file, spreadsheet, mail server, web server, directory services, VMware. ⦁A data store may be distributed over a multiple node. Apache Cassandra is an example of a distributed data store. ⦁A data store may consist of multiple schemas or may consist of data in only one scheme. e.g., of only one scheme data store is a relational database. ⦁A database is a repository of data which can be used for reporting, analytics, process, Knowledge discovery, intelligence. 4.Unstructured Data Storage on cloud servers ● Unstructured data is essentially all data that doesn’t fall under the purview of relational databases (RDBMS). ● Unstructured data is not structured via predefined data schema or models. However, it has an internal structure – it can be textual or non-textual, or human- or machine-generated, and can be stored within non-relational databases like NoSQL. ● Examples of unstructured data include text files, email, mobile data, social media, satellite imagery, sensor or surveillance data, communications such as chats, etc. Cloud Storage of Unstructured Data ● unstructured data can include pretty much all kinds of information. The file sizes can range from anything to a few bits and bytes to gigabytes or more. Hence, there is no one-size-fits-all approach in terms of data storage. The type of
  • 25. storage where the data sits depends on the capacity as well as the set input/output (I/O) requirements. So, anything from low I/O performance (NAS, cloud instance, object storage) to high-performing, massive files (distributed file, object storage). ● Network-attached storage (NAS) used to be associated with single file, siloed storage of data. Not anymore. These days, scale-out NAS is able to manage high-performance, high-capacity storage of the data. But again, object storage has also grown over the years and leads in unstructured data storage. Object storage comes with many advantages, such as having unique IDs for the stored data, being high-performance, highly scalable, and easily accessed with APIs. It is no surprise that most cloud providers opt for object storage. ● Cloud providers offer high-performance, scalable storage services to customers, and there is a high demand for these flexible services. Some of them come in subscription-based systems or open source, reducing the overall financial burden to enterprises and organizations. 5.Authorization and authentication of iot connected devices ● IoT authentication is a model for building trust in the identity of IoT machines and devices to protect data and control access when information travels via an unsecured network such as the Internet. ● Strong IoT authentication is needed so that connected IoT devices and machines can be trusted to protect against control commands from unauthorized users or devices. There are several methods by which we can achieve strong authentication to secure IoT device communications: ● One-way authentication: in the case where two parties wish to communicate with each other, only one party will authenticate itself to the other, while the other party will not be authenticated. ● Two-way authentication: is also referred to as mutual authentication, in which both entities authenticate each other. ● Three-way authentication: is where the central authority authenticates the two parties and helps them to authenticate each other.
  • 26. ● Distributed: using a distributed straight authentication method between the parties to the communication. ● Centralized: using a centralized server or a trusted third party to distribute and manage the authentication certificates used. Authorization : The authorization process is the tool used to validate the identity of each endpoint in the IoT system. The certification process is configured upon enrollment entry and informs the service provider of the method to be used when checking the system’s identity during registration. 6.Xively ⦁Xively is an Internet of Things platform owned by Google. It is a platform for data capture in real-time over the internet. ⦁Xively offers product companies a way to connect products, manage connected devices and the data they produce, and integrate that data into other systems. ⦁It also provides APIs to connect and develop IoT applications. ⦁Xively is an open-source platform for Arduino which is an open-source prototyping platform that provides connectivity with web deploying internet. ⦁Xively is a commercial PAAS for the IoT/M2M. Xively PaaS services offers the following features: ● It enables services, a business services platform which connects the products, including collaboration products, Rescue, Boldchat, join.me, and operations to the Internet. ● Data collection in real-time over the Internet. ● Data visualization for data of connected sensors to IoT devices. ● Graphical plots of collected data. ● It generates alerts. ● Access to historical data. ●It supports Java, Python and Ruby, and Android platform. ● It supports REST. How xively works: ⦁Programmers or Developers have to register with Xively to use cloud services.
  • 27. ⦁After registration and account creation, developers can create different devices for which they have to create an IoT app. It can be easily done using the templates provided in the Web Interface of Xively. ⦁Each connected device is allocated a unique FEED_ID. It specifies the data stream and metadata of the connected device. ⦁Once this is done permissions on the IoT devices are assigned using the available APIs. The available permissions are Create, Update, Delete and Read. ⦁One or more bidirectional channels are created after we connect a device with Xively. Each channel is unique to the device connected. ⦁Xively cloud is connected with the help of these channels. ⦁Xively APIs are used by IoT devices to create communication enabled products. 7.Non-repudiation in IoT ⇒ Non-repudiation is the assurance that someone cannot deny the validity of something. Non-repudiation is a legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data. 8.IoT security Model 9.challenges in IoT : a)Security challenges Lack of encryption –
  • 28. Although encryption is a great way to prevent hackers from accessing data, it is also one of the leading IoT security challenges. These drives like the storage and processing capabilities that would be found on a traditional computer. The result is an increase in attacks where hackers can easily manipulate the algorithms that were designed for protection. Insufficient testing and updating – With the increase in the number of IoT(internet of things) devices, IoT manufacturers are more eager to produce and deliver their device as fast as they can without giving security too much of. Most of these devices and IoT products do not get enough testing and updates and are prone to hackers and other security issues. Brute forcing and the risk of default passwords – Weak credentials and login details leave nearly all IoT devices vulnerable to password hacking and brute force. Any company that uses factory default credentials on their devices is placing both their business and its assets and the customer and their valuable information at risk of being susceptible to a brute force attack. IoT Malware and ransomware – Increases with increase in devices. Ransomware uses encryption to effectively lock out users from various devices and platforms and still use a user’s valuable data and info. Example – A hacker can hijack a computer camera and take pictures. By using malware access points, the hackers can demand ransom to unlock the device and return the data. b)Design challenge in IoT : Battery life is a limitation – Issues in packaging and integration of small-sized chips with low weight and less power consumption. If you’ve been following the mobile space, you’ve likely seen how every year it looks like there’s no restriction in terms of display screen size. Take the upward thrust of ‘phablets’, for instance, which can be telephones nearly as huge as tablets. Although helpful, the bigger monitors aren’t always only for convenience, rather,
  • 29. instead, display screen sizes are growing to accommodate larger batteries. Computers have been getting slimmer, but battery energy stays the same. Increased cost and time to market – Embedded systems are lightly constrained by cost. The need originates to drive better approaches when designing the IoT devices in order to handle the cost modeling or cost optimally with digital electronic components. Designers also need to solve the design time problem and bring the embedded device at the right time to the market. Security of the system – Systems have to be designed and implemented to be robust and reliable and have to be secure with cryptographic algorithms and security procedures. It involves different approaches to secure all the components of embedded systems from prototype to deployment. c)Deployment challenges in IoT : Connectivity – It is the foremost concern while connecting devices, applications and cloud platforms. Connected devices that provide useful front and information are extremely valuable. But poor connectivity becomes a challenge where IoT sensors are required to monitor process data and supply information. Cross platform capability – IoT applications must be developed, keeping in mind the technological changes of the future. Its development requires a balance of hardware and software functions. It is a challenge for IoT application developers to ensure that the device and IoT platform drives the best performance despite heavy device rates and fixings. Data collection and processing – In IoT development, data plays an important role. What is more critical here is the processing or usefulness of stored data. Along with security and privacy, development teams need to ensure that they plan well for the way data is collected, stored or processed within an environment. Lack of skill set –
  • 30. All of the development challenges above can only be handled if there is a proper skilled resource working on the IoT application development. The right talent will always get you past the major challenges and will be an important IoT application development asset. UNIT 05 1.Raspberry Pi a)Operating System ● Raspberry pi is a low cost computer which is of credit card size and is used to plug into a computer monitor. It has its mouse and keyboard. ● Through raspberry pi people can learn different programming languages like Scratch and Python. ● It has all the features of desktop computers like internet surfing, processing word, playing videos as well as playing games too. ● It is used by many kids to learn different programming languages. The raspberry pi has become the truly Linux device of the year. Advantages: ● Raspberry Pi is a power saver. It uses a very minimum amount of electricity to operate. ● Raspberry Pi does not rely on pen drives or any hard disk to save and store its work rather than using an SD card for storage as it is quite convenient to use and it's fast. ● The Raspberry pi is very convenient to use because of its size; which is quite manageable that it can be easily held in hand. Due to this factor it can be integrated into devices also. ● The Raspberry Pi can be extended and used. It has a capability to add up devices to itself and run. Several devices are available in the market at a very affordable price. The devices can be connected to the Pi model with the help of a USB port present in it.
  • 31. ● The Pi model can be used for making video players because it has an HDMI display port. It supports high definition display and other functions of computers. ● The raspberry model is quite affordable as compared to other similar alternatives. It offers the same specifications and quality at a lower price as compared to others. Drawbacks of the Pi ● The model cannot run the X86 operating system because of its hardware specifications. In other terms unlike Windows it cannot run a 32bit operating system on itself which is kind of set - back for itself. ● The Pi model is unable to add extra RAM in itself which is quite disappointing at times. ● One of the disadvantages of Raspberry Pi is that it does not come with a case due to which it's sometimes risky to handle because it's just a mother-board and it can be damaged if misplaced. ● It has an issue while booting. You always need a SD card connected while booting so if in any case we want to integrate the Pi model we need to keep this in mind that the card will anyhow stick out. ● If in any case any issue occurs in the model it can be restarted and booted all over again but we cannot completely rely on this point because it can be risky at times. ● Last limitation is that the dimension of the model increases because the power supply is provided with the help of a USB cable which adds on to its size. b)Configuration You can control most of your Raspberry Pi’s settings, such as the password, through the Raspberry Pi Configuration application found in Preferences on the menu. pi configuration menu ● System ○ Password — set the password of the pi user (it is a good idea to change the password from the factory default ‘raspberry’) ○ Boot — select to show the Desktop or CLI (command line interface) when your Raspberry Pi starts ○ Auto Login — enabling this option will make the Raspberry Pi automatically log in whenever it starts ○ Network at Boot — selecting this option will cause your Raspberry Pi to wait until a network connection is available before starting
  • 32. ● Interfaces ○ Camera — enable the Raspberry Pi Camera Module ○ SPI — enable the SPI GPIO pins ○ I2C — enable the I2C GPIO pins ○ Remote GPIO — allow access to your Raspberry Pi’s GPIO pins from another computer. ● Performance ○ Overclock — change the CPU speed and voltage to increase performance ○ GPU Memory — change the allocation of memory given to the GPU ● Localisation ○ Locale — set the language, country, and character set used by your Raspberry Pi ○ Timezone — set the time zone ○ Keyboard — change your keyboard layout ○ WiFi Country — set the WiFi country code
  • 33.
  • 34. 2.Iot strategies for smarter cities ⇒ The strategic components of area-based development in the Smart Cities Mission are : ● city improvement (retrofitting) ● city renewal (redevelopment) ● city extension (greenfield development) plus a Pan-city initiative in which Smart Solutions are applied covering larger parts of the city. ● It starts with having a realistic plan ● Smart cities require extensive experimentation ● A smart city vision should energize the private sector ● Smart cities demand smart data ● Get creative when rethinking transportation ● Don’t downplay digital security ● Smart city initiatives should complement low-tech initiatives Applications: 1. Traffic Management It is important to control the traffic in cities otherwise there are huge traffic jams in popular places and totally empty streets otherwise. This also depends on the design and layout of the roads but it can be managed by having smart traffic lights. 2. Air Pollution Air pollution is a major problem in many metropolitan cities where the particulate matter in the air is so high it is damaging to the lungs in the long run. But IoT along with machine learning can be used to reduce air pollution. This is possible by collecting data related to city pollution like emissions from vehicles, pollen levels, airflow direction, weather, traffic levels, etc using IoT from various sources and then calculating pollution forecasts to see the trends in pollution so they can be controlled. 3. Healthcare Healthcare is an extremely important aspect of life, especially in current times when non-communicable diseases like heart problems and cancer are increasing in big cities while there are still a lot of deaths from infectious diseases in poorer places. 4. Public Transport Public transport, whether it be buses or trains, are at the heart of any city. This is especially true in big cities where there are big traffic jams and the metro train can be a lifesaver! However, smart public transport can streamline traffic and also make commuters’ life much easier. 5. Water Management
  • 35. There is no life without water! But water is also a finite resource which is reducing at an alarming rate. Therefore, using smart water management techniques in cities so that water can be conserved for future generations is a good idea. 6.Buildings Cities are obviously incomplete without buildings and larger cities have a lot of skyscrapers as well. Now the challenge is to build smart buildings using IoT where all the functionalities like lighting, air conditioners, heating, security, etc. can be connected and controlled from a single source. 7. Waste Management Waste management systems in a city can be optimized so that there is efficient waste collection and disposal which helps in keeping the city clean and hygienic. 8. Parking Less available space means that drivers have to waste their time finding parking spaces and increase road traffic in this process This issue can be solved by using IoT connected sensors around the city that point out the empty parking spaces around wherever your destination is. 9. Natural Disaster Management It is not possible to prevent natural disasters like hurricanes, earthquakes, tsunamis, etc. but it is entirely possible to anticipate these disasters before they occur and then manage them effectively. 10. Infrastructure The infrastructure of a city i.e. its roads, buildings, etc are essentially what form the city. And smart infrastructure is a very important part of creating a smart city. Conclusion These are only some of the applications of IoT in creating smart cities. There are many more options that can be explored to make cities a better option for more than 70% of the world’s population in the future. Many of these applications are already used in the big metropolitan cities around the world, however, there are many barriers to creating truly smart cities. Some of these may be bureaucracy or the fact that it takes time to integrate the existing systems with new technology. Whatever the reason, there is no doubt that the future is smart!