SlideShare a Scribd company logo
18UITE66 - INTERNET OF THINGS
Prepared By
Dr.S.SHAIK PARVEEN
ASSISTANT PROFESSOR
DEPARTMENT OF COMPUTER SCIENCE
MANNAR THIRUMALAI NAICKER COLLEGE
Unit I
Introduction to Internet of things
1.1 Definition & Characteristics of IoT
1.2 Physical Designof IoT
1.3 Logical Designof IoT
1.4 IoT Enabling Technologies
1.1 Introduction
⚫ The Internet of Things represents the whole way from collecting data, processing it,
taking an action corresponding to the signification of this data to storing everything in the cloud.
All this is made possible by the internet
⚫ The Internet of things has become a very widely spread concept in the last few years. The
reason for this is mainly the need to computerize and control most of the surrounding objects and
have access to data in real time.
⚫ Example: Parking sensors, about phones which can check the weather and so on
1.1.1 Definition & Characteristics of IoT
Definition:
A dynamic global n/w infrastructure with self configuring capabilities based on standard
and interoperable communication protocols where physical and virtual ―things‖
have identities, physical attributes and virtual personalities and use intelligent
interfaces, and are seamlessly integrated into information n/w, often communicate data
associated with users and their environments.
Characteristics of IoT
i) Dynamic & Self Adapting:
IoT devices and systems may have the capability to dynamically adapt with
the changing contexts and take actions based on their operating conditions, user‘s
context or sensed environment.
Eg: The surveillance system comprising of a number of surveillance cameras. The surveillance
camera can adapt modes based on whether it is day or night. The surveillance system is
adapting itself based on context and changing conditions.
ii) Self Configuring:
IOT devices have self configuring capability, allowing a large number of
devices to work together to provide certain functionality. These devices have the ability
configure themselves setup networking, and fetch latest software upgrades with minimal
manual or user interaction.
iii) Inter Operable Communication Protocols: support a number of
interoperable communication protocols and can communicate with other devices and
also with infrastructure.
iv) Unique Identity: Each IoT device has a unique identity and a unique
identifier(IP address).
v) Integrated into Information Network: that allow them to communicate
and exchange data with other devices and systems.
Applications of IoT:
1.2 Physical Designof IoT
1.2.1 Things in IoT
The things in IoT refers to IoT devices which have unique identities and perform remote
sensing, actuating and monitoring capabilities. IoT devices can exchange data with other
connected devices applications. It collects data from other devices and process data
either locally or remotely.
An IoT device may consist of several interfaces for communication to other devices
both wired and wireless. These includes
(i) I/O interfaces for sensors,
(ii) Interfaces for internet connectivity memory and storage interfaces
(iv) audio/video interfaces.
The following diagram shows the block diagram of a IOT device.
Home
Cities
Environment
Energy
Retail
Logistics
Agriculture
Industry
Health & Life Style
IOT devices can also be of varied types for example wearable sensors, smart watches, LED
lights, automobile and industrial machines. The following diagram shows different types of IOT
devices.
1.2.2 IoT Protocols.
The protocol consists of Link Layer, Network Layer, Transport Layer and Application Layer.
The following diagram shows the IoT protocol structure.
A) Link Layer
Protocols determine how data is physically sent over the network‘s physical layer or
medium. Local network connect to which host is attached. Hosts on the same link exchange data
packets over the link layer using link layer protocols. Link layer determines how packets are
coded and signaled by the h/w device over the medium to which the host is attached.
Protocols:
● 802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link
layer. Eg: 802.3 uses co-axial cable; 802.3i uses copper twisted pair connection; 802.3j uses
fiber optic connection; 802.3ae uses Ethernet overfiber.
● 802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN)
communication standards including extensive description of link layer. Eg: 802.11a
operates in 5GHz band, 802.11b and 802.11g operates in 2.4GHz band, 802.11n
operates in 2.4/5GHz band, 802.11ac operates in 5GHz band, 802.11ad operates in
60Ghzband.
● 802.16 - WiMax: IEEE802.16 is a collection of wireless broadband standards
including exclusive description of link layer. WiMax provide data rates from 1.5 Mb/s to
1Gb/s.
● 802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate
wireless personal area network(LR-WPAN). Basis for high level communication
protocols such as ZigBee. Provides data rate from 40kb/s to250kb/s.
● 2G/3G/4G-Mobile Communication: Data rates from 9.6kb/s(2G) to up
to100Mb/s(4G).
B) Network/Internet Layer
Responsible for sending IP datagrams from source n/w to destination n/w. Performs the host
addressing and packet routing. Datagrams contains source and destination address.
Protocols:
● IPv4: Internet Protocol version4 is used to identify the devices on a n/w using a
hierarchical addressing scheme. 32 bit address. Allows total of 2**32addresses.
● IPv6: Internet Protocol version6 uses 128 bit address scheme and allows 2**128
addresses.
● 6LOWPAN:(IPv6overLowpowerWirelessPersonalAreaNetwork)operates in
2.4 GHz frequency range and data transfer 250 kb/s.
C) Transport Layer
Provides end-to-end message transfer capability independent of the underlying n/w. Set up on
connection with ACK as in TCP and without ACK as in UDP. Provides functions such as error
control, segmentation, flow control and congestion control. Protocols:
● TCP: Transmission Control Protocol used by web browsers(along with HTTP and
HTTPS), email(along with SMTP, FTP). Connection oriented and stateless protocol. IP Protocol
deals with sending packets, TCP ensures reliable transmission of protocols in order. Avoids n/w
congestion and congestion collapse.
● UDP: User Datagram Protocol is connectionless protocol. Useful in time sensitive
applications, very small data units to exchange. Transaction oriented and stateless protocol. Does
not provide guaranteed delivery.
D) Application Layer: Defines how the applications interface with lower layer protocols to
send data over the n/w. Enables process-to-process communication using ports.
Protocols:
● HTTP: Hyper Text Transfer Protocol that forms foundation of WWW. Follow request-
response model Stateless protocol.
● CoAP: Constrained Application Protocol for machine-to-machine(M2M) applications
with constrained devices, constrained environment and constrained n/w. Uses client- server
architecture.
● WebSocket: allows full duplex communication over a single socket connection.
● MQTT: Message Queue Telemetry Transport is light weight messaging protocol based
on publish-subscribe model. Uses client server architecture. Well suited for constrained
environment.
● XMPP: Extensible Message and Presence Protocol for real time communication and
streaming XML data between network entities. Support client-server and server-server
communication.
● DDS: Data Distribution Service is data centric middleware standards for device-to-device
or machine-to-machine communication. Uses publish-subscribe model.
● AMQP: Advanced Message Queuing Protocol is open application layer protocol for
business messaging. Supports both point-to-point and publish-subscribe model
1.3Logical Designof IoT
The logical design of IoT refers to an abstract represent of entities and processes without going
into the low level specifies of implementation.
i) IoT Functional Blocks ii) IoT Communication Models iii) IoT Comm. APIs
1.3.1 IoT Functional blocks
Provide the system the capabilities for identification, sensing, actuation, communication and
management.
● Device: An IoT system comprises of devices that provide sensing, actuation, monitoring
and control functions.
● Communication: handles the communication for IoT system.
● Services: for device monitoring, device control services, data publishing services and
services for device discovery.
● Management: Provides various functions to govern the IoT system.
● Security: Secures IoT system and priority functions such as authentication, authorization,
message and context integrity and data security.
● Application: IoT application provide an interface that the users can use to control and
monitor various aspects of IoT system.
1.3.2 IoT Communication Models
i) Request-Response ii) Publish-Subscribe iii)Push-Pull iv) Exclusive Pair
i) Request-Response Model:
In which the client sends request to the server and the server replies to requests. Is a stateless
communication model and each request-response pair is independent of others.
ii) Publish-Subscribe Model:
Involves publishers, brokers and consumers. Publishers are source of data. Publishers send data
to the topics which are managed by the broker. Publishers are not aware of the consumers.
Consumers subscribe to the topics which are managed by the broker. When the broker receives
data for a topic from the publisher, it sends the data to all the subscribed consumers.
iii) Push-Pull Model:
In which data producers push data to queues and consumers pull data from the queues. Producers
do not need to aware of the consumers. Queues help in decoupling the message between the
producers and consumers.
iv)Exclusive Pair:
It is bi-directional, fully duplex communication model that uses a persistent connection between
the client and server. Once connection is set up it remains open until the client send a request to
close the connection. Is a stateful communication model and server is aware of all the open
connections.
1.3.3 IoT Communication APIs.
i) REST based communication APIs(Request-Response BasedModel)
ii) WebSocket based Communication APIs(Exclusive PairBasedModel)
i) REST based communication APIs: Representational State Transfer(REST) is a
set of architectural principles by which we can design web services and web APIs that
focus on a system‘s resources and have resource states are addressed and transferred.
The REST architectural constraints are as follows: The below figure shows the
communication between client server with REST APIs
Client-Server: The principle behind client-server constraint is the separation of
concerns. Separation allows client and server to be independently developed and
updated.
Stateless: Each request from client to server must contain all the info. Necessary to
understand the request, and cannot take advantage of any stored context on the server.
Cache-able: Cache constraint requires that the data within a response to a request be
implicitly or explicitly labeled as cache-able or non-cacheable. If a response is cache-
able, then a client cache is given the right to reuse that response data for later, equivalent
requests.
Layered System: constraints the behavior of components such that each component
cannot see beyond the immediate layer with which they are interacting.
User Interface: constraint requires that the method of communication between a client
and a server must be uniform.
Code on Demand: Servers can provide executable code or scripts for clients to execute
in their context. This constraint is the only one that is optional.
The Request-Response model used by REST:
RESTful web service is a collection of resources which are represented by URIs.
RESTful web API has a base URI(e.g: http://example.com/api/tasks/). The clients and
requests to these URIs using the methods defined by the HTTP protocol(e.g: GET, PUT,
POST or DELETE). A RESTful web service can support various internet media types.
B) WebSocket Based Communication APIs
WebSocket APIs allow bi-directional, full duplex communication between clients and
servers. WebSocket APIs follow the exclusive pair communication model.
1.4 IoT Enabling Technologies
IoT is enabled by several technologies including Wireless Sensor Networks, Cloud Computing,
Big Data Analytics, Embedded Systems, Security Protocols and architectures, Communication
Protocols, Web Services, Mobile internet and semantic search engines.
1.4.1 Wireless Sensor Networks
A wireless sensor network comprises of distributed devices with sensors which are used to
monitor the environmental and physical conditions. A WSN consist of a number of end nodes
and routers and a co-ordinator. The coordinator collects the data from all the nodes. Coordinator
also acts as a gateway that connects the WSN to the internet.
WSNs used in IoT systems are described as follows:
● Weather Monitoring System: in which nodes collect temp, humidity and other data,
which is aggregated and analyzed.
● Indoor air quality monitoring systems: to collect data on the indoor air quality and
concentration of various gases.
● Soil Moisture Monitoring Systems: to monitor soil moisture at various locations.
● Surveillance Systems: use WSNs for collecting surveillance data(motion data detection).
● Smart Grids : use WSNs for monitoring grids at various points.
● Structural Health Monitoring Systems: Use WSNs to monitor the health of
structures(building, bridges) by collecting vibrations from sensor nodes deployed at various
points in the structure.
WSNs are enabled by wireless communication protocols such as IEEE 802.15.4. Zig Bee is one
of the most popular wireless technologies used by WSNs .Zig Bee specifications are based on
IEEE 802.15.4. Zig Bee operates 2.4 GHz frequency and offers data rates upto 250 KB/s and
range from 10 to 100meters.
1.4.2 Cloud Computing
Cloud computing is a transformative computing paradigm that involves delivering applications
and services over the internet. Cloud computing involves provisioning of computing, networking
and storage resources on demand and providing these resources as metered services to the users,
in a “pay as you go”. Cloud computing resources can be provisioned on-demand by the users,
without requiring interactions with the cloud service provider. The process of provisioning
resources is automated.
Cloud computing services are offered to users in different forms.
● Infrastructure-as-a-service(IaaS):Provides users the ability to provision computing and
storage resources. These resources are provided to the users as a virtual machine instances and
virtual storage.
● Platform-as-a-Service(PaaS): Provides users the ability to develop and deploy
application in cloud using the development tools, APIs, software libraries and services provided
by the cloud service provider.
● Software-as-a-Service(SaaS): Provides the user a complete software application or the
user interface to the application itself. The cloud service provider manages the underlying cloud
infrastructure including servers, network, operating systems, storage, and application software.
1.4.3 Big data Analysis
Big data is defined as collections of data sets whose volume , velocity or variety is so large that it
is difficult to store, manage, process and analyze the data using traditional databases and data
processing tools.
Some examples of big data generated by IoT are
● Sensor data generated by IoT systems.
● Machine sensor data collected from sensors established in industrial
and energy systems.
● Health and fitness data generated IoT devices.
● Data generated by IoT systems for location and tracking vehicles.
● Data generated by retail inventory monitoring systems.
The underlying characteristics of Big Data are
Volume: There is no fixed threshold for the volume of data for big data. Big data is used for
massive scale data.
Velocity: Velocity is another important characteristics of Big Data and the primary reason for
exponential growth of data.
Variety: Variety refers to the form of data. Big data comes in different forms such as structured
or unstructured data including test data, image , audio, video and sensor data .
1.4.4 Communication Protocols:
Communication Protocols form the back-bone of IoT systems and enable network connectivity
and coupling to applications.
● Allow devices to exchange data over network.
● Define the exchange formats, data encoding addressing schemes for
device and routing of packets from source to destination.
● It includes sequence control, flow control and retransmission of lost packets.
1.4.5 Embedded Systems:
Embedded Systems is a computer system that has computer hardware and
software embedded to perform specific tasks. Key components of embedded system
include microprocessor or micro controller, memory (RAM, ROM, Cache), networking
units (Ethernet Wi-Fi Adaptor), input/output units (Display, Keyboard, etc..,) and
storage (Flash memory). Embedded System range from low cost miniaturized devices
such as digital watches to devices such as digital cameras, POS terminals, vending
machines, appliances etc.,
Part A-Multiple Choice Questions
[ Separately discussed ]
Part B- 8 Marks
1. Define IOT and explain the characteristics of IoT.
2. Discuss the things in IoT.
3. Make note on IoT Functional Blocks
4. Make note on IoT communication APIs.
Part C- 16 Marks
1. Elaborate the functions of IoT Protocols with block diagram.
2. Explain the Communication Models of IoT.
3. Describe the IoT enabling technologies in detail.
Unit II
IoT Levels & Deployment Templates
2.1 IoT Level-1
2.2 IoT Level-2
2.3 IoT Level -3
2.4 IoT Level-4
2.5 IoT Level-5
2.6 IoT Level -6.
2.7 IoT Physical Devices and Endpoints: IoT device
2.8 Basic Building Blocks of an IoT Device.
2.1 IoT Level-1
Level-1 IoT systems has a single node that performs sensing and/or actuation, stores
data, performs analysis and host the application. Suitable for modeling low cost and low
complexity solutions where the data involved is not big and analysis requirement are not
computationally intensive. An e.g., of IoT Level1 is Home automation.
The system consist of a single node that allows controlling the lights and appliances in a home
the device used in this system interfaces with the lights and appliances using electronic rely
switches. The status information of each light or appliances is maintained in a local database.
REST services deployed locally allow retrieving and updating the state of each lighter appliance
in the status database. The controller service continuously monitors the state of each light or
appliance by retrieving the light from the database.
2.2 IoT Level-2
IoT Level2 has a single node that performs sensing and/or actuating and local analysis as shown
in fig. Data is stored in cloud and application is usually cloud based. Level2 IoT systems are
suitable for solutions where data are involved is big, however, the primary analysis requirement
is not computationally intensive and can be done locally itself. An e,g., of Level2 IoT system for
Smart Irrigation.
The system consists of a single node that monitors the soil moisture level and controls the
irrigation system. The device used system collects soil moisture data from sensors. The
controller service continuously monitors the moisture level. A cloud based REST web service is
used for storing and retrieving moisture data which is stored in a cloud database. A cloud based
application is used for visualizing the moisture level over a period of time which can help in
making decision about irrigation schedule.
2.3 IoT Level -3
This System has a single node. Data is stored and analyzed in the cloud application is cloud
based as shown in fig. Level3 IoT systems are suitable for solutions where the data involved is
big and analysis requirements are computationally intensive.
The system consists of a single node that monitors the vibration levels for the package being
shipped . The device in this system uses accelerometer and gyroscope sensor for monitoring
vibration levels. The controller serves in the sensor data to the cloud in a real time using a
websocket service. The data is stored in the cloud and also visualizing the cloud based
applications . The analysis components in the cloud can trigger alerts if the vibration level
becomes greater than the threshold.
2.4 IoT Level-4
This System has multiple nodes that perform local analysis. Data is stored in the cloud and
application is cloud based as shown in fig. Level4 contains local and cloud based observer nodes
which can subscribe to and receive information collected in the cloud from IoT devices.
Level 4 IoT systems are suitable for solutions where multiple nodes are required, the data
involved in big and the analysis requirements are computationally intensive.
Example : IoT System for Noise Monitoring.
The system consists of multiple nodes placed in different locations for monitoring noise levels in
an area. The nodes in this example are equipped with sound sensors. Nodes are independent of
each other. Each nodes runs its owner controller service that sends the data to the cloud . The
data is stored in cloud database. The analysis of data collected from a number of nodes is done in
the cloud. A cloud based application is used for visualizing the aggregated data.
2.5 IoT Level-5
System has multiple end nodes and one coordinator node as shown in fig. The end nodes that
perform sensing and/or actuation. Coordinator node collects data from the end nodes and sends
to the cloud. Data is stored and analyzed in the cloud and application is cloud based. Level5 IoT
systems are suitable for solution based on wireless sensor network, in which data are high
intensive.
Example :IoT system for Forest Fire Detection.
The system consists of multiple nodes placed in different locations for monitoring temperature,
humidity and CO2 levels in a forest. The end nodes in this example are equipped with various
sensors such as temperature, humidity and CO2. The coordinator node collects the data from the
end nodes and act as a gateway that provides internet connectivity to the IoT system. The
controller service on the coordinator device sends the collected data to the cloud. The data is
stores in a cloud database. The analysis of data is done in the computing cloud to aggregate the
data and make predictions. A cloud based applications is used for visualizing the data
2.6 IoT Level -6.
System has multiple independent end nodes that perform sensing and/or actuation and sensed
data to the cloud. Data is stored in the cloud and application is cloud based as shown in fig. The
analytics component analyses the data and stores the result in the cloud data base. The results are
visualized with the cloud based applications. The centralized controller is aware of the status of
all endnodes and sends control commands to the nodes.
Example weather monitoring system
The system consists of multiple nodes placed in different locations for monitoring
temperatures,humidity and pressure in an area.the end nodes are equipped with various
sensors(such as temperature,humidity and pressure).the end nodes send the data to the cloud real-
time using a websocket service.the data is stored in a cloud database. The analysis of data is done
in a cloud to aggregate a data and make predictions.a cloud based application is used for
visualizing the data.
2.7 IoT Physical Devices and Endpoints: IoT device
⚫ A "Thing" in Internet of Things (IoT) can be any object that has a unique identifier and
which can send/receive data (including user data) over a network (e.g., smart phone, smartTV,
computer, refrigerator, car, etc.).
⚫ IoT devices are connected to the Internet and send information about themselves or about
their surroundings (e.g. information sensed by the connected sensors) over a network (to other
devices or servers/storage) or allow actuation upon the physical entities/environment around
them remotely.
IoT Device Examples
⚫ A home automation device that allows remotely monitoring the status of appliances and
controlling the appliances.
⚫ An industrial machine which sends information abouts its operation and health
monitoring data to a server.
⚫ A car which sends information about its location to a cloud-based service.
⚫ A wireless-enabled wearable device that measures data about a person such as the
number of steps walked and sends the data to a cloud-based service.
2.8 Basic Building Blocks of an IoT Device.
⚫ Sensing: Sensors can be either on-board the IoT device or attached to the device . IoT
device can collect various types of information from the on board or attached sensors such as
temperature, humidity, light intensity, etc
⚫ Actuation: IoT devices can have various types of actuators attached that allow taking
actions upon the physical entities in the vicinity of the device.
Example: A Relay switch connected to an IoT device can turn an appliance on/off based on the
commands sent to the device.
⚫ Communication: Communication modules are responsible for sending collected data to
other devices or cloud-based servers/storage and receiving data from other devices and
commands from remote applications.
⚫ Analysis & Processing: Analysis and processing modules are responsible for making
sense of the collected data
Block Diagram of an IoT Device
Expansions
⚫ USB Host-Universal Serial Bus Host
⚫ RJ 45/Ethernet- Component /Port
⚫ CPU- Central Processing Unit
⚫ GPU- Graphical Processor Unit
⚫ HDMI-High-Definition Multimedia Interface Splitter
⚫ RCA Video-Radio Corporation of America Community
⚫ UART- Universal Asynchronous Receiver Transmitter
⚫ SPI-Serial Peripheral Interface
⚫ I2C-Inter Integrated Circuit bus
⚫ CAN-Controller Area Network
⚫ SD-Secondary Storage
⚫ MMC-Multimedia Memory Cards.
⚫ SDIO-Secure Digital Input Output
⚫ NAND/ NOR- Logic Gates
⚫ DDR1/DDR2/DDR3-Double Data Rate
Part A-Multiple Choice Questions
[ Separately discussed ]
Part B- 8 Marks
1. Elaborate the functions of IoT Level1 with diagram
2. Discuss the functions of IoT Level2 with diagram
3. Explain the functions of IoT Level5 with diagram
4. Describe the functions IoT Level6 with block diagram.
Part C- 16 Marks
1. Elaborate the functions of IoT Level3 with diagram
2. Explain the functions IoT Level4 with block diagram.
3. Describe the basic building blocks of an IoT Device with diagram.
Unit III
Domain Specific IoTs: Introduction – Home Automation- Smart Lighting- Smart Appliances-
Intrusion Detection-Smoke/ Gas Detectors. Cities– Smart Parking- SmartLighting- Smart roads–
Structural Health Monitoring – Surveillance – Emergency Response. Environment – Weather
Monitoring- Air Pollution Monitoring - Noise Pollution Monitoring - Forest Fire Detection –
River Floods Detection- Energy- Retail- Logistics-Agriculture.
Part A-Multiple Choice Questions
[ Separately discussed ]
Part B- 8 Marks
1. Discuss the application IoT in cities
2. Describe the application IoT in Retail
3. Explain the application IoT in Agriculture
Part C- 16 Marks
1. Discuss the application IoT in Home automation.
2. Elaborate the application IoT in Environment.
3. Discuss in detail about the application IoT in Energy.
4. Brief note on the application of IoT in Logistics.
Unit IV
IoT and M2M
&
IoT System Management with NETCONF – YANG
INTRODUCTION
Machine-to-machine (M2M) is a technology that uses a device attached to a machine to capture
an event which is relayed through a mobile phone or fixed line network to an application that
translates the event into meaningful information. The Internet of Things (IoT) is the next
generation of the Internet based on the Internet Protocol (IP).
• Term which is often synonymous with IoT is Machine-to-Machine (M2M).
• IoT and M2M are often used interchangeably.
4.1 M2M
Machine-to-Machine (M2M) refers to networking of machines (or devices) for the purpose of
remote monitoring and control and data exchange.
M2M SystemArchitecture :
The following diagram shows the end-to-end architecture of M2M systems comprises of M2M
area networks, communication networks and application domain.
● An M2M area network comprises of machines ( or M2M nodes) which have
embedded hardware modules for sensing, actuation and communication.
● Various communication protocols can be used for M2M LAN such as ZigBee,
Bluetooth, M-bus, Wireless M-Bus, Powerline communication(PLC), 6LoWPAN, IEEE
802.15.4 etc.., These protocols provide connectivity between M2M nodes within an
M2M area network.
● The communication network provides connectivity to remote M2M area
networks.The communication network can use either wired or wireless network . While
the M2M are networks use either proprietary or non-IP based communication protocols,
the communication network uses IP-based network. Since non-IP based protocols are
used within M2M area network, the M2M nodes within one network cannot
communicate with nodes in an external network.
● To enable the communication between remote M2M are network, M2M
gateways are used.
Block diagram of an M2M gateway:
The below diagram shows a block diagram of an M2M gateway.
The communication between M2M nodes and the M2M gateway is based on the
communication protocols which are naive to the M2M are network. M2M gateway
performs protocol translations to enable IP-connectivity for M2M are networks. M2M
gateway acts as a proxy performing translations from/to native protocols to/from
Internet Protocol (IP). With an M2M gateway, each mode in an M2M area network
appears as a virtualized node for external M2M area networks.
M2M data is gathered into point solutions such as Enterprise applications, service
management applications, Remote monitoring applications. M2M has various
applications domain such as Smart metering, Home automation, Industrial automation,
smart Grids etc.,. M2M solution designs (such as data collection and storage architecture
and application apps) are specific to the M2M application domain.
4.2 Difference between IoT and M2M
i)Communication Protocols:
● M2M and IoT can differ in how the communication between the machines or devices
happens.
● Commonly uses M2M protocols include ZigBee, Bluetooth, ModBus, M-Bus,
WirelessM-Bustec.,
● In IoT uses HTTP, CoAP, WebSocket, MQTT,XMPP,DDS,AMQPetc.,
● M2M uses either proprietary or non-IP based communication
● The focus of communication in M2M is usually on the protocols below the network
layer.
● The focus of communication in IoT is usually on the protocols above the network layer.
●
ii)Machines in M2M Vs Things inIoT:
The “Things” in IoT refers to physical objects have unique identifier and can sense and
communicate with their external environment and user applications or their inter physical state.
The unique identifier for the things in IoT are the IP addresses MAC addresses. Things have
software components for accessing and processing and storing sensor information, or controlling
actuators connectors.
• Machines in M2M will be homogenous whereas Things in IoT will be heterogeneous.(eg.
Home automation, Fire alarms, Door Alarms, Lighting control devices etc.,.
• M2M systems, in contrast to IoT, typically have homogeneous machine types within an M2M
area network.
iii) Hardware Vs Software Emphasis:
The emphasis of M2M is more on hardware with embedded modules
The emphasis of IoT is more on software.
IOT spends specialized software for sensor data collection, Data analysis and interfacing with the
cloud through IP based communications
iv)Data Collection &Analysis
•M2M data is collected in point solutions and often in on-premises storage infrastructure.
•The data in IoT is collected in the cloud (can be public, private or hybrid cloud).
The analytics components analyses the data and stores the result in the cloud database. The
centralized IoT data and analysis result are visualized with the cloud based applications. The
centralized controller is aware of the status of all the end nodes and sends control commands to
the nodes. Observer nodes can process information. And use it for various applications, however
observer nodes do not perform any control functions.
v)Applications
M2M data is collected in point solutions and can be accessed by on-premises applications such
as diagnosis applications, service management applications, and on premises enterprise
applications.
• IoT data is collected in the cloud and can be accessed by cloud applications such as
analytics applications, enterprise applications, remote diagnosis and management
applications, etc.
The scale of collected data in IoT is massive , cloud based real Time and batch data analysis
framework are used for data analysis
SDN and NFV for IoT
4.3 Software Defined Networking for IoT
• Software Defined Networking(SDN) is a networking architecture that
separates the control plane from the data plane and centralizes the network controller.
• Software-based SDN controllers maintain a unified view of the network and
make configuration, management and provisioning simpler.
• The underlying infrastructure in SDN uses simple packet forwarding
hardware as opposed to specialized hardware in conventional networks.
• Control plane is the part of the network that carries the payload data traffic.
Limitations of Conventional Network:
i) Complex Network Devices:
Conventional Network are getting increasingly complex with more and more protocols being
implemented. To improve link speeds and reliability. Interoperability is limited due to the lack of
standard and open interfaces . Network devices use proprietary hardware and software and have
slow product life cycles limiting innovation. The conventional network were well suited for
static traffic patterns and had large number of protocols designed for specific applications
ii) Management Overhead:
Conventional network involves significant management overhead. Network manager find it
increasingly difficult to manage multiple network devices and interfaces from multiple vendors.
Upgradation of network requires configuration changes in multiple devices (switches, routers,
firewalls etc.,)
iii) Limited Scalability:
The virtualization technology used in cloud computing environment has increase the number of
virtual host requiring network access. IoT applications hosted in the cloud are distributed across
multiple virtual machines that require exchange of traffic. The analytics components of IoT
applications run distributed algorithms on a large number of virtual machines and require huge
amount of data exchange between virtual machines
SDN Architecture
Figure shows the SDN Architecture and SDN Layers in which the control and data planes are
decoupled and the network controller is centralized
Key elements of SDN:
• Centralized Network Controller
With decoupled control and data planes and centralized network controller, the network
administrators can rapidly configure the network. SDN applications can be deployed
through programmable open APIs. This speeds up innovation as the network
administrator no longer need to wait for the device vendors to embed new features in
their proprietary hardware
• Programmable OpenAPIs
SDN architecture supports programmable open APIs for interface between the SDN
application and control layers (Northbound interface). With these open APIs various
network services can be implemented, such as routing, quality of service (QOS) access
control etc.,
• Standard Communication Interface(OpenFlow)
SDN architecture uses a standard communication interface between the control and
infrastructure layers (Southbound interface). OpenFlow, which is defined by the Open
Networking Foundation (ONF) is the broadly accepted SDN protocol for the
Southbound interface. With openflow, the forwarding plane of the network devices can
be directly access and manipulated. Openflow uses the concept of flows to identify
network traffic based on predefined match rules.
Figure 1 Figure 2
Figure 1 shows the components of an Openflow switch comprising of one or more flow
table and group table
Figure 2 shows the example of Openflow table
4.4 Network Function Virtualization for IoT
• Network Function Virtualization (NFV) is a technology that leverages virtualization to
consolidate the heterogeneous network.
• devices onto industry standard high volume servers, switches and storage.
• NFV is complementary to SDN as NFV can provide the infrastructure on which SDN can
run
• NFV and SDN are mutually beneficial to each other but not dependent.
• Network functions can be virtualized without SDN similarly SDN can run without NFV
Key elements of NFV
• Virtualized Network Function (VNF):
VNF is a software implementation of a network function which is capable of running over the
NFV Infrastructure (NFVI).
• NFV Infrastructure (NFVI):
NFVI includes compute, network and storage resources that are virtualized.
• NFV Management and Orchestration:
NFV Management and Orchestration focuses on all virtualization-specific management tasks and
covers the orchestration and life-cycle management of physical and/or software resources that
support the infrastructure virtualization, and the life-cycle management of VNFs.
NFV Use Case
❑ NFV can be used to virtualize the Home Gateway.
❑ The NFV infrastructure in the cloud hosts a virtualized Home Gateway.
❑ The virtualized gateway provides private IP addresses to the devices in the home.
❑ The virtualized gateway also connects to network services such as VoIP and IPTV.
❑
4.5 Need for IoT Systems Management
4.6 Simple Network Management Protocol (SNMP)
4.6.1 Limitations of SNMP
4.7 Network Operator Requirements
4.8 NETCONF
4.9YANG
4.10 IoT Systems Management with NETCONF – YANG.
Part A-Multiple Choice Questions
[ Separately discussed ]
Part B- 8 Marks
1. Write a note on M2M system Architecture
2. Differentiate IoT and M2M in detail.
3. List the needs for IoT System Management.
4. Make a note on Simple Network Management Protocol
5. State the Limitations of SNMP
6. Explain the role of NETCONF in IoT
7. Explain the role of YANG in IoT
https://www.jntumaterials.co.in/2015/10/introduction-to-data-mining-with-case-studies-by-gk-gupta-
prentice-hall.html
Part C- 16 Marks
1. Explain how Software Defined Networking can be used for various levels of IoT ?
2. Describe how NFV can be used for virtualizing IoT devices.
3. Brief overview of the Network Operator Requirements.
4. Elaborate IoT Systems Management with NETCONF YANG.
Unit V
IoT Platforms Design Methodology
Introduction
IoT system comprises of multiple components and deployment tier. IoT Design Methodology
that includes:
• Purpose & Requirements Specification
• Process Specification
• Domain Model Specification
• Information Model Specification
• Service Specifications
• IoT Level Specification
• Functional View Specification
• Operational View Specification
• Device & Component Integration
• Application Development
5.1 Purpose &Requirements Specification
The first step in IoT system design methodology is to define the purpose and requirements of the
system. In this step, the system purpose, behavior and requirements (such as data collection
requirements, data analysis requirements, system management requirements, data privacy and
security requirements, user interface requirements, ...) are captured.
• Applying this to our example of a smart home automation system, the purpose and
requirements for the system may be described as follows:
• Purpose : A home automation system that allows controlling of the lights in a home
remotely using a web application.
• Behavior : The home automation system should have auto and manual modes. In
auto mode, the system measures the light level in the room and switches on the
light when it gets dark. In manual mode, the system provides the option of manually
and remotely switching on/off the light.
• System Management Requirement : The system should provide remote monitoring
and control functions.
• Data Analysis Requirement : The system should perform local analysis of the data.
• Application Deployment Requirement : The application should be deployed locally
on the device, but should be accessible remotely.
• Security Requirement : The system should have basic user authentication capability.
5.2 Process Specification
5.3 Domain Model Specification
5.4 Information Model Specification
5.5 Service Specifications
The fifth step in the IoT design methodology is to define the service specifications. Service
specifications define the services in the IoT system, service types, service inputs/output, service
endpoints, service schedules, service preconditions and service effects. The following figures
shows deriving the services from the process specification and information model for the home
automation IoT system.
From the process specification and information model we identify the states and attributes. For
each state and attributes we define a service. These services either change a state or attribute
values and are retrieve the current values. For example, the mode service sets mode to auto or
manual or retrieves the current mode. The state services sets the light appliances state to ON or
OFF. In the auto mode, the controller service monitors the light level in auto mode and switches
the light ON or OFF and updates the status in the status database. In manual mode the controller
service retrieves the current state from the database and switches the light ON or OFF. The
figure deriving services from process specification and information model for home automation
IoT system.
Controller Service: In the auto mode, the controller service monitors the light level in auto mode
and switches the light ON or OFF and updates the status in the status database. In manual mode
the controller service retrieves the current state from the database and switches the light ON or
OFF
Mode Service: Sets mode to auto or manual or retrieves the current mode
State Service: Sets the light appliances state to ON or OFF.
5.6 IoT Level Specification
The sixth step in the IoT design methodology is to define the IoT level
for the system. There are 6 IoT deployment levels. The following diagram shows deployment
level of the home automation system of Level 1.
5.7 Functional View Specifications
The seventh step in the IoT design methodology is to define the Functional View. The
Functional View (FV) defines the functions of the IoT systems grouped into various Functional
Groups (FGs). Each Functional Group either provides functionalities for interacting with
instances of concepts defined in the Domain Model or provides information related to these
concepts.
The Functional Groups(FG) included in a Functional View include:
Device: the device FG contains devices for monitoring and control. In the home automation
example, the device FG includes a single board minicomputer, a light sensor and relay switch
(actuator)
Communication : The communication FG handles the communication for the IoT system. The
communication FG includes the communication protocols that form the backbone of IoT systems
and enable network connectivity. The communication API home automation example is a REST
based APIs.
Services :
The service FG includes various services involved in the IoT system such as services for device
monitoring , device control services , data publishing services and services for device discovery.
In home automation example, there are two REST services (mode and state) and one native
service (controller service).
Management: the management FG includes all functionalities that are needed to configure and
manage IoT System.
Security: the security FG includes security mechanisms for the IoT system such as
authentication, authorization , data security etc.,
Application :the application FG includes applications that provide an interface to the users to
control and monitor various aspects of the IoT system. Applications also allow users to view the
system status and the processed data.
5.8Operational View Specifications
The eighth step in the IoT design methodology is to define the Operational View Specifications.
In this step, various options pertaining to the IoT system deployment and operation are defined,
such as, service hosting options, storage options, device options, application hosting options, etc
The following figure shows an example of mapping functional groups to operational view
specifications for IoT home automation system. Operational view specifications for the home
automation example are as follows.
Devices:
Computing Device , Raspberry PI, Light dependent resistor (sensor), really switch (actuator)
Communication APIs
REST APIs
Communication Protocols:
Link Layer-802.11, Network Layer-IPv4/IPv6, Transport Layer –TCP, Application Layer- HTTP
Services:
i)Controller Service- Hosted on device, Implemented Python and run as a native service.
ii)Mode Service-REST-ful web service, hosted on device, implemented with DJango – REST
frame work.
iii) State Service- RESTful REST-ful web service, hosted on device, implemented with Django –
REST frame work.
Application:
i) Web Application- Django web application ,
ii)Application Server- Django App server
iii) Database Server-MySQL
Security:
i) Authentication- Web App, Database
ii) Authorization- Web App, Database
Management:
i) Application Management-Django App Management
ii) Database Management- My SQL, DB Management
iii)Device Management- Raspberry Pi Device Management.
5.9 Device & Component Integration
The ninth step in the IoT design methodology is the integration of the devices and components.
The following figure shows the schematic diagram of the IoT Home automation System. The
devices and component used in this example are Raspberry Pi mini computer, LDR sensor and
relay switch actuators.
5.10Application Development
The final step in the IoT design methodology is to develop the IoT application. The following
figure shows the screenshot of the home automation web application. The application has
controls for the mode (auto ON or auto OFF) and the light ON or OFF. In the auto mode, the IoT
system controls the light appliance automatically based on the lightning conditions in the room.
When auto mode is enable, the light control in the application is disabled and reflects the current
state of the light. When the auto mode is disabled, the light control is enabled and is used for
manually controlling the light.
• Auto
• Controls the light appliance automatically based on the lighting conditions in the room
Light
• When Auto mode is off, it is used for manually controlling the light appliance.
• When Auto mode is on, it reflects the current state of the light appliance.
Part A-Multiple Choice Questions
[ Separately discussed ]
Part B- 8 Marks
1. Write about the Purpose &Requirements Specification of IoT Design Methodology
2. Detail about Process Specification of IoT Design Methodology
3. Brief about Information Model Specification of IoT Design Methodology
4. Describe Operational View Specifications of IoT Design Methodology
5. Make note on IoT Level Specification, Device & Component Integration and
Application Development
Part C- 16 Marks
1. Elaborate the functions of Domain Model Specification of IoT Design Methodology
2. Explain the Service Specifications of IoT Design Methodology
3. Describe the Functional View Specifications of IoT Design Methodology
in detail.

More Related Content

Similar to IOT-Monograph .docx

IOT ajay binay.pdf
IOT ajay binay.pdfIOT ajay binay.pdf
IOT ajay binay.pdf
MaaheenKashish
 
Iot
IotIot
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
Manikandan Kandasamy
 
UNIT 1.pdf
UNIT 1.pdfUNIT 1.pdf
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
MD.ANISUR RAHMAN
 
IOT_PPT.pptx
IOT_PPT.pptxIOT_PPT.pptx
IOT_PPT.pptx
anilkumar5114
 
Internet of things Unit I
Internet of things   Unit IInternet of things   Unit I
Internet of things Unit I
parveen837153
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET Journal
 
Iot
IotIot
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdf
MurugeswariKrishnan
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdf
MurugeswariKrishnan
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
Rupesh930637
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
TELKOMNIKA JOURNAL
 
Definition of Internet of things and introduction
Definition of Internet of things and introductionDefinition of Internet of things and introduction
Definition of Internet of things and introduction
sundeepsiddula
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
PrarthanaModak1
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
JoshuaKimmich1
 
IoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdfIoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdf
NadouShe
 
IOT- UNIT-1.pptx
IOT- UNIT-1.pptxIOT- UNIT-1.pptx
IOT- UNIT-1.pptx
VigneshRavi83
 

Similar to IOT-Monograph .docx (20)

IOT ajay binay.pdf
IOT ajay binay.pdfIOT ajay binay.pdf
IOT ajay binay.pdf
 
Iot
IotIot
Iot
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
UNIT 1.pdf
UNIT 1.pdfUNIT 1.pdf
UNIT 1.pdf
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
 
IOT_PPT.pptx
IOT_PPT.pptxIOT_PPT.pptx
IOT_PPT.pptx
 
Internet of things Unit I
Internet of things   Unit IInternet of things   Unit I
Internet of things Unit I
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
 
Iot
IotIot
Iot
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdf
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdf
 
IoT _protocols.ppt
IoT _protocols.pptIoT _protocols.ppt
IoT _protocols.ppt
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
 
Definition of Internet of things and introduction
Definition of Internet of things and introductionDefinition of Internet of things and introduction
Definition of Internet of things and introduction
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
IoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdfIoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdf
 
IOT- UNIT-1.pptx
IOT- UNIT-1.pptxIOT- UNIT-1.pptx
IOT- UNIT-1.pptx
 

More from parveen837153

Advanced Excel
Advanced ExcelAdvanced Excel
Advanced Excel
parveen837153
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
parveen837153
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
parveen837153
 
Introduction to CSS in HTML.ppt
Introduction to CSS in HTML.pptIntroduction to CSS in HTML.ppt
Introduction to CSS in HTML.ppt
parveen837153
 
Object Oriented Programming using C++.pptx
Object Oriented Programming using C++.pptxObject Oriented Programming using C++.pptx
Object Oriented Programming using C++.pptx
parveen837153
 
Unit I Advanced Java Programming Course
Unit I   Advanced Java Programming CourseUnit I   Advanced Java Programming Course
Unit I Advanced Java Programming Course
parveen837153
 

More from parveen837153 (6)

Advanced Excel
Advanced ExcelAdvanced Excel
Advanced Excel
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to CSS in HTML.ppt
Introduction to CSS in HTML.pptIntroduction to CSS in HTML.ppt
Introduction to CSS in HTML.ppt
 
Object Oriented Programming using C++.pptx
Object Oriented Programming using C++.pptxObject Oriented Programming using C++.pptx
Object Oriented Programming using C++.pptx
 
Unit I Advanced Java Programming Course
Unit I   Advanced Java Programming CourseUnit I   Advanced Java Programming Course
Unit I Advanced Java Programming Course
 

Recently uploaded

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

IOT-Monograph .docx

  • 1. 18UITE66 - INTERNET OF THINGS Prepared By Dr.S.SHAIK PARVEEN ASSISTANT PROFESSOR DEPARTMENT OF COMPUTER SCIENCE MANNAR THIRUMALAI NAICKER COLLEGE
  • 2. Unit I Introduction to Internet of things 1.1 Definition & Characteristics of IoT 1.2 Physical Designof IoT 1.3 Logical Designof IoT 1.4 IoT Enabling Technologies
  • 3. 1.1 Introduction ⚫ The Internet of Things represents the whole way from collecting data, processing it, taking an action corresponding to the signification of this data to storing everything in the cloud. All this is made possible by the internet ⚫ The Internet of things has become a very widely spread concept in the last few years. The reason for this is mainly the need to computerize and control most of the surrounding objects and have access to data in real time. ⚫ Example: Parking sensors, about phones which can check the weather and so on 1.1.1 Definition & Characteristics of IoT Definition: A dynamic global n/w infrastructure with self configuring capabilities based on standard and interoperable communication protocols where physical and virtual ―things‖ have identities, physical attributes and virtual personalities and use intelligent interfaces, and are seamlessly integrated into information n/w, often communicate data associated with users and their environments. Characteristics of IoT i) Dynamic & Self Adapting: IoT devices and systems may have the capability to dynamically adapt with the changing contexts and take actions based on their operating conditions, user‘s context or sensed environment. Eg: The surveillance system comprising of a number of surveillance cameras. The surveillance camera can adapt modes based on whether it is day or night. The surveillance system is adapting itself based on context and changing conditions. ii) Self Configuring: IOT devices have self configuring capability, allowing a large number of devices to work together to provide certain functionality. These devices have the ability configure themselves setup networking, and fetch latest software upgrades with minimal manual or user interaction. iii) Inter Operable Communication Protocols: support a number of interoperable communication protocols and can communicate with other devices and also with infrastructure. iv) Unique Identity: Each IoT device has a unique identity and a unique identifier(IP address).
  • 4. v) Integrated into Information Network: that allow them to communicate and exchange data with other devices and systems. Applications of IoT: 1.2 Physical Designof IoT 1.2.1 Things in IoT The things in IoT refers to IoT devices which have unique identities and perform remote sensing, actuating and monitoring capabilities. IoT devices can exchange data with other connected devices applications. It collects data from other devices and process data either locally or remotely. An IoT device may consist of several interfaces for communication to other devices both wired and wireless. These includes (i) I/O interfaces for sensors, (ii) Interfaces for internet connectivity memory and storage interfaces (iv) audio/video interfaces. The following diagram shows the block diagram of a IOT device. Home Cities Environment Energy Retail Logistics Agriculture Industry Health & Life Style
  • 5. IOT devices can also be of varied types for example wearable sensors, smart watches, LED lights, automobile and industrial machines. The following diagram shows different types of IOT devices. 1.2.2 IoT Protocols.
  • 6. The protocol consists of Link Layer, Network Layer, Transport Layer and Application Layer. The following diagram shows the IoT protocol structure. A) Link Layer Protocols determine how data is physically sent over the network‘s physical layer or medium. Local network connect to which host is attached. Hosts on the same link exchange data packets over the link layer using link layer protocols. Link layer determines how packets are coded and signaled by the h/w device over the medium to which the host is attached. Protocols: ● 802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer. Eg: 802.3 uses co-axial cable; 802.3i uses copper twisted pair connection; 802.3j uses fiber optic connection; 802.3ae uses Ethernet overfiber. ● 802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN) communication standards including extensive description of link layer. Eg: 802.11a operates in 5GHz band, 802.11b and 802.11g operates in 2.4GHz band, 802.11n operates in 2.4/5GHz band, 802.11ac operates in 5GHz band, 802.11ad operates in 60Ghzband. ● 802.16 - WiMax: IEEE802.16 is a collection of wireless broadband standards including exclusive description of link layer. WiMax provide data rates from 1.5 Mb/s to 1Gb/s. ● 802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless personal area network(LR-WPAN). Basis for high level communication
  • 7. protocols such as ZigBee. Provides data rate from 40kb/s to250kb/s. ● 2G/3G/4G-Mobile Communication: Data rates from 9.6kb/s(2G) to up to100Mb/s(4G). B) Network/Internet Layer Responsible for sending IP datagrams from source n/w to destination n/w. Performs the host addressing and packet routing. Datagrams contains source and destination address. Protocols: ● IPv4: Internet Protocol version4 is used to identify the devices on a n/w using a hierarchical addressing scheme. 32 bit address. Allows total of 2**32addresses. ● IPv6: Internet Protocol version6 uses 128 bit address scheme and allows 2**128 addresses. ● 6LOWPAN:(IPv6overLowpowerWirelessPersonalAreaNetwork)operates in 2.4 GHz frequency range and data transfer 250 kb/s. C) Transport Layer Provides end-to-end message transfer capability independent of the underlying n/w. Set up on connection with ACK as in TCP and without ACK as in UDP. Provides functions such as error control, segmentation, flow control and congestion control. Protocols: ● TCP: Transmission Control Protocol used by web browsers(along with HTTP and HTTPS), email(along with SMTP, FTP). Connection oriented and stateless protocol. IP Protocol deals with sending packets, TCP ensures reliable transmission of protocols in order. Avoids n/w congestion and congestion collapse. ● UDP: User Datagram Protocol is connectionless protocol. Useful in time sensitive applications, very small data units to exchange. Transaction oriented and stateless protocol. Does not provide guaranteed delivery. D) Application Layer: Defines how the applications interface with lower layer protocols to send data over the n/w. Enables process-to-process communication using ports. Protocols: ● HTTP: Hyper Text Transfer Protocol that forms foundation of WWW. Follow request- response model Stateless protocol. ● CoAP: Constrained Application Protocol for machine-to-machine(M2M) applications with constrained devices, constrained environment and constrained n/w. Uses client- server architecture. ● WebSocket: allows full duplex communication over a single socket connection.
  • 8. ● MQTT: Message Queue Telemetry Transport is light weight messaging protocol based on publish-subscribe model. Uses client server architecture. Well suited for constrained environment. ● XMPP: Extensible Message and Presence Protocol for real time communication and streaming XML data between network entities. Support client-server and server-server communication. ● DDS: Data Distribution Service is data centric middleware standards for device-to-device or machine-to-machine communication. Uses publish-subscribe model. ● AMQP: Advanced Message Queuing Protocol is open application layer protocol for business messaging. Supports both point-to-point and publish-subscribe model 1.3Logical Designof IoT The logical design of IoT refers to an abstract represent of entities and processes without going into the low level specifies of implementation. i) IoT Functional Blocks ii) IoT Communication Models iii) IoT Comm. APIs 1.3.1 IoT Functional blocks Provide the system the capabilities for identification, sensing, actuation, communication and management. ● Device: An IoT system comprises of devices that provide sensing, actuation, monitoring and control functions. ● Communication: handles the communication for IoT system. ● Services: for device monitoring, device control services, data publishing services and services for device discovery. ● Management: Provides various functions to govern the IoT system. ● Security: Secures IoT system and priority functions such as authentication, authorization, message and context integrity and data security.
  • 9. ● Application: IoT application provide an interface that the users can use to control and monitor various aspects of IoT system. 1.3.2 IoT Communication Models i) Request-Response ii) Publish-Subscribe iii)Push-Pull iv) Exclusive Pair i) Request-Response Model: In which the client sends request to the server and the server replies to requests. Is a stateless communication model and each request-response pair is independent of others. ii) Publish-Subscribe Model: Involves publishers, brokers and consumers. Publishers are source of data. Publishers send data to the topics which are managed by the broker. Publishers are not aware of the consumers. Consumers subscribe to the topics which are managed by the broker. When the broker receives data for a topic from the publisher, it sends the data to all the subscribed consumers. iii) Push-Pull Model:
  • 10. In which data producers push data to queues and consumers pull data from the queues. Producers do not need to aware of the consumers. Queues help in decoupling the message between the producers and consumers. iv)Exclusive Pair: It is bi-directional, fully duplex communication model that uses a persistent connection between the client and server. Once connection is set up it remains open until the client send a request to close the connection. Is a stateful communication model and server is aware of all the open connections. 1.3.3 IoT Communication APIs. i) REST based communication APIs(Request-Response BasedModel) ii) WebSocket based Communication APIs(Exclusive PairBasedModel)
  • 11. i) REST based communication APIs: Representational State Transfer(REST) is a set of architectural principles by which we can design web services and web APIs that focus on a system‘s resources and have resource states are addressed and transferred. The REST architectural constraints are as follows: The below figure shows the communication between client server with REST APIs Client-Server: The principle behind client-server constraint is the separation of concerns. Separation allows client and server to be independently developed and updated. Stateless: Each request from client to server must contain all the info. Necessary to understand the request, and cannot take advantage of any stored context on the server. Cache-able: Cache constraint requires that the data within a response to a request be implicitly or explicitly labeled as cache-able or non-cacheable. If a response is cache- able, then a client cache is given the right to reuse that response data for later, equivalent requests. Layered System: constraints the behavior of components such that each component cannot see beyond the immediate layer with which they are interacting. User Interface: constraint requires that the method of communication between a client and a server must be uniform.
  • 12. Code on Demand: Servers can provide executable code or scripts for clients to execute in their context. This constraint is the only one that is optional. The Request-Response model used by REST: RESTful web service is a collection of resources which are represented by URIs. RESTful web API has a base URI(e.g: http://example.com/api/tasks/). The clients and requests to these URIs using the methods defined by the HTTP protocol(e.g: GET, PUT, POST or DELETE). A RESTful web service can support various internet media types. B) WebSocket Based Communication APIs WebSocket APIs allow bi-directional, full duplex communication between clients and servers. WebSocket APIs follow the exclusive pair communication model.
  • 13. 1.4 IoT Enabling Technologies IoT is enabled by several technologies including Wireless Sensor Networks, Cloud Computing, Big Data Analytics, Embedded Systems, Security Protocols and architectures, Communication Protocols, Web Services, Mobile internet and semantic search engines. 1.4.1 Wireless Sensor Networks A wireless sensor network comprises of distributed devices with sensors which are used to monitor the environmental and physical conditions. A WSN consist of a number of end nodes and routers and a co-ordinator. The coordinator collects the data from all the nodes. Coordinator also acts as a gateway that connects the WSN to the internet. WSNs used in IoT systems are described as follows: ● Weather Monitoring System: in which nodes collect temp, humidity and other data, which is aggregated and analyzed. ● Indoor air quality monitoring systems: to collect data on the indoor air quality and concentration of various gases. ● Soil Moisture Monitoring Systems: to monitor soil moisture at various locations. ● Surveillance Systems: use WSNs for collecting surveillance data(motion data detection). ● Smart Grids : use WSNs for monitoring grids at various points. ● Structural Health Monitoring Systems: Use WSNs to monitor the health of structures(building, bridges) by collecting vibrations from sensor nodes deployed at various points in the structure.
  • 14. WSNs are enabled by wireless communication protocols such as IEEE 802.15.4. Zig Bee is one of the most popular wireless technologies used by WSNs .Zig Bee specifications are based on IEEE 802.15.4. Zig Bee operates 2.4 GHz frequency and offers data rates upto 250 KB/s and range from 10 to 100meters. 1.4.2 Cloud Computing Cloud computing is a transformative computing paradigm that involves delivering applications and services over the internet. Cloud computing involves provisioning of computing, networking and storage resources on demand and providing these resources as metered services to the users, in a “pay as you go”. Cloud computing resources can be provisioned on-demand by the users, without requiring interactions with the cloud service provider. The process of provisioning resources is automated. Cloud computing services are offered to users in different forms. ● Infrastructure-as-a-service(IaaS):Provides users the ability to provision computing and storage resources. These resources are provided to the users as a virtual machine instances and virtual storage. ● Platform-as-a-Service(PaaS): Provides users the ability to develop and deploy application in cloud using the development tools, APIs, software libraries and services provided by the cloud service provider. ● Software-as-a-Service(SaaS): Provides the user a complete software application or the user interface to the application itself. The cloud service provider manages the underlying cloud infrastructure including servers, network, operating systems, storage, and application software. 1.4.3 Big data Analysis Big data is defined as collections of data sets whose volume , velocity or variety is so large that it is difficult to store, manage, process and analyze the data using traditional databases and data processing tools. Some examples of big data generated by IoT are ● Sensor data generated by IoT systems. ● Machine sensor data collected from sensors established in industrial and energy systems. ● Health and fitness data generated IoT devices. ● Data generated by IoT systems for location and tracking vehicles. ● Data generated by retail inventory monitoring systems. The underlying characteristics of Big Data are
  • 15. Volume: There is no fixed threshold for the volume of data for big data. Big data is used for massive scale data. Velocity: Velocity is another important characteristics of Big Data and the primary reason for exponential growth of data. Variety: Variety refers to the form of data. Big data comes in different forms such as structured or unstructured data including test data, image , audio, video and sensor data . 1.4.4 Communication Protocols: Communication Protocols form the back-bone of IoT systems and enable network connectivity and coupling to applications. ● Allow devices to exchange data over network. ● Define the exchange formats, data encoding addressing schemes for device and routing of packets from source to destination. ● It includes sequence control, flow control and retransmission of lost packets. 1.4.5 Embedded Systems: Embedded Systems is a computer system that has computer hardware and software embedded to perform specific tasks. Key components of embedded system include microprocessor or micro controller, memory (RAM, ROM, Cache), networking units (Ethernet Wi-Fi Adaptor), input/output units (Display, Keyboard, etc..,) and storage (Flash memory). Embedded System range from low cost miniaturized devices such as digital watches to devices such as digital cameras, POS terminals, vending machines, appliances etc., Part A-Multiple Choice Questions [ Separately discussed ] Part B- 8 Marks 1. Define IOT and explain the characteristics of IoT. 2. Discuss the things in IoT. 3. Make note on IoT Functional Blocks 4. Make note on IoT communication APIs.
  • 16. Part C- 16 Marks 1. Elaborate the functions of IoT Protocols with block diagram. 2. Explain the Communication Models of IoT. 3. Describe the IoT enabling technologies in detail.
  • 17. Unit II IoT Levels & Deployment Templates 2.1 IoT Level-1 2.2 IoT Level-2 2.3 IoT Level -3 2.4 IoT Level-4 2.5 IoT Level-5 2.6 IoT Level -6. 2.7 IoT Physical Devices and Endpoints: IoT device 2.8 Basic Building Blocks of an IoT Device.
  • 18. 2.1 IoT Level-1 Level-1 IoT systems has a single node that performs sensing and/or actuation, stores data, performs analysis and host the application. Suitable for modeling low cost and low complexity solutions where the data involved is not big and analysis requirement are not computationally intensive. An e.g., of IoT Level1 is Home automation. The system consist of a single node that allows controlling the lights and appliances in a home the device used in this system interfaces with the lights and appliances using electronic rely switches. The status information of each light or appliances is maintained in a local database. REST services deployed locally allow retrieving and updating the state of each lighter appliance in the status database. The controller service continuously monitors the state of each light or appliance by retrieving the light from the database. 2.2 IoT Level-2 IoT Level2 has a single node that performs sensing and/or actuating and local analysis as shown in fig. Data is stored in cloud and application is usually cloud based. Level2 IoT systems are suitable for solutions where data are involved is big, however, the primary analysis requirement
  • 19. is not computationally intensive and can be done locally itself. An e,g., of Level2 IoT system for Smart Irrigation. The system consists of a single node that monitors the soil moisture level and controls the irrigation system. The device used system collects soil moisture data from sensors. The controller service continuously monitors the moisture level. A cloud based REST web service is used for storing and retrieving moisture data which is stored in a cloud database. A cloud based application is used for visualizing the moisture level over a period of time which can help in making decision about irrigation schedule. 2.3 IoT Level -3 This System has a single node. Data is stored and analyzed in the cloud application is cloud based as shown in fig. Level3 IoT systems are suitable for solutions where the data involved is big and analysis requirements are computationally intensive.
  • 20. The system consists of a single node that monitors the vibration levels for the package being shipped . The device in this system uses accelerometer and gyroscope sensor for monitoring vibration levels. The controller serves in the sensor data to the cloud in a real time using a websocket service. The data is stored in the cloud and also visualizing the cloud based applications . The analysis components in the cloud can trigger alerts if the vibration level becomes greater than the threshold. 2.4 IoT Level-4 This System has multiple nodes that perform local analysis. Data is stored in the cloud and application is cloud based as shown in fig. Level4 contains local and cloud based observer nodes which can subscribe to and receive information collected in the cloud from IoT devices. Level 4 IoT systems are suitable for solutions where multiple nodes are required, the data involved in big and the analysis requirements are computationally intensive. Example : IoT System for Noise Monitoring.
  • 21. The system consists of multiple nodes placed in different locations for monitoring noise levels in an area. The nodes in this example are equipped with sound sensors. Nodes are independent of each other. Each nodes runs its owner controller service that sends the data to the cloud . The data is stored in cloud database. The analysis of data collected from a number of nodes is done in the cloud. A cloud based application is used for visualizing the aggregated data. 2.5 IoT Level-5 System has multiple end nodes and one coordinator node as shown in fig. The end nodes that perform sensing and/or actuation. Coordinator node collects data from the end nodes and sends to the cloud. Data is stored and analyzed in the cloud and application is cloud based. Level5 IoT systems are suitable for solution based on wireless sensor network, in which data are high intensive. Example :IoT system for Forest Fire Detection. The system consists of multiple nodes placed in different locations for monitoring temperature, humidity and CO2 levels in a forest. The end nodes in this example are equipped with various
  • 22. sensors such as temperature, humidity and CO2. The coordinator node collects the data from the end nodes and act as a gateway that provides internet connectivity to the IoT system. The controller service on the coordinator device sends the collected data to the cloud. The data is stores in a cloud database. The analysis of data is done in the computing cloud to aggregate the data and make predictions. A cloud based applications is used for visualizing the data 2.6 IoT Level -6. System has multiple independent end nodes that perform sensing and/or actuation and sensed data to the cloud. Data is stored in the cloud and application is cloud based as shown in fig. The analytics component analyses the data and stores the result in the cloud data base. The results are visualized with the cloud based applications. The centralized controller is aware of the status of all endnodes and sends control commands to the nodes. Example weather monitoring system The system consists of multiple nodes placed in different locations for monitoring temperatures,humidity and pressure in an area.the end nodes are equipped with various sensors(such as temperature,humidity and pressure).the end nodes send the data to the cloud real- time using a websocket service.the data is stored in a cloud database. The analysis of data is done
  • 23. in a cloud to aggregate a data and make predictions.a cloud based application is used for visualizing the data. 2.7 IoT Physical Devices and Endpoints: IoT device ⚫ A "Thing" in Internet of Things (IoT) can be any object that has a unique identifier and which can send/receive data (including user data) over a network (e.g., smart phone, smartTV, computer, refrigerator, car, etc.). ⚫ IoT devices are connected to the Internet and send information about themselves or about their surroundings (e.g. information sensed by the connected sensors) over a network (to other devices or servers/storage) or allow actuation upon the physical entities/environment around them remotely. IoT Device Examples
  • 24. ⚫ A home automation device that allows remotely monitoring the status of appliances and controlling the appliances. ⚫ An industrial machine which sends information abouts its operation and health monitoring data to a server. ⚫ A car which sends information about its location to a cloud-based service. ⚫ A wireless-enabled wearable device that measures data about a person such as the number of steps walked and sends the data to a cloud-based service. 2.8 Basic Building Blocks of an IoT Device. ⚫ Sensing: Sensors can be either on-board the IoT device or attached to the device . IoT device can collect various types of information from the on board or attached sensors such as temperature, humidity, light intensity, etc ⚫ Actuation: IoT devices can have various types of actuators attached that allow taking actions upon the physical entities in the vicinity of the device. Example: A Relay switch connected to an IoT device can turn an appliance on/off based on the commands sent to the device. ⚫ Communication: Communication modules are responsible for sending collected data to other devices or cloud-based servers/storage and receiving data from other devices and commands from remote applications. ⚫ Analysis & Processing: Analysis and processing modules are responsible for making sense of the collected data Block Diagram of an IoT Device
  • 25. Expansions ⚫ USB Host-Universal Serial Bus Host ⚫ RJ 45/Ethernet- Component /Port ⚫ CPU- Central Processing Unit ⚫ GPU- Graphical Processor Unit ⚫ HDMI-High-Definition Multimedia Interface Splitter ⚫ RCA Video-Radio Corporation of America Community ⚫ UART- Universal Asynchronous Receiver Transmitter ⚫ SPI-Serial Peripheral Interface ⚫ I2C-Inter Integrated Circuit bus ⚫ CAN-Controller Area Network ⚫ SD-Secondary Storage ⚫ MMC-Multimedia Memory Cards. ⚫ SDIO-Secure Digital Input Output ⚫ NAND/ NOR- Logic Gates ⚫ DDR1/DDR2/DDR3-Double Data Rate Part A-Multiple Choice Questions
  • 26. [ Separately discussed ] Part B- 8 Marks 1. Elaborate the functions of IoT Level1 with diagram 2. Discuss the functions of IoT Level2 with diagram 3. Explain the functions of IoT Level5 with diagram 4. Describe the functions IoT Level6 with block diagram. Part C- 16 Marks 1. Elaborate the functions of IoT Level3 with diagram 2. Explain the functions IoT Level4 with block diagram. 3. Describe the basic building blocks of an IoT Device with diagram.
  • 27. Unit III Domain Specific IoTs: Introduction – Home Automation- Smart Lighting- Smart Appliances- Intrusion Detection-Smoke/ Gas Detectors. Cities– Smart Parking- SmartLighting- Smart roads– Structural Health Monitoring – Surveillance – Emergency Response. Environment – Weather Monitoring- Air Pollution Monitoring - Noise Pollution Monitoring - Forest Fire Detection – River Floods Detection- Energy- Retail- Logistics-Agriculture. Part A-Multiple Choice Questions [ Separately discussed ] Part B- 8 Marks 1. Discuss the application IoT in cities 2. Describe the application IoT in Retail 3. Explain the application IoT in Agriculture Part C- 16 Marks 1. Discuss the application IoT in Home automation. 2. Elaborate the application IoT in Environment. 3. Discuss in detail about the application IoT in Energy. 4. Brief note on the application of IoT in Logistics.
  • 28. Unit IV IoT and M2M & IoT System Management with NETCONF – YANG INTRODUCTION Machine-to-machine (M2M) is a technology that uses a device attached to a machine to capture an event which is relayed through a mobile phone or fixed line network to an application that translates the event into meaningful information. The Internet of Things (IoT) is the next generation of the Internet based on the Internet Protocol (IP). • Term which is often synonymous with IoT is Machine-to-Machine (M2M). • IoT and M2M are often used interchangeably. 4.1 M2M Machine-to-Machine (M2M) refers to networking of machines (or devices) for the purpose of remote monitoring and control and data exchange. M2M SystemArchitecture : The following diagram shows the end-to-end architecture of M2M systems comprises of M2M area networks, communication networks and application domain.
  • 29. ● An M2M area network comprises of machines ( or M2M nodes) which have embedded hardware modules for sensing, actuation and communication. ● Various communication protocols can be used for M2M LAN such as ZigBee, Bluetooth, M-bus, Wireless M-Bus, Powerline communication(PLC), 6LoWPAN, IEEE 802.15.4 etc.., These protocols provide connectivity between M2M nodes within an M2M area network. ● The communication network provides connectivity to remote M2M area networks.The communication network can use either wired or wireless network . While the M2M are networks use either proprietary or non-IP based communication protocols, the communication network uses IP-based network. Since non-IP based protocols are used within M2M area network, the M2M nodes within one network cannot communicate with nodes in an external network. ● To enable the communication between remote M2M are network, M2M gateways are used. Block diagram of an M2M gateway: The below diagram shows a block diagram of an M2M gateway. The communication between M2M nodes and the M2M gateway is based on the communication protocols which are naive to the M2M are network. M2M gateway performs protocol translations to enable IP-connectivity for M2M are networks. M2M gateway acts as a proxy performing translations from/to native protocols to/from Internet Protocol (IP). With an M2M gateway, each mode in an M2M area network appears as a virtualized node for external M2M area networks. M2M data is gathered into point solutions such as Enterprise applications, service management applications, Remote monitoring applications. M2M has various applications domain such as Smart metering, Home automation, Industrial automation, smart Grids etc.,. M2M solution designs (such as data collection and storage architecture and application apps) are specific to the M2M application domain.
  • 30. 4.2 Difference between IoT and M2M i)Communication Protocols: ● M2M and IoT can differ in how the communication between the machines or devices happens. ● Commonly uses M2M protocols include ZigBee, Bluetooth, ModBus, M-Bus, WirelessM-Bustec., ● In IoT uses HTTP, CoAP, WebSocket, MQTT,XMPP,DDS,AMQPetc., ● M2M uses either proprietary or non-IP based communication ● The focus of communication in M2M is usually on the protocols below the network layer. ● The focus of communication in IoT is usually on the protocols above the network layer. ● ii)Machines in M2M Vs Things inIoT: The “Things” in IoT refers to physical objects have unique identifier and can sense and communicate with their external environment and user applications or their inter physical state. The unique identifier for the things in IoT are the IP addresses MAC addresses. Things have software components for accessing and processing and storing sensor information, or controlling actuators connectors. • Machines in M2M will be homogenous whereas Things in IoT will be heterogeneous.(eg. Home automation, Fire alarms, Door Alarms, Lighting control devices etc.,. • M2M systems, in contrast to IoT, typically have homogeneous machine types within an M2M area network. iii) Hardware Vs Software Emphasis: The emphasis of M2M is more on hardware with embedded modules
  • 31. The emphasis of IoT is more on software. IOT spends specialized software for sensor data collection, Data analysis and interfacing with the cloud through IP based communications iv)Data Collection &Analysis •M2M data is collected in point solutions and often in on-premises storage infrastructure. •The data in IoT is collected in the cloud (can be public, private or hybrid cloud). The analytics components analyses the data and stores the result in the cloud database. The centralized IoT data and analysis result are visualized with the cloud based applications. The centralized controller is aware of the status of all the end nodes and sends control commands to the nodes. Observer nodes can process information. And use it for various applications, however observer nodes do not perform any control functions. v)Applications M2M data is collected in point solutions and can be accessed by on-premises applications such as diagnosis applications, service management applications, and on premises enterprise applications. • IoT data is collected in the cloud and can be accessed by cloud applications such as analytics applications, enterprise applications, remote diagnosis and management applications, etc. The scale of collected data in IoT is massive , cloud based real Time and batch data analysis framework are used for data analysis SDN and NFV for IoT 4.3 Software Defined Networking for IoT • Software Defined Networking(SDN) is a networking architecture that separates the control plane from the data plane and centralizes the network controller. • Software-based SDN controllers maintain a unified view of the network and make configuration, management and provisioning simpler. • The underlying infrastructure in SDN uses simple packet forwarding hardware as opposed to specialized hardware in conventional networks. • Control plane is the part of the network that carries the payload data traffic. Limitations of Conventional Network: i) Complex Network Devices: Conventional Network are getting increasingly complex with more and more protocols being implemented. To improve link speeds and reliability. Interoperability is limited due to the lack of standard and open interfaces . Network devices use proprietary hardware and software and have slow product life cycles limiting innovation. The conventional network were well suited for static traffic patterns and had large number of protocols designed for specific applications
  • 32. ii) Management Overhead: Conventional network involves significant management overhead. Network manager find it increasingly difficult to manage multiple network devices and interfaces from multiple vendors. Upgradation of network requires configuration changes in multiple devices (switches, routers, firewalls etc.,) iii) Limited Scalability: The virtualization technology used in cloud computing environment has increase the number of virtual host requiring network access. IoT applications hosted in the cloud are distributed across multiple virtual machines that require exchange of traffic. The analytics components of IoT applications run distributed algorithms on a large number of virtual machines and require huge amount of data exchange between virtual machines SDN Architecture Figure shows the SDN Architecture and SDN Layers in which the control and data planes are decoupled and the network controller is centralized
  • 33. Key elements of SDN: • Centralized Network Controller With decoupled control and data planes and centralized network controller, the network administrators can rapidly configure the network. SDN applications can be deployed through programmable open APIs. This speeds up innovation as the network administrator no longer need to wait for the device vendors to embed new features in their proprietary hardware • Programmable OpenAPIs SDN architecture supports programmable open APIs for interface between the SDN application and control layers (Northbound interface). With these open APIs various network services can be implemented, such as routing, quality of service (QOS) access control etc., • Standard Communication Interface(OpenFlow) SDN architecture uses a standard communication interface between the control and
  • 34. infrastructure layers (Southbound interface). OpenFlow, which is defined by the Open Networking Foundation (ONF) is the broadly accepted SDN protocol for the Southbound interface. With openflow, the forwarding plane of the network devices can be directly access and manipulated. Openflow uses the concept of flows to identify network traffic based on predefined match rules. Figure 1 Figure 2 Figure 1 shows the components of an Openflow switch comprising of one or more flow table and group table Figure 2 shows the example of Openflow table 4.4 Network Function Virtualization for IoT • Network Function Virtualization (NFV) is a technology that leverages virtualization to consolidate the heterogeneous network. • devices onto industry standard high volume servers, switches and storage. • NFV is complementary to SDN as NFV can provide the infrastructure on which SDN can run • NFV and SDN are mutually beneficial to each other but not dependent. • Network functions can be virtualized without SDN similarly SDN can run without NFV
  • 35. Key elements of NFV • Virtualized Network Function (VNF): VNF is a software implementation of a network function which is capable of running over the NFV Infrastructure (NFVI). • NFV Infrastructure (NFVI): NFVI includes compute, network and storage resources that are virtualized. • NFV Management and Orchestration: NFV Management and Orchestration focuses on all virtualization-specific management tasks and covers the orchestration and life-cycle management of physical and/or software resources that support the infrastructure virtualization, and the life-cycle management of VNFs. NFV Use Case ❑ NFV can be used to virtualize the Home Gateway. ❑ The NFV infrastructure in the cloud hosts a virtualized Home Gateway. ❑ The virtualized gateway provides private IP addresses to the devices in the home. ❑ The virtualized gateway also connects to network services such as VoIP and IPTV.
  • 36. ❑ 4.5 Need for IoT Systems Management 4.6 Simple Network Management Protocol (SNMP) 4.6.1 Limitations of SNMP 4.7 Network Operator Requirements 4.8 NETCONF 4.9YANG 4.10 IoT Systems Management with NETCONF – YANG. Part A-Multiple Choice Questions [ Separately discussed ] Part B- 8 Marks 1. Write a note on M2M system Architecture 2. Differentiate IoT and M2M in detail. 3. List the needs for IoT System Management. 4. Make a note on Simple Network Management Protocol 5. State the Limitations of SNMP 6. Explain the role of NETCONF in IoT 7. Explain the role of YANG in IoT https://www.jntumaterials.co.in/2015/10/introduction-to-data-mining-with-case-studies-by-gk-gupta- prentice-hall.html Part C- 16 Marks 1. Explain how Software Defined Networking can be used for various levels of IoT ? 2. Describe how NFV can be used for virtualizing IoT devices.
  • 37. 3. Brief overview of the Network Operator Requirements. 4. Elaborate IoT Systems Management with NETCONF YANG. Unit V IoT Platforms Design Methodology Introduction IoT system comprises of multiple components and deployment tier. IoT Design Methodology that includes: • Purpose & Requirements Specification • Process Specification • Domain Model Specification • Information Model Specification • Service Specifications • IoT Level Specification • Functional View Specification • Operational View Specification • Device & Component Integration • Application Development
  • 38. 5.1 Purpose &Requirements Specification The first step in IoT system design methodology is to define the purpose and requirements of the system. In this step, the system purpose, behavior and requirements (such as data collection requirements, data analysis requirements, system management requirements, data privacy and security requirements, user interface requirements, ...) are captured. • Applying this to our example of a smart home automation system, the purpose and requirements for the system may be described as follows: • Purpose : A home automation system that allows controlling of the lights in a home remotely using a web application. • Behavior : The home automation system should have auto and manual modes. In auto mode, the system measures the light level in the room and switches on the light when it gets dark. In manual mode, the system provides the option of manually and remotely switching on/off the light. • System Management Requirement : The system should provide remote monitoring
  • 39. and control functions. • Data Analysis Requirement : The system should perform local analysis of the data. • Application Deployment Requirement : The application should be deployed locally on the device, but should be accessible remotely. • Security Requirement : The system should have basic user authentication capability. 5.2 Process Specification 5.3 Domain Model Specification 5.4 Information Model Specification 5.5 Service Specifications The fifth step in the IoT design methodology is to define the service specifications. Service specifications define the services in the IoT system, service types, service inputs/output, service endpoints, service schedules, service preconditions and service effects. The following figures shows deriving the services from the process specification and information model for the home automation IoT system.
  • 40.
  • 41. From the process specification and information model we identify the states and attributes. For each state and attributes we define a service. These services either change a state or attribute values and are retrieve the current values. For example, the mode service sets mode to auto or manual or retrieves the current mode. The state services sets the light appliances state to ON or
  • 42. OFF. In the auto mode, the controller service monitors the light level in auto mode and switches the light ON or OFF and updates the status in the status database. In manual mode the controller service retrieves the current state from the database and switches the light ON or OFF. The figure deriving services from process specification and information model for home automation IoT system. Controller Service: In the auto mode, the controller service monitors the light level in auto mode and switches the light ON or OFF and updates the status in the status database. In manual mode the controller service retrieves the current state from the database and switches the light ON or OFF Mode Service: Sets mode to auto or manual or retrieves the current mode
  • 43. State Service: Sets the light appliances state to ON or OFF. 5.6 IoT Level Specification The sixth step in the IoT design methodology is to define the IoT level
  • 44. for the system. There are 6 IoT deployment levels. The following diagram shows deployment level of the home automation system of Level 1. 5.7 Functional View Specifications The seventh step in the IoT design methodology is to define the Functional View. The Functional View (FV) defines the functions of the IoT systems grouped into various Functional Groups (FGs). Each Functional Group either provides functionalities for interacting with
  • 45. instances of concepts defined in the Domain Model or provides information related to these concepts. The Functional Groups(FG) included in a Functional View include: Device: the device FG contains devices for monitoring and control. In the home automation example, the device FG includes a single board minicomputer, a light sensor and relay switch (actuator) Communication : The communication FG handles the communication for the IoT system. The communication FG includes the communication protocols that form the backbone of IoT systems and enable network connectivity. The communication API home automation example is a REST based APIs. Services : The service FG includes various services involved in the IoT system such as services for device monitoring , device control services , data publishing services and services for device discovery. In home automation example, there are two REST services (mode and state) and one native service (controller service). Management: the management FG includes all functionalities that are needed to configure and manage IoT System. Security: the security FG includes security mechanisms for the IoT system such as authentication, authorization , data security etc., Application :the application FG includes applications that provide an interface to the users to control and monitor various aspects of the IoT system. Applications also allow users to view the system status and the processed data.
  • 46. 5.8Operational View Specifications The eighth step in the IoT design methodology is to define the Operational View Specifications. In this step, various options pertaining to the IoT system deployment and operation are defined, such as, service hosting options, storage options, device options, application hosting options, etc The following figure shows an example of mapping functional groups to operational view specifications for IoT home automation system. Operational view specifications for the home automation example are as follows. Devices: Computing Device , Raspberry PI, Light dependent resistor (sensor), really switch (actuator) Communication APIs REST APIs Communication Protocols: Link Layer-802.11, Network Layer-IPv4/IPv6, Transport Layer –TCP, Application Layer- HTTP Services: i)Controller Service- Hosted on device, Implemented Python and run as a native service. ii)Mode Service-REST-ful web service, hosted on device, implemented with DJango – REST frame work. iii) State Service- RESTful REST-ful web service, hosted on device, implemented with Django – REST frame work. Application: i) Web Application- Django web application , ii)Application Server- Django App server iii) Database Server-MySQL Security: i) Authentication- Web App, Database ii) Authorization- Web App, Database Management: i) Application Management-Django App Management ii) Database Management- My SQL, DB Management iii)Device Management- Raspberry Pi Device Management.
  • 47. 5.9 Device & Component Integration The ninth step in the IoT design methodology is the integration of the devices and components. The following figure shows the schematic diagram of the IoT Home automation System. The devices and component used in this example are Raspberry Pi mini computer, LDR sensor and relay switch actuators. 5.10Application Development The final step in the IoT design methodology is to develop the IoT application. The following figure shows the screenshot of the home automation web application. The application has controls for the mode (auto ON or auto OFF) and the light ON or OFF. In the auto mode, the IoT system controls the light appliance automatically based on the lightning conditions in the room. When auto mode is enable, the light control in the application is disabled and reflects the current state of the light. When the auto mode is disabled, the light control is enabled and is used for manually controlling the light.
  • 48. • Auto • Controls the light appliance automatically based on the lighting conditions in the room Light • When Auto mode is off, it is used for manually controlling the light appliance. • When Auto mode is on, it reflects the current state of the light appliance. Part A-Multiple Choice Questions [ Separately discussed ] Part B- 8 Marks 1. Write about the Purpose &Requirements Specification of IoT Design Methodology 2. Detail about Process Specification of IoT Design Methodology 3. Brief about Information Model Specification of IoT Design Methodology 4. Describe Operational View Specifications of IoT Design Methodology 5. Make note on IoT Level Specification, Device & Component Integration and Application Development Part C- 16 Marks 1. Elaborate the functions of Domain Model Specification of IoT Design Methodology 2. Explain the Service Specifications of IoT Design Methodology 3. Describe the Functional View Specifications of IoT Design Methodology in detail.