The document discusses wireless sensor networks (WSN) and the Internet of Things (IoT). It defines WSN as a group of dedicated sensors that monitor the environment and organize data at a central location, with nodes routing traffic to reach a sink node without direct internet connection. IoT is defined as any physical object with sensors, processing, and internet connectivity that can exchange data over the internet. Key differences discussed are that in WSN nodes route to a sink node, while in IoT devices connect directly to the internet. The document also provides examples of IoT applications and discusses IoT characteristics, architecture, protocols, and definitions.
The document provides an overview of Internet of Things (IoT). It defines IoT, describes its architecture which includes sensing, network, data processing and application layers. It discusses advantages like improved customer engagement and reduced waste, and disadvantages like security and privacy concerns. It also outlines several application areas of IoT like smart homes, healthcare, manufacturing and smart cities. Specific examples of IoT applications in agriculture, transportation and energy are given. Finally, it discusses some popular IoT tools and platforms.
The document provides an overview of the Internet of Things (IoT). It defines IoT as a network of physical objects with embedded electronics, software, and sensors that can collect and exchange data. It describes the key features of IoT including AI, connectivity, sensors, and small devices. It also explains the architecture of IoT systems including the sensing, network, processing, and application layers. Finally, it discusses some common IoT tools and platforms and gives examples of IoT applications in various domains like smart homes, smart cities, smart farming, healthcare, and more.
The document defines the Internet of Things (IoT) and describes its key characteristics and components. The IoT refers to the network of physical objects embedded with sensors, software and other technologies to enable them to connect and exchange data with other devices and systems over the Internet. The main purpose of IoT devices is to generate real-time data that can be analyzed to create desired business outcomes. Common IoT devices include smart watches, refrigerators, security systems and more. The technologies that enable IoT include sensors, communication protocols, and data analytics software.
INTRODUCTION TO INTERNET OF THINGS
Evolution of Internet of Things – Enabling Technologies – IoT Architectures: oneM2M, IoT World Forum (IoTWF) and Alternative IoT Models – Simplified IoT Architecture and Core IoT Functional Stack – Fog, Edge and Cloud in IoT
The Internet of Things (IoT) is a network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity that allow these objects to collect and exchange data.
Why IoT?
With the development of technologies like M2M (machine-to-machine communication) and widespread of Internet, communication over long distance became possible.
This useful exchange of information across the globe with minimal human intervention led to an innovative concept called Internet of Things (IoT) where objects represent themselves as a digitally forming large network of connected devices that can communicate over the internet.
Components comprising IoT
IoT Hardware – These include sensors, micro-controller devices for control, servers, an edge or gateway.
IoT software – It includes mobile and web applications that are responsible for data collection, device integration, real-time analysis and application and process extension.
IoT Lifecycle
Collect: The life cycle of IoT starts with collecting data from different sources deployed in a particular region. These sources could be any sensors or device capable of transmitting data connected to a gateway. Data are efficiently collected and passed forward through a communication channel for analysis.
Communicate: This phase involves secure and reliable transfer of data. Routers, switches and firewall technologies play a vital role in establishing communication between devices. The Data is sent to the cloud or other data centers using the internet which is our major means of communication in IoT.
Analysis: This phase is an important part of the IoT lifecycle. In this phase data collected from different sensor devices are collected and analysed based on the use case to extract some useful output/information.
Action: This is the final stage of IoT lifecycle. Information obtained by the analysis of sensor data is acted upon and proper actions and measures are taken based on the analysis result.
The document outlines the syllabus for a course on Internet of Things (IoT) essentials. It covers 5 units: (1) an introduction to IoT including definitions, characteristics and protocols; (2) IoT design methodology and architecture; (3) elements and challenges of building IoT devices; (4) cloud offerings for IoT; and (5) applications of IoT such as retail, healthcare, transportation and smart cities. It also lists experiments and references books related to learning IoT.
Emerging chap asasasasasawwqwqwwqwewewr4.pptxmeharikiros2
The document discusses the Internet of Things (IoT). It defines IoT as a system of interrelated computing devices that are able to exchange data over networks without requiring human-to-human or human-to-computer interaction. It describes the key components of IoT including sensors, networks, data processing, and applications. It also covers the architecture of IoT systems and discusses how IoT works. Examples of IoT applications discussed include smart homes, smart cities, smart farming, healthcare, transportation, and more. Challenges and opportunities of IoT are also presented.
This document provides an overview of an IoT-based smart irrigation system. It begins with introductions to IoT, explaining what IoT is, why it is useful, and how IoT works. It then describes the key components used in an IoT system, including devices, gateways, cloud infrastructure, analytics, and user interfaces. Specific hardware and software used in the proposed smart irrigation system are also outlined, including sensors, microcontrollers, and programming languages. The document concludes with thanks.
The document provides an overview of Internet of Things (IoT). It defines IoT, describes its architecture which includes sensing, network, data processing and application layers. It discusses advantages like improved customer engagement and reduced waste, and disadvantages like security and privacy concerns. It also outlines several application areas of IoT like smart homes, healthcare, manufacturing and smart cities. Specific examples of IoT applications in agriculture, transportation and energy are given. Finally, it discusses some popular IoT tools and platforms.
The document provides an overview of the Internet of Things (IoT). It defines IoT as a network of physical objects with embedded electronics, software, and sensors that can collect and exchange data. It describes the key features of IoT including AI, connectivity, sensors, and small devices. It also explains the architecture of IoT systems including the sensing, network, processing, and application layers. Finally, it discusses some common IoT tools and platforms and gives examples of IoT applications in various domains like smart homes, smart cities, smart farming, healthcare, and more.
The document defines the Internet of Things (IoT) and describes its key characteristics and components. The IoT refers to the network of physical objects embedded with sensors, software and other technologies to enable them to connect and exchange data with other devices and systems over the Internet. The main purpose of IoT devices is to generate real-time data that can be analyzed to create desired business outcomes. Common IoT devices include smart watches, refrigerators, security systems and more. The technologies that enable IoT include sensors, communication protocols, and data analytics software.
INTRODUCTION TO INTERNET OF THINGS
Evolution of Internet of Things – Enabling Technologies – IoT Architectures: oneM2M, IoT World Forum (IoTWF) and Alternative IoT Models – Simplified IoT Architecture and Core IoT Functional Stack – Fog, Edge and Cloud in IoT
The Internet of Things (IoT) is a network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity that allow these objects to collect and exchange data.
Why IoT?
With the development of technologies like M2M (machine-to-machine communication) and widespread of Internet, communication over long distance became possible.
This useful exchange of information across the globe with minimal human intervention led to an innovative concept called Internet of Things (IoT) where objects represent themselves as a digitally forming large network of connected devices that can communicate over the internet.
Components comprising IoT
IoT Hardware – These include sensors, micro-controller devices for control, servers, an edge or gateway.
IoT software – It includes mobile and web applications that are responsible for data collection, device integration, real-time analysis and application and process extension.
IoT Lifecycle
Collect: The life cycle of IoT starts with collecting data from different sources deployed in a particular region. These sources could be any sensors or device capable of transmitting data connected to a gateway. Data are efficiently collected and passed forward through a communication channel for analysis.
Communicate: This phase involves secure and reliable transfer of data. Routers, switches and firewall technologies play a vital role in establishing communication between devices. The Data is sent to the cloud or other data centers using the internet which is our major means of communication in IoT.
Analysis: This phase is an important part of the IoT lifecycle. In this phase data collected from different sensor devices are collected and analysed based on the use case to extract some useful output/information.
Action: This is the final stage of IoT lifecycle. Information obtained by the analysis of sensor data is acted upon and proper actions and measures are taken based on the analysis result.
The document outlines the syllabus for a course on Internet of Things (IoT) essentials. It covers 5 units: (1) an introduction to IoT including definitions, characteristics and protocols; (2) IoT design methodology and architecture; (3) elements and challenges of building IoT devices; (4) cloud offerings for IoT; and (5) applications of IoT such as retail, healthcare, transportation and smart cities. It also lists experiments and references books related to learning IoT.
Emerging chap asasasasasawwqwqwwqwewewr4.pptxmeharikiros2
The document discusses the Internet of Things (IoT). It defines IoT as a system of interrelated computing devices that are able to exchange data over networks without requiring human-to-human or human-to-computer interaction. It describes the key components of IoT including sensors, networks, data processing, and applications. It also covers the architecture of IoT systems and discusses how IoT works. Examples of IoT applications discussed include smart homes, smart cities, smart farming, healthcare, transportation, and more. Challenges and opportunities of IoT are also presented.
This document provides an overview of an IoT-based smart irrigation system. It begins with introductions to IoT, explaining what IoT is, why it is useful, and how IoT works. It then describes the key components used in an IoT system, including devices, gateways, cloud infrastructure, analytics, and user interfaces. Specific hardware and software used in the proposed smart irrigation system are also outlined, including sensors, microcontrollers, and programming languages. The document concludes with thanks.
This document provides an overview of the Internet of Things (IoT). It begins by defining IoT and describing its key features such as artificial intelligence, connectivity, sensors, active engagement, and use of small devices. It then explains how IoT works and describes its architecture which includes sensing, network, data processing, and application layers. The document discusses the history of IoT and provides examples of its applications in various domains like smart homes, healthcare, transportation, and agriculture. It also outlines some of the pros and cons of IoT such as improved customer engagement but also security and privacy risks. In the end, the document discusses some IoT tools and platforms.
In this session, we will explore what IoT is and will explore the basics of edge and fog computing.
We will also explore the layered architecture of a standard IoT model in detail, followed by data processing models in IoT. We will also explore what should be the final outcome of an IoT based application.
Internet of Things - Recent developments and TrendsDennis Jacob
The document discusses Internet of Things (IoT), providing an introduction and overview. It defines IoT as the network of physical devices embedded with sensors and connectivity that allows them to exchange data via the internet. The document outlines some key enabling technologies for IoT like RFID, wireless sensor networks, middleware, and presentation tools. It also discusses some common challenges for IoT like security and privacy issues. Examples of major IoT applications are given in areas like smart cities, healthcare, home automation, and industrial control. In conclusion, the document states that IoT has the potential to enhance services across many sectors and will likely become widespread in the coming decade as the necessary technologies continue to develop.
IoT Introduction – From Concept to Reality.pdfSudhanshiBakre1
This document provides an introduction to IoT, including definitions and explanations of key concepts. It discusses what IoT is, the typical 4-layer architecture consisting of sensors/actuators, connectivity, data processing, and a user interface. It also covers IoT protocols, devices, software, and hardware. The overall goal is to explain the basic concepts and components that make up an IoT system and allow connected devices to communicate and share data.
The document discusses the topic of Internet of Things (IoT). It defines IoT as the interconnection of physical devices embedded with sensors, software and network connectivity. This enables the collection and sharing of data between these connected devices. Examples provided include smart home devices, wearable technologies, personal medical devices and autonomous vehicles. The document also outlines characteristics of IoT such as connectivity, identity, intelligence, dynamic nature, scalability, self-upgradation, architecture, security, network and data. It discusses the different layers of the IoT technology stack including the sensor layer, processing layer, hardware interface layer and others.
Introduction of Iot and Logical and Physical design of iotMayankKumar380505
The document discusses the design of Internet of Things (IoT) systems. It covers the physical design of IoT things and protocols. The physical design includes things in IoT and IoT protocols. IoT protocols operate at different layers - the link layer, network/internet layer, transport layer, and application layer. Common protocols discussed include 802.3, 802.11, IPv4, IPv6, TCP, UDP, HTTP, and CoAP. The document provides an overview of the key components and protocols involved in the design of IoT systems.
The Internet of Things (IoT) is a term that refers to the coming together of physical gadgets, social media, and cloud computing. It enables a network of connected devices to collect and share data on a scale never before seen. The Internet of Things is transforming our cities, homes, and even our bodies. Machines can now share personal data such as eating habits, medication adherence, and energy consumption enabling us to live healthier lives.
The document discusses the key components and technologies that enable the Internet of Things (IoT). It defines IoT as physical objects embedded with sensors and software that connect and exchange data over the internet. The main technologies that make IoT possible are sensors and actuators to interact with the physical world, various connectivity technologies, cloud computing infrastructure to store and analyze vast amounts of data, big data analytics tools to extract insights from data, and security technologies to protect connected devices and data.
it was the handout about AI hand out ppt.pptxugushe
The document discusses Internet of Things (IoT) and Artificial Intelligence (AI).
It defines IoT as the network of physical objects or 'things' embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data. It also states that IoT is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
It defines AI as the branch of computer science by which we can create intelligent machines which can behave like a human, think like humans, and able to make decisions. The
The document defines Internet of Things (IOT) and discusses enabling technologies such as wireless sensor networks, cloud computing, and embedded systems. It provides examples of IOT including connected cars, smart appliances, and healthcare monitors. Key aspects of IOT are that everyday physical objects are embedded with sensors and software to connect and exchange data with other devices and systems via the internet with little human involvement.
The document requests that study notes not be shared on messaging apps like WhatsApp or Telegram, as the organization generates revenue from ads on its website and app. This revenue funds new study materials and improves existing ones. If people do not use the website and app directly, it hurts the organization's revenue and may force it to close down services. It humbly requests that people stop sharing study materials on other apps and instead share the website URL.
The document discusses the Internet of Things (IoT). It provides definitions of IoT from various organizations and describes IoT as a network of physical devices embedded with sensors, software and network connectivity. These devices can collect and exchange data over the internet without human interaction. The document outlines the key components of IoT including sensing devices, network connectivity, data processing and applications. It also discusses the architecture of IoT devices and describes the various layers involved. Examples of application areas for IoT such as smart homes, healthcare and agriculture are provided. The benefits and challenges of IoT are summarized.
The document discusses the Internet of Things (IoT) and its impact. It begins by quoting the World Economic Forum that we are on the brink of a technological revolution through IoT that will fundamentally change how people live and work. IoT involves connecting physical devices to the internet and to each other. This allows for collection and sharing of data from billions of smart devices. The document then discusses how IoT is being used in various industries and provides examples of IoT applications for smart farming, elderly care, smart home devices, and more. It also outlines some of the advantages and disadvantages of IoT, such as improved customer engagement but also security and privacy concerns.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
internet of things(Architecture and components).pptxvikramkagitapu
The term IoT, or Internet of Things, refers to the collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves
This document provides an overview of Internet of Things (IoT). It defines IoT as an advanced automation and analytics system that exploits networking, sensing, big data, and artificial intelligence technology. Key features of IoT include artificial intelligence, connectivity, sensors, active engagement, and use of small devices. The document also discusses common IoT applications in various industries, key enabling technologies and protocols, hardware components, and disadvantages of IoT such as security, privacy, and complexity issues.
The document discusses the definition and applications of the Internet of Things (IoT). It defines IoT as the network of physical objects or "things" embedded with electronics, software and sensors to enable the collection and exchange of data over networks without human interaction. The document outlines several applications of IoT such as smart agriculture, where sensors can automatically control irrigation based on soil moisture levels. It also discusses challenges of IoT including security, privacy, complexity and compliance issues due to interconnected devices.
The document discusses the Internet of Things (IoT). It defines IoT as a network of physical objects embedded with software and sensors that allows them to connect, collect data and exchange information. The key components of an IoT framework are sensors/devices, connectivity, data processing, and a user interface. Some applications of IoT include smart thermostats, connected cars, and activity trackers. Benefits include technical optimization, improved data collection, reduced waste and better customer engagement, while challenges are security, privacy and complexity.
This document provides an introduction to Internet of Things (IoT), including potential application areas like smart cities and healthcare. It describes the characteristics of IoT systems like being dynamic, self-configuring, and having unique device identities. The "things" in IoT can be sensors, appliances, and vehicles that collect and exchange data. The IoT stack consists of layers including the physical sensor layer, network layer, and application layer. Enabling technologies that power IoT include sensors, cloud computing, embedded systems, and communication protocols. Challenges of IoT include security, privacy, connectivity and power requirements. IoT systems can operate at different levels from device connectivity to global integration. IoT is related to but broader than
Changing scenario in Cities in green technologyspreya772
The document discusses urban evolution and the need for transformation in town planning and area redevelopment projects. It covers key topics like changing infrastructure needs in cities, the importance of transportation and sustainable transportation networks, and concludes that future planning needs more compact, walkable, green and equitable cities. The presentation acknowledges the help of teachers, mentors and participants who contributed to the research. It also lists the names and member numbers of the group that worked on the project.
The document compares the sizes of mixed flow reactors (MFR) and plug flow reactors (PFR) for first and second order chemical reactions. For a given duty, the ratio of MFR and PFR sizes depends on the extent of reaction, stoichiometry, and form of the rate equation. For nth order reactions, the general rate expression is the change in concentration of reactant A over time, which equals the rate constant K times the concentration of reactant to the power of n, where n ranges from 0 to 3. The size comparison of MFR and PFR is considered for a constant density system where the density term εA is 0, and the rate expression can be integrated accordingly.
More Related Content
Similar to Module 1 Internet of Things (2).ppt.pdf on iot
This document provides an overview of the Internet of Things (IoT). It begins by defining IoT and describing its key features such as artificial intelligence, connectivity, sensors, active engagement, and use of small devices. It then explains how IoT works and describes its architecture which includes sensing, network, data processing, and application layers. The document discusses the history of IoT and provides examples of its applications in various domains like smart homes, healthcare, transportation, and agriculture. It also outlines some of the pros and cons of IoT such as improved customer engagement but also security and privacy risks. In the end, the document discusses some IoT tools and platforms.
In this session, we will explore what IoT is and will explore the basics of edge and fog computing.
We will also explore the layered architecture of a standard IoT model in detail, followed by data processing models in IoT. We will also explore what should be the final outcome of an IoT based application.
Internet of Things - Recent developments and TrendsDennis Jacob
The document discusses Internet of Things (IoT), providing an introduction and overview. It defines IoT as the network of physical devices embedded with sensors and connectivity that allows them to exchange data via the internet. The document outlines some key enabling technologies for IoT like RFID, wireless sensor networks, middleware, and presentation tools. It also discusses some common challenges for IoT like security and privacy issues. Examples of major IoT applications are given in areas like smart cities, healthcare, home automation, and industrial control. In conclusion, the document states that IoT has the potential to enhance services across many sectors and will likely become widespread in the coming decade as the necessary technologies continue to develop.
IoT Introduction – From Concept to Reality.pdfSudhanshiBakre1
This document provides an introduction to IoT, including definitions and explanations of key concepts. It discusses what IoT is, the typical 4-layer architecture consisting of sensors/actuators, connectivity, data processing, and a user interface. It also covers IoT protocols, devices, software, and hardware. The overall goal is to explain the basic concepts and components that make up an IoT system and allow connected devices to communicate and share data.
The document discusses the topic of Internet of Things (IoT). It defines IoT as the interconnection of physical devices embedded with sensors, software and network connectivity. This enables the collection and sharing of data between these connected devices. Examples provided include smart home devices, wearable technologies, personal medical devices and autonomous vehicles. The document also outlines characteristics of IoT such as connectivity, identity, intelligence, dynamic nature, scalability, self-upgradation, architecture, security, network and data. It discusses the different layers of the IoT technology stack including the sensor layer, processing layer, hardware interface layer and others.
Introduction of Iot and Logical and Physical design of iotMayankKumar380505
The document discusses the design of Internet of Things (IoT) systems. It covers the physical design of IoT things and protocols. The physical design includes things in IoT and IoT protocols. IoT protocols operate at different layers - the link layer, network/internet layer, transport layer, and application layer. Common protocols discussed include 802.3, 802.11, IPv4, IPv6, TCP, UDP, HTTP, and CoAP. The document provides an overview of the key components and protocols involved in the design of IoT systems.
The Internet of Things (IoT) is a term that refers to the coming together of physical gadgets, social media, and cloud computing. It enables a network of connected devices to collect and share data on a scale never before seen. The Internet of Things is transforming our cities, homes, and even our bodies. Machines can now share personal data such as eating habits, medication adherence, and energy consumption enabling us to live healthier lives.
The document discusses the key components and technologies that enable the Internet of Things (IoT). It defines IoT as physical objects embedded with sensors and software that connect and exchange data over the internet. The main technologies that make IoT possible are sensors and actuators to interact with the physical world, various connectivity technologies, cloud computing infrastructure to store and analyze vast amounts of data, big data analytics tools to extract insights from data, and security technologies to protect connected devices and data.
it was the handout about AI hand out ppt.pptxugushe
The document discusses Internet of Things (IoT) and Artificial Intelligence (AI).
It defines IoT as the network of physical objects or 'things' embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data. It also states that IoT is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
It defines AI as the branch of computer science by which we can create intelligent machines which can behave like a human, think like humans, and able to make decisions. The
The document defines Internet of Things (IOT) and discusses enabling technologies such as wireless sensor networks, cloud computing, and embedded systems. It provides examples of IOT including connected cars, smart appliances, and healthcare monitors. Key aspects of IOT are that everyday physical objects are embedded with sensors and software to connect and exchange data with other devices and systems via the internet with little human involvement.
The document requests that study notes not be shared on messaging apps like WhatsApp or Telegram, as the organization generates revenue from ads on its website and app. This revenue funds new study materials and improves existing ones. If people do not use the website and app directly, it hurts the organization's revenue and may force it to close down services. It humbly requests that people stop sharing study materials on other apps and instead share the website URL.
The document discusses the Internet of Things (IoT). It provides definitions of IoT from various organizations and describes IoT as a network of physical devices embedded with sensors, software and network connectivity. These devices can collect and exchange data over the internet without human interaction. The document outlines the key components of IoT including sensing devices, network connectivity, data processing and applications. It also discusses the architecture of IoT devices and describes the various layers involved. Examples of application areas for IoT such as smart homes, healthcare and agriculture are provided. The benefits and challenges of IoT are summarized.
The document discusses the Internet of Things (IoT) and its impact. It begins by quoting the World Economic Forum that we are on the brink of a technological revolution through IoT that will fundamentally change how people live and work. IoT involves connecting physical devices to the internet and to each other. This allows for collection and sharing of data from billions of smart devices. The document then discusses how IoT is being used in various industries and provides examples of IoT applications for smart farming, elderly care, smart home devices, and more. It also outlines some of the advantages and disadvantages of IoT, such as improved customer engagement but also security and privacy concerns.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
internet of things(Architecture and components).pptxvikramkagitapu
The term IoT, or Internet of Things, refers to the collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves
This document provides an overview of Internet of Things (IoT). It defines IoT as an advanced automation and analytics system that exploits networking, sensing, big data, and artificial intelligence technology. Key features of IoT include artificial intelligence, connectivity, sensors, active engagement, and use of small devices. The document also discusses common IoT applications in various industries, key enabling technologies and protocols, hardware components, and disadvantages of IoT such as security, privacy, and complexity issues.
The document discusses the definition and applications of the Internet of Things (IoT). It defines IoT as the network of physical objects or "things" embedded with electronics, software and sensors to enable the collection and exchange of data over networks without human interaction. The document outlines several applications of IoT such as smart agriculture, where sensors can automatically control irrigation based on soil moisture levels. It also discusses challenges of IoT including security, privacy, complexity and compliance issues due to interconnected devices.
The document discusses the Internet of Things (IoT). It defines IoT as a network of physical objects embedded with software and sensors that allows them to connect, collect data and exchange information. The key components of an IoT framework are sensors/devices, connectivity, data processing, and a user interface. Some applications of IoT include smart thermostats, connected cars, and activity trackers. Benefits include technical optimization, improved data collection, reduced waste and better customer engagement, while challenges are security, privacy and complexity.
This document provides an introduction to Internet of Things (IoT), including potential application areas like smart cities and healthcare. It describes the characteristics of IoT systems like being dynamic, self-configuring, and having unique device identities. The "things" in IoT can be sensors, appliances, and vehicles that collect and exchange data. The IoT stack consists of layers including the physical sensor layer, network layer, and application layer. Enabling technologies that power IoT include sensors, cloud computing, embedded systems, and communication protocols. Challenges of IoT include security, privacy, connectivity and power requirements. IoT systems can operate at different levels from device connectivity to global integration. IoT is related to but broader than
Similar to Module 1 Internet of Things (2).ppt.pdf on iot (20)
Changing scenario in Cities in green technologyspreya772
The document discusses urban evolution and the need for transformation in town planning and area redevelopment projects. It covers key topics like changing infrastructure needs in cities, the importance of transportation and sustainable transportation networks, and concludes that future planning needs more compact, walkable, green and equitable cities. The presentation acknowledges the help of teachers, mentors and participants who contributed to the research. It also lists the names and member numbers of the group that worked on the project.
The document compares the sizes of mixed flow reactors (MFR) and plug flow reactors (PFR) for first and second order chemical reactions. For a given duty, the ratio of MFR and PFR sizes depends on the extent of reaction, stoichiometry, and form of the rate equation. For nth order reactions, the general rate expression is the change in concentration of reactant A over time, which equals the rate constant K times the concentration of reactant to the power of n, where n ranges from 0 to 3. The size comparison of MFR and PFR is considered for a constant density system where the density term εA is 0, and the rate expression can be integrated accordingly.
This document discusses the current scenario of green technology in cities, including challenges like air and water pollution, traffic congestion, and high energy consumption faced by growing urban areas. It outlines new trends in green building design, electric vehicles, and renewable energy sources. Examples are given of cities that have successfully implemented green transportation systems and harnessed renewable energy. The impact of green technology on reducing emissions and costs while creating jobs is described. The road ahead involves cities setting ambitious sustainability targets and advancing new technologies to create greener spaces and a more sustainable future through action, incentives, collaboration and innovation.
Machine-to-machine (M2M) communication allows devices to exchange information and take actions without human intervention. M2M happens through both wired and wireless connections and is used across various applications like security, tracking, payments, health monitoring, and facility management. The core components of an M2M system include M2M devices, area networks to connect devices, gateways that enable communication to networks, communication networks themselves, and applications that make use of the collected data.
Density measurements Melt flow index test and carbon black test of HDPE Pipespreya772
This document discusses a study to investigate the density, melt flow index (MFI), and carbon black content of high-density polyethylene (HDPE) pipes under different conditions and parameters. The study aims to determine the relationship between these properties and the performance of HDPE pipes. Specifically, it will examine how density, MFI, and carbon black content are affected by temperature, load, molecular weight, and processing conditions. The findings will provide insights into optimizing HDPE pipe design and performance for various applications. Standard methods are described for preparing HDPE pipe specimens and conducting tests to analyze density, MFI, and carbon black content.
To study the density MFI And Carbon black content of HDPE raw materialsspreya772
High density polyethylene to study the density, Melt flow index carbon black content of high-density polyethylene raw materials at different parameters and different conditions and different environmental conditions
TO STUDY DENSITY,Melt flow index and carbon black content of HDPE pipesspreya772
This document describes a study to investigate how density, melt flow index (MFI), and carbon black content of polyethylene (PE) raw materials are affected by different conditions and parameters. The study uses techniques like density measurement, melt flow testing, and thermogravimetric analysis to evaluate PE samples prepared under different conditions. The results show that factors like temperature, pressure, and additives significantly influence the density, MFI, and carbon black content of PE. The findings provide insights into optimizing PE production and developing new PE products with enhanced properties.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Module 1 Internet of Things (2).ppt.pdf on iot
1. WSN: Things (sensor nodes) connected without a wire to gather some data.
Wireless sensor network (WSN) refers to a group of dedicated sensors for monitoring and recording
the physical conditions of the environment and organizing the collected data at a central location.
Nodes are not directly connected to the Internet. Nodes route traffic to reach the sink node.
WSN is sometime referred to as a subset of IoT.
Wireless Sensor Network
2. IOT: WSN + Any physical object (Thing) + IP address + Internet + App + Cloud computing+ etc…
Sensors send their data directly to the Internet because they have Internet Connection. The Internet
of things (IoT) is the network of physical devices, vehicles, home appliances, and other items
embedded with electronics, software, sensors, actuators, and connectivity which enable these
objects to connect and exchange data.
Each thing is uniquely identifiable through its embedded computing system but is able to inter-
operate within the existing Internet infrastructure.
All sensor data further processed and analyzed in the data analyzing area.
The Internet of things (IoT)
3. The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital
machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to
transfer data over a network without requiring human-to-human or human-to-computer interaction.
The Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded
with sensors, software, and other technologies for the purpose of connecting and exchanging data with
other devices and systems over the internet.
The Internet of things (IoT) describes physical objects (or groups of such objects) with sensors,
processing ability, software, and other technologies that connect and exchange data with other devices
and systems over the Internet or other communications networks.
The Internet of Things (IoT) is a network of physical objects that are fitted with sensors, software and
other technologies. Connected to the Internet, these ‘things’ are able to exchange real time data with
other connected devices and systems over networks. These connected devices combine with
automated systems to gather IoT data that can be analysed to assist with tasks or learn how to
improve a process.
IoT Definitions
4. • While the Carnegie mellon University’s vending machine was installed in 1982, this can’t really be
called the start of the IoT as a whole.
• The notion of the IoT was created in 1991 and further developed through the 1990s with Reza Raji
describing the concept at the IEEE Spectrum in 1994.
• The actual term ‘the Internet of Things’ was created by Kevin Ashton in 1999, although the time
when objects were connected directly to the Internet really began between 2008 and 2009.
• With more than 7 billion connected IoT devices today, experts are expecting this number to grow to
10 billion by 2020 and 22 billion by 2025. Oracle has a network of device partners.
IoT Definitions
5. IoT Characteristics
Connectivity –
Connectivity is an important requirement of the IoT infrastructure. Things of IoT should be connected to
the IoT infrastructure. Anyone, anywhere, anytime can connect, this should be guaranteed at all times.
Intelligence and Identity
The extraction of knowledge from the generated data is very important.
Scalability
With the growing ubiquity of the Internet of Things, it has become increasingly important to consider
scalability in your system design. Scalability is often defined as the ability of a system to grow without
affecting its performance. This can be achieved by adding more hardware resources or by adding
additional software layers to an existing system.
The data generated as an outcome is enormous, and it should be handled appropriately.
Dynamic and Self-Adapting (Complexity)
IoT devices should dynamically adapt themselves to the changing contexts and scenarios.
6. IoT Characteristics
Architecture – Common Ecosystem
In the internet of things, there are many manufacturers and products that are using the architecture to
support their own devices. With the increase in the number of devices, the importance of the
architecture is heterogeneous (ability to support diverse technologies, protocols, and devices).
The architecture is mostly responsible for making sure that the devices work together and communicate
with each other. It also is a key component in ensuring that the devices do not interfere with each other.
Self Configuring – This is one of the most important characteristics of IoT. IoT devices are able to
upgrade their software in accordance with requirements with a minimum of user participation.
Additionally, they can set up the network, allowing for the addition of new devices to an already-existing
network.
Unique Identity of Things
Identity is the unique characteristic of a person, group, place, or thing. Every identity has a name and
an identification number. Identity is a concept that is found in many aspects of IoT. Device Identity is the
one thing that makes an IoT device unique and identifiable. Identity can be used to distinguish between
different devices, give them a name, and allow them to be controlled.
7. Smart Home
Smart Lightening
Smart Appliances
Intrusion Detection
Smoke/Gas Detection
Smart Cities
Smart Parking
Smart Road
Structural Health Monitoring
Emergency Response
Smart Environment
Weather Monitoring
Air Pollution Monitoring
Noise Pollution Monitoring
Forest Fire Detection
Smart Energy
Smart Grids
Renewable Energy Systems
Prognostics
Smart Retail
Inventory Management
Smart Payments
Smart Vending Machine
Smart Logistics
Route Generation and Scheduling
Fleet Tracking
Ship Monitoring
Remote Vehicle Diagnostics
Smart Agriculture
Smart Irrigation
Green House Control
Pest Spraying Control
Plants Disease Detection
Smart Industry
Machine Diagnosis & Prognosis
IoT Applications
8.
9. IoT Architecture
An IoT architecture is a mix of hardware and software components that interact together to make up a
smart cyber-digital system. Interoperating with one another, these components make up a base for an
IoT solution to be built upon. Before we dive into the details, let’s get things straight: there’s no one-
size-fits-all approach to designing an IoT architecture. Still, the basic layout stays largely the same no
matter the solution.
10. • Devices: This stage is about the actual devices in the IoT solutions. These devices could be
sensors or actuators in the Perception layer. Those devices will generate data (in the case of
sensors) or act on their environment (in the case of actuators). The data produced is converted in a
digital form and transmitted to the internet gateway stage. Unless a critical decision must be made,
the data is typically sent in a raw state to the next stage due to the limited resources of the devices
themselves.
IoT Architecture
11. • Internet gateways: The internet gateway stage will receive the raw data from the devices and pre-
process it before sending it to the cloud. This internet gateway could be physically attached to the
device or a stand-alone device that could communicate with sensors over low power networks and
relay the data to the internet.
• Edge or fog computing: In order to process data as quickly as possible, you might want to send
your data to the edge of the cloud. This will let you analyze the data quickly and identify if something
requires immediate attention. This layer typically would only be concerned with recent data that is
required for time-critical operations. Some pre-processing might be done at this stage, too, to limit
the data that is ultimately transferred to the cloud.
• Cloud or data center: In this final stage, the data is stored for later processing. The application and
business layers live in this stage, where dashboards or management software can be fed through
the data stored in the cloud. Deep analysis or resource-intensive operations such as machine
learning training will happen at this stage.
IoT Architecture
12. An IoT application structure have basically four design paradigms.
1. Physical Design
• IoT Device
• IoT Layer Architectures (Protocols)
2. Logical Design
• IoT Functional Blocks
• IoT Communication Models
• IoT Communication APIs
3. IoT Enabling Technologies
• Wireless Sensor Networks
• Cloud Computing
• Big Data Analytics
• Communication Protocols
• Embedded System
• Artificial Intelligence & Machine Learning
IoT Designing
14. IoT Things:
The things in IoT refers to IoT devices which have unique identities and perform remote sensing,
actuating and monitoring capabilities. IoT devices can exchange data with other connected devices
applications. It collects data from other devices and process data either locally or remotely.
An IoT device may consist of several interfaces for communication to other devices both wired and
wireless. These includes
(i) I/O interfaces for sensors,
(ii) Interfaces for internet connectivity
(iii) Memory and storage interfaces
(iv) Audio/Video interfaces.
IoT Physical Design
15. UART/RS232 - UART is usually an individual (or part of an) integrated circuit (IC) used for serial
communications over a computer or peripheral device serial port. One or more UART peripherals are
commonly integrated in microcontroller chips. Specialized UARTs are used for automobiles, smart cards and
SIMs.
SPI - Serial peripheral interface (SPI) is one of the most widely used interfaces between microcontroller and
peripheral ICs such as sensors, ADCs, DACs, shift registers, SRAM, and others.
I2C—Shorthand for inter-integrated circuit or I squared C, this is a low-speed serial bus that is used for
sending data from one chip to another on the same PC board or over short cables between two pieces of
equipment. I2C combines the best features of SPI and UARTs. With I2C, you can connect multiple slaves to a
single master (like SPI) and you can have multiple masters controlling single, or multiple slaves. This is really
useful when you want to have more than one microcontroller logging data to a single memory card or displaying
text to a single LCD.
CAN Controller Area Network Interface Bus (CAN)—This is controller area network serial bus in an interface
used to link micros together in small networks. It is used in automotive and industrial applications. The usual cable
is twisted pair and a ground. Speeds range from 10 kbps to 1 Mbps with 20 kbps being typical. The data is sent in
specifically formatted frames as determined by a standard protocol. It uses start and stop bits like the RS-232 and
some similar control codes defined in ASCII. It also includes error detection and correction capability, so it is very
reliable.
IoT Physical Design
18. Powering Alternatives
Arduino boards have five options in which they can be powered:
1. Powering via USB connector
2. Powering via the onboard barrel jack connector (if available on the board)
3. Powering via the onboard battery connector (if available on the board)
4. Powering via the VIN (Voltage In) pin
5. Powering via the 3V3/5V pin*
*Powering your board via the 3V3/5V pins is not recommended, as it can damage your board's voltage regulator.
Powering via USB connector
The USB connector provides a regulated 5V line to power the board's electronics. However, 5V from the USB
connector can also power external components through the 5V pin that can be found in Arduino boards.
Arduino boards that run at 5V use the USB-regulated 5V line directly, boards that run at 3V3 regulate the 5V
line from the USB connector to 3V3 using their onboard voltage regulator. Output current rating from the 5V pin
will vary, depending on the 5V power source.
Current from USB ports of computers is usually limited to 500mA.
IoT Physical Design
19. Powering via the onboard barrel jack connector (if available on the board)
The voltage line from the barrel jack connector is regulated in Arduino boards using their onboard voltage
regulator; usually, it is first regulated to 5V and then regulated again to 3V3 in most Arduino boards.
The recommended voltage and current ratings for external regulated DC power supplies connected to the
barrel jack connector are summarized in the table below:
IoT Physical Design
Board
External
Power Supply
Voltage (V)
External Power
Supply Current (A)
Arduino UNO Rev3 7-12 1
Arduino UNO WiFi Rev2 7-12 1.5
Arduino Leonardo 7-12 1
Arduino Mega 2560 Rev3 7-12 1
Arduino Due 7-12 1.5
Arduino Zero 5-18 1
20. Powering via the onboard battery connector (if available on the board)
Some Arduino boards have an onboard battery connector to connect a battery to the board and use it as its
primary or secondary power supply. The Arduino boards with an onboard battery connector are the following:
• Arduino Portenta H7
• Arduino Nicla Sense ME
• Arduino Nicla Vision
• Arduino MKR NB 1500
• Arduino MKR Vidor 4000
• Arduino MKR WiFi 1010
• Arduino MKR ZERO
• Arduino MKR WAN 1310
• Arduino MKR GSM 1400
Pro family boards use a 3-pin, 1.2mm SMD ACH battery connector; MKR family boards use a 2-pin, 2mm SMD PH
battery connector.
IoT Physical Design
Battery connector of the Arduino MKR WAN 1310 board
21. Powering via the VIN (Voltage In) pin
The VIN pin in Arduino boards is a power pin with a dual function.
This pin can work as a voltage input for regulated external power
supplies that do not use a barrel jack connector.
This pin can also work as a voltage output when an external power supply is
connected to the barrel jack connector present in some Arduino boards.
An important consideration is that the VIN pin is connected directly to the input
pin of the onboard voltage regulator on Arduino boards.
Since the VIN pin is directly connected to the voltage regulator, the VIN pin
does not have reverse polarity protection.
Use the VIN pin carefully to avoid damaging your Arduino board since it does not
have reverse polarity protection.
The minimum and maximum voltages that can be applied to the VIN pin are
determined by the onboard voltage regulator on Arduino boards, varying from
board to board. Those voltages are summarized in the table below:
IoT Physical Design
Board VIN Voltage (V)
UNO Mini 5-18
UNO Rev3 7-12
UNO WiFi Rev2 7-12
UNO Rev3 SMD 7-12
Leonardo 7-12
Mega 2560 Rev3 7-12
Due 7-12
Micro 7-12
Zero 5-18
Portenta H7 5
Nicla Sense ME 5
Nano RP2040
Connect
5-18
MKR NB 1500 5-7
MKR GSM 1400 5-7
MKR Vidor 4000 5-7
MKR WiFi 1010 5-7
MKR Zero 5-5.5
MKR1000 WIFI 5-5.5
MKR WAN 1300 5-5.5
MKR WAN 1310 5-7
Nano 7-12
Nano Every 7-18
Nano 33 IoT 5-18
Nano 33 BLE 5-18
Nano 33 BLE Sense 5-18
22. IoT Protocols
Link Layer
Protocols determine how data is physically sent over the network’s physical layer or medium. Local
network connect to which host is attached. Hosts on the same link exchange data packets over the link
layer using link layer protocols. Link layer determines how packets are coded and signalled by the h/w
device over the medium to which the host is attached.
IoT Physical Design
23. Protocols:
802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer. E.g.:
o 802.3 uses co-axial cable;
o 802.3i uses copper twisted pair connection;
o 802.3j uses fiber optic connection;
o 802.3ae uses Ethernet over fiber.
802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN) communication standards
including extensive description of link layer. E. g.
o 802.11a operates in 5GHz band,
o 802.11b and 802.11g operates in 2.4GHz band,
o 802.11n operates in 2.4/5GHz band,
o 802.11ac operates in 5GHz band,
o 802.11ad operates in 60Ghz band.
802.16 - WiMAX: IEEE802.16 is a collection of wireless broadband standards including exclusive
description of link layer. WiMAX provide data rates from 1.5 Mb/s to 1Gb/s.
IoT Physical Design
24. 802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless personal area
network (LR-WPAN). Basis for high level communication protocols such as ZigBee. Provides data
rate from 40kb/s to 250kb/s. These communications provide low cost and low speed
communication for power constrained devices.
2G/3G/4G-Mobile Communication: These are the different generations of mobile communications
standards:
o 2G including GSM and CDMA,
o 3G including UMTS and CDMA3000,
o 4G including LTE,
o Data rates from 9.6kb/s(2G) up to100Mb/s(4G).
IoT Physical Design
25. LoRa
LoRa, which is an abbreviation of “long range”, from RF technology for an LPWAN.
LoRa is one of the most prominent wireless technologies in the low-power wide-area network
(LPWAN) family.
LoRa is a patented energy-efficient wireless communication protocol that achieves very low-power
and very long-range transmissions, of over 10 km in line-of-sight, trading-off data rate, and time-on-
air.
LoRa’s duty cycle is limited by regional regulations because it operates using unlicensed sub-GHz
radio bands, mostly on the 433, 868, and 915 MHz frequency bands.
The data transmission rate supported by LoRa varies from 300 bps to 50 kbps, depending on
spreading factor (SF) and channel bandwidth settings.
Taking into account this and the low-transmission bandwidth, LoRa is naturally most suitable for
applications where transmissions are sparse in time and payloads are relatively small.
IoT Physical Design
26. Network/Internet Layer:
Responsible for sending IP datagrams from source network to destination network. Performs the host
addressing and packet routing. Datagrams contains source and destination address.
Protocols:
IPv4: Internet Protocol version4 is used to identify the devices on a n/w using a hierarchical
addressing scheme. 32-bit address. Allows total of 232addresses. These addresses got exhausted in
the year of 2011. IPv4 has been succeeded by IPv6. IP protocols establish connection over packet
networks, but do not guarantee delivery of packets.
IPv6:It is newest version of IPv4. Internet Protocol version6 uses 128-bit address scheme and
allows 2128 addresses.
6LOWPAN:(IPv6 over Low Power Wireless Personal Area Network) operates in 2.4 GHz frequency
range and data transfer 250 kb/s. It brings IP protocol for low power devices having limited
processing capability.
IoT Physical Design
27. Transport Layer:
Provides end-to-end message transfer capability independent of the underlying n/w. Set up on
connection with ACK as in TCP and without ACK as in UDP. Provides functions such as error control,
segmentation, flow control and congestion control.
Protocols:
TCP: Transmission Control Protocol used by web browsers (along with HTTP and HTTPS),
email(along with SMTP, FTP). Connection oriented and stateless protocol. IP Protocol deals with
sending packets, TCP ensures reliable transmission of protocols in order. TCP also provides the error
detection capability so that duplicate packets can be discarded and loss packets are retransmitted.
Avoids n/w congestion and congestion collapse. It also ensures flow control to adjust the mismatch of
transmission and receiving speed of sender and receiver.
UDP: User Datagram Protocol is connectionless protocol. Useful in time sensitive applications, very
small data units to exchange. Transaction oriented and stateless protocol. Does not provide
guaranteed delivery, ordering of messages and duplicate elimination.
28. Application Layer:
Defines how the applications interface with lower layer protocols to send data over the n/w. Enables
process-to-process communication using ports.
HTTP
Hyper Text Transfer Protocol that forms foundation of WWW.
Follow request response model Stateless protocol.
It was designed for communication between web browsers and web servers, but it can also be used
for other purposes.
HTTP follows a classical client-server model, with a client opening a connection to make a request,
then waiting until it receives a response.
HTTP is a stateless protocol, meaning that the server does not keep any data (state) between two
requests.
29. If you are a developer, you probably know what
HTTP (or HTTPS) is. It is seen every day, in your
browser. A request is needed to respond; you to
constantly ask the server if there are new
messages in order to receive them.
You should also know that HTTP allows you to have
different types of requests such as post, get or put,
each with a different purpose.
30. Web Socket:
It allows full duplex communication over a single socket connection. This protocol defines a full duplex
communication from the ground up. Web sockets take a step forward in bringing desktop rich
functionalities to the web browsers.
The main features of web sockets are as follows −
Web socket protocol is being standardized, which means real time communication between web
servers and clients is possible with the help of this protocol.
Web sockets are transforming to cross platform standard for real time communication between a
client and the server.
This standard enables new kind of the applications. Businesses for real time web application can
speed up with the help of this technology.
The biggest advantage of Web Socket is it provides a two-way communication (full duplex) over a
single TCP connection.
Application Layer:
31. Web Sockets on the other hand don’t need you to
send a request in order to respond. They allow
bidirectional data flow so you just have to listen for
any data.
You can just listen to the server and it will send
you a message when it’s available.
Web Socket Applications
Real-time applications
Chat apps
IoT (internet of things)
Online multiplayer games
32. CoAP
Constrained Application Protocol for machine-to-machine (M2M) applications with constrained
devices, constrained environment and constrained n/w.
Uses client server architecture. Like HTTP, CoAP is a document transfer protocol.
Unlike HTTP, CoAP is designed for the needs of constrained devices.
CoAP packets are much smaller than HTTP TCP flows.
CoAP runs over UDP, not TCP.
CoAP allows UDP broadcast and multicast to be used for addressing.
CoAP follows a client/server model. Clients make requests to servers, servers send back
responses.
Clients may GET, PUT, POST and DELETE resources.
Application Layer:
33. CoAP is designed to interoperate with
HTTP and the RESTful web at large
through simple proxies. Because CoAP is
datagram based, it may be used on top of
SMS and other packet based
communications protocols.
34. MQTT
Message Queue Telemetry Transport is light weight messaging protocol based on publish-
subscribe model.
Uses client server architecture. Well suited for constrained environment.
MQTT is a publish/subscribe messaging protocol designed for lightweight M2M communications.
It was originally developed by IBM and is now an open standard.
MQTT has a client/server model, where every sensor is a client and connects to a server, known as
a broker, over TCP. MQTT is message oriented.
Application Layer:
35. XMPP
Extensible Message and Presence Protocol for real time communication and streaming XML data
between network entities. Support client-server and server-server communication.
The XMPP protocols are free, open, public, and easily understandable; in addition, multiple
implementations exist in the form clients, servers, server components, and code libraries.
XMPP applications beyond IM include network management, content syndication, collaboration
tools, file sharing, gaming, remote systems monitoring, web services, lightweight middleware, cloud
computing, and much more.
The Internet Engineering Task Force (IETF) has formalized the core XML streaming protocols as an
approved instant messaging and presence technology.
Application Layer:
36. DDS
Data Distribution Service is data centric middleware standards for device-to-device or machine-to-
machine communication. It is an IoT protocol developed for M2M (Machine to Machine)
Communication by OMG (Object Management Group).
DDS is a networking middleware that simplifies complex network programming. It implements
a publish–subscribe pattern for sending and receiving data, events, and commands among
the nodes.
Nodes that produce information (publishers) create "topics" (e.g., temperature, location, pressure)
and publish "samples". DDS delivers the samples to subscribers that declare an interest in that
topic.
DDS handles transfer chores: message addressing, data marshalling and de-marshalling (so
subscribers can be on different platforms from the publisher), delivery, flow control, retries, etc. Any
node can be a publisher, subscriber, or both simultaneously
It enables data exchange via publish-subscribe methodology.
Application Layer:
37. DDS
DDS makes use of broker less architecture unlike MQTT and CoAP protocols.
It uses multicasting to bring high quality QoS to the applications.
DDS protocol can be deployed from low footprint devices to cloud.
The DDS interoperability demonstration used scenarios such as:
Basic connectivity to network using Internet Protocol (IP)
Discovery of publishers and subscribers
Quality of service (QoS) Compatibility between requester and offerer
Delay-tolerant networking
Multiple topics and instances of topics
Exclusive ownerships of topics
Content filtering of topic data including time and geographic
Application Layer:
38. DDS
DDS addresses the needs of applications like aerospace and defence, air-traffic
control, autonomous vehicles, medical devices, robotics, power generation, simulation and
testing, smart grid management, transportation systems, and other applications that require real-
time data exchange.
Application Layer:
The DDS — IoT protocols have fundamental layers:
facts centric submit-subscribe (DCPS) and statistics-
local reconstruction layer (DLRL). DCPS plays the
task of handing over the facts to subscribers, and
the DLRL layer presents an interface to DCPS
functionalities, permitting the sharing of distributed
data amongst IoT enabled objects.
39. AMQP:
Advanced Message Queuing Protocol is open application layer protocol for business messaging.
Supports both point-to-point and publish-subscribe model.
AMQP stands for Advanced Messaging Queuing Protocol. It is a standard for cross platform
messaging.
It is a wire protocol and aims to enable functional compatibility between clients (from various
platforms) and messaging brokers.
AMQP will be used to design interoperable, high quality messaging products.
Enterprise applications are being written in a number of dynamic languages such as Ruby, Perl and
Python.
AMQP will enable platform independence, and fill in the gap to integrate these applications using
the messaging model.
Application Layer:
40. The AMQP protocol enables patron programs to talk to the dealer and engage with the AMQP model.
This version has the following three additives, which might link into processing chains in the server to
create the favoured capability.
Exchange: Receives messages from publisher primarily based programs and routes them to
‘message queues’.
Message Queue: Stores messages until they may thoroughly process via the eating client software.
Binding: States the connection between the message queue and the change.
41. The logical design of an IoT system refers to an abstract representation of entities and processes without going
into the low-level specifies of implementation. it uses Functional Blocks, Communication Models,
and Communication APIs to implement a system.
IoT Functional Blocks
IoT Communication Models
IoT Communication APIs
LOGICAL DESIGN OF IOT
IoT Functional blocks
An IoT system consist number of functional
blocks like Devices, services,
communication, security, and application
that provides the capability for sensing,
actuation, identification, communication, and
management.
42. These functional blocks consist of devices that provide monitoring control functions, handle communication
between host and server, manage the transfer of data, secure the system using authentication and other
functions, and interface to control and monitor various terms.
Device: These devices are used to provide sensing and monitoring control functions that collect the data from
the outer environment.
Communication: This block handles the communication between the client and cloud-based server and
sends/receives the data using protocols.
Services: This functional block provides some services like monitoring and controlling a device and publishing
and deleting the data and restore the system.
Management: This functional block provides various functions that are used to manage an IoT system.
Security: This block is used to secure an IoT system using some functions like authorization, data security,
authentication, 2 step verification, etc.
Application: It is an interface that provides a control system that use by users to view the status and analyse
of system.
LOGICAL DESIGN OF IOT
43. IoT Communication Models
There are several different types of models available in an IoT system that used to communicate between the
system and server like the request-response model, publish-subscribe model, push-pull model, and exclusive pair
model, etc.
LOGICAL DESIGN OF IOT
Request-Response Communication Model
This model is a communication model in which a client
sends the request for data to the server and the server
responds according to the request. when a server
receives a request it fetches the data, retrieves the
resources and prepares the response, and then sends the
data back to the client.
In simple terms, we can say that in the request-response
model server send the response of equivalent on the
request of the client. in this model, HTTP works as a
request-response protocol between a client and server.
Example
When we search a query on a browser then the browser submits an HTTP request to the server and then the
server returns a response to the browser(client).
44. LOGICAL DESIGN OF IOT
Publish-Subscribe Communication Model
In this communication model, we have a broker between publisher and consumer. here publishers are the source
of data but they are not aware of consumers. they send the data managed by the brokers and when a consumer
subscribes to a topic that managed by the broker and when the broker receives data from the publisher it sends
the data to all the subscribed consumers.
Example
On the website many times we subscribed to their newsletters using our email address. these email addresses
managed by some third-party services and when a new article published on the website it directly sends to the
broker and then the broker send these new data or post to all the subscribers.
45. LOGICAL DESIGN OF IOT
Push-Pull Communication Model
It is a communication model in which the data push by the producers in a queue and the consumers pull the data
from the queues. here also producers are not aware of the consumers.
Example
When we visit a website we saw a number of posts that published in a queue and according to our requirements,
we click on a post and start reading it.
46. LOGICAL DESIGN OF IOT
Exclusive Pair Communication Model
It is a bidirectional fully duplex communication model that uses a persistent connection between the client and
server. here first set up a connection between the client and the server and remains open until the client sends a
close connection request to the server.
47. LOGICAL DESIGN OF IOT
IoT communication APIs
Generally, we used Two APIs for IoT Communication. These IoT Communication APIs are:
REST-based Communication APIs
Web Socket-based Communication API
REST-based Communication APIs
Representational state transfer (REST) is a set of architectural principles by which you can design Web services
the Web APIs that focus on system’s resources and how resource states are addressed and transferred. REST
APIs that follow the request response communication model, the rest architectural constraint applies to the
components, connector and data elements, within a distributed hypermedia system.
The rest architectural constraint are as follows:
Client-server – The principle behind the client-server constraint is the separation of concerns. for example,
clients should not be concerned with the storage of data which is concern of the serve. Similarly, the server should
not be concerned about the user interface, which is concern of the client. Separation allows client and server to
be independently developed and updated.
48. LOGICAL DESIGN OF IOT
Stateless – Each request from client to server must contain all the information necessary to understand the
request, and cannot take advantage of any stored context on the server. The session state is kept entirely on the
client.
Cache-able – Cache constraints requires that the data within a response to a request be implicitly or explicitly
levelled as cache-able or non-cache-able. If a response is cache-able, then a client cache is given the right to reuse
that response data for later, equivalent requests. caching can partially or completely eliminate some instructions
and improve efficiency and scalability.
49. LOGICAL DESIGN OF IOT
Layered system – layered system constraints, constrains the behaviour of components such that each
component cannot see beyond the immediate layer with they are interacting. For example, the client cannot
tell whether it is connected directly to the end server or two an intermediary along the way. System scalability
can be improved by allowing intermediaries to respond to requests instead of the end server, without the client
having to do anything different.
Uniform interface – uniform interface constraints requires that the method of communication between client
and server must be uniform. Resources are identified in the requests (by URIsin web based systems) and are
themselves is separate from the representations of the resources data returned to the client. When a client
holds a representation of resources it has all the information required to update or delete the resource you
(provided the client has required permissions). Each message includes enough information to describe how to
process the message.
Code on demand – Servers can provide executable code or scripts for clients to execute in their context. this
constraint is the only one that is optional.
50. LOGICAL DESIGN OF IOT
Request Response Model used by REST API:
A RESTful web service is a “WebAPI” implemented using HTTP and REST principles. REST is most popular IoT
Communication APIs.
Client Server
REST
Request (GET, PUT, UPDATE & DELETE) with Payload
JSON or XML)
Response (JSON or XML)
51. LOGICAL DESIGN OF IOT
Uniform Resource
Identifier (URI)
GET PUT PATCH POST DELETE
Collection, such
as https://api.exampl
e.com/resources/
List the URIs and
perhaps other
details of the
collection’s
members.
Replace the
entire collection
with another
collection.
Not
generally
used
Create a new entry in
the collection. The
new entry’s URI is
assigned
automatically and is
usually returned by
the operation.
Delete the
entire
collection.
Element, such
as https://api.exampl
e.com/resources/ite
m5
Retrieve a
representation of the
addressed member
of the collection,
expressed in an
appropriate Internet
media type.
Replace the
addressed
member of the
collection, or if
it does not
exist, create it.
Update the
addressed
member of
the
collection.
Not generally used.
Treat the addressed
member as a
collection in its own
right and create a
new entry within it.
Delete the
addressed
member of
the
collection.
HTTP Request Methods and Actions
52. LOGICAL DESIGN OF IOT
WebSocket based communication API
This type of API allows bi-directional full-duplex communication between server and client using the exclusive
pair communication model.
This API uses full-duplex communication so it does not require a new connection setup every time when it
requests new data.
WebSocket communication begins with a connection setup request sent by the client to the server. The
request (called WebSocket handshake) is sent over HTTP and the server interprets it is an upgrade request.
If the server supports WebSocket protocol, the server responds to the WebSocket handshake response.
WebSocket API begins with a connection setup between the server and client and if the WebSocket is
supported by the server then it responds back to the client with the successful response and after setup of a
connection server and client can send data to each other in full-duplex mode.
This type of API reduces the traffic and latency of data and makes sure that each time when we request new
data it cannot terminate the request.
54. IOT ENABLING TECHNOLOGIES
There are several technologies which play important role in IoT Applications. The technologies are:
Wireless Sensor Networks
Cloud Computing
Big Data Analytics
Embedded Systems
Communication Protocols
Security Protocols
Web Services
Mobile Internet
Semantic Search Engines
55. IOT ENABLING TECHNOLOGIES
Cloud Computing
Cloud computing is the use of off-site systems to help computers store, manage, process, and/or communicate
information. These off-site systems are hosted on the cloud (or the internet) instead of on your computer or
other local storage. They can encompass anything from email servers to software programs, data storage, or
even increasing your computer’s processing power.
The “cloud” is a term that simply means “the internet.” Computing involves the infrastructures and systems that
allow a computer to run and build, deploy, or interact with information.
In cloud computing, this means that instead of hosting infrastructure, systems, or applications on your hard
drive or an on-site server, you’re hosting it on virtual/online servers that connect to your computer through
secure networks.
The main types of cloud computing include software as a service, platform as a service, and infrastructure as a
service. Serverless computing, also known as function as a service (FaaS), is also a popular method of cloud
computing for businesses.
56. IOT ENABLING TECHNOLOGIES
Cloud Computing
SaaS or Software as a Service. SaaS means instead of installing software on your computer, you access the
platform online. Examples would include:
Square, which processes payments online
Google Apps such as Google Drive or Calendar
Slack, which allows collaboration and chat between other users
IaaS or Infrastructure as a Service. IaaS provides infrastructure components such as servers, storage,
networking, security, and moreover the cloud. Examples would include:
Dropbox, a file storage and sharing system
Microsoft Azure, which offers backup and disaster recovery services, hosting, and more
Rackspace, which offers data, security, and infrastructure services.
PaaS or Platform as a Service. PaaS provides computing platforms such as operating systems, programming
language execution environments, databases, and web servers. Examples would include:
Google App Engine and Heroku, which allow developers to develop and serve apps
Serverless Computing. Serverless computing (also called simply “Serverless”) is simply using a server on the
cloud. This offers more elasticity, easier maintenance, and is often more price effective than hosting servers on-
site.
57. IOT ENABLING TECHNOLOGIES
Big Data Analytics
Big Data is a massive amount of data sets that cannot be stored, processed, or analyzed using traditional
tools.
So, what makes data “big”?
Big data is characterized by the five V's: volume, velocity, variety, variability, and value. It’s complex, so making
sense of all of the data in the business requires both innovative technologies and analytical skills.
Today, there are millions of data sources that generate data at a very rapid rate. These data sources are
present across the world. Some of the largest sources of data are social media platforms and networks. Let’s
use Facebook as an example—it generates more than 500 terabytes of data every day. This data includes
pictures, videos, messages, and more.
Big data analytics describes the process of uncovering trends, patterns, and correlations in large amounts of
raw data to help make data-informed decisions. These processes use familiar statistical analysis techniques—
like clustering and regression—and apply them to more extensive datasets with the help of newer tools.
58. IOT ENABLING TECHNOLOGIES
Big Data Analytics
Big data analytics refers to collecting, processing, cleaning, and analyzing large datasets to help organizations
operationalize their big data.
Collect Data: Data collection looks different for every organization. With today’s technology, organizations
can gather both structured and unstructured data from a variety of sources — from cloud storage to mobile
applications to in-store IoT sensors and beyond.
Process Data: Once data is collected and stored, it must be organized properly to get accurate results on
analytical queries, especially when it’s large and unstructured.
Clean Data: Data big or small requires scrubbing to improve data quality and get stronger results; all data
must be formatted correctly, and any duplicative or irrelevant data must be eliminated or accounted for.
Dirty data can obscure and mislead, creating flawed insights.
59. IOT ENABLING TECHNOLOGIES
Big Data Analytics
Analyze Data: Getting big data into a usable state takes time. Once it’s ready, advanced analytics
processes can turn big data into big insights. Some of these big data analysis methods include:
Data mining sorts through large datasets to identify patterns and relationships by identifying
anomalies and creating data clusters.
Predictive analytics uses an organization’s historical data to make predictions about the future,
identifying upcoming risks and opportunities.
Deep learning imitates human learning patterns by using artificial intelligence and machine learning
to layer algorithms and find patterns in the most complex and abstract data.
60. IOT ENABLING TECHNOLOGIES
Big data analytics tools and technology
Big data analytics cannot be narrowed down to a single tool or technology. Instead, several types of tools work
together to help you collect, process, cleanse, and analyze big data. Some of the major players in big data
ecosystems are listed below.
Hadoop is an open-source framework that efficiently stores and processes big datasets on clusters of
commodity hardware. This framework is free and can handle large amounts of structured and unstructured
data, making it a valuable mainstay for any big data operation.
NoSQL databases are non-relational data management systems that do not require a fixed scheme, making
them a great option for big, raw, unstructured data. NoSQL stands for “not only SQL,” and these databases can
handle a variety of data models.
MapReduce is an essential component to the Hadoop framework serving two functions. The first is mapping,
which filters data to various nodes within the cluster. The second is reducing, which organizes and reduces the
results from each node to answer a query.
YARN stands for “Yet Another Resource Negotiator.” It is another component of second-generation Hadoop.
The cluster management technology helps with job scheduling and resource management in the cluster.
61. IOT ENABLING TECHNOLOGIES
Big data analytics tools and technology
Spark is an open source cluster computing framework that uses implicit data parallelism and fault tolerance to
provide an interface for programming entire clusters. Spark can handle both batch and stream processing for
fast computation.
Tableau is an end-to-end data analytics platform that allows you to prep, analyze, collaborate, and share your
big data insights. Tableau excels in self-service visual analysis, allowing people to ask new questions of
governed big data and easily share those insights across the organization.
MongoDB is used on datasets that change frequently
Talend is used for data integration and management
Cassandra is a distributed database used to handle chunks of data
STORM is an open-source real-time computational system
Kafka is a distributed streaming platform that is used for fault-tolerant storage
62. IOT ENABLING TECHNOLOGIES
The big benefits of big data analytics
Cost savings. Helping organizations identify ways to do business more efficiently
Product development. Providing a better understanding of customer needs
Market insights. Tracking purchase behavior and market trends
Strategic business decisions: The ability to constantly analyze data helps businesses make better and faster
decisions, such as cost and supply chain optimization.
Customer experience: Data-driven algorithms help marketing efforts (targeted ads, as an example) and
increase customer satisfaction by delivering an enhanced customer experience.
Risk management: Businesses can identify risks by analyzing data patterns and developing solutions for
managing those risks.
63. IOT ENABLING TECHNOLOGIES
Artificial Intelligence & Machine Learning
Artificial intelligence as an academic discipline was founded in 50s. Actually the “AI” term was coined by John
McCarthy, an American computer scientist, back in 1956 at The Dartmouth Conference. According to John
McCarthy, AI is “The science and engineering of making intelligent machines, especially intelligent computer
programs”.
Machine Learning is a subset of AI, and consists of the more advanced techniques and models that enable
computers to figure things out from the data and deliver AI applications. ML is the science of getting computers
to act without being explicitly programmed.
Deep Learning is a newer area of ML that that uses multi-layered artificial neural networks to deliver high
accuracy in tasks such as object detection, speech recognition, language translation and other recent
breakthroughs that you hear in the news. Beauty and strength of DL is they can automatically
learn/extract/translate the features from data sets such as images, video or text, without introducing traditional
hand-coded code or rules.