SlideShare a Scribd company logo
1 of 82
Download to read offline
Unit 3
IoT Architecture
Prepared By:
Shubhangi Gaikar
Introduction to IoT
• The internet of things (IoT) is a large network of connected things to things, people to people &
people to things.
• On a broader platform, IoT can be applied to things like smart cities, transportation networks,
manufacturing industries, which generates a massive amount of sensor data.
• All these sectors need to figure out a way to store, analyze, and make the decisions based on
analysis of the data to increase the performance in industrial sector.
• Communication between computers started with the EDI (Electronic Data Interchange) that made
possible direct dialogue between two PCs.
• With the Internet, all the computers connected to the Internet can talk to each other or
communicate to each other.
• Until now the Internet has been the first place for uniting people by means of different types of
social media (Email, Blog, Facebook, Twitter, Flickr, …).
• Now it is being transformed into the tool that will allow all objects to interact and in certain cases
to gain access to the collective knowledge that they will generate.
Evolution of Internet of Things
• In pre-internet era when their is no internet or and their is only HUMAN to
HUMAN Communication, it may be via “Fixed Telephonic Line or SMS”, at this time their is only
network.
• Then Comes the era of Internet of CONTENT with the evolution of World Wide Web (WWW) in
this time we started using Email and minor messaging Service.
• After that Comes the era of Internet of SERVICES with the evolution of WEB 2.0 the major game
changer of modern internet. In this era we started using internet more frequently for
communication and other purpose. Service like E-Commerce and E-productivity was born.
• Now we are living in Era of Internet of PEOPLE where humans are connected with each other in
various ways and in real time not only via phone and SMS.
• In this time Services like Facebook, Twitter, LinkedIn, Skype, YouTube etc. was born. But till now
Human are communicating with humans.
• Now its time for MACHINE to MACHINE communication, again a result of continuous Evolution
and this is how "Internet of Things " was born.
• In this era machine become more intelligent and like humans they have their own identity,
Understanding and other features of a human still they are lacking in Sense and intelligence then
again with the evolution of technologies like Artificial Intelligence and NPL/ML they with secure
that in future.
The origin of Web 1.0
• Static webpages
• No interaction / content contribution from the
users.
• Proprietary protocols and applications.
• Publication oriented.
• Newspapers, Portals, Britannica Online, etc
The origin of Web 2.0
• Dynamic content – user dependent outcome
• Connecting with other people via social
networking – Facebook, LinkedIn, Twitter….
• Community tagging
• Voting
• E-commerce boom – Amazon, e-bay, etc.
• Services like Google docs, Calendar, Cloud, etc.
• Application based user interaction
• Web-based apps
• Android, iOS, etc
Web 3.0
• Intelligent and Omnipresent
• Increase in Open Standards
• MOOCs (Massive Open Online Course)
• Advanced protocols and algorithms
• Context based Content generation using Machine Learning, AI etc.
• Customized to the user
• Information exchange between Machines (IoT and M2M)
• Wireless Sensor Networks
• Smart Homes
• Wearable Technology
The Internet of Things (IoT)
• Conceptualized in the early 2000’s, at MIT’s Auto-ID lab by Kevin
Aston “If we had computers that knew everything there was to know
about things—using data they gathered without any help from us -- we
would be able to track and count everything, and greatly reduce waste,
loss and cost” - Kevin Aston in 1999
• “The Internet of Things is a system where items in the physical world,
and sensors within or attached to these items, are connected to the
Internet via wireless or wired Internet connections”
M2M and/or IOT
• M2M, or machine-to-machine, is the foundation of the sophisticated device connectivity that we enjoy today.
• An M2M connection is a point-to-point connection between two network devices that allows them to transmit
information via public networking technologies such as Ethernet and cellular networks.
• Sensor telemetry is one of the original uses of M2M communication. For decades, businesses have used M2M to
remotely monitor factors like temperature, energy consumption, moisture, pressure and more through sensors.
• ATMs are great example of M2M technology. The ATM’s internal computer is constantly communicating with a
host processor that routes transactions to the appropriate banks and accounts.
• The banks then send back approval codes through the host processor, allowing transactions to be completed.
• the entire transaction happens remotely and without any need for a human operator on the bank’s side. Machines
communicate smoothly, efficiently and automatically, allowing transactions to be authorized in seconds.
• M2M technology has a decades-long track record of improving the world’s ability to communicate and execute
transactions effectively across long distances and in real time.
• IoT, or the Internet of Things, is an evolution of M2M that increases the things that
device connectivity can achieve at both a consumer and an enterprise level.
• IoT takes the basic concepts of M2M and expands them outward by creating large
“cloud” networks of devices that communicate with one another through cloud
networking platforms.
• The technologies used by IoT devices allow users to create fast, flexible, high-
performance networks that connect a wide variety of devices.
• Examples of IoT devices are all around us today. Smart home voice assistants like
Alexa and Google Home are some of the most high-profile examples, along with the
huge array of smart home devices that they connect to.
• Any network of devices that’s connected to the Internet and uses a cloud platform to
communicate can be considered part of the IoT.
• IoT can function outside of the cloud, it’s the cloud that makes it useful to
businesses and consumers.
Elements of IoT
• There are many technological aspects, layers, applications, and Components
of IoT networks. But most of these IoT architectures are built upon core
fundamentals.
• Smarter Devices in a different form.
• Network and Gateway that allows devices to be part of the IoT.
• Middleware that includes data storage spaces and advanced predicting
capabilities.
• End-user applications.
• These Elements of IoT define the fundamentals of almost every IoT system
on the globe. Still, they are divided into multiple architecture layers to
further refine the overall IoT network.
• Perception Layer that manages smart devices across the system.
• Connectivity/Transport Layer allows transferring data from the cloud to
devices and vice-versa, different aspects of gateways and networks.
• Processing Layer that controls and manages IoT levels for streamlining
data across the system.
• Application Layer that aids in the procedures of analytics, device control,
and reporting to end-users.
• With continuous changes in the IT environment, many organizations have
added three additional layers to their infrastructure. Here is an IoT Block
diagram showing the various stages of IoT architecture layers.
• Business layer that derives information and decision-making analysis from
data.
• Security Layer that covers all aspects of protecting the whole IoT
architecture
• Edge Computing Layer that works at an edge or near the device
information collection.
7 Layered Architecture of IoT
Perception Layer
• IoT layers form the components of the internet physical design of IoT, acting as a medium
between the digital and real world.
• Perception layer has the main function of transforming analog signals into the digital form and
vice versa.
• Sensors: They are very small devices or systems built to understand and detect the change in
their environment and further streamline information to their system.
• Sensors have the unique ability to detect physical parameters such as humidity or temperature,
then transforming them into electronic signals.
• Actuators: These represent a part of the machine that allows an electrical signal to be
transformed into physical actions. These Actuators play a crucial role as components of IoT
networks.
• Machine and Devices: They are the main devices that have actuators and sensors.
• In IoT architecture, there is no limitation of location or distance between two or more devices
that can be spread across the globe.
Connectivity Layer
• In the second Connectivity layer, communication takes center stage between the physical layer
of devices and IoT architecture. This communication takes place via two methods;
• First directly by either TCP or UDP/IP stack and Second, gateways act as a link between Local
Area Network (LAN) and Wide Area Network (WAN), thus providing a path for information to
pass through multiple protocols.
Several network technologies are integrated across IoT systems that include:
• Wi-Fi, the most popular and versatile technique used across data-driven technologies. Wi-Fi
modems are suitable for Smart homes, personal offices, and even corporate offices for seamless
communication between LAN and WAN, respectively.
• Ethernet represents the hardware that supports fixed or permanent devices such as video
cameras, gaming consoles, and security installations.
• Bluetooth is another widely used technology suited mainly for communication between devices
within a short range. A perfect example would be headphones that can work on small power and
simultaneously share fewer data over the network.
• NFC (Near Field Communications) allows communication between a very short distance of 4
inches or less.
• LPWAN (Low Power Wide Area Network), designed and built to match the IoT usage across
long distances. These low-power WAN devices can last as much as 10+ years while consuming
low power throughout.
• However, it can send signals to give precise information over a long periodic duration. These
include devices for smart buildings, smart fields, smart cities, etc.
• ZigBee is another advanced wireless networking technology that consumes low power and can
offer small data-sharing ability. ZigBee is built with the main focus for home automation and
also has shown remarkable success for medical, scientific, and industrial protocols.
• Cellular networks are ideally suited for communication on a global scale with more trust and
reliability. For IoT, there are two broad IoT levels of the cellular network as
• LTE-M is Long Term Evolution for Machines that provides a very high-speed exchange of data
and smooth direct cloud communication.
• NB-IoT as Narrowband that offers small data exchange using low-frequency channels
respectively.
• There are also messaging protocols present in the IoT system that allows seamless data
sharing. Here is a list of top protocols present in the IoT architecture layers as of now.
• Data Distribution Service (DDS) represents a machine-to-machine real-time messaging
framework in IoT systems.
• Advanced Message Queuing Protocol (AMQP) provides server protocols for servers via
peer-to-peer data exchange.
• Constrained Application Protocol (CoAP) defines the protocols for constrained devices
that use low power and low memory, such as wireless sensors.
• Message Queue Telemetry Transport (MQTT) represents the messaging protocol
standards for low-powered devices using TCP/IP for seamless data communication.
Edge Layer
• In the early stages, with IoT networks gaining size and numbers, latency
becomes one of the major hurdles.
• when multiple devices tried connecting with the main center, it clogged the
system delaying the procedure.
• Here edge computing offered a unique solution that accelerated the growth of
IoT Systems overall.
• Now with the edge IoT layers, systems can process and analyze the
information close to the source as much as possible.
• Edge has now become the standard for the 5th Generation of mobile networks
(5G), offering systems to connect with more devices at a lower latency than
the prevailing 4G standards.
• All the procedures for the IoT networks take place at the edge.
• Thus saving time, resources and further resulting in real-time reactions and
improved performance.
Processing Layer
IoT systems are designed to capture, store, and process data for further requirements in this layer.
In the processing layer, there are two main stages.
1) Data Accumulation
• Every device is sending millions of data streams across the IoT network.
• Here data comes in various forms, speeds, and sizes. Separating the essential data from these
large streams is a primary concern that professionals must prioritize in this layer.
• Unstructured data in raw form such as photos and video streams can be quite enormous and must
be done efficiently to gather intelligence factors for the business.
• Professionals must have a thorough understanding of the business procedures to pinpoint data
requirements precisely and help procure future benefits.
2) Data Abstraction
• Once the data accumulation stage is finished, selected data is taken out from
the large data for application to optimize their business procedures.
Here the data abstraction follows the path as:
• Collecting all the data from all IoT and non-IoT systems (CRM, ERP, &
ERM)
• Using data virtualization to make data accessible from a single location
• Managing raw data in multiple forms
• Interoperability among devices and architecture plays a crucial role in the
processing layer.
• Once data accumulation and abstraction are complete, it is easy for data
analysts to use business acumen in fetching intelligence factors.
Application Layer
• In this layer, Data is further processed and analyzed to gather business intelligence.
Here IoT systems get connected with middleware or software that can understand data
more precisely.
• Some examples of the Application layer include:
• Business decision-making software’s
• Device control and monitoring services
• Analytics solutions built with Machine learning and Artificial Intelligence
• Mobile Application for further interactions
• Each IoT system is built with its particular goals and objectives to match with business
specifications.
• At present, most of the IoT Applications are working at a varying complexity and
operate a multitude of technology stacks performing specific tasks for businesses.
Business Layer
• Once IoT data is procured, it is valuable only if it applies to business planning and strategy.
• Every business has specific goals and objectives that it wants to accomplish by gathering
intelligence from data.
• Business owners and stakeholders use data from past and present data to plan precisely for the
future.
• Today Data analysis has become the new oil for industries to enhance their productivity.
• Businesses are competing to get more data into their business for analysis and decision-making.
• Here software, CRM, and business intelligence programs have gained a lot of popularity in
industries for superior performance.
Security Layer
• With modern challenges, security has become one of the main necessities of IT
architecture. Data breach, tracking malicious software, and hacking are the main
challenges with Security Layer in integrating IoT systems.
Device Security
• The first point of security in the IoT layers starts with the devices themselves.
Most of the manufacturers follow security guidelines to install in both firmware
and hardware for IoT integration.
Some of the essential measures are:
• Secure boot process to avoid any malicious code running on a device
• Using Trusted Platform Module (TPM) chips in combination with
cryptographic keys for devices endpoint protections
• Extra physical layer to avoid direct access via the device.
• Regular updates for security patches.
Cloud Security
• Now Clouds are taking over from the traditional server for data storage and communication.
• Cloud data security is of paramount importance, especially for IoT systems.
• Mechanisms include multiple authorization factors and encryptions to avoid any data breach.
• Here the process of verifying any new device is an essential crux that must have strict regulations
for device identity management.
Connection Security
• While transferring data across the network, it must be encrypted from an end-to-end point across
the IoT system.
• Here messaging protocols such as DDS, AMQP, and MQTT are integrated to secure sensitive
information from any breach.
• The use of TSL cryptographic protocol is recommended industry standard across IoT architecture
for data communication.
Role of cloud in IoT
• The Internet of Things (IoT) has gradually transformed the way daily tasks are completed.
• E.g. smart home, where people can start their cooling devices remotely through their mobile
phones, earlier tis was possible via an SMS, but today the internet has made it easier.
• Apart from smarter solutions for homes and housing communities, IoT has also been used as a
tool in business environments across various industries.
• However, with the amount of big data that is generated by IoT, a lot of strain is put on the
internet infrastructure.
• This has made businesses and organizations look for an option that would reduce this load.
• Cloud computing is an on-demand delivery of computing power, database storage,
applications and IT resources.
• It enables organizations to consume a computing resource, like a virtual machine (VM)
instead of building a computing infrastructure on premise.
• Today, cloud computing has more or less penetrated mainstream IT and its infrastructure.
• Many tech biggies such as Amazon, Alibaba, Google, Microsoft and Oracle are building
machine learning tools with the help of cloud technology
• These tools offer a wide range of solutions to businesses worldwide. So role of cloud
computing in IoT is inseparable.
• Cloud computing, as well as IoT, work towards increasing the efficiency of everyday tasks
and both have a complementary relationship.
• cloud computing is built on the tenets of speed and scale.
• IoT applications are built on the principle of mobility and widespread networking.
• Hence, it is essential that both cloud and IoT form cloud-based IoT applications in a bid to
make the most out of their combination.
• Cloud as a technology empowers IoT to move beyond regular appliances. This is because
the cloud has such a vast storage that it takes away dependencies on on-premise
infrastructure.
• With the rise of miniaturization and transition of 4G to higher internet speeds, the cloud
will allow developers to offload fast computing processes.
• Cloud has made IoT more secure with preventive, detective and corrective controls.
• It has enabled users with strong security measures by providing effective authentication and
encryption protocols.
• IoT is generally implemented with plug-and-play hosting services. Which is why
the cloud is a perfect fit for IoT.
• Hosting providers do not have to depend on massive equipment or even any kind of
hardware that will not support the agility IoT devices require.
• With the cloud, most hosting providers can allow their clients a ready-to-roll
model, removing entry barriers for them.
• Cloud acts as a bridge in the form of a mediator or communication facilitator when
it comes to IoT.
• This makes devices easy to talk to each other.
• It would be fair to say that cloud can accelerate the growth of IoT.
Cloud topologies
Inter-Clouds
• The Inter-Cloud is an interconnected global "cloud of clouds" and an
extension of the Internet "network of networks" on which it is based.
• Inter-Cloud computing is interconnecting multiple cloud providers’
infrastructures.
• The main focus is on direct interoperability between public cloud
service providers.
• To provide cloud services as utility successfully, interconnected clouds
are required. Interoperability and portability are important factors in
Inter-Cloud.
The limitations of cloud
• The limitations of cloud are that they have limited physical resources.
• If a cloud has exhausted all the computational and storage resources, it
cannot provide service to the clients.
• The Inter-Cloud addresses such situations where each cloud would use
the computational, storage, or any kind of resource of the
infrastructures of other clouds.
• The Inter-Cloud environment provides benefits like diverse
Geographical locations, better application resilience and avoiding
vendor lock-in to the cloud client.
• Benefits for the cloud provider are expand-on-demand and better
service level agreements (SLA) to the cloud client.
Types of Inter-Cloud:
Federation Clouds
• A Federation cloud is an Inter-Cloud where a set of cloud providers
willingly interconnect their cloud infrastructures in order to share
resources among each other.
• The cloud providers in the federation voluntarily collaborate to
exchange resources.
• This type of Inter-Cloud is suitable for collaboration of governmental
clouds (Clouds owned and utilized by nonprofit institution or
government) or private cloud portfolios (Cloud is a part of a portfolio
of clouds where the clouds belong to the same organization).
• Types of federation clouds are Peer to Peer and Centralized clouds.
Multi-Cloud:
• In a Multi-Cloud, a client or service uses multiple independent clouds.
A multi-cloud environment has no volunteer interconnection and
sharing of the cloud service providers’infrastructures.
• Managing resource provisioning and scheduling is the responsibility of
client or their representatives.
• This approach is used to utilize resources from both governmental
clouds and private cloud portfolios. Types of Multi-cloud are Services
and Libraries.
Topologies of different Cloud
Architectures.
Peer to peer Inter-Cloud federation:
• Clouds collaborate directly with each other
but may use distributed entities for
directories or brokering.
• Clouds communicate with each other and
negotiate directly without mediators.
• Peer to Peer Inter-Cloud federation is
depicted in Figure.
• The Inter-Cloud projects that use Peer to
Peer federation are RESERVOIR
(Resources and Services Virtualization
without Barriers Project).
• Centralized Inter-Cloud federation:
• Clouds use a central entity to perform or facilitate
resource sharing.
• The central entity acts as a storehouse where the
available cloud resources are registered.
• Centralized Inter-Cloud federation is depicted in
Figure.
• The Inter-Cloud projects that use Centralized
Inter-Cloud federation are Inter-Cloud, Contrail,
Dynamic Cloud Collaboration (DCC) and
Federated Cloud Management.
Cloud Access
What is Cloud Computing?
“Cloud computing is a model for enabling convenient, on-demand
network access to a shared pool of configurable computing resources
(e.g., networks, servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal management effort or
service provider interaction.”
What is an Access Control?
• Access control is generally a policy or procedure that allows, denies or
restricts access to a system
Cloud computing attacks
• Denial of Services attacks
• Side Channel attacks
• Authentication attacks
• Man in the middle cryptographic attacks
• Inside Job attacks
Due to this attacks, we need a better security policy in cloud computing.
Access control identify users attempting to access a system
unauthorized.
Access control traditional model
• Application Centric Access Control
• Application manages its users
• Require lots of storing memory
• Username and password storage
• User Centric Access Control
• Services Providers contain all users information
• The Traditional model for access control is application centric Access control.
• Where each application keeps track of its collection of users and manages
them, is not feasible in cloud based architectures.
• Because in this method we need a lot of memory for storing the user details
such as username and password.
• So cloud requires a user centric access control where every user request to any
services provider is bundled with the user identity and entitlement information.
Access control models
• Mandatory Access Control (MAC)
• Discretionary Access Control (DAC)
• Role Base Access Control (RBAC)
• Due to differences in requirements for military and commercial security
policies, two distinctive kinds of policies had to be developed.
• This produced two different access control models which are Mandatory
Access Control (MAC), Discretionary Access Control (DAC).
• These models have a number of flaws, which led to the proposal of other
models such as Role-Based Access Control (RBAC).
• However, we believe these models may not work in cloud computing as each
one of them was proposed for a specific environment to fulfil consumers’
security requirements.
Mandatory Access Control
• Access decisions to a subject is given by Central authority
• Access Class assign by Mandatory Access Control
• Access Class
• Object Classification
• Subject Clearance
• In the Mandatory Access Control (MAC) model, a central authority is in command of giving access
decisions to a subject that request access to objects or information in objects.
• In order to secure access to objects and the information that flows between objects, MAC assigns an
access class to each subject and object.
• An access class is a security level that is used to secure the flow of information between objects and
subjects with dominance relationship.
• Object classifications are security labels that are used to classify objects based upon the sensitivity of
information they have.
• Subject clearances are security levels used to reflect the trustworthiness or rules of subjects.
• Although the mandatory access control model provides protection against information flow and indirect
information leakages, it does not guarantee complete secrecy of the information.
Discretionary access control (DAC)
• Object owners has privilege to set access to the object
• Less Secure
• No risk awareness
• No privileges toward the object
• No control in information flow
• The Discretionary Access Control (DAC) model, grants the owners of objects the ability to restrict access to their objects, or
information in the objects based upon users’ identities or a membership in certain groups.
• DAC model is generally less secure than mandatory access control model, so it is used in environments that do not require a
high level of protection.
• Since DAC depends on allowing owners of objects to control access permissions to objects, yet it has many side-effects when it
is utilized in cloud computing.
• For instance, there is no mechanism or method to facilitate the management of improper rights (e.g. risk awareness), which
owners of objects can give to users.
• Occasionally users are required to use privileges that reveal information about objects to third parties.
• For instance, a user can only read a file in a company, and then s/he can copy the file contents to another file in order to pass it
to another user.
• The DAC does not have the ability to control information flow or deal with Trojan horses that can inherit access permissions.
Finally, it is not scalable enough for cloud computing.
Role based access control (RBAC)
• Control Access to resources naturally
• RBAC motivation
• Subject responsibility is important than whom the subject is
• Subject can have more roles
• Violation of access security policy
• For example: Health care system
• Role-based access control (RBAC) is considered as a natural way to control access to resources in organizations and enterprises.
• The motivation behind RBAC comes from considering a subject’s responsibility is more important than whom the subject is.
• In the RBAC model, a subject can have more than one role or be a member of multiple groups. For example, an employee within
an organization can be a member in secretaries group and employees group.
• Despite that, roles can give a subject more rights than she/he necessarily needs to have, with a possibility of having another role
which could lead to the violation of the access security policy.
• For example, In a health care system, there is always a sequence of operations will need to be controlled.
• For example, a doctor in order to give a patient the right treatments, she/he needs to examine the patient’s physical conditions, look
at the patient’s medical history and asks for tests or scans. S/he might ask for help from another doctor or transfer some
information to another hospital.
• Each one of the previous operations needs a different set of permissions. Thus, the RBAC may not be able to ensure access for a
sequence of operations in cloud computing.
IoT Protocols
• Low Power communication protocols : COAP, MQTT, RPL,
6LoWPAN, 802.15.4, Low Power Wide Area Network (3GPP and
others)
• Infrastructure (ex: 6LowPAN, IPv4/IPv6, RPL)
• Identification (ex: EPC, uCode, IPv6, URIs)
• Comms / Transport (ex: Wifi, Bluetooth, LPWAN)
• Discovery (ex: Physical Web, mDNS, DNS-SD)
• Data Protocols (ex: MQTT, CoAP, AMQP)
• Device Management (ex: TR-069, OMA-DM, LWM2M)
• Semantic (ex: JSON-LD, Web Thing Model)
• Multi-layer Frameworks (ex: Alljoyn, IoTivity, Weave, Homekit
Constrained Application Protocol (COAP)
• CoAP is a specialized Internet Application Protocol for constrained
devices. It enables those constrained devices called "nodes" to
communicate with the wider Internet using similar protocols.
• RESTful protocol design minimizing the complexity of mapping with
HTTP
• Low header overhead and parsing complexity
• URI and content-type support
• Support for the discovery of resources provided by known CoAP
services
• Simple subscription for a resource, and resulting push notifications
Message Queuing Telemetry Transport (MQTT)
• Invented by IBM in 2000 for telemetry applications using low power
data rates.
• Enables a publish/subscribe messaging model in an extremely
lightweight way.
• Requires Small Code footprint and low bandwidth.
• MQTT clients are very small, require minimal resources so can be
used on small microcontrollers. MQTT message headers are small to
optimize network bandwidth.
• MQTT allows for messaging between device to cloud and cloud to
device. This makes for easy broadcasting messages to groups of
things.
• MQTT makes it easy to encrypt messages using TLS and authenticate
clients using modern authentication protocols, such as OAuth.
IEEE 802.15.4
• IEEE 802.15.4 is a standard which specifies the physical layer and media
access control for low-rate wireless personal area networks (LR-WPANs).
• It is maintained by the IEEE 802.15 working group.
• It is the basis for the ZigBee, ISA100.11a, WirelessHART, and MiWi
specifications, each of which further extends the standard by developing the
upper layers which are not defined in IEEE 802.15.4
• It is used with 6LoWPAN and standard Internet protocols to build a wireless
embedded Internet.
Zigbee
• Uses the 802.15.4 standard and operates in the 2.4 GHz frequency range with
250 kbps
• The maximum number of nodes in the network is 1024 with a range up to 200
meter. ZigBee can use 128 bit AES encryption.
Bluetooth Low Energy
• Designed and marketed by the Bluetooth Special Interest Group
• Different Profiles for Different applications
• Provide the same range as classic Bluetooth with considerable
• Low energy consumption
• The technology used in beacons used to send contextual information
• Based on locations (Google beacon platform , Google Physical web,
Apple ibeacon)
• Weightless-P is an ultra high performance LPWAN connectivity
technology for the Internet of Things.
• Weightless is a proposed proprietary open wireless technology standard for
exchanging data between a base station and thousands of machines around it
(using wavelength radio transmissions in unoccupied TV transmission
channels) with high levels of security.
• NB-IoT (Narrow-Band IoT) A technology being standardized by the
3GPP standards body. It is a standards-based low power wide area (LPWA)
technology developed to enable a wide range of new IoT devices and
services.
• NB-IoT significantly improves the power consumption of user devices,
system capacity and spectrum efficiency, especially in deep coverage.
• Supported by all major mobile equipment, chipset and module
manufacturers, NB-IoT can co-exist with 2G, 3G, and 4G mobile
networks.
• LTE-MTC (LTE-Machine Type Communication) -
• To address the challenges of cellular-based M2M/IoT devices, the standardization
group 3GPP, which is responsible for cellular telecommunications network
standards, has developed a new version of the LTE standard which delineates a
type of LTE-based device (i.e., Cat-M, Cat-0) designed to meet the needs of a
wide range of M2M/IoT devices, Called LTE for Machine-Type Communication
(LTE-MTC / LTE-M) by 3GPP.
• EC-GSM-IoT (Extended Coverage-GSM-IoT) - Enables new capabilities of
existing cellular networks for LPWA (Low Power Wide Area) IoT applications. EC-
GSM-IoT can be activated through new software deployed over a very large GSM
footprint, adding even more coverage to serve IoT devices.
• Sigfox is a French company that build Low Power wide network for connected
devices using its proprietary protocol.
• LoRaWAN - Network protocol intended for wireless battery operated Things in
regional, national or global network. It is managed by Lora Alliance.
• RPMA (Random phase multiple access) A technology communication system
employing direct-sequence spread spectrum (DSSS) with multiple access.
IPv6 over Low power Wireless PersonalArea Networks (6LoWPAN)
• The 6LoWPAN system is used for a variety of applications
including wireless sensor networks. This form of wireless sensor
network sends data as packets and using IPv6.
• An adaption layer for IPv6 over IEEE802.15.4 links Operates only in
the 2.4 GHz frequency range with 250 kbps transfer rate.
• Routing Protocol for low Power and Lossy Networks (RPL) Developed
by IETF ROLL Working Group.
Cross connectivity across IoT system components
• IoT consists of several technological layers which all play a role in the route from simply
connecting ‘things’ and IoT devices to building applications that serve a clear goal.
• Here, we first look at the IoT technology stack and especially at the first three layers of that IoT
technology stack.
• The first is the IoT device level; as without accurate sensors, actuators and IoT devices in general,
no accurate data and without accurate data no Internet of Things, let alone IoT projects or
products/services.
• The second is the IoT gateway, which we covered more in-depth but deserves a spot as a layer
and certainly in an overview of the IoT device layer with which it is strongly connected and for
which is a necessary level towards the next steps of actionable data and business applications or
consumer apps and services.
• The third is the IoT platform layer where we connect with the business and consumer
applications and services, as well as the development of these services and the management and
interconnection with the first two layers.
• An IoT gateway bridges the communication gap between devices, sensors,
equipment, systems and the cloud.
• By systematically connecting the cloud, IoT gateway offer local processing and
storage, as well as an ability to autonomously control field devices based on data
inputs by sensors.
• IoT gateways also enable customers to securely aggregate, process and filter data
for analysis.
• It helps ensure that the federated data generated by devices and systems can travel
securely and safely from the edge to the cloud.
• The biggest challenge lies in enabling interoperability by supporting multiple
connectivity sensor protocols, like Z-Wave, ZigBee, BLE, Wi-Fi, BACnet etc.
• The connected sensors and devices, in an IoT ecosystem, should be able to
seamlessly intercommunicate with other devices through the Gateway or send the
required data to the cloud.
Device to Gateway-short range Wireless:
Cellphone as a Gateway:
• Today, smartphones play a very important role in the IoT-based communication
ecosystem.
• The smartphone is practically the first IoT device that is readily available and used by
millions across the world and this number is growing every day.
• Smartphones are mostly used to view and control IoT devices (non-living things) by
the end user (a living thing), either directly or via IoT servers.
• But a smartphone with multiple built-in sensors like GPS, camera, accelerometer,
gyroscope, proximity etc. and wireless communication technology - Wi-Fi, Bluetooth,
RFID, NFC etc. can play a significant role in acting as an edge gateway.
• This will optimize the cost and adoptability of IoT technology among common people
across the world.
Advantages: Mobile as a Universal IoT Gateway
The smartphone will add more value as a gateway with the collected
data from edge IoT devices as well as from the user to make more
intelligent decisions dynamically.
• Commonly used devices for individuals will increase adoptability
• Robust platform provided by software giants
• Significant storage and data processing capabilities
• Built-in communication protocol
• Secure sandbox architecture
• Easy to maintain, upgrade and enhance
Dedicated wireless Access points
• An access point connects users to other users within the network and
also can serve as the point of interconnection between the WLAN and
a fixed wire network.
• Each access point can serve multiple users within a defined network
area, as people move beyond the range of one access point, they are
automatically handed over to the next one.
• A small WLAN may only require a single access point; the number
required increases as a function of the number of network users and
the physical size of the network.
Gateway to cloud
• A gateway is a device that connects its client devices to Cloud IoT Core and
performs several tasks on their behalf, such as:
• Communicating with Cloud IoT Core.
• Connecting to the internet when the device can't directly connect itself, such as a
ZigBee or Bluetooth device.
• Authenticating to Cloud IoT Core when the device can't send its own credentials,
or when you want to add a layer of security by using the credentials of both the
device and the gateway.
• Publishing telemetry events, getting configuration data, or setting device state.
• Storing and processing data.
• Translating protocols.
• Cloud IoT Core supports gateway connections and communication over
both MQTT and HTTP.
Wired Connectivity for Long range communication
• Wired and Wireless have both advantages and disadvantages when it comes
• IoT technology is deployed in many ways so no single network solution is right. It
depends on the situation and where the devices are located.
• Some of the factors affecting the selection of the type of network are network range,
network bandwidth, power usage, interoperability, intermittent connectivity and security.
• A wired network uses Ethernet cable to connect to the network. The Ethernet cable is in
turn connected to a DSL or cable to the network gateway.
• The wired networks are mature technology and it is easy to get plugged into if you
already have phone lines, power lines, and coaxial cable lines.
• Even in the case of wireless network, those networks are usually connected to a wired
network at some point; hence the most commonly used network is a hybrid of both wired
and wireless network connectivity.
Benefits of the wired monitoring devices
• Reliability: Ethernet connections have been in existence much longer than
Wi-Fi technology, which makes it much more reliable. They are less prone to
dropped connections and are more reliable without constant debugging.
• Speed: Wired connections are less affected by local factors like walls, floors,
cabinets, length of the room, interference from other electronic devices etc.
This enables wired connectivity to be much faster than wireless.
• Wired data transmissions are not sensitive to distances and placement of
devices does not have any adverse effect on the performance of the
connection.
• Security: Wired connections are usually housed behind your Local Area
Network (LAN) firewall and hence it allows for complete control of the
communications system. This means there is no broadcasting data that can be
hacked into.
LPWANs
• Low power wide aera network(LPWANs) are the new phenomenon in IoT. By providing long-range communication
on small, inexpensive batteries that last for years,
• This family of technologies is purpose-built to support large-scale IoT networks sprawling over vast industrial and
commercial campuses.
• LPWANs can literally connect all types of IoT sensors – facilitating numerous applications from asset tracking,
environmental monitoring and facility management to occupancy detection and consumables monitoring.
• Nevertheless, LPWANs can only send small blocks of data at a low rate, and therefore are better suited for use cases
that don’t require high bandwidth and are not time-sensitive.
• Also, not all LPWANs are created equal. Today, there exist technologies operating in both the licensed (NB-IoT, LTE-
M) and unlicensed (e.g. MYTHINGS, LoRa, Sigfox etc.)
• Power consumption is a major issue for cellular-based, licensed LPWANs.
• Quality-of-Service and scalability are main considerations when adopting unlicensed technologies.
• Standardization is another important factor to think of if you want to ensure reliability, security, and interoperability in
the long run.
Cellular (3G/4G/5G)
• Well-established in the consumer mobile market, cellular networks offer reliable broadband communication
supporting various voice calls and video streaming applications.
• On the downside, they impose very high operational costs and power requirements.
• While cellular networks are not viable for the majority of IoT applications powered by battery-operated
sensor networks, they fit well in specific use cases such as connected cars or fleet management in
transportation and logistics.
• For example, in-car infotainment, traffic routing, advanced driver assistance systems (ADAS) alongside fleet
telematics and tracking services can all rely on the ubiquitous and high bandwidth cellular connectivity.
• Cellular next-gen 5G with high-speed mobility support and ultra-low latency is positioned to be the future of
autonomous vehicles and augmented reality.
• 5G is also expected to enable real-time video surveillance for public safety, real-time mobile delivery of
medical data sets for connected health, and several time-sensitive industrial automation applications in the
future.
Satellite-based IoT
• Cellular services used to manage remote assets and operations come with a few
challenges.
• Many enterprises operate in remote areas where cellular connectivity is limited.
• LPWA (Low-Power Wide-Area) networks are a new type of non-cellular protocol,
and were developed to satisfy IoT applications that require long range, low bit-rate
and low power consumption.
• LPWA networks still face challenges due to fragmented regulations and a lack of
global connectivity.
• Solution to these problems is satellite-based IoT services - a strong alternative
whether you compare satellite vs cellular or satellite vs LPWA networks.
• Satellite services have unique and necessary characteristics required for proper
implementation of an IoT ecosystem. With more than 20 billion connected
“things” expected to be in use throughout the world by 2020
• Satellites have unique advantages​ to connect IoT assets, offering truly ubiquitous
coverage which can reach objects with limited or no access to terrestrial networks.
• It is highly reliable with guaranteed SLA’s and delivers a consistent service across
the coverage.
• Combining satellite technology with terrestrial IoT will be the key that
professionals need to ensure connectivity to their assets, no matter where they are.
• While it is true that satellite technology is the ideal complement to terrestrial IoT
networks, past adaptations were not designed for IoT and therefore were more
expensive and complex than other solutions.
• Satellite technology can deliver a variety of frequencies, orbits, and speeds, to
provide services tailored to “smart” applications.
• Currently, around 2.7 million devices are supported through satellite IoT.4 These
devices include infrastructure, smart grid, oil and gas, disaster monitoring, and
environmental monitoring.
• The broad coverage of satellite services means that these devices can be reliably
supported anywhere in the world.
• Satellite services already support key vertical markets.
• For e.g. satellite services are utilized in Military support, border patrol, shipping,
aviation, and fleet management, and serve a critical redundancy role.
• Satellite is able to bridge the gap between the urban-rural divide and provide IoT
to remote locations in a way that terrestrial providers alone are incapable of doing
in an economical way.
Device-to-Cloud Communications
• Device-to-Cloud Communications In a device-to-cloud communication model, the IoT
device connects directly to an Internet cloud service.
• This approach frequently takes advantage of existing communications mechanisms like
traditional wired Ethernet or Wi-Fi connections
• Tis kind of approach establishes a connection between the device and the IP network,
which ultimately connects to the cloud service.
• There are two common transport- and application-layer protocols that help facilitate
communication between an IoT device and a cloud service.
• At the transport-layer level, the device-to-cloud communication usually takes place either
via Transmission Control Protocol (TCP) or User Datagram Protocol (UDP)
• At the application-layer level, Hyper Text Transfer Protocol (HTTP) is the
common standard to send connection requests and return responses for
TCP-based communications.
• Message Queuing Telemetry Transport (MQTT) is another application-layer
protocol; it’s lightweight with a small code footprint and is becoming
popular in resource-constrained IoT devices.
• This communication model is employed by some popular consumer IoT
devices like the Nest Labs Learning Thermostat and the Samsung Smart
TV.
• In the case of the Nest Learning Thermostat, the device transmits data to a
cloud database where the data can be used to analyze home energy
consumption.
• This cloud connection enables the user to obtain remote access to their thermostat via a
smartphone or Web interface, and it also supports software updates to the thermostat.
• Similarly with the Samsung Smart TV technology, the television uses an Internet
connection to transmit user viewing information to Samsung for analysis and to enable the
interactive voice recognition features of the TV.
• In these cases, the device-to-cloud model adds value to the end user by extending the
capabilities of the device beyond its native features.
• However, interoperability challenges can arise when attempting to integrate devices made
by different manufacturers. Frequently, the device and cloud service are from the same
vendor. I
• If proprietary data protocols are used between the device and the cloud service, the device
owner or user may be tied to a specific cloud service, limiting or preventing the use of
alternative service providers.
Comparison of LoRa, Sigfox NB-IoT
• While the number of connected devices continues to rise, the maturing
wireless technologies that support them are also continuing to get a
good deal of attention globally.
• NB-IOT (Narrowband IOT), LoRa, and Sigfox, all low-power, wide-
area network (LPWAN) technologies, are often pitted against one
another in what’s portrayed as a race to the top.
• Each of these technologies will likely play an important role in the IoT
space depending on the use case, so understanding the features and
differences of each is critical.
Narrowband IoT
• NB-IoT is the initiative by the Third Generation Partnership Project
(3GPP), the organization behind the standardization of cellular
systems.
• It addresses the needs of very low data rate devices that need to
connect to mobile networks, often powered by batteries.
• As a cellular standard, the goal of NB-IoT is to standardize IoT
devices to be interoperable and more reliable.
• Because NB-IoT is a cellular-grade wireless technology that uses
OFDM modulation, the chips are more complex, but the link budgets
are better.
• That means users get the high performance level associated with
cellular connections, but at the cost of more complexity and greater
power consumption.
• NB-IoT is meant to be used to send and receive small amounts of data—a few tens or
hundreds of bytes per day generated by low data-producing IoT devices.
• It is message-based, similar to Sigfox and LoRa, but with a much faster modulation rate that
can handle a lot more data than those technologies.
• NB-IoT is not an IP-based communication protocol like LTE-M (another LPWA cellular
technology associated with IoT applications).
• You can’t actually connect to an IP network and expect to use it as you would with a
smartphone.
• It was made for simple IoT applications and is more power efficient than LTE-M, but designed
for more infrequent communication purposes.
• So NB-IoT will be for simple devices that need to connect to an operator network via licensed
spectrum.
• It is currently being piloted and tested only in Europe, and is not widely available except
through a small number of operators in Europe that are doing some trials.
• If you follow the company Sigfox, you will recognize this as the 3GPP community’s attempt
to address the market space created by networks like Sigfox.
THE ADVANTAGES OF NB-IOT ARE:
• If NB-IOT existed and was deployed:
• The coverage would be very good. NB-IoT devices rely on 4G coverage, so they would
work well indoors and in dense urban areas.
• It has faster response times than LoRa and can guarantee a better quality of service.
THE DRAWBACKS OF NB-IOT ARE:
• It is difficult to implement firmware-over-the-air (FOTA) or file transfers. Some of the
design specifications for NB-IoT make it such that sending larger amounts of data down
to a device is hard.
• Network and tower handoffs will be a problem, so NB-IoT is best suited for primarily
static assets, like meters and sensors in a fixed location, rather than roaming assets.
LoRa
• LoRa is a non-cellular modulation technology for LoRaWAN. (Just like
BPSK or QPSK is the modulation of NB-IoT.)
• Those two terms—LoRa and LoRaWAN—are not interchangeable:
LoRaWAN is the standard protocol for WAN communications and LoRa is
used as a wide area network technology.
LoRa is used primarily in two ways:
1.One is LoRaWAN, which has been deployed mostly in Europe. It has very
small message capacity, as low as 12 bytes.
2.Another is Symphony Link, which is a product of Link Labs. Symphony
Link is a wireless system built on LoRa technology that is designed to
overcome the limitations of a LoRaWAN system. It is often included as a
component of more complex LoRa networking solutions, mostly in the U.S.
and Canada, and is designed for industrial applications.
• LoRa represents a good radio network for IoT solutions and has better
link budgets than other comparable radio technologies.
• But outside of a few markets in Europe, if you want to connect to
LoRaWAN networks—or use LoRa at all—you need to deploy your
own network gateway.
• That may seem like a downside, but it actually makes LoRa a good
alternative to Wi-Fi for low power devices that need to be connected
throughout a building, like a factory or a hospital.
• Of the three technologies discussed here, it’s the only one capable of
being used as a “do-it yourself” technology; any company can build and
use their own connected device wherever they can put up the gateway.
THE BENEFITS OF LORA ARE:
• It is perfect for single-building applications.
• You can set up and manage your own network.
• LoRa is a good option if you need bidirectionality, for example, command-and-control functionality,
because of the symmetric link.
• LoRa devices work well when they are in motion, which makes them useful for outdoor asset tracking,
such as shipments.
• LoRa devices have longer battery life than NB-IoT devices.
THE DRAWBACKS OF LORA ARE:
• It has lower data rates than NB-IoT.
• It has a longer latency time than NB-IoT.
• It requires a gateway to work (which also, in many cases, is an advantage).
Sigfox
• No LPWAN discussion would be complete without mentioning Sigfox, which is the company that awoke the world to the
potential for IoT devices to use very low bandwidth connections.
Sigfox is the most basic of the three technologies, with the key differences being:
1. Sigfox has the lowest cost radio modules (<$5, compared to ~$10 for LoRa and $12 for NB-IOT).
2. Sigfox is uplink only. Though limited downlink is possible, it has a different link budget and is very restricted.
• Sigfox is an end-to-end network and technology player.
THE ADVANTAGES OF SIGFOX ARE:
• It consumes a low amount of power.
• It works well for simple devices that transmit infrequently, because it sends very small amounts of data very slowly.
• It supports a wide coverage area in the areas where it is located.
THE DRAWBACKS OF SIGFOX ARE:
• It is not deployed everywhere, so it won’t work for a large number of use cases currently.
• Communication is better headed up from the endpoint to the base station. It has bidirectional functionality, but its capacity
from the base station back to the endpoint is constrained, and you’ll have less link budget going down than going up.
• Mobility is difficult with Sigfox devices.
https://forms.gle/tWsuvoXZYnChGvfTA

More Related Content

Similar to SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf

Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxVaithyasambandham1
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxAaaBbb827105
 
Internet-of-Things-ppt and Industry 4.0.pptx
Internet-of-Things-ppt and Industry 4.0.pptxInternet-of-Things-ppt and Industry 4.0.pptx
Internet-of-Things-ppt and Industry 4.0.pptxSibyJames1
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxssuser2cc0d4
 
Chapter -4- Internet of Things (IoT).ppt
Chapter -4- Internet of Things (IoT).pptChapter -4- Internet of Things (IoT).ppt
Chapter -4- Internet of Things (IoT).pptdawod yimer
 
Iot internet-of-things-ppt
Iot internet-of-things-pptIot internet-of-things-ppt
Iot internet-of-things-pptSonalSharnam
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxSurajRavi16
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxdilip872559
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
 
Iot-Internet-of-Things-presentationppt.pdf
Iot-Internet-of-Things-presentationppt.pdfIot-Internet-of-Things-presentationppt.pdf
Iot-Internet-of-Things-presentationppt.pdfXyzXyz338506
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)shubhamyadav613
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxTata321168
 
Internet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationInternet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationSherin C Abraham
 

Similar to SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf (20)

CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
what is IoT and basics.pptx
what is IoT and basics.pptxwhat is IoT and basics.pptx
what is IoT and basics.pptx
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
Internet-of-Things-ppt and Industry 4.0.pptx
Internet-of-Things-ppt and Industry 4.0.pptxInternet-of-Things-ppt and Industry 4.0.pptx
Internet-of-Things-ppt and Industry 4.0.pptx
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
Trishant kweera (iot)
Trishant kweera (iot)Trishant kweera (iot)
Trishant kweera (iot)
 
Chapter -4- Internet of Things (IoT).ppt
Chapter -4- Internet of Things (IoT).pptChapter -4- Internet of Things (IoT).ppt
Chapter -4- Internet of Things (IoT).ppt
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
Iot internet-of-things-ppt
Iot internet-of-things-pptIot internet-of-things-ppt
Iot internet-of-things-ppt
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile Technology
 
IOT UNIT I.pptx
IOT UNIT I.pptxIOT UNIT I.pptx
IOT UNIT I.pptx
 
Iot-Internet-of-Things-presentationppt.pdf
Iot-Internet-of-Things-presentationppt.pdfIot-Internet-of-Things-presentationppt.pdf
Iot-Internet-of-Things-presentationppt.pdf
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
IoT
IoTIoT
IoT
 
Internet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationInternet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M Communication
 

More from shubhangisonawane6

updated notes cds UNIT 6 and 7 communicationppt.pdf
updated notes cds UNIT 6 and 7 communicationppt.pdfupdated notes cds UNIT 6 and 7 communicationppt.pdf
updated notes cds UNIT 6 and 7 communicationppt.pdfshubhangisonawane6
 
fundamentals of digital communication Unit 5_microprocessor.pdf
fundamentals of digital communication Unit 5_microprocessor.pdffundamentals of digital communication Unit 5_microprocessor.pdf
fundamentals of digital communication Unit 5_microprocessor.pdfshubhangisonawane6
 
Fundamentals of digital communication UNIT 3 AND 4 notes.pdf
Fundamentals of digital communication UNIT 3 AND 4 notes.pdfFundamentals of digital communication UNIT 3 AND 4 notes.pdf
Fundamentals of digital communication UNIT 3 AND 4 notes.pdfshubhangisonawane6
 
fundamentals of digital communication unit 2 notes.pdf
fundamentals of digital communication  unit 2 notes.pdffundamentals of digital communication  unit 2 notes.pdf
fundamentals of digital communication unit 2 notes.pdfshubhangisonawane6
 
CDS Fundamentals of digital communication system UNIT 1 AND 2.pdf
CDS Fundamentals of digital communication system UNIT 1 AND 2.pdfCDS Fundamentals of digital communication system UNIT 1 AND 2.pdf
CDS Fundamentals of digital communication system UNIT 1 AND 2.pdfshubhangisonawane6
 
SYBSC(CS)_WCIOT_Sem-II-Unit 4 Iot Applications .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 4 Iot Applications .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 4 Iot Applications .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 4 Iot Applications .pdfshubhangisonawane6
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfshubhangisonawane6
 
SYBSC(CS)_WCIOT_Sem-II-Unit 1 Overview of wireless communication.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 1 Overview of wireless communication.pdfSYBSC(CS)_WCIOT_Sem-II-Unit 1 Overview of wireless communication.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 1 Overview of wireless communication.pdfshubhangisonawane6
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfshubhangisonawane6
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfshubhangisonawane6
 
ICPS operating system and services Unit 3 Notes .pdf
ICPS operating system and services Unit 3 Notes .pdfICPS operating system and services Unit 3 Notes .pdf
ICPS operating system and services Unit 3 Notes .pdfshubhangisonawane6
 
computer devices and memory unit 2 notes.pdf
computer devices and memory unit 2 notes.pdfcomputer devices and memory unit 2 notes.pdf
computer devices and memory unit 2 notes.pdfshubhangisonawane6
 
Introduction to Computer UNIT 1 notes.pdf
Introduction to Computer UNIT 1 notes.pdfIntroduction to Computer UNIT 1 notes.pdf
Introduction to Computer UNIT 1 notes.pdfshubhangisonawane6
 
IS notes unit 2_shubhangi Gaikar.pdf
IS notes unit 2_shubhangi Gaikar.pdfIS notes unit 2_shubhangi Gaikar.pdf
IS notes unit 2_shubhangi Gaikar.pdfshubhangisonawane6
 
Laplace Transform_SHUBHANGI GAIKAR.pdf
Laplace Transform_SHUBHANGI GAIKAR.pdfLaplace Transform_SHUBHANGI GAIKAR.pdf
Laplace Transform_SHUBHANGI GAIKAR.pdfshubhangisonawane6
 

More from shubhangisonawane6 (17)

updated notes cds UNIT 6 and 7 communicationppt.pdf
updated notes cds UNIT 6 and 7 communicationppt.pdfupdated notes cds UNIT 6 and 7 communicationppt.pdf
updated notes cds UNIT 6 and 7 communicationppt.pdf
 
fundamentals of digital communication Unit 5_microprocessor.pdf
fundamentals of digital communication Unit 5_microprocessor.pdffundamentals of digital communication Unit 5_microprocessor.pdf
fundamentals of digital communication Unit 5_microprocessor.pdf
 
Fundamentals of digital communication UNIT 3 AND 4 notes.pdf
Fundamentals of digital communication UNIT 3 AND 4 notes.pdfFundamentals of digital communication UNIT 3 AND 4 notes.pdf
Fundamentals of digital communication UNIT 3 AND 4 notes.pdf
 
fundamentals of digital communication unit 2 notes.pdf
fundamentals of digital communication  unit 2 notes.pdffundamentals of digital communication  unit 2 notes.pdf
fundamentals of digital communication unit 2 notes.pdf
 
CDS Fundamentals of digital communication system UNIT 1 AND 2.pdf
CDS Fundamentals of digital communication system UNIT 1 AND 2.pdfCDS Fundamentals of digital communication system UNIT 1 AND 2.pdf
CDS Fundamentals of digital communication system UNIT 1 AND 2.pdf
 
SYBSC(CS)_WCIOT_Sem-II-Unit 4 Iot Applications .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 4 Iot Applications .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 4 Iot Applications .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 4 Iot Applications .pdf
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
 
SYBSC(CS)_WCIOT_Sem-II-Unit 1 Overview of wireless communication.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 1 Overview of wireless communication.pdfSYBSC(CS)_WCIOT_Sem-II-Unit 1 Overview of wireless communication.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 1 Overview of wireless communication.pdf
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
ICPS operating system and services Unit 3 Notes .pdf
ICPS operating system and services Unit 3 Notes .pdfICPS operating system and services Unit 3 Notes .pdf
ICPS operating system and services Unit 3 Notes .pdf
 
computer devices and memory unit 2 notes.pdf
computer devices and memory unit 2 notes.pdfcomputer devices and memory unit 2 notes.pdf
computer devices and memory unit 2 notes.pdf
 
Introduction to Computer UNIT 1 notes.pdf
Introduction to Computer UNIT 1 notes.pdfIntroduction to Computer UNIT 1 notes.pdf
Introduction to Computer UNIT 1 notes.pdf
 
IS NOTES UNIT 4.pdf
IS NOTES UNIT 4.pdfIS NOTES UNIT 4.pdf
IS NOTES UNIT 4.pdf
 
IS notes unit 2_shubhangi Gaikar.pdf
IS notes unit 2_shubhangi Gaikar.pdfIS notes unit 2_shubhangi Gaikar.pdf
IS notes unit 2_shubhangi Gaikar.pdf
 
Laplace Transform_SHUBHANGI GAIKAR.pdf
Laplace Transform_SHUBHANGI GAIKAR.pdfLaplace Transform_SHUBHANGI GAIKAR.pdf
Laplace Transform_SHUBHANGI GAIKAR.pdf
 
Dcn
DcnDcn
Dcn
 

Recently uploaded

Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |aasikanpl
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxFarihaAbdulRasheed
 
Temporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of MasticationTemporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of Masticationvidulajaib
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...lizamodels9
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxNandakishor Bhaurao Deshmukh
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫qfactory1
 
insect anatomy and insect body wall and their physiology
insect anatomy and insect body wall and their  physiologyinsect anatomy and insect body wall and their  physiology
insect anatomy and insect body wall and their physiologyDrAnita Sharma
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.PraveenaKalaiselvan1
 
Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Gas_Laws_powerpoint_notes.ppt for grade 10
Gas_Laws_powerpoint_notes.ppt for grade 10Gas_Laws_powerpoint_notes.ppt for grade 10
Gas_Laws_powerpoint_notes.ppt for grade 10ROLANARIBATO3
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555kikilily0909
 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxEran Akiva Sinbar
 

Recently uploaded (20)

Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
 
Temporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of MasticationTemporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of Mastication
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
 
insect anatomy and insect body wall and their physiology
insect anatomy and insect body wall and their  physiologyinsect anatomy and insect body wall and their  physiology
insect anatomy and insect body wall and their physiology
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
 
Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Gas_Laws_powerpoint_notes.ppt for grade 10
Gas_Laws_powerpoint_notes.ppt for grade 10Gas_Laws_powerpoint_notes.ppt for grade 10
Gas_Laws_powerpoint_notes.ppt for grade 10
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555
 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
 

SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf

  • 1. Unit 3 IoT Architecture Prepared By: Shubhangi Gaikar
  • 2. Introduction to IoT • The internet of things (IoT) is a large network of connected things to things, people to people & people to things. • On a broader platform, IoT can be applied to things like smart cities, transportation networks, manufacturing industries, which generates a massive amount of sensor data. • All these sectors need to figure out a way to store, analyze, and make the decisions based on analysis of the data to increase the performance in industrial sector. • Communication between computers started with the EDI (Electronic Data Interchange) that made possible direct dialogue between two PCs. • With the Internet, all the computers connected to the Internet can talk to each other or communicate to each other. • Until now the Internet has been the first place for uniting people by means of different types of social media (Email, Blog, Facebook, Twitter, Flickr, …). • Now it is being transformed into the tool that will allow all objects to interact and in certain cases to gain access to the collective knowledge that they will generate.
  • 3.
  • 5. • In pre-internet era when their is no internet or and their is only HUMAN to HUMAN Communication, it may be via “Fixed Telephonic Line or SMS”, at this time their is only network. • Then Comes the era of Internet of CONTENT with the evolution of World Wide Web (WWW) in this time we started using Email and minor messaging Service. • After that Comes the era of Internet of SERVICES with the evolution of WEB 2.0 the major game changer of modern internet. In this era we started using internet more frequently for communication and other purpose. Service like E-Commerce and E-productivity was born. • Now we are living in Era of Internet of PEOPLE where humans are connected with each other in various ways and in real time not only via phone and SMS. • In this time Services like Facebook, Twitter, LinkedIn, Skype, YouTube etc. was born. But till now Human are communicating with humans. • Now its time for MACHINE to MACHINE communication, again a result of continuous Evolution and this is how "Internet of Things " was born. • In this era machine become more intelligent and like humans they have their own identity, Understanding and other features of a human still they are lacking in Sense and intelligence then again with the evolution of technologies like Artificial Intelligence and NPL/ML they with secure that in future.
  • 6. The origin of Web 1.0 • Static webpages • No interaction / content contribution from the users. • Proprietary protocols and applications. • Publication oriented. • Newspapers, Portals, Britannica Online, etc The origin of Web 2.0 • Dynamic content – user dependent outcome • Connecting with other people via social networking – Facebook, LinkedIn, Twitter…. • Community tagging • Voting • E-commerce boom – Amazon, e-bay, etc. • Services like Google docs, Calendar, Cloud, etc. • Application based user interaction • Web-based apps • Android, iOS, etc
  • 7. Web 3.0 • Intelligent and Omnipresent • Increase in Open Standards • MOOCs (Massive Open Online Course) • Advanced protocols and algorithms • Context based Content generation using Machine Learning, AI etc. • Customized to the user • Information exchange between Machines (IoT and M2M) • Wireless Sensor Networks • Smart Homes • Wearable Technology
  • 8. The Internet of Things (IoT) • Conceptualized in the early 2000’s, at MIT’s Auto-ID lab by Kevin Aston “If we had computers that knew everything there was to know about things—using data they gathered without any help from us -- we would be able to track and count everything, and greatly reduce waste, loss and cost” - Kevin Aston in 1999 • “The Internet of Things is a system where items in the physical world, and sensors within or attached to these items, are connected to the Internet via wireless or wired Internet connections”
  • 9. M2M and/or IOT • M2M, or machine-to-machine, is the foundation of the sophisticated device connectivity that we enjoy today. • An M2M connection is a point-to-point connection between two network devices that allows them to transmit information via public networking technologies such as Ethernet and cellular networks. • Sensor telemetry is one of the original uses of M2M communication. For decades, businesses have used M2M to remotely monitor factors like temperature, energy consumption, moisture, pressure and more through sensors. • ATMs are great example of M2M technology. The ATM’s internal computer is constantly communicating with a host processor that routes transactions to the appropriate banks and accounts. • The banks then send back approval codes through the host processor, allowing transactions to be completed. • the entire transaction happens remotely and without any need for a human operator on the bank’s side. Machines communicate smoothly, efficiently and automatically, allowing transactions to be authorized in seconds. • M2M technology has a decades-long track record of improving the world’s ability to communicate and execute transactions effectively across long distances and in real time.
  • 10. • IoT, or the Internet of Things, is an evolution of M2M that increases the things that device connectivity can achieve at both a consumer and an enterprise level. • IoT takes the basic concepts of M2M and expands them outward by creating large “cloud” networks of devices that communicate with one another through cloud networking platforms. • The technologies used by IoT devices allow users to create fast, flexible, high- performance networks that connect a wide variety of devices. • Examples of IoT devices are all around us today. Smart home voice assistants like Alexa and Google Home are some of the most high-profile examples, along with the huge array of smart home devices that they connect to. • Any network of devices that’s connected to the Internet and uses a cloud platform to communicate can be considered part of the IoT. • IoT can function outside of the cloud, it’s the cloud that makes it useful to businesses and consumers.
  • 11. Elements of IoT • There are many technological aspects, layers, applications, and Components of IoT networks. But most of these IoT architectures are built upon core fundamentals. • Smarter Devices in a different form. • Network and Gateway that allows devices to be part of the IoT. • Middleware that includes data storage spaces and advanced predicting capabilities. • End-user applications.
  • 12. • These Elements of IoT define the fundamentals of almost every IoT system on the globe. Still, they are divided into multiple architecture layers to further refine the overall IoT network. • Perception Layer that manages smart devices across the system. • Connectivity/Transport Layer allows transferring data from the cloud to devices and vice-versa, different aspects of gateways and networks. • Processing Layer that controls and manages IoT levels for streamlining data across the system. • Application Layer that aids in the procedures of analytics, device control, and reporting to end-users.
  • 13. • With continuous changes in the IT environment, many organizations have added three additional layers to their infrastructure. Here is an IoT Block diagram showing the various stages of IoT architecture layers. • Business layer that derives information and decision-making analysis from data. • Security Layer that covers all aspects of protecting the whole IoT architecture • Edge Computing Layer that works at an edge or near the device information collection.
  • 15. Perception Layer • IoT layers form the components of the internet physical design of IoT, acting as a medium between the digital and real world. • Perception layer has the main function of transforming analog signals into the digital form and vice versa. • Sensors: They are very small devices or systems built to understand and detect the change in their environment and further streamline information to their system. • Sensors have the unique ability to detect physical parameters such as humidity or temperature, then transforming them into electronic signals. • Actuators: These represent a part of the machine that allows an electrical signal to be transformed into physical actions. These Actuators play a crucial role as components of IoT networks. • Machine and Devices: They are the main devices that have actuators and sensors. • In IoT architecture, there is no limitation of location or distance between two or more devices that can be spread across the globe.
  • 16. Connectivity Layer • In the second Connectivity layer, communication takes center stage between the physical layer of devices and IoT architecture. This communication takes place via two methods; • First directly by either TCP or UDP/IP stack and Second, gateways act as a link between Local Area Network (LAN) and Wide Area Network (WAN), thus providing a path for information to pass through multiple protocols. Several network technologies are integrated across IoT systems that include: • Wi-Fi, the most popular and versatile technique used across data-driven technologies. Wi-Fi modems are suitable for Smart homes, personal offices, and even corporate offices for seamless communication between LAN and WAN, respectively. • Ethernet represents the hardware that supports fixed or permanent devices such as video cameras, gaming consoles, and security installations. • Bluetooth is another widely used technology suited mainly for communication between devices within a short range. A perfect example would be headphones that can work on small power and simultaneously share fewer data over the network.
  • 17. • NFC (Near Field Communications) allows communication between a very short distance of 4 inches or less. • LPWAN (Low Power Wide Area Network), designed and built to match the IoT usage across long distances. These low-power WAN devices can last as much as 10+ years while consuming low power throughout. • However, it can send signals to give precise information over a long periodic duration. These include devices for smart buildings, smart fields, smart cities, etc. • ZigBee is another advanced wireless networking technology that consumes low power and can offer small data-sharing ability. ZigBee is built with the main focus for home automation and also has shown remarkable success for medical, scientific, and industrial protocols. • Cellular networks are ideally suited for communication on a global scale with more trust and reliability. For IoT, there are two broad IoT levels of the cellular network as • LTE-M is Long Term Evolution for Machines that provides a very high-speed exchange of data and smooth direct cloud communication. • NB-IoT as Narrowband that offers small data exchange using low-frequency channels respectively.
  • 18. • There are also messaging protocols present in the IoT system that allows seamless data sharing. Here is a list of top protocols present in the IoT architecture layers as of now. • Data Distribution Service (DDS) represents a machine-to-machine real-time messaging framework in IoT systems. • Advanced Message Queuing Protocol (AMQP) provides server protocols for servers via peer-to-peer data exchange. • Constrained Application Protocol (CoAP) defines the protocols for constrained devices that use low power and low memory, such as wireless sensors. • Message Queue Telemetry Transport (MQTT) represents the messaging protocol standards for low-powered devices using TCP/IP for seamless data communication.
  • 19. Edge Layer • In the early stages, with IoT networks gaining size and numbers, latency becomes one of the major hurdles. • when multiple devices tried connecting with the main center, it clogged the system delaying the procedure. • Here edge computing offered a unique solution that accelerated the growth of IoT Systems overall. • Now with the edge IoT layers, systems can process and analyze the information close to the source as much as possible. • Edge has now become the standard for the 5th Generation of mobile networks (5G), offering systems to connect with more devices at a lower latency than the prevailing 4G standards. • All the procedures for the IoT networks take place at the edge. • Thus saving time, resources and further resulting in real-time reactions and improved performance.
  • 20. Processing Layer IoT systems are designed to capture, store, and process data for further requirements in this layer. In the processing layer, there are two main stages. 1) Data Accumulation • Every device is sending millions of data streams across the IoT network. • Here data comes in various forms, speeds, and sizes. Separating the essential data from these large streams is a primary concern that professionals must prioritize in this layer. • Unstructured data in raw form such as photos and video streams can be quite enormous and must be done efficiently to gather intelligence factors for the business. • Professionals must have a thorough understanding of the business procedures to pinpoint data requirements precisely and help procure future benefits.
  • 21. 2) Data Abstraction • Once the data accumulation stage is finished, selected data is taken out from the large data for application to optimize their business procedures. Here the data abstraction follows the path as: • Collecting all the data from all IoT and non-IoT systems (CRM, ERP, & ERM) • Using data virtualization to make data accessible from a single location • Managing raw data in multiple forms • Interoperability among devices and architecture plays a crucial role in the processing layer. • Once data accumulation and abstraction are complete, it is easy for data analysts to use business acumen in fetching intelligence factors.
  • 22. Application Layer • In this layer, Data is further processed and analyzed to gather business intelligence. Here IoT systems get connected with middleware or software that can understand data more precisely. • Some examples of the Application layer include: • Business decision-making software’s • Device control and monitoring services • Analytics solutions built with Machine learning and Artificial Intelligence • Mobile Application for further interactions • Each IoT system is built with its particular goals and objectives to match with business specifications. • At present, most of the IoT Applications are working at a varying complexity and operate a multitude of technology stacks performing specific tasks for businesses.
  • 23. Business Layer • Once IoT data is procured, it is valuable only if it applies to business planning and strategy. • Every business has specific goals and objectives that it wants to accomplish by gathering intelligence from data. • Business owners and stakeholders use data from past and present data to plan precisely for the future. • Today Data analysis has become the new oil for industries to enhance their productivity. • Businesses are competing to get more data into their business for analysis and decision-making. • Here software, CRM, and business intelligence programs have gained a lot of popularity in industries for superior performance.
  • 24. Security Layer • With modern challenges, security has become one of the main necessities of IT architecture. Data breach, tracking malicious software, and hacking are the main challenges with Security Layer in integrating IoT systems. Device Security • The first point of security in the IoT layers starts with the devices themselves. Most of the manufacturers follow security guidelines to install in both firmware and hardware for IoT integration. Some of the essential measures are: • Secure boot process to avoid any malicious code running on a device • Using Trusted Platform Module (TPM) chips in combination with cryptographic keys for devices endpoint protections • Extra physical layer to avoid direct access via the device. • Regular updates for security patches.
  • 25. Cloud Security • Now Clouds are taking over from the traditional server for data storage and communication. • Cloud data security is of paramount importance, especially for IoT systems. • Mechanisms include multiple authorization factors and encryptions to avoid any data breach. • Here the process of verifying any new device is an essential crux that must have strict regulations for device identity management. Connection Security • While transferring data across the network, it must be encrypted from an end-to-end point across the IoT system. • Here messaging protocols such as DDS, AMQP, and MQTT are integrated to secure sensitive information from any breach. • The use of TSL cryptographic protocol is recommended industry standard across IoT architecture for data communication.
  • 26. Role of cloud in IoT • The Internet of Things (IoT) has gradually transformed the way daily tasks are completed. • E.g. smart home, where people can start their cooling devices remotely through their mobile phones, earlier tis was possible via an SMS, but today the internet has made it easier. • Apart from smarter solutions for homes and housing communities, IoT has also been used as a tool in business environments across various industries. • However, with the amount of big data that is generated by IoT, a lot of strain is put on the internet infrastructure. • This has made businesses and organizations look for an option that would reduce this load. • Cloud computing is an on-demand delivery of computing power, database storage, applications and IT resources.
  • 27. • It enables organizations to consume a computing resource, like a virtual machine (VM) instead of building a computing infrastructure on premise. • Today, cloud computing has more or less penetrated mainstream IT and its infrastructure. • Many tech biggies such as Amazon, Alibaba, Google, Microsoft and Oracle are building machine learning tools with the help of cloud technology • These tools offer a wide range of solutions to businesses worldwide. So role of cloud computing in IoT is inseparable. • Cloud computing, as well as IoT, work towards increasing the efficiency of everyday tasks and both have a complementary relationship. • cloud computing is built on the tenets of speed and scale. • IoT applications are built on the principle of mobility and widespread networking.
  • 28. • Hence, it is essential that both cloud and IoT form cloud-based IoT applications in a bid to make the most out of their combination. • Cloud as a technology empowers IoT to move beyond regular appliances. This is because the cloud has such a vast storage that it takes away dependencies on on-premise infrastructure. • With the rise of miniaturization and transition of 4G to higher internet speeds, the cloud will allow developers to offload fast computing processes. • Cloud has made IoT more secure with preventive, detective and corrective controls. • It has enabled users with strong security measures by providing effective authentication and encryption protocols.
  • 29. • IoT is generally implemented with plug-and-play hosting services. Which is why the cloud is a perfect fit for IoT. • Hosting providers do not have to depend on massive equipment or even any kind of hardware that will not support the agility IoT devices require. • With the cloud, most hosting providers can allow their clients a ready-to-roll model, removing entry barriers for them. • Cloud acts as a bridge in the form of a mediator or communication facilitator when it comes to IoT. • This makes devices easy to talk to each other. • It would be fair to say that cloud can accelerate the growth of IoT.
  • 30. Cloud topologies Inter-Clouds • The Inter-Cloud is an interconnected global "cloud of clouds" and an extension of the Internet "network of networks" on which it is based. • Inter-Cloud computing is interconnecting multiple cloud providers’ infrastructures. • The main focus is on direct interoperability between public cloud service providers. • To provide cloud services as utility successfully, interconnected clouds are required. Interoperability and portability are important factors in Inter-Cloud.
  • 31. The limitations of cloud • The limitations of cloud are that they have limited physical resources. • If a cloud has exhausted all the computational and storage resources, it cannot provide service to the clients. • The Inter-Cloud addresses such situations where each cloud would use the computational, storage, or any kind of resource of the infrastructures of other clouds. • The Inter-Cloud environment provides benefits like diverse Geographical locations, better application resilience and avoiding vendor lock-in to the cloud client. • Benefits for the cloud provider are expand-on-demand and better service level agreements (SLA) to the cloud client.
  • 32. Types of Inter-Cloud: Federation Clouds • A Federation cloud is an Inter-Cloud where a set of cloud providers willingly interconnect their cloud infrastructures in order to share resources among each other. • The cloud providers in the federation voluntarily collaborate to exchange resources. • This type of Inter-Cloud is suitable for collaboration of governmental clouds (Clouds owned and utilized by nonprofit institution or government) or private cloud portfolios (Cloud is a part of a portfolio of clouds where the clouds belong to the same organization). • Types of federation clouds are Peer to Peer and Centralized clouds.
  • 33. Multi-Cloud: • In a Multi-Cloud, a client or service uses multiple independent clouds. A multi-cloud environment has no volunteer interconnection and sharing of the cloud service providers’infrastructures. • Managing resource provisioning and scheduling is the responsibility of client or their representatives. • This approach is used to utilize resources from both governmental clouds and private cloud portfolios. Types of Multi-cloud are Services and Libraries.
  • 34. Topologies of different Cloud Architectures. Peer to peer Inter-Cloud federation: • Clouds collaborate directly with each other but may use distributed entities for directories or brokering. • Clouds communicate with each other and negotiate directly without mediators. • Peer to Peer Inter-Cloud federation is depicted in Figure. • The Inter-Cloud projects that use Peer to Peer federation are RESERVOIR (Resources and Services Virtualization without Barriers Project).
  • 35. • Centralized Inter-Cloud federation: • Clouds use a central entity to perform or facilitate resource sharing. • The central entity acts as a storehouse where the available cloud resources are registered. • Centralized Inter-Cloud federation is depicted in Figure. • The Inter-Cloud projects that use Centralized Inter-Cloud federation are Inter-Cloud, Contrail, Dynamic Cloud Collaboration (DCC) and Federated Cloud Management.
  • 36. Cloud Access What is Cloud Computing? “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” What is an Access Control? • Access control is generally a policy or procedure that allows, denies or restricts access to a system
  • 37. Cloud computing attacks • Denial of Services attacks • Side Channel attacks • Authentication attacks • Man in the middle cryptographic attacks • Inside Job attacks Due to this attacks, we need a better security policy in cloud computing. Access control identify users attempting to access a system unauthorized.
  • 38. Access control traditional model • Application Centric Access Control • Application manages its users • Require lots of storing memory • Username and password storage • User Centric Access Control • Services Providers contain all users information • The Traditional model for access control is application centric Access control. • Where each application keeps track of its collection of users and manages them, is not feasible in cloud based architectures. • Because in this method we need a lot of memory for storing the user details such as username and password. • So cloud requires a user centric access control where every user request to any services provider is bundled with the user identity and entitlement information.
  • 39. Access control models • Mandatory Access Control (MAC) • Discretionary Access Control (DAC) • Role Base Access Control (RBAC) • Due to differences in requirements for military and commercial security policies, two distinctive kinds of policies had to be developed. • This produced two different access control models which are Mandatory Access Control (MAC), Discretionary Access Control (DAC). • These models have a number of flaws, which led to the proposal of other models such as Role-Based Access Control (RBAC). • However, we believe these models may not work in cloud computing as each one of them was proposed for a specific environment to fulfil consumers’ security requirements.
  • 40. Mandatory Access Control • Access decisions to a subject is given by Central authority • Access Class assign by Mandatory Access Control • Access Class • Object Classification • Subject Clearance • In the Mandatory Access Control (MAC) model, a central authority is in command of giving access decisions to a subject that request access to objects or information in objects. • In order to secure access to objects and the information that flows between objects, MAC assigns an access class to each subject and object. • An access class is a security level that is used to secure the flow of information between objects and subjects with dominance relationship. • Object classifications are security labels that are used to classify objects based upon the sensitivity of information they have. • Subject clearances are security levels used to reflect the trustworthiness or rules of subjects. • Although the mandatory access control model provides protection against information flow and indirect information leakages, it does not guarantee complete secrecy of the information.
  • 41. Discretionary access control (DAC) • Object owners has privilege to set access to the object • Less Secure • No risk awareness • No privileges toward the object • No control in information flow • The Discretionary Access Control (DAC) model, grants the owners of objects the ability to restrict access to their objects, or information in the objects based upon users’ identities or a membership in certain groups. • DAC model is generally less secure than mandatory access control model, so it is used in environments that do not require a high level of protection. • Since DAC depends on allowing owners of objects to control access permissions to objects, yet it has many side-effects when it is utilized in cloud computing. • For instance, there is no mechanism or method to facilitate the management of improper rights (e.g. risk awareness), which owners of objects can give to users. • Occasionally users are required to use privileges that reveal information about objects to third parties. • For instance, a user can only read a file in a company, and then s/he can copy the file contents to another file in order to pass it to another user. • The DAC does not have the ability to control information flow or deal with Trojan horses that can inherit access permissions. Finally, it is not scalable enough for cloud computing.
  • 42. Role based access control (RBAC) • Control Access to resources naturally • RBAC motivation • Subject responsibility is important than whom the subject is • Subject can have more roles • Violation of access security policy • For example: Health care system • Role-based access control (RBAC) is considered as a natural way to control access to resources in organizations and enterprises. • The motivation behind RBAC comes from considering a subject’s responsibility is more important than whom the subject is. • In the RBAC model, a subject can have more than one role or be a member of multiple groups. For example, an employee within an organization can be a member in secretaries group and employees group. • Despite that, roles can give a subject more rights than she/he necessarily needs to have, with a possibility of having another role which could lead to the violation of the access security policy. • For example, In a health care system, there is always a sequence of operations will need to be controlled. • For example, a doctor in order to give a patient the right treatments, she/he needs to examine the patient’s physical conditions, look at the patient’s medical history and asks for tests or scans. S/he might ask for help from another doctor or transfer some information to another hospital. • Each one of the previous operations needs a different set of permissions. Thus, the RBAC may not be able to ensure access for a sequence of operations in cloud computing.
  • 43. IoT Protocols • Low Power communication protocols : COAP, MQTT, RPL, 6LoWPAN, 802.15.4, Low Power Wide Area Network (3GPP and others)
  • 44. • Infrastructure (ex: 6LowPAN, IPv4/IPv6, RPL) • Identification (ex: EPC, uCode, IPv6, URIs) • Comms / Transport (ex: Wifi, Bluetooth, LPWAN) • Discovery (ex: Physical Web, mDNS, DNS-SD) • Data Protocols (ex: MQTT, CoAP, AMQP) • Device Management (ex: TR-069, OMA-DM, LWM2M) • Semantic (ex: JSON-LD, Web Thing Model) • Multi-layer Frameworks (ex: Alljoyn, IoTivity, Weave, Homekit
  • 45. Constrained Application Protocol (COAP) • CoAP is a specialized Internet Application Protocol for constrained devices. It enables those constrained devices called "nodes" to communicate with the wider Internet using similar protocols. • RESTful protocol design minimizing the complexity of mapping with HTTP • Low header overhead and parsing complexity • URI and content-type support • Support for the discovery of resources provided by known CoAP services • Simple subscription for a resource, and resulting push notifications
  • 46. Message Queuing Telemetry Transport (MQTT) • Invented by IBM in 2000 for telemetry applications using low power data rates. • Enables a publish/subscribe messaging model in an extremely lightweight way. • Requires Small Code footprint and low bandwidth. • MQTT clients are very small, require minimal resources so can be used on small microcontrollers. MQTT message headers are small to optimize network bandwidth. • MQTT allows for messaging between device to cloud and cloud to device. This makes for easy broadcasting messages to groups of things. • MQTT makes it easy to encrypt messages using TLS and authenticate clients using modern authentication protocols, such as OAuth.
  • 47. IEEE 802.15.4 • IEEE 802.15.4 is a standard which specifies the physical layer and media access control for low-rate wireless personal area networks (LR-WPANs). • It is maintained by the IEEE 802.15 working group. • It is the basis for the ZigBee, ISA100.11a, WirelessHART, and MiWi specifications, each of which further extends the standard by developing the upper layers which are not defined in IEEE 802.15.4 • It is used with 6LoWPAN and standard Internet protocols to build a wireless embedded Internet. Zigbee • Uses the 802.15.4 standard and operates in the 2.4 GHz frequency range with 250 kbps • The maximum number of nodes in the network is 1024 with a range up to 200 meter. ZigBee can use 128 bit AES encryption.
  • 48. Bluetooth Low Energy • Designed and marketed by the Bluetooth Special Interest Group • Different Profiles for Different applications • Provide the same range as classic Bluetooth with considerable • Low energy consumption • The technology used in beacons used to send contextual information • Based on locations (Google beacon platform , Google Physical web, Apple ibeacon)
  • 49. • Weightless-P is an ultra high performance LPWAN connectivity technology for the Internet of Things. • Weightless is a proposed proprietary open wireless technology standard for exchanging data between a base station and thousands of machines around it (using wavelength radio transmissions in unoccupied TV transmission channels) with high levels of security. • NB-IoT (Narrow-Band IoT) A technology being standardized by the 3GPP standards body. It is a standards-based low power wide area (LPWA) technology developed to enable a wide range of new IoT devices and services. • NB-IoT significantly improves the power consumption of user devices, system capacity and spectrum efficiency, especially in deep coverage. • Supported by all major mobile equipment, chipset and module manufacturers, NB-IoT can co-exist with 2G, 3G, and 4G mobile networks.
  • 50. • LTE-MTC (LTE-Machine Type Communication) - • To address the challenges of cellular-based M2M/IoT devices, the standardization group 3GPP, which is responsible for cellular telecommunications network standards, has developed a new version of the LTE standard which delineates a type of LTE-based device (i.e., Cat-M, Cat-0) designed to meet the needs of a wide range of M2M/IoT devices, Called LTE for Machine-Type Communication (LTE-MTC / LTE-M) by 3GPP. • EC-GSM-IoT (Extended Coverage-GSM-IoT) - Enables new capabilities of existing cellular networks for LPWA (Low Power Wide Area) IoT applications. EC- GSM-IoT can be activated through new software deployed over a very large GSM footprint, adding even more coverage to serve IoT devices. • Sigfox is a French company that build Low Power wide network for connected devices using its proprietary protocol. • LoRaWAN - Network protocol intended for wireless battery operated Things in regional, national or global network. It is managed by Lora Alliance. • RPMA (Random phase multiple access) A technology communication system employing direct-sequence spread spectrum (DSSS) with multiple access.
  • 51.
  • 52.
  • 53. IPv6 over Low power Wireless PersonalArea Networks (6LoWPAN) • The 6LoWPAN system is used for a variety of applications including wireless sensor networks. This form of wireless sensor network sends data as packets and using IPv6. • An adaption layer for IPv6 over IEEE802.15.4 links Operates only in the 2.4 GHz frequency range with 250 kbps transfer rate. • Routing Protocol for low Power and Lossy Networks (RPL) Developed by IETF ROLL Working Group.
  • 54. Cross connectivity across IoT system components • IoT consists of several technological layers which all play a role in the route from simply connecting ‘things’ and IoT devices to building applications that serve a clear goal. • Here, we first look at the IoT technology stack and especially at the first three layers of that IoT technology stack. • The first is the IoT device level; as without accurate sensors, actuators and IoT devices in general, no accurate data and without accurate data no Internet of Things, let alone IoT projects or products/services. • The second is the IoT gateway, which we covered more in-depth but deserves a spot as a layer and certainly in an overview of the IoT device layer with which it is strongly connected and for which is a necessary level towards the next steps of actionable data and business applications or consumer apps and services. • The third is the IoT platform layer where we connect with the business and consumer applications and services, as well as the development of these services and the management and interconnection with the first two layers.
  • 55.
  • 56. • An IoT gateway bridges the communication gap between devices, sensors, equipment, systems and the cloud. • By systematically connecting the cloud, IoT gateway offer local processing and storage, as well as an ability to autonomously control field devices based on data inputs by sensors. • IoT gateways also enable customers to securely aggregate, process and filter data for analysis. • It helps ensure that the federated data generated by devices and systems can travel securely and safely from the edge to the cloud. • The biggest challenge lies in enabling interoperability by supporting multiple connectivity sensor protocols, like Z-Wave, ZigBee, BLE, Wi-Fi, BACnet etc. • The connected sensors and devices, in an IoT ecosystem, should be able to seamlessly intercommunicate with other devices through the Gateway or send the required data to the cloud.
  • 57. Device to Gateway-short range Wireless: Cellphone as a Gateway: • Today, smartphones play a very important role in the IoT-based communication ecosystem. • The smartphone is practically the first IoT device that is readily available and used by millions across the world and this number is growing every day. • Smartphones are mostly used to view and control IoT devices (non-living things) by the end user (a living thing), either directly or via IoT servers. • But a smartphone with multiple built-in sensors like GPS, camera, accelerometer, gyroscope, proximity etc. and wireless communication technology - Wi-Fi, Bluetooth, RFID, NFC etc. can play a significant role in acting as an edge gateway. • This will optimize the cost and adoptability of IoT technology among common people across the world.
  • 58. Advantages: Mobile as a Universal IoT Gateway The smartphone will add more value as a gateway with the collected data from edge IoT devices as well as from the user to make more intelligent decisions dynamically. • Commonly used devices for individuals will increase adoptability • Robust platform provided by software giants • Significant storage and data processing capabilities • Built-in communication protocol • Secure sandbox architecture • Easy to maintain, upgrade and enhance
  • 59. Dedicated wireless Access points • An access point connects users to other users within the network and also can serve as the point of interconnection between the WLAN and a fixed wire network. • Each access point can serve multiple users within a defined network area, as people move beyond the range of one access point, they are automatically handed over to the next one. • A small WLAN may only require a single access point; the number required increases as a function of the number of network users and the physical size of the network.
  • 60. Gateway to cloud • A gateway is a device that connects its client devices to Cloud IoT Core and performs several tasks on their behalf, such as: • Communicating with Cloud IoT Core. • Connecting to the internet when the device can't directly connect itself, such as a ZigBee or Bluetooth device. • Authenticating to Cloud IoT Core when the device can't send its own credentials, or when you want to add a layer of security by using the credentials of both the device and the gateway. • Publishing telemetry events, getting configuration data, or setting device state. • Storing and processing data. • Translating protocols. • Cloud IoT Core supports gateway connections and communication over both MQTT and HTTP.
  • 61. Wired Connectivity for Long range communication • Wired and Wireless have both advantages and disadvantages when it comes • IoT technology is deployed in many ways so no single network solution is right. It depends on the situation and where the devices are located. • Some of the factors affecting the selection of the type of network are network range, network bandwidth, power usage, interoperability, intermittent connectivity and security. • A wired network uses Ethernet cable to connect to the network. The Ethernet cable is in turn connected to a DSL or cable to the network gateway. • The wired networks are mature technology and it is easy to get plugged into if you already have phone lines, power lines, and coaxial cable lines. • Even in the case of wireless network, those networks are usually connected to a wired network at some point; hence the most commonly used network is a hybrid of both wired and wireless network connectivity.
  • 62. Benefits of the wired monitoring devices • Reliability: Ethernet connections have been in existence much longer than Wi-Fi technology, which makes it much more reliable. They are less prone to dropped connections and are more reliable without constant debugging. • Speed: Wired connections are less affected by local factors like walls, floors, cabinets, length of the room, interference from other electronic devices etc. This enables wired connectivity to be much faster than wireless. • Wired data transmissions are not sensitive to distances and placement of devices does not have any adverse effect on the performance of the connection. • Security: Wired connections are usually housed behind your Local Area Network (LAN) firewall and hence it allows for complete control of the communications system. This means there is no broadcasting data that can be hacked into.
  • 63. LPWANs • Low power wide aera network(LPWANs) are the new phenomenon in IoT. By providing long-range communication on small, inexpensive batteries that last for years, • This family of technologies is purpose-built to support large-scale IoT networks sprawling over vast industrial and commercial campuses. • LPWANs can literally connect all types of IoT sensors – facilitating numerous applications from asset tracking, environmental monitoring and facility management to occupancy detection and consumables monitoring. • Nevertheless, LPWANs can only send small blocks of data at a low rate, and therefore are better suited for use cases that don’t require high bandwidth and are not time-sensitive. • Also, not all LPWANs are created equal. Today, there exist technologies operating in both the licensed (NB-IoT, LTE- M) and unlicensed (e.g. MYTHINGS, LoRa, Sigfox etc.) • Power consumption is a major issue for cellular-based, licensed LPWANs. • Quality-of-Service and scalability are main considerations when adopting unlicensed technologies. • Standardization is another important factor to think of if you want to ensure reliability, security, and interoperability in the long run.
  • 64. Cellular (3G/4G/5G) • Well-established in the consumer mobile market, cellular networks offer reliable broadband communication supporting various voice calls and video streaming applications. • On the downside, they impose very high operational costs and power requirements. • While cellular networks are not viable for the majority of IoT applications powered by battery-operated sensor networks, they fit well in specific use cases such as connected cars or fleet management in transportation and logistics. • For example, in-car infotainment, traffic routing, advanced driver assistance systems (ADAS) alongside fleet telematics and tracking services can all rely on the ubiquitous and high bandwidth cellular connectivity. • Cellular next-gen 5G with high-speed mobility support and ultra-low latency is positioned to be the future of autonomous vehicles and augmented reality. • 5G is also expected to enable real-time video surveillance for public safety, real-time mobile delivery of medical data sets for connected health, and several time-sensitive industrial automation applications in the future.
  • 65. Satellite-based IoT • Cellular services used to manage remote assets and operations come with a few challenges. • Many enterprises operate in remote areas where cellular connectivity is limited. • LPWA (Low-Power Wide-Area) networks are a new type of non-cellular protocol, and were developed to satisfy IoT applications that require long range, low bit-rate and low power consumption. • LPWA networks still face challenges due to fragmented regulations and a lack of global connectivity. • Solution to these problems is satellite-based IoT services - a strong alternative whether you compare satellite vs cellular or satellite vs LPWA networks.
  • 66. • Satellite services have unique and necessary characteristics required for proper implementation of an IoT ecosystem. With more than 20 billion connected “things” expected to be in use throughout the world by 2020 • Satellites have unique advantages​ to connect IoT assets, offering truly ubiquitous coverage which can reach objects with limited or no access to terrestrial networks. • It is highly reliable with guaranteed SLA’s and delivers a consistent service across the coverage. • Combining satellite technology with terrestrial IoT will be the key that professionals need to ensure connectivity to their assets, no matter where they are. • While it is true that satellite technology is the ideal complement to terrestrial IoT networks, past adaptations were not designed for IoT and therefore were more expensive and complex than other solutions.
  • 67. • Satellite technology can deliver a variety of frequencies, orbits, and speeds, to provide services tailored to “smart” applications. • Currently, around 2.7 million devices are supported through satellite IoT.4 These devices include infrastructure, smart grid, oil and gas, disaster monitoring, and environmental monitoring. • The broad coverage of satellite services means that these devices can be reliably supported anywhere in the world. • Satellite services already support key vertical markets. • For e.g. satellite services are utilized in Military support, border patrol, shipping, aviation, and fleet management, and serve a critical redundancy role. • Satellite is able to bridge the gap between the urban-rural divide and provide IoT to remote locations in a way that terrestrial providers alone are incapable of doing in an economical way.
  • 68.
  • 69. Device-to-Cloud Communications • Device-to-Cloud Communications In a device-to-cloud communication model, the IoT device connects directly to an Internet cloud service. • This approach frequently takes advantage of existing communications mechanisms like traditional wired Ethernet or Wi-Fi connections • Tis kind of approach establishes a connection between the device and the IP network, which ultimately connects to the cloud service. • There are two common transport- and application-layer protocols that help facilitate communication between an IoT device and a cloud service. • At the transport-layer level, the device-to-cloud communication usually takes place either via Transmission Control Protocol (TCP) or User Datagram Protocol (UDP)
  • 70.
  • 71. • At the application-layer level, Hyper Text Transfer Protocol (HTTP) is the common standard to send connection requests and return responses for TCP-based communications. • Message Queuing Telemetry Transport (MQTT) is another application-layer protocol; it’s lightweight with a small code footprint and is becoming popular in resource-constrained IoT devices. • This communication model is employed by some popular consumer IoT devices like the Nest Labs Learning Thermostat and the Samsung Smart TV. • In the case of the Nest Learning Thermostat, the device transmits data to a cloud database where the data can be used to analyze home energy consumption.
  • 72. • This cloud connection enables the user to obtain remote access to their thermostat via a smartphone or Web interface, and it also supports software updates to the thermostat. • Similarly with the Samsung Smart TV technology, the television uses an Internet connection to transmit user viewing information to Samsung for analysis and to enable the interactive voice recognition features of the TV. • In these cases, the device-to-cloud model adds value to the end user by extending the capabilities of the device beyond its native features. • However, interoperability challenges can arise when attempting to integrate devices made by different manufacturers. Frequently, the device and cloud service are from the same vendor. I • If proprietary data protocols are used between the device and the cloud service, the device owner or user may be tied to a specific cloud service, limiting or preventing the use of alternative service providers.
  • 73. Comparison of LoRa, Sigfox NB-IoT • While the number of connected devices continues to rise, the maturing wireless technologies that support them are also continuing to get a good deal of attention globally. • NB-IOT (Narrowband IOT), LoRa, and Sigfox, all low-power, wide- area network (LPWAN) technologies, are often pitted against one another in what’s portrayed as a race to the top. • Each of these technologies will likely play an important role in the IoT space depending on the use case, so understanding the features and differences of each is critical.
  • 74. Narrowband IoT • NB-IoT is the initiative by the Third Generation Partnership Project (3GPP), the organization behind the standardization of cellular systems. • It addresses the needs of very low data rate devices that need to connect to mobile networks, often powered by batteries. • As a cellular standard, the goal of NB-IoT is to standardize IoT devices to be interoperable and more reliable. • Because NB-IoT is a cellular-grade wireless technology that uses OFDM modulation, the chips are more complex, but the link budgets are better. • That means users get the high performance level associated with cellular connections, but at the cost of more complexity and greater power consumption.
  • 75. • NB-IoT is meant to be used to send and receive small amounts of data—a few tens or hundreds of bytes per day generated by low data-producing IoT devices. • It is message-based, similar to Sigfox and LoRa, but with a much faster modulation rate that can handle a lot more data than those technologies. • NB-IoT is not an IP-based communication protocol like LTE-M (another LPWA cellular technology associated with IoT applications). • You can’t actually connect to an IP network and expect to use it as you would with a smartphone. • It was made for simple IoT applications and is more power efficient than LTE-M, but designed for more infrequent communication purposes. • So NB-IoT will be for simple devices that need to connect to an operator network via licensed spectrum. • It is currently being piloted and tested only in Europe, and is not widely available except through a small number of operators in Europe that are doing some trials. • If you follow the company Sigfox, you will recognize this as the 3GPP community’s attempt to address the market space created by networks like Sigfox.
  • 76. THE ADVANTAGES OF NB-IOT ARE: • If NB-IOT existed and was deployed: • The coverage would be very good. NB-IoT devices rely on 4G coverage, so they would work well indoors and in dense urban areas. • It has faster response times than LoRa and can guarantee a better quality of service. THE DRAWBACKS OF NB-IOT ARE: • It is difficult to implement firmware-over-the-air (FOTA) or file transfers. Some of the design specifications for NB-IoT make it such that sending larger amounts of data down to a device is hard. • Network and tower handoffs will be a problem, so NB-IoT is best suited for primarily static assets, like meters and sensors in a fixed location, rather than roaming assets.
  • 77. LoRa • LoRa is a non-cellular modulation technology for LoRaWAN. (Just like BPSK or QPSK is the modulation of NB-IoT.) • Those two terms—LoRa and LoRaWAN—are not interchangeable: LoRaWAN is the standard protocol for WAN communications and LoRa is used as a wide area network technology. LoRa is used primarily in two ways: 1.One is LoRaWAN, which has been deployed mostly in Europe. It has very small message capacity, as low as 12 bytes. 2.Another is Symphony Link, which is a product of Link Labs. Symphony Link is a wireless system built on LoRa technology that is designed to overcome the limitations of a LoRaWAN system. It is often included as a component of more complex LoRa networking solutions, mostly in the U.S. and Canada, and is designed for industrial applications.
  • 78. • LoRa represents a good radio network for IoT solutions and has better link budgets than other comparable radio technologies. • But outside of a few markets in Europe, if you want to connect to LoRaWAN networks—or use LoRa at all—you need to deploy your own network gateway. • That may seem like a downside, but it actually makes LoRa a good alternative to Wi-Fi for low power devices that need to be connected throughout a building, like a factory or a hospital. • Of the three technologies discussed here, it’s the only one capable of being used as a “do-it yourself” technology; any company can build and use their own connected device wherever they can put up the gateway.
  • 79. THE BENEFITS OF LORA ARE: • It is perfect for single-building applications. • You can set up and manage your own network. • LoRa is a good option if you need bidirectionality, for example, command-and-control functionality, because of the symmetric link. • LoRa devices work well when they are in motion, which makes them useful for outdoor asset tracking, such as shipments. • LoRa devices have longer battery life than NB-IoT devices. THE DRAWBACKS OF LORA ARE: • It has lower data rates than NB-IoT. • It has a longer latency time than NB-IoT. • It requires a gateway to work (which also, in many cases, is an advantage).
  • 80. Sigfox • No LPWAN discussion would be complete without mentioning Sigfox, which is the company that awoke the world to the potential for IoT devices to use very low bandwidth connections. Sigfox is the most basic of the three technologies, with the key differences being: 1. Sigfox has the lowest cost radio modules (<$5, compared to ~$10 for LoRa and $12 for NB-IOT). 2. Sigfox is uplink only. Though limited downlink is possible, it has a different link budget and is very restricted. • Sigfox is an end-to-end network and technology player. THE ADVANTAGES OF SIGFOX ARE: • It consumes a low amount of power. • It works well for simple devices that transmit infrequently, because it sends very small amounts of data very slowly. • It supports a wide coverage area in the areas where it is located. THE DRAWBACKS OF SIGFOX ARE: • It is not deployed everywhere, so it won’t work for a large number of use cases currently. • Communication is better headed up from the endpoint to the base station. It has bidirectional functionality, but its capacity from the base station back to the endpoint is constrained, and you’ll have less link budget going down than going up. • Mobility is difficult with Sigfox devices.
  • 81.