The document discusses the key aspects of an IoT (Internet of Things) course syllabus. It covers topics like introducing IoT characteristics, physical and logical design, domain applications, programming Raspberry Pi and Arduino for IoT development, and an introduction to robotics. Specific topics include defining IoT, communication models, home automation, smart cities, programming LEDs and sensors using Raspberry Pi and Arduino, and identifying robotic components. The objectives are to explain IoT characteristics, design, communication models, identify domain applications, and develop IoT applications using Raspberry Pi and Arduino.
INTRODUCTION TO INTERNET OF THINGS
Evolution of Internet of Things – Enabling Technologies – IoT Architectures: oneM2M, IoT World Forum (IoTWF) and Alternative IoT Models – Simplified IoT Architecture and Core IoT Functional Stack – Fog, Edge and Cloud in IoT
The Internet of Things (IoT) is a network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity that allow these objects to collect and exchange data.
Why IoT?
With the development of technologies like M2M (machine-to-machine communication) and widespread of Internet, communication over long distance became possible.
This useful exchange of information across the globe with minimal human intervention led to an innovative concept called Internet of Things (IoT) where objects represent themselves as a digitally forming large network of connected devices that can communicate over the internet.
Components comprising IoT
IoT Hardware – These include sensors, micro-controller devices for control, servers, an edge or gateway.
IoT software – It includes mobile and web applications that are responsible for data collection, device integration, real-time analysis and application and process extension.
IoT Lifecycle
Collect: The life cycle of IoT starts with collecting data from different sources deployed in a particular region. These sources could be any sensors or device capable of transmitting data connected to a gateway. Data are efficiently collected and passed forward through a communication channel for analysis.
Communicate: This phase involves secure and reliable transfer of data. Routers, switches and firewall technologies play a vital role in establishing communication between devices. The Data is sent to the cloud or other data centers using the internet which is our major means of communication in IoT.
Analysis: This phase is an important part of the IoT lifecycle. In this phase data collected from different sensor devices are collected and analysed based on the use case to extract some useful output/information.
Action: This is the final stage of IoT lifecycle. Information obtained by the analysis of sensor data is acted upon and proper actions and measures are taken based on the analysis result.
INTRODUCTION TO INTERNET OF THINGS
Evolution of Internet of Things – Enabling Technologies – IoT Architectures: oneM2M, IoT World Forum (IoTWF) and Alternative IoT Models – Simplified IoT Architecture and Core IoT Functional Stack – Fog, Edge and Cloud in IoT
The Internet of Things (IoT) is a network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity that allow these objects to collect and exchange data.
Why IoT?
With the development of technologies like M2M (machine-to-machine communication) and widespread of Internet, communication over long distance became possible.
This useful exchange of information across the globe with minimal human intervention led to an innovative concept called Internet of Things (IoT) where objects represent themselves as a digitally forming large network of connected devices that can communicate over the internet.
Components comprising IoT
IoT Hardware – These include sensors, micro-controller devices for control, servers, an edge or gateway.
IoT software – It includes mobile and web applications that are responsible for data collection, device integration, real-time analysis and application and process extension.
IoT Lifecycle
Collect: The life cycle of IoT starts with collecting data from different sources deployed in a particular region. These sources could be any sensors or device capable of transmitting data connected to a gateway. Data are efficiently collected and passed forward through a communication channel for analysis.
Communicate: This phase involves secure and reliable transfer of data. Routers, switches and firewall technologies play a vital role in establishing communication between devices. The Data is sent to the cloud or other data centers using the internet which is our major means of communication in IoT.
Analysis: This phase is an important part of the IoT lifecycle. In this phase data collected from different sensor devices are collected and analysed based on the use case to extract some useful output/information.
Action: This is the final stage of IoT lifecycle. Information obtained by the analysis of sensor data is acted upon and proper actions and measures are taken based on the analysis result.
Makers: Shubham Yadav, Aniket Dwivedi, Vedant Babade
presentation on internet of things (IOT) for seminar presentation and school projects.
included future of iot with its different application history and many more things.
internet of things(Architecture and components).pptxvikramkagitapu
The term IoT, or Internet of Things, refers to the collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves
Makers: Shubham Yadav, Aniket Dwivedi, Vedant Babade
presentation on internet of things (IOT) for seminar presentation and school projects.
included future of iot with its different application history and many more things.
internet of things(Architecture and components).pptxvikramkagitapu
The term IoT, or Internet of Things, refers to the collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
2. Syllabus
Introduction to IoT: Defining IoT, Characteristics of IoT, Physical design of
IoT, Logical design of IoT, Functional blocks of IoT, Communication models
& APIs. (8 hours)
Domain specific applications of IoT: Home automation, Cities,
Environment, Energy, Retail, Logistics, Agriculture, Industry, Health and
lifestyle. (4 hours)
IoT Physical Devices and Endpoints: Introduction to Raspberry Pi-
Interfaces (serial, SPI, I2C), Programming Raspberry PI with Python-
Controlling LED with Raspberry PI, interfacing an LED and Switch with
Raspberry PI and Interfacing a light sensor (LDR) with Raspberry PI. 10 hrs)
Programming Arduino: Introduction, Arduino Boards, Programming-
variables, if, loops, functions, digital inputs and outputs, the serial monitor,
arrays and strings, analog inputs and outputs, using libraries, Arduino data
types and commands. Programming Arduino Uno with Arduino- Controlling
LED with Arduino, interfacing an LED and Switch with Arduino and
Interfacing a light sensor (LDR) with Arduino. (10 hours)
Introduction to Robotics: Classification, Advantages and Disadvantages,
Components, Robot Joints, Robot Coordinates, Characteristics, Applications.
Robotics Kinematics-Matrix representations. Actuators-Characteristics, Types
of Actuators. Sensors-characteristics, types of sensors. (10 hours)
A6504.1 Explain the characteristics, design and communication
models of IoT
A6504.2 Identify the various domain specific applications of IoT
A6504.3 Construct IoT applications using Raspberry Pi interface.
A6504.4 Develop IoT applications on embedded platform using
Arduino.
A6504.5 Identify the characteristics of various Robotic components.
6. Internet
M2M
How they connect?
Do we need any hardware support?
Do we need any software support?
Does they have intelligence?
How they can interact?
7. Internet of Things
• IoT definition
• Characteristics of IoT
• Physical Design of IoT
• Logical Design of IoT
• IoT Protocols
• IoT Levels &
Deployment Templates
IoT
comprises of things that have unique identities
Connected to the internet
Things are
× not N/W computers, 4G enabled mobile devise
Things- are not traditionally connected to the internet
Are: thermostats, utility meters, irrigation pumps, sensors.
In IoT, foucs is on configuration, control and networking via the internet.
Scope is not just connecting things, it allows things to communicate and
exchange the data while executing application.
8. IoT Definition
A dynamic global network infrastructure with self-configuring
capabilities based on standard and interoperable communication
protocols where physical and virtual "things" have identities, physical
attributes, and virtual personalities and use intelligent interfaces, and
are seamlessly integrated into the information network, often
communicate data associated with users and their environments.
• IoT definition
• Characteristics of IoT
• Physical Design of IoT
• Logical Design of IoT
• IoT Protocols
• IoT Levels &
Deployment Templates
9. Characteristics of IoT
Dynamic & Self-Adapting
May have the capability to dynamically adapt with the
changing contexts and take actions based on their
operating conditions, user context, sensed environment
Ex: Surveillance cameras
can adapt their modes based on the day
could switch from low resolution to high , vice versa.
Detection motion of object and acting as per
Dynamic & Self-Adapting
Self-Configuring
Interoperable Communication
Protocols
Unique Identity
Integrated into Information
Network
10. Characteristics of IoT
Self-Configuring
May have self configuring capability
Allowing large number of devices to work together to
provide certain functionality
Configuring themselves- setup network, fetch the latest
s/w and upgrade with the minimal user involvement.
Ex: Weather Monitoring
Dynamic & Self-Adapting
Self-Configuring
Interoperable Communication
Protocols
Unique Identity
Integrated into Information
Network
11. Characteristics of IoT
Interoperable Communication
Support Interoperable communication protocols to
communicate with other devices and infra structures
Dynamic & Self-Adapting
Self-Configuring
Interoperable Communication
Protocols
Unique Identity
Integrated into Information
Network
12. Characteristics of IoT
Unique Identity
Each thing should be associated with unique identity /
identifier-IP/URL
May have intelligent interfaces to adapt context, allow
communicate others devices in the network
Dynamic & Self-Adapting
Self-Configuring
Interoperable Communication
Protocols
Unique Identity
Integrated into Information
Network
13. Characteristics of IoT
Integrated into Information Network
IoT devices are integrated into N/W that allows them to
communicate and exchange the data
Weather Monitoring system-nodes can describe its
capabilities to another node- can communicate and
exchange
If they are connected to Information N/W, they can be acts
like as smarter by predicting weather.
Detection motion of object and acting as per
Dynamic & Self-Adapting
Self-Configuring
Interoperable Communication
Protocols
Unique Identity
Integrated into Information
Network
14. Characteristics of IoT
Unique Identity
Each thing should be associated with unique identity / identifier-IP/URL
May have intelligent interfaces to adapt context, allow communicate
others devices in the network
Integrated into Information Network
IoT devices are integrated into N/W that allows them to communicate
and exchange the data
Weather Monitoring system-nodes can describe its capabilities to another
node- can communicate and exchange
If they are connected to Information N/W, they can be acts like as
smarter by predicting weather.
Dynamic & Self-Adapting
May have the capability to dynamically adapt with the changing contexts and
take actions based on their operating conditions, user context, sensed
environment
Ex: Surveillance cameras
can adapt their modes based on the day
could switch from low resolution to high , vice versa.
Detection motion of object and acting as per
Self-Configuring
May have self configuring capability
Allowing large number of devices to work together to provide certain functionality
Configuring themselves- setup network, fetch the latest s/w and upgrade with the
minimal user involvement.
Ex: Weather Monitoring
Interoperable Communication Protocols
Support Interoperable communication protocols to communicate with other devices
and infra structures..
15. Basic terms of IoT
The Internet of Things is a global network of computers,
sensors, and actuators connected through Internet
protocols.
Connecting everyday things embedded with electronics,
software, and sensors to the internet enabling them to
collect and exchange data.
IoT is simply connecting all the surrounding smart
devices(things) to internet. these devices use sensors&
actuators to communicate with each other across the
internet.
And are seamlessly integrated into the information network,
often communicate data associated with users and their
environments
16. Basic terms of IoT
1)Smart device:
Any mechanical or electronic device that can take intelligent decisions on its own. ( Mobile / PC/ Any other device)
2)Sensor:
A small chip that senses the surrounding activities.
A sensor detects(senses) changes in the ambient conditions or in the state of another device or a system and
forwards or processes this information in a certain manner.
sensors are electronic devices that senses the physical environments.
Sensor types:
Light
Temp
Flow
Position
Speed
voltage
humidity
3) Actuator:
Another chip that responds to the sensed activities.
An actuator is a component of a machine or system that is responsible for moving or controlling a mechanism or
system.
An actuator requires a control signal and source of energy.
17. • Exchange data with other connected devices and applications
(directly or indirectly), or
• Collect data from other devices and process the data locally
• Send the data to centralized servers or cloud-based
application back-ends for processing the data, or
• Perform some tasks locally and other tasks within the IoT
infrastructure, based on temporal and space constraints.
• Devices has to be
connected. (Wired or
Wireless)?
• I/O Interfaces for sensors
• Interfaces for Internet
connectivity
• Memory & Storage
interfaces
• Audio & Video Interfaces
• IoT definition
• Characteristics of IoT
• Physical Design of IoT
• Logical Design of IoT
• IoT Protocols
• IoT Levels &
Deployment Templates
18. Physical Design of IoT
An IoT device may consist of several interfaces for connections to other devices, both wired and
wireless.
I/O interfaces for sensors
Interfaces for Internet connectivity
Memory and storage interfaces
Audio/video interfaces
An IoT device can collect various types of data from onboard or attached sensors such as
temperature, humidity, light intensity.
The device can be connected to actuators that allow them to interact with other physical entities
(including non IoT device and system) in the vicinity of the device.
IoT devices can be varied types, sensor data generated by a soil moisture gathering device can in a
garden, when processed determining optimum watering schedule.
General Block Diagram of IoT Device
19. Examples.
Examples:
Attendance Monitoring
Street Light Control
Students Monitoring
• IoT definition
• Characteristics of IoT
• Physical Design of IoT
• Logical Design of IoT
• IoT Protocols
• IoT Levels &
Deployment Templates
20. Objectives of IoT
Connecting Things
Exchange of data and information
Sensing, Processing, Control, Actuators & Monitoring
Providing services
• IoT definition
• Characteristics of IoT
• Physical Design of IoT
• Logical Design of IoT
• IoT Protocols
• IoT Levels &
Deployment Templates
• Devices has to be
connected. (Wired or
Wireless)?
• I/O Interfaces for sensors
• Interfaces for Internet
connectivity
• Memory & Storage
interfaces
• Audio & Video Interfaces
21. Network Design -IoT
Physical Design
What are things?
design network to connect things
Communication Protocols: How they can be communicated to other devices
Logical Design:
abstract representation of the entities & processes without going into the low-level
specifies of the implementation.
• IoT definition
• Characteristics of IoT
• Physical Design of IoT
• Logical Design of IoT
• IoT Protocols
• IoT Levels &
Deployment Templates
22. Physical Design of IoT
• IoT definition
• Characteristics of IoT
• Physical Design of IoT
• Logical Design of IoT
• IoT Protocols
• IoT Levels &
Deployment Templates
General Block Diagram of IoT
Things:
• IoT Devices- are Unique identities
• can perform remote sensing,
actuating and monitoring
capabilities.
• can be various type:
• Sensing Devices,
• Smart Watches,
• Smart Electronics appliances-
Wearable Sensors, Automobiles,
and industrial machines.
• Generate data in some forms or the
other which when processed by data
analytics systems leads to useful
information to guide further actions
locally or remotely.
• I/O interfaces for sensors
• Interfaces for Internet connectivity
• Memory and storage interfaces
• Audio/video interfaces
24. Assignment-I
Home Automation- Temperature Controlling
Attendance Monitoring
Street Light Control
Students Monitoring in the campus
Submission Dead Line:
Draw Physical Design of IoT for the following
25.
26.
27. IOT Protocols
Several Layers have been used for exchanging information between devices.
• IoT definition
• Characteristics of IoT
• Physical Design of IoT
• Logical Design of IoT
• IoT Protocols
• IoT Levels &
Deployment Templates
• How the signal/data can be transmitted ?
• What is the guarantee that data can be reached?
• Do the transmission have direct connection?
• If it is indirect/network, then how it can be reached to
destination?
• How data can be reached to person/machine?
33. Internet of Things
IoT
comprises of things that have unique identities
Connected to the internet
Things are
× not N/W computers, 4G enabled mobile devise
Things- are not traditionally connected to the internet
Are: thermostats, utility meters, irrigation pumps, sensors.
In IoT, foucs is on configuration, control and networking via the internet.
Scope is not just connecting things, it allows things to communicate and
exchange the data while executing application.
35. This layer allows the user to interact with the application.
Application layer interacts with software applications to implement a communicating component.
Application-layer helps you to identify communication partners, determining resource availability, and
synchronizing communication.
When one application layer protocol wants to communicate with another application layer, it forwards its
data to the transport layer.
Example of the application layer is an application such as file transfer, email, remote login, etc.
Data
Application
Transport
Network
Link
Application
Transport
Network
Link
HOST A HOST B
Data
Application Layer
36. Application Layer
Application Layer—protocols define how the applications interface with the
lower layer protocols to send the data over network.
HTTP:Hyper Text Transfer Protocol--forms foundation of WWW. Commands
include GET, PUT, POST, DELETE, HEAD, TRACE, options. Protocol follows
request-response model where client sends a request to a server using the
HTTP commands.
HTTP is a stateless protocol and each request is independent of other requests.
COAPP: Constrained Application Protocol—application layer protocol for
machine to machine (M2M) applications, meant for constrained environments
with constrained devices and constrained networks.
Uses request-response model , runs on top of UDP instead of TCP.
COAP uses a client server architecture where clients communicate with servers
using connectionless datagrams.
Web Socket—Allows full duplex communication over a single socket
connection for sending messages between client and server.
Web socket is based on TCP and allows streams of messages to be sent back
and forth between the client and server while keeping TCP connection open.
• HTTP
• COAPP
• Web Socket
• MOTT
• XMPP
• DDS
• AMQP
37. Application Layer
MQTT(Message Que Telemetry Transport)—is a light-weight messaging
protocol based on publish-subscribe model.
Uses client server architecture –client(IoT device) connects to server (MQTT
broker) and publishes messages to topics on server.
The broker forwards messages to clients subscribed to topics.
Well suited for constrained environments-devices have limited processing and
memory resources and low network band width.
XMPP(Extensible Messaging and Presence Protocol)—protocol for real-time
communication and streaming XML data between network entities.
XMPP powers messaging and presence, data syndication, gaming, multi-party
chat and voice/video calls.
Allows sending small chunks of XML data from one network entity to another
in real time.
XMPP supports client to server and server to server communication paths.
XMPP allows real time communication between IoT devices.
• HTTP
• COAPP
• Web Socket
• MOTT
• XMPP
• DDS
• AMQP
38. Application Layer
DDS(Data Distribution Service)—Data centric middleware standard for device-
to-device or machine to machine communication.
Uses publish subscribe service model.
Publisher is an object responsible for data distribution and the subscriber is
responsible for receiving published data.
DDS provides quality-of-service(QoS) control and configurable reliability.
AMQP(Advanced Message Queuing Protocol)—is an open application layer
protocol for business messaging.
Supports both point-to-point and publisher/subsciber models, routing and
queuing.
• HTTP
• COAPP
• Web Socket
• MOTT
• XMPP
• DDS
• AMQP
39. Transport Layer The transport layer is responsible for the reliability, flow control, and correction of
data which is being sent over the network.
Responsible for end-end communication
Determines how much data should be sent, which rate, to whom
Continues sending data once acknowledgement receives
Data
Application
Transport
Network
Link
Application
Transport
Network
Link
HOST A HOST B
TCP
Header
Data
Data
TCP
Header
Data
40. Transport Layer
Transport Layer—Protocols in this layer provide end-to-end message
transfer capability independent of underlying network. Message transfer
can be setup on connections using with/without using handshakes.
Functions in transport layer include error control, segmentation, flow
control and congestion control.
Transmission Control Protocol (TCP)—widely used transport protocol,
used by web browsers,
is a connection oriented protocol and stateful protocol. While IP protocol
deals with sending, TCP ensures reliable transmission of packets in-order.
UDP—UDP is connectionless protocol. UDP is useful for time-sensitive
applications that have very small data units to exchange and do not want
the overhead connection setup.
UDP is a transaction oriented and stateless protocol. UDP does not
provide guaranteed delivery, ordering of messages and duplicate
elimination.
41. Network Layer
is responsible to send data from source to destination irrespective of network.
It uses IP addresses to identify the packet’s source and destination.
Data
Application
Transport
Network
Link
Application
Transport
Network
Link
HOST A HOST B
TCP
Header
IP
Header
Data
TCP
Header
Data
Data
TCP
Header
IP
Header
Data
TCP
Header
Data
42. Network Layer
Network/Inter network Layer—Network Layer is responsible for sending
of IP datagrams from source to destination.
Performs host addressing and packet rerouting.
Datagram contains source and destination addresses used to route them
from source to destination across multiple routes.
Host identification is done using IPv4 or Ipv6 IP addressing schemes.
IPv4-IPv6 addressing schemes .
•6LoWAPAN(IPv6 over Low Power Wireless Personal Area Networks)
:brings IP protocol to the low-power devices have limited processing
capability.
6LoWAPAN operates in the 2.4GHz and provides data transfer rates of
250Kb/s.
6LoWAPAN works with 802.15.4 link layer protocol and defines compression
mechanisms for IPV6 datagram over 802.15.4-based networks.
43. Link Layer
Details about how actually data should be sent
It also includes how bits should optically be signaled by hardware devices which
directly interfaces with a network medium, like coaxial, optical, coaxial, fiber, or
twisted-pair cables.
Data
Application
Transport
Network
Link
Application
Transport
Network
Link
HOST A HOST B
TCP
Header
IP
Header
Ethernet
Header
Data
TCP
Header
Data
IP
Header
TCP
Header
Data
Data
TCP
Header
IP
Header
Ethernet
Header
Data
TCP
Header
Data
IP
Header
TCP
Header
Data
44. determine how the data is physically sent over the network’s physical layer or
medium.
The scope of the link layer is the local connection to which host is attached.
Link layer determines how the packets are coded and signaled by hardware
device over medium to which host is attached.
802.3 Ethernet: Is a collection of wired ethernet standards for the link layer,
standards provide data rates from 10Mb/s to 40Gb/s and higher.
802.11 Wifi—is a collection of wireless local area network(WLAN)
communication standards, including extensive description of the link layer.
802.1a operates in the 5GHz,802.11a and 802.11g operate in 2.54GHz band.
802.16—WiMax: is collection of wireless broadband standards, including
extensive description of the link layer. Wimax standard provides rates from 1.5
Mb/s to 1 Gb/s.802.16m provides data rates of 100Mb/s for mobile stations
and 1 Gb/s for fixed stations.
802.15.4-LR-WPAN—collection of standards for low-rate wireless personal
area networks (LR-WPANs). These form basis for high level communication
protocols such as ZigBee. Provides data rates from 40 Kb/s -250Kb/s. Low-cost
and low-speed communication for power constrained devices.
2G/3G/4G--Mobile communication: IoT devices based on these standards
communicate over cellular networks. Data rates from 9.6Kb/s upto 100Mb/s
are available from 3GP websites.
Link Layer
47. Logical Design
Logical design of IoT system refers to an abstract representation of the entities &
processes without going into the low-level specifies of the implementation.
For understanding Logical Design of IoT, we describes given below terms.
IoT Functional Blocks
IoT Communication Models
IoT Communication APIs
48. Logical Design of IoT
Functional blocks are:
Device:
An IoT system comprises of devices that provide sensing, actuation,
monitoring and control functions.
Communication:
this block handles the communication for the IoT system. The protocols
that are discussed in the above sections are used for communication
Services:
services for device monitoring, device control service, data publishing
services and services for device discovery.
Management:
this blocks provides various functions to govern the IoT system.
Security:
this block secures the IoT system and by providing functions such as
authentication, authorization, message and content integrity, and data
security.
Application:
This is an interface that the users can use to control and monitor various
aspects of the IoT system. Application also allow users to view the system
status and view or analyze the processed data.
49. IoT Communication Models:
Communication Models are
Request Response Model
Publish Subscribe Model
Push Pull Model
Exclusive Pair
50. Communication Models are
Request Response Model
Publish Subscribe Model
Push Pull Model
Exclusive Pair
Request Response Model
Request-response model is communication model in which
the client sends requests to the server and the server
responds to the requests. When the server receives a request,
it decides how to respond, fetches the data, retrieves
resource representation, prepares the response, and then
sends the response to the client.
Request-response is a stateless communication model and
each request-response pair is independent of others.
HTTP works as a request-response protocol between a client
and server. A web browser may be the client, and an
application on a computer that hosts a web site may be the
server.
It uses GET, PUT, POST, and DELETE methods for
communication.
Example: A client (browser) submits an HTTP request to the
server; then the server returns a response to the client. The
response contains status information about the request and
may also contain the requested content.
51. Communication Models are
Request Response Model
Publish Subscribe Model
Push Pull Model
Exclusive Pair
Publish-Subscribe Model
Publish-Subscribe is a communication model that involves
publishers, brokers and consumers as shown in below Fig.
Publishers and Consumers are not known to each other. And
they do not have direct connection.
Publishers are the source of data. Publishers send the data to the
topics which are managed by the broker. Publishers are not
aware of the consumers.
Consumers subscribe to the topics which are managed by the
broker.
When the broker receive data for a topic from the publisher, it
sends the data to all the subscribed consumers.
We can either let multiple publishers publish messages to one
subscriber, or let multiple subscribers receive messages from
one publisher at the same time.
Message routing:
Based on the topic. Subscribers subscribe to topics they are
interested in from the MQTT broker. All messages
published by the publisher will include their topics. The
broker determines which subscribers need to be forwarded
to the message according to the topic of the message.
52. Communication Models are
Request Response Model
Publish Subscribe Model
Push Pull Model
Exclusive Pair
Push-Pull Method
Participants: Publisher and consumers
Push-Pull is a communication model in which the data
producers push the data to queues and the consumers
Pull the data from the Queues.
Producers do not need to be aware of the consumers.
In communication, Publisher and consumers are not be
on the same level- data rate
Queues help in decoupling the messaging between the
Producers and Consumers.
Queues also act as a buffer which helps in situations
when there is a mismatch between the rate at which
the producers push data and the rate rate at which the
consumer pull data.
Queue property that is First in Fist Out allows
consumer to pull the message which one is inserted
first.
53. Communication Models are
Request Response Model
Publish Subscribe Model
Push Pull Model
Exclusive Pair
Exclusive Pair
Participants: Clientand Server
Exclusive Pair is a bidirectional, fully duplex
communication model that uses a persistent connection
between the client and server
Client and server can send messages to each other after
connection setup
Initially, Client sends request to the server for establishing
connection.
Connection is established once client receives acceptance
response from server. And client can send any number of
messages to the server over the connection.
Once the connection is setup it remains open until the
client sends a request to close the connection
Exclusive pair is stateful communication model and the
server is aware of all the open connections.
WebSocket based communication API is fully based on this
model.
54. IoT Communication APIs
Generally we used Two APIs For IoT Communication.
REST-based Communication APIs
WebSocket-based Communication APIs
55. REST Based Communication API
• REpresentational State Transfer (REST) is a set of architectural
principles by which you can design Web services
• the Web APIs that focus on system's resources and how
resource states are addressed and transferred.
• Resource:
• The key abstraction of information in REST is a resource.
• Ex: a document or image, a temporal service, a collection of
other resources, a non-virtual object (e.g. a person), and so
on.
• REST uses a resource identifier to identify the particular
resource involved.
• The state of the resource
• at any particular timestamp is known as resource
representation.
• A representation consists of data, metadata describing the
data and hypermedia links which can help the clients in
transition to the next desired state.
• Resource Methods- These are to be used to perform the desired
transition
56. REST Based Communication API
• REpresentational State Transfer (REST) is a set of
architectural principles by which you can design Web
services
• the Web APIs that focus on system's resources and
how resource states are addressed and transferred.
• REST APIs that follow the request response communication
model,
• Uni-Directional- either Client or Server
• For each request- TCP Connection will be established
• It is stateless protocol- Doesn’t need memory or buffers to
store the data.
• the rest architectural constraint apply to the components,
connector and data elements, within a distributed
hypermedia system.
57. REST Architectural constraints
Client-server –
The principle behind the client-server constraint is the separation of concerns.
for example clients should not be concerned with the storage of data which is concern of the server.
Similarly the server should not be concerned about the user interface, which is concern of the client.
Separation allows client and server to be independently developed and updated.
Stateless –
Each request from client to server must contain all the information necessary to understand the request,
and cannot take advantage of any stored context on the server.
The session state is kept entirely on the client.
Cache-able –
Cache constraints requires that the data within a response to a request be implicitly or explicitly leveled
as cache-able or non cache-able.
If a response is cache-able, then a client cache is given the right to reuse that response data for later,
equivalent requests.
Caching can partially or completely eliminate some instructions and improve efficiency and scalability.
Layered system –
Layered system constraints, constrains the behavior of components such that each component cannot
see beyond the immediate layer with they are interacting.
For example, the client cannot tell whether it is connected directly to the end server or two an
intermediary along the way. System scalability can be improved by allowing intermediaries to respond
to requests instead of the end server, without the client having to do anything different.
58. REST Architectural constraints
Client-server –
Clients should not be concerned with the storage of data which is concern of
the server.
Similarly the server should not be concerned about the user interface, which
is concern of the client.
Separation allows client and server to be independently developed and updated.
Stateless –
Each request from client to server must contain all the information
necessary to understand the request
Cannot take advantage of any stored context on the server.
The session state is kept entirely on the client.
Cache-able –
Cache constraints requires that the data within a response to a request be
implicitly or explicitly leveled as cache-able or non cache-able.
If a response is cache-able, then a client cache is given the right to reuse that
response data for later, equivalent requests.
Caching can partially or completely eliminate some instructions and improve
efficiency and scalability.
Client-Server
Stateless
Cache-able
Layered System
Uniform interface
Layered system
Code on demand
(optional)
59. REST Architectural constraints
Layered system –
Components are arranged in various layers such that they cannot see beyond
immediate layers which they are interfacing.
For example, the client cannot tell whether it is connected directly to the end server
or two an intermediary along the way.
System scalability can be improved by allowing intermediaries to respond to requests
instead of the end server, without the client having to do anything different.
Uniform interface
constraints requires that the method of communication between client and server
must be uniform.
Resources are identified in the requests (by URIsin web based systems) and are
themselves is separate from the representations of the resources data returned to the
client.
When a client holds a representation of resources it has all the information required
to update or delete the resource you.
Each message includes enough information to describe how to process the message.
Client-Server
Stateless
Cache-able
Layered System
Uniform interface
Layered system
Code on demand
(optional)
Code on demand
• Servers can provide
executable code or scripts
for clients to execute in
their context.
• A RESTful web service is a ”
Web API ” implemented
using HTTP and REST
principles.
• REST is most popular IoT
Communication APIs.
60.
61. WebSocket based communication API
Client Server
Websocket APIs allow bi-directional, & full duplex communication.
Websocket APIs follow the Exclusive Pair communication model.
Do not require new connection to be setup for each message to be sent.
Websocket communication begins with a connection setup request sent by
the client to the server.
The request (called websocket handshake) is sent over HTTP and the
server interprets it is an upgrade request.
If the server supports websocket protocol, the server responds to the
websocket handshake response.
After the connection setup client and server can send data/messages to
each other in full duplex mode.
Websocket API reduce the network traffic and latency as there is no
overhead for connection setup and termination requests for each message.
Websocket suitable for IoT applications that have low latency or high
throughput requirements. So Web socket is most suitable IoT
62. WebSocket Communication protocol- a suitable protocol for the IoT environment
where bundles of data are transmitted continuously within multiple devices
63. S.NO. REST API WEB SOCKET API
1. It is Stateless protocol. It will not store the data.
It is Statefull protocol. It will store the
data.
2.
It is Uni-directional. Only either server or client will
communicate.
It is Bi-directional. Messages can be
received or sent by both server or client.
3. It is Request-response model. It is Full duplex model.
4.
HTTP request contains headers like head section,
title section.
It is suitable for real-time applications. It
does not have any overhead.
5.
New TCP connection will be set up for each HTTP
request.
Only Single TCP connection.
6.
Both horizontal and vertical scaling (we can add
many resources and number of users both
horizontally and vertically).
Only vertical scaling (we can add
resources only vertically).
7.
It depends upon the HTTP methods to retrieve the
data..
It depends upon the IP address and port
number to retrieve the data
8.
It is slower than web socket regarding the
transmission of messages.
web socket transmits messages very
fastly than REST API.
9. It does not need memory or buffers to store the data.
It requires memory and buffers to store
the data.
64. MCQ’s on Communication API
1. API’s are the inter connector
A) Yes B) NO
2. Web Applications support ----------- API
A) RESTful B) RESful C) Class D) none
3. Which of the following is not an HTTP method?
A) POST B) CREATE C) PUT D) OPTION
4. Which of the following best describes REST?
A) REST is a web service standard
B) REST is a cloud-native API framework
C) REST is a micro services-based protocol
D) REST is an architectural style
65. 5. The insistence that RESTful APIs have URLs that identify resources in a consistent and predictable manner is
known as:
A. The RESTful naming convention
B. The uniform interface constraint
C. The RESTful consistency constraint
D. The RESTful pattern matching convention
6. Which option is not a RESTful API constraint?
A. Code on demand
B. The use of a client-server model
C. A stateless request-response cycle
D. Service orchestration
7. To create a new resource with a predefined resource URL, you should use which of the following HTTP methods?
A. CREATE
B. POST
C. PUT
D. OPTION
MCQ’s on Communication API
66. 8. REST API follows ________ communication model IOT
A. Exclusive Pair
B. Push pull
C. Publish Subscribe
D. Request Response
9. -- API Model Provides Full Duplex Communication
A. REST
B. Publish Subscribe
C. Websocket
D. None
10. is suitable for IOT applications to have low latency or high throughput
requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
67. IoT Enabling Techniques
The following plays an important role in IoT
Wireless Sensor Networks
Cloud Computing
Big Data Analytics
Embedded Systems
Security Protocols & Architectures
Communication Protocols
Web Services
Mobile Internet
Semantic Search Engines
68. Wireless Sensor Networks
Comprises of distributed devices with sensors to monitor
physical conditions
End-End nodes, routers and a coordinator
End-end:
Several Sensors-sensing and receiving
Can also acts as router
Routers:
Routing packets from end-nodes to coordinator
Coordinator:
Collects the data from all nodes
Acts a gateway that connects WSN to the internet.
Ex:
Weather Monitoring
Indoor air quality
Soil Moisture Monitoring
Enable by Protocols:
IEEE 802.15.4, ZigBee-2.4Ghz-200KB/s range: 10 to
100m.
Are self organizing networks-Robust
Network can reconfigure- addition of nodes or
failure of nodes
69.
70.
71.
72. Cloud Computing
Transformative Computing paradigm
Delivering Applications and services over the internet
Provisioning of computing, networking and resources on
demand and proving these resources as services in “ Pay as
you go “ mode.
Provisioning resources is Automated.
Iaas (Infrastructure as a Service)
The ability to provision computing and storage resources
Virtual Machine, Virtual storage
Users can start and stop
Can deploy OS
Service provider manages infrastructure
Paas (Platfrom as a Service)
Ability to develop and deploy application
Development tools, API & Library
Manages-Infrastructure : servers, n/w, OS & Storage
Saas (Software as a Service)
Provides a complete application or user interface to the user.
Manages-along with Paas, Application Software
SaaS Applications Are independent
73. Big Data Analytics
Velocity-Speed
Exponential growth of data
Volume-Quantity
Massive Amount-difficult to store and process
Variety – different forms
Veracity – Inconsistency, Uncertainty
Value – importance
Involves-
Data Preprocessing
Data Wrangling (Mugging)
Visualization
Ex:
Monitoring Weather - Weather Monitoring Systems
Health and fitness data generated by Wearable Devices
Location and Tracking of Vehicles
Retail Inventory Management Systems.
74. IoT Levels
An IoT system comprises of the following components:
Device: An IoT device allows identification, remote sensing, actuating and remote monitoring
capabilities. You learned about various examples of IoT devices in section
Resource: Resources are software components on the IoT device for accessing, processing, and
storing sensor information, or controlling actuators connected to the device. Resources also
include the software components that enable network access for the device.
Controller Service: Controller service is a native service that runs on the device and interacts
with the web services. Controller service sends data from the device to the web service and
receives commands from the application (via web services) for controlling the device.
IoT Level 1
IoT Level 2
IoT Level 3
IoT Level 4
IoT Level 5
IoT Level 6
75. IoT Level 1
Use when the solution does need huge data and computation
Storage and Computation-Local
IoT system has a single node/device
that performs sensing and/or actuation,
stores data,
performs analysis
and hosts the application
are suitable for
modeling low-cost and low-complexity solutions
o Where the data involved is not big and the analysis
requirements are not computationally intensive.
Home automation: Room temperature-
is monitored using temperature sensor and data is stored/analysed
locally.
Based on analysis made, control action is triggered using mobile app
76. IoT Level 2
Use these IoT systems
When the data involved is big
Not computationally intensive
Storage: Cloud
Process: Local
IoT system has a single node that performs sensing and/or
actuation and local analysis.
Data is stored in the cloud and application is usually cloud based.
Examples:
Agriculture applications,
room freshening solutions based on odour sensors etc.
77. IoT Level 3
Use these IoT systems
When the data involved is big
Data Analysis requires huge computation
A level-3 IoT system has a single node.
Data is stored and analyzed in the cloud and
application is cloud based.
Level-3 IoT systems are suitable for solutions
where the data involved is big and the analysis
requirements are computationally intensive.
Examples: Agriculture applications, room
freshening solutions based on odour sensors etc.
78. IoT Level 4
Use these IoT systems
Multiple nodes are employed to sense
When the data involved is big
Data Analysis requires huge computation
A level-4 IoT system has multiple nodes that
perform local analysis.
Data is stored in the cloud and application is
cloud-based.
Level-4 contains local and cloud based observer
nodes which can subscribe to and receive
information collected in the cloud from IoT
devices.
Level-4 IoT systems are suitable for solutions
where multiple nodes are required, the data
involved is big and the analysis requirements are
computationally intensive.
79. IoT Level 5
Use these IoT systems
Multiple nodes are employed in multiple networks
When the data involved is big
Data Analysis requires huge computation
Involvement: WSN’s
Storage: Cloud
Computation: Cloud
A level-5 IoT system has multiple end
nodes and one coordinator node.
The end nodes that perform sensing
and/or actuation.
Coordinator node collects data from
the end nodes and sends to the cloud.
Data is stored and analyzed in the
cloud and application is cloud-based.
80. IoT Level 6
Use these IoT systems
Multiple independent nodes are employed in to send data to cloud
When the data involved is big
Data Analysis requires huge computation
Storage: Cloud
Applications: Cloud
IoT system has multiple independent end nodes that
perform sensing and/or actuation and send data to the
cloud.
Data is stored in the cloud and Application is cloud-
based.
The analytics component analyzes the data and stores
the results in the cloud database.
The results are visualized with the cloud-based
application.
The centralized controller is aware of the status of all
the end nodes and sends control commands to the
81. MCQ’s on IoT Levels & Deployment
Which IoT deployment level is suitable for modelling low-cost and low complexity
solutions where the data involved is not big and the analysis requirements are not
computationally intensive
A. IoT level 1
B. IoT level 2
C. IoT level 3
D. IoT level4
Which IoT deployment level is suitable for solutions where the data involved is with less
computationally intensive analysis
a. IoT level 2
b. IoT level 1
c. IoT level 3
d. IoT level 4
82. Smart Irrigation can be designed for IoT level ____
a. IoT Level 3
b. IoT level 1
c. IoT level 4
d. IoT level 2
Smart cities can be conceptualized as
a. IoT level 4
b. IoT level 3
c. IoT level 5
d. IoT level 2
If the system uses multi-input data sources and
cloud platform, then IoT deployment level will
be
a. IoT level 2
b. IoT level 5
c. IoT level 4
d. IoT level 1
is the IoT level suitable for simple home
automation application.
a) IoT Level 2
b) IoT Level 1
c) IoT Level 3
d) IoT Level 4
83. The Mode service is a _____web service that sets mode to auto or
manual.
a) IoT Level 6
b) IoT Level 4
c) RESTful
d) IoT Level 5
84. Outline
Home
Cities
Environment
Energy Systems
Retail
Logistics
Industry
Agriculture
Health & Lifestyle