0% found this document useful (0 votes)
54 views13 pages

Module - 5.2 - Iot

The document discusses the key components, protocols, and applications of IoT. It defines IoT and describes the main components used, including sensors, control units, cloud computing, and networking connections. It also covers the different layers of IoT protocols and provides examples of applications of IoT such as smart homes and wearables.

Uploaded by

vinayakavini464
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views13 pages

Module - 5.2 - Iot

The document discusses the key components, protocols, and applications of IoT. It defines IoT and describes the main components used, including sensors, control units, cloud computing, and networking connections. It also covers the different layers of IoT protocols and provides examples of applications of IoT such as smart homes and wearables.

Uploaded by

vinayakavini464
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Page 1 of 13

MODULE – 5 - IoT (Internet of Things)


Define IoT.
IoT stands for Internet of Things. IOT is a system of
interrelated things, computing devices, mechanical and digital
machines, objects, animals, or people that are provided with unique
identifiers. The ability to transfer the datas over a network requiring
human-to-human or human-to-computer interaction.

Four Key Components of IOT


 Device or sensor
 Connectivity
 Data processing
 Interface

Main Components Used in IoT

 Low-power embedded systems: Less battery consumption, high


performance are the inverse factors that play a significant role during
the design of electronic systems.

 Sensors: Sensors are the major part of any IoT application. It is a


physical device that measures and detects certain physical quantities
and converts it into signal which can be provided as an input to
processing or control unit for analysis purpose.
Page 2 of 13

Different types of Sensors


 Temperature Sensors
 Image Sensors
 Gyro Sensors
 Obstacle Sensors
 RF Sensor
 IR Sensor
 MQ-02/05 Gas Sensor
 LDR Sensor
 Ultrasonic Distance Sensor

 Control Units:
 It is a unit of small computer on a single integrated circuit
containing microprocessor or processing core, memory
and programmable input/output devices/peripherals.
 It is responsible for major processing work of IoT devices
and all logical operations are carried out here.

 Cloud computing: Data collected through IoT devices is massive,


and this data has to be stored on a reliable storage server.
 The data is processed and learned, giving more room for us to
discover where things like electrical faults/errors are within the system.

 Availability of big data:


 IoT relies heavily on sensors, especially in real-time.
 As these electronic devices spread throughout every field, their
usage is going to trigger a massive flux of big data.

 Networking connection:
 In order to communicate, internet connectivity is a must, where each
physical object is represented by an IP address.
Page 3 of 13

IoT protocols can be divided into four main layers:


 Physical and MAC layer or Perception Layer
 Transport layer or Communication Layer
 Processing layer
 Application layer
 Security Layer

 Perception Layer: a variety of sensors and devices, such as


radio-frequency identification (RFID) tags and GPS sensors, are
attached to both vehicles and ground-based locations. These
IoT perception layer devices generate data such as vehicle
position, movement, distance, speed, traffic frequency, wind
direction, visibility, humidity, and more
Page 4 of 13

 Transport Layer: this newly generated data is transmitted to


one or more servers via an array of technologies in
the transport layer, such as 5G, Wi-Fi, and EtherCAT
 Processing and Application Layer: hardware and software in
the processing and application layer helps convert massive
amounts of this raw data into useful, actionable, human-readable
data, such as alerting crews and controllers to stranded vehicles
or other hazards

 Business Layer: all of this actionable data is analyzed to


make business decisions that can reduce delays, enhance safety,
and minimize emissions, through operational improvements such
as better routing and traffic management

Examples : Webservice , Manufacturing , Aviation , Medical


Field , Defence Service , Agriculture…..

1. Explain Functional blocks and communication models used in IoT.

The Internet of Things Functional Blocks is the foundation of the


IoT ecosystem. Companies are fast discovering ways to leverage the
Internet of Things (IoT) to improve their efficiency as it grows in
popularity. The Internet of Things devices range from small sensors to
huge machines and systems, but they all have one thing in common:
they generate data.

IoT Functional Blocks


IoT systems are composed of a number of building blocks, including
sensors/actuators, connectivity, security, services, etc. The functional
blocks are responsible for sensing, verification, actuation, management,
and communication.
Page 5 of 13

 Sensor/Actuator block

The sensor/actuator block serves as the data entry point in an IoT


system. Sensors collect data from their surroundings, whereas
actuators drive physical processes. Sensors gather data on
temperature, humidity, light, motion, and other variables, whereas
actuators turn on lights, open doors, and control machines. These
gadgets work together to collect data and operate in the physical world.

 Connectivity Block

Once the sensor/actuator block has collected data, it must be sent to


the remainder of the system. This is when the connection block enters
the picture. The connectivity block is in charge of creating and
managing communication channels amongst IoT system devices. This
can be accomplished with the use of several technologies such as Wi-Fi,
Bluetooth, ZigBee, and cellular networks.

 Data Processing Block

 This block is in charge of filtering out noise and irrelevant data,


converting the data into an easily studied format, and recognizing
patterns and anomalies in the data
Page 6 of 13

 The obtained data is examined and processed in the data


processing block. .
 This block can also execute real-time analysis, enabling speedy
data-driven decisions.

 Application Block

 The application block is the component of the IoT system that


gives value to the end user. This block is in charge of utilizing the
processed data to provide a specified function or service.
 An application block, for example, could be used to provide
insights into energy usage in a building or to adjust the
temperature in a greenhouse.

 Security Block

 The security block is in charge of assuring the IoT system's


security and protection against illegal access.
 This block is in charge of authentication and authorization, as well
as data encryption during transmission and storage.
 It also handles intrusion detection and response, assisting in the
prevention and mitigation of threats.

 Management Block

 The management block is in charge of overseeing the overall


operation of the IoT system. This block is capable of handling
device configuration, firmware updates, and system monitoring.
 It can also give analytics and reporting, allowing system
administrators to understand how the system is operating and
find areas for improvement.

2. Describe the communication models with respect to IoT

IoT - Communication models are key to how devices

connect, interact, and share data in the Internet of Things (IoT). They
Page 7 of 13

determine efficiency, scalability, and overall system performance by


defining the structure and flow of information inside an IoT network

1. Request-response model is communication model in which

the client sends requests to the server and the server


responds to the requests. When the server receives a
request, it decides how to respond, fetches the data,
retrieves resource representation, prepares the response,
and then sends the response to the client. Request-response
is a stateless communication model and each request-
response pair is independent of others.

2. Publish-Subscribe is a communication model that involves

publishers, brokers and consumers. Publishers are the


source of data. Publishers send the data to the topics which
are managed by the broker. Publishers are not aware of the
consumers. Consumers subscribe to the topics which are
managed by the broker. When the broker receive data for a
topic from the publisher, it sends the data to all the
subscribed consumers.
Page 8 of 13

3. Push-Pull is a communication model in which the data

producers push the data to queues and the consumers Pull


the data from the Queues. Producers do not need to be
aware of the consumers. Queues help in decoupling the
messaging between the Producers and Consumers. Queues
also act as a buffer which helps in situations when there is a
mismatch between the rate at which the producers push
data and the rate rate at which the consumer pull data.
Page 9 of 13

4. Exclusive Pair is a bidirectional, fully duplex communication


model that uses a persistent connection between the client
and server. Connection is setup it remains open until the
client sends a request to close the connection. Client and
server can send messages to each other after connection
setup.

3. Applications of IoT include:


 Smart home and office
 Wearable devices
 Autonomous driving
 Agriculture and smart farming
 Industrial IoT for manufacturing
 Disaster management
 Smart grids and energy management
Page 10 of 13

 Big data analytics

4. Explain Physical design and Logical design of IoT.


 The physical design of an Internet of Things (IoT) system is the
individual node devices and their protocols that create a functional
IoT ecosystem.
 The logical design of an IoT system is the framework or ideal design for
laying out the components, including software and hardware.
Page 11 of 13

5. Characteristics of the Internet of Things:

1. Connectivity — Connectivity is an important requirement of the IoT


infrastructure.

Things of IoT should be connected to the IoT infrastructure. Anyone,


anywhere, anytime can connect, this should be guaranteed at all times.

For example, the connection between people through internet devices


like mobile phones, and other gadgets, also a connection between
Internet devices such as routers, gateways, sensors, etc.

2. Intelligence and Identity — The extraction of knowledge


from the generated data is very important.

For example, a sensor generates data, but that data will


only be useful if it is interpreted properly.
Page 12 of 13

Each IoT device has a unique identity. This identification


is helpful in tracking the equipment and at times for
querying its status.

3. Scalability — The number of elements connected to the


IoT zone is increasing day by day.

Hence, an IoT setup should be capable of handling the


massive expansion.

The data generated as an outcome is enormous, and it


should be handled appropriately.

4. Dynamic and Self-Adapting (Complexity) –IoT devices


should dynamically adapt themselves to changing
contexts and scenarios.

Assume a camera meant for surveillance. It should be


adaptable to work in different conditions and different
light situations (morning, afternoon, and night).

5. Architecture — IoT architecture cannot be homogeneous


in nature.

It should be hybrid, supporting different manufacturers ‘


products to function in the IoT network.

6. Safety — There is a danger of the sensitive personal details


of the users getting compromised when all his/her devices
are connected to the internet.
Page 13 of 13

This can cause a loss to the user. Hence, data security is


the major challenge.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy