0% found this document useful (0 votes)
47 views200 pages

IOT - Sem 8 - MST - Study Material

The document discusses the Internet of Things (IoT), including what IoT refers to, examples of physical and virtual things, how IoT impacts users, the evolution and current status of IoT, and the relationships between data, information, and knowledge.

Uploaded by

Mahesh Gadekar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views200 pages

IOT - Sem 8 - MST - Study Material

The document discusses the Internet of Things (IoT), including what IoT refers to, examples of physical and virtual things, how IoT impacts users, the evolution and current status of IoT, and the relationships between data, information, and knowledge.

Uploaded by

Mahesh Gadekar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 200

Internet of Things

Introduction
Ask Google.. 
Where is my key?
Where are my kids?
What are the “Things” in the IoT?
• Could be anything
– Physical
– Virtual

According to Wikipedia,
IoT refers to the interconnection of uniquely identifiable
embedded computing-like devices within the existing
Internet infrastructure.

In simple words
Internet of Things: Anetwork of internet-connected objects able to
collect and exchange data using embedded sensors.
Physical Virtual
• Objects such as • Personal schedule/calendar
• Climate control • Social
• Security/Disaster alarm system • Email
• Energy/Resource metering (Electricity, Gas, • Twitter/FB
Water) • Online notification platforms
• Water boiler, Solar boiler • WWW resources
• Car (OBDII, vehiclepi) • Weather forecasting
• The Sun (sunrise/set times, azimuth) • Stocks
• Traffic
• Living things • DB Storage
• People (self quantification) • Visualization dashboards
• Presence
• Location
• Health metrics
• Weight
• Activity tracking
• Temperature
• Blood Glycose monitors
• Fitbit
• Pets
What is IoT?
• The Internet of Things (IoT) is the network of physical
objects or "things" embedded with electronics,
software, sensors, and network connectivity, which
enables these objects to collect and exchange data.

• IoT allows objects to be sensed and controlled remotely


across existing network infrastructure, creating
opportunities for more direct integration between the
physical world and computer-based systems, and
resulting in improved efficiency, accuracy and
economic benefit.
Let's start with understanding a few things
Broadband Internet is becoming more widely
available
 The cost of connecting is decreasing
More devices are being created with Wi-Fi
capabilities and sensors built into them
 Technology costs are going down and smartphone
penetration is sky-rocketing
All of these things are creating a "perfect storm"
for the IoT.
 This is the concept of basically connecting any device
with an on and off switch to the Internet.
This includes everything from cellphones, coffee
makers, washing machines, headphones, lamps, wearable
devices and almost anything else you can think of.
We will now have connectivity for anything. From any time,
any place connectivity for anyone
How Does IOT Impact You?

The new rule for the future is going to be, "Anything that can be connected,
will be connected."

But why on earth would you want so many connected devices


talking to each other?

There are many examples for what this might look like or what the
potential value might be.
Say for example
You are on your way to a meeting; your car could have access to your
calendar and already know the best route to take. If the traffic is heavy
your car might send a text to the other party notifying them that you will
be late.
What if your alarm clock wakes up you at 6 a.m. and then notifies your
coffee maker to start brewing coffee for you?
What if your office equipment knew when it was running low on
supplies and automatically re-ordered more?
Various Names, One Concept
For over a decade after the introduction of the term Internet-of-Things, different
organizations and working groups have been providing various definitions.

• M2M (Machine to Machine)


• “Internet of Everything” (Cisco Systems)
• “World Size Web”(Bruce Schneier)
• “Skynet”(Terminator movie)
• Cloud of Things
• Web of Things

All these terms are very relevant (and in most cases overlapping) to IoT. Nevertheless, they
have also have differences from IoT.
 In gerenal there are different viewpoints for IoT, and ΙοΤ experts approach IoT from
different angles.
For example:
 The "Things-Oriented" viewpoint focuses on technologies for the representation and
use of the things e.g., RFID (Radion-Frequency Identification), NFC (Near Field
Communications), WSN (Wireless Sensor Networks), Things connectivity technologies etc.

The "Internet-Oriented" viewpoint focuses on the internet and web aspects of IoT, such
as the web-of-things layer for simplifying application development, IPv6 for internet
connectivity and identification etc.
Independently of one's viewpoint about IoT and IoT technologies,
any non-trivial IoT system is expected to comprise the following
elements:

•Sensor: a device that converts a physical


parameter to an electrical output.
Sensors: light, temperature, humidity, sound,
distance, movement, position, orientation,
acceleration ect.

• Actuator: a device that converts an electrical


signal to a physical output.
Actuators: display things, make sound or light,
vibrate, rotate, and translate ect.

 Sensors and Actuators.


Communication infrastructure between
servers or server platforms.
computer software that provides services to
 Server/Middleware Platforms. software applications beyond those ...
Middleware includes web servers, application
 Data Analytics Engines. servers, content management systems, and
similar tools that support
 Apps (iOS, Android, Web).
Transforming Data to Decisions
History/ Evolution of IOT
• The concept of the Internet of Things first became popular in
1999, through the Auto-ID Center at MIT
• The term IoT was first coined by Kevin Ashton in 1999.
• Radio-frequency identification (RFID) was seen as a
prerequisite for the IoT at that point.
• If all objects and people in daily life were equipped with
identifiers, computers could manage and inventory them.
• Besides using RFID, the tagging of things may be achieved
through such technologies as near field communication(NFC),
barcodes, QR codes, bluetooth ect.

 Major industrial initiative is now being undertaken by large corporations


,where the Machine to machine (M2M) name is more commonly used
Current Status & Future Prospect of IoT

“THINGS” vs “People”

“Change is the only thing permanent in this world”


Data and Information
Data
• Data are raw facts and
figures that on their own
have no meaning

• These can be any


alphanumeric characters
i.e. text, numbers,
symbols ect
Data Examples

• Yes, Yes, No, Yes, No, Yes, No, Yes


• 42, 63, 96, 74, 56, 86
• 111192, 111234

• None of the above data sets have any


meaning until they are given a CONTEXT and
PROCESSED into a useable form
Data Into Information
• To achieve its aims the organisation will need
to process data into information.
• Data needs to be turned into meaningful
information and presented in its most useful
format
• Data must be processed in a context in order
to give it meaning
Information
• Data that has been processed within a
context to give it meaning

OR

• Data that has been processed into a form that


gives it meaning
Examples

• The next 3 examples


explain how the data
could be processed to
give it meaning

• What information can


then be derived from the
data?
Example 1

Yes, Yes, No, Yes, No, Yes, No,


Raw Data Yes, No, Yes, Yes

Responses to the market


Context research question – “Would you
buy brand x at price y?”
Processing

Information ???
Example 2

Raw Data 42, 63, 96, 74, 56, 86

trainee’s scores in the six


Context training modules

Processing

Information ???
Example 3

111192, 111234
Raw Data

The previous and current


Context readings of a customer’s gas
meter
Processing

Information ???
Knowledge
• Knowledge is the understanding of rules
needed to interpret information

“…the capability of understanding the


relationship between pieces of
information and what to actually do
with the information”
-Debbie Jones
Knowledge Examples

• Using the 3 previous examples:

– A Marketing Manager could use this information to decide


whether or not to raise or lower price y

– Trainee’s teacher could analyse the results to determine


whether it would be worth him re-sitting a module

– Looking at the pattern of the customer’s previous gas bills may


identify that the figure is abnormally low and they are fiddling
the gas meter!!!
From IOT point of view

Data
Raw and unprocessed data obtained from IOT devices

Information
Inferred/summarized from data by filtering, processing,
categorizing, condensing and contextualizing
data

Knowledge
Inferred from information by structuring/organizing
information and is put into action to achieve specific
objectives.
Example: Weather Monitoring System
This doesn’t have any meaning

Consider a series of raw sensor measurements ((72,45);(84,56)) generated by a


weather monitoring system.
Data represents the temperature and
To give meaning, context is added
humidity measured every minute
With this context added we know the meaning of measured data tuples.

Information is obtained by categorizing, condensing or processing this data.


Example: Average temperature and humidity readings for last 5 minutes is obtained
by averaging the last data tuples.
Organize the information and understand the relationship between pieces of
information to infer knowledge which can be put into action.
Example: An alert is raised if average temp in last 5 minutes exceeds 120F
And alert is shown on user’s graphical position as well.
•Inventory Management
•Smart Payments
•Smart lighting •Smart Vending Machines
•Smart Appliances
Retail •Route Generation &
•Intrusion Detection Scheduling
•Fleet Tracking
•Smoke/Gas Home Logistics •Shipment Monitoring
Detection
•Remote vehicle
•Smart Parking Diagnostics
•Smart Roads
•Smart
•Structural Health
Cities Irrigation
Monitoring Agriculture
IOT •Green
•Emergency Response
House
Control
•Weather Monitoring
•Air Polution Monitoring •Machine
Enviro Diagnosis &
•Noise Polution
Monitoring nment Industry Prognosis
•Forest Fire Detection •Indoor Air Quality
Monitoring
•Smart Grids Health
•Renewable Energy •Health & Fitness
Energy & Monitoring
Systems
•Prognostics Lifestyle •Wearable Electronics
1.1.1 Definition & Characteristics of IOT

Definition
A dynamic global network infrastructure with
self-configuring capabilities based on standard
and interoperable communication protocols
where physical and virtual “things” have
identities, physical attributes, and virtual
personalities and use intelligent interface, and
are seamlessly intergrated into the information
network, often communicate data associated
with users and their environments.
Characteristic 1:

Dynamic & Self Adapting


•loT devices and systems may have the capability to
dynamically adapt with the changing contexts and
take actions based on their operating conditions, user's
context, or sensed environment.
Example: Consider a
surveillance system
comprising of a number
of surveillance an adapt
their modes (to normal
or infra-red night
modes) based on
whether it is day or
night.

•Cameras could switch from lower resolution to higher resolution modes when any motion
is detected and alert nearby cameras to do the same.
Characteristic 2:
Self-Configuring
•loT devices may have self-configuring
capability, allowing a large number of devices
to work together to provide certain
functionality (such as weather monitoring).

•These devices have the ability configure


themselves, setup the networking, and fetch
latest software upgrades with minimal
manual or user intervention.
Characteristic 3:

Interoperable Communication Protocols


Interoperable: Technology systems and software
applications ability to communicate, exchange data,
and use the information that has been exchanged

•loT devices may support a number of interoperable


communication protocols and can communicate with other
devices and also with the infrastructure.

•We describe some of the commonly used communication


protocols and models in later sections.
Characteristic 4:

Unique identity

•Each loT device has a unique identity and a unique


identifier (such as an IP address or a URI).
(URI) is a string of characters used to identify a resource.
•loT systems may have intelligent interfaces which adapt
based on the context, allow communicating with users
and the environmental contexts.

•IOT device interfaces allow users to query the devices,


monitor their status, and control them remotely.
Characteristic 5:

Integrated into Information Network


IoT devices are usually integrated into the information network that
allows them to communicate and exchange data with other devices
and systems.
•IoT devices can be dynamically discovered in the network, by other
devices and/or the network, and have the capability to describe
themselves (and their characteristics) to other devices or user
applications.

Example: A weather monitoring node can describe its monitoring


capabilities to another connected node so that they can communicate
and exchange data.

•Integration into the information network helps in making loT systems


"Smart due to the collective intelligence of the individual devices in
collaboration with the infrastructure.
•Thus, the data from a large number of connected weather monitoring
loT nodes can be aggregated and analyzed to predict the weather.
1.2 Physical Design of IoT
Audio/Video I/O Interfaces
Connectivity Processor Interface (for sensors,
USB Host HDMI actuators, ect.)
CPU 3.5mm audio
RJ45/Ethernet UART
RCA Video

SPI

Storage I2C
Memory Graphics
Interfaces Interface
SD
NAND/NOR CPU CAN
MMC
DDR1/DDR2/
SDIO
DDR3
Communication Protocols
• Communication between electronic devices is
like communication between humans.
• Both sides need to speak the same language.
• In electronics, these languages are called
communication protocols.
• Communication protocols are standards that
contains data exchange rules and format
between embedded systems
• UART • I2C • SPI • CAN
UART(Universal Asynchronous
Receiver/Transmitter)
• UART is not a communication protocol like SPI and I2C,but a
physical circuit in microcontroller, or a stand-alone IC.
• It is a computer hardware device for asynchronous serial
communication in which data format and transmission
speeds are configurable.
• A UART’s main purpose is to transmit and receive serial data.
• One of the best things about UART is that it only uses two
wires to transmit data between devices(There is one wire for
transmitting data, and one wire to receive data. )
• The transmitting UART converts parallel data from a
controlling device like a CPU into serial form, transmits it in
serial to the receiving UART, which then converts the serial
data back into parallel data for the receiving device.
Data Transmission
• A common parameter is the baud rate known as "bps"
which stands for bits per second.
• If a transmitter is configured with 9600bps, then the
receiver must be listening on the other end at the
same speed.
• UART is a serial communication, so bits must travel on
a single wire.
• If you wish to send a char (8-bits) over UART, the char is
enclosed within a start and a stop bit, so to send 8-bits
of char data, it would require 2-bit overhead;
• This 10-bit of information is called a UART frame.
Why UART?

• A UART may be used when


-High speed is not required
-An inexpensive communication link between
two devices is required.
• UART communication is very cheap:
• Single wire for each direction(and ground wire).
• Simple hardware.
• In UART communication, two UARTs
communicate directly with each other.
SPI
• Serial Peripheral Interface (SPI) is an interface bus
commonly used to send data between microcontrollers
and small peripherals such as shift registers, sensors,
and SD cards.
• Developed by Motorola to provide full-duplex
synchronous serial communication
• It uses separate clock and data lines, along with a
select line to choose the device you wish to talk to.
• It is a master – slave type protocol that provides a
simple and low cost interface between a
microcontroller and its peripherals.
Inter-Integrated Circuit
I2C or I2C (IIC)
• I2C combines the best features of SPI and
UARTs. With I2C, you can connect multiple
slaves to a single master (like SPI) and you can
have multiple masters controlling single, or
multiple slaves.
• This is really useful when you want to have
more than one microcontroller logging data to
a single memory card or displaying text to a
single LCD.
CAN
• Controller Area Network bus
• It allows microcontroller and devices to
communicate without a host computer.
• It is a two wired half duplex high speed serial
network technology.
1.2.2 IoT Protocols
Link Layer
• Determines how data is physically sent over
the network’s physical layer.
-ex: copper wire, coaxial cable, radio waves
• Scope of LL: Local N/W connections to which
host is connected.
• Data exchange-using link layer protocols
Standard For Data Rate
IEEE 802.3 Ethernet-Coaxial
cable
IEEE 802.3i Ethernet-Twisted 10MBps to 40GBps
pair
IEEE 802.3j Ethernet-Fiber
IEEE 802.11 Wireless LAN 1MBps to 6.7GBps
IEEE 802.16 WifiMax 1.5MBps to 1GBps
IEEE 802.15.4 LR WPAN(Wireless 40kbps to 250kbps
personal area n/w)

GSM=Global System for Mobile Communications


time division multiple access
2G- GSM and CDMA CDMA=Code-division multiple access
3G- UMTS and CDMA2000 several transmitters can send information simultaneously
4G – LTE (Long term evolution) over a single communication channel

Data Range: 9.6kbps to 100Mbps UMTS=Universal Mobile


Telecommunications System
Network Layer
• Responsible for sending datagrams from
“Source N/W to Destination N/W”
• Performs host addressing and packet routing
• Datagram contains source and destination
address which is used for routing.
• Addressing schemes: IPv4 or IPv6
IPv4
• Most commonly used
• Uses 32-bit address scheme
• 232 294967296 address
• These address got exhausted in 2011(due to
increase in no. of devices)
• So moving to IPv6
IPv6
• Uses 128-bit address scheme
• 2128 addresses possible
34028236692093846346337460743176821145
6

6LoWPAN
• Low power Wireless Personal Area Network
which uses IPv6.
• Brings IP protocol to low power devices
Transport layer
• Provides end-to-end message transfer
capability independent of underlying N/W
• Transfer capability is set up using TCP or UDP
TCP UDP
•Transmission Control
Protocol Requires initial setup
•User Datagram Protocol
• Connection Oriented -connection is •Connectionlessstateless
•Most widely used by established and •Useful for time sensitive
-web browser maintained until app applications where small
program at each end
-Email programs
finishes exchange of
amount of data will be
-File Transfer(FTP) message exchanges
•Provides •Doesn’t provide
-Error detection guaranteed delivery
-Flow control capability
(ensures transmission rate)
-Congestion control capability
Application Layer
• App layer protocols defines how app interface with
lower layer protocols to send the data over network.
• App data(in files) encoded and encapsulated in
transport layer which provides connection or
transaction oriented communication over N/W.
• Port numbers are used for app addressing
-port 80 for HTTP
-port 22 for SSH ect
• App layer protocols enable process-to-process
(service) connections using ports
HTTP: Hypertext Transfer Protocol
GET  List all resources in the collection
PUT  Replace entire collection with another collection
• -Foundation for WWW POST  Create a new resource
DELETE  Delete entire resource

• Includes commands GET, PUT,POST,DELETE


ect
• Protocol follows Request-Response Model
Browser Request
App
program Client Server
Http command

• HTTP protocol uses URI to identify the HTTP


resources
Uniform Resource Identifier (URI) is a string of characters used to identify a resource.
CoAP(Constrained Application Protocol)

• This is for M2M applications meant for


constrained environment with constrained
machines and networks (e.g., low-power,
lossy networks),
• Uses Client-Server architecture
• Clients can communicate with its server using
connectionless datagrams
• Supports GET,PUT, POST,Delete commands
Websockets
• This protocol allows full duplex communication over single
socket connection
• Based on TCP
MQTT(Message Queue Telemetry Transport)
• Light weight messaging protocol based on “Publish-Subscribe
Model”
XAMP(Extensible Message and
Presence Protocol)
• Open XML technology for real-time communication,
which powers a wide range of applications including
instant messaging, presence, multi-party chat, voice
and video calls, and collaboration.
• The presence indicator tells the servers that you are
online / offline / busy.

DDS(Data Distribution Service)


• Standard for device to device(M2M) communication
• Uses Publish Subscribe Model with brokerless architecture
-i.e Protocol for Real-time systems
AMQP(Advanced Message Queuing
Protocol)
• Protocol for business messaging
• Supports both Point-to-Point Model and
Publish-Subscribe Model
• Either Broker will distribute the messages or
consumers pull the messages
1.3 Logical Design of IoT
• Abstract representation of the entities and
processes without going into low level
specifications of the implementations
1. 1.3.1 IoT Functional Blocks

2. 1.3.2 IoT Communication Models

3. 1.3.3 IoT Communication API


1.3.1 IoT Functional Blocks
An IoT system comprises of a number of functional blocks
that provide the system the capabilities for identification,
sensing, actuation, communication, and management.
IoT Functional Blocks
1. Device-Provides sensing, actuation, monitoring and control
functions
2. Communication- Handles communication for IoT System
3. Services-device monitoring ,device control services, data
publishing services
4. Management-Provides various functions to govern the IoT
system
5. Security-provides authentication, authorization, message and
content integrity and data security
6. Applications-It provides the interface for users to control and
monitor the system. It also allows users to view system status and
analyze the processed data
1.3.2 IOT Communication Model

1. Request-Response
2. Publish-Subscribe
3. Push-Pull
4. Exclusive Pair
Request-Response
Publish-Subscribe
Push-Pull

Publishers

Consumer 1
Send
messages to
Queues
queues
Consumer 2

Pull data from


queues
•Queues use the buffer to avoid mismatch between data rate of Publishers
and Subscribers.
•Publishers are not aware of consumers
Exclusive Pair
• Bidirectional and Fully duplex communication

Request to setup the


connection

Responds accepting
the request

Message from client to


Client server
Server
Message from server
to client
Connection close
request
Connection close
response

•Statefull communication model: Server is aware of all the open connections.


1.3.3 IOT Communication APIs
1. REST-based Communication APIs
2. WebSocket-based Communication APIs

API: Set of functions ,protocols, routines and


tools used for building application software.
REST-based Communication APIs
• REST stands for REpresentational State
Transfer
Communication between Clients and Server using REST API

HTTP Packet
HTTP Server
HTTP Client HTTP Commands
Authorization
GET PUT

REST-based POST DELETE

HTTP Client REST-full


Web Service
REST Payload

JSON XML

•Follows Request Response


communication Model Resources
•Resources are represented by URI
•Clients send request to these URIs using URI URI

method defined by HTTP protocol Representation Representation

GET  List all resources in the collection Resources Resources


PUT  Replace entire collection with another collection
POST  Createa new resource
DELETE  Delete entire resource
REST Architecture Constraints
Principal idea is separation of concerns
Client-Server Ex: Clients should not concerned about storage-->It is concern of
Server
Server should not concern about UI --> It is concern of Clients So
this separation allows Clients and Server to be independently
developed and uploaded
Stateless Each communication should be independent of others.
Each request from client should include all the info
required to understand the request

Cacheable Cacheable Each response to request is labelled


cacheable or non cacheable. If cacheable then client
is given right to reuse that response for later for
equivalent request.
Layered System Each component can't see beyond the intermediate
layers during interaction.
ex: A Client can't tell if it is directly connected to
server or intermediatary along the way
Uniform Interface Communication between Clients and Server code
must be uniform

Code on Demand Servers can provide executable code for scripts for
clients to execute in their context.
WebSocket-based Communication
APIs
• Allows bidirectional full duplex
communication between Clients and Server
• Follows Exclusive Pair communication model
• Doesn’t require a new connection to be set up
for each message sent
-Connection request: websocket handshake
If server supports websocket protocol then server
responds to the handshake then server and client can
exchange messages in full duplex mode.

No Traffic because no overhead for connection setup


1.4 IoT Enabling Technologies
• Wireless Sensor Network

• Cloud Computing

• Big Data Analytics

• Communication Protocols

• Embedded Systems
1.4.1 1. Wireless Sensor Network

•Distributed Devices with sensors used to monitor the


environmental and physical conditions
Or

•It is a network formed by large no. of


sensor nodes to detect light, heat ,
pressure ect.
i.e. used to monitor environmental and
physical conditions.
•Each node can have several sensors
attached to it.
• Each node can also acts as a routers
• Coordinator collects data from all nodes
• Coordinator acts as gateway that
connects WSN to the internet.
Examples of WSNs
• Indoor Air Quality Monitoring system
• Weather Monitoring System
• Soil Moisture Monitoring System
• Survelliance Systems
• Health Monitoring Systems

Protocols used
WSNs are enabled by wireless communication protocols such as
IEEE802.15.4
Zigbee is one of the most popular wireless technology used by WSNs.
Zigbee specifications are based on IEEE802.15.4 which is used for
low powered devices.
Data rate: up to 250KBps. Range: upto 100 Meters
1.4.2 2. Cloud Computing
Internet based
Vs
local storage computing

• Deliver applications and services over internet


Provides computing, networking and storage
resources on demand
Cloud Computing is a way of
making use of virtual computer
world wide using the same
personalized experience.

Types of Cloud computing services


1. IaaS(Infrastructure as a Service),
2. PaaS(Platform as a Service and
3. SaaS(Software as a Services)
IaaS: Clients can use storage to install and manage operating systems and
any desired applications.( i.e Virtual machines + virtual storage)
Ex: Web Hosting.

• Paas : Clients can install, build and modify • Saas : Clients can access and use
or control applications.
software at remote location using a
Ex: App cloud, Google App Engine web browser.
Ex: Google documents
Benefits of Cloud Computing

1. It doesn’t require you to maintain or manage it(no need to have an IT


expert).
2. Effectively infinite size, so no need to worry about running out of capacity.
3. You can access cloud based applications and services from anywhere(
Device independent ).
1.4.3 3. Big Data Analytics
• Collection of data whose volume, velocity or variety is too
large and difficult to store, manage, process and analyze
the data using traditional databases.

Big data Analytics involves


Data cleansing
Correcting
Data munging (Data Wrangling)
Removing Data Processing and
Replacing Data Visualization
Converting data
from one format to
other
Big Data Analytics
Characteristics of Big Data is 3V

Variety Includes different types of data


Structured
Unstructured
Semi-Structured Volume refers to the amount of data
All of above
-text, audio , video Terabyte
Records
Transactions
Velocity Refers to speed at which data Files
is processed
Tables
Batch
Acc to IBM in 2012: 2.5 Billion GB
Real-time data was generated everyday!
Streams Forbes states: in 2020, 1.7 MB of
new information is will be created
Examples
• Lots of data is being collected and warehoused
• Web data, e-commerce
• purchases at department/ grocery stores
• Bank/Credit Card transactions
• Social Network
1.4.4 4. Communication Protocols

• Backbone of IOT system


•Allows devices to exchange data over networks.
• Define data exchange formats
- Data encoding
- Addressing Schemes
- Routing of packets from sources to destination
• Other Functions
- Sequence control(ordering data packets)
- Flow control(controlling transfer rate)
- Retransmission of lost packets
1.4.5 5. Embedded Systems
•A microcontroller-based, software-driven, reliable, real-
time control system, designed to perform a specific task..
•It can be thought of as a computer hardware system having
software embedded in it.
• An embedded system can be either an independent system or a What is the
part of a large system. difference
between a PC
Embedded Systems found in.. and an
Embedded
system?
Key Components
• Microprocessor or micro controller
• Memory (RAM, ROM ect.)
• Storage ( Flash Memory)
• Networking units(Ethernet, Wifi adaptors )
• I/O units ( Keyboard, display ect)

Some Embedded systems have

• DSP(Digital Signal Processor)


• Graphics Processor
• App Specific Processor

•Embedded systems run embedded OS


Ex: RTOS(Real Time OS)(like symbian, Vxworks , Windows
embedded compact ect.)
1.5 IoT Levels and Deployment Templates
An IoT system comprises the following components:
Device, Resource, Controller Service, Database, Web service, Analysis
Component and Application.
Device :
An IoT device allows identification, remote sensing, remote
monitoring capabilities.

Resource:
• Software components on the IoT device for
-accessing, processing and storing sensor information,
-controlling actuators connected to the device.
- enabling network access for the device.

Controller Service:
• Controller service is a native service that runs on the device and interacts
with the web services.
•It sends data from the device to the web service and receives commands
from the application (via web services) for controlling the device.
Database:
•Database can be either local or in the cloud and stores the data
generated by the IoT device.

Web Service:
•Web services serve as a link between the IoT device, application,
database and analysis components.
•It can be implemented using HTTP and REST principles (REST
service) or using the WebSocket protocol (WebSocket service).

Analysis Component:
• Analysis Component is responsible for analyzing the IoT data and
generating results in a form that is easy for the user to understand.

Application:
•IoT applications provide an interface that the users can use to
control and monitor various aspects of the IoT system.
•Applications also allow users to view the system status and the
processed data.
1.5.1 IoT Level-1

A level-1 IoT system has a single node/device that


performs sensing and/or actuation, stores data,
performs analysis and hosts the application.

Level-1 IoT systems are suitable for


modelling low- cost and low-complexity
solutions where the data involved is not big
and the analysis requirements are not
computationally intensive.
IoT – Level 1 Example : Home Automation System
1.5.2 IoT Level-2
•A level-2 IoT system has a single
node that performs sensing and/or
actuation and local analysis.
Data is stored in the cloud and the
application is usually cloud-based.

•Level-2 IoT systems are suitable for


solutions where the data involved is
big; however, the primary analysis
requirement is not computationally
intensive and can be done locally.
IoT – Level 2 Example: Smart Irrigation
1.5.3 IoT Level-3

A level-3 IoT system has a


single node. Data is stored
and analyzed in the cloud
and the application is cloud-
based.

Level-3 IoT systems are


suitable for solutions where
the data involved is big and
the analysis requirements
are computationally
intensive.
IoT – Level 3 Example: Tracking Package Handling

Sensors used
Accelrometer Gyroscope
sense movement or vibrations Gives orientation info

Websocket service is used because sensor data can be sent in real time.
1.5.4 IoT Level-4
A level-4 IoT system has
multiple nodes that perform
local analysis. Data is stored in
the cloud and the application is
cloud-based.

Level-4 contains local and cloud-


based observer nodes which can
subscribe and receive information
collected in the cloud from IoT
devices.

Level-4 IoT systems are suitable


for solutions where multiple
nodes are required, the data
involved is big and the analysis
requirements are
computationally intensive.
IoT – Level 4 Example: Noise Monitoring

Sound Sensors are


used
1.5.5 IoT Level-5
•A level-5 IoT system has
multiple end nodes and one
coordinator node.
•The end nodes perform
sensing and/or actuation.
•The coordinator node collects
data from the end nodes and
sends it to the cloud.
•Data is stored and analyzed in
the cloud and the application
is cloud- based.

Level-5 IoT systems are suitable for solutions based on


wireless sensor networks, in which the data involved is big
and the analysis requirements are computationally intensive.
IoT – Level 5 Example: Forest Fire Detection
Detect forest fire in early stages to take action while
the fire is still controllable.
Sensors measure the temperature, smoke, weather,
slope of the earth, wind speed, speed of fire spread,
flame length
1.5.6 IoT Level-6
•A level-6 IoT system has
multiple independent end
nodes that perform sensing
and/or actuation and send data to
the cloud.
•Data is stored in the cloud and
the application is cloud-based.
•The analytics component
analyzes the data and stores the
results in the cloud database.
•The results are visualized with
the cloud-based application.
•The centralized controller is
aware of the status of all the end
nodes and sends control
commands to the nodes.
IoT – Level 6 Example: Weather Monitoring System

Sensors used
Wind speed and direction Precipitation
Solar radiation Snow depth
Temperature (air, water, soil) Barometric pressure
Relative humidity Soil moisture
IoT Issues and Challenges

Security
• Cyber Attacks, Data Theft

Privacy
• Controlling access and ownership of data.

InterOperability
• Integration Inflexibility

Legality and Rights


• Data Protection laws be followed, Data Retention and destruction policies

Economy and Development


• Investment Incentives, Technical Skill Requirement
Domain Specific IoTs
Outline
IoT Applications for :
• Home
• Cities
• Environment
• Energy Systems
• Retail
• Logistics
• Industry
• Agriculture
• Health & Lifestyle
2.2 Home Automation

IoT applications for smart homes:


o 2.2.1 Smart Lighting
o 2.2.2 Smart Appliances
o 2.2.3 Intrusion Detection
o 2.2.4 Smoke / Gas Detectors
Home Automation
2.2.1 Smart Lighting
 Smart lighting achieve energy savings by sensing the human movements and their environments
and controlling the lights accordingly.
 Key enabling technologies for smart lighting include :
- Solid state lighting (such as LED lights)
- IP-enabled lights
 Wireless-enabled and Internet connected lights can be controlled remotely from IoT applications
such as a mobile or web application.
 Paper:
- Energy-aware wireless sensor network with ambient intelligence for smart LED lighting system control
[IECON, 2011]  presented controllable LED lighting system that is embedded with ambient intelligence
gathered from a distributed smart WSN to optimize and control the lighting system to be more efficient and
user-oriented.
Home Automation
2.2.2 Smart Appliances
• Smart appliances make the management easier and provide status information of appliances to the
users remotely. E.g: smart washer/dryer that can be controlled remotely and notify when the
washing/drying cycle is complete.
• OpenRemote is an open source automation platform for smart home and building that can control
various appliances using mobile and web applications.
• It comprises of three components:
- a Controller  manages scheduling and runtime integration between devices.
- a Designer  allows to create both configuration for the controller and user interface designs.
- Control Panel  allows to interact with devices and control them.
• Paper:
- An IoT-based Appliance Control System for Smart Home [ICICIP, 2013]  implemented an IoT based appliance control
system for smart homes that uses a smart-central controller to set up a wireless sensor and actuator network and
control modules for appliances.
Home Automation
2.2.3 Intrusion Detection
• Home intrusion detection systems use security cameras and sensors to detect intrusions and raise
alerts.
• The form of the alerts can be in form:
- SMS
- Email
- Image grab or a short video clip as an email attachment
• Papers :
- Could controlled intrusion detection and burglary prevention stratagems in home automation systems
[BCFIC, 2012]  present a controlled intrusion detection system that uses location-aware services, where
the geo-location of each node of a home automation system is independently detected and stored in the
cloud
- An Intelligent Intrusion Detection System Based on UPnP Technology for Smart Living [ISDA, 2008] 
implement an intrusion detection system that uses image processing to recognize the intrusion and extract
the intrusion subject and generate Universal-Plug-and-Play (UPnP-based) instant messaging for alerts.
Home Automation
2.2.4 Smoke / Gas Detectors
• Smoke detectors are installed in homes and buildings to detect smoke that is typically an early sign
of fire.
• It uses optical detection, ionization or air sampling techniques to detect smoke
• The form of the alert can be in form :
• Signals that send to a fire alarm system
• Gas detector can detect the presence of harmful gases such as carbon monoxide (CO), liquid
petroleum gas (LPG), etc.
• Paper :
- Development of Multipurpose Gas Leakage and Fire Detector with Alarm System [TIIEC, 2013] 
designed a system that can detects gas leakage and smoke and gives visual level indication.
2.3 Cities

IoT applications for smart cities:


1. Smart Parking
2. Smart Lighting for Road
3. Smart Road
4. Structural Health Monitoring
5. Surveillance
6. Emergency Response
Cities
2.3.1 Smart Parking
• Finding the parking space in the crowded city can be time consuming and frustrating
• Smart parking makes the search for parking space easier and convenient for driver.
• It can detect the number of empty parking slots and send the information over the Internet to the
smart parking applications which can be accessed by the drivers using their smartphones, tablets,
and in car navigation systems.
• Sensors are used for each parking slot to detect whether the slot is empty or not, and this
information is aggregated by local controller and then sent over the Internet to database.
• Paper :
• Design and implementation of a prototype Smart PARKing (SPARK) system using WSN [International Conference on
Advanced Information Networking and Applications Workshop, 2009]  designed and implemented a prototype smart
parking system based on wireless sensor network technology with features like remote parking monitoring, automate
guidance, and parking reservation mechanism.
Cities
2.3.2 Smart Lighting for Roads
• It can help in saving energy
• Smart lighting for roads allows lighting to be dynamically controlled and also adaptive to ambient
conditions.
• Smart light connected to the Internet can be controlled remotely to configure lighting schedules and
lighting intensity.
• Custom lighting configurations can be set for different situations such as a foggy day, a festival, etc.
• Paper :
• Smart Lighting solutions for Smart Cities [International Conference on Advance Information Networking and Applications
Workshop, 2013]  described the need for smart lighting system in smart cities, smart lighting features and how to
develop interoperable smart lighting solutions.
Cities
2.3.3 Smart Roads
• Smart Roads provides information on driving conditions, travel time estimates and alerts in case of
poor driving conditions, traffic congestions and accidents.
• Such information can help in making the roads safer and help in reducing traffic jams
• Information sensed from the roads can be communicated via internet to cloud-based applications
and social media and disseminated to the drivers who subscribe to such applications.
• Paper:
• Sensor networks for smart roads [PerCom Workshop, 2006]  proposed a distributed and autonomous system of
sensor network nodes for improving driving safety on public roads, the system can provide the driver and passengers
with a consistent view of the road situation a few hundred metes ahead of them or a few dozen miles away, so that they
can react to potential dangers early enough.
Cities
2.3.4 Structural Health Monitoring
• It uses a network of sensors to monitor the vibration levels in the structures such as bridges and
buildings.
• The data collected from these sensors is analyzed to assess the health of the structures.
• By analyzing the data it is possible to detect cracks and mechanical breakdowns, locate the
damages to a structure and also calculate the remaining life of the structure.
• Using such systems, advance warnings can be given in the case of imminent failure of the
structure.
• Paper:
- Environmental Effect Removal Based Structural Health Monitoring in the Internet of Things [International Conference on
Innovative Mobile and Internet Services in Ubiquitous Computing, 2013]  proposed an environmental effect removal
based structural health monitoring scheme in an IoT environment.
- Energy harvesting technologies for structural health monitoring applications [IEEE Conference on Technologies for
Sustainability, 2013]  Explored energy harvesting technologies of harvesting ambient energy, such as mechanical
vibrations, sunlight, and wind.
Cities
2.3.5 Surveillance
• Surveillance of infrastructure, public transport and events in cities is required to ensure safety and
security.
• City wide surveillance infrastructure comprising of large number of distributed and Internet
connected video surveillance cameras can be created.
• The video feeds from surveillance cameras can be aggregated in cloud-based scalable storage
solutions.
• Cloud-based video analytics applications can be developed to search for patterns of specific events
from the video feeds.
Cities
2.3.6 Emergency Response
• IoT systems can be used for monitoring the critical infrastructure cities such as buildings, gas, and
water pipelines, public transport and power substations.
• IoT systems for critical infrastructure monitoring enable aggregation and sharing of information
collected from lager number of sensors.
• Using cloud-based architectures, multi-modal information such as sensor data, audio, video feeds
can be analyzed I near real-time to detect adverse events.
• The alert can be in the form :
• Alerts sent to the public
• Re-rerouting of traffic
• Evacuations of the affected areas
2.4 Environment

IoT applications for smart environments:


1. Weather Monitoring
2. Air Pollution Monitoring
3. Noise Pollution Monitoring
4. Forest Fire Detection
5. River Flood Detection
Environment
2.4.1 Weather Monitoring
• It collects data from a number of sensor attached such as temperature, humidity, pressure, etc and
send the data to cloud-based applications and store back-ends.
• The data collected in the cloud can then be analyzed and visualized by cloud-based applications.
• Weather alert can be sent to the subscribed users from such applications.
• AirPi is a weather and air quality monitoring kit capable of recording and uploading information
about temperature, humidity, air pressure, light levels, UV levels, carbon monoxide, nitrogen dioxide
and smoke level to the Internet.
• Paper:
- PeWeMoS – Pervasive Weather Monitoring System [ICPCA, 2008]  Presented a pervasive weather monitoring system
that is integrated with buses to measure weather variables like humidity, temperature, and air quality during the bus path
Environment
2.4.2 Air Pollution Monitoring
• IoT based air pollution monitoring system can monitor emission of harmful gases by factories and
automobiles using gaseous and meteorological sensors.
• The collected data can be analyzed to make informed decisions on pollutions control approaches.
• Paper:
- Wireless sensor network for real-time air pollution monitorings [ICCSPA, 2013]  Presented a real time air quality
monitoring system that comprises of several distributed monitoring stations that communicate via wireless with a back-
end server using machine-to machine communication.
Environment
2.4.3 Noise Pollution Monitoring
• Noise pollution monitoring can help in generating noise maps for cities.
• It can help the policy maker in making policies to control noise levels near residential areas, school
and parks.
• It uses a number of noise monitoring stations that are deployed at different places in a city.
• The data on noise levels from the stations is collected on servers or in the cloud and then the
collected data is aggregate to generate noise maps.
• Papers :
- Noise mapping in urban environments : Applications at Suez city center [ICCIE, 2009]Presented a noise mapping study
for a city which revealed that the city suffered from serious noise pollution.
- SoundOfCity – Continuous noise monitoring for a health city [PerComW,2013]  Designed a smartphone application
that allows the users to continuously measure noise levels and send to a central server here all generated information is
aggregated and mapped to a meaningful noise visualization map.
Environment
2.4.4 Forest Fire Detection
• IoT based forest fire detection system use a number of monitoring nodes deployed at different
location in a forest.
• Each monitoring node collects measurements on ambient condition including temperature, humidity,
light levels, etc.
• Early detection of forest fires can help in minimizing the damage.
• Papers:
• A novel accurate forest fire detection system using wireless sensor networks [International Conference on Mobile Ad-
hoc and Sensor Networks, 2011] Presented a forest fire detection system based on wireless sensor network. The
system uses multi-criteria detection which is implemented by the artificial neural network. The ANN fuses sensing data
corresponding to ,multiple attributes of a forest fire such as temperature, humidity, infrared and visible light to detect
forest fires.
Environment
2.4.5 River Flood Detection
• IoT based river flood monitoring system uses a number of sensor nodes that monitor the water level
using ultrasonic sensors and flow rate using velocity sensors.
• Data from these sensors is aggregated in a server or in the cloud, monitoring applications raise
alerts when rapid increase in water level and flow rate is detected.
• Papers:
• RFMS : Real time flood monitoring system with wireless sensor networks [MASS, 2008]  Described a river flood
monitoring system that measures river and weather conditions through wireless sensor nodes equipped with different
sensors
• Urban Flash Flood Monitoring, Mapping and Forecasting via a Tailored Sensor Network System [ICNSC, 2006] 
Described a motes-based sensor network for river flood monitoring that includes a water level monitoring module,
network video recorder module, and data processing module that provides floods information n the form of raw data,
predict data, and video feed.
2.5 Energy
IoT applications for smart energy systems:
1. Smart Grid
2. Renewable Energy Systems
3. Prognostics
Energy
2.5.1 Smart Grids
 Smart grid technology provides predictive information and recommendation s to
utilize, their suppliers, and their customers on how best to manage power.
 Smart grid collect the data regarding :
- Electricity generation
- Electricity consumption
- Storage
- Distribution and equipment health data
 By analyzing the data on power generation, transmission and consumption of smart grids can
improve efficiency throughout the electric system.
 Storage collection and analysis of smarts grids data in the cloud can help in dynamic optimization of
system operations, maintenance, and planning.
 Cloud-based monitoring of smart grids data can improve energy usage usage levels via energy
feedback to users coupled with real-time pricing information.
 Condition monitoring data collected from power generation and transmission systems can help in
detecting faults and predicting outages.
Energy
2.5.2 Renewable Energy System
 Due to the variability in the output from renewable energy sources (such as solar and wind),
integrating them into the grid can cause grid stability and reliability problems.
 IoT based systems integrated with the transformer at the point of interconnection measure the
electrical variables and how much power is fed into the grid
 To ensure the grid stability, one solution is to simply cut off the overproductions.
 Paper:
- Communication systems for grid integration of renewable energy resources [IEEE Network, 2011]  Provided the
closed-loop controls for wind energy system that can be used to regulate the voltage at point of interconnection which
coordinate wind turbine outputs and provides reactive power support.
Energy
2.5.3 Prognostics
 IoT based prognostic real-time health management systems can predict performance of machines
of energy systems by analyzing the extent of deviation of a system from its normal operating
profiles.
 In the system such as power grids, real time information is collected using specialized electrical
sensors called Phasor Measurement Units (PMU)
 Analyzing massive amounts of maintenance data collected from sensors in energy systems and
equipment can provide predictions for impending failures.
 OpenPDC is a set of applications for processing of streaming time-series data collected from
Phasor Measurements Units (PMUs) in real-time.
2.6 Retail

IoT applications in smart retail


systems:
1. Inventory Management
2. Smart Payments
3. Smart Vending Machines
Retail
2.6.1 Inventory Management
• IoT system using Radio Frequency Identification (RFID) tags can help inventory management and
maintaining the right inventory levels.
• RFID tags attached to the products allow them to be tracked in the real-time so that the inventory
levels can be determined accurately and products which are low on stock can be replenished.
• Tracking can be done using RFID readers attached to the retail store shelves or in the warehouse.
• Paper:
- RFID data-based inventory management of time-sensitive materials [IECON, 2005]  described an RFID data-based
inventory management system for time-sensitive materials
Retail
2.6.2 Smart Payments
 Smart payments solutions such as contact-less payments powered technologies such as Near field
communication (NFC) and Bluetooth.
 NFC is a set of standards for smart-phones and other devices to communicate with each other by
bringing them into proximity or by touching them
 Customer can store the credit card information in their NFC-enabled smart-phones and make
payments by bringing the smart-phone near the point of sale terminals.
 NFC maybe used in combination with Bluetooth, where NFC initiates initial pairing of devices to
establish a Bluetooth connection while the actual data transfer takes place over Bluetooth.
Retail
2.6.3 Smart Vending Machines
- Smart vending machines connected to the Internet allow remote monitoring of inventory levels,
elastic pricing of products, promotions, and contact-less payments using NFC.
- Smart-phone applications that communicate with smart vending machines allow user preferences to
be remembered and learned with time. E.g: when a user moves from one vending machine to the
other and pair the smart-phone, the user preference and favorite product will be saved and then
that data is used for predictive maintenance.
- Smart vending machines can communicated each others, so if a product out of stock in a machine,
the user can be routed to nearest machine
- For perishable items, the smart vending machines can reduce the price as the expiry date nears.
2.7 Logistic

IoT applications for smart logistic systems:


1. Fleet Tracking
2. Shipment Monitoring
3. Remote Vehicle Diagnostics
Logistics
2.7.2 Fleet Tracking
- Vehicle fleet tracking systems use GPS technology to track the locations of the vehicles in the real-
time.
- Cloud-based fleet tracking systems can be scaled up on demand to handle large number of
vehicles,
- The vehicle locations and routers data can be aggregated and analyzed for detecting bottlenecks I
the supply chain such as traffic congestions on routes, assignments and generation of alternative
routes, and supply chain optimization
- Paper:
- A Fleet Monitoring System for Advanced Tracking of commercial Vehicles [IEEE International Conference in Systems,
Man and Cybernetics, 2006]  provided a system that can analyze messages sent from the vehicles to identify
unexpected incidents and discrepancies between actual and planned data, so that remedial actions can be taken.
Logistics
2.7.3 Shipment Monitoring
- Shipment monitoring solutions for transportation systems allow monitoring the conditions inside
containers.
- E.g : Containers carrying fresh food produce can be monitored to prevent spoilage of food. IoT
based shipment monitoring systems use sensors such as temperature, pressure, humidity, for
instance, to monitor the conditions inside the containers and send the data to the cloud, where it
can be analyzed to detect food spoilage.
- Paper:
- On a Cloud-Based Information Technology Framework for Data Driven Intelligent Transportation System [Journal of
Transportation Technologies, 2013]  proposed a cloud based framework for real time fresh food supply tracking and
monitoring
- Container Integrity and Condition Monitoring using RF Vibration Sensor Tags [IEEE International Conference on
Automation Science and Engineering, 2007]  Proposed a system that can monitor the vibrations patterns of a
container and its contents to reveal information related to its operating environment and integrity during transport,
handling, and storage.
Logistics
2.7.4 Remote Vehicle Diagnostics
- It can detect faults in the vehicles or warn of impending faults.
- These diagnostic systems use on-board IoT devices for collecting data on vehicle operation such as
speed, engine RPM, coolent temperature, fault code number and status of various vehicle sub-
system.
- Modern commercial vehicles support on-board diagnostic (OBD) standard such as OBD-II
- OBD systems provide real-time data on the status of vehicle sub-systems and diagnostic trouble
codes which allow rapidly identifying the faults in the vehicle.
- IoT based vehicle diagnostic systems can send the vehicle data to centralized servers or the cloud
where it can be analyzed to generate alerts and suggest remedial actions.
2.8 Agriculture

IoT applications for smart agriculture:


1. Smart Irrigation
2. Green House Control
Agriculture
2.8.1 Smart Irrigation
- Smart irrigation system can improve crop yields while saving water.
- Smart irrigation systems use IoT devices with soil moisture sensors to determined the amount of
moisture on the soil and release the flow of the water through the irrigation pipes only when the
moisture levels go below a predefined threshold.
- It also collect moisture level measurements on the server on in the cloud where the collected data
can be analyzed to plan watering schedules.
- Cultivar’s RainCould is a device for smart irrigation that uses water valves, soil sensors, and a WiFi
enabled programmable computer. [http://ecultivar.com/rain-cloud-product-project/]
Agriculture
2.8.2 Green House Control
- It controls temperature, humidity, soil, moisture, light, and carbon dioxide level that are monitored by
sensors and climatological conditions that are controlled automatically using actuation devices.
- IoT systems play an importance role in green house control and help in improving productivity.
- The data collected from various sensors is stored on centralized servers or in the cloud where
analysis is performed to optimize the control strategies and also correlate the productivity with
different control strategies.
- Paper:
- Wireless sensing and control for precision Green house management [ICST, 2012]  Provided a system that uses
wireless sensor network to monitor and control the agricultural parameters like temperature and humidity in the real
time for better management and maintenance of agricultural production.
2.9 Industry
IoT applications in smart industry:
1. Machine Diagnosis & Prognosis
2. Indoor Air Quality Monitoring
Industry
2.9.1 Machine Diagnosis & Prognosis
- Machine prognosis refers to predicting the performance of machine by analyzing the data on the
current operating conditions and how much deviations exist from the normal operating condition.
- Machine diagnosis refers to determining the cause of a machine fault.
- Sensors in machine can monitor the operating conditions such as temperature and vibration levels,
sensor data measurements are done on timescales of few milliseconds to few seconds which leads
to generation of massive amount of data.
- Case-based reasoning (CBR) is a commonly used method that finds solutions to new problems
based on past experience.
- CBR is an effective technique for problem solving in the fields in which it is hard to establish a
quantitative mathematical model, such as machine diagnosis and prognosis.
Industry
2.9.2 Indoor Air Quality Monitoring
- Harmful and toxic gases such as carbon monoxide (CO), nitrogen monoxide (NO), Nitrogen
Dioxide, etc can cause serious health problem of the workers.
- IoT based gas monitoring systems can help in monitoring the indoor air quality using various gas
sensors.
- The indoor air quality can be placed for different locations
- Wireless sensor networks based IoT devices can identify the hazardous zones, so that corrective
measures can be taken to ensure proper ventilation.
- Papers:
- A hybrid sensor system for indoor air quality monitoring [IEEE International Conference on Distributed Computing in
Sensor System, 2013]  presented a hybrid sensor system for indoor air quality monitoring which contains both
stationary sensor and mobile sensors.
- Indoor air quality monitoring using wireless sensor network [International Conference on Sensing Technology, 2012] 
provided a wireless solution for indoor air quality monitoring that measures the environmental parameters like
temperature, humidity, gaseous pollutants , aerosol and particulate matter to determine the indoor air quality.
2.10 Health & Lifestyle
IoT applications in smart health & lifestyle:
1. Health & Fitness Monitoring
2. Wearable Electronics
Health & Lifestyle
2.10.1 Health & Fitness Monitoring
• Wearable IoT devices allow to continuous monitoring of physiological parameters such as blood
pressure, heart rate, body temperature, etc than can help in continuous health and fitness
monitoring.
• It can analyze the collected health-care data to determine any health conditions or anomalies.
• The wearable devices may can be in various form such as:
• Belts
• Wrist-bands
• Papers:
- Toward ubiquitous mobility solutions for body sensor network health care [IEEE Communications Magazine, 2012] 
Proposed an ubiquitous mobility approach for body sensor network in health-care
- A wireless sensor network compatible wearable u-healthcare monitoring system using integrated ECG, accelerometer
and SpO2 [International Conference of the IEEE Engineering in Medicine and Biology Society, 2008]  Designed a
wearable ubiquitous health-care monitoring system that uses integrated electrocardiogram (ECG), accelerometer and
oxygen saturation (SpO2) sensors.
Health & Lifestyle
2.10.2 Wearable Electronics
• Wearable electronics such as wearable gadgets (smart watch, smart glasses, wristbands, etc)
provide various functions and features to assist us in our daily activities and making us lead healthy
lifestyles.
• Using the smart watch, the users can search the internet, play audio/video files, make calls, play
games, etc.
• Smart glasses allows users to tae photos and record videos, get map directions, check flight status
or search internet using voice commands
• Smart shoes can monitor the walking or running speeds and jumps with the help of embedded
sensors and be paired with smart-phone to visualize the data.
• Smart wristbands can track the daily exercise and calories burnt.
IoT & M2M
3.1 Introduction
In Chapter-1, you learned about the definition and
characteristics of Internet of Things (IoT).

Another term which is often used synonymously with IoT


is Machine to Machine (M2M).

Though loT and M2M are often used interchangeably,


these terms have evolved from different backgrounds.

This chapter describes some of the differences and


similarities between loT and M2M.
3.2 M2M
Machine-to-Machine (M2M) refers to networking of
machines (or devices) for the purpose of remote
monitoring and control and data exchange.

Figure 3.1 shows the end-to-end architecture for M2M


systems comprising of M2M area networks,
communication network and application domain.
• An M2M area network comprises of machines (or M2M
nodes) which have embedded hardware modules for
sensing, actuation and communication.
• Various communication protocols can be used for M2M
local area networks such as
• ZigBee, Bluetooth, ModBus, M-Bus, Wireless M-Bus, Power
Line Communication (PLC), 6LoWPAN, IEEE 802.15.4, etc.
• These communication protocols provide connectivity
between M2M nodes within an M2M area network.
• The communication network provides connectivity to
remote M2M area networks.
• The communication network can use either wired or
wireless networks (IP-based).
• While the M2M area networks use either proprietary or non-IP
based communication protocols, the communication network uses
IP-based networks.
• Since non-IP based protocols are used within M2M area networks,
the M2M nodes within one network cannot communicate with
nodes in an external network.
• To enable the communication between remote M2M area
networks, M2M gateways are used.
• Figure 3.2 shows a block diagram of an M2M gateway.
• The communication the M2M nodes and the M2M gateway is
based on the communication protocols which are native to the
M2M area network.
• M2M gateway performs protocol translation to enable IP-
connectivity for M2M area networks.
Figure 3.2 a block diagram of an M2M gateway
• M2M gateway acts as a proxy performing translations from/to
native protocols to/from Internet Protocol (IP).
• Within an M2M gateway, each node in an M2M area network
appears as a virtualized node for external M2M area networks.
• The M2M data is gathered into point solutions such as enterprise
applications, service management applications, or remote
monitoring applications.
• M2M has various application domains such as smart metering,
home automation, industrial automation, smart grid etc.
• M2M solution designs (such as data collection and storage
architectures and applications) are specific to the M2M
application domain.
3.3 Difference between loT and M2M
Though both M2M and IoT involve networking of machines or
devices, they differ in the underlying technologies, systems
architectures and types of applications.
The differences between M2M and IoT are described as follows:
Communication Protocols:
M2M and loT can differ in how the communication between the
machines or devices happens.
M2M uses either propriety or non-IP based communication
protocols for communication within the M2M area networks.
Commonly uses M2M protocols include ZigBee, Bluetooh,
ModBus, M-Bus, Power Line Communication (PLC), 6LoWPAN,
IEEE 802.15A, Z-Wave, etc.
The focus of communication in M2M is usually on the protocol
below the network layer.
The focus of communication in loT is usually on the protocol
above the network layer such as HTTP, CoAP, Websockets,
MQTT, XMPP, DDS, AMQP etc., as shown in Figure 3.3.
Figure 3.3: Communication in IoT is IP-based whereas M2M uses
non-IP based networks.
Communication within M2M area networks is based on protocols
below the network layer whereas IoT is based on protocols above
the network layer.
Machines in M2M vs Things in loT:
• The "Things" in loT refers to physical objects that have unique
identifiers and can sense and communicate with their external
environment (and user applications) or their internal physical
states.
• The unique identifiers for the things in loT are the IP addresses (or
MAC addresses).
• Things have software components for accessing, processing, and
storing sensor information, or controlling actuators connected.
• IoT systems can have heterogeneous things (eg, a home
automation loT system can include IoT devices of various types,
such as fire alarms, door alarms, lighting control devices, etc.)
• M2M systems, in contrast to loT, typically have homogeneous
machine types within an M2M area network.
Hardware vs Software Emphasis:
• While the emphasis of M2M is more on hardware with
embedded modules, the emphasis of IoT is more on
software.
• loT devices run specialized software for sensor data
collection, data analysis and interfacing with the cloud
through IP-based communication.
• Figure 3.4 shows the various components of loT
systems including the things, the Internet,
communication infrastructure and the applications.
Data Collection & Analysis:
M2M data is collected in point solutions and often in on-
premises storage infrastructure.
In contrast to M2M, the data in loT is collected in the
cloud (can be public, private or hybrid cloud).
• Figure 3.5 shows the various IoT-levels, and the loT components
deployed in the cloud.
• The analytics component analyzes the data and stores the
results in the cloud database.
• The IoT data and analysis results are visualized with the cloud-
based applications.
• The centralized controller is aware of the status of all the end
nodes and sends control commands to the nodes.
• Observer nodes can process information and use it for various
applications; however observer nodes do not perform any
control functions.
IoT Design Methodology
Introduction
Designing IoT systems can be a complex and challenging
task as these systems involve interactions between
various components such as IoT devices and network
resources, web services, analytics components,
application and database servers.

IoT system designers often tend to design IoT


systems keeping specific products/services in mind.

So that designs are tied to specific product/service


choices made. But it make updating the system design to
add new features or replacing a particular
product/service choice for a component becomes very
complex, and in many cases may require complete re-
design of the system.
Introduction
Here we discuss a generic design methodology
for IoT system design which is independent of
specific product, service or programming
language.

IoT systems designed with the proposed


methodology have reduced design, testing and
maintenance time, better interoperability and
reduced complexity.'
IoT DesignMethodology
It includes:
Purpose & Requirements Specification
Process Specification
Domain Model Specification
Information Model Specification
Service Specification
IoT Level Specifications
Functional view Specification
Operational View Specification
Device & component Integration
Application Development
Purpose & RequirementsSpecification

The first step in IoT system design methodology is


to define the purpose and requirements of the
system. In this step, the system purpose, behavior
and requirements are captured.
Purpose & RequirementsSpecification

Purpose : A home automation


system that allows controlling of
the lights in a home remotely
using a web application.
Behavior : The home automation
system should have auto and
manual modes. In auto mode,
the system measures the light
level in the room and switches on
the light when it gets dark. In
manual mode, the system
provides the option of manually
and remotely switching on/off the
light.
System Management
Requirement : The system
should provide remote
monitoring and control functions.
IoT DesignMethodology
It includes:
 Purpose & Requirements Specification
 Process Specification
 Domain Model Specification
 Information Model Specification
 Service Specification
 IoT Level Specifications
 Functional view Specification
 Operational View Specification
 Device & component Integration
 Application Development
2 Process Specification
• Purpose : A home automation system that allows controlling
of the lights in a home remotely using a web application.
• Behavior : The home automation system should have auto and
manual modes. In auto mode, the system measures the light
level in the room and switches on the light when it gets dark. In
manual mode, the system provides the option of manually and
remotely switching on/off the light.
• System Management Requirement : The system should
provide remote monitoring and control functions.
• Data Analysis Requirement : The system should perform local
analysis of the data.
• Application Deployment Requirement : The application should
be deployed locally on the device, but should be accessible
remotely
• Security Requirement : The system should have basic user
authentication capability.
Process Specification(secondstep)

In this step, the use cases of


the IoT system are formally
described based on and
derived from the purpose and
requirement specifications.
3 Domain Model Specification
• The third step in the IoT design methodology is
to define the Domain Model.
• The domain model describes the main
concepts, entities and objects in the domain of
IoT system to be designed. Domain model
defines the attributes of the objects and
relationships between objects.
• Domain model provides an abstract
representation of the concepts, objects and
entities in the IoT domain, independent of any
specific technology or platform.
Domain Model Specification
The entities, objects and concepts defined in the
domain model include:
Physical Entity : Physical Entity is a discrete and identifiable
entity in the physical environment (e.g. a room, a light, an
appliance, a car, etc.).

Virtual Entity : Virtual Entity is a representation of the Physical


Entity in the digital world.

Device :provides a medium for interactions between


Physical Entities and Virtual Entities. Devices are either
attached to Physical Entities or placed near Physical
Entities.
Domain Model Specification
Resource : Resources are software components which can
be either "on-device" or "network-resources". On-device
resources are hosted on the device and include software
components that either provide information on or enable
actuation upon the Physical Entity to which the device is
attached.

Service : Services provide an interface for interacting with the


Physical Entity. Services access the resources hosted on the
device or the network resources to obtain information about the
Physical Entity or perform actuation upon the Physical Entity.
Domain Model Specification
IoT DesignMethodology
It includes:
 Purpose & Requirements Specification
 Process Specification
 Domain Model Specification
 Information Model Specification
 Service Specification
 IoT Level Specifications
 Functional view Specification
 Operational View Specification
 Device & component Integration
 Application Development
4 Information ModelSpecification
• The fourth step in the IoT design methodology
is to define the Information Model.
• Information Model defines the structure of all the
information in the IoT system, for example, attributes of
Virtual Entities, relations, etc.
• Information model does not describe the
specifics of how the information is represented
or stored.
•To define the information model, we first list the
Virtual Entities defined in the Domain Model.
• Information model adds more details to the Virtual
Entities by defining their attributes and relations
Information ModelSpecification
5 ServiceSpecification

• The fifth step in the IoT design methodology is


to define the service specifications. Service
specifications define the services in the IoT
system, service types, service inputs/output,
service endpoints, service schedules, service
preconditions and service effects.
Service Specification
From the process
specification and
information model,
we identify the states
and attributes.
For each state and
attribute we define a
service.
These services either
change the state or
attribute values or
retrieve the current
values.
6 IoT Level Specifications

The sixth step in the


IoT design
methodology is to
define the IoT level
for the system.
IoT Design Methodology

 Functional view Specification


 Operational View Specification
IoT DesignMethodology
It includes:
 Purpose & Requirements Specification
 Process Specification
 Domain Model Specification
 Information Model Specification
 Service Specification
 IoT Level Specifications
 Functional view Specification
 Operational View Specification
 Device & component Integration
 Application Development
7 FunctionalviewSpecification(seventhstep )

• The Functional View (FV) defines the functions


of the IoT systems grouped into various Functional
Groups (FGs).

• Each Functional Group either provides


functionalities for interacting with instances of
concepts defined in the Domain Model or provides
information related to these concepts.
Functional viewSpecification
• The Functional Groups (FG) included in a Functional View
include:
 Device : The device FG contains devices for monitoring
and control. In the home automation example. the device
FG includes a single board mini-computer, a light sensor
and relay switch(actuator).
 Communication : The communication FG handles the
communication for the IoT system. The communication
FG includes the communication protocols that form the
backbone of IoT systems and enable network
connectivity.
The communication FG also includes the communication
APis (such as REST and WebSocket) that are used by the
services and applications to exchange data over the
network.
Functional viewSpecification
• Services : The service FG includes various services
involved in the IoT system such as services for device
monitoring , device control services, data publishing
services and services for device discovery.
• Management : The management FG includes all
functionalities that are needed to configure and manage
the loT system .
• Security : The security FG includes security
mechanisms for the loT system such as
authentication, authorization, data security, etc.
• Application : The application FG includes applications that
provide an interface to the users to control and monitor
various aspects of the IoT system. Applications also allow
users to view the system status and the processed data.
Functional view Specification
8 Operational ViewSpecification
• In this step, various options pertaining to the loT system
deployment and operation are defined, such as, service hosting
options, storage options, device options, application hosting
options, etc.
• Operational View specifications for the home automation example
are as follows:
• Devices: Computing device (Raspberry Pi), light dependent resistor
(sensor), relay
• switch (actuator).
• Communication APls: REST APis
• Communication Protocol s: Link Layer - 802.11, Network Layer -
1Pv4/1Pv6,
• Transport TCP, Application - HTTP.
Operational ViewSpecification
• Operational View specifications for the home
automation example are as follows:
• Services:
 Controller Service - Hosted on device, implemented in
Python and run as a native service.
• Mode service - REST-fol web service, hosted on device,
implemented
with Django-REST Framework.
• State service - REST-ful web service, hosted on device,
implemented with Django-REST Framework.
• Application:
• Web Application - Django Web Application, Application
Server - Django App Server, Database Server - MySQL.
Operational ViewSpecification
• Operational View specifications for the home automation
example are as follows:
• Security:
• Authentication: Web App, Database Authorization:
Web App, Database
• Management:
• Application Management - Django App Management
Database Management - MySQL DB Management,
Device Management - Raspberry Pi device
Management.
Operational ViewSpecification
Operational ViewSpecification
IoT Platforms DesignMethodology
It includes:
 Purpose & Requirements Specification
 Process Specification
 Domain Model Specification
 Information Model Specification
 Service Specification
 IoT Level Specifications
 Functional view Specification
 Operational View Specification
 Device & component Integration
 Application Development
Device & component Integration

The devices and components used in this example are Raspberry


Pi mini computer, LDR sensor and relay switch actuator.
Application Development
 The application has controls for the mode (auto on or
auto off) and the light (on or off).
 In the auto mode, the IoT system controls the light
appliance automatically based on the lighting
conditions in the room.
 When auto mode is enabled the light control in the
application is disabled and it reflects the current state
of the light.
 When the auto mode is disabled, the light control is
enabled and it is used for manually controlling the light.
Application Development
Case Study Weather MonitoringSystem
The purpose of the weather monitoring
system is to collect data on
environmental conditions such as
temperature, pressure, humidity and
light in an area using multiple end nodes.

The end nodes send the data to the cloud


where the data is aggregated and
analyzed.
Case Study Weather MonitoringSystem
• Figure shows the process
specification for the
weather monitoring
system.
• The process specification
shows that the sensors
are read after fixed
intervals and the sensor
measurements are stored.
Case Study Weather MonitoringSystem
• In this domain model the physical entity is the
environment which is being monitored .
•There is a virtual entity for the environment. Devices
include temperature sensor, pressure sensor, humidity
sensor, light sensor and single-board mini computer.
•Resources are software components which can be
either on-device or network-resources.
• Services include the controller service that monitors the
temperature , pressure deriving the services from the
process specification and information model for the
weather monitoring system, humidity and light and sends
the readings to the deriving the services from the process
specification and information model for the weather
monitoring system.
Case Study Weather MonitoringSystem(domain model )
Case Study Weather MonitoringSystem(controller service )

• The controller service


runs as a native service
on the device and
monitors temperature,
pressure, humidity and
light once every 15
seconds.
• The controller service
calls the REST service
to store these
measurements in the
cloud.
Case Study Weather MonitoringSystem
(deployment design for the system)

• The system consists of


multiple nodes placed in
different locations for
monitoring temperature,
humidity and pressure in an
area.
• The end nodes are equipped
with various sensors .
• The end nodes send the data
to the cloud and the data is
stored in a cloud database.
• The analysis of data is done
in the cloud to aggregate the
data and make predictions
Case Study Weather MonitoringSystem

Mapping deployment level to functional groups for the weather


monitoring system.
Case Study Weather MonitoringSystem

Mapping functional Groups to operational view specifications for


the weather monitoring system.
Case Study Weather MonitoringSystem(controller service )

• The schematic diagram


of the weather
monitoring system.
• The devices and
components used in this
example are Raspberry Pi
mini computer,
temperature sensor,
humidity sensor, pressure
sensor and LDR sensor.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy