0% found this document useful (0 votes)
32 views51 pages

IoT Unit-1 Notes

notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views51 pages

IoT Unit-1 Notes

notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 51

Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

IoT definition –
The Internet of Things (IoT) refers to a system of interrelated, internet-connected objects that
are able to collect and transfer data over a wireless network without human intervention.

The personal or business possibilities are endless. A ‘thing’ can refer to a connected medical
device, a biochip transponder (think livestock), a solar panel, a connected automobile with
sensors that alert the driver to a myriad of possible issues (fuel, tire pressure, needed
maintenance, and more) or any object, outfitted with sensors, that has the ability to gather and
transfer data over a network.

Today, businesses are motivated by IoT and the prospects of increasing revenue, reducing
operating costs, and improving efficiencies. Businesses also are driven by a need for
regulatory compliance. Regardless of the reasons, IoT device deployments provide the data
and insights necessary to streamline workflows, visualize usage patterns, automate processes,
meet compliance requirements, and compete more effectively in a changing business
environment.

The internet of things, or IoT, is a system of interrelated computing devices, mechanical and
digital machines, objects, animals or people that are provided with unique identifiers (UIDs)
and the ability to transfer data over a network without requiring human-to-human or human-
to-computer interaction.

A thing in the internet of things can be a person with a heart monitor implant, a farm animal
with a biochip transponder, an automobile that has built-in sensors to alert the driver when
tire pressure is low or any other natural or man-made object that can be assigned an Internet
Protocol (IP) address and is able to transfer data over a network.

Increasingly, organizations in a variety of industries are using IoT to operate more efficiently,
better understand customers to deliver enhanced customer service, improve decision-making
and increase the value of the business.

How IoT works

An IoT ecosystem consists of web-enabled smart devices that use embedded systems, such as
processors, sensors and communication hardware, to collect, send and act on data they

1
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

acquire from their environments. IoT devices share the sensor data they collect by connecting
to an IoT gateway or other edge device where data is either sent to the cloud to be analyzed
or analyzed locally. Sometimes, these devices communicate with other related devices and
act on the information they get from one another. The devices do most of the work without
human intervention, although people can interact with the devices -- for instance, to set them
up, give them instructions or access the data.

The connectivity, networking and communication protocols used with these web-enabled
devices largely depend on the specific IoT applications deployed.

IoT can also make use of artificial intelligence (AI) and machine learning to aid in making
data collecting processes easier and more dynamic.

2
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

Why IoT is important

The internet of things helps people live and work smarter, as well as gain complete control
over their lives. In addition to offering smart devices to automate homes, IoT is essential to
business. IoT provides businesses with a real-time look into how their systems really work,
delivering insights into everything from the performance of machines to supply chain and
logistics operations.

IoT enables companies to automate processes and reduce labor costs. It also cuts down on
waste and improves service delivery, making it less expensive to manufacture and deliver
goods, as well as offering transparency into customer transactions.

As such, IoT is one of the most important technologies of everyday life, and it will continue
to pick up steam as more businesses realize the potential of connected devices to keep them
competitive.

IoT benefits to organizations

The internet of things offers several benefits to organizations. Some benefits are industry-
specific, and some are applicable across multiple industries. Some of the common benefits of
IoT enable businesses to:

 monitor their overall business processes;

 improve the customer experience (CX);

 save time and money;

 enhance employee productivity;

 integrate and adapt business models;

 make better business decisions; and

 generate more revenue.

IoT encourages companies to rethink the ways they approach their businesses and gives them
the tools to improve their business strategies.

3
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

Generally, IoT is most abundant in manufacturing, transportation and utility organizations,


making use of sensors and other IoT devices; however, it has also found use cases for
organizations within the agriculture, infrastructure and home automation industries, leading
some organizations toward digital transformation.

IoT can benefit farmers in agriculture by making their job easier. Sensors can collect data on
rainfall, humidity, temperature and soil content, as well as other factors, that would help
automate farming techniques.

The ability to monitor operations surrounding infrastructure is also a factor that IoT can help
with. Sensors, for example, could be used to monitor events or changes within structural
buildings, bridges and other infrastructure. This brings benefits with it, such as cost saving,
saved time, quality-of-life workflow changes and paperless workflow.

A home automation business can utilize IoT to monitor and manipulate mechanical and
electrical systems in a building. On a broader scale, smart cities can help citizens reduce
waste and energy consumption.

IoT touches every industry, including businesses within healthcare, finance, retail and
manufacturing.

Pros and cons of IoT

Some of the advantages of IoT include the following:

 ability to access information from anywhere at any time on any device;

 improved communication between connected electronic devices;

 transferring data packets over a connected network saving time and money; and

 automating tasks helping to improve the quality of a business's services and reducing the
need for human intervention.

Some disadvantages of IoT include the following:

4
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

 As the number of connected devices increases and more information is shared between
devices, the potential that a hacker could steal confidential information also increases.

 Enterprises may eventually have to deal with massive numbers -- maybe even millions --
of IoT devices, and collecting and managing the data from all those devices will be
challenging.

 If there's a bug in the system, it's likely that every connected device will become
corrupted.

 Since there's no international standard of compatibility for IoT, it's difficult for devices
from different manufacturers to communicate with each other.

 IOT Characteristics/Features

Overview of IoT Features

Internet of Things (IoT) is a technology of connected smart devices that has incremental use
cases across industries. With the increasing use across various industries, it is becoming a
necessity to define a common standard of IoT ecosystems. As a design standard, any IoT

5
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

device comes with some common set of features like connectivity, analytics, endpoint
management, etc. Let’s discuss the high-level feature maps of IoT devices.

Features of Internet of Things (IoT)


Any IoT device comes up with the following features:

1. Connectivity
In the case of IoT, the most important feature one can consider is connectivity. Without

seamless communication among the interrelated components of the IoT ecosystems (i.e

sensors, compute engines, data hubs, etc.) it is not possible to execute any proper business

use case. IoT devices can be connected over Radio waves, Bluetooth, Wi-Fi, Li-Fi, etc. We

can leverage various protocols of internet connectivity layers in order to maximize efficiency

and establish generic connectivity across IoT ecosystems and Industry. There may be special

cases where the IoT ecosystem is built on-premises or in an intranet.

2. Sensing
We humans can naturally understand and analyze our circumstances easily based on our past

experiences with various things or situations. In the case of IoT in order to get the best of it,

we need to read the analog signal, convert it in such a way that we can derive meaningful

insights out of it. We use Electrochemical, gyroscope, pressure, light sensors, GPS,

Electrochemical, pressure, RFID, etc. to gather data based on a particular problem. For

example for automotive use cases, we use Light detection sensors along with pressure,

velocity and imagery sensors. To make a use case successful we need to choose the proper

sensing paradigm.

3. Active Engagements
IoT device connects various products, cross-platform technologies and services work together

by establishing an active engagement between them. In general, we use cloud computing in

6
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

blockchain to establish active engagements among IoT components. In the case of Industry

grade, IoT solutions raw analog data need to be acquired, preprocessed and rescale as per

business capacity. As per Google, only 50% of structured and 1% of unstructured data is used

to make important business decisions. So while designing the IoT ecosystems carriers need to

consider the future needs of manipulating such a huge scale of data to satisfy incremental

business needs. One can confuse the need of active engagements with scale, practically it

means your systems should be able to handle huge data across various technologies,

platforms, products, and industries.

4. Scale
IoT devices should be designed in such a way that they can be scaled up or down easily on

demand. In general, IoT is being used from smart home automation to automating large

factories and work stations, so the use cases vary in scale. A carrier should design their IoT

infrastructure depending upon their current and future engagement scale.

5. Dynamic Nature

For any IoT use case, the first and foremost step is to collecting and converting data in such a
way that means business decisions can be made out of it. In this whole process,
various components of IoT need to change their state dynamically. For example, the input of
a temperature sensor will vary continuously based on weather conditions, locations, etc. IoT
devices should be designed this keeping in mind.

6. Intelligence

In almost every IoT use cases in today’s world, the data is used to make important business
insights and drive important business decisions. We develop machine learning/ deep learning
models on top of this massive data to obtain valuable insights. The analog signals are pre-
processed and converted to a format on which machine-learning models are trained. We need
to keep in mind the proper data infrastructure based on business needs.

7
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

7. Energy

From end components to connectivity and analytics layers, the whole ecosystems demand a
lot of energy. While designing an IoT ecosystem, we need to consider design methodology
such that energy consumption is minimal.

8. Safety

One of the main features of the IoT ecosystem is security. In the whole flow of an IoT
ecosystem, sensitive information is passed from endpoints to the analytics layer via
connectivity components. While designing an IoT system we need to adhere to proper safety,
security measures, and firewalls to keep the data away from misuse and manipulations.
Compromising any component of an IoT ecosystem can eventually lead to failure of the
whole pipeline.

9. Integration

IoT integrates various cross-domain models to enrich user experience. It also ensures proper
trade-off between infrastructure and operational costs.

8
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

 IoT conceptual and architectural framework

9
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

IoT Architectural Framework

10
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

 Components of IoT ecosystems

There are two major components to the Internet of Things. The first is an object or a “thing”
which you intend to make smart by providing connectivity. The other is the embedded system
which provides this connectivity. While this may sound simple, the latter part actually
involves a complex system which may consist of multiple sensors, actuators, protocols, data
management layer and more. The interconnectivity of all these is responsible to make objects
programmable, intelligent and capable of interacting with one another as well as humans.

Let’s take the example of a connected doorbell. To be able to detect that someone is at the
door, even if the bell is not rung and to display this data in the form of video or voice to a
user, involves multiple components. The detection needs to take place and the information
needs to be sent, deciphered and communicated to the end-user. Moreover, opening the lock
remotely also involves further involvement of the IoT ecosystem.

The IoT ecosystem is rapidly expanding and this makes it difficult to define. Every
component that is involved in connecting businesses and users to their devices forms a part of

11
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

this ecosystem. These can be visible components such as the user interface or the hardware,
or also the software and processing components such as the network and storage.

Components of an IoT Ecosystem

Here are the main components based on which an internet of things ecosystem works on.

1. Sensing and embedding components

This is the first tier of an IoT ecosystem and it forms the backbone of the entire Internet of
Things network. Data is indispensable for IoT and sensors are an important factor to ensure
the accuracy and credibility of data. This essential layer consists of physical, micro
appliances, embedded in an IoT device, which are responsible for collecting data or
controlling a mechanism.

Sensors

Sensors work to gather minute data from the surrounding environment. They are sometimes
also known as ‘detectors’ as the primary function of sensors is to detect even the slightest
changes in the surrounding environment. This allows an IoT device to capture relevant data
for real-time or post-processing.

Depending on the type of sensor, this small piece of hardware can measure absolutely
anything. This can be smoke, motion or even blood pressure. While advanced sensors can
measure a range of complexities, some IoT devices have multiple sensors bundled to be able
to collect a range of data or perform multiple functions. Our smartphones for example have
GPS, fingerprint, camera, tilt, motion and numerous other sensors, all bundled in one.

Smart ACs or thermostats are able to sense room temperature and humidity levels at the
same time. Depending on the device and use-case, different applications require different
types of sensors.

12
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

Sensors are integral to achieve automation based on certain triggers. Considering the example
of smart ACs, a person utilizing an automated mode function may set room temperature
preferences between 73 and 77 degrees Fahrenheit. As soon as a room temperature higher
than 77 degrees is detected the device will transmit a command to the air conditioning unit to
operate at specified settings. As soon as a room is cooler than 73 degrees the change in
temperature will be detected and a signal will be transmitted to the AC to turn off.

In the image below, an IoT-enabled smart AC controller is used to make a conventional air
conditioner smart. It consists of a sensor which detects room temperature conditions along
with a transmitter to send signals and receive a response. The entire IOT ecosystem is in play
to guide automated actions.

Thanks to advancements in technology, today’s sensors are minute, smart and cheap! The
selection of sensors depends on the purpose you wish to achieve. You may want the sensor to
be able to detect motion, temperature, pressure, smoke or any other such trigger. The choice
of sensors also depends on their accuracy, reliability of results, the range at which they
should work, resolution and level of intelligence which in other words means their ability to
deal with noise and interference.

13
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

Actuators

Actuators work opposite to that of sensors. While sensors, sense; actuators act. They receive
a signal or a command and on its basis they cause an action. They are as crucial as sensors as
once the sensors have detected a change in the environment, an actuator is required to make
something happen based on the trigger.

As an example, actuators may control the heating and cooling in a smart air conditioner or the
valve in a smart tap. As soon as sensors detect that a person has exited an area, the actuator
will be triggered to stop the flow of air conditioning or the flow of water in the case of a tap.

There are multiple types of actuators depending on the vertical and usage. They may be
required to turn something on or off but they can also control valves and perform actions such
as turning or gripping which has great beneficial value in industrial applications.

2. Connectivity

IoT is a network involving devices, sensors, cloud and actuators and all these needs to
interconnect with one another to be able to decipher data and consequently perform an action.
Connectivity forms the second piece of the puzzle in the complex world of the IoT
ecosystem.

Protocols

Once the data has been collected by the sensors, it requires a medium for transport. In other
words, a communication channel is necessary between sensors and the cloud. IoT protocols
are responsible for transferring data in the online world and this transmission can only be
possible if two devices are safely connected. IoT standards and protocols involve an invisible
language allowing physical objects to communicate with one another.

The choice of network depends on factors such as power consumption, speed of data transfer,
range, bandwidth and overall efficiency. Some of the most popular IoT wireless protocols

14
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

and standards include Bluetooth, Wi-Fi, ZigBee, LoRaWAN, DDS, MQTT, cellular, etc.
These and other channels make it easy as well as secure to transfer and exchange data to the
next IoT layer for processing.

IoT gateways

Incoming, raw data from the sensors must pass through gateways to reach the cloud.
Gateways translate network protocols ensuring seamless communication of all devices within
the network. Essentially this makes the gateways a crucial communication point and is
responsible for easy management of data traffic.

Moreover, gateways offer security by protecting the system from unauthorized access and
malicious attacks. It can also be considered as a security layer as the data flowing through it
protected by the latest encryption practices.

Gateways can also preprocess data from the sensors before sending it to the cloud. In other
words they minimize the large volumes of data ‘sensed’ in the previous stage. Not all, but
some intelligent IoT gateways have the ability to also analyze and average data to transfer
only the relevant data to the cloud.

3. IoT cloud

Once the data has been collected and it has traveled to the cloud, it needs to be processed.
The cloud is where the “smart stuff” takes place! This high-performance facility majorly ties
the components to the IoT ecosystem together. It handles the data, stores it and makes
decisions to make or break a deal. All of this is performed for colossal amounts of data in just
under milliseconds – the time is critical for IoT, as especially in critical concerns such as
health and safety, latency cannot be compromised.

While the main purpose of IoT solutions is to provide and act on real-time information, there
needs to be a component that is able to handle enormous amounts of data to cater to the time-
sensitive nature of the IoT model. This is where cloud systems come into play. They form the
15
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

brain of the IoT ecosystem as they are typically responsible for processing, commanding or
taking analytics into account for the collected data. Devices, protocols, gateway and storage
are combined for efficient real-time data analysis.

With their immense computing power, storage capabilities, networking options, analytics and
other service components, clouds make information effectively available for the consumers.

While the cloud is not necessary for IoT, since local processing with Edge or Fog computing
is an option too, the cloud may be preferred being a high-performance facility that offers
massive scalability and decreased operational costs. Edge computing on the other hand is
preferred when large amounts of data processing and storage are required on-premises.

4. IoT analytics and data management

Data may be a small word but it holds immense power that can pose a huge effect on any
business. IoT Analytics is used to make sense of the vast amounts of analog data. This for
example can include the determination of key performance indicators in a certain application
where one may be interested in viewing errors or irregularities in real-time.

Once identified an immediate action would be required to prevent any undesirable scenarios.
To put it differently, analytics involves converting raw data into useful insights that later are
interpreted or analyzed to drive decision making.

Smart analytics is useful in multiple scenarios. The basic role is to analyze a situation and
formulate a decision based on this. This can be basic such as analyzing if a room’s
temperature falls in an acceptable range, or complex if for example a car is just about to
crash. Data analytics helps determine vital business insights. Deep learning models can be
used for predictive analysis. Various learnings can be derived from the data to predict trends,
plan ahead and make useful business decisions.

16
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

Analytics requires storage power and intelligent computation to be able to make sense of any
data. Tasks such as this can be hosted on the cloud, depending on the IoT architecture.

5. End-user devices and user interface

The user interface is the visible component that is easily accessible and in control of the IoT
user. This is where a user can control the system and set their preferences. The more user-
friendly this component of the IoT ecosystem is, the easier is a user’s interaction.

A user may interact with the system via the device itself, or this interaction can be conducted
remotely via smartphones, tablets, and laptops. Smart home systems such as Amazon Alexa
or Google Home etc. also allow users to communicate with their “things”.

Design is a major consideration in today’s fast-paced world and one IoT device can set itself
apart from a competitor on the basis of a strong design. Touch interfaces, use of colors, font,
voice, and more are some of the factors that come to play here. While an attractive design is
necessary, the interface should be user-friendly enough to avoid any difficulties for the user.

 Physical and logical design of IoT

Physical Design of IoT


Physical Design of IoT refers to IoT Devices and IoT Protocols. Things are Node device
which have unique identities and can perform remote sensing, actuating and monitoring
capabilities. IoT Protocols helps Communication established between things and cloud based
server over the Internet.

Things
Basically Things refers to IoT Devices which have unique identities and can perform remote
sensing, actuating and monitoring capabilities. Things are is main part of IoT Application.
IoT Devices can be various type, Sensing Devices, Smart Watches, Smart Electronics
appliances, Wearable Sensors, Automobiles, and industrial machines. These devices generate

17
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

data in some forms or the other which when processed by data analytics systems leads to
useful information to guide further actions locally or remotely.

For example, Temperature data generated by a Temperature Sensor in Home or other place,
when processed can help in determining temperature and take action according to users.

Above picture, shows a generic block diagram of IoT device. It may consist of several
interfaces for connections to other devices. IoT Device has I/O interface for Sensors,
Similarly for Internet connectivity, Storage and Audio/Video.

IoT Device collect data from on-board or attached Sensors and Sensed data communicated
either to other device or Cloud based sever. Today many cloud servers available for
especially IoT System. These Platfrom known as IoT Platform. Actually these cloud
especially design for IoT purpose. So here we can analysis and processed data easily.

How it works ? For example if relay switch connected to an IoT device can turn On/Off an
appliance on the commands sent to the IoT device over the Internet.

18
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

IoT Protocols
IoT protcols help to establish Communication between IoT Device (Node Device) and Cloud
based Server over the Internet. It help to sent commands to IoT Device and received data
from an IoT device over the Internet. An image is given below. By this image you can
understand which protocols used.

Link Layer
Link layer protocols determine how data is physically sent over the network’s physical layer
or medium (Coxial calbe or other or radio wave). Link Layer determines how the packets are
coded and signaled by the hardware device over the medium to which the host is attached
(eg. coxial cable).

Here we explain some Link Layer Protocols:

19
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

802.3 – Ethernet: Ethernet is a set of technologies and protocols that are used primarily in
LANs. It was first standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the
physical layer and the medium access control (MAC) sub-layer of the data link layer for
wired Ethernet networks. Ethernet is classified into two categories: classic Ethernet and
switched Ethernet.

802.11 – Wi-Fi: IEEE 802.11 is part of the IEEE 802 set of LAN protocols, and specifies the
set of media access control (MAC) and physical layer (PHY) protocols for implementing
wireless local area network (WLAN) Wi-Fi computer communication in various frequencies,
including but not limited to 2.4 GHz, 5 GHz, and 60 GHz frequency bands.

802.16 – Wi-Max : The standard for WiMAX technology is a standard for Wireless
Metropolitan Area Networks (WMANs) that has been developed by working group number
16 of IEEE 802, specializing in point-to-multipoint broadband wireless access. Initially
802.16a was developed and launched, but now it has been further refined. 802.16d or 802.16-
2004 was released as a refined version of the 802.16a standard aimed at fixed applications.
Another version of the standard, 802.16e or 802.16-2005 was also released and aimed at the
roaming and mobile markets.

802.15.4 -LR-WPAN: A collection of standards for Low-rate wireless personal area


network. The IEEE’s 802.15.4 standard defines the MAC and PHY layer used by, but not
limited to, networking specifications such as Zigbee ®, 6LoWPAN, Thread, WiSUN and
MiWi™ protocols. The standards provide low-cost and low-speed communication for power
constrained devices.

2G/3G/4G- Mobile Communication: These are different types of telecommunication


generations. IoT devices are based on these standards can communicate over the celluer
networks.

20
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

Network Layer
Responsible for sending of IP datagrams from the source network to the destination network.
Network layer performs the host addressing and packet routing. We used IPv4 and IPv6 for
Host identification. IPv4 and IPv6 are hierarchical IP addrssing schemes.

IPv4 :
An Internet Protocol address (IP address) is a numerical label assigned to each device
connected to a computer network that uses the Internet Protocol for communication. An IP
address serves two main functions: host or network interface identification and location
addressing.
Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However,
because of the growth of the Internet and the depletion of available IPv4 addresses, a new
version of IP (IPv6), using 128 bits for the IP address, was standardized in 1998. IPv6
deployment has been ongoing since the mid-2000s.

IPv6 : Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol
(IP), the communications protocol that provides an identification and location system for
computers on networks and routes traffic across the Internet. IPv6 was developed by the
Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4
address exhaustion. IPv6 is intended to replace IPv4. In December 1998, IPv6 became a Draft
Standard for the IETF, who subsequently ratified it as an Internet Standard on 14 July 2017.
IPv6 uses a 128-bit address, theoretically allowing 2128, or
approximately 3.4×1038 addresses.

6LoWPAN : 6LoWPAN is an acronym of IPv6 over Low-Power Wireless Personal Area


Networks.6LoWPAN is the name of a concluded working group in the Internet area of the
IETF. 6LoWPAN is a somewhat contorted acronym that combines the latest version of the
Internet Protocol (IPv6) and Low-power Wireless Personal Area Networks (LoWPAN).
6LoWPAN, therefore, allows for the smallest devices with limited processing ability to
transmit information wirelessly using an internet protocol. 6LoWPAN can communicate with
802.15.4 devices as well as other types of devices on an IP network link like WiFi.

21
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

Transport Layer
This layer provides functions such as error control, segmentation, flow control and
congestion control. So this layer protocols provide end-to-end message transfer capability
independent of the underlying network.

TCP : TCP (Transmission Control Protocol) is a standard that defines how to establish and
maintain a network conversation through which application programs can exchange data.
TCP works with the Internet Protocol (IP), which defines how computers
send packets of data to each other. Together, TCP and IP are the basic rules defining the
Internet. The Internet Engineering Task Force (IETF) defines TCP in the Request for
Comment (RFC) standards document number 793.

UDP : User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of
Internet Protocol suite, referred as UDP/IP suite. Unlike TCP, it is unreliable and
connectionless protocol. So, there is no need to establish connection prior to data transfer.

Application Layer
Application layer protocols define how the applications interface with the lower layer
protocols to send over ther network.

HTTP : Hypertext Transfer Protocol (HTTP) is an application-layer protocol for transmitting


hypermedia documents, such as HTML. It was designed for communication between web
browsers and web servers, but it can also be used for other purposes. HTTP follows a
classical client-server model, with a client opening a connection to make a request, then
waiting until it receives a response. HTTP is a stateless protocol, meaning that the server does
not keep any data (state) between two requests. Though often based on a TCP/IP layer, it can
be used on any reliable transport layer, that is, a protocol that doesn’t lose messages silently
like UDP does. RUDP — the reliable update of UDP — is a suitable alternative.

CoAP : CoAP-Constrained Application Protocol is a specialized Internet Application


Protocol for constrained devices, as defined in RFC 7252. It enables devices to communicate
over the Internet. It is defined as Contrained Application Protocol, and is a protocol intended
to be used in very simple hardware. The protocol is especially targeted for constrained

22
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

hardware such as 8-bits microcontrollers, low power sensors and similar devices that can’t
run on HTTP or TLS. It is a simplification of the HTTP protocol running on UDP, that helps
save bandwidth. It is designed for use between devices on the same constrained network (e.g.,
low-power, lossy networks), between devices and general nodes on the Internet, and between
devices on different constrained networks both joined by an internet. CoAP is also being used
via other mechanisms, such as SMS on mobile communication networks.

WebSocket : The WebSocket Protocol enables two-way communication between a client


running untrusted code in a controlled environment to a remote host that has opted-in to
communications from that code. The security model used for this is the origin-based security
model commonly used by web browsers. The protocol consists of an opening handshake
followed by basic message framing, layered over TCP. The goal of this technology is to
provide a mechanism for browser-based applications that need two-way communication with
servers that does not rely on opening multiple HTTP connections (e.g., using
XMLHttpRequest or <iframe>s and long polling).

MQTT :
MQTT is a machine-to-machine (M2M)/”Internet of Things” connectivity protocol. It was
designed as an extremely lightweight publish/subscribe messaging transport and useful for
connections with remote locations where a small code footprint is required and/or network
bandwidth is at a premium. For example, it has been used in sensors communicating to a
broker via satellite link, over occasional dial-up connections with healthcare providers, and in
a range of home automation and small device scenarios.

MQTT protocol runs on top of the TCP/IP networking stack. When clients connect and
publish/subscribe, MQTT has different message types that help with the handshaking of that
process. The MQTT header is two bytes and first byte is constant. In the first byte, you
specify the type of message being sent as well as the QoS level, retain, and DUP (duplication)
flags. The second byte is the remaining length field.

XMPP : Extensible Messaging and Presence Protocol (XMPP) is a communication


protocol for message-oriented middleware based on XML (Extensible Markup Language). It
enables the near-real-time exchange of structured yet extensible data between any two or

23
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

more network entities. Originally named Jabber, the protocol was developed by the
eponymous open-source community in 1999 for near real-time instant messaging (IM),
presence information, and contact list maintenance. Designed to be extensible, the protocol
has been used also for publish-subscribe systems, signalling for VoIP, video, file transfer,
gaming, the Internet of Things (IoT) applications such as the smart grid, and social
networking services.

DDS : The Data Distribution Service (DDS™) is a middleware protocol and API standard for
data-centric connectivity from the Object Management Group® (OMG®). It integrates the
components of a system together, providing low-latency data connectivity, extreme
reliability, and a scalable architecture that business and mission-critical Internet of Things
(IoT) applications need.
In a distributed system, middleware is the software layer that lies between the operating
system and applications. It enables the various components of a system to more easily
communicate and share data. It simplifies the development of distributed systems by letting
software developers focus on the specific purpose of their applications rather than the
mechanics of passing information between applications and systems.

AMQP : The AMQP – IoT protocols consist of a hard and fast of components that route and
save messages within a broker carrier, with a set of policies for wiring the components
together. The AMQP protocol enables patron programs to talk to the dealer and engage with
the AMQP model. AMQP has the following three additives, which might link into processing
chains in the server to create the favored capability.
 Exchange: Receives messages from publisher primarily based programs and routes them to
‘message queues’.
 Message Queue: Stores messages until they may thoroughly process via the eating client
software.
 Binding: States the connection between the message queue and the change.

Logical Design of IoT


In this article we discuss Logical design of Internet of things. Logical design of IoT system
refers to an abstract representation of the entities & processes without going into the low-

24
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

level specifies of the implementation. For understanding Logical Design of IoT, we describes
given below terms.

 IoT Functional Blocks


 IoT Communication Models
 IoT Communication APIs

IoT Functional Blocks


An IoT system comprises of a number of functional blocks that provide the system the
capabilities for identification, sensing, actuation, communication and management.

Functional blocks are:

Device: An IoT system comprises of devices that provide sensing, actuation, monitoring and
control functions.

Communication: Handles the communication for the IoT system.

Services: services for device monitoring, device control service, data publishing services and
services for device discovery.

Management: This block provides various functions to govern the IoT system.

Security: this block secures the IoT system and by providing functions such as
authentication, authorization, message and content integrity, and data security.

Application: This is an interface that the users can use to control and monitor various aspects
of the IoT system. Application also allows users to view the system status and view or
analyze the processed data.

25
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

IoT Communication Models


Request-Response Model
Request-response model is communication model in which the client sends requests to the
server and the server responds to the requests. When the server receives a request, it decides
how to respond, fetches the data, retrieves resource representation, prepares the response, and
then sends the response to the client. Request-response is a stateless communication model
and each request-response pair is independent of others.

HTTP works as a request-response protocol between a client and server. A web browser may
be the client, and an application on a computer that hosts a web site may be the server.

Example: A client (browser) submits an HTTP request to the server; then the server returns a
response to the client. The response contains status information about the request and may
also contain the requested content.

26
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

Publish-Subscribe Model
Publish-Subscribe are a communication model that involves publishers, brokers and
consumers. Publishers are the source of data. Publishers send the data to the topics which are
managed by the broker. Publishers are not aware of the consumers. Consumers subscribe to
the topics which are managed by the broker. When the broker receives data for a topic from
the publisher, it sends the data to all the subscribed consumers.

27
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

Push-Pull Model
Push-Pull is a communication model in which the data producers push the data to queues and
the consumers Pull the data from the Queues. Producers do not need to be aware of the
consumers. Queues help in decoupling the messaging between the Producers and Consumers.
Queues also act as a buffer which helps in situations when there is a mismatch between the
rate at which the producers push data and the rate rate at which the consumer pull data.

Exclusive Pair Model


Exclusive Pair is a bidirectional, fully duplex communication model that uses a persistent
connection between the client and server. Connection is setup it remains open until the client
sends a request to close the connection. Client and server can send messages to each other
after connection setup. Exclusive pair is stateful communication model and the server is
aware of all the open connections.

28
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

IoT Communication APIs

Generally we used Two APIs For IoT Communication. These IoT Communication APIs are:

 REST-based Communication APIs


 WebSocket-based Communication APIs

REST-based Communication APIs


Representational state transfer (REST) is a set of architectural principles by which you can
design Web services the Web APIs that focus on systems’s resources and how resource states
are addressed and transferred. REST APIs that follow the request response communication
model, the rest architectural constraint apply to the components, connector and data
elements, within a distributed hypermedia system. The rest architectural constraint are as
follows:

Client-server – The principle behind the client-server constraint is the separation of


concerns. for example clients should not be concerned with the storage of data which is
concern of the serve. Similarly the server should not be concerned about the user interface,

29
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

which is concern of the clien. Separation allows client and server to be independently
developed and updated.

Stateless – Each request from client to server must contain all the information necessary to
understand the request, and cannot take advantage of any stored context on the server. The
session state is kept entirely on the client.

Cache-able – Cache constraints requires that the data within a response to a request be
implicitly or explicitly leveled as cache-able or non cache-able. If a response is cache-able,
then a client cache is given the right to reuse that repsonse data for later, equivalent requests.
caching can partially or completely eliminate some instructions and improve efficiency and
scalability.

Layered system – layered system constraints, constrains the behaviour of components such
that each component cannot see beyond the immediate layer with they are interacting. For
example, the client cannot tell whether it is connected directly to the end server or two an
intermediary along the way. System scalability can be improved by allowing intermediaries
to respond to requests instead of the end server, without the client having to do anything
different.
Uniform interface – uniform interface constraints requires that the method of
communication between client and server must be uniform. Resources are identified in the
requests (by URIsin web based systems) and are themselves is separate from the
representations of the resources data returned to the client. When a client holds a
representation of resources it has all the information required to update or delete the resource
you (provided the client has required permissions). Each message includes enough
information to describe how to process the message.

Code on demand – Servers can provide executable code or scripts for clients to execute in
their context. this constraint is the only one that is optional. A RESTful web service is a”
Web API” implemented using HTTP and REST principles. REST is most popular IoT
Communication APIs.
HTTP methods

30
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

Uniform
Resource
Identifier
(URI) GET PUT PATCH POST DELET
Create a
new entry in
the
collection.
The new
List the entry’s URI
URIs and Replace t is assigned
perhaps he entire automaticall
Collection,
other collection y and is
such
details of with usually Delete
as https://
api.example the another Not returned by he ent
.com/resour collection’s collection generally the collect
ces/ members. . used operation. n.
Retrieve a
representat Replace t Not
ion of the he generally
addressed addresse used. Treat
member of d Update th the Delete
the member e addressed he
collection, of the addresse member as a addres
Element,
expressed collection d collection in ed
such
in an , or if it member its own right memb
as https://
api.example appropriate does not of the and create a of the
.com/resour Internet exist, collection new entry collect
ces/item5 media type. create it. . within it. n.

WebSocket based communication API


Websocket APIs allow bi-directional, full duplex communication between clients and servers.
Websocket APIs follow the exclusive pair communication model. Unlike request-response
model such as REST, the WebSocket APIs allow full duplex communication and do not
require new coonection to be setup for each message to be sent. Websocket communication
begins with a connection setup request sent by the client to the server. The request (called

31
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

websocket handshake) is sent over HTTP and the server interprets it is an upgrade request. If
the server supports websocket protocol, the server responds to the websocket handshake
response. After the connection setup client and server can send data/mesages to each other in
full duplex mode. Websocket API reduce the network traffic and letency as there is no
overhead for connection setup and termination requests for each message. Websocket suitable
for IoT applications that have low latency or high throughput requirements. So Web socket is
most suitable IoT Communication APIs for IoT System.

32
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

 IoT enablers

 Modern day IoT applications

The Internet of Things, or IoT for its acronym in English ( Internet of Things ), is a term that
refers to the connection of objects to each other and to humans through the Internet.

33
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

The applications of IoT technologies are multiple, because it is adjustable to almost any
technology that is capable of providing relevant information about its own operation, about
the performance of an activity and even about the environmental conditions that we need to
monitor and control at a distance.

Nowadays, many companies from different sectors or sectors are adopting this technology to
simplify, improve, automate and control different processes. Next, we show some of the
surprising practical applications of the IoT.

1. Wearables.

Virtual glasses, fitness bands to monitor for example calorie expenditure and heart beats, or
GPS tracking belts, are just some examples of wearable devices that we have been using for
some time now. Companies such as Google, Apple, Samsung and others have developed and
introduced the Internet of Things and the application thereof into our daily lives.

These are small and energy efficient devices, which are equipped with sensors, with the
necessary hardware for measurements and readings, and with software to collect and organize
data and information about users.

2. Health.

The use of wearables or sensors connected to patients, allows doctors to monitor a patient's
condition outside the hospital and in real-time. Through continuously monitoring certain
metrics and automatic alerts on their vital signs, the Internet of Things helps to improve the
care for patients and the prevention of lethal events in high-risk patients.

Another use is the integration of IoT technology into hospital beds, giving way to smart beds,
equipped with special sensors to observe vital signs, blood pressure, oximeter and body
temperature, among others.

3. Traffic monitoring.

34
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

The Internet of things can be very useful in the management of vehicular traffic in large
cities, contributing to the concept of smart cities.

When we use our mobile phones as sensors, which collect and share data from our vehicles
through applications such as Waze or Google Maps, we are using the Internet of Things to
inform us and at the same time contribute to traffic monitoring, showing the conditions of the
different routes, and feeding and improving the information on the different routes to the
same destination, distance, estimated time of arrival.

4. Fleet management.

The installation of sensors in fleet vehicles helps to establish an effective interconnectivity


between the vehicles and their managers as well as between the vehicles and their drivers.
Both driver and manager/ owner can know all kinds of details about the status, operation and
needs of the vehicle, just by accessing the software in charge of collecting, processing and
organizing the data. Even, receive alarms in real time of maintenance incidents without
having been detected by the driver.
The application of the Internet of Things to fleet management assists with geolocation (and
with it the monitoring of routes and identification of the most efficient routes), performance
analysis, telemetry control and fuel savings , the reduction of polluting emissions to the
environment and can even provide valuable information to improve the driving of vehicles.

5. Agriculture.

Smart farms are a fact. The quality of soil is crucial to produce good crops, and the Internet of
Things offers farmers the possibility to access detailed knowledge and valuable information
of their soil condition.

Through the implementation of IoT sensors, a significant amount of data can be obtained on
the state and stages of the soil. Information such as soil moisture, level of acidity, the
presence of certain nutrients, temperature and many other chemical characteristics, helps
farmers control irrigation, make water use more efficient, specify the best times to start
sowing, and even discover the presence of diseases in plants and soil.

35
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

6. Hospitality.

The application of the IoT to the hotel industry brings with it interesting improvements in the
quality of the service. With the implementation of electronic keys, which are sent directly to
the mobile devices of each guest, it is possible to automate various interactions.

Thus, the location of the guests, the sending of offers or information on activities of interest,
the realization of orders to the room or room service , the automatic charge of accounts to the
room or the request of personal hygiene supplies, are activities that can be easily managed
through integrated applications using the Internet of Things technology.

With the use of electronic keys, the check-out process is automated, disabling the operation of
doors, offering information about the rooms immediately available, and even assigning
housekeeping tasks to maintenance personnel.

7. Smart grid and energy saving.

The progressive use of intelligent energy meters, or meters equipped with sensors, and the
installation of sensors in different strategic points that go from the production plants to the
different distribution points, allows better monitoring and control of the electrical network.

By establishing a bidirectional communication between the service provider company and the
end user, information of enormous value can be obtained for the detection of faults, decision
making and repair thereof.

It also allows offering valuable information to the end user about their consumption patterns
and about the best ways to reduce or adjust their energy expenditure.

8. Water supply.

A sensor, either incorporated or adjusted externally to water meters, connected to the Internet
and accompanied by the necessary software , helps to collect, process and analyze data,

36
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

which allows understanding the behavior of consumers, detecting faults in the supply service,
report results and offer courses of action to the company that provides the service.

Likewise, it offers final consumers the possibility of tracking their own consumption
information, through a web page and in real time, even receiving automatic alerts in case of
detecting consumption out of range to their average consumption record, which could
indicate the presence of a leak.

9. Maintenance management.

One of the areas where the application of IoT technology is most extensive is precisely
maintenance management. Through the combination of sensors and software specialized
in CMMS/ EAM maintenance management, a multifunctional tool is obtained whose use can
be applied to a multiplicity of disciplines and practices, with the purpose of extending the
useful life of physical assets, while guaranteeing asset reliability and availability.

 M2M communications

37
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

Machine to Machine communications, often termed M2M/IoT is going to be the next


generation of Internet revolution connecting more and more devices on Internet. M2M
communications refer to automated applications which involve machines or devices
communicating through a network without human intervention. Sensors and communication
modules are embedded within M2M devices, enabling data to be transmitted from one device
to another device through wired and wireless communications networks.
M2M is expected to revolutionize the performance of various sectors, businesses and
services, by providing automation and intelligence to the end devices, in a way that was never
imagined before. It may be applied to robots and conveyor belts on the factory floor, to
tractors and irrigation on the farm, from heavy equipment to hand drills, from jet engines to
bus fleets; from home appliances to health monitoring; from Smart Grid to Smart Water;
every piece of equipment, everywhere.It can bring substantial tangible social and economic
benefits by giving more efficient and effective services to the citizens.
NT cell deals with all policy and regulatory aspects related to M2M communications. A
National Telecom M2M Roadmap in this regards is already released in May 2015. Post
release of M2M roadmap, NT cell is engaged in formulation of KYC Norms for SIM
embedded M2M Devices, Numbering scheme for M2M, Registration of MSP (M2M Service
Provider) and M2M Pilots. DoT has sought from TRAI its recommendations on Roaming
issues, Spectrum Requirement and Quality of Service (QoS) in M2M communications.

 IoT vs M2M

38
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

 IoT vs WoT

The difference between the Internet of Things (IoT) and the Web of Things (WoT) may show
up as a clear and simple to make qualification. Be that as it may, the differences between the
two ideas are undeniably more confused than one may envision; every moment detail of both
IoT and WoT makes for two tremendously varying subjects, each with their arrangement of
thoughts, structures, and employments.

Despite their differences, IoT and WoT work as one and will depend on one another to run
easily and the most proficiently.

39
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

WHAT IS IOT AND ITS MEANING

IoT is the shortened form for the ‘Internet of Things’. You may have known about the
Internet of Things and related terms like Smart things, IoT, Internet of Everything, control
utilizing the internet, etc since there has been a lot of discussion about IoT as of late.

In the blink of an eye, we can say IoT implies Things associated with the internet and acts
astutely that diminish human exertion are known as the Internet of Things

“IoT is the idea of building up an association among various gadgets and speaking with them
over the internet utilizing a portable application or internet browser”, this is a progressively
specialized route for ‘ What is IoT technology?’

Internet of Things is only a technology idea or potential design which is a collection of


effectively accessible innovations.

IOT LIMITATIONS

At the point when you need to incorporate gadgets from different producers into a solitary
application or framework, you face trouble during compelling together correspondence of
every single associated Thing.

It is trying to assemble a solitary correspondence stage that acts consistently with numerous
Things attempting to speak with each other in various manners.

Numerous designers attempted to grow a new foundation of correspondence where all


gadgets can convey viably, be that as it may, this is tedious.

Subsequently, numerous specialists accept we should utilize a stage that as of now exists…
the World Wide Web. This is the place the WoT becomes an integral factor. Which provides
a better structure as we see quite differences between IoT and WoT.

40
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

WEB OF THINGS (WOT)

The web is a previously settled framework that can permit everything to speak with one
another. The Web might be utilized as a sort of use where all Things can impart together most
proficiently.

Benefits And Major Differences Between WoT Over IoT

From the developer’s point of view, the WoT empowers access and authority over IoT assets
and applications utilizing standard web advancements, (for example, HTML 5.0, JavaScript,
Ajax, PHP, Ruby n Rails, and so on) so this difference between IoT and WoT give better
values to the developers.

The way to deal with building WoT is along these lines dependent on RESTful standards and
REST API s, which empower s the two developers and deployers to profit by the fame and
development of web innovations.

In any case, constructing the WoT has different adaptability security and so on challenges
particularly as a feature of a guide towards a worldwide WoT.

While IoT is tied in with making a system of items, things, individuals, framework, and
applications, WoT attempts to coordinate them to Web.

Speaking WoT can be thought of as flavor/Option of an application layer included over the
IoT’s system layer.

Nonetheless, the extent of the Internet of things applications is more extensive and
incorporates frameworks that not available through the web ( for example regular WSN and
RFID framework)

41
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

 IoT reference architecture

The reference architecture consists of a set of components. Layers can be realized by


means of specific technologies, and we will discuss options for realizing each component.
There are also some cross-cutting/vertical layers such as access/identity management.

The layers are

 Client/external communications - Web/Portal, Dashboard, APIs

42
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

 Event processing and analytics (including data storage)


 Aggregation/bus layer – ESB and message broker
 Relevant transports - MQTT/HTTP/XMPP/CoAP/AMQP, etc.
 Devices

The cross-cutting layers are

 Device manager
 Identity and access management

The Device Layer

The bottom layer of the architecture is the device layer. Devices can be of various types, but
in order to be considered as IoT devices, they must have some communications that either
indirectly or directly attaches to the Internet. Examples of direct connections are

 Arduino with Arduino Ethernet connection


 Arduino Yun with a Wi-Fi connection
 Raspberry Pi connected via Ethernet or Wi-Fi
 Intel Galileo connected via Ethernet or Wi-Fi Examples of indirectly connected
device include
 ZigBee devices connected via a ZigBee gateway
 Bluetooth or Bluetooth Low Energy devices connecting via a mobile phone
 Devices communicating via low power radios to a Raspberry Pi

There are many more such examples of each type.

Each device typically needs an identity. The identity may be one of the following:

 A unique identifier (UUID) burnt into the device (typically part of the System-on-
Chip, or provided by a secondary chip)
 A UUID provided by the radio subsystem (e.g. Bluetooth identifier, Wi-Fi MAC
address)

43
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

 An OAuth2 Refresh/Bearer Token (this may be in addition to one of the above)


 An identifier stored in nonvolatile memory such as EEPROM

For the reference architecture we recommend that every device has a UUID (preferably an
unchangeable ID provided by the core hardware) as well as an OAuth2 Refresh and Bearer
token stored in EEPROM.

The specification is based on HTTP; however, (as we will discuss in the communications
section) the reference architecture also supports these flows over MQTT.

The Communications Layer

The communication layer supports the connectivity of the devices. There are multiple
potential protocols for communication between the devices and the cloud. The most
wellknown three potential protocols are

 HTTP/HTTPS (and RESTful approaches on those)


 MQTT 3.1/3.1.1
 Constrained application protocol (CoAP)

Let's take a quick look at each of these protocols in turn.

HTTP is well known, and there are many libraries that support it. Because it is a simple
textbased protocol, many small devices such as 8-bit controllers can only partially support the
protocol – for example enough code to POST or GET a resource. The larger 32-bit based
devices can utilize full HTTP client libraries that properly implement the whole protocol.

There are several protocols optimized for IoT use. The two best known are MQTT6 and
CoAP7. MQTT was invented in 1999 to solve issues in embedded systems and SCADA. It
has been through some iterations and the current version (3.1.1) is undergoing standardization
in the OASIS MQTT Technical Committee8. MQTT is a publish-subscribe messaging system
based on a broker model. The protocol has a very small overhead (as little as 2 bytes per
message), and was designed to support lossy and intermittently connected networks. MQTT

44
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

was designed to flow over TCP. In addition there is an associated specification designed for
ZigBee-style networks called MQTT-SN (Sensor Networks).

CoAP is a protocol from the IETF that is designed to provide a RESTful application protocol
modeled on HTTP semantics, but with a much smaller footprint and a binary rather than a
text-based approach. CoAP is a more traditional client-server approach rather than a brokered
approach. CoAP is designed to be used over UDP.

For the reference architecture we have opted to select MQTT as the preferred device
communication protocol, with HTTP as an alternative option.

The reasons to select MQTT and not CoAP at this stage are

 Better adoption and wider library support for MQTT;


 Simplified bridging into existing event collection and event processing systems; and
 Simpler connectivity over firewalls and NAT networks

However, both protocols have specific strengths (and weaknesses) and so there will be some
situations where CoAP may be preferable and could be swapped in.

In order to support MQTT we need to have an MQTT broker in the architecture as well as
device libraries. We will discuss this with regard to security and scalability later.

One important aspect with IoT devices is not just for the device to send data to the cloud/
server, but also the reverse. This is one of the benefits of the MQTT specification: because it
is a brokered model, clients connect an outbound connection to the broker, whether or not the
device is acting as a publisher or subscriber. This usually avoids firewall problems because
this approach works even behind firewalls or via NAT.

In the case where the main communication is based on HTTP, the traditional approach for
sending data to the device would be to use HTTP Polling. This is very inefficient and costly,
both in terms of network traffic as well as power requirements. The modern replacement for
this is the WebSocket protocol9 that allows an HTTP connection to be upgraded into a full

45
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

two-way connection. This then acts as a socket channel (similar to a pure TCP channel)
between the server and client. Once that has been established, it is up to the system to choose
an ongoing protocol to tunnel over the connection.

For the reference architecture we once again recommend using MQTT as a protocol with
WebSockets. In some cases, MQTT over WebSockets will be the only protocol. This is
because it is even more firewall-friendly than the base MQTT specification as well as
supporting pure browser/JavaScript clients using the same protocol.

Note that while there is some support for WebSockets on small controllers, such as Arduino,
the combination of network code, HTTP and WebSockets would utilize most of the available
code space on a typical Arduino 8-bit device. Therefore, we only recommend the use of
WebSockets on the larger 32-bit devices.

The Aggregation/Bus Layer

An important layer of the architecture is the layer that aggregates and brokers
communications. This is an important layer for three reasons:

1. The ability to support an HTTP server and/or an MQTT broker to talk to the devices;
2. The ability to aggregate and combine communications from different devices and to
route communications to a specific device (possibly via a gateway)
3. The ability to bridge and transform between different protocols, e.g. to offer
HTTPbased APIs that are mediated into an MQTT message going to the device.

The aggregation/bus layer provides these capabilities as well as adapting into legacy
protocols. The bus layer may also provide some simple correlation and mapping from
different correlation models (e.g. mapping a device ID into an owner’s ID or vice-versa).

Finally the aggregation/bus layer needs to perform two key security roles. It must be able to
act as an OAuth2 Resource Server (validating Bearer Tokens and associated resource access
scopes). It must also be able to act as a policy enforcement point (PEP) for policy-based
access. In this model, the bus makes requests to the identity and access management layer to

46
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

validate access requests. The identity and access management layer acts as a policy decision
point (PDP) in this process. The bus layer then implements the results of these calls to the
PDP to either allow or disallow resource access.

The Event Processing and Analytics Layer

This layer takes the events from the bus and provides the ability to process and act upon these
events. A core capability here is the requirement to store the data into a database. This may
happen in three forms. The traditional model here would be to write a serverside application,
e.g. this could be a JAX-RS application backed by a database. However, there are many
approaches where we can support more agile approaches. The first of these is to use a big
data analytics platform. This is a cloud-scalable platform that supports technologies such as
Apache Hadoop to provide highly scalable mapreduce analytics on the data coming from the
devices. The second approach is to support complex event processing to initiate near real-
time activities and actions based on data from the devices and from the rest of the system.

Our recommended approach in this space is to use the following approaches:

 Highly scalable, column-based data storage for storing events


 Map-reduce for long-running batch-oriented processing of data
 Complex event processing for fast in-memory processing and near real-time reaction
and autonomic actions based on the data and activity of devices and other systems
 In addition, this layer may support traditional application processing platforms, such
as Java Beans, JAX-RS logic, message-driven beans, or alternatives, such as node.js,
PHP, Ruby or Python.

Client/External Communications Layer

47
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

The reference architecture needs to provide a way for these devices to communicate outside
of the device-oriented system. This includes three main approaches. Firstly, we need the
ability to create web-based front-ends and portals that interact with devices and with the
event-processing layer. Secondly, we need the ability to create dashboards that offer views
into analytics and event processing. Finally, we need to be able to interact with systems
outside this network using machine-to-machine communications (APIs). These APIs need to
be managed and controlled and this happens in an API management system.

The recommended approach to building the web front end is to utilize a modular front-end
architecture, such as a portal, which allows simple fast composition of useful UIs. Of course
the architecture also supports existing Web server-side technology, such as Java Servlets/
JSP, PHP, Python, Ruby, etc. Our recommended approach is based on the Java framework
and the most popular Java-based web server, Apache Tomcat.

The dashboard is a re-usable system focused on creating graphs and other visualizations of
data coming from the devices and the event processing layer.

The API management layer provides three main functions:

 The first is that it provides a developer-focused portal (as opposed to the userfocused
portal previously mentioned), where developers can find, explore, and subscribe to
APIs from the system. There is also support for publishers to create, version, and
manage the available and published APIs;
 The second is a gateway that manages access to the APIs, performing access control
checks (for external requests) as well as throttling usage based on policies. It also
performs routing and load-balancing;
 The final aspect is that the gateway publishes data into the analytics layer where it is
stored as well as processed to provide insights into how the APIs are used.

Device Management

48
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

Device management (DM) is handled by two components. A server-side system (the device
manager) communicates with devices via various protocols and provides both individual and
bulk control of devices. It also remotely manages software and applications deployed on the
device. It can lock and/or wipe the device if necessary. The device manager works in
conjunction with the device management agents. There are multiple different agents for
different platforms and device types.

The device manager also needs to maintain the list of device identities and map these into
owners. It must also work with the identity and access management layer to manage access
controls over devices (e.g. who else can manage the device apart from the owner, how much
control does the owner have vs. the administrator, etc.)

There are three levels of device: non-managed, semi-managed and fully managed (NM,
SM,FM).

Fully managed devices are those that run a full DM agent. A full DM agent supports:

 Managing the software on the device


 Enabling/disabling features of the device (e.g. camera, hardware, etc.)
 Management of security controls and identifiers
 Monitoring the availability of the device
 Maintaining a record of the device’s location if available
 Locking or wiping the device remotely if the device is compromised, etc.

Non-managed devices can communicate with the rest of the network, but have no agent
involved. These may include 8-bit devices where the constraints are too small to support the
agent. The device manager may still maintain information on the availability and location of
the device if this is available.

Semi-managed devices are those that implement some parts of the DM (e.g. feature control,
but not software management).

Identity and Access Management

49
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

The final layer is the identity and access management layer. This layer needs to provide the
following services:

 OAuth2 token issuing and validation


 Other identity services including SAML2 SSO and OpenID Connect support for
identifying inbound requests from the Web layer
 XACML PDP
 Directory of users (e.g. LDAP)
 Policy management for access control (policy control point)

The identity layer may of course have other requirements specific to the other identity and
access management for a given instantiation of the reference architecture. In this section we
have outlined the major components of the reference architecture as well as specific decisions
we have taken around technologies. These decisions are motivated by the specific
requirements of IoT architectures as well as best practices for building agile, evolvable,
scalable Internet architectures. Of course there are other options, but this reference
architecture utilizes proven approaches that are known to be successful in real-life IoT
projects we have worked on.

 IoT Network configurations

50
Notes: - Internet of Things Unit 1

By :- Prof Sachin Malviya(CSE Dept, SBITM, Betul)

 IoT LAN

51

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy