0% found this document useful (0 votes)
10 views26 pages

Iot Mid1

The document provides a comprehensive overview of the Internet of Things (IoT), defining its architecture, characteristics, applications, and the role of sensors and actuators. It discusses the integration of IoT with enterprise systems, the importance of data management, and the concept of Everything as a Service (XaaS). Additionally, it highlights the benefits of cloud-based services and the evolution of business processes in the IoT landscape.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views26 pages

Iot Mid1

The document provides a comprehensive overview of the Internet of Things (IoT), defining its architecture, characteristics, applications, and the role of sensors and actuators. It discusses the integration of IoT with enterprise systems, the importance of data management, and the concept of Everything as a Service (XaaS). Additionally, it highlights the benefits of cloud-based services and the evolution of business processes in the IoT landscape.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Introduction to IoT

Definition:
IoT (Internet of Things) is a dynamic global network infrastructure with self-configuring capabilities based on
standard and interoperable communication protocols. It connects physical and virtual “things” with unique identities,
physical attributes, and virtual personalities, using intelligent interfaces integrated into information networks to
exchange data.

Characteristics:

1. Dynamic & Self-Adapting: IoT devices adapt to changing contexts and take actions based on operating
conditions and the user’s environment (e.g., adaptive surveillance systems).

2. Self-Configuring: Enables multiple devices to work together seamlessly to provide specific functionalities.

3. Interoperable Communication Protocols: Supports multiple protocols for communication between devices
and infrastructure.

4. Unique Identity: Each device has a unique identifier (like an IP address).

5. Integrated Information Network: Facilitates seamless data exchange between devices and systems.

IoT Architecture

1. Sensor Layer (Link Layer):

 Collects data through physical equipment like RFID tags, GPS, and various sensors.

 Uses low battery power and low data rate connectivity.

 Forms Wireless Sensor Networks (WSN).

 Network connectivity (WAN, PAN) transmits data to the Gateway Layer.

 Devices have limited storage, restricted bandwidth, and small processing speeds.

Protocols:

 802.3 (Ethernet): Wired Ethernet standards.

 802.11 (WiFi): Wireless LAN standards (2.4GHz, 5GHz, 60GHz bands).

 802.16 (WiMax): Wireless broadband (1.5Mb/s to 1Gb/s).

 802.15.4 (LR-WPAN): Low-rate wireless personal area network (40kb/s to 250kb/s).

 2G/3G/4G: Mobile communication (data rates from 9.6kb/s to 100Mb/s).

2. Gateway & Network Layer:

 Routes IP datagrams from source to destination.

 Gateways route data from the sensor layer to the management service layer.

 Requires large storage capacity and trusted performance for public, private, and hybrid networks.

Protocols:

 IPv4: 32-bit address space (2^32 addresses).

 IPv6: 128-bit address space (2^128 addresses).

 6LoWPAN: IPv6 over low-power wireless personal area networks.


3. Data Processing Layer (Transport Layer):

 Provides end-to-end message transfer with or without acknowledgment.

 Manages IoT services like data analysis, device management, and service analytics.

Protocols:

 TCP: Reliable, connection-oriented protocol. Used for web browsers, email, etc.

 UDP: Connectionless, fast, and lightweight protocol for time-sensitive applications.

4. Application Layer:

 Interfaces applications with lower-layer protocols for data transmission.

 Responsible for data utilization in various IoT applications.

Protocols:

 HTTP: Foundation of WWW, follows a request-response model.

 CoAP: For machine-to-machine (M2M) communication in constrained environments.

 WebSocket: Enables full-duplex communication over a single socket connection.

 MQTT: Lightweight messaging protocol for publish-subscribe models.

 XMPP: Real-time communication protocol for streaming XML data.

 DDS: Middleware standard for device-to-device communication.

 AMQP: Business messaging protocol supporting point-to-point and publish-subscribe models.

Design Principles & Needed Capabilities

1. Focus on Value: Prioritize quality and user-centric design.

2. Holistic View: Consider all devices, services, and user interactions.

3. Safety First: Ensure secure data transfer and build user trust.

4. Context Consideration: Design actions with real-world impacts in mind.

5. Strong Branding: Build reliability and trustworthiness through robust performance.

6. Early & Frequent Testing: Align hardware and software lifespans through continuous updates.

7. Responsible Data Use: Identify essential data points and avoid data hoarding.

IoT Applications

1. Smart Homes: Automation systems for lighting, security, and entertainment.

2. Smart Cities: Traffic management, waste management, water distribution, and more.

3. Self-Driven Cars: Enhanced safety and autonomous navigation.

4. IoT Retail Shops: Cashless and automated retail experiences (e.g., Amazon Go).

5. Farming: Precision agriculture, irrigation, and drone-based surveillance.

6. Wearables: Devices for fitness, wellness, and medical monitoring.


7. Smart Grids: Efficient electricity distribution and cost reduction.

8. Industrial IoT: Sensor-driven automation in manufacturing and energy management.

9. Telehealth: Remote medical diagnosis, digital imaging, and video consultations.

10. Smart Supply Chain: Real-time tracking and logistics optimization.

Sensors and Actuators in IoT

Overview:

 Sensors and actuators are the core technologies of IoT, enabling industrial-scale automation and providing
valuable business insights through data analysis.

Sensors:

 A sensor is a transducer that converts physical phenomena into electrical signals (e.g., microphones convert
sound waves into electrical energy).

 Classification of Sensors:

1. Active Sensors: Require external power (e.g., ultrasonic sensors).

2. Passive Sensors: Do not need external power; generate output directly (e.g., thermocouples).

3. Based on Detection Means: Electric, Biological, Chemical, Radioactive, etc.

4. Based on Conversion Phenomenon: Photoelectric, Thermoelectric, Electrochemical,


Electromagnetic, Thermo-optic, etc.

5. Analog vs. Digital:

 Analog Sensors: Provide continuous output (e.g., temperature sensors).

 Digital Sensors: Provide discrete output (e.g., digital thermometers).

Actuators:

 Actuators convert electrical input into physical actions (reverse of sensors).

 Examples: Electric motors, Hydraulic systems, Pneumatic systems, Solenoids, Stepper motors,
Servomechanisms, etc.

Control Center:

 Sensors collect data and send it to a control center where logic-based decisions dictate actuator responses.

Basics of Networking in IoT

IoT Network:

 A network of interconnected devices communicating without human involvement.

Network Devices:

 Routers, Switches, Hubs, Bridges.

Network Topology:

 Bus, Star, Mesh, Ring, Daisy Chain.

Unique Identifiers in Networks:

1. Hostname: Unique device name (view with hostname command).


2. IP Address: Logical address assigned by IANA (IPv4: 32-bit, IPv6: 128-bit).

3. MAC Address: Physical address assigned to the NIC (view with ipconfig/all).

4. Port: 16-bit logical channel for data communication (65,536 ports available).

M2M and IoT Technology Fundamentals

Machine-to-Machine (M2M):

 Networking of devices for remote monitoring, control, and data exchange.

M2M Architecture:

 M2M Area Network: Devices (nodes) with embedded network modules.

 Communication Network: Wired or wireless IP-based connectivity.

 M2M Gateway: Translates protocols for IP connectivity and acts as a proxy.

Differences Between IoT and M2M:

Feature M2M IoT

Communication Protocols ZigBee, Bluetooth, ModBus HTTP, MQTT, CoAP

Device Types Homogeneous Heterogeneous

Hardware vs Software Hardware-focused Software-focused

Data Collection On-premises storage Cloud-based storage

Applications On-premises apps Cloud-based apps

Devices and Gateways

Embedded Processing:

 Small-scale microcontrollers (8-, 16-, 32-bit) with integrated RAM, flash, I/O, and network interfaces.

Device Characteristics:

 Microcontroller: 8-, 16-, 32-bit memory and storage.

 Power Source: Fixed, battery, energy harvesting.

 Sensors/Actuators: Onboard or externally connected.

 Communication: Cellular, wired, or wireless.

 OS: Real-time or event-based systems.

 User Interface: Displays, buttons, or other controls.

 Device Management: Provisioning, firmware updates, monitoring.

 Execution Environment: Application lifecycle and API management.

Device Types:

1. Basic Devices: Single-purpose, low-cost, battery-powered with minimal capabilities (e.g., pressure sensors,
light monitors).
2. Advanced Devices: Host application logic, offer WAN connections, device management, and multiple
application hosting (e.g., gateway devices).

Basic Device Features:

 Single-function or multi-function capabilities (e.g., monitoring humidity, temperature).

 Ultra-low power consumption with extended battery life.

 Integrated SoC microcontrollers with ADC, GPIO, PWM support.

 Power-saving features like interrupt-based wake-up.

 Energy harvesting capabilities (solar, thermal, kinetic).

 Peripheral communication using SPI, I2C, UART protocols.

Microcontroller Communication and Functions:

 Interfaces enable communication with other microcontrollers, often for offloading tasks or running
application logic on a separate host processor.

 Microcontrollers often include security processors to accelerate encryption (e.g., AES) for secure radio link
communication without a host processor.

 Forming capillary networks: Microcontrollers communicate with gateways and devices in the same network.

 External components: An antenna and frequency filter (e.g., SAW filter) are required for optimized
communication.

 OS constraints: Limited computational resources lead to usage of simple OS like FreeRTOS, Atomthreads,
TinyOS, Contiki, etc., offering basic functionality (memory, concurrency, drivers, protocols).

 Application logic: Responsible for sensor data collection and providing semantically correct information over
LAN.

Gateways:

 Gateways translate protocols (e.g., IEEE 802.15.4/802.11 to Ethernet/cellular).

 Application Layer Gateways (ALGs) add complexity and can cause errors; examples include ZigBee Gateway
translating to SOAP/IP, CoAP to HTTP/REST.

 Other tasks: Gateways handle data management, device management, and local applications.

Data Management:

 Functions: Sensor data reading, caching, filtering, concentrating, and aggregating data before transmission to
back-end servers.

 Importance in M2M (Machine-to-Machine): Critical due to exponential data growth.

Characteristics of M2M Data:

 Big Data: Large volumes capturing detailed processes.

 Heterogeneous Data: Varied devices produce data differing in sampling rate and quality.

 Real-World Data: Data linked to real-world processes and environments.

 Real-Time Data: Generated and communicated in real-time.

 Temporal Data: Environment measurements over time.

 Spatial Data: Location-dependent data with varying assessments.


 Polymorphic Data: Complex data with context-dependent meanings.

 Proprietary Data: Often stored in proprietary formats, but shifting to open standards.

 Security and Privacy: High risk of leaking sensitive information and usage patterns.

M2M Data Management Stages:

1. Data Generation: Data actively or passively produced based on device capabilities and application needs.

2. Data Acquisition: Collection of data via wired/wireless links, respecting security, protocol, and application
requirements.

3. Data Validation: Ensures correctness and contextual relevance through rules and logic checks; failure can lead
to security risks.

4. Data Storage: Balancing storage needs and business relevance; requires specialized technologies (parallel
processing DBs, cloud platforms).

5. Data Processing: Enhances data for future use through normalization, aggregation, and transformation.

6. Data Remanence: Residual data remains even after deletion; mitigation through overwriting, encryption, or
physical destruction.

7. Data Analysis: Extracts information for decision-making through business intelligence, data mining, and
statistical analysis.

Business Processes in IoT:

 A business process is a series of interrelated activities within an enterprise, arranged in a logical sequence to
achieve a specific result.

 Types of business processes: management, operational, and supporting — all aiming at mission objectives.

 Business Process Model and Notation (BPMN) is a widely used graphical representation for business process
modeling.

 Modern enterprise systems rely on real-world process interaction for monitoring and management, enabling
critical business decisions and action optimization.

 Traditional data acquisition methods were human-based or human-assisted (e.g., keyboards, barcode
scanners), but with technologies like RFID, WSNs, and embedded devices, data exchange is now automated
and rapid.

 In the M2M (Machine-to-Machine) era, connected devices actively participate in business processes through
services.

 SOA-ready devices (devices offering their functionalities as web services) simplify integration and interaction
with enterprise systems.

 A layered approach enhances development, deployment, and management of WSN applications integrated
with enterprise information systems.

 M2M and IoT provide detailed, real-time data about operations and real-world conditions, empowering
business processes.

IoT Integration with Enterprise Systems:

 M2M communication and IoT enable billions of devices to interact and exchange information.

 Cross-layer interaction in IoT occurs at:

o M2M level: machine-to-machine interactions.


o M2B (Machine-to-Business) layer: machines interact with network-based services, business systems,
and applications.

 Devices communicate over protocols like ZigBee, Bluetooth, Wi-Fi, etc., and some host services (e.g., REST)
with dynamic discovery capabilities.

 Resource-constrained devices often require auxiliary gateways for protocol translation and communication
support.

 M2M interactions enable devices to support applications and fulfill business goals.

 Service-oriented approaches facilitate real-world integration via web services or lightweight methods like
REST.

 Cloud-based network services offer benefits like virtualization, scalability, performance, and lifecycle
management.

 Minimizing communication overhead is key; cloud load balancing reduces data transmission burdens on
devices.

 Content Delivery Networks (CDN) optimize access to geographically distant M2M infrastructure data.

Distributed Business Processes in IoT:

 Traditional IoT data acquisition involves device data collection, backend system transportation, assessment,
and device control.

 Large-scale IoT and massive data generation make centralized approaches inefficient.

 To avoid overloading enterprise systems, only business-relevant data should be transmitted.

 Increasing network and device resources (e.g., memory, multi-core CPUs) enables distributed computation.

 Shifting computation and intelligence to the network and edge nodes reduces backend load.

 Distributed business processes allow sub-processes to execute outside enterprise systems, leveraging local
resources.

 Devices with computing capabilities can process and evaluate their generated business data independently
or in clusters.

 Business processes dynamically bind local resources for efficient goal achievement.

Everything as a Service (XaaS):

 XaaS expands cloud computing by providing anything as a service through cloud and remote access
technologies.

 Before XaaS, businesses needed to purchase licensed products, manage security, and maintain infrastructure.

 With XaaS, businesses simplify operations by paying only for the services they need.

 XaaS includes various digital components offered as services (e.g., data, security, communication).

 Originated from cloud service models: SaaS (Software-as-a-Service), PaaS (Platform-as-a-Service), and IaaS
(Infrastructure-as-a-Service).

Hardware-as-a-Service (HaaS)

 MSPs (Managed Service Providers) own hardware and install it on customer sites on demand.

Communication-as-a-Service (CaaS)

 Offers communication solutions like:


o VoIP (Voice over IP)

o IM (Instant Messaging)

o Video conferencing

 Hosted in the vendor’s cloud.

Desktop-as-a-Service (DaaS)

 Virtual delivery of desktops along with necessary apps.

Security-as-a-Service (SECaaS)

 Outsourced security management integrated into company infrastructure.

 Delivered over the Internet.

Healthcare-as-a-Service (HaaS)

 Transforms healthcare with services like:

o Online doctor consultations

o 24/7 health monitoring

o Medicine delivery

o Home lab sample collection with fast result delivery

o 24/7 access to medical records

Transportation-as-a-Service (TaaS)

 Enables scalable and flexible transportation solutions.

Benefits of Cloud-Based Services

 Scalability: Access to unlimited computing capacity and storage.

 Cost- and Time-Effectiveness: Saves on equipment purchase and deployment.

 Focus on Core Competencies: Reduces time spent on app setup and employee training.

 High Service Quality: Professionals provide updates and emerging technologies.

 Better Customer Experience: Increased customer satisfaction and loyalty.

Role of Cloud in IoT

 Enhances IoT success by enabling powerful data processing and new monitoring services.

 Stores sensor data for intelligent monitoring and activation.

 Transforms data into insights for cost-effective, productive actions.

Benefits and Functions of IoT Cloud

1. Large Network Access: Supports multiple devices (mobile, tablets, laptops).

2. On-Demand Access: Requires only Internet access.

3. Scalability: Expands storage, software settings, and user capacity quickly.

4. Resource Pooling: Enhances collaboration and user connections.

5. Security: Provides strong authentication and encryption.


6. Cost Efficiency: Pay-as-you-go model based on usage.

Role of Cloud Computing in IoT

 Efficiency: Streamlines data flow from IoT devices to cloud destinations.

 AWS Cloud Benefits:

1. No need to pre-guess infrastructure capacity.

2. Cost savings based on usage.

3. Rapid global deployment.

4. Flexibility and speed for developers.

Security Aspects in IoT

 Physical Security: Prevents unauthorized physical access to IoT devices and data manipulation.

 Network Security: Ensures secure data transmission and prevents unauthorized data modification.

 Unencrypted Communications:

o Risky use of old devices with weak encryption.

o Recommended use of SSL/TLS encryption for device-platform communication.

 Application Security:

o Ensures use of properly upgraded OS and web servers.

o Follows best practices for securing applications.

UNIT-II: Elements of IoT

Hardware Components:

1. Arduino:

o Open-source electronic device that reads inputs and produces outputs.

o Microcontroller-based, executes code written in C/C++.

o Uses Arduino IDE for writing and uploading code.

Features:

o 8-bit microcontroller.

o 32kB flash memory, 2kB SRAM.

o Input voltage: 7V–12V.

o 14 Digital I/O pins, 6 Analog Input pins.

o Processor speed: 8 MHz to 400 MHz (average 16 MHz).

2. Raspberry Pi:

o Small, fully functional computer with a dedicated processor, memory, and graphics driver.

o Uses Raspberry Pi OS (Linux-based) and supports other OS like Ubuntu Mate.

o Uses microSD cards for storage and supports Bluetooth, Ethernet, and Wi-Fi.

Features:
o 64-bit Quad-core processor.

o RAM: Up to 8GB.

o Processor speed: 700 MHz to 1.5 GHz.

o 40 GPIO pins.

o Supports internet connectivity and various applications.

o Contains CPU, GPU, Ethernet port, GPIO pins, and power source connector.

3. Raspberry Pi 3 I/O Pins:

o GPIO Pins: Set as input or output; voltage 1.8V–3.3V is read as HIGH, below 1.8V as LOW.

o PWM Pins: Software PWM on all pins; Hardware PWM on GPIO12, GPIO13, GPIO18, GPIO19.

o SPI (Serial Peripheral Interface): Fast master-slave communication.

 GND, SCLK, MOSI, MISO, CE pins.

 SPI0: GPIO9, GPIO10, GPIO11, GPIO8, GPIO7.

 SPI1: GPIO19, GPIO20, GPIO21, GPIO18, GPIO17, GPIO16.

o I2C Pins: Low-speed two-wire serial communication.

 Data (GPIO2), Clock (GPIO3), EEPROM Data (GPIO0), EEPROM Clock (GPIO1).

o UART Pins: Serial communication.

 TX (GPIO14), RX (GPIO15).

Communication Protocols:

1. Wi-Fi: High-speed wireless communication.

2. ZigBee: Low-power, short-range wireless communication.

3. Bluetooth: Short-range wireless data exchange.

4. Satellite Communication: Long-range global communication.

5. LoRaWAN: Low-power, long-range communication for IoT devices.

Sensors:

 Definition: Devices that convert one form of energy into another.

Types of Sensors:

1. Based on Power Requirements:

o Active Sensors: Require external power signal.

o Passive Sensors: Generate output without external power.

2. Based on Detection Method:

o Different detection techniques.

3. Based on Conversion Phenomenon:

o Input and output signal types.

4. Based on Output Type:


o Analog Sensors: Continuous signal output.

o Digital Sensors: Discrete or digital data output.

Software Components:

 Programming APIs: Python, Node.js, Arduino.

 Communication Protocols:

o MQTT, ZigBee, Bluetooth, CoAP, UDP, TCP.

Sensors in IoT

Definition:

 A sensor is better termed as a transducer — a physical device that converts one form of energy into another.

Classification of Sensors:

1. Based on Power Requirement:

o Active Sensors: Require an external excitation or power signal.

o Passive Sensors: Do not require external power and generate output directly.

2. Based on Detection Method:

o Classified by the physical means used for detection.

3. Based on Conversion Phenomenon:

o Categorized by the type of input and output they handle.

4. Based on Data Type:

o Analog Sensors: Produce continuous output signals.

o Digital Sensors: Work with discrete or digital data.

Types of Sensors:

1. Ultrasonic Sensor:

o Measures object distance using ultrasonic sound waves.

o Consists of a transmitter and receiver.

o Distance calculation is based on the time taken for sound reflection.

2. Potentiometer Sensor:

o Measures distance or displacement in linear or rotary motion.

o Converts motion into an electrical signal by varying resistance.

3. Gas Sensor:

o Detects gas leakage in industrial applications.

o Uses a sensing element under a metal sheet, which reacts chemically when gas particles hit it.

o Changes in element resistance alter the current, enabling gas detection.

4. Color Sensor:
o Detects RGB values using a photodiode.

o Converts light into electrical signals based on color intensity.

5. PIR (Passive Infrared) Sensor:

o Detects motion of humans, animals, or objects.

o Senses changes in infrared radiation based on temperature differences.

o Generates differential signals when an object enters or leaves its detection area.

6. Temperature Sensor:

o Thermistor:

 Detects temperature variations.

 Has a negative temperature coefficient — resistance decreases as temperature rises.

o Thermocouple:

 Uses the junction of two different metals.

 Produces voltage changes when exposed to temperature variations.

7. IR (Infrared) Sensor:

o Proximity sensor detecting nearby objects.

o Uses an IR LED as a transmitter and a photodiode as a receiver.

o Detects reflected IR light to sense object presence.

8. Flex Sensor:

o Measures bending or deflection.

o Low resistance when straight, increasing resistance when bent.

9. Microphone (Sound Sensor):

o Converts sound waves into electrical signals.

o Contains a vibrating diaphragm and coiled wire around a magnet, inducing current with sound
vibrations.

IoT Sensors and Actuators – Concise Revision Notes

Sensors

Definition: A sensor (or transducer) is a device that converts one form of energy into another, usually measuring
physical quantities and converting them into electrical signals.

Types of Sensors:

1. Active Sensors: Require external power for operation (e.g., Ultrasonic Sensor).

2. Passive Sensors: Do not require external power and generate output directly (e.g., Thermistor).

Classification of Sensors:

 Based on Detection: Different sensors use different physical principles for detection.

 Based on Conversion Phenomenon: Depends on input and output forms of energy.

 Analog Sensors: Produce continuous output signals.


 Digital Sensors: Work with discrete data.

Common Types of Sensors:

1. Ultrasonic Sensor: Measures distance using ultrasonic sound waves; calculates distance by measuring the
time taken for the echo.

2. Potentiometer Sensor: Measures linear/rotary displacement and converts it into an electrical signal.

3. Gas Sensor: Detects gas leakage by measuring changes in resistance when gas particles cause a chemical
reaction.

4. Color Sensor: Detects RGB values by using a photodiode.

5. PIR Sensor: Detects motion by sensing changes in infrared radiation.

6. Temperature Sensor: Measures temperature using:

o Thermistor: Resistance decreases with temperature rise.

o Thermocouple: Varying potential across two metals based on temperature.

7. IR Sensor: Proximity sensor using an IR LED (transmitter) and photodiode (receiver) to detect objects.

8. Flex Sensor: Measures bending by detecting changes in resistance.

9. Microphone (Sound Sensor): Converts audio signals into electrical signals using a vibrating diaphragm and
coiled magnets.

Actuators

Definition: Devices that convert electrical input into physical action, acting in the reverse direction of sensors.

Types of Actuators:

1. Hydraulic Actuators:

o Use hydraulic power to produce mechanical motion (linear, rotary, or oscillatory).

o Advantages: High force, high speed, used in welding, vehicle lifting.

o Disadvantages: Fluid leaks, expensive, high maintenance.

2. Pneumatic Actuators:

o Use compressed air or vacuum for motion.

o Advantages: Low cost, durable, quick operation.

o Disadvantages: Pressure loss reduces efficiency, continuous air compression needed.

3. Electrical Actuators:

o Use electric motors to convert electrical energy into mechanical torque.

o Advantages: Precise control, reprogrammable, safe with no fluid leaks.

o Disadvantages: Expensive, environment-dependent.

4. Mechanical Actuators:

o Convert one type of motion into another using gears, pulleys, chains.

o Example: Rack and pinion system.


5. Thermal/Magnetic Actuators:

o Produce linear motion by responding to temperature changes.

IoT Software Components and Communication

Programming APIs: APIs (like Python, Node.js, Arduino) enable communication between IoT devices and external
systems.

Logical Design of IoT: Abstract representation of IoT entities and processes.

1. IoT Functional Blocks

2. IoT Communication Models

3. IoT Communication APIs

API (Application Programming Interface):

 Defines interactions between software components.

 Facilitates data exchange and device communication.

Arduino Rest API:

 Exchanges data between Arduino and external systems over HTTP.

 Useful for IoT cloud platforms and sensor data retrieval.

IoT Protocols

1. IoT Network Protocols:

 Connect medium to high power devices over a network.

 Examples: HTTP, LoRaWAN, Bluetooth, ZigBee.

2. IoT Data Protocols:

 Connect low power devices without internet for end-to-end hardware communication.

 Examples: MQTT, CoAP, AMQP, XMPP.

MQTT (Message Queuing Telemetry Transport):

 Lightweight publish-subscribe messaging protocol.

 Ideal for constrained devices and low-bandwidth connections.

MQTT Protocol – Best Notes for Exam

1. Characteristics of MQTT:

 M2M Protocol: Provides communication between devices (Machine-to-Machine communication).

 Lightweight & Simple: Uses a publish/subscribe model to exchange information between client and server.

 Asynchronous Communication: Client and server don’t need to be connected at the same time.

 Real-Time Messaging: Ensures fast data transmission, like WhatsApp or Messenger.

 Topic-Based Filtering: Clients can subscribe to specific topics to receive only the relevant information.
2. MQTT Architecture:

 Message: Data sent across the network with the following parameters:

o Payload Data: Actual information being transmitted.

o Quality of Service (QoS): Delivery guarantee levels.

o Collection of Properties: Additional metadata.

o Topic Name: Label to categorize messages.

 Client: Device or program using MQTT, responsible for:

o Publishing: Sending data to the server.

o Subscribing: Receiving data from the server.

o Unsubscribing: Stopping the receipt of unwanted data.

o Closing Connection: Disconnecting from the server.

 Server/Broker: Manages message exchange by:

o Accepting client connections.

o Processing publish, subscribe, and unsubscribe requests.

o Forwarding messages to subscribed clients.

o Closing network connections when needed.

 Topic: A label that categorizes messages, used by the server to match incoming messages to subscribed
clients.

3. Example Workflow:

 A Publisher defines a topic (e.g., temperature) and publishes a message with the temperature value.

 A Subscriber (like a phone or desktop app) subscribes to the topic (temperature) to receive updates.

 The Server/Broker ensures the message is delivered from the publisher to the subscriber efficiently.

4. Key Advantages of MQTT:

 Efficient and fast data transmission.

 Lightweight, ideal for constrained devices and low-bandwidth networks.

 Works asynchronously, allowing flexible and real-time communication.

 Uses topic-based messaging, reducing unnecessary data traffic.

5. Applications:

 IoT devices for sensor data exchange.

 Smart home automation systems.

 Industrial monitoring and control.

 Messaging systems for real-time updates.

Conclusion: MQTT is a powerful and lightweight protocol designed for real-time, efficient communication between
devices. Its publish/subscribe model and topic-based filtering make it ideal for IoT applications and other systems
requiring fast and reliable data exchange.
ZigBee

 Definition: ZigBee is a low-power, low-data-rate wireless communication protocol based on IEEE 802.15.4
standard.

 Key Features:

o Low power consumption, ideal for battery-operated devices.

o Supports mesh, star, and tree topologies.

o Suitable for short-range communication (10–100 meters).

o Used in home automation, industrial control, and IoT applications.

 Advantages:

o Energy-efficient and cost-effective.

o Highly scalable with flexible network topologies.

 Disadvantages:

o Low data transfer rate (20–250 kbps).

o Limited range compared to Wi-Fi and Bluetooth.

Bluetooth

 Definition: Bluetooth is a short-range wireless communication technology used for exchanging data between
devices over short distances.

 Key Features:

o Operates in the 2.4 GHz ISM band.

o Uses frequency-hopping spread spectrum for interference reduction.

o Range: Up to 100 meters (Bluetooth Class 1).

o Used in wireless audio, peripherals, and IoT devices.

 Advantages:

o Low power consumption.

o Easy pairing and widespread adoption.

 Disadvantages:

o Limited range and bandwidth.

o Can suffer from interference in crowded frequency bands.

CoAP (Constrained Application Protocol)

 Definition: CoAP is a lightweight protocol designed for constrained devices in IoT, optimized for low-power,
low-bandwidth networks.

 Key Features:

o Works over UDP for faster communication.

o Supports request/response model similar to HTTP.

o Uses RESTful architecture for simplicity and scalability.


o Suitable for devices with limited processing power and memory.

 Advantages:

o Lightweight and efficient.

o Designed for low-power, lossy networks.

 Disadvantages:

o Limited security compared to HTTP.

o Reliability issues due to UDP-based transport.

UDP (User Datagram Protocol)

 Definition: UDP is a connectionless, lightweight communication protocol used for fast data transmission.

 Key Features:

o No handshake process, reducing latency.

o Provides minimal overhead.

o Suitable for time-sensitive applications like video streaming and gaming.

 Advantages:

o Faster data transmission.

o Efficient for simple query/response protocols.

 Disadvantages:

o No error correction or acknowledgment.

o Data loss possible without retransmission.

TCP (Transmission Control Protocol)

 Definition: TCP is a connection-oriented, reliable communication protocol ensuring ordered and error-free
data delivery.

 Key Features:

o Three-way handshake for connection establishment.

o Guarantees data integrity and order.

o Provides flow and congestion control.

o Used for applications requiring reliable data transfer (e.g., web browsing, email).

 Advantages:

o Reliable and secure.

o Ensures data accuracy and completeness.

 Disadvantages:

o Higher overhead due to connection management.

o Slower compared to UDP due to error checking and retransmission.

These notes are designed to give you a quick and thorough understanding of these protocols. Let me know if you’d
like to dive deeper into any of them or add more topics!
IoT Physical Servers and Cloud Offerings

Introduction to Cloud Storage Models and Communication APIs

 Cloud Storage Models:

o Manage and store the huge amount of data generated by IoT devices.

o Cloud computing enhances the efficiency of IoT systems by offering storage, processing, and data
analysis.

Role of Cloud Computing in IoT

 Data Management: Handles large-scale data flow and storage efficiently.

 Efficiency: Works together with IoT to provide seamless data access and real-time processing.

 Connectivity: Enables moving large data packets across the internet generated by IoT.

Service and Deployment Models

Service Models:

1. Software as a Service (SaaS):

o Provides end-user applications via web portals.

o Examples: Google Drive, Dropbox.

2. Platform as a Service (PaaS):

o Offers a development environment for cloud-based applications.

o Examples: AWS Elastic Beanstalk, Google App Engine.

3. Infrastructure as a Service (IaaS):

o Provides virtualized hardware and software resources.

o Examples: AWS EC2, Microsoft Azure.

Deployment Models:

1. Private Cloud:

o Exclusive use by a single organization.

o Managed either on-premises or by a third party.

2. Public Cloud:

o Open to the general public.

o Examples: AWS, Google Cloud.

3. Community Cloud:

o Shared by organizations with common interests.

4. Hybrid Cloud:

o Combination of private, public, and/or community clouds.

Physical Storage Models

1. Direct Attached Storage (DAS):


o Storage directly attached to the computer.

o Simple and commonly used in personal devices.

2. Storage Area Network (SAN):

o Centralized disk storage accessed over a network.

o Simplifies backup and failure management.

3. Network Attached Storage (NAS):

o Shared storage accessible through file system protocols.

o Examples: NFS, SMB.

Types of Cloud Storage Models

1. Instance Storage:

o Virtual disk storage for virtualized environments.

o Often implemented using DAS; offers ephemeral storage.

2. Volume Storage:

o Also known as block storage.

o Splits files into fixed-sized blocks without metadata.

3. Object Storage:

o Web-scale NAS with metadata for each object.

o Highly scalable and used for unstructured data.

IoT Application Development Framework

1. Device Integration: Seamless connectivity between devices and cloud.

2. Data Acquisition and Integration: Capturing and integrating device data.

3. Data Storage: Storing structured and unstructured data on cloud or local servers.

4. Authentication and Authorization: Ensuring device security and data access control.

This comprehensive and well-structured note ensures you cover all key points for maximum exam scores!

IoT Physical Servers and Cloud Offerings

Cloud Storage Models and Communication APIs

Introduction to Cloud Computing:

 IoT generates huge amounts of data (big data).

 Managing data flow and storage is a complex task for enterprises.

 Cloud computing enhances IoT efficiency by providing scalable storage and data management.

 Cloud and IoT together improve data accessibility and processing efficiency.

Role of Cloud Computing in IoT:

 Enhances efficiency in managing IoT-generated data.

 Provides a pathway for data to reach its destination.


 Stores and offers easy access to large IoT data packets.

Cloud Service and Deployment Models

Service Models:

1. Software as a Service (SaaS):

o Provides software applications over the cloud.

o Accessed via web portals or service-oriented web services.

o Example: Google Docs, Microsoft Office 365.

2. Platform as a Service (PaaS):

o Provides an environment for developing and running cloud applications.

o Developers can deploy applications without managing underlying infrastructure.

o Example: Google App Engine, AWS Elastic Beanstalk.

3. Infrastructure as a Service (IaaS):

o Provides virtualized computing resources.

o Includes servers, storage, and networking.

o Example: Amazon EC2, Microsoft Azure.

Deployment Models:

1. Private Cloud:

o Exclusive use by a single organization.

o Can be on-premises or hosted by third-party providers.

2. Public Cloud:

o Open for public use.

o Example: Amazon Web Services (AWS), Google Cloud Platform (GCP).

3. Community Cloud:

o Shared infrastructure for a specific community with shared concerns.

4. Hybrid Cloud:

o Combination of private, public, and community clouds.

o Enables data and application portability.

Physical Storage Models

1. Direct Attached Storage (DAS):

o Storage directly attached to a computer/server.

o Simple and cost-effective.

2. Storage Area Network (SAN):

o Centralized storage accessible over a network.

o Provides high performance and reliability.


3. Network Attached Storage (NAS):

o Shared storage accessible over a network using file system protocols (NFS, SMB).

o Allows concurrent data access.

Cloud Storage Models

1. Instance Storage:

o Virtual disk storage.

o Often implemented using DAS.

o Known as ephemeral storage, not highly reliable.

2. Volume Storage:

o Block-based storage similar to SAN.

o Supports read/write operations and system files.

o Data stored in structured blocks with unique addresses.

3. Object Storage:

o Web-scale NAS, ideal for unstructured data.

o Stores data as objects with data, metadata, and unique identifiers.

o Example: Amazon S3.

Popular Cloud Storage Models

 Web Application Messaging Protocol (WAMP)

 Xively Cloud for IoT

 Amazon Web Services (AWS) for IoT

Communication APIs

 Facilitate data and control information transfer from applications to the cloud.

 Support protocols like RPC, PUB-SUB, and WAMP.

 RESTful API is a widely used communication API.

 Django web framework often used to implement communication APIs.

Web Application Messaging Protocol (WAMP)

 High-level messaging protocol for distributed applications.

 Sub-protocol of WebSocket.

 Provides two messaging patterns:

1. Publish-Subscribe (Pub-Sub)

2. Routed Remote Procedure Calls (RPC)

 Uses WebSocket for ordered, reliable, bi-directional communication.

Key Concepts of WAMP:

 Transport: Channel connecting peers (default: WebSocket).


 Session: Conversation between two peers.

 Routers: Perform call and event routing.

 Broker: Routes messages to subscribers.

 Dealer: Routes RPC calls and results.

 Clients: Peers with roles like publisher, subscriber, caller, and callee.

Advantages:

 Combines Pub-Sub and RPC patterns, reducing tech stack complexity.

 Reduces networking overhead.

Disadvantages:

 Not an official standard.

 Requires additional WAMP router component.

Xively Cloud for IoT

 Platform-as-a-Service (PaaS) for deploying IoT applications.

 Provides data collection, management, and distribution.

 Offers APIs for device connectivity and application development.

 Supports multiple languages and protocols like HTTP, APIs, and MQTT.

 Ensures secure device connectivity and efficient data management.

These notes cover all key concepts clearly and concisely, ensuring you’re well-prepared for your exam. Let me know if
you’d like any adjustments or additional focus on specific topics!

Xively Overview

How to Use Xively:

 Registration & Account Creation: Developers must register with Xively to use its cloud services.

 Device Creation: After registration, developers can create multiple devices for their IoT apps using pre-built
templates in Xively’s web interface.

 Unique FEED_ID: Each connected device gets a unique FEED_ID, which specifies the data stream and
metadata of the device.

 Permissions: Available permissions for connected devices include Create, Update, Delete, and Read.

 API-Based Control: Permissions on IoT devices are managed via Xively’s available APIs.

 Bidirectional Channels: After connecting a device, one or more bidirectional channels are created for data
exchange.

 Communication: Devices use Xively APIs to create communication-enabled products, facilitating data flow.

Xively PaaS (Platform as a Service) Services:

 Data Visualization: Visualizes data from sensors connected to IoT devices.

 Graphical Plots: Provides graphical representations of collected data.

 Alerts: Generates alerts based on data conditions.

 Historical Data Access: Enables access to past data records.


 Feeds: Generates feeds representing real-world objects, owned by the user or others.

Xively HTTP-Based APIs:

 Ease of Implementation: Simple to integrate into device hardware acting as clients to Xively web services.

 Data Communication: APIs facilitate sending data to web services.

 Services Provided: APIs support logging, sharing, and displaying sensor data.

Xively Support Services:

 Protocols: Supports REST, WebSockets, and MQTT protocols for device-cloud connectivity.

 SDKs: Provides native SDKs for Android, Arduino, ARM mbed, Java, PHP, Ruby, and Python.

 Prototyping & Deployment: Tools for workflow including prototyping, deployment, and management.

 Interface Options: Supports Python, HTML5, Tornado, WebSocket Server, and RPC (Remote Procedure Call).

Xively Data Methods:

 Data Structure: Users, feeds, data streams, data points, and triggers.

 Data Feeds: Represents a single location like a device or device network.

 Data Streams: Individual sensors associated with a location (e.g., temperature, light, power usage).

 Push/Pull Feeds: Supports both automatic and manual data feeds.

Xively Data Formats & Structures:

 Supported Formats: JSON, XML, and CSV.

 Access Control: Private and public data access.

 Data Structures: Tabular, spreadsheet, Excel-like formats, and text with comma-separated values.

Xively Uses in IoT/M2M:

 Data Management: Handles data streams, data points, and triggers.

 Feed Management: Enables creation and management of feeds.

 Data Visualization: Presents collected data graphically.

Django Web Application Framework

Overview:

 Purpose: Xively PaaS collects and processes IoT system data in the cloud.

 Framework Choice: Django, a Python-based web application framework, is ideal for building IoT applications
backed by Xively or other data collection systems.

Django Key Features:

 Open Source: Freely available and supported by a strong community.

 MTV Architecture: Based on Model-Template-View pattern, separating data models, business logic, and user
interface.

 Database Flexibility: Unified API allows seamless work with different databases without code changes.

 Powerful Ecosystem: Leverages Python’s extensive libraries and ecosystem for enhanced functionality.
Django Components:

 Model: Defines stored data and interacts with the database (relational, non-relational, XML, etc.).

 Template: HTML-based files with placeholders for dynamic content, supporting multiple formats like XML,
CSS, JavaScript, and CSV.

 View: Manages data display and user interface logic, linking models and templates.

Django Advantages:

 Object-Relational Mapper: Simplifies database interaction through Python classes.

 Web Templating System: Streamlines content rendering with reusable templates.

 URL Dispatcher: Uses regular expressions for efficient URL mapping and request handling.

Xively IoT Platform

How to Use Xively

 Registration: Developers must register and create an account with Xively to use its cloud services.

 Device Creation: After registration, developers create devices for their IoT app using templates provided on
the Xively Web Interface.

 Unique FEED_ID: Each connected device is assigned a unique FEED_ID specifying data streams and metadata.

 API Permissions: Permissions for devices (Create, Update, Delete, Read) are assigned using Xively APIs.

 Bidirectional Channels: Devices connect via bidirectional channels to Xively Cloud for data exchange.

 Xively APIs: Devices use these APIs to enable communication between IoT products.

Xively PaaS Services

 Data Visualization: Visualize data collected from IoT devices.

 Graphical Plots: Represent collected data through plots.

 Alerts: Generates alerts for specified conditions.

 Historical Data: Access to historical data.

 Feeds: Real-world object data streams.

Xively HTTP-based APIs

 Implementation: Easy to implement on client device hardware.

 Data Services: Logging, sharing, and displaying sensor data.

Xively Support Services

 Protocols: Supports REST, WebSockets, MQTT.

 SDKs: Available for Android, Arduino, ARM mbed, Java, PHP, Ruby, Python.

 Interfaces: Python, HTML5, Tornado, WebSocket Server, RPC.

Xively Data Methods for IoT Devices

 Concepts: Users, feeds, data streams, data points, triggers.

 Data Feeds: Single location (e.g., device network).


 Data Streams: Individual sensor data (e.g., temperature, power consumption).

 Data Transfer: Pull (manual) or Push (automatic) feeds.

Xively Data Formats and Structures

 Formats: JSON, XML, CSV.

 Access: Private and public data access.

 Structures: Tabular, spreadsheet, text with comma-separated values.

Xively Applications in IoT/M2M

 Managing Feeds: Create and manage data feeds.

 Data Visualization: Real-time and historical data analysis.

Django Web Application Framework

 Purpose: Build IoT applications backed by Xively Cloud.

 Framework: Python-based open-source web application framework.

 Architecture: Model-Template-View (MTV).

Django Components

 Model: Defines stored data and database interactions.

 Template: HTML files with placeholders for dynamic content.

 View: Connects models and templates, handling data retrieval and display.

Cloud Storage API

 Definition: Interface connecting local applications to cloud storage systems.

 API Role: Allows communication between software programs.

 Implementation: Uses function calls with verbs and nouns.

API Working

 Specification: Describes information exchange.

 Software Interface: Published for software access.

Types of APIs

1. Local APIs: OS or middleware services.

2. Web APIs: Accessed via HTTP protocols (RESTful APIs).

3. Program APIs: Remote Procedure Call (RPC) technology.

RESTful Web API Design

 Principles:

o Client-Server: Separation of concerns.


o Stateless: Each request contains all necessary information.

o Cacheable: Responses labeled as cacheable or non-cacheable.

o Layered System: Limited component visibility.

o Uniform Interface: Consistent communication methods.

o Code on Demand: Optional executable code from servers.

Amazon Web Services (AWS) for IoT

1. Amazon EC2: Launch instances using AMI-ID, instance type, security groups.

2. Amazon AutoScaling: Scale instances based on defined policies.

3. Amazon S3: Store and retrieve files via S3 buckets.

4. Amazon RDS: Launch and manage relational databases.

5. Amazon DynamoDB: Create tables with defined schemas and read/write capacities.

SkyNetIoT Messaging Platform

 Infrastructure: Runs on Amazon EC2 with 50,000+ smart devices (Arduinos, Raspberry Pis, BeagleBoards,
etc.).

 Platform: IoT platform-as-a-service (PaaS) and private cloud via Docker.

 Technology: Written in Node.js, open-source (MIT license) on GitHub.

 Supported Protocols: HTTP, REST, WebSockets, MQTT, CoAP.

 Device Credentials: Each device assigned a unique 36-character UUID and secret token.

 Security: Permissions for device discoverability, configuration, and messaging.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy