Iot Mid1
Iot Mid1
Definition:
IoT (Internet of Things) is a dynamic global network infrastructure with self-configuring capabilities based on
standard and interoperable communication protocols. It connects physical and virtual “things” with unique identities,
physical attributes, and virtual personalities, using intelligent interfaces integrated into information networks to
exchange data.
Characteristics:
1. Dynamic & Self-Adapting: IoT devices adapt to changing contexts and take actions based on operating
conditions and the user’s environment (e.g., adaptive surveillance systems).
2. Self-Configuring: Enables multiple devices to work together seamlessly to provide specific functionalities.
3. Interoperable Communication Protocols: Supports multiple protocols for communication between devices
and infrastructure.
5. Integrated Information Network: Facilitates seamless data exchange between devices and systems.
IoT Architecture
Collects data through physical equipment like RFID tags, GPS, and various sensors.
Devices have limited storage, restricted bandwidth, and small processing speeds.
Protocols:
Gateways route data from the sensor layer to the management service layer.
Requires large storage capacity and trusted performance for public, private, and hybrid networks.
Protocols:
Manages IoT services like data analysis, device management, and service analytics.
Protocols:
TCP: Reliable, connection-oriented protocol. Used for web browsers, email, etc.
4. Application Layer:
Protocols:
3. Safety First: Ensure secure data transfer and build user trust.
6. Early & Frequent Testing: Align hardware and software lifespans through continuous updates.
7. Responsible Data Use: Identify essential data points and avoid data hoarding.
IoT Applications
2. Smart Cities: Traffic management, waste management, water distribution, and more.
4. IoT Retail Shops: Cashless and automated retail experiences (e.g., Amazon Go).
Overview:
Sensors and actuators are the core technologies of IoT, enabling industrial-scale automation and providing
valuable business insights through data analysis.
Sensors:
A sensor is a transducer that converts physical phenomena into electrical signals (e.g., microphones convert
sound waves into electrical energy).
Classification of Sensors:
2. Passive Sensors: Do not need external power; generate output directly (e.g., thermocouples).
Actuators:
Examples: Electric motors, Hydraulic systems, Pneumatic systems, Solenoids, Stepper motors,
Servomechanisms, etc.
Control Center:
Sensors collect data and send it to a control center where logic-based decisions dictate actuator responses.
IoT Network:
Network Devices:
Network Topology:
3. MAC Address: Physical address assigned to the NIC (view with ipconfig/all).
4. Port: 16-bit logical channel for data communication (65,536 ports available).
Machine-to-Machine (M2M):
M2M Architecture:
Embedded Processing:
Small-scale microcontrollers (8-, 16-, 32-bit) with integrated RAM, flash, I/O, and network interfaces.
Device Characteristics:
Device Types:
1. Basic Devices: Single-purpose, low-cost, battery-powered with minimal capabilities (e.g., pressure sensors,
light monitors).
2. Advanced Devices: Host application logic, offer WAN connections, device management, and multiple
application hosting (e.g., gateway devices).
Interfaces enable communication with other microcontrollers, often for offloading tasks or running
application logic on a separate host processor.
Microcontrollers often include security processors to accelerate encryption (e.g., AES) for secure radio link
communication without a host processor.
Forming capillary networks: Microcontrollers communicate with gateways and devices in the same network.
External components: An antenna and frequency filter (e.g., SAW filter) are required for optimized
communication.
OS constraints: Limited computational resources lead to usage of simple OS like FreeRTOS, Atomthreads,
TinyOS, Contiki, etc., offering basic functionality (memory, concurrency, drivers, protocols).
Application logic: Responsible for sensor data collection and providing semantically correct information over
LAN.
Gateways:
Application Layer Gateways (ALGs) add complexity and can cause errors; examples include ZigBee Gateway
translating to SOAP/IP, CoAP to HTTP/REST.
Other tasks: Gateways handle data management, device management, and local applications.
Data Management:
Functions: Sensor data reading, caching, filtering, concentrating, and aggregating data before transmission to
back-end servers.
Heterogeneous Data: Varied devices produce data differing in sampling rate and quality.
Proprietary Data: Often stored in proprietary formats, but shifting to open standards.
Security and Privacy: High risk of leaking sensitive information and usage patterns.
1. Data Generation: Data actively or passively produced based on device capabilities and application needs.
2. Data Acquisition: Collection of data via wired/wireless links, respecting security, protocol, and application
requirements.
3. Data Validation: Ensures correctness and contextual relevance through rules and logic checks; failure can lead
to security risks.
4. Data Storage: Balancing storage needs and business relevance; requires specialized technologies (parallel
processing DBs, cloud platforms).
5. Data Processing: Enhances data for future use through normalization, aggregation, and transformation.
6. Data Remanence: Residual data remains even after deletion; mitigation through overwriting, encryption, or
physical destruction.
7. Data Analysis: Extracts information for decision-making through business intelligence, data mining, and
statistical analysis.
A business process is a series of interrelated activities within an enterprise, arranged in a logical sequence to
achieve a specific result.
Types of business processes: management, operational, and supporting — all aiming at mission objectives.
Business Process Model and Notation (BPMN) is a widely used graphical representation for business process
modeling.
Modern enterprise systems rely on real-world process interaction for monitoring and management, enabling
critical business decisions and action optimization.
Traditional data acquisition methods were human-based or human-assisted (e.g., keyboards, barcode
scanners), but with technologies like RFID, WSNs, and embedded devices, data exchange is now automated
and rapid.
In the M2M (Machine-to-Machine) era, connected devices actively participate in business processes through
services.
SOA-ready devices (devices offering their functionalities as web services) simplify integration and interaction
with enterprise systems.
A layered approach enhances development, deployment, and management of WSN applications integrated
with enterprise information systems.
M2M and IoT provide detailed, real-time data about operations and real-world conditions, empowering
business processes.
M2M communication and IoT enable billions of devices to interact and exchange information.
Devices communicate over protocols like ZigBee, Bluetooth, Wi-Fi, etc., and some host services (e.g., REST)
with dynamic discovery capabilities.
Resource-constrained devices often require auxiliary gateways for protocol translation and communication
support.
M2M interactions enable devices to support applications and fulfill business goals.
Service-oriented approaches facilitate real-world integration via web services or lightweight methods like
REST.
Cloud-based network services offer benefits like virtualization, scalability, performance, and lifecycle
management.
Minimizing communication overhead is key; cloud load balancing reduces data transmission burdens on
devices.
Content Delivery Networks (CDN) optimize access to geographically distant M2M infrastructure data.
Traditional IoT data acquisition involves device data collection, backend system transportation, assessment,
and device control.
Large-scale IoT and massive data generation make centralized approaches inefficient.
Increasing network and device resources (e.g., memory, multi-core CPUs) enables distributed computation.
Shifting computation and intelligence to the network and edge nodes reduces backend load.
Distributed business processes allow sub-processes to execute outside enterprise systems, leveraging local
resources.
Devices with computing capabilities can process and evaluate their generated business data independently
or in clusters.
Business processes dynamically bind local resources for efficient goal achievement.
XaaS expands cloud computing by providing anything as a service through cloud and remote access
technologies.
Before XaaS, businesses needed to purchase licensed products, manage security, and maintain infrastructure.
With XaaS, businesses simplify operations by paying only for the services they need.
XaaS includes various digital components offered as services (e.g., data, security, communication).
Originated from cloud service models: SaaS (Software-as-a-Service), PaaS (Platform-as-a-Service), and IaaS
(Infrastructure-as-a-Service).
Hardware-as-a-Service (HaaS)
MSPs (Managed Service Providers) own hardware and install it on customer sites on demand.
Communication-as-a-Service (CaaS)
o IM (Instant Messaging)
o Video conferencing
Desktop-as-a-Service (DaaS)
Security-as-a-Service (SECaaS)
Healthcare-as-a-Service (HaaS)
o Medicine delivery
Transportation-as-a-Service (TaaS)
Focus on Core Competencies: Reduces time spent on app setup and employee training.
Enhances IoT success by enabling powerful data processing and new monitoring services.
Physical Security: Prevents unauthorized physical access to IoT devices and data manipulation.
Network Security: Ensures secure data transmission and prevents unauthorized data modification.
Unencrypted Communications:
Application Security:
Hardware Components:
1. Arduino:
Features:
o 8-bit microcontroller.
2. Raspberry Pi:
o Small, fully functional computer with a dedicated processor, memory, and graphics driver.
o Uses microSD cards for storage and supports Bluetooth, Ethernet, and Wi-Fi.
Features:
o 64-bit Quad-core processor.
o RAM: Up to 8GB.
o 40 GPIO pins.
o Contains CPU, GPU, Ethernet port, GPIO pins, and power source connector.
o GPIO Pins: Set as input or output; voltage 1.8V–3.3V is read as HIGH, below 1.8V as LOW.
o PWM Pins: Software PWM on all pins; Hardware PWM on GPIO12, GPIO13, GPIO18, GPIO19.
Data (GPIO2), Clock (GPIO3), EEPROM Data (GPIO0), EEPROM Clock (GPIO1).
TX (GPIO14), RX (GPIO15).
Communication Protocols:
Sensors:
Types of Sensors:
Software Components:
Communication Protocols:
Sensors in IoT
Definition:
A sensor is better termed as a transducer — a physical device that converts one form of energy into another.
Classification of Sensors:
o Passive Sensors: Do not require external power and generate output directly.
Types of Sensors:
1. Ultrasonic Sensor:
2. Potentiometer Sensor:
3. Gas Sensor:
o Uses a sensing element under a metal sheet, which reacts chemically when gas particles hit it.
4. Color Sensor:
o Detects RGB values using a photodiode.
o Generates differential signals when an object enters or leaves its detection area.
6. Temperature Sensor:
o Thermistor:
o Thermocouple:
7. IR (Infrared) Sensor:
8. Flex Sensor:
o Contains a vibrating diaphragm and coiled wire around a magnet, inducing current with sound
vibrations.
Sensors
Definition: A sensor (or transducer) is a device that converts one form of energy into another, usually measuring
physical quantities and converting them into electrical signals.
Types of Sensors:
1. Active Sensors: Require external power for operation (e.g., Ultrasonic Sensor).
2. Passive Sensors: Do not require external power and generate output directly (e.g., Thermistor).
Classification of Sensors:
Based on Detection: Different sensors use different physical principles for detection.
1. Ultrasonic Sensor: Measures distance using ultrasonic sound waves; calculates distance by measuring the
time taken for the echo.
2. Potentiometer Sensor: Measures linear/rotary displacement and converts it into an electrical signal.
3. Gas Sensor: Detects gas leakage by measuring changes in resistance when gas particles cause a chemical
reaction.
7. IR Sensor: Proximity sensor using an IR LED (transmitter) and photodiode (receiver) to detect objects.
9. Microphone (Sound Sensor): Converts audio signals into electrical signals using a vibrating diaphragm and
coiled magnets.
Actuators
Definition: Devices that convert electrical input into physical action, acting in the reverse direction of sensors.
Types of Actuators:
1. Hydraulic Actuators:
2. Pneumatic Actuators:
3. Electrical Actuators:
4. Mechanical Actuators:
o Convert one type of motion into another using gears, pulleys, chains.
Programming APIs: APIs (like Python, Node.js, Arduino) enable communication between IoT devices and external
systems.
IoT Protocols
Connect low power devices without internet for end-to-end hardware communication.
1. Characteristics of MQTT:
Lightweight & Simple: Uses a publish/subscribe model to exchange information between client and server.
Asynchronous Communication: Client and server don’t need to be connected at the same time.
Topic-Based Filtering: Clients can subscribe to specific topics to receive only the relevant information.
2. MQTT Architecture:
Message: Data sent across the network with the following parameters:
Topic: A label that categorizes messages, used by the server to match incoming messages to subscribed
clients.
3. Example Workflow:
A Publisher defines a topic (e.g., temperature) and publishes a message with the temperature value.
A Subscriber (like a phone or desktop app) subscribes to the topic (temperature) to receive updates.
The Server/Broker ensures the message is delivered from the publisher to the subscriber efficiently.
5. Applications:
Conclusion: MQTT is a powerful and lightweight protocol designed for real-time, efficient communication between
devices. Its publish/subscribe model and topic-based filtering make it ideal for IoT applications and other systems
requiring fast and reliable data exchange.
ZigBee
Definition: ZigBee is a low-power, low-data-rate wireless communication protocol based on IEEE 802.15.4
standard.
Key Features:
Advantages:
Disadvantages:
Bluetooth
Definition: Bluetooth is a short-range wireless communication technology used for exchanging data between
devices over short distances.
Key Features:
Advantages:
Disadvantages:
Definition: CoAP is a lightweight protocol designed for constrained devices in IoT, optimized for low-power,
low-bandwidth networks.
Key Features:
Advantages:
Disadvantages:
Definition: UDP is a connectionless, lightweight communication protocol used for fast data transmission.
Key Features:
Advantages:
Disadvantages:
Definition: TCP is a connection-oriented, reliable communication protocol ensuring ordered and error-free
data delivery.
Key Features:
o Used for applications requiring reliable data transfer (e.g., web browsing, email).
Advantages:
Disadvantages:
These notes are designed to give you a quick and thorough understanding of these protocols. Let me know if you’d
like to dive deeper into any of them or add more topics!
IoT Physical Servers and Cloud Offerings
o Manage and store the huge amount of data generated by IoT devices.
o Cloud computing enhances the efficiency of IoT systems by offering storage, processing, and data
analysis.
Efficiency: Works together with IoT to provide seamless data access and real-time processing.
Connectivity: Enables moving large data packets across the internet generated by IoT.
Service Models:
Deployment Models:
1. Private Cloud:
2. Public Cloud:
3. Community Cloud:
4. Hybrid Cloud:
1. Instance Storage:
2. Volume Storage:
3. Object Storage:
3. Data Storage: Storing structured and unstructured data on cloud or local servers.
4. Authentication and Authorization: Ensuring device security and data access control.
This comprehensive and well-structured note ensures you cover all key points for maximum exam scores!
Cloud computing enhances IoT efficiency by providing scalable storage and data management.
Cloud and IoT together improve data accessibility and processing efficiency.
Service Models:
Deployment Models:
1. Private Cloud:
2. Public Cloud:
3. Community Cloud:
4. Hybrid Cloud:
o Shared storage accessible over a network using file system protocols (NFS, SMB).
1. Instance Storage:
2. Volume Storage:
3. Object Storage:
Communication APIs
Facilitate data and control information transfer from applications to the cloud.
Sub-protocol of WebSocket.
1. Publish-Subscribe (Pub-Sub)
Clients: Peers with roles like publisher, subscriber, caller, and callee.
Advantages:
Disadvantages:
Supports multiple languages and protocols like HTTP, APIs, and MQTT.
These notes cover all key concepts clearly and concisely, ensuring you’re well-prepared for your exam. Let me know if
you’d like any adjustments or additional focus on specific topics!
Xively Overview
Registration & Account Creation: Developers must register with Xively to use its cloud services.
Device Creation: After registration, developers can create multiple devices for their IoT apps using pre-built
templates in Xively’s web interface.
Unique FEED_ID: Each connected device gets a unique FEED_ID, which specifies the data stream and
metadata of the device.
Permissions: Available permissions for connected devices include Create, Update, Delete, and Read.
API-Based Control: Permissions on IoT devices are managed via Xively’s available APIs.
Bidirectional Channels: After connecting a device, one or more bidirectional channels are created for data
exchange.
Communication: Devices use Xively APIs to create communication-enabled products, facilitating data flow.
Ease of Implementation: Simple to integrate into device hardware acting as clients to Xively web services.
Services Provided: APIs support logging, sharing, and displaying sensor data.
Protocols: Supports REST, WebSockets, and MQTT protocols for device-cloud connectivity.
SDKs: Provides native SDKs for Android, Arduino, ARM mbed, Java, PHP, Ruby, and Python.
Prototyping & Deployment: Tools for workflow including prototyping, deployment, and management.
Interface Options: Supports Python, HTML5, Tornado, WebSocket Server, and RPC (Remote Procedure Call).
Data Structure: Users, feeds, data streams, data points, and triggers.
Data Streams: Individual sensors associated with a location (e.g., temperature, light, power usage).
Data Structures: Tabular, spreadsheet, Excel-like formats, and text with comma-separated values.
Overview:
Purpose: Xively PaaS collects and processes IoT system data in the cloud.
Framework Choice: Django, a Python-based web application framework, is ideal for building IoT applications
backed by Xively or other data collection systems.
MTV Architecture: Based on Model-Template-View pattern, separating data models, business logic, and user
interface.
Database Flexibility: Unified API allows seamless work with different databases without code changes.
Powerful Ecosystem: Leverages Python’s extensive libraries and ecosystem for enhanced functionality.
Django Components:
Model: Defines stored data and interacts with the database (relational, non-relational, XML, etc.).
Template: HTML-based files with placeholders for dynamic content, supporting multiple formats like XML,
CSS, JavaScript, and CSV.
View: Manages data display and user interface logic, linking models and templates.
Django Advantages:
URL Dispatcher: Uses regular expressions for efficient URL mapping and request handling.
Registration: Developers must register and create an account with Xively to use its cloud services.
Device Creation: After registration, developers create devices for their IoT app using templates provided on
the Xively Web Interface.
Unique FEED_ID: Each connected device is assigned a unique FEED_ID specifying data streams and metadata.
API Permissions: Permissions for devices (Create, Update, Delete, Read) are assigned using Xively APIs.
Bidirectional Channels: Devices connect via bidirectional channels to Xively Cloud for data exchange.
Xively APIs: Devices use these APIs to enable communication between IoT products.
SDKs: Available for Android, Arduino, ARM mbed, Java, PHP, Ruby, Python.
Django Components
View: Connects models and templates, handling data retrieval and display.
API Working
Types of APIs
Principles:
1. Amazon EC2: Launch instances using AMI-ID, instance type, security groups.
5. Amazon DynamoDB: Create tables with defined schemas and read/write capacities.
Infrastructure: Runs on Amazon EC2 with 50,000+ smart devices (Arduinos, Raspberry Pis, BeagleBoards,
etc.).
Device Credentials: Each device assigned a unique 36-character UUID and secret token.