0% found this document useful (0 votes)
21 views45 pages

Wa0006.

The document provides an overview of the Internet of Things (IoT), detailing its definition, examples, and the differences between IoT and Machine-to-Machine (M2M) communication. It outlines the seven-layer architecture of IoT, including physical devices, connectivity, edge computing, and data processing, as well as the role of cloud computing and various protocols used in IoT systems. Additionally, it discusses cloud access, types of clouds, and connectivity methods for IoT devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views45 pages

Wa0006.

The document provides an overview of the Internet of Things (IoT), detailing its definition, examples, and the differences between IoT and Machine-to-Machine (M2M) communication. It outlines the seven-layer architecture of IoT, including physical devices, connectivity, edge computing, and data processing, as well as the role of cloud computing and various protocols used in IoT systems. Additionally, it discusses cloud access, types of clouds, and connectivity methods for IoT devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

Introduction to IoT

 We have internet connectivity in office, home, in pocket with


smartphone, laptop, etc.
 We use internet for browsing and lot of information available for
many enterprises, industrial and consumer products, government
services, educational services and many more.
 Internet of Things is IoT, which is an interconnected network of
machines and applications that we use in our daily routine life.
 IoT means, the network controlling functions of these things related
with their interdependence automatically, it does not have any
dependency on internet connectivity.
 Example of IoT: Smart refrigerators, which inform about the
consumed items or empty bottles in the fridge and also order them
online before they runs out.
• The automotive companies like Ford, Tesla has already stepped into
the world where Car would also is the part of IoT.
• The car can upgrade itself automatically by downloading and
installing the latest firmware and software.
• It has 18 sensors to automate the things and it can fix a service
schedule at the car service station by itself.
• A very popular device, the Smart Phones, are the most common
example of IoT.
• We can say Smart Phone is one of the first few "Things" in the
'Internet of Things‘.
M2M and/or IoT
M2M
 M2M or machine-to-machine communication, derived from telemetry
technology which refers to data exchange between various devices through
the Internet without human interaction.
 As predecessor to the loT, M2M has been used as the standard technology
in telemetry even before the invention of the Internet itself.
 M2M is simple device to device communication within an embedded
software at user site.
 It is isolated system with restricted scalability options.
 M2M is also referred to as Industrial IoT (IIoT) is used by high-tech
companies.
 Practical examples of M2M are remote maintenance and remote
monitoring of machines and devices, vending machine, industrial tracking
of goods/raw materials, waste control in engineering etc.
IoT
IoT
• In IoT, there is inter conversation between all appliances.
• That means IoT integrates devices, data and applications
across varying standards.
• Compared to M2M, IoT is essentially more scalable.
• In IoT usually all devices require internet connection.
• IoT technology is highlighted with smartness of objects and
network.
• IoT and M2M technologies both provide solutions for
collection, storage and exchange of data between devices
under minimal human supervision.
Seven Layer Architecture of
IoT
The building blocks of IoT are sensory devices, remote service request,
communication networks and processing of events,
1. Physical Devices: The "things" in "internet of things" is referred to
these physical devices or controllers as they are responsible for
sending and receiving data.
2. Connectivity: It connects with the devices of the first layer
implementing the protocols according to the compatibility of
various devices.
3. Edge Computing: Edge computing is used for data formatting
which makes sure that the succeeding layer can make sense of the
data sets.
4. Accumulation: Sensor data is always changing. It collects and
converts the required data.
5. Data Abstraction: In this layer, the relevant data is processed for
following specific properties related to the stored data.
6. Application: The purpose of the application layer is data processing.
So all the IoT modules can access data. Software and hardware layer
are linked with this later.
7. Collaboration: In this layer, response or action are offered to
provide assistance for the given data.
Description of seven layers of IoT architecture
1. Sensors: Sensors and other data-collecting devices form the initial
layer of any IoT system.
 These are the interface between the real and digital world hence are
responsible to convert analog to digital signals.
 There are different sensory devices such as meters, sensors, probes,
gauges and actuators that can read parameters like temperature,
distance, location, humidity, etc.
 These devices are installed on endpoints (things) and collect required
parameters in the form of raw data.
2. Sensors to Gateway Network: This layer is the first
network layer of any IoT system.
 It is responsible for the transmission of data from the first
layer (sensors) to the third layer (gateways).
 The data is transferred from sensors to gateways through a
specific communication protocol with its unique rules,
syntax, semantics and synchronization standards.
 The data transfer can only occur if both the sensors and
gateway support the transmission protocol.
 Some common protocols that are used for connecting
sensors with gateways are like BLE, LoRaWAN, ZigBee
and Sigfox
3. Gateways: Gateways are data aggregators that collect data
from the sensors and send it to a backend system.
• They are basically routers or modems that act as an
interface between the local sensor environment and the
internet.
• They collect data from sensors within their range and
transmit it to a data ingesting platform.
• The need for gateways and sensor-to-gateway networks is
eliminated if the sensory device itself has a built-in gateway
or in other terms is capable of transmitting data to large
distances on its own.
• In such a case, the sensory device only requires to read data
and send it to a backend system.
4. Gateways to Internet Network:
 Similar to the sensor to gateway network, this
network facilitates the transmission of data from
gateway to the internet/backend systems.

This network may span over a wide area allowing


the transmission of data to far-off locations.

The protocols generally used for such a wide-


spread network are ethernet, Wi-fi satellite, or
cellular network.
5. Data Ingestion and Information Processing:
• In this layer, the raw data collected from the
previous four layers is converted into meaningful
information.

• The data in most cases is stored in cloud storage


and accessed through the backend system of a
mobile app or web application.

• The ingested data is processed via advanced


analytics and other processing systems into value-
added information which is displayed on the
screens of the user.
6. Internet to User Network:
• This is the final network layer of any end-to-end
IoT system.

• The raw data stored in the cloud system is called


by this network and displayed on the screen of the
user in the form of value-added information.

• The protocols that are generally used for accessing


the data from cloud storage systems are internet,
ethernet and Wi-Fi,
7. Value-added Information:
• This final layer acts as the frontend of the whole IoT
system.
• The collected data and value-added information is
displayed on the screen of the users, allowing them to track
the parameter pertaining to the asset they want to monitor.
• The information can be displayed in the form of numbers,
graphs, alerts, or charts; enabling the user to derive useful
insights and make smart decisions.
• The information can be accessed from any smart device
such as a smartphone or desktop via a unique IoT platform
that is designed with features like real-time alert systems,
analytics and remote monitoring.
Role of Cloud in loT
• IoT Cloud computing enables users to perform
computing tasks using services provided over the
Internet with many connectivity options.
• Developers use IoT cloud computing on-demand.
• The only requirement is Internet access.
• Based on the request, users can scale the service
according to their needs. Fast and flexible means
expansion of storage space, edit software settings,
and work with number of users.
• Increase in IoT devices and automation emerges
security concerns.
• Cloud provide companies with reliable
authentication and encryption protocols.
• A growing network of objects with IP addresses is
needed to connect to the Internet and exchange data
between the components of the network.
• In online game streaming where perceived delay is an
important factor for user satisfaction, a light and
context-aware IoT middleware that smartly selects
the nearest Content Distribution Network (CDN) can
reduce the overall delay in continuing the game.
Cloud Topologies
• The role of cloud computing in IoT is to store IoT data, providing
easy access when needed.
• Cloud computing is an easy way to move large data packets across
the Internet generated by the IoT
• Cloud computing is an application-based software infrastructure that
stores data on remote servers, which can be accessed through the
internet.
• Cloud computing it is divided into front-end and backend.
• The front end enables a user to access data stored in the cloud using
an internet browser or a cloud computing software.
• The primary component of cloud computing, responsible for securely
storing data and information, is the backend comprising of servers,
computers, databases and central servers.
• It uses protocols, software, middleware, to ensure seamless
connectivity between devices computers linked via cloud computing.
There are three types of cloud computing:
• Infrastructure as a Service (IaaS): In this model, cloud providers
offer computers, as physical or more often as virtual machines, and
other resources.
• Platform as a Service (PaaS): In this model, cloud providers
deliver a computing platform typically including the operating
system, programming language execution environment, database,
and web server.
• Software as a Service (SaaS): In this model, cloud providers
install and operate application software in the cloud, and cloud
users access the software from cloud clients.
• The cloud users do not manage the cloud infrastructure and
platform on which the application is running. This eliminates the
need to install and run the application on the cloud user's own
computer, simplifying maintenance and support.
Cloud Access
• The cloud refers to servers that are accessed over
the internet and the software and databases that run
on those servers.
• Cloud servers are located in data centers all over
the world.
• In cloud computing, users and companies do not
have to manage physical servers themselves or run
software applications on their own machines.
• The cloud enables users to access the same files and
applications from almost any device because the
computing and storage takes place on servers in a
data center, instead of locally on the user device.
• For example, a user can log into their Instagram
account on a new phone after discarding their old
phone and still find their old account in place, with all
their photos, videos and conversation history.
• It works the same way with cloud email providers
like Gmail or Microsoft Office and with cloud
storage providers like Dropbox or Google Drive.
Types of Cloud
The most common cloud types according to server are:
(i) Private cloud: A private cloud is a server, data center, or
distributed network wholly dedicated to one organization.
(ii) Public cloud: A public cloud is a service run by an
external vendor that may include servers in one or
multiple data centers, which are shared by multiple
organizations. Using virtual machines, individual servers
may be shared by different companies, situation that is
called "multitenancy" because multiple tenants are
renting server space within the same server.
(i) Hybrid cloud: Hybrid cloud deployments combine
public and private clouds. An organization may use
their private cloud for some services and their
public cloud for others, or they may use the public
cloud as backup for their private cloud.
(ii) Multicloud: Multicloud is a type of cloud
deployment that involves using multiple public
clouds. In other words, an organization with a
multicloud deployment rents virtual servers and
services from several external vendors to continue
the analogy used above, this is like leasing several
adjacent plots of land from different landlords.
Multicloud deployments can also be hybrid cloud
and vice versa.
• A cloud access security broker (CASB) is a software tool or
service that sits between organization's on-premises
infrastructure and a cloud provider's infrastructure.
• CASB’s that deliver security is in the path of data access, in
between the user and the cloud.
Protocols in loT
• From the network and communication point of view, IoT can be
viewed as an combination of different networks.
• In IoT protocol, there are four layers
(i) Physical and Link layer,
(ii) Network layer,
(iii) Transport layer and
(iv) Application layer.
(i) Physical and link layer:
 Seamless connectivity is a key requirement for IoT.
 Network-communication speed, reliability and connection durability
will impact the overall loT performance.
 With high-speed mobile networks like 5G and the higher availability
of local and urban network communication protocols such as Wi-Fi,
Bluetooth and WiMax creating an interconnected network of objects
seems feasible.
(ii) Network layer
• Based on the device's specification like memory, CPU,
storage, battery life etc. the communication means and
protocols are different.
The commonly used communication protocols:
1. RFID,
2. IEEE 802.11 (WLAN),
3. IEEE 802.15.4 (Zigbee),
4. Near Field Communication (NFC),
5. IEEE802.15.1 (Bluetooth),
6. Low-power Wireless Personal Area Networks
(6LOWPAN) , etc.
(iii)Transport layer and Application layer
Protocols in IoT can be classified into three categories:
1. General-purpose protocols like IP and SNMP (Simple
Network Management Protocol) have been used to
manage, monitor, configure network devices and establish
communication links.
2. Lightweight protocols such as COAP that have been
developed to meet the requirements of constrained
devices with tiny hardware and limited resources.
3. Device- or vendor-specific protocols and APIs(application
programming interface) that usually require a certain
build environment and toolset.
• There are various protocols available to implement IoT.
The few of them are AMP COAP, DDS etc.
Advanced Message Queuing Protocol (AMQP)
• A software layer that creates interoperability between
messaging middleware. It helps a range of systems and
applications work together, creating standardized messaging
on an industrial scale.
Constrained Application Protocol (CoAP)
• A constrained-bandwidth and constrained-network protocol
designed for devices with limited capacity to connect in
machine-to-machine communication. CoAP is also a
document-transfer protocol that runs over User Datagram
Protocol (UDP).
Data Distribution Service (DDS)
• A versatile peer-to-peer communication protocol that does
everything from running tiny devices to connecting high-
performance networks.
Cross Connectivity Across Iot System
Components
• Sensors are connected with computation layers and intelligent layers
via network or connectivity layers.
• IoT endpoints need to be connected with various other components
seamlessly.
• Based on the scale of the implementations, IoT components can be
connected over LANS. MANS or WANS
• It can also be connected through telephony networks like LTE (Long
Term Evolution popularly known as 4G Network) or light-based
technologies like Li-Fi.
• For local use cases, Bluetooth and Wi-Fi can also be used.
• An IoT network consists of various network components like routers,
gateways, switches various network protocols etc.
Device to Gateway-Short Range Wireless
• Gateways are required for connecting small low-power short
range devices.
• The smartphone becomes a temporary gateway when it
approaches the sensor/ device e.g. an access control system
where the phone is used to authenticate the access to Internet
services.
• An access point is a device that creates a wireless local area
network or WLAN, usually in an office or large building.
• An access point connects to a wired router, switch, or hub via
an Ethernet cable and projects a Wi-Fi signal to a designated
area.
• Thus, one can have Device to Gateway short range wireless
communication through cellphone as gateway or dedicated
wireless access points.
Gateway to Cloud
• Long-range wireless IoT technologies form the basis for a
Low Power Wide Area Network (LPWAN).
• The protocols are specially designed for long range
capabilities and sending small amounts of data from
numerous low power devices such as sensor endpoints at
longer intervals.
• From gateway to cloud, fast communication network
connectivity may be selected from wired LAN, cellular
network, satellite links or Wide Area Networks (WAN).
• For example if IoT is in terrestrial area, one has to choose
satellite links or Hybrid terrestrial satellite systems for
gateway to cloud communication.
Direct Device to Cloud Connectivity
• Direct device to cloud message is a sort of envelope.
• It takes your telemetry and/or alert data and sends it as a message to Iot
Hub for configuration of the device.
• If device is new to IoT, telemetry is the process of acquiring, measuring
and sending data from device.
• The term peer to peer (P2P) describes an architecture that creates a two
way command and data connection directly with the installed loT device,
hence the term 'Direct Device' is used.
• It should operate in the absence of the Internet, particularly during
equipment commissioning, be used from different geographic regions,
which may require language, currency or measurement unit conversions
and only be accessed by authenticated users, or only send their data to
authenticated servers.
• Direct device to cloud connectivity is cost effective compared to LAN,
WAN, Cellular connectivity.
Networking Technologies
Low Power Local Area Networking (LPLAN)
• A Local Area Network (LAN) is a private network that
connects computers and devices within a limited area like a
residence, an office, a building or a campus.

• On a small scale, LANS are used to connect personal


computers to printers.

• Low power local area networking (LPLAN) have limited


scope in IoT applications.
LPWAN technologies
• A low-power wide-area network (LPWAN) is a type of
wireless telecommunication wide area network designed to
allow long-range communications at a low bit rate among
things, such as sensors operated on a battery.

• LPWAN data rate ranges from 0.3 kbit/s to 50 kbit/s per


channel.

• A LPWAN may be used to create a private wireless sensor


network.
Low Power Wide Area Networking (LPWAN) Technologies
• Low-Power Wide-Area Networks (LPWAN) are available now from
NB-IoT, LTE-M LoRaWan, Sigfox, Weightless, InGenu and many
more.
• These networks have applications in IoT for smart buildings and
homes, smart cities asset tracking and agriculture applications.
• It has about 400 member companies throughout.
• LoRa WAN is the open-standard networking layer governed by the
LoRa Alliance.
• Basically, LoRa is the physical layer; the chip.
• LoRa WAN is the MAC layer.
• NB-IoT focuses specifically on indoor coverage, low cost,
long battery life and high connection density.

• NB-IoT uses a subset of the LTE standard, but limits the


bandwidth to a single narrow band of 200 kHz.

• Iot applications which require more frequent


communications will be better served by NB-IoT, which
has no duty cycle limitations.
Cat-M
• Category M1 (Cat M1) is a low-power wide area (LPWAN)
cellular technology that is built specifically for IoT projects.
• Low power requirement helps to minimize data cost and
improve project efficiency.
• Low to medium data and usage and benefit from reduced
battery and power consumption.
• Low power consumption decreases maintenance costs
drastically compared to other connectivity options like 3G and
satellite.
• Agricultural IoT projects covering a wide geographic region,
relying on connected sensors that infrequently send small to
medium data loads, use Cat M1 to bring additional efficiency
to their operation.
• What are IoT gateways?
• Gateways are part of the technology of IoT that can be
used to help connect IoT devices to the cloud. Though
not all IoT devices require a gateway, they can be used
to establish device-to-device communication or
connect devices that are not IP based and cannot
connect to the cloud directly. Data collected from IoT
devices moves through a gateway, gets preprocessed
at the edge and then gets sent to the cloud.
• Using IoT gateways can lower latency and reduce
transmission sizes. Having gateways as part of your IoT
protocols also lets you connect devices without direct
internet access and provide an additional layer of
security by protecting data moving in both directions.
• User Datagram Protocol (UDP)
• A communications protocol that enables process-to-process communication and runs on top of IP. UDP improves
data transfer rates over TCP and best suits applications that require lossless data transmissions.
• Network layer
• The network layer of an IoT protocol helps individual devices communicate with the router.
• IP
• Many IoT protocols utilise IPv4, while more recent executions use IPv6. This recent update to IP routes traffic across
the internet and identifies and locates devices on the network.
• 6LoWPAN
• This IoT protocol works best with low-power devices that have limited processing capabilities.
• Data link layer
• The data layer is the part of an IoT protocol that transfers data within the system architecture, identifying and
correcting errors found in the physical layer.
• IEEE 802.15.4
• A radio standard for low-powered wireless connection. It is used with Zigbee, 6LoWPAN and other standards to
build wireless embedded networks.
• LPWAN
• Low-power wide-area networks (LPWAN) networks enable communication across distances of 500 meters to over
10 km in some places. LoRaWAN is an example of LPWAN that is optimised for low power consumption.
• Physical layer
• The physical layer is the communication channel between devices within a specific environment.
• Bluetooth Low Energy (BLE)
• BLE dramatically reduces power consumption and cost and maintains a similar connectivity range as classic
Bluetooth. BLE works natively across mobile operating systems and is fast becoming a favorite for consumer
electronics due to its low cost and long battery life.
• Ethernet
• This wired connection is a less expensive option that provides fast data connection and low latency.
• Long-term evolution (LTE)
• A wireless broadband communication standard for mobile devices and data terminals. LTE increases the
capacity and speed of wireless networks and supports multicast and broadcast streams.
• Near field communication (NFC)
• A set of communication protocols using electromagnetic fields that allows two devices to communicate from
within four centimeters of each other. NFC-enabled devices function as identity keycards and are commonly
used for contactless mobile payments, ticketing and smart cards.
• Power Line Communication (PLC)
• A communication technology that enables the sending and receiving of data over existing power cables. This
allows you to both power and control an IoT device through the same cable.
• Radio frequency identification (RFID)
• RFID uses electromagnetic fields to track otherwise unpowered electronic tags. Compatible hardware supplies
power and communicate with these tags, reading their information for identification and authentication.
• Wi-Fi/802.11
• Wi-Fi/802.11 is a standard in homes and offices. Although it is an inexpensive option, it may not suit all scenarios
due to its limited range and 24/7 energy consumption.
• Z-Wave
• A mesh network using low-energy radio waves to communicate from appliance to appliance.
• Zigbee
• An IEEE 802.15.4-based specification for a suite of high-level communication protocols used to create personal
area networks with small, low-power digital radios.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy