Chapter 1
Chapter 1
INTRODUCTION TO
INTERNET OF THINGS
1
“Internet of Things, 2nd Edition”
Shriram K Vasudevan, Abhishek S Nagarajan, & RMD Sundaram
Copyright 2020 Wiley India Pvt. Ltd. All rights reserved.
AGENDA
• DEFINITION OF IOT
• HISTORY, BIT
• APPLICATION AREAS
• STATISTICS
• CHARACTERISTICS OF IOT
• THINGS IN IOT (WHAT MAKES IOT)
• ENABLING TECHNOLOGIES
• ARCHITECTURE OF IOT
• IOT AND SENSORS – AN OVERVIEW.
IOT DEFINITION, HISTORY, CHARACTERISTICS, APPLICATION
SECTORS.
HTTPS://YOUTU.BE/IC63-YF-ZUC
LETS DEFINE IOT…
“IoT refers to the interconnection via the Internet of computing devices embedded in
everyday objects, enabling them to send and receive data”
See the term, data!! Data is everything!!!
IEEE has a definition to enhance the understanding. IEEE defines IoT as “A network of
items—each embedded with sensors—which are connected to the Internet.”
• IN 2016 (YOU GUYS CAN TELL THIS!!) – ABOUT 2.5 BILLION MOBILE PHONES ARE
CONNECTED TO INTERNET!
CONTD.,
Anyone IoT enables the objects (which eventually are the things) to be
Any service / Any business sensed, while also controlling it remotely, which enables better
interaction of physical world to the computers. This would
Any Network (Non improve the efficiency, accuracy with limited human
homogenous) intervention.
1. CONNECTIVITY -- THINGS IN IOT SHOULD BE CONNECTED TO THE INFRASTRUCTURE AND CONNECTIVITY IS AN IMPORTANT
CHARACTER/REQUIREMENT FOR AN IOT INFRA. ANYONE, ANYWHERE, ANYTIME – CONNECTIVITY SHOULD BE GUARANTEED IN THE IOT
INFRA. WITHOUT CONNECTION, NOTHING MAKES SENSE! (I SAY THAT, THINGS ARE CONNECTED AND THEY NEED CONNECTIVITY)
2. INTELLIGENCE AND IDENTITY -- THE EXTRACTION OF KNOWLEDGE (I.E. WHAT IS TO BE INFERENCED) FROM THE GENERATED DATA IS
VERY IMPORTANT. SENSORS GENERATE DATA, THE DATA IS TO BE INTERPRETED PROPERLY! EACH IOT DEVICE HAS AN UNIQUE
IDENTITY (REMEMBER IP ADDRESS). THIS IDENTITY IS HELPFUL IN TRACKING THE EQUIPMENT AND AT TIMES TO QUERY THE STATUS.
3. SCALABILITY – THE NUMBER OF THINGS (DEVICES) GETTING CONNECTED TO IOT INFRA IS GETTING INCREASED DAY BY DAY. HENCE,
AN IOT SETUP SHALL BE CAPABLE TO HANDLE THE MASSIVE EXPANSION. ALSO, THE DATA GENERATED SHALL BE MASSIVE AND IT
SHOULD BE HANDLED APPROPRIATELY.
4. DYNAMIC AND SELF ADAPTING (COMPLEXITY) – THE IOT DEVICES SHOULD DYNAMICALLY ADAPT ITSELF TO THE CHANGING
CONTEXTS. ASSUME A CAMERA MEANT FOR SURVEILLANCE. IT MAY HAVE TO WORK IN DIFFERENT CONDITIONS AS DIFFERENT LIGHT
SITUATIONS (MORNING, AFTERNOON, NIGHT)
6. SAFETY - HAVING GOT ALL THE THINGS CONNECTED TO INTERNET, THE PERSONAL DATA (IF SENSITIVE) IS UNDER THREAT. HENCE,
SECURING THE DATA IS A MAJOR CHALLENGE . NOT ONLY DATA SECURITY, THE EQUIPMENT GETTING INVOLVED IN IOT NETWORK IS
HUGE. HENCE, PERSONA SAFETY IS ALSO TO BE CONSIDERED. PRIVACY WITH PROTECTION!
END OF SESSION – 1
WE SHALL MEET IN THE NEXT SESSION WITH MORE INPUTS!!!
THINGS IN IOT
THINGS IN INTERNET OF THINGS
• THINGS REFER TO VARIETY OF DEVICES. NOT REALLY
JUST ONE DEVICE BECOME THINGS.
• HOME WORK: WHAT COULD BE THE THINGS IN SMART RETAIL ENVIRONMENT? GUESS!
IOT ARCHITECTURE (STACK), IOT ENABLING
TECHNOLOGIES
HTTPS://YOUTU.BE/IXTBXZD6JAO
IOT STACK
• OVERALL, WE CAN UNDERSTAND THAT THE ENABLING TECHNOLOGIES/DEVICES SHALL FALL UNDER ANY OF THE
FOLLOWING SECTIONS:
• TECHNOLOGIES HELP IN ACQUIRING DATA / SENSING DATA
• TECHNOLOGIES THAT HELP IN ANALYSING DATA / PROCESSING DATA
• TECHNOLOGIES THAT HELP IN TAKING CONTROL ACTION
• TECHNOLOGIES THAT HELP IN ENHANCING THE SECURITY / PRIVACY
CONTD.,
• SENSORS:
• EXAMPLES ALWAYS HELP!
• THE HOME SECURITY SYSTEMS USE THE CAMERA AND IT IS A SENSOR!
• WEATHER TRACKING SYSTEM COULD USE THE TEMPERATURE / HUMIDITY /MOISTURE SENSORS AND THE DATA
COULD BE ANALYSED.
• VEHICLE HEALTH MONITORING SENSORS LIKE SPEED, TYRE PRESSURE ETC.
• OBDS (ELM 327 – AN EXAMPLE) FOR COLLECTING ALL CRITICAL INFORMATION FROM THE AUTOMOBILE TO
DETECT ANOMALIES.
• SENSORS TO TRACK THE QUALITY OF THE BUILDINGS/STRUCTURES – VIBRATION SENSORS.
• WATER QUALITY MONITORING THROUGH PH, TURBIDITY, CHLORIDE LEVEL DETECTION USING SENSORS.
• PEDESTRIAN SIGNAL OPERATION WITH HUMAN PRESENCE DETECTION WITH PIR SENSOR
CONTD.,
Software-as-a-Service (SaaS): Complete software
application as a service is provided to the user.
(you can call it application as a service as well,
• CLOUD COMPUTING: pay monthly, yearly etc. as subscription)
• WELL, YOU GUYS KNOW THIS BETTER THAN ME.
• ALL MY DATA GOES TO ADAFRUIT CLOUD AS IT IS FREE
Platform-as-a-Service (PaaS): Development
tools, APIs, libraries etc. will be provided by the
• COULD BE ONE OF THESE:
cloud service provider. Users have to build,
• IAAS (INFRASTRUCTURE AS A SERVICE) manage and maintain the applications (provides
• PAAS (PLATFORM AS A SERVICE) platform to develop)
• SAAS (SOFTWARE AS A SERVICE)
Infrastructure-as-a-Service (IaaS): Virtual
• SOME EXAMPLES:
Machines kind of support. Users shall manage
• AMAZON WEB SERVICES the machines. Users shall select the OS and
• AZURE underlying applications. PAY as YOU use! (with
• ADAFRUIT AND MANY MORE IaaS approach, you choose virtual machines over
physical machines)
CONTD.,
• BIG DATA – VERY BIG DATA!! (DATA ANALYTICS)
• SOME MAKE IT 3VS. SOME MAKE IT 4VS.
• 1-SCALE (VOLUME) – HUGE VOLUME OF DATA GENERATED EVERY MINUTE! STORAGE HAS BECOME CHEAPER, HENCE WE SURVIVE!
• 2-COMPLEXITY (VARIETY) – DATA IS IN DIFFERENT FORMATS. SAY AUDIO, VIDEO, TEXT, IMAGE AND MANY MORE.
• 3-SPEED (VELOCITY) – RATE AT WHICH DATA IS GENERATED IS VERY FAST. ALSO, CHANGE IN THE DATA DYNAMICS IS VERY HIGH.
• 4- DATA IN DOUBT (VERACITY) – THE DATA’S NATURE IS GETTING CHANGED QUICKLY AND AMBIGUITY IS SEEN (INCOMPLETE DATA)
• PROTOCOLS FOR LINK LAYER (ETHERNET), NETWORK LAYER (IP), TRANSPORT LAYER (TCP/UDP), APPLICATION LAYER (MQTT, HTTP, XAMPP) ARE
TO BE DISCUSSED.
• A DETAILED ANALYSIS OF THE PROTOCOLS SHALL BE PRESENTED SOON!
CONTD.,
• USER INTERFACES
• ANY DEVICE MUST HAVE AN INTUITIVE USER INTERFACE.
• IOT DEVICES / SERVICES ARE FINALLY TO BE USED BY THE END USER AND IT SHOULD
BE DESIGNED IN SUCH A WAY THAT, ACCESSING AND USING THE SERVICES ARE EASIER
AND COMFORTABLE.
• MOST OF THE CASES, THE END USER SHALL BE PROVIDED WITH “MOBILE
APPLICATION OR WEB APP”. THE APPLICATION SHOULD BE CONSISTENT AND SHOULD
NOT BE CLUMSY.
IOT CHALLENGES
HTTPS://YOUTU.BE/JZV7KKX1HDG
IOT CHALLENGES
• CHALLENGES ARE REALLY PLENTY, WHEN IT COMES TO IOT! LET’S LEARN THEM,
ONE AFTER ANOTHER! (THESE CHALLENGES ARE YOUR OPPORTUNITIES)
CHALLENGE – 1
SECURITY / PERSONNEL SAFETY
• VERY HIGH RATED / MOST IMPORTANT CHALLENGE.
• MORE NUMBER OF DEVICES ARE USED IN THE IOT INFRA AND THIS IS A CHALLENGE.
• USER DATA COULD BE VULNERABLE FOR THEFT.
• PEOPLE’S PERSONAL SAFETY IS A CONCERN AN CHALLENGE TOO (IMPLANTS, SENSORS)
• SINCE, MANY DEVICES ARE IN THE LOOP, ONE DEVICE IF GETTING ATTACKED, REST OF THE
DEVICES COULD ALSO BE ATTACKED.
• POOR SECURITY FEATURES CAN LET THE ATTACKERS DAMAGE THE WHOLE NETWORK.
DATA PERSONNEL
SECURITY SAFETY
CHALLENGE – 2
PRIVACY
• YOU COULD BE TRACKED / MONITORED BY ANYONE, AS YOU ARE CONNECTED 24X7 IN
THE INTERNET.
• YOU COULD BE TRACKED WITHOUT YOUR PERMISSION IN PLACE.
• SO, THERE IS A THREAT! – HOW DO WE DEAL WITH IT ? IT IS A CHALLENGE FOR SURE!
I NEED PRIVACY
CHALLENGE – 3
DATA EXTRACTION FROM COMPLEX
ENVIRONMENTS
• HOW TO SENSE INFORMATION (I.E. MEASURE THE DATA) FROM THE COMPLEX
ENVIRONMENTS?
• FOR AN INSTANCE, HOW TO SENSE THE DATA (TEMPERATURE/HUMIDITY ETC) DURING
TRANSPORT FROM A TRANSPORT VEHICLE? ASSUME, A VERY TEMPERATURE
SENSITIVE MATERIAL IS BEING TRANSPORTED!
CHALLENGE – 4
CONNECTIVITY
• REQUIREMENT OF WIRED AND WIRELESS CONNECTIVITY!
• USAGE FREQUENCY / SPECTRUM IS ALSO TO BE REMEMBERED (2.4 GHZ BAND IS
OBVIOUS BAND EVERYWHERE)
CHALLENGE – 5
POWER REQUIREMENTS
• ALL THE IOT DEVICES NEED POWER. MOST OF THEM ARE BATTERY OPERATED.
• THANKS TO LONG LASTING BATTERIES!
• HOWEVER, DEMAND FOR POWER IS EVER ON THE RISE AND USAGE OF GREEN POWER
SOURCES LIKE SOLAR/WIND IS TO BE MOTIVATED.
CHALLENGE – 6
COMPLEXITY INVOLVED
• IOT IS NOT EASIER!
• WHY SO?
• NEEDS LOT OF DIFFERENT DOMAINS TO COME TOGETHER.
• LIMITED EXPERTISE IN THE MARKET. (RAPID GROWTH)
• THE TOOLKITS, SOFTWARE, HARDWARE NOT ABUNDANT. (NEED AWARENESS)
CHALLENGE – 7
STORAGE (CLOUD)
• CLOUD IS BECOMING MANDATORY! (FOR STORAGE)
• PROBLEM IS,
• WHICH CLOUD TO USE?
• HOW TO IDENTIFY?
• HOW MUCH DOES IT COST?
• DO WE REALLY NEED CLOUD?
END OF SESSION – 4
WE SHALL MEET IN THE NEXT SESSION WITH MORE INPUTS!!!
LEVELS OF IOT
HTTPS://YOUTU.BE/RRRTYXDJWXC
LEVEL - 1
• WITH THE AMOUNT OF COMPLEXITY INVOLVED, ONE COULD CATEGORIZE IOT AS IOT LEVEL 1/2/3/4/5/6.
• WE SHALL START WITH THE SIMPLEST OF THE LEVELS, I.E. LEVEL 1.
• WHAT CAN BE THIS?
• HAVE ONE SENSOR / DEVICE TO SENSE. (COULD BE TEMP SENSOR/PRESSURE SENSOR ETC.)
• THE DATA TO BE STORED IN LOCALLY.
• DATA ANALYSIS TO BE DONE.
• MONITORING / CONTROL CAN BE DONE THROUGH AN APPLICATION (.APK OR WEBAPP)
Temperature
Air Sensor Data Collection and Control and Monitoring
conditioner Analysis Action (ON/OFF
control)
LEVEL - 2
• HERE, THE DATA IS DEFINITELY VOLUMINOUS.
• MEANS, THE FREQUENCY OF THE SENSING DONE BY SENSOR IS FASTER.
• HERE, CLOUD STORAGE IS PREFERRED AS DATA IS HUGE.
• ANALYSIS DONE LOCALLY. CLOUD MEANT FOR STORAGE ALONE.
• BASED ON THE DATA ANALYSIS, THE CONTROL ACTION CAN BE TRIGGERED THROUGH THE WEB APP OR
MOBILE APPLICATION.
• SOME EXAMPLES COULD BE: AGRICULTURE APPLICATIONS, ROOM FRESHENING SOLUTIONS BASED ON
ODOUR ETC.
Data
• REAL TIME.
• BASED ON THE DATA ANALYSIS, THE CONTROL ACTION CAN BE TRIGGERED THROUGH THE WEB APP OR MOBILE
APPLICATION.
SO, WHAT HAVE WE UNDERSTOOD?
END OF SESSION
WE SHALL MEET IN THE NEXT SESSION WITH MORE INPUTS!!!
THANK YOU!