Internet of Things
Internet of Things
UNIT-1
INTRODUCTION TO INTERNET OF
THINGS
Introduction:
The concept of a network of smart devices was discussed as early as 1982, with a modified Coke
machine at Carnegie Mellon University becoming the first internet-connected appliance, able to report its
inventory and whether newly loaded drinks were cold. Kevin Ashton (born 1968) is a British technology
pioneer who is known for inventing the term "the Internet of Things" to describe a system where the Internet is
connected to the physical world via ubiquitous sensors. IoT is able to interact without human intervention.
Some preliminary IoT applications have been already developed in healthcare, transportation, and automotive
industries. IoT technologies are at their infant stages; however, many new developments have occurred in the
integration of objects with sensors in the Internet. The development of IoT involves many issues such as
infrastructure, communications, interfaces, protocols, and standards. The objective of this paper is to give
general concept of IoT, the architecture and layers in IoT, some basic terms associated with it and the services
provided. The below fig 1.1 give an example things connected to internet.
The IOT concept was coined by a member of the Radio Frequency Identification (RFID) development
community in 1999, and it has recently become more relevant to the practical world largely because of the
growth of mobile devices, embedded and ubiquitous communication, cloud computing and data analytics
Definition of IoT:
The Internet of Things (IoT) is the network of physical objects—devices, instruments,
vehicles, buildings and other items embedded with electronics, circuits , software, sensors and network
connectivity that enables these objects to collect and exchange data. The Internet of Things allows objects to be
sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct
integration of the physical world into computer-based systems, and resulting in improved efficiency and
accuracy.
IoT refers to the interconnection via the internet of computing devices embedded in everyday objects, enabled
them to send and receive the data.
A dynamic global network infrastructure with self- configuring capabilities based on standard and
interoperable communication protocols, where physical and virtual “things” have identities, physical
attributes, and use intelligent interfaces, and are seamlessly integrated into information network that
communicate data with users and environments.
Internet Of Things
Technology:
1. Wireless Sensor Network(WSN):
• Distributed Devices with sensors used to monitor the environmental and physical
conditions
• Consists of several end-nodes acting as routers or coordinators too
• Coordinators collects data from all nodes / acts as gateway that connects WSN to
internet
• Routers route the data packets from end nodes to coordinators.
Example:
Weather monitoring system
Indoor Air quality monitoring system
Soil moisture monitoring system
Survilliance systems
Health monitoring systems Protocols:
Fig 1.12: wireless Sensors.
2. Cloud Computing:
Source of Iot:
First, sensors or devices help in collecting very minute data from the surrounding environment. All of this collected data
can have various degrees of complexities ranging from a simple temperature monitoring sensor or a complex full video
feed.
A device can have multiple sensors that can bundle together to do more than just sense things. For example, our phone is
a device that has multiple sensors such as GPS, accelerometer, camera but our phone does not simply sense things.
i. Connectivity:
Next, that collected data is sent to a cloud infrastructure but it needs a medium for transport.
The sensors can be connected to the cloud through various mediums of communication and transports such as cellular
networks, satellite networks, Wi-Fi, Bluetooth, wide-area networks (WAN), low power wide area network and many more.
Once the data is collected and it gets to the cloud, the software performs processing on the acquired data.
This can range from something very simple, such as checking that the temperature reading on devices such as AC or heaters
is within an acceptable range. It can sometimes also be very complex, such as identifying objects (such as intruders in your
house) using computer vision on video.
Next, the information made available to the end-user in some way. This can achieve by triggering alarms on their phones or
notifying through texts or emails.
Also, a user sometimes might also have an interface through which they can actively check in on their IOT system. For
example, a user has a camera installed in his house, he might want to check the video recordings and all the feeds through a
web server.
2. RFID:
• RFID is an acronym for “radio‐frequency identification”.
• As compared to traditional barcodes and QR codes, RFID tag data can be read outside the line‐of‐sight.
• The tag is covered by a protective material which also acts as a shield against various environmental effects.
• Passive tags have to be powered by a reader inductively before they can transmit information, whereas active tags
have their own power supply.
3. Wireless Sensor Networks(WSNs):
• WSN Consists of a large number of sensor nodes, densely deployed over an area.
• Sensor nodes are capable of collaborating with one another and measuring the condition of their surrounding environments (i.e.,
Light, temperature, sound, vibration).
• The sensed measurements are then transformed into digital signals and processed to reveal some properties of the phenomena
around sensors.
Applications of IoT :
1. Manufacturing industry:
The devices, equipment, workforce, supply chain, work platform are integrated and connected to achieve a
smart production. This will lead to –
• reduction in operational costs
• improvement in the productivity of the worker
• reduction in the injuries at the workplace • resource optimization and waste reduction
• end‐to‐end automation.
2. Healthcare Service industry:
Patients can be continuously monitored due to the implanted on‐body sensors. This has led to –
• improved treatment outcome
• costs has reduced
• improved disease detection
• improved accuracy in the collection of data
• improved drugs management.
To improve safety, efficiency of transportation, Intelligent Transportation system (ITS) is developed which consists of connected vehicles.
ITS provides –
• In IoT scenario the physical objects are provided with o bar codes o RFID tags
o hence, real‐time monitoring of the status and location of the physical objects from destination to the origin, across the supply
chain is possible.
To prevent accidents inside the mines ‐ RFID, Wi‐Fi and other wireless technologies are used, which
provides early warning of any disaster
• monitors air‐quality
• detects the presence of poisonous gases inside the mines
• oxygen level inside the mines.
5. Firefighting:
Consumer Iot refers to personal and wearable devices that connect to the internet.These Device are often referred to as smart
devices
Commercial Iot refers to tools and systems used outside of the home. Business and health care organisation leverage
commercial Iot for auditable data trails and consumer management
Design principle for connected devices:
Here comes the Internet of Things
• The Internet will connect billions of people through mobile and embedded smart devices.
• Real-time communication and the accessibility to any information on-line will enrich people and machines;
…
• The Internet will connect everyday things integrated into people’s every day lives. – More equipment will be
connected to the Internet than people by a factor of 8 to 1.
• IoT will integrate many industry verticals (e.g., healthcare, energy, transportations) into smart
*/city/building/home environments.
• IoT will be centric to people’s needs and every day existence.
CALM AND AMBIENT TECHNOLOGY
• the term “ambient” is not something to which we actively pay attention and in some cases as something
which we seek to remove (e.g., ambient noise in a sound recording).
• the term calm technology—systems which don’t compete for attention yet are ready to provide utility or
useful information when we decide to give them some attention.
MAGIC AS METAPHOR:
• In addition to the technology becoming capable of a particular action, we often need society, to be ready to accept
it.
• There are many examples when the main difference between a failed technology and a wildly successful one is
that the successful one arrived a few years later, when people were more receptive to what was offered.
AFFORDANCES:
When affordance are taken advantage of the user knows what to do just by looking
When simple things need pictures, labels, or instructions, the design has failed.
Internet Connectivity:
IoT connectivity is the means by which an IoT device, which can be anything from a simple sensor in a
factory to a self-driving vehicle and encompasses applications from streetlights to robots, connects to
the cloud, other devices and integration points such as IoT gateways. IoT connectivity is essential
because it enables the I of IoT, without it, devices are just things. It is the IoT connectivity that brings
value from IoT by communicating their data to enable action to be taken, services to be delivered and
revenue generated.
To delve deeper into the evolving landscape of IoT connectivity and explore the various technologies
shaping the industry
The three main technical requirements for any enterprise looking into IoT connectivity technology are
coverage, energy efficiency and data rate. No single technology can excel in all these aspects, as these
are trade-offs every radio technology faces. In addition, organizations should consider where their IoT
offerings will be provided. If you need global IoT connectivity you should adopt a connectivity technology
that is available worldwide.
Physical Design of IoT:
Things in IoT
1. Refers to IoT devices which have unique identities that can perform sensing, actuating and monitoring
capabilities.
2. IoT devices can exchange data with other connected devices or collect data from other devices and
process the data either locally or send the data to centralized servers or cloud – based application back-
ends for processing the data.
Generic Block Diagram of an IoT Device:
An IoT device may consist of several interfaces for connections to other devices, both wired and wireless. The
below Fig 1.2 shows the block diagram of an IoT Device.
Audio/video interfaces
Block Diagram of Iot device:
The IoT devices are typically connected to the Internet via an IP (Internet Protocol) network. However, devices such as Bluetooth and RFID
allow IoT devices to connect locally. In these cases, there’s a difference in power, range, and memory used. Connection through IP networks are
comparatively complex, requires increased memory and power from the IoT devices while the range is not a problem. On the other hand, non-IP
networks demand comparatively less power and memory but have a range limitation.
As far as the IoT communication protocols or technologies are concerned, a mix of both IP and non-IP networks can be considered depending on usage.
1. Link Layer
2. Network Layer
3. Transport Layer
4. Application Layer
four layer of Iot protocol
1. Link Layer:
In computer networking, the link layer is the lowest layer in the Internet protocol suite, the networking architecture of
the Internet. The link layer is the group of methods and communications protocols confined to the link that a host is
physically connected to. The link is the physical and logical network component used to interconnect hosts or nodes in
the network
and a link protocol is a suite of methods and standards that operate only between adjacent network nodes of a
network segment
2. Network/Internet Layer:
The internet layer is a group of internetworking methods, protocols, and specifications in the Internet protocol suite that are
used to transport network packets from the originating host across network boundaries; if necessary, to the destination host
specified by an IP address. The internet layer derives its name from its function facilitating internetworking, which is the
concept of connecting multiple networks with each other through gateways.
• Responsible for sending of IP datagrams from source to destination network
• Performs the host addressing and packet routing
• Host identification is done using hierarchical IP addressing schemes such as IPV4 or IPV6
IPV4
Used to identify the devices on a network using hierarchical addressing scheme Uses 32-bit address
scheme
IPV6
Used for devices with limited processing capacity, Operates in 2.4 Ghz , Data Rates of 250Kb/s.
3. Transport Layer:
In computer networking, the transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the
Internet protocol suite and the OSI model. The
protocols of this layer provide host-to-host communication services for applications. It provides services such as
connection-oriented communication, reliability, flow control, and multiplexing.
The best-known transport protocol of the Internet protocol suite is the Transmission Control Protocol (TCP). It is used for connection-oriented
transmissions, whereas the connectionless User Datagram Protocol (UDP) is used for simpler messaging transmissions.
• Provide end-to-end message transfer capability independent of the underlying network
• It provides functions such as error control, segmentation, flow-control and congestion control
Transmission Control Protocol (TCP):
• Connection Oriented
• Ensures Reliable transmission
• Provides Error Detection Capability to ensure no duplicacy of packets and retransmit lost packets
• Flow Control capability to ensure the sending data rate is not too high for the receiver process
• Congestion control capability helps in avoiding congestion which leads to degradation of n/w performance
User Datagram Protocol (UDP):
• Connectionless
• Does not ensures Reliable transmission
• Does not do connection before transmitting
• Does not provide proper ordering of messages
• Transaction oriented and stateless
4. Application Layer:
An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a
communications network. The application layer abstraction is used in both of the standard models of computer networking: the
Internet Protocol Suite (TCP/IP) and the OSI model. Although both models use the same term for their respective highest level layer, the detailed
definitions and purposes are different.
Extensible messaging and presence protocol, For Real time communication and streaming XML data between n/w entities, Used for
Applications such as Multi-party chat and voice/video calls.
Logical Design of IoT:
Logic design of an Iot system refers to an abstract representation of the entities and processe without going into the low-level
specifies of the implementation
An Iot system comprises a number of functional blocks that provide the system the capabilities for identification, sensing,
actuation, communication and management
the functional block diagram of Iot blow are individual block explanation
1. Device : Devices such as sensing, actuation, monitoring and control functions.
2. Communication : IoT Protocols
3. Services like device monitoring, device control services, data publishing services and device discovery
4. Management : Functions to govern the system
5. Security : Functions as authentication, authorization, message and content integrity, and data security Applications
Protocol:
1. Http:
• HTTP stands for HyperText Transfer Protocol.
• It is a protocol used to access the data on the World Wide Web (www).
• The HTTP protocol can be used to transfer the data in the form of plain text, hypertext, audio, video, and so on.
• This protocol is known as HyperText Transfer Protocol because of its efficiency that allows us to use in a hypertext environment
where there are rapid jumps from one document to another document.
• HTTP is similar to the FTP as it also transfers the files from one host to another host. But, HTTP is simpler than FTP as HTTP uses only
one connection, i.e., no control connection to transfer the files.
• HTTP is similar to SMTP as the data is transferred between client and server. The HTTP differs from the SMTP in the way the
messages are sent from the client to the server and from server to the client. SMTP messages are stored and forwarded while HTTP
messages are delivered immediately.
2. Https:
HTTPS is an abbreviation of Hypertext Transfer Protocol Secure. It is a secure extension or version of HTTP. This protocol is
mainly used for providing security to the data sent between a website and the web browser. It is widely used on the internet and used
for secure communications. This protocol uses the 443 port number for communicating the data.
This protocol is also called HTTP over SSL because the HTTPS communication protocols are encrypted using the SSL (Secure Socket
Layer).
By default, it is supported by various web browsers.
Those websites which need login credentials should use the HTTPS protocol for sending the data.
3. Ftp:
• FTP stands for File transfer protocol.
• FTP is a standard internet protocol provided by TCP/IP used for transmitting the files from one host to
another.
• It is mainly used for transferring the web page files from their creator to the computer that acts as a
server for other computers on the internet.
• It is also used for downloading the files to computer from other servers.
• It provides the sharing of files.
• It is used to encourage the use of remote computers.
• It transfers the data more reliably and efficiently.