0% found this document useful (0 votes)
294 views41 pages

Iot Notes Unit-1

Uploaded by

Smrithi Priya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
294 views41 pages

Iot Notes Unit-1

Uploaded by

Smrithi Priya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

CHAPTER_1

Introduction to IOT
What is the Internet of Things (IoT?)
IOT is also known as the Internet of things. It is the way of connecting the physical objects through
the internet to other devices. The term internet of things was given by Kevin Ashton and he
mentioned first in the year 1999. Internet of things means the time when things or objects are more
connected to the Internet rather than people. The things in IoT defined as objects that can be the
person or automobile with a built-in sensor having IP addresses with the ability to collect and
transfer the data over the Internet.
It is being widely used in organizations of different industries. It helps them to work with more
efficiency, deliver the enhanced service to a customer, improving decision making and increasing the
value of the business. It has been generally evolved from micro services, wireless and MEMS
technology. It is being evolved from M2M communication when machines connecting to each other
network without any human interference or interaction. It helps in connecting to the cloud and able
to manage and collect the data.

Understanding
It mainly consists of smart devices having embedded processor, sensor, and communication to
collect, send the data to acquire from the different environments. The devices that are connected to
the IoT hub or gateway, share the data that they collect and analyze the data locally. These devices
may connect with other devices as well and act on the information they get from another device.
These devices mainly work without any human interaction or intervention. The engineers can
interact with the device to set up and collect the information from the devices. The process is in 3
different steps which are: Collect data and Collate, transfer the data and Analyze data and the action
taken.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Why it is being Used

When separate devices are attached to the Internet, this implies sending and receiving the data and
sending the data in order to make things intelligent. With the help of IoT, all things that are being
connected to the Internet can be explained into 3 categories:

1. Collecting and Sending the Information


In this, the information has been collected and sent over the network. This is mainly done with the
help of sensors. It can be a temperature sensor, motion sensor, air quality sensor, moisture sensor,
and light sensor, etc. These sensors are automatically connected and collect or receive information
from different environments or devices that help in making the correct decisions. For example, if
farmers are able to get the information of soil moisture automatically then they are able to make the
decision when the farm needs water again and at what time and quantity as well. It helps the farmers
to provide the right amount of water rather than giving too much and little water to farms or crops.
This helps in utilizing the resources wisely and do not let the resource to be wasted. With the help of
this, a farmer can achieve more crop and money that benefits the world in terms of more food. The
sensor allows machines to sense the world.

2. Receiving and Acting


It helps in receiving the information and then acting on that information. The machines are a great
example of this area when they receive the info accordingly they act on it. For example, the printer
receives the information to print and then print it. The power of the internet of things becomes great
when they collect the information and sends it which also gets and acts on the data.

3. Doing Both
The sensors are used to collect the information without any need of people or human intervention. It
helps in achieving all that is collecting, sending and receiving and acting on the information.

Advantages
The advantages of the Internet of Things are:
1. It helps in monitoring the overall business processes.
2. It helps in improving the customer experience.
3. It helps in generating more revenue.
4. It helps in enhancing employee productivity.
5. It helps in saving time and money for the organization.
6. It helps in making better business decisions.
7. It helps in integrating and adapting business models.
8. It helps in reducing the cost.
9. It improves process efficiency, asset utilization, and productivity.
10. It benefits in real-time insights and analytics, to make better decisions.
11. It benefits people in creating opportunities in business and industries.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Applications of IoT
There are many applications of the Internet of things in various sectors like consumer IoT, enterprise
IoT & manufacturing, and industrial IoT. These applications can be telecom, energy, automotive, etc.
Smart homes, smart appliances, connected heating, lighting can be controlled with the help of
computers and mobile devices. The devices having sensor helps to collect and analyze the user data,
and sending the information to other technologies for making the life of users easy. The other
examples are smart health, smart city, smart farming, smart TV, wearable’s, smart car, etc. Smart
buildings help in reducing energy cost and helps the temperature to adjust automatically. The smart
farming system can help in monitoring the instance, light, temperature, humidity and soil moisture of
crops. It helps the smart city like streetlights, smart meters, and sanitation, etc.

Scope
The scope of it is wide and large in today’s world as everything is connected to the Internet. It
connects the devices in the various system to the Internet and the devices or objects represent
themselves can be controlled from anywhere. It helps in achieving more data and places, more ways
of increasing efficiency and improving safety and security. It helps the organization to increase the
performance through IoT analytics and security to achieve good results. There are many
organizations like oil and gas, insurance, manufacturing, transportation, infrastructure and other
retail sectors that can get the benefits from it and some are already achieving the benefits from it. The
Internet of things platform generally enables the device or object to an observer and to identify and
understand the situation without getting the help of people or any other human intervention. So, the
scope of the Internet of things is great in the future and its already showing the results as well.

IoT Security
The internet of things is connected to billions of devices with internet and a huge number of data
points are involved in collecting, transferring and sending the information. Due to its long structure
and expanded surface, the security and privacy of IoT are the huge concerns for the different
organizations. As these device are closely connected, the attacker can exploit one vulnerability to
manipulate the whole data in one go and the devices that are not updated regularly are the main
reasons for these types of attacks. Other personal information like age, address, and credit card
details, etc. is also being provided by the user when the devices are connected to each other via
various means. These devices are obtained to sell the user’s personal information. It also poses the
risk to infrastructure, electricity, transportation and financial service, etc.

Audience for Learning


The right audience for learning these are engineers, sales executives, management people,
consultants, business analysts and those who are interested in technology can learn IoT. It helps them
to learn new technologies that are coming in the world, and how things are interconnected to each
other to achieve the target without any human intervention. It helps in reducing the manual effort
and time. It has more set up cost but that can be easily adjusted by the organization they are working
for.
There are many platforms to learn it. Online community and forums are available to learn the
Internet of things. Videos are easily available to implement it and to achieve things as well.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Organizations are mainly focused on the latest thing and they are investing huge on the Internet of
things to enhance the skills of their employees and to grow their business on the priority. The internal
training and programs are being conducted by the organizations to help their employees and
customer to sense the criticality of the Internet of Things.

Importance of IoT in the Future Market


It has great importance in the future market as everything today is based on the internet and smart
devices. The Internet helps in connecting the devices to collect and send information over the
network, so it will be a very big thing in the near future. The survey showed that by 2020, there
would be around 28 billion devices that would be connected through the Internet.
Organizations are mainly targeting this network across the globe and it ensures that their products
would develop on IoT architecture only. Marketing companies also need to adopt the new trends in
the global market as some of the organizations already gained so much by adopting the Internet of
Things in their organization. This helps the organization to enhance the skills of employees and their
business growth as well. loT is adapting at a great pace and getting more attention. As per today’s
trends in the market, it is dominating the digital marketing and other various organizations as well.

Career Growth
IoT skill in different areas of the IT sector or organizations helps you in achieving good career
growth. It helps in getting a good salary and designation in every field. It provides a lot of
opportunities in the market as people are less of this skill and demand is more. High salaries are
being paid to IoT expertise people. The skill in building devices, chips that can be communicative,
gateways, cloud management, data security and domain knowledge of IoT helps people to get job
easily.

Devices should be able to sense the data, collect the information and send over the network. The
communicative chip should sense and communicate the data accurately for low and high energy. The
gateways are like Wi-Fi, Bluetooth and other wireless technology that allows the data to be collected
and send. Cloud management is used in analyzing the data and providing feedback to the critical IoT
device. It is used to extract, transform and load the data with parallel batch processing technology.
One should always improve skills in these like using sensors to capture events, transporting sensor,
storing and aggregating sensor data, analyzing the data, implementing the data analysis in the cloud,
data security and privacy as well. So, there are great opportunities for many people having one skill
and they are able to achieve more with the help of grabbing a good opportunity.

Conclusion
The Internet of things is being widely adopted technology in most of the organizations. It helps in
achieving things without any manual intervention and human help. This embedded technology helps
the object to interact with internal states or with an external environment that helps in improving the
decision-making ability. This is having both pros and cons as all the technologies are having but to
choose and invest wisely that is in our hands.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


People and organizations have achieved great things by adopting IoT. The data security and privacy
issues are the only things that organizations need to take care and it becomes one of the biggest
roadblocks to adopt IoT for many small enterprises or organizations. The world is growing digital at
a very great pace and the devices are connected to the internet all over time without any interruption.
The large networks around the globe have already expanded. The internet of things is a clear future
for the different markets, organizations, and people that want to grow in this technology field.
Internet of Things (IoT) is a network of physical objects or people called "things" that are embedded
with software, electronics, network, and sensors that allows these objects to collect and exchange
data. The goal of IoT is to extend to internet connectivity from standard devices like computer,
mobile, tablet to relatively dumb devices like a toaster.
IoT makes virtually everything "smart," by improving aspects of our life with the power of data
collection, AI algorithm, and networks. The thing in IoT can also be a person with a diabetes monitor
implant, an animal with tracking devices, etc.

What is IoT?
History of IoT
 1970- The actual idea of connected devices was proposed
 1990- John Romkey created a toaster which could be turned on/off over the Internet
 1995- Siemens introduced the first cellular module built for M2M
 1999- The term "Internet of Things" was used by Kevin Ashton during his work at P&G which
became widely accepted
 2004 - The term was mentioned in famous publications like the Guardian, Boston Globe, and
Scientific American
 2005-UN's International Telecommunications Union (ITU) published its first report on this topic.
 2008- The Internet of Things was born
 2011- Gartner, the market research company, include "The Internet of Things" technology in their
research
How IoT works?

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


How IoT Works
The entire IoT process starts with the devices themselves like smartphones, smartwatches, electronic
appliances like TV, Washing Machine which helps you to communicate with the IoT platform.

Four fundamental components of an IoT system:

1) Sensors/Devices: Sensors or devices are a key component that helps you to collect live data from
the surrounding environment. All this data may have various levels of complexities. It could be a
simple temperature monitoring sensor, or it may be in the form of the video feed.
A device may have various types of sensors which performs multiple tasks apart from sensing.
Example, A mobile phone is a device which has multiple sensors like GPS, camera but your
Smartphone is not able to sense these things.

2) Connectivity: All the collected data is sent to a cloud infrastructure. The sensors should be
connected to the cloud using various mediums of communications. These communication mediums
include mobile or satellite networks, Bluetooth, WI-FI, WAN, etc.

3) Data Processing: Once that data is collected, and it gets to the cloud, the software performs
processing on the gathered data. This process can be just checking the temperature, reading on
devices like AC or heaters. However, it can sometimes also be very complex like identifying objects,
using computer vision on video.

4)User Interface: The information needs to be available to the end-user in some way which can be
achieved by triggering alarms on their phones or sending them notification through email or text
message. The user sometimes might need an interface which actively checks their IoT system. For
example, the user has a camera installed in his home. He wants to access video recording and all the
feeds with the help of a web server.

However, it's not always one-way communication. Depending on the IoT application and complexity
of the system, the user may also be able to perform an action which may create cascading effects.
For example, if a user detects any changes in the temperature of the refrigerator, with the help of IoT
technology the user should able to adjust the temperature with the help of their mobile phone.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Various IoT applications:

IoT Applications

IoT solutions are widely used in numerous companies across industries.


Some most common IoT applications are given below:
Application type Description
Smart Thermostats Helps you to save resource on heating bills by knowing your usage patterns.
IoT helps automobile companies handle billing, parking, insurance, and other
Connected Cars
related stuff automatically.
Helps you to capture heart rate pattern, calorie expenditure, activity levels, and
Activity Trackers
skin temperature on your wrist.
Remotely turn any device on or off. It also allows you to track a device's energy
Smart Outlets
level and get custom notifications directly into your smartphone.
IoT technology helps users to identify the real-time availability of parking
Parking Sensors
spaces on their phone.
The concept of a connected health care system facilitates real-time health
Connect Health monitoring and patient care. It helps in improved medical decision-making
based on patient data.
Smart city offers all types of use cases which include traffic management to
Smart City
water distribution, waste management, etc.
Smart home encapsulates the connectivity inside your homes. It includes smoke
Smart home
detectors, home appliances, light bulbs, windows, door locks, etc.
Helps you in real time tracking of goods while they are on the road, or getting
Smart supply chain
suppliers to exchange inventory information.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Challenges of Internet of Things (IoT)
At present IoT is faced with many challenges, such as:
 Insufficient testing and updating
 Concern regarding data security and privacy
 Software complexity
 Data volumes and interpretation
 Integration with AI and automation
 Devices require a constant power supply which is difficult
 Interaction and short-range communication
Advantages of IoT

Key benefits of IoT technology are as follows:


 Technical Optimization: IoT technology helps a lot in improving technologies and making
them better. Example, with IoT, a manufacturer is able to collect data from various car sensors.
The manufacturer analyzes them to improve its design and make them more efficient.
 Improved Data Collection: Traditional data collection has its limitations and its design for
passive use. IoT facilitates immediate action on data.
 Reduced Waste: IoT offers real-time information leading to effective decision making &
management of resources. For example, if a manufacturer finds an issue in multiple car
engines, he can track the manufacturing plan of those engines and solves this issue with the
manufacturing belt.
 Improved Customer Engagement: IoT allows you to improve customer experience by
detecting problems and improving the process.

Disadvantages IoT
 Security: IoT technology creates an ecosystem of connected devices. However, during this
process, the system may offer little authentication control despite sufficient security measures.
 Privacy: The use of IoT, exposes a substantial amount of personal data, in extreme detail,
without the user's active participation. This creates lots of privacy issues.
 Flexibility: There is a huge concern regarding the flexibility of an IoT system. It is mainly
regarding integrating with another system as there are many diverse systems involved in the
process.
 Complexity: The design of the IoT system is also quite complicated. Moreover, it's deployment
and maintenance also not very easy.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


 Compliance: IoT has its own set of rules and regulations. However, because of its complexity,
the task of compliance is quite challenging.

Introduction to IoT Architecture


In the modern era, and rapid technological advancement is helping in connecting all the things and
people all around the globe. As we are moving towards the 22 century, we are more likely to be
connected with each and everything that we are using for your comfort and use. With the advent of
wearable technology in the market, the use of the internet of things is gaining a pace very rapidly.
Here, we are going to cover the stages that are involved in the implementation of the Internet of
Things (IoT). Smart lighting, self-driving cars, water pumps, fire alarm systems are some of the
systems that can be easily connected with the Internet Of Things.

What is IoT Architecture?


IT is the market that is full of new words like analytics, data science, artificial intelligence and the
internet of things (IoT) but the point which comes here is what all these are about? Internet of Things
is the concept which deals with the mass connectivity of devices like watches, cars, tablets, wearable
technology, home appliances and the people who are using it. The IoT requires an internet
connection, that can help in capturing the data from a large number of devices and with the use of the
data capturing, it can be further sent to the data centers and the servers.
To understand the concept of the Internet of Things, let’s consider an example. The data captured by
the use of sensors and actuators. In our houses, the use of smart lights, smart cameras, smartwatches,
these all devices are connected with the internet that helps us in getting real-time data which can be
further used for in-depth analysis and decision making. For example- in a house where a small baby
is at home with a nanny then the use of the smart camera is beneficial for the family.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Stages of IoT Architecture
There are many stages that are involved in the internet of things (IoT) architecture. Broadly the
process involves the four stages in it. The stages are as follows:

1. Use of Sensors and Actuators


The first step of the IoT architecture deals with the establishment of the physical layer in the
environment. It deals with establishing the sensors and actuators in the physical or the actual
environment that helps in collecting and capturing the data from the devices and the systems that are
under control and observation. Sensors are used to collect the data from the environment and help in
turning that data into meaningful information that can be further used for the analysis. The role of
actuators helps in studying the change that is recorded by the sensors. It is one of the most basic steps
which deals with establishing all the physical devices that can be used for capturing the data. The
sensing and actuating process are carried out by the sensors and the actuators. For example- motion
sensors, pressure sensors, etc.

2. The Internet Gateway Use of Layers & Data Acquisition


Once step one is placed in a proper way, the next step that comes into play is the establishment of an
internet gateway. The data which is captured by the sensors and actuators is in analog form and to
change this analog data into digital data we need to have a mechanism in place. To work out on this
process, the internet gateway is used. With the use of Data Acquisition Systems the analog data can
be converted into a digital system and form. It helps in aggregation and conversion function. We can
also add other functions like analytics and protection that can help in increasing the performance and
efficiency.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


3. Edge Information Technology
The step deals with the preprocessing and pre analytics of the data before sending it into the actual
systems. The edge IT system will be located at the actual site of the sensors and the actuators, not
located far from the actual data centers. The step is required because the IoT data is so huge in
amount, if we send it directly to the server or the data center, it will kill the speed of the system and
the bandwidth of the LAN and routers. The volume and the speed at which analog data is generated
is at a very fast pace and the data will require loads of space also, so it is always recommended to
change the data into digital form and after preprocessing and pre analytics, it is then sent to the data
centers and the server. The data captured by the sensors and actuators are not always important for
the organization, hence only the required data is processed and sent to the server and the data
centers.

4. Use of Cloud Analytics and Data Centers


Once the data is done with the preprocessing and the analysis, and all the loopholes are removed
from the data, the processed data is sent for the data centers and the servers that can be used for the
final analysis and reporting purposes. The data can be sent to the physical servers or the data centers
that are placed away from the sensors and actuators possibly very far away from these two. The data
can be analyzed and sent for the final processing either to cloud-based servers or data centers or the
physical servers. The processing and analysis can be in-depth in nature regardless of the platform
whether it is physical or cloud-based in nature. The cloud platform helps in reducing the hardware
cost but at the same time, data security is also a concern in it. On the other hand, if we talk about the
physical servers or the data centers these are safer but the hardware cost is higher in it.

Conclusion
We are gradually moving towards an era, where everything is interconnected in nature and highly
interactive in nature. With the advent of the Internet of Things concept, there is a change in the
psychology of people regarding the use of the internet and the cloud as a platform for storage
purposes. It can be said that in the upcoming years, we are going to witness a whole new ecosystem
in terms of device connectivity and technology.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


ITU-T Views:
Study Groups of ITU’s Telecommunication Standardization Sector (ITU-T) assemble experts from
around the world to develop international standards known as ITU-T Recommendations which act as
defining elements in the global infrastructure of information and communication technologies (ICTs).
Standards are critical to the interoperability of ICTs and whether we exchange voice, video or data
messages, standards enable global communications by ensuring that countries’ ICT networks and
devices are speaking the same language.

International ICT standards avoid costly market battles over preferred technologies, and for
companies from emerging markets, they create a level playing field which provides access to new
markets. They are an essential aid to developing countries in building their infrastructure and
encouraging economic development, and through economies of scale, they can reduce costs for all:
manufacturers, operators and consumers.

From its inception in 1865, ITU-T has driven a contribution-led, consensus-based approach to
standards development in which all countries and companies, no matter how large or small, are
afforded equal rights to influence the development of ITU-T Recommendations. From its beginnings
as a body standardizing international telegraph exchange, through its formative role in
telecommunications, and in today’s converged ICT ecosystem, ITU-T has provided the world’s best
facilities to the global standardization community and remains the world’s only truly global ICT
standards body.

Based at ITU’s headquarters in Geneva, the Telecommunication Standardization Bureau (TSB)


provides secretariat support to ITU-T Study Groups through sophisticated electronic working
methods and state-of-the-art facilities in Geneva accommodating the six official languages of the
Union – Arabic, Chinese, English, French, Russian and Spanish. Headed by an elected official with
the title Director, it is the body responsible for providing cohesion to ITU-T’s standards development
process.

The Global Standards Initiative on Internet of Things (IoT-GSI) concluded its activities in July 2015
following TSAG decision to establish the new Study Group 20 on "IoT and its applications including
smart cities and communities".

IoT-GSI aimed to promote a unified approach in ITU-T for development of technical standards
enabling the Internet of Things on a global scale. ITU-T Recommendations developed under the IoT-
GSI by the various ITU-T Questions - in collaboration with other standards developing organizations
(SDOs) – will enable worldwide service providers to offer the wide range of services expected by this
technology. IoT-GSI also aimed to act as an umbrella for IoT standards development worldwide.

The Internet of Things (IoT) has been defined in Recommendation ITU-T Y.2060 (06/2012) as a
global infrastructure for the information society, enabling advanced services by interconnecting
(physical and virtual) things based on existing and evolving interoperable information and
communication technologies.
G.Ashmitha, Asst. Prof, Department of CSE- KITSW
NOTE 1 – Through the exploitation of identification, data capture, processing and communication capabilities,
the IoT makes full use of things to offer services to all kinds of applications, whilst ensuring that security and
privacy requirements are fulfilled.

NOTE 2 – From a broader perspective, the IoT can be perceived as a vision with technological and societal
implications

Working Definition of IoT as per the Oracle Organization


The Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded
with sensors, software, and other technologies for the purpose of connecting and exchanging data
with other devices and systems over the internet. These devices range from ordinary household
objects to sophisticated industrial tools. With more than 7 billion connected IoT devices today,
experts are expecting this number to grow to 10 billion by 2020 and 22 billion by 2025. Oracle has a
network of device partners.

IoT (Internet of Things) is a network of devices which are connected to the internet for transferring
and sensing the data without much human intervention, the framework used to this is termed as the
IoT framework, this framework consists all the required capabilities for the cloud support and other
needs which is needed to satisfy the IoT technology, few of the common IoT frameworks that are
used frequently are KAA IoT, Cisco IoT Cloud Connect, ZETTA IoT, SAP IoT, IBM Watson, Hewlett
Packard Enterprise, etc

What is the IoT Framework?


IoT is a key part of a large IoT ecosystem, which promotes and links all elements in the
scheme. It allows device management, handles communication protocols on software and hardware,
collects / analyses information, improves information flow and intelligent apps functionality.
List of IoT Framework

1. KAA IoT
Kaa IoT is one of the most effective and rich Open Source Internet of Things Cloud Platforms, where
anyone can freely implement their smart product concepts. You can manage an N number of devices

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


connected to each other with cross-device interoperability on this platform. You can monitor your
machine in actual time by providing and configuring remote devices. Kaa enables information
exchange between linked devices, the IoT Cloud, information and visualization systems, as well as
other elements of IoT Ecosystems

2. Cisco IoT Cloud Connect


Cisco IoT Cloud Connect provides robust, automated, and highly secure connectivity for
the enterprise. IoT data management is done by the Cisco Kinetic IoT platform to extract, move and
compute the data. As Cisco is very famous for its security services, it protects IoT deployment against
threats with a secure IoT architecture.

3. ZETTA IoT
Zetta is nothing but a server-oriented platform developed based on the REST, NodeJS, and the Siren
hypermedia-API-strip flow-based reactive programming philosophy. After being abstracted as REST
APIs they are connected with cloud services. These internet services include tools for visualizing
machine analytics and support such as Splunk. It builds a gero-distributed network through
connectivity with systems like Heroku to endpoints like Arduino and Linux hackers.

4. Salesforce IoT
Salesforce is power by thunder. Thunder allows companies to unlock earlier unseen ideas and allows
anyone to take proactive, personalized activities from any device to bring their clients closer than
ever. More than 150,000 clients worldwide were held by Salesforce. Salesforce has a 19.7% market
share in the globe of CRM. SAP (12.%1), Microsoft (6.2%), Oracle (9.1%) are far behind its nearest
rivals. Many businesses now develop their apps or migrate to Salesforce on the Salesforce platform.
This has raised demand for developers and administrators from Salesforce.

5. DeviceHive IoT
DeviceHive is another rich IoT open-source platform that is distributed under the Apache 2.0 license
and can be used and changed free of charge. It provides deployment options for Docker and
Kubernetes and can be downloaded and used both by public and personal cloud. You can run batch
analysis and machine learning above and beyond your device information. DeviceHive supports
several libraries, including Android and iOS.

6. Oracle IoT
We surely include Oracle, a worldwide software company known to offer its top level of solutions in
database management, and business software, as we compare the top Internet-of-Things platforms.
Oracle offers its flexible environment outstanding company possibilities to create company
applications. Oracle supports the processing and builds large-scale IoT networks with very wide
data. The use of advanced security systems to protect IoT systems against external threats is another
worth mentioning. Since these systems usually have different devices, some of which have no
security tool, it is not sufficiently justifiable to implement centralized security measures.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


7. SAP IoT
The SAP Internet of Things cloud platform has everything you need to build and handle an IoT
application. The SAP platform provides a convenient environment to remotely manage and monitor
all connected devices of your IoT system. In the SAP Platform a remote-devices we can connect
directly or through cloud service. Obviously, SAP can use IoT information to create machine learning
and artificial intelligence applications while maintaining recent technological trends.

8. Microsoft Azure IoT


Without the Microsoft Azure solution, a cloud service giant with AWS and Google Cloud platform,
the comparison of our IoT platform will be not complete. The Microsoft Azure IoT Suite provides
preconfigured solutions and the ability to personalize and develop new solutions to meet the project
requirements. The strongest safety mechanisms, superb scalability and simple integration with your
current or future systems are achieved through Microsoft Azure Internet of thing Suite.

9. Google Cloud Platform – IoT framework


Things can be done by Google. Google Cloud is one of the best IoT systems available today with its
end-to-end platform. Google stands out from the others because it can process the large quantity of
information using Cloud IoT Core. Due to Google’s Cloud Data Studio and Big Query you get
advanced analysis. With the help of Google Cloud Platform, you can accelerate your business and
with that, you can speed up your device.

10. IBM Watson – IoT framework


We cannot expect the Big Blue to miss the chance to make a difference in the IoT segment. IBM
Watson is very popular among the internet of thing platform among developers. The Bluemix hybrid
cloud-supported Watson IoT platform allows developers to use IoT-applications easily. IBM Watson
manages the secure communication and also data storage. Real-time data exchange also is done by
IBM Watson.

11. Hewlett Packard Enterprise – IoT framework


Hewlett Packard Enterprise’s universal business platform offers scalability for its customers by
offering solutions to most of their problems. The platform provides cloud-based assistance or local
support. In smart cities and the automobile industry, HPE universal of things platform was used
properly. The data monetization of several businesses has been carried out by HPE. Hewlett Packard
Enterprise Collects analyzes information in order to grow the company. In the Hewlett Packard
Enterprise M2M device management in Single point, Single seller.

12. DataV by Bsquare – IoT framework


The next cloud platform is DataV by Bsquare. The company is working with the best in the company,
including Google, Amazon web services, and Microsoft. Bsquare takes its services seriously and has
introduced the DataV application, the hybrid framework for managing your services. It offers a
variety of services that predict and analyze all of your ecosystem problems. It Improves the condition
maintenances.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


13. Mindsphere by Siemens – IoT framework
Mindsphere from Siemens provides a cost-effective platform as a service that is ideal for application
development. The cost-efficient platform allows you to connect all your appliances to a cloud
solution. In accordance with the DIn ISO / IEC 27001 standard, Siemens claims every stored
information is strictly confidential. You can choose open interfaces and local connectivity from the
business. Allow you to regulate machine information in order to open fresh opportunities.

14. Ayla Network – IoT framework


Ayla networks have developed their platform as a solution for enterprises. Agile Ayla networks have
been established to support customers with the smooth establishment of services, not only to develop
the product. In addition to the Ayla agile platform, AMAP is an agile mobile app platform from Ayla
that develops and guides consumers through app development.

15. MBED IoT Device platform


The open-source service is available on the Apache 2.0 Arm MBED computer platform. It involves
cloud services, developer tools, and operating systems, that facilitate the creation and operation of
business goods. The service is designed to simplify users ‘ processes. MBED OS was designed to
connect all your devices as an open-source platform. The platform provides services from over 60
partners and free access to a community of 200,000 designers. You can flexibly access MBED club
service

16. Amazon Web Services (AWS) IoT framework


Amazon Web Services (AWS) is an IoT platform provided by Amazon. This IoT platform provides
cloud computing, database, and security services through the AWS Console. There are so many other
services such as Regions, Availability Zones, and Virtual Private Clouds (VPCs). It helps to ease out
the improving durability, distribution, availability of the application. It provides Registry for
recognizing devices, Secure Device Gateway, Compatible Software Development Kit for devices
which AWS partnered with HW manufacturers like Intel, Texas Instruments, Broadcom and
Qualcomm.

17. Mocana – IoT framework


The final one on the list is the Mocana company’s safety platform. The platform seeks to provide
industrial IoT devices and clouds with security. The company provides currently more than 100
companies with services.

18. RTI IoT


RTI is one of the IoT platforms that is the oldest and most pioneering provider and also it is the Most
Influent Industrial of the internet of thing firm. Connext DDS is built especially for smart computers
and their corresponding cyber-physical systems. Connext DDS does not require response brokers,
directory services, servers, as well as administration, unlike messaging middleware designed mainly
for IT systems.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Conclusion
IoT is a key part of a large IoT ecosystem. IoT promotes and links all elements in the scheme. We have
seen different IoT Platforms which are helpful for You can choose given IoT Platforms as your
requirements. It will absolutely help you.

Physical and Logical Design of IoT


Physical Design of IoT system refers to IoT Devices and IoT Protocols. Things are Node device
which have unique identities and can perform remote sensing, actuating and monitoring capabilities.
Communication established between things and cloud based server over the Internet by various IoT
protocols. Logical design of IoT system refers to an abstract representation of the entities & processes
without going into the low-level specifies of the implementation. About 9,09,000 results (0.57
seconds)

Physical Design of IoT


Physical Design of IoT refers to IoT Devices and IoT Protocols. Things are Node device which have
unique identities and can perform remote sensing, actuating and monitoring capabilities. IoT
Protocols helps Communication established between things and cloud based server over the Internet.

Things
Basically Things refers to IoT Devices which have unique identities and can perform remote sensing,
actuating and monitoring capabilities. Things are is main part of IoT Application. IoT Devices can be
various type, Sensing Devices, Smart Watches, Smart Electronics appliances, Wearable Sensors,
Automobiles, and industrial machines. These devices generate data in some forms or the other which
when processed by data analytics systems leads to useful information to guide further actions locally
or remotely.

For example, Temperature data generated by a Temperature Sensor in Home or other place, when
processed can help in determining temperature and take action according to users.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Above picture, shows a generic block diagram of IoT device. It may consist of several interfaces for
connections to other devices. IoT Device has I/O interface for Sensors, Similarly for Internet
connectivity, Storage and Audio/Video.
IoT Device collect data from on-board or attached Sensors and Sensed data communicated either to
other device or Cloud based sever. Today many cloud servers available for especially IoT System.
This Platform known as IoT Platform. Actually these cloud especially design for IoT purpose. So here
we can analysis and processed data easily.
How it works? For example if relay switch connected to an IoT device can turn On/Off an appliance
on the commands sent to the IoT device over the Internet.
IoT Protocols
IoT protocols help to establish Communication between IoT Device (Node Device) and Cloud based
Server over the Internet. It help to sent commands to IoT Device and received data from an IoT
device over the Internet. An image is given below. By this image you can understand which protocols
used.

Link Layer

Link layer protocols determine how data is physically sent over the network’s physical layer or
medium (Coxial cable or other or radio wave). Link Layer determines how the packets are coded and
signaled by the hardware device over the medium to which the host is attached (eg. coxial cable).

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Link Layer Protocols:

802.3 – Ethernet: Ethernet is a set of technologies and protocols that are used primarily in LANs. It
was first standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the physical layer and the
medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks. Ethernet
is classified into two categories: classic Ethernet and switched Ethernet.

802.11 – WifI: IEEE 802.11 is part of the IEEE 802 set of LAN protocols, and specifies the set of media
access control (MAC) and physical layer (PHY) protocols for implementing wireless local area
network (WLAN) Wi-Fi computer communication in various frequencies, including but not limited
to 2.4 GHz, 5 GHz, and 60 GHz frequency bands.

802.16 – Wi-Max : The standard for WiMAX technology is a standard for Wireless Metropolitan Area
Networks (WMANs) that has been developed by working group number 16 of IEEE 802, specializing
in point-to-multipoint broadband wireless access. Initially 802.16a was developed and launched, but
now it has been further refined. 802.16d or 802.16-2004 was released as a refined version of the
802.16a standard aimed at fixed applications. Another version of the standard, 802.16e or 802.16-2005
was also released and aimed at the roaming and mobile markets.

802.15.4 -LR-WPAN : A collection of standards for Low-rate wireless personal area network. The
IEEE’s 802.15.4 standard defines the MAC and PHY layer used by, but not limited to, networking
specifications such as ZigBee®, 6LoWPAN, Thread, Wi-SUN and MiWi™ protocols. The standards
provide low-cost and low-speed communication for power constrained devices.

2G/3G/4G- Mobile Communication : These are different types of telecommunication generations.


IoT devices are based on these standards can communicate over the celluer networks.

Network Layer

Responsible for sending of IP datagrams from the source network to the destination network.
Network layer performs the host addressing and packet routing. We used IPv4 and IPv6 for Host
identification. IPv4 and IPv6 are hierarchical IP addrssing schemes.

IPv4 :

An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication. An IP address serves two main
functions: host or network interface identification and location addressing.

Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, because of the
growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using
128 bits for the IP address, was standardized in 1998. IPv6 deployment has been ongoing since the
mid-2000s.

IPv6 : Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the
communications protocol that provides an identification and location system for computers on

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task
Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. IPv6 is intended
to replace IPv4. In December 1998, IPv6 became a Draft Standard for the IETF, who subsequently
ratified it as an Internet Standard on 14 July 2017. IPv6 uses a 128-bit address, theoretically allowing
2128, or approximately 3.4×1038 addresses.

6LoWPAN: 6LoWPAN is an acronym of IPv6 over Low-Power Wireless Personal Area


Networks.6LoWPAN is the name of a concluded working group in the Internet area of the IETF.
6LoWPAN is a somewhat contorted acronym that combines the latest version of the Internet Protocol
(IPv6) and Low-power Wireless Personal Area Networks (LoWAN). 6LoWPAN, therefore, allows for
the smallest devices with limited processing ability to transmit information wirelessly using an
internet protocol. 6LoWPAN can communicate with 802.15.4 devices as well as other types of devices
on an IP network link like Wi-Fi.

Transport Layer

This layer provides functions such as error control, segmentation, flow control and congestion
control. So this layer protocols provide end-to-end message transfer capability independent of the
underlying network.

TCP : TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a
network conversation through which application programs can exchange data. TCP works with the
Internet Protocol (IP), which defines how computers send packets of data to each other. Together,
TCP and IP are the basic rules defining the Internet. The Internet Engineering Task Force (IETF)
defines TCP in the Request for Comment (RFC) standards document number 793.

UDP : User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of Internet
Protocol suite, referred as UDP/IP suite. Unlike TCP, it is unreliable and connectionless protocol. So,
there is no need to establish connection prior to data transfer.

Application Layer

Application layer protocols define how the applications interface with the lower layer protocols to
send over ther network.

HTTP: Hypertext Transfer Protocol (HTTP) is an application-layer protocol for transmitting


hypermedia documents, such as HTML. It was designed for communication between web browsers
and web servers, but it can also be used for other purposes. HTTP follows a classical client-server
model, with a client opening a connection to make a request, then waiting until it receives a response.
HTTP is a stateless protocol, meaning that the server does not keep any data (state) between two
requests. Though often based on a TCP/IP layer, it can be used on any reliable transport layer, that is,
a protocol that doesn’t lose messages silently like UDP does. RUDP — the reliable update of UDP —
is a suitable alternative.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


CoAP : CoAP-Constrained Application Protocol is a specialized Internet Application Protocol for
constrained devices, as defined in RFC 7252. It enables devices to communicate over the Internet. It is
defined as Contrained Application Protocol, and is a protocol intended to be used in very simple
hardware. The protocol is especially targeted for constrained hardware such as 8-bits
microcontrollers, low power sensors and similar devices that can’t run on HTTP or TLS. It is a
simplification of the HTTP protocol running on UDP, that helps save bandwidth. It is designed for
use between devices on the same constrained network (e.g., low-power, lossy networks), between
devices and general nodes on the Internet, and between devices on different constrained networks
both joined by an internet. CoAP is also being used via other mechanisms, such as SMS on mobile
communication networks.

Web Socket: The Web Socket Protocol enables two-way communication between a client running
untrusted code in a controlled environment to a remote host that has opted-in to communications
from that code. The security model used for this is the origin-based security model commonly used
by web browsers. The protocol consists of an opening handshake followed by basic message framing,
layered over TCP. The goal of this technology is to provide a mechanism for browser-based
applications that need two-way communication with servers that does not rely on opening multiple
HTTP connections (e.g., using XMLHttpRequest or <iframe>s and long polling).

MQTT :

MQTT is a machine-to-machine (M2M)/”Internet of Things” connectivity protocol. It was designed


as an extremely lightweight publish/subscribe messaging transport and useful for connections with
remote locations where a small code footprint is required and/or network bandwidth is at a
premium. For example, it has been used in sensors communicating to a broker via satellite link, over
occasional dial-up connections with healthcare providers, and in a range of home automation and
small device scenarios.

MQTT protocol runs on top of the TCP/IP networking stack. When clients connect and
publish/subscribe, MQTT has different message types that help with the handshaking of that
process. The MQTT header is two bytes and first byte is constant. In the first byte, you specify the
type of message being sent as well as the QoS level, retain, and DUP (duplication) flags. The second
byte is the remaining length field.

XMPP : Extensible Messaging and Presence Protocol (XMPP) is a communication protocol for
message-oriented middleware based on XML (Extensible Markup Language). It enables the near-real-
time exchange of structured yet extensible data between any two or more network entities. Originally
named Jabber, the protocol was developed by the eponymous open-source community in 1999 for
near real-time instant messaging (IM), presence information, and contact list maintenance. Designed
to be extensible, the protocol has been used also for publish-subscribe systems, signalling for VoIP,

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


video, file transfer, gaming, the Internet of Things (IoT) applications such as the smart grid, and social
networking services.

DDS : The Data Distribution Service (DDS™) is a middleware protocol and API standard for data-
centric connectivity from the Object Management Group® (OMG®). It integrates the components of a
system together, providing low-latency data connectivity, extreme reliability, and a scalable
architecture that business and mission-critical Internet of Things (IoT) applications need.

In a distributed system, middleware is the software layer that lies between the operating system and
applications. It enables the various components of a system to more easily communicate and share
data. It simplifies the development of distributed systems by letting software developers focus on the
specific purpose of their applications rather than the mechanics of passing information between
applications and systems.

AMQP : The AMQP – IoT protocols consist of a hard and fast of components that route and save
messages within a broker carrier, with a set of policies for wiring the components together. The
AMQP protocol enables patron programs to talk to the dealer and engage with the AMQP model.
AMQP has the following three additives, which might link into processing chains in the server to
create the favored capability.

 Exchange: Receives messages from publisher primarily based programs and routes them to
‘message queues’.

 Message Queue: Stores messages until they may thoroughly process via the eating client
software.

 Binding: States the connection between the message queue and the change.

Logical Design of IoT


In this article we discuss Logical design of Internet of things. Logical design of IoT system refers to an
abstract representation of the entities & processes without going into the low-level specifies of the
implementation. For understanding Logical Design of IoT, we describes given below terms.
 IoT Functional Blocks
 IoT Communication Models
 IoT Communication APIs
IoT Functional Blocks
An IoT system comprises of a number of functional blocks that provide the system the capabilities for
identification, sensing, actuation, communication and management.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Functional blocks are:
Device: An IoT system comprises of devices that provide sensing, actuation, monitoring and control
functions.
Communication: Handles the communication for the IoT system.
Services: services for device monitoring, device control service, data publishing services and services
for device discovery.
Management: This block provides various functions to govern the IoT system.
Security: this block secures the IoT system and by providing functions such as authentication ,
authorization, message and content integrity, and data security.
Application: This is an interface that the users can use to control and monitor various aspects of the
IoT system. Application also allow users to view the system status and view or analyze the processed
data.

IoT Communication Models


Request-Response Model
Request-response model is communication model in which the client sends requests to the server and
the server responds to the requests. When the server receives a request, it decides how to respond,
fetches the data, retrieves resource representation, prepares the response, and then sends the
response to the client. Request-response is a stateless communication model and each request-
response pair is independent of others.
HTTP works as a request-response protocol between a client and server. A web browser may be the
client, and an application on a computer that hosts a web site may be the server.
Example: A client (browser) submits an HTTP request to the server; then the server returns a
response to the client. The response contains status information about the request and may also
contain the requested content.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Publish-Subscribe Model
Publish-Subscribe is a communication model that involves publishers, brokers and consumers.
Publishers are the source of data. Publishers send the data to the topics which are managed by the
broker. Publishers are not aware of the consumers. Consumers subscribe to the topics which are
managed by the broker. When the broker receive data for a topic from the publisher, it sends the data
to all the subscribed consumers.

Push-Pull Model
Push-Pull is a communication model in which the data producers push the data to queues and the
consumers Pull the data from the Queues. Producers do not need to be aware of the consumers.
Queues help in decoupling the messaging between the Producers and Consumers. Queues also act as
a buffer which helps in situations when there is a mismatch between the rate at which the producers
push data and the rate rate at which the consumer pull data.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Exclusive Pair Model
Exclusive Pair is a bidirectional, fully duplex communication model that uses a persistent connection
between the client and server. Connection is setup it remains open until the client sends a request to
close the connection. Client and server can send messages to each other after connection setup.
Exclusive pair is stateful communication model and the server is aware of all the open connections.

IoT Communication APIs


Generally we used Two APIs For IoT Communication. These IoT Communication APIs are:
 REST-based Communication APIs
 Web Socket-based Communication APIs

REST-based Communication APIs


Representational state transfer (REST) is a set of architectural principles by which you can design
Web services the Web APIs that focus on systems’ resources and how resource states are addressed
and transferred. REST APIs that follow the request response communication model, the rest
architectural constraint apply to the components, connector and data elements, within a distributed
hypermedia system. The rest architectural constraint are as follows:

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Client-server – The principle behind the client-server constraint is the separation of concerns. for
example clients should not be concerned with the storage of data which is concern of the serve.
Similarly the server should not be concerned about the user interface, which is concern of the clien.
Separation allows client and server to be independently developed and updated.
Stateless – Each request from client to server must contain all the information necessary to
understand the request, and cannot take advantage of any stored context on the server. The session
state is kept entirely on the client.
Cache-able – Cache constraints requires that the data within a response to a request be implicitly or
explicitly leveled as cache-able or non cache-able. If a response is cache-able, then a client cache is
given the right to reuse that repsonse data for later, equivalent requests. caching can partially or
completely eliminate some instructions and improve efficiency and scalability.
Layered system – layered system constraints, constrains the behavior of components such that each
component cannot see beyond the immediate layer with they are interacting. For example, the client
cannot tell whether it is connected directly to the end server or two an intermediaryalong the way.
System scalability can be improved by allowing intermediaries to respond to requests instead of the
end server, without the client having to do anything different.
Uniform interface – uniform interface constraints requires that the method of communication
between client and server must be uniform. Resources are identified in the requests (by URIsin web
based systems) and are themselves is separate from the representations of the resources data returned
to the client. When a client holds a representation of resources it has all the information required to
update or delete the resource you (provided the client has required permissions). Each message
includes enough information to describe how to process the message.
Code on demand – Servers can provide executable code or scripts for clients to execute in their
context. this constraint is the only one that is optional.

A Restful web service is a ” Web API ” implemented using HTTP and REST principles. REST is most
popular IoT Communication APIs.

HTTP methods
Uniform
Resource GET PUT PATCH POST DELETE
Identifier (URI)

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Create a new entry
List the URIs and Replace the in the collection.
Collection, such perhaps Delete the
other entire Not The new entry’s
as entire
details of the collection generally URI is assigned
https://api.example. collection
collection’s with another used automatically and is
com/resources/ .
members. collection. usually returned by
the operation.
Retrieve a
Replace the
representation of Delete the
addressed Not generally used.
the addressed Update the addresse
Element, such member of the member of Treat the addressed
addressed d
as the member as a
collection, member of member
https://api.example. collection, or collection in its own
expressed in an the of the
com/resources/item5 if it does not right and create a
appropriate collection. collection
exist, create new entry within it.
Internet media .
it.
type.

Web Socket based communication API


Web socket APIs allows bi-directional, full duplex communication between clients and servers. Web
socket APIs follows the exclusive pair communication model. Unlike request-response model such as
REST, the Web Socket APIs allow full duplex communication and do not require new connection to
be setup for each message to be sent. Web socket communication begins with a connection setup
request sent by the client to the server. The request (called web socket handshake) is sent over HTTP
and the server interprets it is an upgrade request. If the server supports web socket protocol, the
server responds to the web socket handshake response. After the connection setup client and server
can send data/messages to each other in full duplex mode. Web socket API reduces the network
traffic and latency as there is no overhead for connection setup and termination requests for each
message. Web socket suitable for IoT applications that have low latency or high throughput
requirements. So Web socket is most suitable IoT Communication APIs for IoT System.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


IoT Enabling Technologies
Wireless Sensor Networks
A wireless sensor network comprises of distributed device with sensor which are used to monitor the
environmental and physical conditions. A WSN consists of a number of end-nodes and routers and a
coordinator. End Nodes have several sensors attached to them in node can also act as routers. Routers
are responsible for routing the data packets from end-nodes to the coordinator. The coordinator
collects the data from all the nodes. Coordinator also acts as a gateway that connects the WSN to the
internet. Some examples of WSNs used in IoT systems are described as follows:

 Weather monitoring system use WSNs in which the nodes collect temperature humidity and other
data which is aggregated and analyzed.
 Indoor air quality monitoring systems use WSNs to collect data on the indoor air quality and
concentration of various gases
 Soil moisture monitoring system use WSNs to monitor soil moisture at various locations.
 Surveillance system use WSNs for collecting Surveillance data (such as motion detection data)
 Smart grid use WSNs for monitoring the grid at various points.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


 Structural health monitoring system use WSNs to monitor the health of structures ( buildings,
bridges) by collecting vibration data from sensor nodes de deployed at various points in the
structure.

WSN can be used for processing, analysis, storage, and mining of the data.

1. A Wireless Sensor Network (WSN) comprises of distributed devices with sensors which
are used to monitor the environmental and physical conditions.
2. A WSN consist of a number of end nodes and routers and a coordinator
3. End nodes have several sensors attached to them. End nodes can also act as routers.
Routers are responsible for routing the data packets from end nodes to the

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


coordinator. The coordinator collects the data from all the nodes. Coordinator also acts gateway
connects the WSN to the Internet. Some examples of WSN used in IoT systems arc described as
follows:
4. Weather monitoring systems use WSNs in which the nodes collect temperature. humidity and other
data, which is aggregated and analyzed.
5. Indoor air quality monitoring systems use WSNs to collect data on the indoor air quality and
concentration of various gases.
6. Soil moisture monitoring systems use WSNs to monitor soil moisture at various locations.
7. Surveillance systems use WSNs for collecting surveillance data (such as motion detection data)
8. Smart grids use WSNs for monitoring the grid at various points.:
9. Surveillance systems use WSNs for collecting surveillance data (such as motion detection
data) Smart grids use WSNs for monitoring the grid at various points.
10. Structural health monitoring systems use WSNs to monitor the health of structures
(buildings, bridges) by collecting vibration data from sensor nodes deployed at various
points in the structure.
11. WSNs are enabled by wireless communication protocols such as IEEE 802 15 4 ZigBee is
one of the most popular wireless technologies used by WSNs.
12. ZigBee specifications are based on IEEE 802.15.4.
13. ZigBee operates at 2.4 GHz frequency and offers data rates up to 250 KB/s and range from
10 to 100 meters depending on the power output and environmental conditions. The power
of WSNs lies in their ability to deploy large number of low-cost and low-power sensing
nodes for continuous monitoring of environmental and physical conditions. WSNs are self -
organizing networks. Since WSNs have large number of nodes, manual configuration for
each node is not possible. The self-organizing capability of WSN makes the network robust.
In the event of failure of some nodes or addition of new nodes to the network, the network
can reconfigure itself.

Cloud Computing

Is the cloud necessary for IOT?


The answer is simply no because we can do the processing even locally instead of uploading the data to the
cloud. These techniques are called as “Fog Computing ” or “Edge Computing ”. But then why we associate
cloud computing with IOT the reason is also simple because cloud computing gives us scalability and low
costs of operations.
If we stop using the Cloud resources then this would slow down the growth of the IOT.
So, benefits of using the clouds are :-
 Decreased cost of setting up new infrastructure.
 Highly Scalable (we can use as much we want to).

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


 Pay as much we use (just like house electricity bills).
 Easily accessible just by internet.
 Cloud Computing Cloud computing is a transformative computing paradigm that involves
delivering applications and services over the Internet. Cloud computing involves provisioning
of computing. networking and storage resources on demand and providing these resources as
metered services to the users, in a "pay as you go" model. Cloud computing resources can be
provisioned on-demand by the users, without requiring interactions with the cloud service
provider. The process of provisioning resources is automated. Cloud computing resources can
be accessed over the network using standard access mechanisms that provide platform -
independent access through the use of heterogeneous client platforms such as workstations
,laptops, tablets, and smart phones.

What is exactly Cloud Computing ?


In simple terms it means rather than managing the files in a local storage, Cloud computing makes it
possible to save them over internet. It’s like having a high performance computer some where in
internet and we are only using the computing resources of that virtual high performance computer.

Essential characteristics of Cloud Computing:


 On-demand Self Service.
 Broad network access.
 Resource Pooling.
 On demand rapid expansion of resources.
 Pay as you use.

How to use Cloud ?

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Cloud can be used as :-
1. Infrastructure as service (IaaS):
It is the lowest level Infrastructure-as-a-Service (laaS) provides the users the ability to provision
computing and storage resources. These resources are provided to the users as virtual machine
instances and virtual storage. Users can start, stop, configure and manage the virtual machine
instances and virtual storage. Users can deploy operating systems and applications of their choice
on the virtual resources provisioned in the cloud. The cloud service provider manages the
underlying infrastructure. Virtual resources provisioned by the users are billed based on a pay -
per-use paradigm

2. Platform –as-service [PaaS] provides the users the ability to develop and deploy application in
the cloud using the development tools; application programming interfaces (APIs). software
libraries and services provided by the cloud service provider. The cloud service provider manages
the underlying cloud infrastructure including servers, network, operating systems and storage.
The users, themselves. Are responsible for developing, deploying. Configuring and managing
applications on the cloud infrastructure.
Here consumers are allowed to use the licensed applications (which they have subscribed). Its like
on-demand software. In simple terms, it means we take subscriptions of the services we want and
after that we are to those applications hosted in the cloud.

3. Software-as-a-Service (SaaS): SaaS provides the users a complete software application or the user
interface to the application itself. The cloud service provider manages the underlying cloud
infrastructure including servers, networks operating systems storage and applications software ,and
the user is unaware of the underlying architecture storage and application software and the user is
unaware of the underlying architecture of the cloud. Applications are provided to the user through a
thin client interface [e.g.; browser].SaaS applications are platform independent and can be accessed
from various client devices such as workstations, laptops, tablets, and smart phones running
different operating systems since the cloud service provider manages both the application and data,
the users are able to access the application from anywhere.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


These definitions and examples provide an overview of IoT and cloud convergence and why it is
important and useful. More and more IoT applications are nowadays integrated with the cloud in
order to benefit from its performance, business agility and pay-as-you-go characteristics. In following
chapters of the tutorial, we will present how to maximize the benefits of the cloud for IoT, through
ensuring semantic interoperability of IoT data and services in the cloud, thus enabling advanced data
analytics applications, but also integration of a wide range of vertical (silo) IoT applications that are

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


nowadays available in areas such as smart energy, smart transport and smart cities. We will also
illustrate the benefits of IoT/cloud integration for specific areas and segments of IoT, such as IoT-
based wearable computing.

Big Data Analytics


Big Data analytics is the process of collecting, organizing and analyzing large sets of data (called Big
Data) to discover patterns and other useful information. Big Data analytics can help organizations to
better understand the information contained within the data and will also help identify the data that
is most important to the business and future business decisions. Analysts working with Big Data
typically want the knowledge that comes from analyzing the data.
Some examples of big data generated by IoT systems are described as follows:

 Sensor data generated by IoT system such as weather monitoring stations.


 Machine sensor data collected from sensors embedded in industrial and energy systems for
monitoring their health and detecting Failures.
 Health and fitness data generated by IoT devices such as wearable fitness bands
 Data generated by IoT systems for location and tracking of vehicles
 Data generated by retail inventory monitoring systems
Characteristics
if data can be described by the following characteristics:
 Volume – The quantity of generated and stored data. The size of the data determines the value and
potential insight and whether it can be considered big data or not.
 Variety – The type and nature of the data. This helps people who analyze it to effectively use the
resulting insight. Big data draws from text, images, audio, video; plus it completes missing pieces
through data fusion.
 Velocity – In this context, the speed at which the data is generated and processed to meet the
demands and challenges that lie in the path of growth and development. Big data is often available in
real-time. Compared to small data, big data are produced more continually. Two kinds of velocity
related to Big Data are the frequency of generation and the frequency of handling, recording, and
publishing.
 Veracity – It is the extended definition for big data, which refers to the data quality and the data
value. The data quality of captured data can vary greatly, affecting the accurate analysis.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


Embedded Systems
As its name suggests, Embedded means something that is attached to another thing. An embedded
system can be thought of as a computer hardware system having software embedded in it. An
embedded system can be an independent system or it can be a part of a large system. An embedded
system is a controller programmed and controlled by a real-time operating system (RTOS) with a
dedicated function within a larger mechanical or electrical system, often with real-time computing
constraints. It is embedded as part of a complete device often including hardware and mechanical
parts. Embedded systems control many devices in common use today. Ninety-eight percent of all
microprocessors are manufactured to serve as embedded system component.
An embedded system has three components −

 It has hardware.
 It has application software.
 It has Real Time Operating system (RTOS) that supervises the application software and provide
mechanism to let the processor run a process as per scheduling by following a plan to control the
latencies. RTOS defines the way the system works. It sets the rules during the execution of
application program. A small scale embedded system may not have RTOS.

IoT Deployment Tools

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


System has a single node that performs sensing and/or actuation, stores data, performs analysis and host the
application as shown in fig. Suitable for modeling low cost and low complexity solutions where the data
involved is not big and analysis requirement are not computationally intensive. An e.g., of IoT Level1 is Home
automation.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


IoT Level 2:

has a single node that performs sensing and/or actuating and local analysis as shown in fig. Data is
stored in cloud and application is usually cloud based. Level2 IoT systems are suitable for solutions
where data are involved is big, however, the primary analysis requirement is not computationally
intensive and can be done locally itself. An e,g., of Level 2 IoT system for Smart Irrigation.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


IoT Level 3:

system has a single node. Data is stored and analyzed in the cloud application is cloud based as
shown in fig. Level3 IoT systems are suitable for solutions where the data involved is big and
analysis requirements are computationally intensive. An example of IoT level3 system for tracking
package handling.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


IoT Level 4

System has multiple nodes that perform local analysis. Data is stored in the cloud and application is
cloud based as shown in fig. Level4 contains local and cloud based observer nodes which can
subscribe to and receive information collected in the cloud from IoT devices. An example of a Level4
IoT system for Noise Monitoring.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


IoT Level 5:

System has multiple end nodes and one coordinator node as shown in fig. The end nodes that
perform sensing and/or actuation. Coordinator node collects data from
theendnodesandsendstothecloud.Dataisstoredandanalyzedinthecloudand application is cloud based.
Level5 IoT systems are suitable for solution based on wireless sensor network, in which data
involved is big and analysis requirements are computationally intensive.
An example of Level5 system for Forest Fire Detection.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW


IoT Level 6:

System has multiple independent end nodes that perform sensing and/or actuation and sensed data
to the cloud. Data is stored in the cloud and application is cloud based as shown in fig. The analytics
component analyses the data and stores the result in the cloud data base. The results are visualized
with cloud based application. The centralized controller is aware of the status of all the end nodes
and sends control commands to nodes
example of a Level6 IoT system for Weather Monitoring System.

G.Ashmitha, Asst. Prof, Department of CSE- KITSW

You might also like