Iot Unit 1
Iot Unit 1
IoT connects devices, helps in collecting data from various sources, exchanges data, analyses the
information from sensors and multiple devices, and gives perfect results in a short period.
With the help of IoT, we can handle outdoor things, household work, and gadgets. Using it, you can
control your ACs or any other electrical appliances. It has spread worldwide because of its low cost
and rapid growth and productivity.
The Internet of things is beneficial technology that has not only made the world advanced and
updated but has also reduced laborious work. But how does it work?
The important thing is the data. Once collected from different sources, the data can be easily
exchanged through the network and connection established. The connection is established through
mobiles or any other connected device via the Internet and wireless connections.
Characteristics of IoT
1. Connectivity
Connectivity is an essential feature of IoT. IoT lets you connect mobile phones, laptops, and other
internet devices. Any person can get information about anything at any time and place.
IoT can connect through several wireless devices, like sensors, mobile phones, trackers, etc. This way,
the person will not have to wait for an internet connection to operate a device.
2. Identity of Things
The collaboration of name and number gives an identity to an internet device. Giving an identity to
the device is an essential aspect of loT. Identity helps to differentiate between various internet
devices and select the device we want to send the command.
Every device needs a different controlling power based on the type of data provided. It is essential to
give a unique identity to every device so that we can set up passwords or other security means. For
example, fingerprints, face recognition IP addresses, and Face lock systems are several means of
security given to the different identified devices to protect them.
3. Intelligence
The intelligence of IoT devices depends on the sensors' intelligence. The sensors send the data to the
user for further analysis.
We need to update the IoT devices regularly to get the smart work done. It adds to their features and
makes them smarter.
4. Dynamic
We need to create IoT devices in a way that they can adapt to the environment. For example, an AC
should have a sensor that can send a signal to the cloud and adjust it to the premises of the place.
Similarly, the camera can easily click photographs by adjusting to light situations, like day and night.
5. Scalability
Scalability means the amount of data one can handle efficiently. The IoT has created a setup to
handle enormous data and generate useful analysis.
6. Self Upgradation
As we saw above, updating the software regularly is important. But who has the time to remember
to do that? Thus, with its artificial intelligence, IoT upgrades itself without human help. It also allows
the set up of a network for the addition of any new IoT devices. Thus, the technology can quickly
start working without delay if the setup has already been done.
7. Architecture
The architecture of IoT is designed in a way that it is capable of supporting various devices,
technologies, and protocols. Its main work is to confirm whether each connected device does not
interfere with the other. This way, the safety and security of each device's data are maintained.
8. Security
With the increasing number of IoT devices, issues regarding the security of personal data have
arisen. There might be a chance of data leakage as a large amount of data is collected, exchanged,
and generated. There is a chance of personal data being transferred without approval, which is a
matter of concern.
To overcome this challenge, IoT has created networks, systems, and devices wherein privacy is well
maintained. Maintaining safety and security is a big dare for IoT. However, it still handles it without
any disruption.
9. Network
With the increasing number of IoT devices in a network, it becomes difficult to maintain
communication for proper functioning. However, cloud service and gateway are a few methods that
can solve such problems.
Often, one device can use the connectivity of another device to establish network connectivity even
if the second device is not connected to a network. Because IoT devices can communicate with one
another, it is more effective and adaptable than other current technologies.
10. Data
The data gathered from IoT devices are analyzed for future prediction. For example, a calorie meter.
It helps to regulate the number of calories each day. We also have fitness data, thermostats, and
various devices that monitor our health. Therefore, we can use the data collected through these
devices.
Physical Design of IoT: IoT Protocols
A protocol is a set of rules that governs the communication between two or more devices. A protocol
defines the rules, syntax, semantics and synchronization of communication and possible error
recovery methods. An overview of different protocols used in IoT with respect to TCP/IP protocol
stack is given below:
The link layer is responsible for establishing and terminating links between the nodes. The packets or
datagrams travel through these links. The link layer also defines the format of packet that is to be
communicated across the link and is responsible for physical addressing. The link layer also handles
error detection, retransmission, flow control and access of the link. Protocols generally used at this
layer are Ethernet, Wi-Fi, WiMax, LR-WPAN, cellular technologies, etc
The main role of the network layer is transfer the packet from sender to receiving host. The network
layer also handles routing, which involves selecting the next node and forwarding the packets across
the communication path. The network layer is also responsible for logical addressing (like IP address)
and for congestion control which prevents the network from being overloaded with traffic.
The main role of transport layer is providing end-to-end communication between the applications
running on hosts. The transport layer provides a logical communication channel through which the
end applications can communicate with each other. The transport layer is implemented on the end
hosts. It is not present in the routers. The transport layer is also responsible for the reliable delivery
of the message across the end nodes, flow control and multiplexing and demultiplexing of the
channels at end nodes.
The application layer is where the users of an IoT application interact with the IoT
application/system. The application layer allows the users to interact with the IoT sensors and access
other services provided by the communication network. The application layer provides services like
authentication, naming, message formatting, email, etc, to the users.
– No security
Device: An IoT system comprises of devices that provide sensing, actuation, monitoring and control
functions.
Services: services for device monitoring, device control service, data publishing services and services
for device discovery.
Management: this blocks provides various functions to govern the IoT system.
Security: this block secures the IoT system and by providing functions such as authentication ,
authorization, message and content integrity, and data security.
Application: This is an interface that the users can use to control and monitor various aspects of the
IoT system. Application also allow users to view the system status and view or analyze the processed
data.
Communication Models in IoT (Internet of Things )
The IoTs allow people and things to be connected any time, any space, with anything and anyone,
using any network and any service.
The client, when required, requests the information from the server. This request is usually in the
encoded format.
This model is stateless since the data between the requests is not retained and each request is
independently handled.
The server Categories the request, and fetches the data from the database and its resource
representation. This data is converted to response and is transferred in an encoded format to the
client. The client, in turn, receives the response.
On the other hand — In Request-Response communication model client sends a request to the
server and the server responds to the request. When the server receives the request it decides how
to respond, fetches the data retrieves resources, and prepares the response, and sends it to the
client.
2. Publisher-Subscriber Model –
Publishers are the source of data. It sends the data to the topic which are managed by the broker.
They are not aware of consumers.
Hence, Brokers responsibility is to accept data from publishers and send it to the appropriate
consumers. The broker only has the information regarding the consumer to which a particular topic
belongs to which the publisher is unaware of.
3. Push-Pull Model –
The push-pull model constitutes data publishers, data consumers, and data queues.
Publishers publish the message/data and push it into the queue. The consumers, present on the
other side, pull the data out of the queue. Thus, the queue acts as the buffer for the message when
the difference occurs in the rate of push or pull of data on the side of a publisher and consumer.
Queues help in decoupling the messaging between the producer and consumer. Queues also act as a
buffer which helps in situations where there is a mismatch between the rate at which the producers
push the data and consumers pull the data.
4. Exclusive Pair –
Exclusive Pair is the bi-directional model, including full-duplex communication among client and
server. The connection is constant and remains open till the client sends a request to close the
connection.
The Server has the record of all the connections which has been opened.
This is a state-full connection model and the server is aware of all open connections.
NFC stands for Near Field Communication. It enables short range communication between
compatible devices. At least one transmitting device and another receiving device is needed to
transmit the signal. Many devices can use the NFC standard and are considered either passive or
active.
These include tags, and other small transmitters which can send information to other NFC devices
without the need for a power source of their own. These devices don’t really process any
information sent from other sources, and can not connect to other passive components. These often
take the form of interactive signs on walls or advertisements.
These devices are able to both the things i.e. send and receive data. They can communicate with
each other as well as with passive devices. Smartphones the best example of active NFC device. Card
readers in public transport and touch payment terminals are also good examples of the technology.
Sensor technology in IoT makes it possible to collect data in almost any situation. For instance, We
use sensors in medical care, nursing care, industrial, logistics, transportation, agriculture, disaster
prevention, tourism, regional businesses, and many more. In other words, With the expansion of the
fields in which sensors play an essential role, the market is still growing with various sensors.
Actuators in IoT
Taking the sensor discussion forward, actuators do the opposite of a sensor. They convert electrical
impulses into physical actions or objects. In the light example, as the sensor is reading the brightness
of the light by converting it into an electrical signal, an actuator takes action according to the desired
setting. So here, it will decrease or increase the light brightness according to the set parameters.
We can leverage actuators to control and manage our devices in the IoT network according to the
information sent by the sensors.
Types of Actuators :
1. Hydraulic Actuators –
A hydraulic actuator uses hydraulic power to perform a mechanical operation. They are actuated by a
cylinder or fluid motor. The mechanical motion is converted to rotary, linear, or oscillatory motion,
according to the need of the IoT device. Ex- construction equipment uses hydraulic actuators
because hydraulic actuators can generate a large amount of force.
2. Pneumatic Actuators –
A pneumatic actuator uses energy formed by vacuum or compressed air at high pressure to convert
into either linear or rotary motion. Example- Used in robotics, use sensors that work like human
fingers by using compressed air.
difference between iot and m2m
Devices have objects that are responsible for Some degree of intelligence is observed in
Intelligence decision making this.
Internet protocols are used such as HTTP, FTP, Traditional protocols and communication
Communication protocol used and Telnet. technology techniques are used
Data is shared between other applications that Data is shared with only the communicating
Data Sharing are used to improve the end-user experience. parties.
Scope A large number of devices yet scope is large. Limited Scope for devices.
Open API support Supports Open API integrations. There is no support for Open APIs
Examples Smart wearables, Big Data and Cloud, etc. Sensors, Data and Information, etc.
Architecture of M2M
M2M device domain
In this domain, an M2M area network is formed by the collaboration of a large number of devices
(e.g. sensors, actuators, and smart meters) and gateways (data aggregation points/concentrators).
These devices collect the sensory data from different parts in the M2M area domain, and
collaboratively make “intelligent decisions” to transmit the sensory and monitored data to a gateway.
The gateway itself is an “intelligent device”, which receives the sensory data and intelligently
manages the received data packets.
It forwards the data packets through efficient paths by single-hop or multi-hop channels via a
network domain to the back-end server of the application domain.
When there are multiple gateways in an M2M area domain, they can further communicate with each
other directly (peer-to-peer communication) to make collaborative decisions.
The network domain acts as an interface between M2M device domain and M2M application
domain.
In this domain, long-range wired/wireless network protocols (e.g. telephone networks, WiMAX, and
3G/4G cellular networks) are used to provide cost efficient and reliable channels with wide coverage
to convey the sensory information from M2M device domain to the application domain.
The application domain consists of a back-end server (BS) and M2M application clients.
The back-end server is the main component of the M2M system and acts as an integration point to
store all the sensory information transmitted from the M2M device domain.
It also provides the real-time monitoring data to various client applications for real-time remote
monitoring management (RMM), i.e. smart metering, e-health care, and traffic monitoring.
The BS can also vary for different applications; e.g. in smart grids, the control center acts as the BS,
whereas in ehealthcare systems, the BS is the M2M health-monitoring server.
Considering M2M domain in Fig. below only, we can think of two communication scenarios.
Architecture of SoC
SoC stands for System On Chip. It is a small integrated chip that contains all the required components
and circuits of a particular system. The components of SoC include CPU, GPU, Memory, I/O devices,
etc. SoC is used in various devices such as smartphones, Internet of Things appliances, tablets, and
embedded system applications. In this article, we are going to see the architecture and architectural
features of SoC.
Architecture of SoC
Processor: It is the heart of SoC, usually SoC contains at least one or more than one coprocessor. It
can be a microcontroller, microprocessor, or DSP. Most of the time DSP is used in every SoC as a
processor.
DSP: DSP stands for Digital Signal Processor. It is included in SoC to perform signal processing
operations such as data collection, data processing, etc. it is also used for the purpose of decoding
the images.
Memory: Memory is used in SoC for the purpose of storage. It may be a volatile or non-volatile
memory. Volatile memory includes RAM there are two types of RAM one is SRAM and another is
DRAM. The non-volatile memory includes ROM.
Encoder/Decoder: Used for the purpose of interrupting information and converting it into codes.
Network Interface card: SoC has an internal interface or bus or network to connect all individual
blocks. Basically, the Network interface card provides a connection of the network to the system.
GPU: GPU stands for Graphical Processing Unit, used in SoC to visualize the interface. GPU is specially
designed to speed up the operations related to image calculations. The basic blocks of the GPU are
the Bus interface, Power Management Unit, Video Processing unit, Graphics Memory Controller,
Display interface, etc.
Peripheral devices: Externally connected devices/interfaces such as USB, HDMI, Wi-Fi, and Bluetooth
are included in peripheral devices. This device is used in SoC to perform various operations.
UART: Universal Asynchronous Receiver Transmitter is included in SoC which is used to transmit or
receive serial data. Voltage regulators, Oscillators, clocks, and ADC/DAC are also part of SoC.
Advantages of SoC:
It is small in size and includes many features and functions.
An SoC provides faster execution due to high speed processor and memory.
Disadvantages of an SoC
Initial cost of design and development is very high. If the number of SoCs is small, the cost per SoC
will be very high.
Even a single transistor or system damage may prove to be very costly as the complete board has to
be replaced, and its servicing is very expensive.
Time-consuming designing process. Usually, a designing process of SoC takes six to twelve months.
If any component of the SoC is not functioning properly then it cannot be replaced in that case an
entire SoC has to be replaced.
Uses of SoC: