0% found this document useful (0 votes)
30 views47 pages

IoT Day 1

Uploaded by

mimawi9161
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views47 pages

IoT Day 1

Uploaded by

mimawi9161
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

Internet of Things

Topic: Introduction to IoT

Dr Abhishek Hazra
abhishek.h@iiits.in
Outline

 IoT definition
 IoT Architecture
 Characteristics of IoT
 Physical Design of IoT
 Logical Design of IoT
 IoT Protocols
 IoT Levels & Deployment Templates
Definition of IoT

“It’s a global infrastructure for the information society, enabling


advance services by interconnecting physical and virtual things based
on existing and evolving interoperable information and communication
technologies”

-- International Telecommunication Union*


IoT Architecture
Components
Characteristics of IoT

 Dynamic & Self-Adapting


 Self-Configuring
 Interoperable Communication Protocols
 Unique Identity
 Integrated into Information Network
Physical Design of IoT

 The "Things" in IoT usually refers to IoT devices which have unique
identities and can perform remote sensing, actuating and
monitoring capabilities.
 IoT devices can:
• Exchange data with other connected devices and applications (directly or
indirectly), or
• Collect data from other devices and process the data locally or
• Send the data to centralized servers or cloud-based application back-ends for
processing the data, or
• Perform some tasks locally and other tasks within the IoT infrastructure,
based on temporal and space constraints
Generic block diagram of an IoT Device

• An IoT device may consist of


several interfaces for
connections to other devices,
both wired and wireless.
 I/O interfaces for sensors
 Interfaces for
Internet connectivity
 Memory and storage
interfaces
 Audio/video interfaces.
Internet of Things
What is So Important in IoT ?

 More connected devices than people.


 Recent predictions go up to 500 billion devices by 2030.
 Cisco reports that the IoT market size will be 19 trillion by 2025.
 How to manage the data generated from IoT devices?
 How to configure the IoT network?
Case Study 1: Smart Home
Case Study 2: Smart Healthcare
Case Study 3: Smart Agriculture
Case Study 4: Smart Transportation
IoT Protocols

The application layer of a computer network allows


different applications to communicate with each other

The transport layer is responsible for end-to-end


communication between two devices on a network

The network layer's main function is to move data


between networks
The data link layer- Flow control, Error detection,
Error correction
IoT Protocols

• Transport Layer
• Link Layer
• TCP
• 802.3 – Ethernet
• UDP
• 802.11 – WiFi
• 802.16 – WiMax • Application Layer
• 802.15.4 – LR-WPAN • HTTP
• 2G/3G/4G • CoAP
• WebSocket
• Network/Internet Layer
• MQTT
• IPv4
• XMPP
• IPv6
• DDS
• 6LoWPAN
• AMQP
Logical Design of IoT

 Logical design of an IoT system refers


to an abstract representation of the
entities and processes without going
into the low-level specifics of the
implementation.

 An IoT system comprises of a number


of functional blocks that provide the
system the capabilities for
identification, sensing, actuation,
communication, and management.
Request-Response communication model

• Request-Response is a
communication model in which the
client sends requests to the server
and the server responds to the
requests.

• When the server receives a request,


it decides how to respond, fetches
the data, retrieves resource
representations, prepares the
response, and then sends the
response to the client.
Publish-Subscribe communication model

• Publish-Subscribe is a
communication model that involves
publishers, brokers and consumers.
• Publishers are the source of data.
Publishers send the data to the topics
which are managed by the broker.
Publishers are not aware of the
consumers.
• Consumers subscribe to the topics
which are managed by the broker.
• When the broker receives data for a
topic from the publisher, it sends the
data to all the subscribed consumers.
Push-Pull communication model

• Push-Pull is a communication model in


which the data producers push the
data to queues and the consumers pull
the data from the queues. Producers
do not need to be aware of the
consumers.

• Queues help in decoupling the messaging


between the producers and consumers.

• Queues also act as a buffer which helps in


situations when there is a mismatch
between the rate at which the producers
push data and the rate at which the
consumers pull data.
Exclusive Pair communication model

• Exclusive Pair is a bidirectional, fully 1


duplex communication model that
uses a persistent connection 2
between the client and server.
3
• Once the connection is setup it
remains open until the client sends 4
a request to close the connection.
5

• Client and server can send messages 6


to each other after connection
setup.
REST-based Communication APIs

• Representational State Transfer (REST)


is a set of architectural principles by
which you can design web services
and web APIs that focus on a system’s
resources and how resource states are
addressed and transferred.

• REST APIs follow the request-


response communication model.

• The REST architectural constraints


apply to the components, connectors,
and data elements, within a
distributed hypermedia system.
REST-based Communication APIs

• The client should not be concerned with the storage of the data which is a concern of
the server. Similarly, the server should not be concerned about the user interface,
which is a concern of a client.

• Each request from the client to server must contain all the necessary information to
understand the request.

• Data within a response to a request be implicitly or explicitly labeled as cache-able or


non-cache-able.

• Each component cannot see beyond the immediate layer.

• The server can provide executive code or script for client to execute.
WebSocket-based Communication APIs

• WebSocket APIs allow bi-


directional, full duplex 1
communication between clients
and servers.
• WebSocket APIs follow the exclusive 2
pair communication model
• Low latency & high throughput
3
IoT enabling technologies

• Wireless connectivity

• Sensors and Actuators

• Cloud Computing

• Edge Computing

• Data Analytics and Machine Learning

• Blockchain
Wireless connectivity

• Wi-Fi: Commonly used for high-speed connections, suitable for applications


in homes, offices, and urban areas.
• Bluetooth: Ideal for short-range connections between devices, often used
for wearable devices and smart home applications.
• Zigbee: Designed for low-power, low-data-rate communication, suitable for
applications requiring energy efficiency, like home automation.
• LoRaWAN: Provides long-range, low-power connectivity, making it suitable
for applications in agriculture, smart cities, and Industrial IoT.
• Cellular Networks (5G, LTE-M, NB-IoT): Cellular technologies offer wide
coverage and support for various IoT use cases, from connected vehicles to
remote monitoring.
Sensors and Actuators

• Temperature Sensors: Measure ambient temperature and help control


heating, cooling, and climate systems.
• Motion Sensors: Detect movement, enabling applications like security
systems, smart lighting, and activity tracking.
• Humidity Sensors: Measure moisture levels in the air, important for HVAC
systems, agriculture, and storage environments.
• Proximity Sensors: Detect the presence of objects or people, used in
touchless interfaces, parking assistance, and industrial automation.
• Actuators (e.g., Servos, Motors): Convert electrical signals into mechanical
motion, enabling devices to perform physical actions like opening doors,
moving robotic arms, etc.
Cloud Computing

• Scalability: Cloud platforms can scale resources up or down according to


demand, ensuring optimal performance and cost-efficiency.
• Storage: Cloud storage provides a centralized and accessible repository for
storing and managing IoT-generated data.
• Data Processing: Cloud platforms offer powerful processing capabilities to
analyze and extract insights from massive datasets.
• Remote Access: IoT devices can be monitored and managed remotely
through cloud-based dashboards and applications.
• Integration: Cloud services enable seamless integration of data and
functionality across diverse IoT devices and applications.
Edge Computing

• Low Latency: Edge computing reduces data processing time by processing


data closer to where it's generated, improving real-time responsiveness.
• Bandwidth Optimization: Only relevant data is sent to the cloud, reducing
the amount of data transferred and conserving network bandwidth.
• Privacy: Processing data locally reduces the need to send sensitive
information to the cloud, enhancing privacy and security.
• Offline Operation: Edge devices can continue functioning even when
disconnected from the cloud, ensuring uninterrupted operations.
• Real-time Analytics: Immediate data analysis at the edge allows for quick
decision-making without waiting for data to travel to the cloud.
Data Analytics and Machine Learning

• Predictive Maintenance: ML algorithms can predict equipment failures


before they happen, minimizing downtime and maintenance costs.
• Anomaly Detection: ML models identify unusual patterns in data, helping to
detect security breaches, fraud, and abnormal behaviors.
• Pattern Recognition: ML can recognize complex patterns in data, assisting
in image and speech recognition, as well as predictive analysis.
• Personalization: ML algorithms can analyze user behavior to provide
personalized recommendations and experiences.
• Optimization: ML can optimize processes by analyzing data to identify
inefficiencies and suggest improvements, such as supply chain optimization.
Blockchain

• Decentralization: Blockchain operates on a decentralized network,


enhancing security and reducing the risk of single points of failure.
• Immutability: Once data is added to a blockchain, it cannot be altered or
deleted, ensuring data integrity and auditability.
• Security: Transactions on a blockchain are encrypted and validated by a
consensus mechanism, making it highly secure against unauthorized access
and tampering.
• Transparency: All participants in a blockchain network have access to the
same data, fostering transparency and trust.
• Smart Contracts: Blockchain supports self-executing smart contracts, which
automatically execute predefined actions when specific conditions are met.
IoT Levels & Deployment Templates

An IoT system comprises of the following components:


• Device: An IoT device allows identification, remote sensing, actuating and
remote monitoring capabilities. You learned about various examples of IoT
devices in section
• Resource: Resources are software components on the IoT device for
accessing, processing, and storing sensor information, or controlling
actuators connected to the device. Resources also include the software
components that enable network access for the device.
• Controller Service: Controller service is a native service that runs on the
device and interacts with the web services. Controller service sends data
from the device to the web service and receives commands from the
application (via web services) for controlling the device.
IoT Levels & Deployment Templates

• Database: Database can be either local or in the cloud and stores the data
generated by the IoT device.
• Web Service: Web services serve as a link between the IoT device,
application, database and analysis components. Web service can be either
implemented using HTTP and REST principles (REST service) or using
WebSocket protocol (WebSocket service).
• Analysis Component: The Analysis Component is responsible for analyzing
the IoT data and generate results in a form which are easy for the user to
understand.
• Application: IoT applications provide an interface that the users can use to
control and monitor various aspects of the IoT system. Applications also
allow users to view the system status and view the processed data.
IoT Level-1

• A level-1 IoT system has a single


node/device that performs sensing
and/or actuation, stores data,
performs analysis and hosts the
application

• Level-1 IoT systems are suitable


for modeling low- cost and low-
complexity solutions where the
data involved is not big and the
analysis requirements are not
computationally intensive.
IoT Level-2

• A level-2 IoT system has a single


node that performs sensing and/or
actuation and local analysis.
• Data is stored in the cloud and
application is usually cloud- based.
• Level-2 IoT systems are suitable for
solutions where the data involved is
big, however, the primary analysis
requirement is not computationally
intensive and can be done locally
itself.
IoT Level-3

• A level-3 IoT system has a single


node. Data is stored and analyzed
in the cloud and application is
cloud- based.
• Level-3 IoT systems are suitable
for solutions where the data
involved is big and the analysis
requirements are computationally
intensive.
IoT Level-3

• A level-3 IoT system has a single


node. Data is stored and analyzed
in the cloud and application is
cloud- based.
• Level-3 IoT systems are suitable
for solutions where the data
involved is big and the analysis
requirements are computationally
intensive.
IoT Level-4

• A level-4 IoT system has multiple nodes


that perform local analysis. Data is
stored in the cloud and application is
cloud-based.
• Level-4 contains local and cloud- based
observer nodes which can subscribe to
and receive information collected in
the cloud from IoT devices.
• Level-4 IoT systems are suitable for
solutions where multiple nodes are
required, the data involved is big and
the analysis requirements are
computationally intensive.
IoT Level-4

• A level-4 IoT system has multiple nodes


that perform local analysis. Data is
stored in the cloud and application is
cloud-based.
• Level-4 contains local and cloud- based
observer nodes which can subscribe to
and receive information collected in
the cloud from IoT devices.
• Level-4 IoT systems are suitable for
solutions where multiple nodes are
required, the data involved is big and
the analysis requirements are
computationally intensive.
IoT Level-5
• A level-5 IoT system has multiple end
nodes and one coordinator node.
• The end nodes that perform sensing
and/or actuation.
• Coordinator node collects data from the
end nodes and sends to the cloud.
• Data is stored and analyzed in the cloud
and application is cloud-based.
• Level-5 IoT systems are suitable for
solutions based on wireless sensor
networks, in which the data involved is big
and the analysis requirements are
computationally intensive.
IoT Level-5
• A level-5 IoT system has multiple end
nodes and one coordinator node.
• The end nodes that perform sensing
and/or actuation.
• Coordinator node collects data from the
end nodes and sends to the cloud.
• Data is stored and analyzed in the cloud
and application is cloud-based.
• Level-5 IoT systems are suitable for
solutions based on wireless sensor
networks, in which the data involved is big
and the analysis requirements are
computationally intensive.
IoT Level-6

• A level-6 IoT system has multiple


independent end nodes that perform
sensing and/or actuation and send data
to the cloud.
• Data is stored in the cloud and
application is cloud-based.
• The analytics component analyzes the
data and stores the results in the cloud
database.
• The results are visualized with the cloud-
based application.
• The centralized controller is aware of the
status of all the end nodes and sends
control commands to the nodes.
IoT Level-6

• A level-6 IoT system has multiple


independent end nodes that perform
sensing and/or actuation and send data
to the cloud.
• Data is stored in the cloud and
application is cloud-based.
• The analytics component analyzes the
data and stores the results in the cloud
database.
• The results are visualized with the cloud-
based application.
• The centralized controller is aware of the
status of all the end nodes and sends
control commands to the nodes.
IoT Levels: 1~6
IoT Projects

1) Head-Movement Controlled Mouse Using IoT Devices


-aims to create an innovative solution for individuals with limited physical
mobility. This project involves the development of a system that enables
users to control a computer mouse using head movements, enhancing
accessibility and computer interaction for those who face physical
challenges.
IoT Projects

1. Attendance management system


2. Health Tracking Wearable for Physically Disabled Individuals
3. Radio Wave Propagation link analysis
4. IoT-Enabled Wheelchair Assistance System
5. Smoke detection system
6. Parking Space Availability Tracker
7. Head-Movement Controlled Mouse Using IoT Devices

You might also like