IOT - Unit 1 Notes
IOT - Unit 1 Notes
Definition
The Internet of Things (IoT) is a dynamic global network infrastructure with self-
configuring capabilities that relies on standard and interoperable communication
protocols. In IoT:
• Physical and virtual "things" are equipped with unique identities, physical
attributes, and virtual personalities.
• These "things" use intelligent interfaces (e.g., sensors, actuators, embedded
systems) to connect and interact.
• They are seamlessly integrated into the information network, enabling smooth
communication and data exchange.
• IoT devices often collect, process, and share data related to users, their
activities, and their environment.
Key Characteristics in the Definition
1. Dynamic – Devices can adapt to changes in network conditions or requirements.
2. Global – IoT operates on a worldwide scale, connecting devices across
geographies.
3. Self-configuring – Devices can automatically connect, configure, and update
themselves without manual intervention.
4. Interoperable – Uses standard protocols so different devices from different
vendors can work together.
5. Physical & Virtual Integration – Bridges the gap between the physical world
(objects, sensors) and the virtual world (data, cloud services).
Characteristics of IoT
The Internet of Things (IoT) exhibits several key characteristics that define how it
functions and how devices interact in a connected ecosystem.
1. Connectivity
• Core Requirement: IoT devices must be connected to the infrastructure to
function.
• Anytime, Anywhere: The network should support communication anytime,
anywhere.
• Importance: Without connectivity, the IoT concept has no value — devices must
remain online to exchange data.
2. Intelligence and Identity
• Intelligence: IoT systems must extract useful knowledge from raw data
generated by sensors.
• Data Interpretation: Proper data processing is essential for decision-making.
• Unique Identity: Each IoT device has a unique identifier (e.g., IP address, MAC
address) for tracking, querying, and managing devices.
3. Scalability
• IoT networks must support massive growth in the number of connected devices.
• The infrastructure should handle large-scale data generation and processing
efficiently.
4. Dynamic and Self-Adapting
• Devices should adapt automatically to changing conditions.
• Example: A surveillance camera adjusts to different lighting conditions
(day/night).
5. Self-Configuring
• Devices can connect, configure, and update themselves without manual
intervention.
• This feature supports rapid deployment and reduced maintenance effort.
6. Interoperability
• The architecture must allow different manufacturers’ devices to work together.
• Standard communication protocols are essential for smooth integration.
7. Safety and Privacy
• Data Security: Sensitive information must be protected from unauthorized
access.
• Device Security: Prevent unauthorized control or tampering of devices.
• User Privacy: Protect personal information and maintain confidentiality.
User Experience Focuses on the interaction between the user and IoT
Layer 6
Layer system, ensuring ease of use and accessibility.
Processing and
Layer 2 Processes collected data and triggers control actions.
Control Action Layer
Physical / Sensor Physical devices and sensors that collect data from the
Layer 1
Layer environment.
Challenges in IoT
IoT brings immense opportunities, but it also faces significant challenges that impact its
implementation, security, and efficiency.
2. Privacy
• Users can be tracked or monitored 24/7 due to continuous connectivity.
• Tracking may happen without the user’s knowledge or consent.
• Risk of profiling, surveillance, and misuse of personal activities.
• Privacy laws and encryption standards must be enforced to protect users.
4. Connectivity
• Reliable wired or wireless connectivity is mandatory for IoT.
• Wireless technologies (Wi-Fi, Bluetooth, Zigbee, LoRa) rely on frequency bands
(e.g., 2.4 GHz), which may face congestion.
• Limited spectrum availability can lead to interference and slower data transfer.
• Rural areas may suffer from poor network infrastructure.
5. Power Requirements
• Most IoT devices are battery-operated, requiring energy-efficient operation.
• Battery life is a limitation, especially for remote or hard-to-reach devices.
• Growing device count increases total energy demand.
• Adoption of green energy sources (solar, wind) is encouraged for sustainable
IoT.
6. Complexity
• IoT is inherently multidisciplinary, involving hardware, software, networking,
data analytics, and domain-specific expertise.
• Rapid growth has led to a shortage of skilled professionals.
• Limited availability of toolkits, software frameworks, and hardware adds to the
difficulty.
• Integrating devices from different vendors increases complexity.
7. Storage
• IoT generates huge amounts of data that require efficient storage solutions.
• Cloud storage is becoming the standard, but decisions must be made:
o Which cloud provider to choose?
o Cost vs. capacity considerations.
o Security and compliance of stored data.
• In some cases, edge computing is preferred to process and store data closer to
the source to reduce latency.
IoT Protocols
IoT communication follows protocol stacks, similar to traditional networking but
optimized for constrained devices.
a) Link Layer Protocols (Data transfer over physical medium)
• IEEE 802.3 – Ethernet: Wired LAN connectivity.
• IEEE 802.11 – Wi-Fi: Wireless LAN for high-speed data.
• IEEE 802.16 – WiMax: Long-range broadband wireless.
• IEEE 802.15.4 – LR-WPAN: Low-rate wireless personal area network (used in
Zigbee).
• 2G / 3G / 4G: Cellular network connectivity for wide-area communication.
b) Network / Internet Layer Protocols (Addressing & Routing)
• IPv4: Traditional IP addressing.
• IPv6: Extended addressing for a large number of devices.
• 6LoWPAN: IPv6 over Low-Power Wireless Personal Area Networks (efficient for
constrained devices).
c) Transport Layer Protocols (End-to-end communication)
• TCP (Transmission Control Protocol): Reliable, connection-oriented
communication.
• UDP (User Datagram Protocol): Faster, connectionless communication (used in
low-latency IoT apps).
d) Application Layer Protocols (Data formatting & exchange)
• HTTP (HyperText Transfer Protocol): Common web communication protocol.
• CoAP (Constrained Application Protocol): Lightweight protocol for constrained
devices.
• WebSocket: Full-duplex communication between client and server.
• MQTT (Message Queuing Telemetry Transport): Lightweight publish-subscribe
protocol for IoT.
• XMPP (Extensible Messaging and Presence Protocol): Messaging protocol
used for real-time communication.
Link Layer in IoT
Overview
• Function: Determines how data is physically sent over the network’s physical
medium (e.g., copper wire, coaxial cable, radio waves).
• Scope: Local network connection between hosts (devices) on the same link.
• Operation: Hosts on the same link exchange data packets using link layer
protocols.
• Responsibility: Defines coding and signaling methods for hardware devices to
send data over the medium.
1. IEEE 802.3 – Ethernet (Wired LAN)
• Definition: A collection of wired Ethernet standards for the link layer.
• Types & Mediums:
o 802.3 (10BASE5): Coaxial cable as shared medium.
o 802.3i (10BASE-T): Copper twisted-pair connections.
o 802.3j (10BASE-F): Fiber optic connections.
o 802.3ae: 10 Gbps Ethernet over fiber.
• Data Rates: From 10 Mb/s to 40 Gb/s+.
• Operation: Shared medium carries communication for all devices; data sent by
one device can be received by all others (depending on propagation and
transceiver capabilities).
Application Layer
The Application Layer defines how an application interacts with lower-layer protocols
to send data over a network.
Key functions:
• Encodes application data (e.g., files) before transport
• Uses port numbers for application addressing
• Enables process-to-process communication via ports
• Works closely with the Transport Layer (e.g., TCP, UDP)
DDS Middleware
• Middleware is the software layer between the operating system and
applications in a distributed system.
• Purpose:
o Facilitates communication between system components.
o Handles data transmission, routing, and synchronization.
o Allows developers to focus on application logic rather than low-level data
exchange mechanics.
Data-Centricity in DDS
• DDS enables QoS-controlled data sharing between applications.
• Communication happens through publish–subscribe on Topics identified by a
Topic name.
• Subscriptions can apply:
o Time filters – receive data at controlled intervals.
o Content filters – receive only relevant subsets of data.
• DDS Domains are completely independent; no data sharing occurs across
domains.
AMQP (Advanced Message Queuing Protocol)
Definition:
An open application-layer protocol designed for business messaging with reliable
queuing and routing features.
Communication Models:
• Point-to-Point – One sender to one receiver.
• Publish–Subscribe – Multiple subscribers receive published messages.
How It Works:
1. Publisher sends a message to an Exchange.
2. Exchange routes the message to one or more Queues based on routing rules.
3. Consumers receive messages from queues for processing.
Advantages:
• Reliable message delivery.
• Supports complex routing patterns.
• Works well for asynchronous, distributed applications.
Logical Design of IoT
The Logical Design of an IoT system is an abstract representation of entities and
processes. It focuses on what the system does rather than how it is implemented
physically.
Device Block
• Comprises IoT devices responsible for:
o Sensing environmental parameters.
o Actuating physical elements.
o Monitoring system parameters.
o Controlling devices remotely or locally.
Services Block
• Provides various IoT services such as:
o Device Monitoring Services – tracking device status and health.
o Device Control Services – remotely controlling actuators and sensors.
o Data Publishing Services – sharing collected data with other systems or
applications.
o Device Discovery Services – finding and registering new devices
dynamically within the network.
Communication Block
• Manages data exchange between devices and systems.
• Ensures reliable and efficient communication using appropriate protocols and
models.
Application Block
• Provides the user interface for interaction with the IoT system.
• Allows users to:
o Control devices and actuators.
o Monitor real-time system status.
o View and analyze processed data and reports.
Management Block
• Offers functions to govern the IoT system:
o Configuration management.
o Network management.
o Fault management.
o Performance monitoring.
Security Block
• Ensures the security of the IoT system by providing:
o Authentication – verifying user/device identities.
o Authorization – controlling access to resources.
o Message and Content Integrity – ensuring data is not altered during
transmission.
o Data Security – encrypting data to prevent unauthorized access.
IoT Communication Models
There are several communication models used in IoT systems to exchange data
efficiently between devices, servers, and applications. The main models are:
• Request-Response
• Publish-Subscribe
• Push-Pull
• Exclusive Pair
Uni-directional (request →
Direction Bi-directional (full duplex)
response)
Communication
Request-Response Full Duplex
Model
1. Device Level
• IoT Device:
o Enables identification, remote sensing, actuation, and monitoring.
o Physical hardware with sensors, actuators, and communication modules.
2. Resource Level
• Resources:
o Software components on the IoT device responsible for:
▪ Accessing sensor data.
▪ Processing and storing sensor information locally.
▪ Controlling actuators.
▪ Enabling network access for communication with other systems.
4. Database Level
• Database:
o Stores the data generated by IoT devices.
o Can be local (on-premises) or cloud-based.
o Supports efficient data retrieval and long-term storage.
7. Application Level
• Application:
o User interface to interact with the IoT system.
o Enables users to:
▪ Monitor system status.
▪ Control devices remotely.
▪ View analyzed data and reports.
IoT Level 1
• Description:
o Single node/device handles:
▪ Sensing and/or actuation
▪ Data storage locally
▪ Data analysis locally
▪ Hosts the application locally
• Use Case:
o Suitable for low-cost, low-complexity systems.
o Data size is small, and analysis requirements are minimal or simple.
• Example:
o Home Automation System – e.g., a smart light or thermostat that senses
and acts locally without cloud dependency.
IoT Level 2
• Description:
o Single node/device performs sensing and/or actuation plus local
analysis.
o Data storage happens on the cloud.
o Application is usually cloud-based for access anywhere.
• Use Case:
o Suitable where data volume is large, but primary analysis is not
computationally heavy and can be done locally.
• Example:
o Smart Irrigation system – sensor node analyzes soil moisture locally but
stores and manages data remotely on the cloud.
IoT Level 3
• Description:
o Single node/device performs sensing and/or actuation.
o Data is stored and analyzed fully in the cloud.
o Application is cloud-based.
• Use Case:
o Suitable for large data volumes with computationally intensive
analysis that cannot be handled locally.
• Example:
o Tracking Package Handling – devices collect data, but all processing and
analysis are cloud-based for complex insights.
IoT Level 4
• Description:
o Multiple nodes perform local analysis.
o Data is stored in the cloud.
o Application is cloud-based.
o Contains local and cloud-based observer nodes that subscribe to and
receive information collected in the cloud from IoT devices.
• Use Case:
o Suitable where multiple nodes are needed, handling large data volumes
with computationally intensive analysis.
• Example:
o Noise Monitoring system with many distributed sensors analyzing locally
and reporting to cloud for further processing.
IoT Level 5
• Description:
o Multiple end nodes perform sensing and/or actuation.
o A coordinator node collects data from end nodes and sends it to the
cloud.
o Data storage, analysis, and application are all cloud-based.
• Use Case:
o Suitable for wireless sensor network (WSN)-based systems with large
data and heavy analysis needs.
• Example:
o Forest Fire Detection system with many sensor nodes coordinated by a
central node sending data to the cloud for analysis and alerting.
IoT Level 6
• Description:
o Multiple independent end nodes perform sensing/actuation and send
data directly to the cloud.
o Data storage and analysis happen in the cloud.
o A centralized controller monitors the status of all end nodes and sends
control commands.
o Results are visualized via cloud-based applications.
• Use Case:
o Suitable for distributed systems requiring centralized management and
cloud analytics.
• Example:
o Weather Monitoring System with many independent sensors reporting
weather data to the cloud for analysis and visualization.
Machine-to-Machine (M2M)
• Definition: Direct communication between machines/devices for remote
monitoring, control, and data exchange.
• M2M Area Network:
o Composed of M2M nodes with embedded sensing, actuation, and
communication hardware.
o Uses local communication protocols: ZigBee, Bluetooth, ModBus, M-
Bus, Wireless M-Bus, PLC, 6LoWPAN, IEEE 802.15.4, etc.
o These protocols connect nodes locally within the area network.
• Communication Network:
o Connects remote M2M area networks.
o Can be wired or wireless, typically IP-based.
o M2M area networks may use non-IP protocols, but long-distance
connectivity uses IP protocols.
M2M Gateway
• Purpose: Allows communication between non-IP-based M2M nodes and
external IP-based networks.
• Function:
o Translates between proprietary/non-IP protocols in the M2M area
network and IP-based protocols in the wider communication network.
o Enables inter-network data exchange between remote M2M systems.