0% found this document useful (0 votes)
3 views12 pages

Unit-1 Notes IoT

Uploaded by

krunalkhangal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views12 pages

Unit-1 Notes IoT

Uploaded by

krunalkhangal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Unit - I Basics of Internet of Things (IoT)

1.1 Basics of IoT: need, history, definition, characteristics, architecture of IoT with
block diagram, IoT applications

1.2 Types of IoT system

1.3 Physical and logical design of IoT

1.4 Enabling technologies for IoT : Big DataAnalytics, Cloud computing, Wireless
Sensor Networks, Embedded Systems with example

1.5 IoT system challenges for design and security

Unit - I Basics of Internet of Things (IoT)

Q1.Why IoT is Needed:

1. IoT devices work automatically that reducing manual effort and saving time.
2. It helps in efficient use of resources like energy and water.
3. Smart irrigation in agriculture is a good example of resource optimization.
4. Real-time monitoring tracks parameters like temperature and heart rate.
5. It improves decision-making through better data analysis.
6. Saves time and cost by preventing wastage and downtime.
7. Enhances safety using surveillance, fire alarms, and gas leak detectors.
8. Smart homes allow control of appliances via smartphones.
9. Wearable’s track health and fitness in real time.
10.Improves customer experience through personalized services.
Q2.Definition of IoT :

Internet of Things (IoT) is a network of physical objects that are embedded with
electronics , software, sensors and connectivity that allows these objects to collect
and exchange data.

Four Key components of IoT framework are

1) Sensors/Devices

2) Connectivity

3) Data Processing

4) User Interface

Q3.Characteristics of IoT

1. Dynamic & Self-Adapting


o IoT devices can sense their environment and adapt to changes in real
time without human intervention.
o Example: Smart lights adjusting brightness based on surrounding
light.
2. Self-Configuring
o Devices can automatically configure themselves, connect to the
network, and start functioning with minimal user setup.
o Example: Plug-and-play IoT sensors.
3. Interoperable Communication Protocols
o IoT systems support multiple communication standards and protocols
to ensure smooth data exchange between heterogeneous devices.
o Example: MQTT, CoAP, Bluetooth, ZigBee, Wi-Fi.
4. Unique Identity
o Each IoT device has a unique identifier (like IP address, MAC
address) to ensure it can be distinctly recognized on the network.
o This helps in device management and data tracking.
5. Integrated into Information Network
o IoT devices are part of a larger digital ecosystem that includes cloud
platforms, data analytics, and decision-making systems.
o Example: Smart home devices syncing with cloud-based control apps.
Q4.Draw architecture of IoT with block diagram and Explain.

 IoT architecture is a framework that defines how different parts of an IoT


system interact with each other.

OR

1. Perception Layer or sensing layer:

 First layer of the IoT architecture which is responsible for collecting data
from environment using physical devices.

 This layer includes sensors and actuators that are placed in the environment
to gather information about temperature, humidity, light, sound, and other
physical parameters.

Sensors and Actuators


 Sensors detect changes in the environment like:
 Temperature
 Humidity
 Light intensity
 Motion
Actuators perform physical actions based on decisions made by the system:
 Turn on a light
 Open a valve
 Rotate a motor

2. Network Layer:

 The network layer of an IoT architecture is responsible for providing


communication and connectivity between devices in the IoT system.
 It includes protocols and technologies that allow the devices to connect and
communicate with each other and within the wider internet.
 Examples of network technologies that are commonly used in IoT
include WiFi, Bluetooth, Zigbee, and cellular networks such as 4G and 5G
technology.
 It may include gateways and routers that act as intermediaries between
devices and the wider internet, and may also include security features such
as encryption and authentication to protect against unauthorized access.

3. Cloud layer Or Data processing Layer:

 The cloud layer acts as the central hub for data storage, processing, and
management.
 This layer is responsible for receiving raw data from the devices, processing
it, and making it suitable for further action.
 It includes a variety of technologies and tools, such as data management
systems, analytics platforms, and machine learning algorithms.
 Cloud layer enabling data to be collected, processed, analyzed, and used to
drive intelligent applications and services.

4. Application Layer

 Topmost layer that interacts directly with the end-user


 Responsible for providing user-friendly interfaces and functionalities that
enable users to access and control IoT devices.
 This layer includes various software and applications such as mobile apps,
web portals, and other user interfaces that are designed to interact with the
underlying IoT infrastructure.

Q5. IoT Applications

 Smart Grids and energy saving

 Smart cities

 Smart homes/Home automation

 Healthcare

 Earthquake detection

 Radiation detection/hazardous gas detection

 Smartphone detection

 Water flow monitoring

 Traffic monitoring

 Smart door lock protection system

 Robots and Drones

Q6.Advantages of IoT

1. Increased Efficiency & Productivity – Automates tasks, optimizes processes, real-time


decision-making.
2. Real-time Control – Enables instant decisions using up-to-date data.
3. Cost Savings – Optimizes resources, reduces operational costs.
4. Multitasking – Can perform multiple tasks simultaneously.
5. Better Connectivity – Easy internet access via Wi-Fi, Bluetooth, Zigbee, Cellular,
LoRaWAN, etc.
6. Reliability – Provides dependable performance for applications.
Disadvantages of IoT

1. High Initial Cost – Expensive setup and deployment.


2. Complexity – Integration issues between different devices and systems.
3. Privacy Concerns – Personal data collection can be misused.
4. Security Risks – Vulnerable to hacking and cyber-attacks.

Got it � I’ll simplify the Types of IoT with short and easy subpoints for students’ understanding:

Q7. Types of IoT

1. Consumer IoT
o Used in daily life.
o Example: Smartwatch, Alexa, Smart TV.
2. Industrial IoT (IIoT)
o Used in factories and industries.
o Example: Robots, machines with sensors.
3. Healthcare IoT (IoMT)
o Used in hospitals and patient care.
o Example: Heart monitor, smart insulin pump.
4. Agricultural IoT
o Used in farming.
o Example: Smart irrigation, soil moisture sensor.
5. Smart City IoT
o Used in city services.
o Example: Smart traffic lights, smart parking.
6. Commercial IoT
o Used in shops and offices.
o Example: Inventory tracking, smart security system.
7. Military IoT
o Used in defense.
o Example: Drones, smart weapons.
Q.8 Explain Physical and Logical Design of IoT

The physical design of an IoT system includes design aspect of various hardware components and
interfaces that enable,
Communication
Data processing,
Storage and interaction with the physical world.

Below are the major components:


A) Node Components
B) IoT Protocols

A) Node Components
1. Connectivity
Used to connect IoT devices to the network for communication.
USB Host
RJ45 / Ethernet

2. Processor
The central processing unit (CPU) is responsible for managing tasks, processing data, and controlling
device functions.
CPU
3. Audio/Video Interfaces
These interfaces handle multimedia input/output functionalities.
HDMI – High-definition video output
3.5mm Audio Jack – Standard audio output
RCA Video – Analog video output

4. I/O Interfaces (for sensors, actuators, etc.)


These interfaces allow communication with external components like sensors and actuators.
UART – Universal Asynchronous Receiver-Transmitter
SPI – Serial Peripheral Interface
I2C – Inter-Integrated Circuit
CAN – Controller Area Network

5. Memory Interfaces
Used for interfacing with volatile and non-volatile memory components.
NAND/NOR – Flash memory types
DDR1 / DDR2 / DDR3 – Dynamic RAM generations

6. Graphics
Handles image and video rendering for user interfaces.
GPU – Graphics Processing Unit

7. Storage Interfaces
These interfaces connect with external or internal storage devices.
SD – Secure Digital
MMC – MultiMediaCard
SDIO – Secure Digital Input Output

B) IoT Protocols

Perfect � Let’s group your given IoT Protocols according to their Layers (just layer + protocol
names, details kept same):

Application Layer

 MQTT (Message Queuing Telemetry Transport) – Lightweight messaging protocol


for small sensors and mobile devices.
 CoAP (Constrained Application Protocol) – Web transfer protocol designed for
resource-constrained devices.
 AMQP (Advanced Message Queuing Protocol) – Messaging protocol for reliable
communication in business systems.
 HTTP/HTTPS (HyperText Transfer Protocol/Secure) – Standard web protocol for
data communication over the internet.
 DDS (Data Distribution Service) – Real-time data exchange protocol for high-
performance IoT systems.
 XMPP (Extensible Messaging and Presence Protocol) – Protocol mainly used for
instant messaging and presence information.

Network / Perception Layer

 Zigbee – Low-power wireless protocol for home automation and IoT networks.
 Bluetooth & BLE (Bluetooth Low Energy) – Short-range communication protocol for
low-power IoT devices.
 LoRaWAN (Long Range Wide Area Network) – Long-range, low-power protocol for
wide-area IoT applications.
 Cellular (2G/3G/4G/5G, NB-IoT, LTE-M) – Mobile network protocols for large-scale
IoT connectivity.

Logical Design Aspects of IoT

The Logical Design of an IoT system describes the high-level architecture and
behavior of the system.

It does not include low-level hardware or implementation details but focuses on


what the system does rather than how it is implemented.

1. Functional Blocks
o Identification, Sensing, Actuation, Communication, Management.
2. Communication Models
o Device-to-Device
o Device-to-Cloud
o Device-to-Gateway
o Back-End Data Sharing
3. Communication APIs
o REST API, WebSocket, MQTT, CoAP
4. Protocols
o Networking: IPv6, 6LoWPAN
o Messaging: MQTT, CoAP
o Security: TLS, DTLS
5. Data Flow & Processing
o Edge, Fog, or Cloud-based data processing and decision making.
6. Service-Oriented Architecture (SOA)
o Modular, reusable, and scalable service structure.

Q.9 List and explain Enabling Technologies for IoT (with Tools & Examples)

1. Big Data Analytics


o IoT generates huge volumes of data from sensors and devices.
o Big Data tools store, process, and analyze this data to gain useful
insights, trends, and predictions.
o Tools Used:
 Apache Hadoop – Batch processing of large datasets
 Apache Spark – Real-time data analytics and in-memory
processing
 Tableau – Visual representation of data (graphs, dashboards)
o Example: In smart cities, traffic and pollution data is analyzed using
Spark and visualized through Tableau to manage traffic lights.

2. Cloud Computing
o Offers scalable and on-demand access to computing resources like
storage, processing, and applications.
o Enables centralized control and remote access of IoT devices and
data.
o Popular Cloud Platforms: AWS IoT Core, Microsoft Azure IoT
Hub, Google Cloud IoT
o Example: A smart home system stores temperature and humidity data
on AWS, accessible from a mobile app.

3. Wireless Sensor Networks (WSN)


o Group of interconnected sensors that monitor physical conditions and
communicate wirelessly.
o Used for real-time monitoring in remote or large areas.
o Protocols/Technologies Used: ZigBee, LoRaWAN, Bluetooth Low
Energy (BLE)
o Example: In agriculture, WSN nodes send soil and weather data to a
gateway for irrigation decisions.

4. Embedded Systems
o Hardware-software systems embedded within IoT devices to perform
specific control or monitoring functions.
o Responsible for data acquisition, signal processing, and
communication with the cloud or local network.
o Examples of Platforms: Arduino, Raspberry Pi, ESP32
o Databases Used:
 MongoDB – NoSQL database for flexible storage of IoT data
 Cassandra – Highly scalable NoSQL DB for time-series data
o Example: A Raspberry Pi-based weather station uses sensors, stores
data in MongoDB, and sends alerts to users.

Q.10 IoT System Challenges (Based on Bahga & Madisetti)

IoT systems pose various design and security challenges due to their complex
and distributed nature. These challenges must be addressed to build reliable,
scalable, and secure IoT applications.

A. Design Challenges

1. Scalability
o IoT systems must handle millions of devices and sensors.
o Challenge: Efficient resource allocation and data management.
2. Heterogeneity
o Devices differ in hardware, OS, communication protocols, etc.
o Challenge: Designing interoperable systems.
3. Resource Constraints
o Devices have limited CPU, memory, and power.
o Challenge: Optimize algorithms and communication.
4. Mobility
o Devices may frequently change location.
o Challenge: Ensure continuous connectivity and service availability.
5. Real-time Processing
o Applications (e.g., healthcare, traffic) need instant responses.
o Challenge: Minimize latency in sensing, transmission, and decision-
making.
6. Reliability and Fault Tolerance
o Systems must handle failures and recover quickly.
o Challenge: Design with redundancy and robustness.

B. Security Challenges

1. Data Confidentiality & Privacy


o Devices collect sensitive data.
o Challenge: Encrypt and control data access.
2. Authentication & Authorization
o Only legitimate users/devices should access resources.
o Challenge: Secure identity and permission control.
3. Secure Communication
o Data in transit must be protected from interception or modification.
o Challenge: Use protocols like TLS/SSL, DTLS.
4. Software & Firmware Security
o Outdated or unpatched firmware is vulnerable.
o Challenge: Enable secure updates (OTA – Over-the-Air).
5. Physical Security
o Devices in open environments are prone to tampering.
o Challenge: Protect hardware and interfaces.
6. Denial of Service (DoS) Attacks
o Overloading devices or network with requests.
o Challenge: Implement rate limiting, firewalls.

You might also like